Suggested Topics within your search.
Suggested Topics within your search.
-
15021
Vessel Trajectory Data Mining: A Review
Published 2025-01-01“…The article collects and evaluates state-of-the-art algorithmic approaches and key techniques pertinent to various use case scenarios within this domain. …”
Get full text
Article -
15022
Improving the efficiency of adsorption filters with a short diffuser by improving their flow part
Published 2024-12-01“…The numerical studies cover various options for backfilling the adsorbent, including layer profiling and the use of adsorbent with different porosity, which allows us to assess the impact of these factors on the aerodynamic resistance and overall efficiency of the filter. A design algorithm is also proposed that ensures optimal compliance between the adsorbent layer thickness and the local flow velocity, which helps to increase the protective action time of the filter and improve the quality of cleaning.…”
Get full text
Article -
15023
Robust Control of Wind Turbines by Using Singular Perturbation Method and Linear Parameter Varying Model
Published 2016-01-01“…Then stability and robust properties of the open-loop linear singularly perturbed system are analyzed using linear matrix inequalities (LMIs). An algorithm of designing a stabilizing state-feedback controller is proposed which can guarantee the robust property of the closed-loop system. …”
Get full text
Article -
15024
Precision Measurement of Spiral Bevel Gear based on Laser Displacement Sensor
Published 2021-05-01“…Based on the analysis of the characteristics of the existing bevel gear measurement technology, a non-contact measurement method of the bevel gear is proposed based on the laser displacement sensor and the algorithm of the tooth distance deviation, the tooth phase deviation and the tooth ring pulsation deviation of the Gleason system spiral bevel gear. …”
Get full text
Article -
15025
3D Large-Pose Face Alignment Method Based on the Truncated Alexnet Cascade Network
Published 2020-01-01“…Compared with 3DDFA, which is a current popular algorithm, the accuracy is improved by 0.60% and 0.15%, respectively.…”
Get full text
Article -
15026
Quantitative method for network security situation based on attack prediction
Published 2017-10-01“…To predict the attack behaviors accurately and comprehensively as well as to quantify the threat of attack,a quantitative method for network security situation based on attack prediction was proposed.By fusing the situation factors of attacker,defender and network environment,the capability of attacker and the exploitability rate of vulnerability were evaluated utilizing the real-time detected attack events,and the expected time-cost for attack-defense were further calculated.Then an attack prediction algorithm based on the dynamic Bayesian attack graph was designed to infer the follow-up attack actions.At last,the attack threat was quantified as the security risk situation from two levels of the hosts and the overall network.Experimental analysis indicates that the proposed method is suitable for the real adversarial network environment,and is able to predict the occurrence time of attack accurately and quantify the attack threat reasonably.…”
Get full text
Article -
15027
Structural Analysis of Huaguangtan Arch Dam Based on Data Assimilation Parametric Inversion
Published 2023-01-01“…Aiming at the difficulty of the accurate safety assessment of the overall structural state of Huaguangtan Arch Dam,a finite element model of the arch dam is established,and the data assimilation algorithm is used to invert the material parameters based on the results of the sensitivity analysis of the mechanical parameters of the arch dam concrete and bedrock.Finally,the material parameters of finite element calculation are calibrated by parameter inversion results.The results show that the residual between the finite element displacement simulation result and the monitoring data conforms to the Gaussian distribution,and its standard deviation after data assimilation parametric inversion is reduced by 81.2%,which improves the accuracy of finite element calculation.This method enables automated operation and provides a reasonable and reliable new idea for the structural safety assessment of arch dams.…”
Get full text
Article -
15028
Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain
Published 2022-08-01“…To solve the security hazards of identity information and transaction data and the time-consuming problem of traditional single-level encryption methods in the current application scenarios of consortium blockchain, a privacy protection scheme of consortium blockchain based on fair blind signature and hierarchical encryption was proposed.Considering the strong centrality and poor security of the existing fair blind signature scheme, it was redesigned with zero-knowledge proof technology to be applicable for consortium blockchain application scenario.Based on the Paillier homomorphic encryption algorithm, a supervisable hierarchical encryption method was designed, and the method realized the supervision of encrypted transaction data information and reduced the time cost of the encryption and decryption process.The security analysis and simulation results show that the proposed scheme can effectively resist malicious attacks such as tampering and eavesdropping and significantly improve the encryption efficiency.…”
