-
13901
The Multistage Homotopy Perturbation Method for Solving Chaotic and Hyperchaotic Lü System
Published 2015-01-01“…MHPM is a technique adapted from the standard homotopy-perturbation method (HPM) where the HPM is treated as an algorithm in a sequence of time intervals. To ensure the precision of the technique applied in this work, the results are compared with a fourth-order Runge-Kutta method and the standard HPM. …”
Get full text
Article -
13902
Structure Optimization and Test of the Tapered Roller Bearing based on the Decrease of Friction Torque
Published 2015-01-01“…With the target of reducing the friction torque of tapered roller bearing,the globally optimal solution of bearing inner structural parameters is obtained by using the genetic algorithm.The friction torque,gearbox transmission efficiency,and vehicle fuel consumption and sliding distance are tested before and after the bearings are optimized.The results show that,the bearing friction torque is reduced,the gearbox transmission efficiency is increased,and the vehicle fuel consumption is slightly decreased while the vehicle sliding distance is highly improved.…”
Get full text
Article -
13903
Novel blind recognition method for self-synchronized scrambler
Published 2013-01-01“…In non-cooperative communication systems,an adversary has to blindly estimate the coding parameters of scrambler from intercepted sequence.On the condition biased information source,a new method was proposed which can blindly recover the generating polynomial of self-synchronized scrambler.This method was based on the corrected squared Euclidean distance which was used to measure the distance between the actual stat ical probability and the uniform distribution.The simulation results verify the theory analysis and the validity of the algorithm.…”
Get full text
Article -
13904
Safe hierarchical virtual network mapping method based on clustering
Published 2021-09-01“…Based on the 5G network environment, a security hierarchical virtual network mapping method based on K-means clustering was proposed.In particular, the idea of node security classification and the combination of K-menas clustering algorithm was involved to solve the key problems of low security and low mapping efficiency existing in current virtual network mapping.Compared with traditional methods, this research method improves the efficiency of virtual node mapping and enhances the network resilience.…”
Get full text
Article -
13905
A Discrete Method Based on the CE-SE Formulation for the Fractional Advection-Dispersion Equation
Published 2015-01-01“…We obtain a numerical algorithm by using the space-time conservation element and solution element (CE-SE) method for the fractional advection-dispersion equation. …”
Get full text
Article -
13906
Trusted network connect control based on terminal behavior
Published 2009-01-01“…Under the framework of TNC,a new method was proposed to calculate the "healthy status" of a terminal based on analyzing the real-time characteristics of its behavior and process activity.Compared with the existing method,which based on static characteristics,the strategy could get a better performance,especially,on identifying and isolating the terminals with potential risk.The experimental result also shows that the proposed algorithm has the capability of finding and isolating terminals which are infected by malicious codes.…”
Get full text
Article -
13907
Decrease in errors at solution of problems of heat conductivity by finite element method
Published 2018-09-01“…Comparison with the analytical decision is made. The algorithm of the choice of a step in the automatic mode is offered. …”
Get full text
Article -
13908
Synthesis of Multicriteria Controller by Means of Fuzzy Logic Approach
Published 2014-01-01“…To find optimal values of membership function’s parameters, genetic algorithm is used. To take into account values of both output and intermediate parameters of the system, a penalty function is considered. …”
Get full text
Article -
13909
CLOSED-LOOP CONTROL OF OXYGEN-CONVERTER MELTING
Published 2013-09-01“…The model takes into account the kinetics of the process of removing carbon from the melt in the foreign – and intradiffusion limiting process of decarburization. The algorithm of the model is implemented in an automated process control system of converter smelting. …”
Get full text
Article -
13910
The contemporary echocardiography approach to diagnosis of pulmonary hypertension and non-invasive estimation of pulmonary artery pressure
Published 2018-06-01“…The review presents the contemporary possibilities of echocardiography in the diagnosis of pulmonary hypertension. The algorithm used to determine probability of the pulmonary hypertension by means of echocardiography based on 2015 ESC guidelines is presented. …”
Get full text
Article -
13911
Features of the Calculated Determination of the Thermal State of the Turbo Generator Brush-Contact Device
Published 2024-12-01“…The author provides an algorithm for analytical calculation of the device, determines the expected temperatures of the elements provided that additional filters are installed in the ventilation duct. …”
Article -
13912
Forward/Backward Decomposition for Dispersive Wave Propagation Measurements
Published 2025-01-01“…The theory is presented, along with algorithmic implementation and experimental validation on a Timoshenko beam. …”
Get full text
Article -
13913
Research on Application of Regression Least Squares Support Vector Machine on Performance Prediction of Hydraulic Excavator
Published 2014-01-01“…First, the mathematical model of the regression least squares support vector machine is studied, and then the algorithm of the regression least squares support vector machine is designed. …”
Get full text
Article -
13914
A Polarity Reversion Elimination Method for LTE-Advanced Frequency Offset Estimation
Published 2015-08-01“…Traditional fractional frequency offset(FFO)estimation algorithm pay less attention to FFO polarity estimation.Noise and channel fading induced FFO estimation polarity reversion degrades the frequency synchronization performance inevitably.An efficient FFO polarity detection method was proposed in LTE-Advanced system to solve the problem,which utilized the mirror symmetry property of time-domain primary synchronization signal(PSS).Numerical results show that the proposed method can depress FFO polarity reversion efficiently.…”
Get full text
Article -
13915
Application of invariant moment method for HAPS ISAR imaging with micro parts
Published 2013-08-01“…To resolve the micromotion in the HAPS(high altitude platform station) ISAR system,the invariant moment method for ISAR imaging with micro parts was proposed.Firstly,invariant moment tool was applied to classify the echoes of different sub-aperture,and then the sub-aperture echoes reducing the quality of image was separated.Finally the remaining echoes were used to do sub-aperture splicing imaging.From the simulation results,the algorithm is proved to be simple and can improve the quality of ISAR image obviously.…”
Get full text
Article -
13916
Research on Lung Nodule Detection Based on Improved Target Detection Network
Published 2020-01-01“…The experimental results prove that proposed algorithm is extremely effective.…”
Get full text
Article -
13917
Wu’s Characteristic Set Method for SystemVerilog Assertions Verification
Published 2013-01-01“…We define a suitable subset of SVAs so that an efficient polynomial modeling mechanism for both circuit descriptions and assertions can be applied. We present an algorithm framework based on the algebraic representations using characteristic set of polynomial system. …”
Get full text
Article -
13918
Comment on ‘Targeted Ciphers for Format‐Preserving Encryption’ from Selected Areas in Cryptography 2018
Published 2021-09-01“…The second scheme was designed with an algorithm called Mix–Swap–Unmix that is shown to be equivalent to a particular matching exchange process under a specific setting. …”
Get full text
Article -
13919
Optimization for Due-Window Assignment Scheduling with Position-Dependent Weights
Published 2020-01-01“…Optimal properties of the problem are given, and then, a polynomial-time algorithm is provided to solve the problem. An extension to the problem is offered by assuming general position-dependent processing time.…”
Get full text
Article -
13920
Simple power analysis attack on random pseudo operations
Published 2012-05-01“…Random pseudo-operations on elliptic curve scalar multiplication algorithm,less secure than it claimed by simple power analysis (SPA)attacks.Even in the single curve SPA,it leaks lots of useful key information.Multiple curve recursive approximation attack(MCRAA),a new multiple curve SPA attack,was proposed to get all of the key information with a small curve set.When the length of the key is n,the size of the set is O(lbn) which was confirmed by experiment.…”
Get full text
Article