-
21
Archimedean Spiral Antenna Calibration Procedures to Increase the Downrange Resolution of a SFCW Radar
Published 2008-01-01“…Two procedures are investigated, one based on an error-term flow graph for the frequency signal and the second based on a reference metallic plate located at a certain distance from the ground in order to identify the phase dispersion given by the antenna. …”
Get full text
Article -
22
Construction of a bundle for the safety of patients with mental disorders during hospitalization
Published 2025-01-01“…In the first, a comprehensive literature review was developed through a scoping review and conducted to examine evidence on the safety of psychiatric patients during hospitalization. In the second, based on the evidence listed, a set of actions was developed for the safety of psychiatric patients during hospitalization. …”
Get full text
Article -
23
Detection Metbod of Trojan's Control Domain Based on Improved Neural Network Algoritbm
Published 2014-07-01“…Firstly, the character that the Trojans use domain name to control was analyzed and the method that DNS adopted to detect Trojans was introduced. Secondly, based on the analysis of static and dynamic characters for Trojan domain name, eight indicators were obtained as the input of BP neural network algorithm, including operation time of domain name, the period to visit the domain name, the variation speed of IP address, the country change of IP address, IP address of private address, the same domain name with multiple IP address for different countries, TTL value and search times of domain name. …”
Get full text
Article -
24
RESEARCH ON EARLY WARNING METHOD OF ROTOR VIBRATION OF TURBOGENERATOR UNIT (MT)
Published 2023-01-01“…Firstly, the running law of rotor vibration is analyzed. Secondly, based on the vibration operation law, the calculation method of rotor vibration abnormal threshold is proposed. …”
Get full text
Article -
25
Finite-Time Synchronization and Synchronization Dynamics Analysis for Two Classes of Markovian Switching Multiweighted Complex Networks from Synchronization Control Rule Viewpoint
Published 2019-01-01“…Firstly, sufficient conditions of finite-time synchronization for a class of NCMSMWCNs and a class of linear coupled Markovian switching multiweighted complex networks (LCMSMWCNs) are investigated. Secondly, based on the derived results, how nonlinear coupled one affects synchronization dynamics of the NCMSMWCNs is analyzed from synchronization control rule. …”
Get full text
Article -
26
Research on heterogeneous identifier namespace management and control architecture in polymorphic network environment
Published 2022-04-01“…Aiming at the interoperability and conversion problem of heterogeneous identifier namespace, a heterogeneous identifier namespace management and control architecture was proposed based on the polymorphic network environment.Firstly, the design objectives and principles of heterogeneous identifier namespace management and control were given.A theoretical model was also proposed for the network identifier namespace selection and conversion process, and the distributed heterogeneous cyberspace compatibility problem was thus transformed into a centralized network layer function configuration problem.Secondly, based on the proposed theoretical model, the key applications and functional modules for managing the heterogeneous identifier namespace were designed on the control plane.Then, the specific workflow of heterogeneous identifier namespace management and control was presented.Finally, based on the polymorphic network environment, a prototype verification system was built to validate the proposed heterogeneous space management and control architecture as well as the related functions.…”
Get full text
Article -
27
Analysis and improvement for authentication protocols of mobile ad hoc network with CSP approach
Published 2013-08-01“…First, the communication behaviors of all participants in TAM and its security (authentication and confidentiality) specifications were formally modeled using CSP. Second, based on these models, the participants' behaviors were verified by FDR and the verification result indicates that the original TAM could not guarantee authentication and confidentiality. …”
Get full text
Article -
28
A survey of V2X security protection technologies
Published 2023-03-01“…The vehicle-road-cloud collaborative V2X system has gradually become a national strategy, and the safety of V2X is related to driving security, life security, property security and even national security, which has increasingly become a hot spot for industry research.Firstly, the overall situation of the V2X security industry and the technology architecture of vehicle-road-cloud collaboration were introduced.Secondly, based on the “vehicle-road-cloud” technology system of V2X, the current status of domestic and international research was discussed, and the remaining problems and challenges in the field of V2X security protection were analyzed from three levels: V2X terminal security, roadside security and cloud security.Finally, the future development and research focus of the V2X security and protection technology were foreseen.…”
Get full text
Article -
29
Global Existence and Blow-Up of Solutions to a Parabolic Nonlocal Equation Arising in a Theory of Thermal Explosion
Published 2022-01-01“…First, we prove a comparison principle for some kinds of semilinear parabolic equations under nonlinear boundary conditions; using it, we show a new theorem of subsupersolutions. Secondly, based on the new method of subsupersolutions, the existence of global solutions and blow-up solutions is presented for different values of p. …”
Get full text
Article -
30
1R Pseudo-rigid-body Model of Initially Curved Flexible Beam with End Loaded Moment
Published 2018-01-01“…The theoretical results are given with example,and are compared with ANSYS simulation to verify the effectiveness of the theory. Secondly,based on the1 R pseudo-rigid-body model( PRBM) of the straight beam subjected to the moment,the 1 R PRBM of the initially curved flexible beam subjected to the moment is firstly developed and is compared with the theoretical results to verify its effectiveness. …”
Get full text
Article -
31
Distributed Power Trading System Based on Blockchain Technology
Published 2021-01-01“…Firstly, the improved AdaBoost algorithm is used to predict the supply and demand gap of power trading nodes. Secondly, based on the fact that the information on the blockchain is only open to the power supply side, a two-stage game model of asymmetric information between the power supply side and the power user is constructed to capture the price competition behavior between them in order to find the Nash equilibrium price in two stages. …”
