-
1
A Classification System to Detect Congestive Heart Failure Using Second-Order Difference Plot of RR Intervals
Published 2009-01-01“…A classification system to detect congestive heart failure (CHF) patients from normal (N) patients is described. …”
Get full text
Article -
2
First- and Second-Order Full-Differential in Edge Analysis of Images
Published 2014-01-01“…Based on our observation and analysis with the difference, we propose an algorithm to detect the edge from image. Experiments on Corel5K and PASCAL VOC 2007 are done to show the difference between the first order and the second order. …”
Get full text
Article -
3
Weak Fault Detection for Rolling Bearings in Varying Working Conditions through the Second-Order Stochastic Resonance Method with Barrier Height Optimization
Published 2021-01-01“…When the fault frequency changes in variable working conditions, the signal processing effect becomes different with fixed parameters, leading to errors in fault detection. In this paper, an underdamped second-order adaptive general variable-scale stochastic resonance (USAGVSR) method with potential well parameters’ optimization is put forward. …”
Get full text
Article -
4
An Improved Phase-locked Loop Based on Second-order Generalized Integrator
Published 2017-01-01“…Under ideal grid voltage conditions, single synchronous reference frame phase-locked loop (SSRF-PLL) enables fast and accurate phase/frequency detection, however, abnormal grid voltage conditions highly degrade its performance. …”
Get full text
Article -
5
PMSM Position Sensorless Control Based on Improved Second-Order SOIFO
Published 2025-03-01“…To address these issues, two flux observers, the second-order generalized integrator flux observer (SOIFO) and the second-order SOIFO, are designed for position sensorless control of permanent magnet synchronous motors (PMSMs). …”
Get full text
Article -
6
Second Order Coherence: A new way of looking at incoherence in texts
Published 2016-12-01“…It is shown how readers can detect these structures in the text by detecting the incoherence even without the layout of the text to signal structure (e.g. indention of paragraphs). …”
Get full text
Article -
7
A Hybrid Mechanism to Detect DDoS Attacks in Software Defined Networks
Published 2024-02-01“…Given the importance of this issue,the purpose of this paper is to increase the accuracy of DDoS attack detection using the second order correlation coefficient technique based on â -entropy according to source IP and selection of optimal features.To select the best features, by examining the types of feature selection algorithms and search methods, the WrapperSubsetEval feature selection algorithm, the BestFirst search method, and the best effective features were selected. …”
Get full text
Article -
8
Enhanced criteria for detecting oscillations in neutral delay Emden-Fowler differential equations
Published 2023-10-01Get full text
Article -
9
-
10
Assessment of Patellar Tendon Reflex Responses Using Second-Order System Characteristics
Published 2016-01-01“…This study confirmed that PTR responses strongly correlate to a second-order system and that exponential decay rate and undamped natural frequency are novel measurement variables to accurately measure PTR responses. …”
Get full text
Article -
11
SVM-Assisted Realization and Demonstration of Indoor 4 Mb/s Non-Line-of-Sight Visible Light Communication With Second-Order Reflection
Published 2019-01-01Subjects: Get full text
Article -
12
An efficient second‐order neural network model for computing the Moore–Penrose inverse of matrices
Published 2022-12-01“…In this paper, an efficient second‐order neural network model with the improved Newton's method is proposed to obtain the accurate Moore–Penrose inverse of an arbitrary matrix by one epoch without any learning parameter. …”
Get full text
Article -
13
A Contrast-Enhanced Approach for Aerial Moving Target Detection Based on Distributed Satellites
Published 2025-03-01Subjects: Get full text
Article -
14
Penetration test method using blind SQL injection based on second-order fragment and reassembly
Published 2017-10-01“…How to get rid of the blindness of current SQL injection penetration test,produce the optimized attack pattern of SQL injection,enhance the effectiveness in the phase of attack generation,and improve the accuracy of vulnerability detection of SQL injection using penetration test,is a big challenge.In order to resolve these problems,a new penetration test method using blind SQL injection was proposed based on second-order fragment and reassembly.In this method,the SQL injection attack model was built firstly and then the multiform and multi-type attack patterns of SQL injection penetration test driven by the SQL injection attack model was produced,which can reduce the blindness of SQL injection penetration test and improve the accuracy of SQL injection vulnerability detection.The experiments of SQL injection vulnerability detection was conducted through the actual Web applications by using proposed method in comparison with current methods.The analysis results of test show the proposed method is better compared with other methods,which not only proves the effectiveness of proposed method,but also improve the accuracy of SQL injection vulnerability detection by reducing false negative in the defensive environment.…”
Get full text
Article -
15
Simultaneous and Direct Determination of Vancomycin and Cephalexin in Human Plasma by Using HPLC-DAD Coupled with Second-Order Calibration Algorithms
Published 2012-01-01“…The results indicated that the combination of HPLC-DAD detection with second-order calibration algorithms is a powerful tool to quantify the analytes of interest from overlapped chromatographic profiles for complex analysis of drugs in plasma.…”
Get full text
Article -
16
Power Control Strategy of Microgrid Based on Adaptive Virtual Impedance
Published 2018-01-01Subjects: Get full text
Article -
17
-
18
Traces of tricritical dynamics beyond SSB in finite-size systems undergoing second-order phase transition: the case of the 3D Ising model
Published 2025-08-01“…In finite-size thermal systems that exhibit second-order phase transition, the fluctuations of the order parameter ϕn obey type I intermittent dynamics at their pseudocritical temperature Tpc. …”
Get full text
Article -
19
A cloud-edge collaborative optimization control strategy for voltage in distribution networks with PV stations
Published 2025-06-01“…The voltage threshold device detects the node voltage overrun and triggers the collaborative optimization computation of the edge computing devices, which sends a command to the cloud to call the partitioning result of this time period, and the cloud sends the result to each edge computing device, which determines the area it is responsible for, and adjusts the voltage overrun partitioning by using the mixed-integer second-order conic planning, and ultimately realizes the optimization strategy within the minute-level zone. …”
Get full text
Article -
20
Implementation of a Flexible Real-Time Radar Architecture of Vital Signs Based on Cyclic Temporal Moment Algorithms Using SDR Technology
Published 2025-01-01“…This article presents a low-cost bistatic radar built using software-defined radio (SDR) for real-time monitoring and detection of mechanical vibrations and physiological movements of a person’s chest. …”
Get full text
Article