Showing 1 - 20 results of 62 for search '"function construction"', query time: 0.14s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Constructing optimized Boolean functions by CHEN Wei1, YANG Yi-xian1, NIU Xin-xin2

    Published 2006-01-01
    Subjects: “…function construction method…”
    Get full text
    Article
  7. 7
  8. 8

    Keying Merkle-Damgård at the Suffix by Bart Mennink

    Published 2025-03-01
    “…For the Merkle-Damgård hash function construction, the approach to prepend the key to the message is known to be insecure, as it is vulnerable to the length extension attack. …”
    Get full text
    Article
  9. 9

    System architecture, challenges and prospects of 2S-city construction by Chunye MA, Hao CHEN, Jiankun PENG, Shuangzhi YU

    Published 2023-03-01
    “…As the most important application scenario in the process of the transformation of China’s automobile industry to electrification, intelligence, connectivity and sharing, the pilot project of smart city infrastructure and intelligent connected vehicles (2S-city) is still in the transition and demonstration stage, and there is still a distance from commercialization and marketization.Starting from the core problems and strategic significance of 2S-city construction, the roadside infrastructure architecture and platform function construction were described, the positive development process of system engineering that should be followed was introduced, and the future development orientation and suggestions were analyzed.…”
    Get full text
    Article
  10. 10

    Research on high security G function algorithm by Rui CHEN, Zan LI, Jia SHI, Lei GUAN

    Published 2019-06-01
    “…The differential frequency hopping (DFH) overcomes the limitation of frequency hopping and improves the ability to resist tracking interference.The G function determines the DFH sequence and directly affects the performance of DFH communication systems.However,with the complication of wireless communication system such as large capacity DFH network,which poses huge challenges to the use of the number theory based and chaos theory assisted sequence.As a result,in order to improve the security of the system,the novel G function construction was proposed with the aid of hybrid encryption algorithm and the security of hybrid algorithm was analyzed.Moreover,the equivalence principle of G function algorithm and the encryption algorithm was proved.The simulation results show that the DFH sequence generated by the new G function has excellent performance and the performance of the DFH systems is improved greatly.…”
    Get full text
    Article
  11. 11

    Numerical Simulation of Wind Turbine Rotors Autorotation by Using the Modified LS-STAG Immersed Boundary Method by Ilia K. Marchevsky, Valeria V. Puzikova

    Published 2017-01-01
    “…Algorithm of level-set function construction for complex-shaped airfoils, based on Bézier curves usage, is proposed. …”
    Get full text
    Article
  12. 12

    BP Neural Network Fuse with Morphology Edge Detection Method by YUE Xin-hua, DENG Cai-xia, ZHANG Zhao-ru

    Published 2021-10-01
    “…First, a fully smooth Sigmoid function construction method is given, which is used as the excitation function in the BP neural network to detect the edge of the image effectively. …”
    Get full text
    Article
  13. 13

    A construction method for conformal mapping of the unit disk onto a Riemann surface by P.N. Ivanshin

    Published 2018-12-01
    “…An example has been provided to illustrate the applicability of the method to conformal mapping of the unit disk onto a two-sheeted covering of the domain by a Riemann surface. The function construction is based on the approximate solution of the second kind Fredholm integral equation by reducing it to the finite linear equation system, so the construction is easily programmable. …”
    Get full text
    Article
  14. 14

    Modeling Big, Heterogeneous, Non-Gaussian Spatial and Spatio-Temporal Data Using FRK by Matthew Sainsbury-Dale, Andrew Zammit-Mangion, Noel Cressie

    Published 2024-04-01
    “…The existing functionality of FRK is retained with this advance into non-Gaussian models; in particular, it allows for automatic basis-function construction, it can handle both point-referenced and areal data simultaneously, and it can predict process values at any spatial support from these data. …”
    Get full text
    Article
  15. 15

    Low-Rank Representation and Data Compression of Full-Field Displacement Maps for Structural Modal Analysis and Damage Identification by Yankun Li, Yu Huang, Ziguang Li, Zhiping Yin, Shancheng Cao

    Published 2025-05-01
    “…For the purpose of resolving those issues, a complete method is proposed, consisting of (1) an adaptive kernel function construction method for low-rank-representing the full-field displacement maps while retaining both global and local shape features, (2) an enhanced frequency domain decomposition approach for noise-robust mode shape estimation based on the kernel functions, and (3) extracting and fusing local shape features of multiple mode shapes for more accurate damage localization. …”
    Get full text
    Article
  16. 16

    Verification of Programs with Mutual Recursion in the Pifagor Language by Mariya S. Ushakov, Alexander I. Legalov

    Published 2018-08-01
    “…It is proved that in the Pifagor language such transformations of functions as code merging and universal recursive function construction do not change the correctness of the initial program. …”
    Get full text
    Article
  17. 17

    Scene Matching Method for Children’s Psychological Distress Based on Deep Learning Algorithm by Junli Su

    Published 2021-01-01
    “…Based on the summary and analysis of previous research works, this paper expounded the research status and significance of the scene matching method for children’s psychological distress, elaborated the development background, current status, and future challenges of deep learning algorithm, introduced the methods and principles of depth spatiotemporal feature extraction algorithm and dynamic scene understanding algorithm, constructed a scene matching model for children’s psychological distress based on deep learning algorithm, analyzed the scene feature extraction and matching function construction of children’s psychological distress, proposed a scene matching method for children’s psychological distress based on deep learning algorithm, performed scene feature matching and information processing of children’s psychological distress, and finally conduced a simulation experiment and analyzed its results. …”
    Get full text
    Article
  18. 18

    Discussion on the Function and Interface Schemes for Interlocking System of Multi-level Railway Network Junction Station by ZHANG Minhui, WU Ruhan, LIU Huaxiang, SONG Rui

    Published 2024-10-01
    “…Method By comparing the differences between interlocking systems under CBTC and CTCS-2 signal systems, signal control function, construction and operation demands are analyzed in detail, and functional requirements of the junction station interlocking system are clarified. …”
    Get full text
    Article
  19. 19

    Prognostic impact of clinical and genetic factors on delayed elimination of methotrexate in children with acute lymphoblastic leukemia by O. D. Gurieva, M. I. Savelyeva, T. T. Valiev, S. R. Varfolomeeva, M. V. Ilyin

    Published 2025-01-01
    “…To form mathematical prognostic models, we used the method of logistic function construction using binary logistic regression with step-by-step selection of factors and, if necessary, additional construction of ROC-curves with subsequent ROC-analysis. …”
    Get full text
    Article
  20. 20

    Similar Instances Reuse Based Numerical Control Process Decision Method for Prismatic Parts by Changhong XU, Shusheng ZHANG, Jiachen LIANG, Rui HUANG, Rong BIAN

    Published 2025-01-01
    “…Then, the framework of the proposed approach is illustrated, which explains four significant steps: similar subpart instances retrieval, optimal target function construction, PSD establishment, and NC process scheme optimization. …”
    Get full text
    Article