Suggested Topics within your search.
Suggested Topics within your search.
- Digital techniques 2
- Photography 2
- Anatomy 1
- Anesthesia 1
- Computer graphics 1
- Critical Care 1
- Digitale Photographie 1
- Economic conditions 1
- Economic development 1
- Economic forecasting 1
- Economic stabilization 1
- General 1
- Image processing 1
- Mathematical Concepts 1
- PHOTOGRAPHY 1
- Phototechnik 1
- Physical Phenomena 1
- Physiology 1
- Regression analysis 1
- Social sciences 1
- Statistical methods 1
- Techniques 1
-
1661
After COVID-19: Rethinking Fiscal Rules in Europe
Published 2020-10-01“…The recent outlook highlights the problem of pro-cyclical revisions of potential output and output gap estimates. Some economists warn that the current fiscal framework may lead to pro-cyclical and thus destabilising fiscal policies, a problem encountered in Southern Europe during the European sovereign debt crisis that has implications for the entire European Union. …”
Get full text
Article -
1662
Creating vector profile graph in ArcGIS Pro based on hiking trail tracking with AllTrails app
Published 2024-12-01“…The model was created in an Excel table, based on the AllTrails output Excel data, and implemented in ArcGIS Pro. …”
Get full text
Article -
1663
A Hybrid Energy Storage System Strategy for Smoothing Photovoltaic Power Fluctuation Based on Improved HHO-VMD
Published 2023-01-01“…To solve the problems of large fluctuation of photovoltaic output power affecting the safe operation of the power grid, a hybrid energy storage capacity configuration strategy based on the improved Harris hawks optimization algorithm optimizing variational mode decomposition (IHHO-VMD) is proposed. …”
Get full text
Article -
1664
Effects of Interaction between Dual Shaking Tables and Specimen and Force Feedback Compensation Control
Published 2018-01-01“…In order to improve the output accuracy of the dual shaking tables, force feedback compensation was introduced into three-variable control to reduce the interaction effects. …”
Get full text
Article -
1665
Survey of artificial intelligence data security and privacy protection
Published 2021-02-01“…Artificial intelligence and deep learning algorithms are developing rapidly.These emerging techniques have been widely used in audio and video recognition, natural language processing and other fields.However, in recent years, researchers have found that there are many security risks in the current mainstream artificial intelligence model, and these problems will limit the development of AI.Therefore, the data security and privacy protection was studied in AI.For data and privacy leakage, the model output based and model update based problem of data leakage were studied.In the model output based problem of data leakage, the principles and research status of model extraction attack, model inversion attack and membership inference attack were discussed.In the model update based problem of data leakage, how attackers steal private data in the process of distributed training was discussed.For data and privacy protection, three kinds of defense methods, namely model structure defense, information confusion defense and query control defense were studied.In summarize, the theoretical foundations, classic algorithms of data inference attack techniques were introduced.A few research efforts on the defense techniques were described in order to provoke further research efforts in this critical area.…”
Get full text
Article -
1666
Research on Attitude Measurement Method of Special Aircraft Using Geomagnetic Sensor/Gyroscope Based on UKF
Published 2021-01-01“…Based on the output information of the three-axis geomagnetic sensor and three-axis gyroscope, a mathematical model for measuring the flight attitude information of special aircraft is established, and the flight attitude of the special aircraft is calculated in real time. …”
Get full text
Article -
1667
Hammerstein system with a stochastic input of arbitrary/unknown autocorrelation: Identification of the dynamic linear subsystem
Published 2021-07-01“…This proposed estimator needs observations only of the Hammerstein system's overall input and consequential output, but not any observation of any intrasubsystem signal. …”
Get full text
Article -
1668
The Energy Efficiency and the Main Influencing Factors for the Logistics Industry in the Yangtze River Economic Belt in China
Published 2021-01-01“…The input-oriented SBM-DEA model is employed to identify factors such as energy input, undesirable output, and service capacity output as well as the logistics energy efficiency of Yangtze River Economic Belt. …”
Get full text
Article -
1669
Uncertainty Quantification for the Transient Response of Human Equivalent Antenna Using the Stochastic Collocation Approach
Published 2019-01-01“…The uncertainty is propagated to the output transient current by means of the stochastic collocation method. …”
Get full text
Article -
1670
Model Predictive Voltage Control with Optimal Duty Cycle for Three-Phase Grid-Connected Inverter
Published 2019-01-01“…This paper proposes a model predictive voltage control (MPVC) strategy with duty cycle control for grid-connected three-phase inverters with output LCL filter. The model of the system is used to predict the capacitor filter voltage according to the future output current for each possible switching state at each sampling period. …”
Get full text
Article -
1671
Zero power light labeling based on visible light communication
Published 2023-05-01“…In order to achieve zero energy consumption of visible light labels, MATLAB and MULTISIM were used to simulate the impedance matching of the receiver, matching the input impedance of the first-order equalization circuit with the internal resistance of solar panel, while expanding the system bandwidth and ensuring the highest output power of the solar panel.The simulation results show that the output power of the solar panel is increased by 86.2% when the input impedance of the equalization circuit matches solar panel, compared to the common 50 Ω.The prototype system of zero-energy optical label of visible light was built.A 15 W LED lamp was used to send characters at 115 200 Baud, and a cadmium telluride solar panel was used to collect energy and receive signals at a distance of 1.3 m.Low-power microcontroller was used to recover data through ADC and computation, and OLED screens were used to display the received label characters.The signal reception, processing computing, and screen display energy of the receiver were all provided by solar panel, without the need for batteries or external power supply.The visible light label display service with zero energy consumption has been implemented.…”
