To increase the convergence rate of the improved normalized subband adaptive filter,a simple but effective method is presented to change the reusing order of coefficient vectors of the adaptive filter. At the beginnin...To increase the convergence rate of the improved normalized subband adaptive filter,a simple but effective method is presented to change the reusing order of coefficient vectors of the adaptive filter. At the beginning of adaptation the algorithmjust uses its current coefficient vector to update the adaptive filter to maintain fast convergence rate,while in steady state it employs several most recent coefficient vectors to update the adaptive filter to reduce misalignment. Simulation results showthat the proposed algorithmcan obtain both fast convergence rate and small steady-state misalignment.展开更多
This present paper deals with a mathematical description of linear axial and torsional vibrations. The normal and tangential stress tensor components produced by axial-torsional deformations and vibrations in the prop...This present paper deals with a mathematical description of linear axial and torsional vibrations. The normal and tangential stress tensor components produced by axial-torsional deformations and vibrations in the propeller and intermediate shafts, under the influence of propeller-induced static and variable hydrodynamic excitations are also studied. The transfer matrix method related to the constant coefficients of differential equation solutions is used. The advantage of the latter as compared with a well-known method of transfer matrix associated with state vector is the possibility of reducing the number of multiplied matrices when adjacent shaft segments have the same material properties and diameters. The results show that there is no risk of buckling and confirm that the strength of the shaft line depends on the value of the static tangential stresses which is the most important component of the stress tensor.展开更多
The method of singular coefficient of water inrush to achieve safety mining has limitation and one sidedness. Aiming at the problem above, large amounts of data about water inrush were collected. Then the data, includ...The method of singular coefficient of water inrush to achieve safety mining has limitation and one sidedness. Aiming at the problem above, large amounts of data about water inrush were collected. Then the data, including the maximum water inrush, water inrush coefficient and water abundance in aquifers of working face, were processed by the statistical analysis. The analysis results indicate that both water inrush coefficient and water abundance in aquifers should be taken into consideration when evaluating the danger of water inrush from coal seam floor. The prediction model of safe-mining evaluation grade was built by using the support vector machine, and the result shows that this model has high classification accuracy. A feasible classification system of water-inrush safety evaluation can be got by using the data visualization method which makes the implicit support vector machine models explicit.展开更多
According to the practical problems in eddy current sorting,the method and technology of eddy current hardness sorting based on LeastSquaresSupportVectorMachine(LS-SVM)are proposed based on the Xilinx Artix-7 FPGA in ...According to the practical problems in eddy current sorting,the method and technology of eddy current hardness sorting based on LeastSquaresSupportVectorMachine(LS-SVM)are proposed based on the Xilinx Artix-7 FPGA in this paper.The calculated sorting-hyperplane and designed sorting decision-making machine were used to sort different hardness of the vavles.The experimental results of the vavle sorting show that the sorting success rate can reach 100%under conditions that the number of test vavles is one quarter of the training vavles.The method and technology based on LS-SVM can solve the problems that the impedance feature value is nonlinear with the hardness value and variable sorting interval.It also proved that the LS-SVM algorithm has strong practical value in online eddy current sorting.展开更多
To generate test vector sets that can efficiently activate hardware Trojans and improve probability of the hardware Trojan activation,an efficient hardware Trojan activation method is proposed based on greedy algorith...To generate test vector sets that can efficiently activate hardware Trojans and improve probability of the hardware Trojan activation,an efficient hardware Trojan activation method is proposed based on greedy algorithm for combinatorial hardware Trojans. Based on the greedy algorithm and the recursive construction method in the combination test,the method formulates appropriate and useful greedy strategy and generates test vector sets with different combinatorial correlation coefficients to activate hardware Trojans in target circuits. The experiment was carried out based on advanced encryption standard( AES) hardware encryption circuit,different combinatorial hardware Trojans were implanted in AES as target circuits,the experiment of detecting hardware Trojans in target circuits was performed by applying the proposed method and different combinatorial hardware Trojans in target circuits were activated successfully many times in the experiment. The experimental results showthat the test vector sets generated using the proposed method could effectively activate combinatorial hardware Trojans,improve the probability of the hardware Trojan being activated,and also be applied to practice.展开更多
基金Supported by the National Natural Science Foundation of China( 61471251 61101217)the Natural Science Foundation of Jiangsu Province of China (BK20131164)
文摘To increase the convergence rate of the improved normalized subband adaptive filter,a simple but effective method is presented to change the reusing order of coefficient vectors of the adaptive filter. At the beginning of adaptation the algorithmjust uses its current coefficient vector to update the adaptive filter to maintain fast convergence rate,while in steady state it employs several most recent coefficient vectors to update the adaptive filter to reduce misalignment. Simulation results showthat the proposed algorithmcan obtain both fast convergence rate and small steady-state misalignment.
