期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Subband adaptive filter with variable reusing order of coefficient vectors
1
作者 倪锦根 《Journal of Beijing Institute of Technology》 EI CAS 2015年第3期375-380,共6页
To increase the convergence rate of the improved normalized subband adaptive filter,a simple but effective method is presented to change the reusing order of coefficient vectors of the adaptive filter. At the beginnin... To increase the convergence rate of the improved normalized subband adaptive filter,a simple but effective method is presented to change the reusing order of coefficient vectors of the adaptive filter. At the beginning of adaptation the algorithmjust uses its current coefficient vector to update the adaptive filter to maintain fast convergence rate,while in steady state it employs several most recent coefficient vectors to update the adaptive filter to reduce misalignment. Simulation results showthat the proposed algorithmcan obtain both fast convergence rate and small steady-state misalignment. 展开更多
关键词 adaptive filtering subband adaptive filter reusing coefficient vector misalignment
下载PDF
Forced Axial and Torsional Vibrations of a Shaft Line Using the Transfer Matrix Method Related to Solution Coefficients 被引量:2
2
作者 Kandouci Chahr-Eddine Adjal Yassine 《Journal of Marine Science and Application》 2014年第2期200-205,共6页
This present paper deals with a mathematical description of linear axial and torsional vibrations. The normal and tangential stress tensor components produced by axial-torsional deformations and vibrations in the prop... This present paper deals with a mathematical description of linear axial and torsional vibrations. The normal and tangential stress tensor components produced by axial-torsional deformations and vibrations in the propeller and intermediate shafts, under the influence of propeller-induced static and variable hydrodynamic excitations are also studied. The transfer matrix method related to the constant coefficients of differential equation solutions is used. The advantage of the latter as compared with a well-known method of transfer matrix associated with state vector is the possibility of reducing the number of multiplied matrices when adjacent shaft segments have the same material properties and diameters. The results show that there is no risk of buckling and confirm that the strength of the shaft line depends on the value of the static tangential stresses which is the most important component of the stress tensor. 展开更多
关键词 shaft line stress tensor vibration axial vibration torsional vibration transfer matrix constant coefficient vector
下载PDF
Water inrush evaluation of coal seam floor by integrating the water inrush coefficient and the information of water abundance 被引量:3
3
作者 Shi Longqing Qiu Mei +2 位作者 Wei Wenxue Xu Dongjing Han Jin 《International Journal of Mining Science and Technology》 SCIE EI 2014年第5期677-681,共5页
The method of singular coefficient of water inrush to achieve safety mining has limitation and one sidedness. Aiming at the problem above, large amounts of data about water inrush were collected. Then the data, includ... The method of singular coefficient of water inrush to achieve safety mining has limitation and one sidedness. Aiming at the problem above, large amounts of data about water inrush were collected. Then the data, including the maximum water inrush, water inrush coefficient and water abundance in aquifers of working face, were processed by the statistical analysis. The analysis results indicate that both water inrush coefficient and water abundance in aquifers should be taken into consideration when evaluating the danger of water inrush from coal seam floor. The prediction model of safe-mining evaluation grade was built by using the support vector machine, and the result shows that this model has high classification accuracy. A feasible classification system of water-inrush safety evaluation can be got by using the data visualization method which makes the implicit support vector machine models explicit. 展开更多
关键词 Floor water inrush Water inrush coefficient Water abundance Units-inflow Support vector machine
下载PDF
The Method Research and Technology Implementation of Eddy Current Hardness-sorting Based on LS-SVM 被引量:2
4
作者 HU Pengfei HUANG Haisong XIE Qingsheng 《Instrumentation》 2020年第1期13-23,共11页
According to the practical problems in eddy current sorting,the method and technology of eddy current hardness sorting based on LeastSquaresSupportVectorMachine(LS-SVM)are proposed based on the Xilinx Artix-7 FPGA in ... According to the practical problems in eddy current sorting,the method and technology of eddy current hardness sorting based on LeastSquaresSupportVectorMachine(LS-SVM)are proposed based on the Xilinx Artix-7 FPGA in this paper.The calculated sorting-hyperplane and designed sorting decision-making machine were used to sort different hardness of the vavles.The experimental results of the vavle sorting show that the sorting success rate can reach 100%under conditions that the number of test vavles is one quarter of the training vavles.The method and technology based on LS-SVM can solve the problems that the impedance feature value is nonlinear with the hardness value and variable sorting interval.It also proved that the LS-SVM algorithm has strong practical value in online eddy current sorting. 展开更多
关键词 Eddy Current Hardness-sorting Support vector coefficient Sorting Decision-making Machine Sorting-hyperplane
下载PDF
Efficient Activation Method of Hardware Trojan Based on Greedy Algorithm
5
作者 Yingjian Yan Xin Chuan 《Journal of Beijing Institute of Technology》 EI CAS 2018年第2期230-236,共7页
To generate test vector sets that can efficiently activate hardware Trojans and improve probability of the hardware Trojan activation,an efficient hardware Trojan activation method is proposed based on greedy algorith... To generate test vector sets that can efficiently activate hardware Trojans and improve probability of the hardware Trojan activation,an efficient hardware Trojan activation method is proposed based on greedy algorithm for combinatorial hardware Trojans. Based on the greedy algorithm and the recursive construction method in the combination test,the method formulates appropriate and useful greedy strategy and generates test vector sets with different combinatorial correlation coefficients to activate hardware Trojans in target circuits. The experiment was carried out based on advanced encryption standard( AES) hardware encryption circuit,different combinatorial hardware Trojans were implanted in AES as target circuits,the experiment of detecting hardware Trojans in target circuits was performed by applying the proposed method and different combinatorial hardware Trojans in target circuits were activated successfully many times in the experiment. The experimental results showthat the test vector sets generated using the proposed method could effectively activate combinatorial hardware Trojans,improve the probability of the hardware Trojan being activated,and also be applied to practice. 展开更多
关键词 hardware Trojan logic detection combinatorial correlation coefficient test vectors
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部