Loading [MathJax]/extensions/MathZoom.js
Lan Wang - IEEE Xplore Author Profile

Showing 1-25 of 39 results

Filter Results

Show

Results

During rehabilitation training process, It is important to observe the patients condition and record the patient information of in real-time. In this paper, we establish the rehabilitation training and evaluation system based on the PHANToM Omni force feedback device and real-time wireless sensor motion capture and mechanical evaluation system(FAB). The experimenter holding PHANToM Omni force feed...Show More
The bottleneck is not the disk I/O but CUP clock speed faster than the memory speed in main memory database. In order to achieve high performance in main memory database, it is a good approach to design new index structures to improve the memory access speed. This paper establishes a cost model for B+-Tree and CSB+-Tree and analyze several parameters that influence the access performance such as k...Show More
This paper analyzes the nature of university curriculum problems (Time table Problem TTP), as well as the strengths and weaknesses of the problem solving, and evaluate some time table problem's arithmetic performance. The basic algorithm including greedy algorithm, simulated annealing algorithm, genetic algorithm and the improved genetic search algorithm by author. This thesis discover the use of ...Show More
Paging query efficiency of massive data directly relates to the execution efficiency of application system in oracle database. Presented an optimized solution for paging query in oracle 10g database, which includes many key technologies,such as database optimization ,SQL optimization, cursor variables, batch binding, dynamic SQL and so on .A shared, optimized stored procedure is issued. Compared w...Show More
This study was conducted to compare lipid and fatty acid composition of E.pacific and E.superba. Total lipids were extracted using the method of Folch instead of Soxhlet extraction. Silica gel column chromatography was used to isolate and analyse the total lipids, such as neutral lipid, glycolipid and phospholipid. Methyl esterification of the extracted lipids was determined by GC. The results sho...Show More
In this paper the key technique in independent product development of car sunroof was researched. Firstly the reversal engineering and software CATIA were applied to create the 3D model and the virtual prototype. Then the 3D model was imported into ADAMS to create the dynamical simulation model. Finally the model was parameterized and the optimization design was carried out. The research work in t...Show More
The Lower-limb Power Assisted Robot is a typical exoskeleton power assistance device, which is worn on the user's lower extremities. It can help the elderly and the infirm walk independently. According to the characteristics of human lower extremity joints, a robot with four-bar knee joint whose pelvis and knee joint are driven by the motor-driven screw-nut body is designed. Employing the Denanit-...Show More
Location is one of the key technologies in autonomous mobile robot navigation and it is the fundament of the route plan and avoidance obstacle of mobile robot. The paper is concerned with the problem of determining the position of the mobile robots by vision. A kind of infrared landmark was designed, the system software based on Visual C++6.0 and OpenCV was build, and a location system for mobile ...Show More
A planar 1R2T wire-driven parallel robot was designed with the aim of realizing rehabilitation training. The effects on the system of the wires' motion and the minimal tension force threshold were researched during the moving platform's expected motion. The principle prototype is developed and some related experiments were done. The kinematics equations were established by the influence coefficien...Show More
Meal-assistance robot is a new kind of service robot. A new type of meal-assistance robot model with a few DOF, low price and high performance was presented first in the paper, in view that the existing meal-assistance robots are characterized by a large number of DOF, high price and being difficult to accept by the disabled patients in the hand who are the vulnerable groups of society, especially...Show More
This paper presents a method using speech recognition with linguistic constraints to detect the mispronunciations made by Cantonese learners of English. The predicted pronunciation errors have been derived from cross-language phonological comparisons, which are used to generate the erroneous pronunciation variations in a lexicon. The acoustic models are trained with native speakerspsila speech and...Show More
The knowledge of human gait plays an important role in the equilibrium control during walking. The study of the human gait has an important science significance and applied value in the fields of medical treatment, physical training, rehabilitation, man-machine engineering and so on. This paper illustrates a joint measurement system based on the motion image gathering system and the angular measur...Show More