文摘This present paper deals with a mathematical description of linear axial and torsional vibrations. The normal and tangential stress tensor components produced by axial-torsional deformations and vibrations in the propeller and intermediate shafts, under the influence of propeller-induced static and variable hydrodynamic excitations are also studied. The transfer matrix method related to the constant coefficients of differential equation solutions is used. The advantage of the latter as compared with a well-known method of transfer matrix associated with state vector is the possibility of reducing the number of multiplied matrices when adjacent shaft segments have the same material properties and diameters. The results show that there is no risk of buckling and confirm that the strength of the shaft line depends on the value of the static tangential stresses which is the most important component of the stress tensor.
基金Financial supports for this work, provided by National Natural Key Science Foundation of China (No. 50539080)Ministry of Education Research Fund for the doctoral program of China (No. 20133718110004)+2 种基金the Natural Science Key Foundation of Shandong Province of China (No. ZR2011EEZ002)the Technology Project Development Plan of Qingdao Economic and Technological Development Zone of China (No. 2013-1-62)SDUST Research Fund of China (No. 2012KYTD101)
文摘The method of singular coefficient of water inrush to achieve safety mining has limitation and one sidedness. Aiming at the problem above, large amounts of data about water inrush were collected. Then the data, including the maximum water inrush, water inrush coefficient and water abundance in aquifers of working face, were processed by the statistical analysis. The analysis results indicate that both water inrush coefficient and water abundance in aquifers should be taken into consideration when evaluating the danger of water inrush from coal seam floor. The prediction model of safe-mining evaluation grade was built by using the support vector machine, and the result shows that this model has high classification accuracy. A feasible classification system of water-inrush safety evaluation can be got by using the data visualization method which makes the implicit support vector machine models explicit.
基金supported by a project of the National Natural Science Foundation(No.51865004)the Guizhou Science and Technology Department(No.QKH20161081,No.QKH20192881)
文摘According to the practical problems in eddy current sorting,the method and technology of eddy current hardness sorting based on LeastSquaresSupportVectorMachine(LS-SVM)are proposed based on the Xilinx Artix-7 FPGA in this paper.The calculated sorting-hyperplane and designed sorting decision-making machine were used to sort different hardness of the vavles.The experimental results of the vavle sorting show that the sorting success rate can reach 100%under conditions that the number of test vavles is one quarter of the training vavles.The method and technology based on LS-SVM can solve the problems that the impedance feature value is nonlinear with the hardness value and variable sorting interval.It also proved that the LS-SVM algorithm has strong practical value in online eddy current sorting.
文摘To generate test vector sets that can efficiently activate hardware Trojans and improve probability of the hardware Trojan activation,an efficient hardware Trojan activation method is proposed based on greedy algorithm for combinatorial hardware Trojans. Based on the greedy algorithm and the recursive construction method in the combination test,the method formulates appropriate and useful greedy strategy and generates test vector sets with different combinatorial correlation coefficients to activate hardware Trojans in target circuits. The experiment was carried out based on advanced encryption standard( AES) hardware encryption circuit,different combinatorial hardware Trojans were implanted in AES as target circuits,the experiment of detecting hardware Trojans in target circuits was performed by applying the proposed method and different combinatorial hardware Trojans in target circuits were activated successfully many times in the experiment. The experimental results showthat the test vector sets generated using the proposed method could effectively activate combinatorial hardware Trojans,improve the probability of the hardware Trojan being activated,and also be applied to practice.