期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Pinion Tooth Surface Generation Strategy of Spiral Bevel Gears 被引量:9
1
作者 LIU Guanglei FAN Hongwei 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2012年第4期753-759,共7页
Aviation spiral bevel gears are often generated by spiral generated modified(SGM) roll method.In this style,pinion tooth surface modified generation strategy has an important influence on the meshing and contact per... Aviation spiral bevel gears are often generated by spiral generated modified(SGM) roll method.In this style,pinion tooth surface modified generation strategy has an important influence on the meshing and contact performances.For the optimal contact pattern and transmission error function,local synthesis is applied to obtain the machine-tool settings of pinion.For digitized machine,four tooth surface generation styles of pinion are proposed.For every style,tooth contact analysis(TCA) is applied to obtain contact pattern and transmission error function.For the difference between TCA transmission error function and design objective curve,the degree of symmetry and agreement are defined and the corresponding sub-objective functions are established.Linear weighted combination method is applied to get an equivalent objective function to evaluate the shape of transmission error function.The computer programs for the process above are developed to analyze the meshing performances of the four pinion tooth surface generation styles for a pair of aviation spiral bevel gears with 38/43 teeth numbers.The four analytical results are compared with each other and show that the incomplete modified roll is optimal for this gear pair.This study is an expansion to generation strategy of spiral bevel gears,and offers new alternatives to computer numerical control(CNC) manufacture of spiral bevel gears. 展开更多
关键词 spiral bevel gears tooth surface generation strategy local synthesis tooth contact analysis transmission error optimization
下载PDF
AvoidPwd: A Mnemonic Password Generation Strategy Based on Keyboard Transformation
2
作者 Shunying Lyu Qian Yao Jianhua Song 《China Communications》 SCIE CSCD 2022年第10期92-101,共10页
Identity authentication is the first line of defense for network security.Passwords have been the most widely used authentication method in recent years.Although there are security risks in passwords,they will be the ... Identity authentication is the first line of defense for network security.Passwords have been the most widely used authentication method in recent years.Although there are security risks in passwords,they will be the primary method in the future due to their simplicity and low cost.Considering the security and usability of passwords,we propose AvoidPwd,which is a novel mnemonic password generation strategy that is based on keyboard transformation.AvoidPwd helps users customize a“route”to bypass an“obstacle”and choose the characters on the“route”as the final password.The“obstacle”is a certain word using any language and the keys adjacent to the“obstacle”are typed with the“Shift”key.A two-part experiment was conducted to examine the memorability and security of the AvoidPwd strategy with other three password strategies and three leaked password sets.The results showed that the passwords generated by the AvoidPwd strategy were more secure than the other leaked password sets.Meanwhile,AvoidPwd outperformed the KbCg,SpIns,and Alphapwd in balancing security and usability.In addition,there are more symbols in the character distribution of AvoidPwd than the other strategies.AvoidPwd is hopeful to solve the security problem that people are difficult to remember symbols and they tend to input letters and digits when creating passwords. 展开更多
关键词 password generation strategy password security mnemonic passwords
下载PDF
New Solution Generation Strategy to Improve Brain Storm Optimization Algorithm for Classification
3
作者 Yu Xue Yan Zhao 《Journal on Internet of Things》 2021年第3期109-118,共10页
As a new intelligent optimization method,brain storm optimization(BSO)algorithm has been widely concerned for its advantages in solving classical optimization problems.Recently,an evolutionary classification optimizat... As a new intelligent optimization method,brain storm optimization(BSO)algorithm has been widely concerned for its advantages in solving classical optimization problems.Recently,an evolutionary classification optimization model based on BSO algorithm has been proposed,which proves its effectiveness in solving the classification problem.However,BSO algorithm also has defects.For example,large-scale datasets make the structure of the model complex,which affects its classification performance.In addition,in the process of optimization,the information of the dominant solution cannot be well preserved in BSO,which leads to its limitations in classification performance.Moreover,its generation strategy is inefficient in solving a variety of complex practical problems.Therefore,we briefly introduce the optimization model structure by feature selection.Besides,this paper retains the brainstorming process of BSO algorithm,and embeds the new generation strategy into BSO algorithm.Through the three generation methods of global optimal,local optimal and nearest neighbor,we can better retain the information of the dominant solution and improve the search efficiency.To verify the performance of the proposed generation strategy in solving the classification problem,twelve datasets are used in experiment.Experimental results show that the new generation strategy can improve the performance of BSO algorithm in solving classification problems. 展开更多
关键词 Brain storm optimization(BSO)algorithm CLASSIFICATION generation strategy evolutionary classification optimization
下载PDF
On the database-based strategy of candidate extractant generation for de-phenol process in coking wastewater treatment 被引量:1
4
作者 Ran Xu Yuehong Zhao +3 位作者 Qingzhen Han Xinyu Liu Hongbin Cao Hao Wen 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2018年第7期1570-1580,共11页
A database-based strategy of candidate generation was proposed for molecular design of new de-phenol extractants following the idea of finding new applications of existing commercial compounds. The strategy has the ad... A database-based strategy of candidate generation was proposed for molecular design of new de-phenol extractants following the idea of finding new applications of existing commercial compounds. The strategy has the advantage that the environmental, safety and health risks of candidate compounds are known and controllable. In this work, the Existing Commercial Compounds(ECC) database and special combined search strategy were developed as the base for the proposed CAMD method following such idea, and molecules for phenol extraction used in coking wastewater treatment were selected from the ECC database. The candidate solvents cover the following categories: ketones, esters, ethers, alcohols, anhydrides and benzene compounds, which are consistent with the de-phenol extractants commonly used in the industry or experiment. The compounds with higher partition coefficient and selectivity than widely used methyl isobutyl ketone(MIBK) are mainly ketones. 26 obtained molecules show higher partition coefficient and selectivity than MIBK, which are suggested to be further investigated by experiment. Furthermore, analysis of these potential molecules may present the effective functional groups as the initial group set to generate new molecular structures of de-phenol extractants. The results show that the proposed method enables us to efficiently generate chemicals with benefits of less time, less economical cost, and known environmental impact as well. 展开更多
