-
14021
A Broad Range Triboelectric Stiffness Sensor for Variable Inclusions Recognition
Published 2023-10-01“…Highlights We propose a broad range triboelectric sensor system employing elastic sponge and shielding layers, which can realize fast stiffness recognition within 1.0 s at a low cost. A novel algorithm is proposed for rapid stiffness identification by extracting signal characteristics, effectively reducing demand of computing resources. …”
Get full text
Article -
14022
JPEG steganalysis based on Tri-training semi-supervised learning
Published 2008-01-01“…A JPEG steganalytic method based on semi-supervised learning algorithm was presented.Using three catego-ries of statistical features for JPEG images and multiple hyperspheres one-class SVM,three classifiers were generated from the original labeled example set.These classifiers were then refined using unlabeled examples in the Tri-training process,which could effectively improve detecting ability by exploiting a large amount of unlabeled images.Experimen-tal results showed the effectiveness of our proposed method.…”
Get full text
Article -
14023
Structure Properties of Koch Networks Based on Networks Dynamical Systems
Published 2017-01-01“…We introduce an informative labeling algorithm for the vertices of a family of Koch networks. …”
Get full text
Article -
14024
On the Regularized Solutions of Optimal Control Problem in a Hyperbolic System
Published 2012-01-01“…We prove the existence and the uniqueness of the optimal solution and establish the optimality condition. An iterative algorithm is constructed to compute the required optimal control as limit of a suitable subsequence of controls. …”
Get full text
Article -
14025
Recovery of image blocks using the method of edge orientation projections
Published 2008-01-01“…The missing block was classified through edge orientation information of the surrounding neighborhood, and was recovered using POCS algorithm by combining frequency and spatial domain information according the class. …”
Get full text
Article -
14026
Evaluating a double integral using Euler's method and Richardson extrapolation
Published 2024-12-01“…For an example we consider, we achieve accuracy close to machine precision (~10-13). We find that the algorithm is capable of determining the error curve for an arbitrary cubature formula, and we use this feature to determine the error curve for a Simpson cubature rule. …”
Get full text
Article -
14027
Iterative Schemes for Fixed Point Computation of Nonexpansive Mappings
Published 2012-01-01“…We introduce an iterative algorithm and prove that suggested scheme converges strongly to the common fixed points of an infinite family of nonexpansive mappings under some mild conditions. …”
Get full text
Article -
14028
A leaky integrate-and-fire model with adaptation for the generation of a spike train
Published 2015-12-01“…We assume that adaptation is mainly due to a calcium-activated potassium current, and we consider two coupled stochastic differential equations for which an analytical approach combined with simulation techniques and numerical methods allow to obtain both qualitative and quantitative results about asymptotic mean firing rate, mean calcium concentration and the firing probability density. A related algorithm, based on the Hazard Rate Method, is also devised and described.…”
Get full text
Article -
14029
Analysis on the DOA estimation of uniform circular arrays based on compressive sensing
Published 2015-02-01“…In order to alleviate the serious problem of the low angle resolution after miniaturizing the antenna array of the surface wave radar,the compressed sensing method is proposed for radar antenna array angle estimation method.The sparse signals model is established,the application conditions are analyzed,and the measurement matrix is designed based on the real-time sea state information.By using the matching algorithm,the signal reconstruction is carried on.Simulation results show that if it satisfies the reconstruction condition,the azimuth resolution is improved by the method in the cost of the calculating resources.…”
Get full text
Article -
14030
Study on the Workspace and Kinematics of 3-UPU Parallel Mechanism
Published 2016-01-01“…According to the structural characteristic of 3- UPU parallel mechanism,by using a new numerical algorithm,the kinematics inverse solution of the mechanism is obtained. …”
Get full text
Article -
14031
Automatic level control system for telephone communication channels of radio-transmitting devices
Published 2019-06-01“…The presented automatic level control system provides a quick recovery of the output level without significant surge. А compression algorithm based on the Hamming window function is used to correct the spectral mask of the signal and increase the mean-square average power of the radio-transmission path. …”
Get full text
Article -
14032
Joint Power and Multiple Access Control for Wireless Mesh Network with Rose Projection Method
Published 2014-01-01“…A cross-layer joint power and multiple access control algorithm are proposed. Rosen projection matrix is combined with Solodov projection techniques to build a three-memory gradient Rosen projection method, which is applied to solve this optimization problem. …”
Get full text
Article -
14033
Distributed Optimization of Multiagent Systems in Directed Networks with Time-Varying Delay
Published 2017-01-01“…A continuous-time distributed optimization algorithm is proposed. Different from most ways of solving distributed optimization problem, the Lyapunov-Razumikhin theorem is applied to the convergence analysis instead of the Lyapunov-Krasovskii functionals with LMI conditions. …”
Get full text
Article -
14034
POSITIVE, NEGATIVE RULE AND APPLICATION
Published 2018-09-01“…In this paper, we introduce the concepts of extended negative rule, minimal rule and their properties. Then, an algorithm to generate all minimal positive and minimal negative rules is introduced. …”
Get full text
Article -
14035
Research on the data link layer secure protocol of TES network based on ECC
Published 2009-01-01“…A workable and efficient data link layer security protocol had been proposed on the need of safety information transfer requirements of the TES system.The protocol provides a software registration solution for the remote sites and a information encryption method base on the elliptic curves cryptography(ECC) algorithm as well as a combined key allocation method.The protocol takes the characters of the TES system into account,improves its ability to identify remote sites,and provides ways to prevent information stealing and network attacks.…”
Get full text
Article -
14036
Error Modeling, Calibration, and Nonlinear Interpolation Compensation Method of Ring Laser Gyroscope Inertial Navigation System
Published 2013-01-01“…According to the actual working environment, the temperature errors of RLG SINS are compensated by a nonlinear interpolation compensation algorithm. The experimental results show that the inertial navigation errors of the proposed method are reduced.…”
Get full text
Article -
14037
Preventing man-in-the-middle attacks in DNS through certificate less signature
Published 2021-12-01“…Aiming at resisting the man-in-the-middle attacks in the domain name system protocol, a lightweight solution was proposed.The scheme introduced certificate less signature algorithm, removed the difficult-to-deploy trust chain to improve the efficiency and security of authentication.By using symmetric encryption technology, the proposed solution ensured the confidentiality of the message and increase the attack difficulty.The theoretical analysis proved the proposed scheme can resist common man-in-the-middle attacks.Experimental comparison results show the scheme has better performance than similar schemes.…”
Get full text
Article -
14038
Pseudoinverse formulation of Rayleigh-Schrödinger perturbation theory for the symmetric matrix eigenvalue problem
Published 2003-01-01“…In addition to providing a concise matrix-theoretic formulation of this procedure, it also provides for the explicit determination of that stage of the algorithm where each higher-order eigenvector correction becomes fully determined. …”
Get full text
Article -
14039
Failure Probability Modeling of Miniature DC Motors and Its Application in Fault Diagnosis
Published 2021-01-01“…The fault diagnosis algorithm is synthesized to obtain the threshold ranges of fault multiple features according to different confidence levels. …”
Get full text
Article -
14040
Modelling of fracture processes in laminate composite plates with embedded delamination
Published 2017-01-01“…A comparative analysis of the applicability of fracture criteria to modeling of samples with delamination were performed, including implementation of element deletion algorithm. The numerical results obtained with the studied methods were compared.…”
Get full text
Article