-
14521
FAULT DIAGNOSIS OF RECIPROCATING COMPRESSOR ON THE RESONANCE-BASED SPARSE SIGNAL DECOMPOSITION WITH OPTIMAL Q-FACTOR
Published 2019-01-01“…Reciprocating compressor vibration signal is typical nonlinear and non-stationary,and the vibration information interference coupling, owing to this problem,a fault diagnosis method of reciprocating compressor on the resonance-based sparse signal decomposition with optimal Q-factor was proposed.The method use resonance sparse decomposition to find the low resonance component which its kurtosis is maximum, optimize Q-factor with genetic algorithm and particle swarm optimization to get the optimal Q-factor;then use resonance sparse decomposition to decompose reciprocating compressor vibration signal by the optimal Q-factor;the result shows that this method can diagnose the oversized bearing clearance fault effectively.…”
Get full text
Article -
14522
Measurement of electromagnetic transients in high voltage substations based on wireless transmission technique under strong electromagnetic interference
Published 2025-01-01“…Secondly, a compression algorithm with fault tolerance prevents signal distortion. …”
Get full text
Article -
14523
Retroperitoneal Extrarenal Angiomyolipomas: An Evidence-Based Approach to a Rare Clinical Entity
Published 2012-01-01“…Our case report provides a comprehensive literature review and an evidence-based algorithm for taking care of patients with ERAMLs.…”
Get full text
Article -
14524
Dynamic interference coordination scheme based on the iterative joint transmission in ultra dense network
Published 2020-02-01“…In consideration of the rapidly increasing number of cells and users in the ultra-dense network,how to realize dynamic interference coordination by selecting the appropriate joint transmission users was studied,so as to improve the spectral efficiency of the edge users.All users were classified by dynamic coordination cluster division and dynamic joint-muting transmission.The iterative optimization algorithm was used to further improve the system performance and solve the problem of selecting the number of joint transmission users.The simulation results prove that compared with the conventional CoMP JT scheme,the proposed scheme has significant performance gains in the cell edge spectral efficiency without reducing the cell average spectral efficiency.…”
Get full text
Article -
14525
Fully Discrete Finite Element Approximation for the Stabilized Gauge-Uzawa Method to Solve the Boussinesq Equations
Published 2013-01-01“…The stabilized Gauge-Uzawa method (SGUM), which is a 2nd-order projection type algorithm used to solve Navier-Stokes equations, has been newly constructed in the work of Pyo, 2013. …”
Get full text
Article -
14526
Active stabilization of a chaotic urban system
Published 1997-01-01“…Therefore, the system and its parameters are changed during the control process only. The algorithm is applied to an urban system within a metropolitan area obeying a Lorenz-type dynamics as well as to the Hénon attractor as an example for a discrete scenario.…”
Get full text
Article -
14527
Hybrid TOA/AOA Approximate Maximum Likelihood Mobile Localization
Published 2010-01-01“…This letter deals with a hybrid time-of-arrival/angle-of-arrival (TOA/AOA) approximate maximum likelihood (AML) wireless location algorithm. Thanks to the use of both TOA/AOA measurements, the proposed technique can rely on two base stations (BS) only and achieves better performance compared to the original approximate maximum likelihood (AML) method. …”
Get full text
Article -
14528
Research on extended access control mechanism in online social network
Published 2021-10-01“…Aiming at the problem of inability to extend control over the data published by users in social networks, an extended access mechanism based on privacy labels was proposed.This mechanism granted users and data different types of labels based on the number of user relationship hops and resource forwarding hops, so as to achieve fine-grained extended access control to the data.The generation algorithm and distribution method of privacy labels were proposed.The constraint rules of privacy label were designed and the possible policy conflicts were analyzed.Finally, the test proves that the mechanism achieves fine-grained extended control in social networks, and proves its security and validity of the mechanism.…”
Get full text
Article -
14529
Detection of Fuzzy Association Rules by Fuzzy Transforms
Published 2012-01-01“…In the extraction of the fuzzy association rules we use the AprioriGen algorithm and a confidence index calculated via the inverse fuzzy transform. …”
Get full text
Article -
14530
Distributed fair cooperative routing in multi-gates wireless mesh network
Published 2015-02-01“…Existing cooperative routings cannot fairly allocate the wireless resources,which results in that the throughput of minimum flow cannot satisfy the performance requirement.The multiple flow cooperative routing problem is formulated as a convex optimization problem with the goal of maximizing network utility.Based on dual decomposition and subgradient method,a distributed fair cooperative routing algorithm in multi-gates wireless mesh network-FCRMG is proposed.The simulation results show that,FCRMG can largely improve the throughput of the minimum flow without decreasing the total network throughput,compared with uncooperative routing based on expected transmission time metric and cooperative routing based on contention aware metric.…”