Get full text
Article -
1672
An ANFIS Approach for Real Power Transfer Allocation
Published 2011-01-01“…The 25-bus equivalent system of south Malaysia is utilized as a test system to illustrate the effectiveness of the ANFIS output compared to that of the MNE method. The ANFIS output provides promising results in terms of accuracy and computation time. …”
Get full text
Article -
1673
Robust Optimal Sliding-Mode Tracking Control for a Class of Uncertain Nonlinear MIMO Systems
Published 2013-01-01“…The nonlinear MIMO system is transformed into a linear one by the input-output linearization technique, and at the same time the input-output decoupling is realized. …”
Get full text
Article -
1674
Analysis and Optimization on Transmission Accuracy of Shoulder Joint Reducer for an Upper Limb Rehabilitation Robot
Published 2024-07-01“…Based on the analytical model of shoulder joint transmission accuracy, the output torque fluctuation caused by transmission error is analyzed and particle swarm optimization algorithm is adopted to optimize transmission accuracy under the condition of constant machining accuracy, so as to improve the output torque fluctuation caused by transmission error of the shoulder joint of the upper limb rehabilitation robot to avoid the secondary injury of the patients.…”
Get full text
Article -
1675
Network threat situation assessment based on unsupervised multi-source data feature analysis
Published 2020-02-01“…Aiming at the limitations of supervised neural network in the network threat testing task relying on data category tagging,a network threat situation evaluation method based on unsupervised multi-source data feature analysis was proposed.Firstly,a variant auto encoder-generative adversarial network (V-G) for security threat assessment was designed.The training data set containing only normal network traffic was input to the network collection layer of V-G to perform the model training,and the reconstruction error of the network output of each layer was calculated.Then,the reconstruction error learning was performed by the three-layer variation automatic encoder of the output layer,and the training abnormal threshold was obtained.The packet threat was tested by using the test data set containing the abnormal network traffic,and the probability of occurrence of the threat of each group of tests was counted.Finally,the severity of the network security threat was determined according to the probability of threat occurrence,and the threat situation value was calculated according to the threat impact to obtain the network threat situation.The simulation results show that the proposed method has strong characterization ability for network threats,and can effectively and intuitively evaluate the overall situation of network threat.…”
Get full text
Article -
1676
Photon transport in bimodal atom-cavity systems with waveguide coupling: Application to deterministic photon subtraction
Published 2025-01-01“…Here, we employ the input-output formalism to perform a single-photon transport analysis within a photon subtractor consisting of a three-level quantum emitter coupled to a bimodal cavity-waveguide system. …”
Get full text
Article -
1677
Designing Research on Variable Ratio for Recirculating Ball Steering Gears with Eccentric Gear Sector
Published 2023-02-01“…Because of the eccentricity of the gear sector, the output ratio curve of steering gears will be affected, especially the variable ratio curve, and variation will occur. …”
Get full text
Article -
1678
Design and Simulation of a Combined Displacement Amplification Mechanism
Published 2020-11-01“…Bridge-type displacement amplifier is usually used to amplify the output displacement of the piezoelectric ceramic actuator in a micro-displacement positioning system which driven by a piezoelectric ceramic actuator. …”
Get full text
Article -
1679
MONOLITHIC PURE CENTER PIEZOELECTRIC ROTARY PLATFORM WITHOUT ACTUATOR REDUNDANCY
Published 2024-08-01“…In order to achieve high⁃precision and pure⁃center rotation motion in micro/nanomanipulation tasks,a monolithic pure⁃center rotation platform was designed using two⁃stage compliant amplification mechanisms and a single piezoelectric actuator.Compared with other platforms,the designed rotation platform exhibited the merits of no actuator redundancy,high natural frequency,large rotation angle,and compact structure.The static and dynamic models were established by combining the pseudo⁃rigid body and finite element methods.Also,the output angle,input stiffness,output stiffness,and natural frequency of the rotation platform were simulated by Ansys software.Finally,an experimental test system was built,and the performance of the platform was tested through several experiments.Also,the feedforward control was used to compensate for the piezoelectric hysteresis.The experimental results show that the rotation angle is 16.8 mrad,the natural frequency is 527.3 Hz,and the resolution is 0.3μrad.Meanwhile,the hysteresis nonlinearity is compensated effectively using feedforward control.Thus,the platform is capable the high precision center rotation operation.…”
Get full text
Article -
1680
Method for generating pseudo random numbers based on cellular neural network
Published 2016-10-01“…To overcome the degradation characteristics of chaos system due to finite precision effect and improve the sta-tistical performance of the random number,a new method based on 6th-order cellular neural network (CNN) was given to construct a 64-bit pseudo random number generation (PRNG).In the method,the input and output data in every iteration of 6th-order CNN were controlled to improved the performance of the random number affected by chaos degradation.Then the data were XORed with a variable parameter and the random sequences generated by a Logistic map,by which the repeat of generated sequences was avoided,and the period of output sequences and the key space were expended.Be-sides,the new method was easy to be realized in the software and could generate 64 bit random numbers every time,thus has a high generating efficiency.Test results show that the generated random numbers can pass the statistical test suite NIST SP800-22 completely and thus has good randomness.The method can be applied in secure communication and other fields of information security.…”
Get full text
Article