期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Assessment Method of Heavy NC Machine Reliability Based on Bayes Theory 被引量:1
1
作者 张雷 王太勇 胡占齐 《Transactions of Tianjin University》 EI CAS 2016年第2期105-109,共5页
It is difficult to collect the prior information for small-sample machinery products when their reliability is assessed by using Bayes method. In this study, an improved Bayes method with gradient reliability(GR) resu... It is difficult to collect the prior information for small-sample machinery products when their reliability is assessed by using Bayes method. In this study, an improved Bayes method with gradient reliability(GR) results as prior information was proposed to solve the problem. A certain type of heavy NC boring and milling machine was considered as the research subject, and its reliability model was established on the basis of its functional and structural characteristics and working principle. According to the stress-intensity interference theory and the reliability model theory, the GR results of the host machine and its key components were obtained. Then the GR results were deemed as prior information to estimate the probabilistic reliability(PR) of the spindle box, the column and the host machine in the present method. The comparative studies demonstrated that the improved Bayes method was applicable in the reliability assessment of heavy NC machine tools. 展开更多
关键词 heavy NC machine reliability assessment bayes method prior information
下载PDF
Implementation of ID-based Audit Protocols to Enhance Security and Productivity
2
作者 R.Hariharan G.Komarasamy S.Daniel Madan Raja 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期873-882,共10页
Cloud storage has gained increasing popularity,as it helps cloud users arbitrarily store and access the related outsourced data.Numerous public audit buildings have been presented to ensure data transparency.However,m... Cloud storage has gained increasing popularity,as it helps cloud users arbitrarily store and access the related outsourced data.Numerous public audit buildings have been presented to ensure data transparency.However,modern developments have mostly been constructed on the public key infrastructure.To achieve data integrity,the auditor must first authenticate the legality of the public key certificate,which adds to an immense workload for the auditor,in order to ensure that data integrity is accomplished.The data facilities anticipate that the storage data quality should be regularly tracked to minimize disruption to the saved data in order to maintain the intactness of the stored data on the remote server.One of the main problems for individuals,though,is how to detect data integrity on a term where people have a backup of local files.Meanwhile,a system is often unlikely for a source-limited person to perform a data integrity inspection if the overall data file is retrieved.In this work,a stable and effective ID-based auditing setting that uses machine learning techniques is proposed to improve productivity and enhance the protection of ID-based audit protocols.The study tackles the issue of confidentiality and reliability in the public audit framework focused on identity.The idea has already been proved safe;its safety is very relevant to the traditional presumption of the Computational Diffie-Hellman security assumption. 展开更多
关键词 Machine learning information processing bayes methods cloud systems
下载PDF
Structural damage detection method based on information fusion technique 被引量:1
3
作者 刘涛 李爱群 +1 位作者 丁幼亮 费庆国 《Journal of Southeast University(English Edition)》 EI CAS 2008年第2期201-205,共5页
Multi-source information fusion (MSIF) is imported into structural damage diagnosis methods to improve the validity of damage detection. After the introduction of the basic theory, the function model, classification... Multi-source information fusion (MSIF) is imported into structural damage diagnosis methods to improve the validity of damage detection. After the introduction of the basic theory, the function model, classifications and mathematical methods of MSIF, a structural damage detection method based on MSIF is presented, which is to fuse two or more damage character vectors from different structural damage diagnosis methods on the character-level. In an experiment of concrete plates, modal information is measured and analyzed. The structural damage detection method based on MSIF is taken to localize cracks of concrete plates and it is proved to be effective. Results of damage detection by the method based on MSIF are compared with those from the modal strain energy method and the flexibility method. Damage, which can hardly be detected by using the single damage identification method, can be diagnosed by the damage detection method based on the character-level MSIF technique. Meanwhile multi-location damage can be identified by the method based on MSIF. This method is sensitive to structural damage and different mathematical methods for MSIF have different preconditions and applicabilities for diversified structures. How to choose mathematical methods for MSIF should be discussed in detail in health monitoring systems of actual structures. 展开更多