关键词 Existing commercial compounds database De-phenol extractant Database-based generation strategy Environmental risk
下载PDF
Time-Domain Analysis of Body Freedom Flutter Based on 6DOF Equation
5
作者 Zhehan Ji Tongqing Guo +2 位作者 Di Zhou Zhiliang Lu Binbin Lyu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期489-508,共20页
The reduced weight and improved efficiency of modern aeronautical structures result in a decreasing separation of frequency ranges of rigid and elastic modes.Particularly,a high-aspect-ratio flexible flying wing is pr... The reduced weight and improved efficiency of modern aeronautical structures result in a decreasing separation of frequency ranges of rigid and elastic modes.Particularly,a high-aspect-ratio flexible flying wing is prone to body freedomflutter(BFF),which is a result of coupling of the rigid body short-periodmodewith 1st wing bendingmode.Accurate prediction of the BFF characteristics is helpful to reflect the attitude changes of the vehicle intuitively and design the active flutter suppression control law.Instead of using the rigid body mode,this work simulates the rigid bodymotion of the model by using the six-degree-of-freedom(6DOF)equation.A dynamicmesh generation strategy particularly suitable for BFF simulation of free flying aircraft is developed.An accurate Computational Fluid Dynamics/Computational Structural Dynamics/six-degree-of-freedom equation(CFD/CSD/6DOF)-based BFF prediction method is proposed.Firstly,the time-domain CFD/CSD method is used to calculate the static equilibrium state of the model.Based on this state,the CFD/CSD/6DOF equation is solved in time domain to evaluate the structural response of themodel.Then combinedwith the variable stiffnessmethod,the critical flutter point of the model is obtained.This method is applied to the BFF calculation of a flyingwing model.The calculation results of the BFF characteristics of the model agree well with those fromthe modalmethod andNastran software.Finally,the method is used to analyze the influence factors of BFF.The analysis results show that the flutter speed can be improved by either releasing plunge constraint or moving the center ofmass forward or increasing the pitch inertia. 展开更多
关键词 Body freedom flutter time-domain CFD/CSD/6DOF method dynamic mesh generation strategy aeroelasticity
下载PDF
Critical Nodes Identification: A Non-Cooperative Method for Unknown Topology Information in Ad Hoc Networks
6
作者 Wenwei Yue Peiang Zuo +4 位作者 Wengang Li Yao Zhang Yunfeng Zhang Changle Li Jun Huang 《China Communications》 SCIE CSCD 2023年第7期217-232,共16页
The foundation of ad hoc networks lies in the guarantee of continuous connectivity.However,critical nodes,whose failure can easily destroy network connectivity,will influence the ad hoc network connectivity significan... The foundation of ad hoc networks lies in the guarantee of continuous connectivity.However,critical nodes,whose failure can easily destroy network connectivity,will influence the ad hoc network connectivity significantly.To protect the network efficiently,critical nodes should be identified accurately and rapidly.Unlike existing critical node identification methods for unknown topology that identify critical nodes according to historical information,this paper develops a critical node identification method to relax the prior topology information condition about critical nodes.Specifically,we first deduce a theorem about the minimum communication range for a node through the number of nodes and deployment ranges,and prove the universality of the theorem in a realistic two-dimensional scenario.After that,we analyze the relationship between communication range and degree value for each node and prove that the greater number of nodes within the communication range of a node,the greater degree value of nodes with high probability.Moreover,we develop a novel strategy to improve the accuracy of critical node identification without topology information.Finally,simulation results indicate the proposed strategy can achieve high accuracy and low redundancy while ensuring low time consumption in the scenarios with unknown topology information in ad hoc networks. 展开更多
关键词 Ad hoc networks node location informa-tion ID generation strategy communication range critical nodes
下载PDF
Evaluation of effectiveness of three fuzzy systems and three texture extraction methods for building damage detection from post-event LiDAR data 被引量:2
7
作者 Milad Janalipour Ali Mohammadzadeh 《International Journal of Digital Earth》 SCIE EI 2018年第12期1241-1268,共28页
Building damage maps after disasters can help us to better manage the rescue operations.Researchers have used Light Detection and Ranging(LiDAR)data for extracting the building damage maps.For producing building damag... Building damage maps after disasters can help us to better manage the rescue operations.Researchers have used Light Detection and Ranging(LiDAR)data for extracting the building damage maps.For producing building damage maps from LiDAR data in a rapid manner,it is necessary to understand the effectiveness of features and classifiers.However,there is no comprehensive study on the performance of features and classifiers in identifying damaged areas.In this study,the effectiveness of three texture extraction methods and three fuzzy systems for producing the building damage maps was investigated.In the proposed method,at first,a pre-processing stage was utilized to apply essential processes on post-event LiDAR data.Second,textural features were extracted from the pre-processed LiDAR data.Third,fuzzy inference systems were generated to make a relation between the extracted textural features of buildings and their damage extents.The proposed method was tested across three areas over the 2010 Haiti earthquake.Three building damage maps with overall accuracies of 75.0%,78.1%and 61.4%were achieved.Based on outcomes,the fuzzy inference systems were stronger than random forest,bagging,boosting and support vector machine classifiers for detecting damaged buildings. 展开更多
关键词 ANFIS model backpropagation learning building damage detection fuzzy system generation strategies LIDAR texture analysis
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部