期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
Series-parallel Hybrid Vehicle Control Strategy Design and Optimization Using Real-valued Genetic Algorithm 被引量:14
1
作者 XIONG Weiwei YIN Chengliang ZHANG Yong ZHANG Jianlong 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2009年第6期862-868,共7页
Despite the series-parallel hybrid electric vehicle inherits the performance advantages from both series and parallel hybrid electric vehicle, few researches about the series-parallel hybrid electric vehicle have been... Despite the series-parallel hybrid electric vehicle inherits the performance advantages from both series and parallel hybrid electric vehicle, few researches about the series-parallel hybrid electric vehicle have been revealed because of its complex co nstruction and control strategy. In this paper, a series-parallel hybrid electric bus as well as its control strategy is revealed, and a control parameter optimization approach using the real-valued genetic algorithm is proposed. The optimization objective is to minimize the fuel consumption while sustain the battery state of charge, a tangent penalty function of state of charge(SOC) is embodied in the objective function to recast this multi-objective nonlinear optimization problem as a single linear optimization problem. For this strategy, the vehicle operating mode is switched based on the vehicle speed, and an "optimal line" typed strategy is designed for the parallel control. The optimization parameters include the speed threshold for mode switching, the highest state of charge allowed, the lowest state of charge allowed and the scale factor of the engine optimal torque to the engine maximum torque at a rotational speed. They are optimized through numerical experiments based on real-value genes, arithmetic crossover and mutation operators. The hybrid bus has been evaluated at the Chinese Transit Bus City Driving Cycle via road test, in which a control area network-based monitor system was used to trace the driving schedule. The test result shows that this approach is feasible for the control parameter optimization. This approach can be applied to not only the novel construction presented in this paper, but also other types of hybrid electric vehicles. 展开更多
关键词 series-parallel hybrid electric vehicle control strategy DESIGN OPTIMIZATION real-valued genetic algorithm
下载PDF
A self region based real-valued negative selection algorithm 被引量:1
2
作者 张凤斌 王大伟 王胜文 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2008年第6期851-855,共5页
Point-wise negative selection algorithms,which generate their detector sets based on point of self data,have lower training efficiency and detection rate.To solve this problem,a self region based real-valued negative ... Point-wise negative selection algorithms,which generate their detector sets based on point of self data,have lower training efficiency and detection rate.To solve this problem,a self region based real-valued negative selection algorithm is presented.In this new approach,the continuous self region is defined by the collection of self data,the partial training takes place at the training stage according to both the radius of self region and the cosine distance between gravity of the self region and detector candidate,and variable detectors in the self region are deployed.The algorithm is tested using the triangle shape of self region in the 2-D complement space and KDD CUP 1999 data set.Results show that,more information can be provided when the training self points are used together as a whole,and compared with the point-wise negative selection algorithm,the new approach can improve the training efficiency of system and the detection rate significantly. 展开更多
关键词 artificial immune real-valued negative selection cluster analysis self region partial training
下载PDF
Real-valued multi-area self set optimization in immunity-based network intrusion detection system 被引量:1
3
作者 Zhang Fengbin Xi Liang Wang Shengwen 《High Technology Letters》 EI CAS 2012年第1期1-6,共6页
The real-valued self set in immunity-based network intrusion detection system (INIDS) has some defects: multi-area and overlapping, which are ignored before. The detectors generated by this kind of self set may hav... The real-valued self set in immunity-based network intrusion detection system (INIDS) has some defects: multi-area and overlapping, which are ignored before. The detectors generated by this kind of self set may have the problem of boundary holes between self and nonself regions, and the generation efficiency is low, so that, the self set needs to be optimized before generation stage. This paper proposes a self set optimization algorithm which uses the modified clustering algorithm and Gaussian distribution theory. The clustering deals with multi-area and the Gaussian distribution deals with the overlapping. The algorithm was tested by Iris data and real network data, and the results show that the optimized self set can solve the problem of boundary holes, increase the efficiency of detector generation effectively, and improve the system's detection rate. 展开更多