Get full text
Article -
32
Learning Force-Relevant Skills from Human Demonstration
Published 2019-01-01“…First, the force-relevant skill is encapsulated as a statistical model where the key parameters are learned from the demonstrated data (motion, force). Second, based on the learned skill model, a task planner is devised which specifies the motion and/or the force profile for a given manipulation task. …”
Get full text
Article -
33
Application of K-means algorithm based on A-D model in calling abnormal customer mining
Published 2018-04-01“…In order to make use of massive voice communication records and cluster high-quality clients (telecom fraud clients,advertisers) with various kinds of voice communication abnormalities,a behavioral feature model of abnormal voice communication customers was designed and constructed.Based on the model,a clustering analysis algorithm for customers with abnormal voice communication behavior was proposed.First of all,by analyzing the call records of customers,the characteristics of call behaviors was got,such as the number of calls,call rates,and so on.Then AHP-DEMATEL model was constructed by blending the AHP model and DEMATEL method.Secondly,based on the model,an improved K-means algorithm was proposed to cluster the abnormal clients according to the voice communication records.Finally,the real data was used to verify the analysis.The results show that compared with other similar algorithms,the proposed algorithm improves the performance of multi-type abnormal customer comprehensive clustering analysis and single-type abnormal customer clustering analysis greatly.…”
Get full text
Article -
34
Weight of the Default Component of CDS Spreads: Avoiding Procyclicality in Credit Loss Provisioning Framework
Published 2019-01-01“…Our results contrast with previous research. Second, based on the obtained historical weights of the default risk premium, a forward-looking term structure of the probabilities of default implied by the current CDS quotes is derived. …”
Get full text
Article -
35
5G mobile/multi-access edge computing integrated architecture and deployment strategy
Published 2018-04-01“…Mobile/multi-access edge computing (MEC) technology migrates computing storage capabilities and service service capabilities to the edge of the network,enabling applications,services and content to be localized,close-range and distributed.Therefore,to a certain extent,the business requirements of 5G enhanced mobile broadband,low latency and high reliability and large-scale machine communication terminal connection are solved.At the same time,the MEC fully exploits mobile network data and information to implement the awareness and analysis of context information of the mobile network and open it to third-party service applications.This effectively enhances the level of intelligence in mobile networks and promotes the deep integration of networks and services.Therefore,the value and significance of the MEC was firstly analyzed according to the typical 5G service scenario.Secondly,based on the research progress of ETSI and 3GPP,a MEC fusion architecture oriented to 5G was proposed,and the overall deployment strategy of MEC was discussed and analyzed.Furthermore,the possible problems and challenges in the future application of MEC technology in 5G networks were discussed to provide reference for subsequent research and development.…”
Get full text
Article -
36
Anomalous Trajectory Detection Using Masked Autoregressive Flow Considering Route Choice Probability
Published 2022-01-01“…First, we divide the urban traffic network into small grids and represent subtrajectories with a sequence of grids. Second, based on the subtrajectories, we employ the MAFRC-ATD model to calculate the anomaly score of each trajectory. …”
Get full text
Article -
37
Study on remote sensing satellites random access to internet constellation and on-orbit intelligent processing
Published 2022-04-01“…The low earth orbit (LEO) satellite Internet constellation is a hot spot in current global research.And it is highly anticipated that the LEO satellite Internet constellation supports random access to remote sensing satellites and direct on-orbit information processing.However, due to the different orbital heights, the difficult access problems of the bidirectional highly dynamic heterogeneous constellation will be caused.Firstly, the random access scenario under different orbit characteristics and satellite numbers of LEO satellite Internet constellation was set up, and the impact of the spatiotemporal discontinuous visibility and Doppler frequency shift on the remote sensing satellite access performance was focused on.Secondly, based on the characteristics of the random access scenario, the process of on-orbit processing tasks with different delays and the allocation of satellite-ground functions were analyzed.Finally, the problems existing in the current on-orbit intelligent processing algorithm and the focus of future research were expounded, so as to provide reliable theoretical support for the development and applications of LEO satellite Internet constellation and remote sensing satellites in the future.…”
Get full text
Article -
38
Automatic Analysis Algorithm of Position and Orientation Characteristic Set of Parallel Mechanism based on Neural Network
Published 2018-01-01“…First of all,by analyzing the topological structure of parallel mechanism,the essence is summed up. Secondly,based on the neural network theory,the topological structure of parallel mechanism is described and digitized. …”
Get full text
Article -
39
Sociological Analysis of Islamic Law on The Implementation of the Jo Kawin Bocah Program in Reducing Early Marriage Rates (Case Study on the PKK Team of Temanggung Regency)
Published 2024-11-01“…First, the PKK Movement Team enhances the program through collaboration with the government, communities, institutions like GenRe (Planned Generation), and mass media for effective dissemination. Second, based on Atho' Mudzhar's sociological theory of Islamic law, factors such as religious practices, social structures, interactions, and support from community organizations significantly influence the program's outcomes. …”
Get full text
Article -
40
Physiological Characteristics and Nonparametric Test for Master-Slave Driving Task’s Mental Workload Evaluation in Mountain Area Highway at Night
Published 2019-01-01“…First, we establish the experimental platform based driving simulator and design the master-slave driving task. Second, based on the physiological data and subjective evaluation for mental workload, we use statistical methods to composite the physical changes evolution analysis in a driving simulator. …”
Get full text
Article