Get full text
Article -
14531
Cookie based online tracing method for cyberlockers resource
Published 2016-12-01“…Meanwhile, through cumula-tive hash algorithm, it can speed up the validation of tracing results. …”
Get full text
Article -
14532
Analysis and improvement of an identity-based signature scheme from lattices
Published 2015-05-01“…Liu et al proposed an identity-based signature from lattices in 2013,and proved that it can achieve strong un-forgeability in the standard model.Through analysis,the security proof of this scheme has some defect,and then show that the scheme cannot prove the strong unforgeability under selective identity and adaptive chosen-message attacks.Then,using Boyen signing technique (PKC 2010) inpoves the signing algorithm,and proves the strong unforgeability under selective identity and adaptive chosen-message attacks (SU-sID-CMA) in the standard model.In addition,it com-pares the efficiency and security of the scheme and the other identity-based signatures from lattices.…”
Get full text
Article -
14533
An Entropy Based Anomaly Traffic Detection Approach in SDN
Published 2015-09-01“…The attacks can be detected based on the entropy variation of the identifier and locate the type of attack with the classification algorithm. As the anomaly patterns were detected, the security center would cooperate with the central controller to install the flow table to alleviate the influence of the attack. …”
Get full text
Article -
14534
Alert processing based on attack graph and multi-source analyzing
Published 2015-09-01“…Current attack graph-based alert correlation cannot deal with graph relation between alerts properly,and a large number of redundant attack paths may arise when trying to find out missing alerts and predict future attacks.A multi-source alert analyzing method was proposed,fully utilizing graph relation and threshold to correlate mapped alerts and eventually reduce false positive rate as well as true negative rate.To improve the speed of the algorithm,a parallel alert processing system (AG-PAP) was proposed.AG-PAP is tested on distributed environment which gets satisfied effec-tiveness and performance.…”
Get full text
Article -
14535
A New Technique for Solving Neutral Delay Differential Equations Based on Euler Wavelets
Published 2022-01-01“…Based on the operational matrix, the neutral delay differential equations are reduced to a system of algebraic equations, which is solved through a numerical algorithm. The effectiveness and efficiency of the technique have been illustrated by several examples of neutral delay differential equations. …”
Get full text
Article -
14536
Channel impulse response insensitive feature for non-coherent signal detection in molecular communication
Published 2020-09-01“…To solve the inter-symbol interference (ISI) and background noise challenges of molecular communication via diffusion (MCvD),four ISI-resistant signal-features were deployed,and a reliable non-coherent signal detection algorithm,which was insensitive to different types of molecular channel impulse response (CIR),was proposed.Also,an adaptive decision threshold and theoretical bound of bit error rate (BER) were deduced.Simulation results demonstrate a lower BER of the proposed non-coherent scheme compared to the state-of-the-art schemes in the same order of computational complexity,therefore suggesting its potential applications for future nano-scale MC.…”
Get full text
Article -
14537
Analysis and Optimization on Workspace of 2-PrRS-PR(P)S Parallel Metamorphic Mechanism
Published 2020-03-01“…Aiming at the maximized workspace volume,the optimized structural parameters is obtained by Genetic Algorithm and single variable analysis.…”
Get full text
Article -
14538
Next generation network resource allocation method based on cooperative game and decision-making in advance
Published 2009-01-01“…It’s an important way to guarantee QoS for the next generation network(NGN) with diverse services by allo-cating resources reasonably and optimizing the efficiency of whole network according to diverse service styles.A net-work resource allocating method based on co-operative game theory for NGN was proposed and analyzed,and it had a weakness which brought about overgreat system costing.In order to overcome this weakness,an idea about deci-sion-making in advance was added,and an improved resource allocation algorithm was proposed,which could guarantee the efficiency of whole network best and reduce the system costing.Simulation results of this method show its validity.…”
Get full text
Article -
14539
Determination of symmetry plane on human brain CT images
Published 2023-11-01“… A method of automatic detection of human brain symmetry plain in computed tomography (CT) images is described. An algorithm consists of four steps: region of interest, symmetry curve detection, symmetry axis evaluation and calculation of symmetry plane. …”
Get full text
Article -
14540
Optimization and Performance Analysis of Rail-Train Coupling System with Inerters
Published 2021-01-01“…Optimizations for only inertance and all suspension parameters are carried out by the particle swarm algorithm (PSO). Performance benefits for both the train and the rail system are demonstrated and suspension layouts with inerters connected in parallel and series are compared with the traditional one in both time domain and frequency domain.…”
Get full text
Article