关键词 multi-source information fusion structural damage detection bayes method D-S evidence theory
下载PDF
Trusted dynamic level scheduling based on Bayes trust model 被引量:14
4
作者 WANG Wei ZENG GuoSun 《Science in China(Series F)》 2007年第3期456-469,共14页
A kind of trust mechanism-based task scheduling model was presented. Referring to the trust relationship models of social persons, trust relationship is built among Grid nodes, and the trustworthiness of nodes is eval... A kind of trust mechanism-based task scheduling model was presented. Referring to the trust relationship models of social persons, trust relationship is built among Grid nodes, and the trustworthiness of nodes is evaluated by utilizing the Bayes method. Integrating the trustworthiness of nodes into a Dynamic Level Scheduling (DLS) algorithm, the Trust-Dynamic Level Scheduling (Trust-DLS) algorithm is proposed. Theoretical analysis and simulations prove that the Trust-DLS algorithm can efficiently meet the requirement of Grid tasks in trust, sacrificing fewer time costs, and assuring the execution of tasks in a security way in Grid environment. 展开更多
关键词 Grid computing trustworthy scheduling bayes method trustworthiness evaluation Trust-DLS
原文传递
Linear Bayes Estimators Applied to the Inverse Gaussian Lifetime Model 被引量:1
5
作者 WANG Lichun PETTIT Lawrence 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2016年第6期1683-1692,共10页
For the two-parameter inverse Gaussian distribution denoted by IG(μ,A), the authors employ a linear Bayes procedure to estimate the parameters μ and A. The superiority of the proposed linear Bayes estimator (LBE... For the two-parameter inverse Gaussian distribution denoted by IG(μ,A), the authors employ a linear Bayes procedure to estimate the parameters μ and A. The superiority of the proposed linear Bayes estimator (LBE) over both the classical UMVUE and the maximum likelihood estimator (MLE) is established in terms of the mean squared error matrix (MSEM) criterion. Compared with the usual Bayes estimator, which is obtained by an MCMC method, the proposed LBE is simple and easy to use. Some numerical results are presented to verify that the LBE performs well. 展开更多
关键词 Linear bayes method MCMC method mean squared error matrix (MSEM) quadraticloss.
原文传递
A random finite set based joint probabilistic data association filter with non-homogeneous Markov chain 被引量:2
6
作者 Yun ZHU Shuang LIANG +1 位作者 Xiaojun WU Honghong YANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2021年第8期1114-1126,共13页
We demonstrate a heuristic approach for optimizing the posterior density of the data association tracking algorithm via the random finite set(RFS)theory.Specifically,we propose an adjusted version of the joint probabi... We demonstrate a heuristic approach for optimizing the posterior density of the data association tracking algorithm via the random finite set(RFS)theory.Specifically,we propose an adjusted version of the joint probabilistic data association(JPDA)filter,known as the nearest-neighbor set JPDA(NNSJPDA).The target labels in all possible data association events are switched using a novel nearest-neighbor method based on the Kullback-Leibler divergence,with the goal of improving the accuracy of the marginalization.Next,the distribution of the target-label vector is considered.The transition matrix of the target-label vector can be obtained after the switching of the posterior density.This transition matrix varies with time,causing the propagation of the distribution of the target-label vector to follow a non-homogeneous Markov chain.We show that the chain is inherently doubly stochastic and deduce corresponding theorems.Through examples and simulations,the effectiveness of NNSJPDA is verified.The results can be easily generalized to other data association approaches under the same RFS framework. 展开更多
关键词 Target tracking Filtering theory Random finite set theory bayes methods Markov chain
原文传递
Phase noise correction for OFDM signal based on DCT approach and variational inference
7
作者 CHEN Peng LI Nan +2 位作者 LI Ju-hu HE Zhi-qiang WU Wei-ling 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2012年第3期27-32,共6页
A novel scheme to joint phase noise (PHN) correcting and channel noise variance estimating for orthogonal frequency division multiplexing (OFDM) signal was proposed, The new scheme was based on the variational Bay... A novel scheme to joint phase noise (PHN) correcting and channel noise variance estimating for orthogonal frequency division multiplexing (OFDM) signal was proposed, The new scheme was based on the variational Bayes (VB) method and discrete cosine transform (DCT) approximation. Compared with the least squares (LS) based scheme, the proposed scheme could overcome the over-fitting phenomenon and thus lead to an improved performance. Computer simulations showed that the proposed VB based scheme outperforms the existing LS based scheme 展开更多
关键词 variational bayes method discrete cosine transform phase noise OFDM
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部