Get full text
Article -
15029
Low pilot overhead parametric channel estimation scheme for RIS-assisted mmWave MIMO systems
Published 2024-09-01“…Then, a non-iterative channel estimation algorithm was derived using tensor canonical polyadic decomposition with Vandermonde structure constraints. …”
Get full text
Article -
15030
Practically effective adjustment variable selection in causal inference
Published 2025-01-01“…Therefore, we propose criteria for selecting variables from a list of candidate adjustment variables along with an algorithm to prevent accuracy degradation in causal effect estimation. …”
Get full text
Article -
15031
RESEARCH ON SPEED AND PRESSURE CONTROL STRATEGY OF STABLE SWITCH ABOUT FOREPOLING EQUIPMENT
Published 2017-01-01“…Taking into account the operational principle of forepoling equipment,and as the target to improving support efficiency and reducing the disturbance on the roof in the process of supporting,a kind of speed and pressure composition control method was presented.The control method adopts the constant pump driven directly by servo motor to replace the traditional electro-hydraulic proportional valve,and the variable structure algorithm based on the fuzzy sliding mode was used as control strategy.Theoretical analysis and experimental results show that,compared with the traditional speed and pressure control method,the control method presented in the paper can reduce concussion on the roof in the process of switching from speed control to pressure control,and can improve support efficiency.Research findings can provide a theoretical basis for the development and control strategy of forepoling equipment.…”
Get full text
Article -
15032
PROBLEMS OF STRATEGIC MANAGEMENT OF BUSINESS PROCESSES IN THE CONTEXT OF INTEGRATED DIGITALIZATION OF HIGH-TECH INDUSTRIES
Published 2020-09-01“…The novelty and scientific value of the work lies in the fact that the result of the study was a reasonable author’s approach to studying the specifics of the digital economy in Russian industry, as well as the development of an algorithm for identifying and solving existing problems of digitalization, taking into account the peculiarities of high-tech industries.…”
Get full text
Article -
15033
Design optimization of inner and outer‐rotor PMSGs for X‐ROTOR wind turbines
Published 2024-10-01“…The GA optimization algorithm was used to find optimized designs in terms of efficiency, weight, cost, and temperature rise. …”
Get full text
Article -
15034
A Decision-Making Model Using Machine Learning for Improving Dispatching Efficiency in Chengdu Shuangliu Airport
Published 2020-01-01“…The mathematical methods such as function equation, BP neural network algorithm, and queuing theory were used to establish a complete decision-making model for taxi drivers and an optimization model of dispatching efficiency at the airport. …”
Get full text
Article -
15035
A QoS Aware Resource Allocation Strategy for 3D A/V Streaming in OFDMA Based Wireless Systems
Published 2014-01-01“…It is formulated as an optimization problem and is solved using a suboptimal heuristic algorithm. Numerical results show that the proposed scheme provides a better quality of service compared to conventional schemes.…”
Get full text
Article -
15036
A computationally efficient non‐iterative four‐parameter sine fitting method
Published 2021-10-01“…Finally, measurements and computer simulations are carried out to demonstrate the reduced computational demand, while preserving the accuracy compared with the algorithm proposed in the IEEE standard.…”
Get full text
Article -
15037
Influence of Concrete Creep on the Bending of a Prestressed Bridge Beam
Published 2023-07-01“…Therefore, the problem of developing a finite-element algorithm and corresponding software allowing the modelling of the volumetric stress-strain state of large-span prestressed reinforced concrete structures within the framework of the theory of hereditary aging is relevant.…”
Get full text
Article -
15038
New Application’s Approach to Unified Power Quality Conditioners for Mitigation of Surge Voltages
Published 2016-01-01“…Also a new compensation algorithm is proposed through the application of the theory of generalized reactive power; this is then compared with the theory of active and reactive instantaneous power, or pq theory. …”
Get full text
Article -
15039
Utilizing Artificial Neural Network for Load Prediction Caused by Fluid Sloshing in Tanks
Published 2021-01-01“…The backpropagation of the error algorithm was then used to apply the two multilayer feed-forward neural networks and the recurrent neural network. …”
Get full text
Article -
15040
A Hop Count Based Heuristic Routing Protocol for Mobile Delay Tolerant Networks
Published 2014-01-01“…Finally, the performance of our proposed algorithm is evaluated by the simulation results, which show the advantage of such self-adaptive routing protocol in the diverse circumstance of DTNs.…”
Get full text
Article