This work aims to derive salient mispronunciations made by Chinese (L1 being Cantonese) learners of English (L2 being American English) in order to support the design of pedagogical and remedial instructions. Our approach is grounded on the theory of language transfer and involves systematic phonological comparison between two languages to predict possible phonetic confusions that may lead to misp...Show More
The IMS-based, half-duplex push-to-talk over cellular (PoC) service provides a cost-efficient, interactive, and global-reach service for group and individual communications. The media types for PoC users can be voice, video, images, and text messages. Presence service is widely used and is often bundled with PoC and instant messaging (IM) to indicate other users' availability and willingness of co...Show More
In order to acquire the normal gait parameters and variation rules, the fuzzy algorithm was introduced for processing experimental data. The effect of the normal subject's height and walking speed on the motion amplitude of the pelvis was chosen as an example, and the experimental study on the gait parameters of 30 males was completed. By analyze the experimental data the fuzzy rule and fuzzy infe...Show More
In this paper, the multi-port connection method is used to evaluate the system of electrically adjustable antenna arrays. The whole system is divided into several subsections, the scattering matrix for the whole network is obtained while the scattering matrix of each subnet are given. Then the currents on each antenna element are calculated based on the scattering matrix. Finally the radiation pat...Show More
A kind of distributed multi-objective optimization algorithm based on multi-agent is proposed in this paper, which is based on the theory of multi-objective optimization. Traditional multi-objective optimization is combined with agent technology in this algorithm. There are objective functions, cooperation algorithm and communication in each agent. Multi-agent system (MAS) is made up of agents. Co...Show More
Active queue management (AQM) with multiple thresholds is an effective mechanism of buffer allocation for differentiated quality-of-service (QoS) of heterogeneous traffic. This paper develops an original analytical model for a finite buffer queueing system with AQM under two heterogeneous classes of traffic which are modeled, respectively, by the non-bursty Poisson process and bursty Markov-modula...Show More
The knowledge of the pelvis kinematics plays an important role in the equilibrium control during walking. The previous research technique on the pelvis locomotion is impractical in some fields such as clinic practice. This paper illustrates a new method based on a treadmill and three precise displacement-sensors. 20 healthy young adults of both sexes are instructed to naturally walk on a treadmill...Show More
This paper investigates the problem of maximizing the system throughput under the constraint of the total transmit power. We propose a suboptimal, computationally efficient, integer-bit and power allocation algorithm based on the optimal solutions. We deduce the optimal solution to transmit power minimization problem and develop a suboptimal algorithm with low complexity based on the theoretical a...Show More
This paper discusses the Cambridge University HTK (CU-HTK) system for the automatic transcription of conversational telephone speech. A detailed discussion of the most important techniques in front-end processing, acoustic modeling and model training, language and pronunciation modeling are presented. These include the use of conversation side based cepstral normalization, vocal tract length norma...Show More
The paper examination result is synthetically examined. At the present it is appraised basically to the same examination based in the computer. This article is stressly inquired based on the assessment method of knowledge Dian. It uses the experience of expert system, and provides students the realization method of the system, which gives consultation opinion of science by way of the blurred infer...Show More
Cobot (collaborative robot) doesn't have any motive power of its own, so it can do direct collaborative work with a human operator in a shared workspace. In this paper a five bar Cobot and its trajectory constraint control strategy are presented. The Cobot uses two new CVTs (continuously variable transmissions) that are connected in parallel mode, which are separately installed on the two base joi...Show More
The performance of handoff initiation algorithm is one of the key issues for providing roaming capability in wireless LAN (WLAN). In this paper, we propose a new handoff initiation algorithm for data transmitting in WLAN. Our proposal combines association time, system load and signal/noise ratio (SNR) together to decide whether mobile node should handoff or not. The goal is to reduce the number of...Show More
The Domain Name System (DNS) is an essential part of the Internet infrastructure and provides fundamental services, such as translating host names into IP addresses for Internet communication. The DNS is vulnerable to a number of potential faults and attacks. In particular, false routing announcements can deny access to the DNS service or redirect DNS queries to a malicious impostor. Due to the hi...Show More