关键词 immunity-based network intrusion detection system (NIDS) real-valued self set OPTIMIZATION
下载PDF
Computationally efficient direction finding using polynomial rooting with reduced-order and real-valued computations 被引量:3
4
作者 Fenggang Yan Yi Shen +1 位作者 Ming Jin Xiaolin Qiao 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第4期739-745,共7页
The root multiple signal classification(root-MUSIC) algorithm is one of the most important techniques for direction of arrival(DOA) estimation. Using a uniform linear array(ULA) composed of M sensors, this metho... The root multiple signal classification(root-MUSIC) algorithm is one of the most important techniques for direction of arrival(DOA) estimation. Using a uniform linear array(ULA) composed of M sensors, this method usually estimates L signal DOAs by finding roots that lie closest to the unit circle of a(2M-1)-order polynomial, where L 〈 M. A novel efficient root-MUSIC-based method for direction estimation is presented, in which the order of polynomial is efficiently reduced to 2L. Compared with the unitary root-MUSIC(U-root-MUSIC) approach which involves real-valued computations only in the subspace decomposition stage, both tasks of subspace decomposition and polynomial rooting are implemented with real-valued computations in the new technique,which hence shows a significant efficiency advantage over most state-of-the-art techniques. Numerical simulations are conducted to verify the correctness and efficiency of the new estimator. 展开更多
关键词 direction-of-arrival(DOA) estimation root multiple signal classification(root-MUSIC) real-valued computations reduced-order
下载PDF
Real-Valued Discrete Gabor Transform of Linear Time-Varying Systems: Exact Representation and Approximation
5
作者 陶亮 罗斌 《Journal of Electronic Science and Technology of China》 2005年第1期1-5,共5页
An efficient algorithm for the representation and approximation of linear time-varying systems is presented via the fast real-valued discrete Gabor transform. Compared with the existing algorithm based on the traditio... An efficient algorithm for the representation and approximation of linear time-varying systems is presented via the fast real-valued discrete Gabor transform. Compared with the existing algorithm based on the traditional complex-valued discrete Gabor transform, the proposed algorithm runs faster, can more easily be implemented in software or hardware, and leads to a more compact representation. Simulation results are given for demonstration. 展开更多
关键词 Gabor transforms real-valued discrete Gabor transforms kernel representation linear time-varying systems
下载PDF
2-D Direction-of-arrival Estimation of Real-valued Sources
6
作者 顾建峰 魏平 《Journal of Electronic Science and Technology of China》 2006年第3期265-268,共4页
A new method is presented to estimate two-dimensional (2-D) Direction-of-Arrival (DOA) angles of narrowband real-valued signals impinging on a L-shape Arrays(LA). The basic idea of the proposed method is to incr... A new method is presented to estimate two-dimensional (2-D) Direction-of-Arrival (DOA) angles of narrowband real-valued signals impinging on a L-shape Arrays(LA). The basic idea of the proposed method is to increase both the effective aperture size and the number of sensors by employing the conjugate invariance property of real-valued signals. Thus, the proposed method can provide a more precise DOA and detect more signals than the Cross-Correlation Matrix Method (CCMM). Numerical simulation results are presented to support the theory. 展开更多
关键词 real-valued signals Direction of Arrival (DOA) L-shape Arrays (LA)
下载PDF
重瓣茶花‘红十八学士’MADS-box家族B-function基因序列分析与原核表达 被引量:4
7
作者 朱高浦 李纪元 +4 位作者 范正琪 倪穗 李辛雷 周兴文 孙迎坤 《热带作物学报》 CSCD 北大核心 2012年第6期1077-1083,共7页
对山茶重瓣花‘红十八学士’(Camellia japonica‘Hong Shibaxueshi’)中的4个B类功能基因构建了系统进化树,预测了其蛋白结构,并构建了相应的原核表达载体。生物信息学分析结果表明:4个基因分属3个亚家族,其中CjHGLO1和CjHGLO2属PI亚家... 对山茶重瓣花‘红十八学士’(Camellia japonica‘Hong Shibaxueshi’)中的4个B类功能基因构建了系统进化树,预测了其蛋白结构,并构建了相应的原核表达载体。生物信息学分析结果表明:4个基因分属3个亚家族,其中CjHGLO1和CjHGLO2属PI亚家族,CjHTM6属TM6-like亚家族,CjHDEF属AP3亚家族;4个基因的编码蛋白均为不稳定蛋白,均无信号肽存在;其蛋白二、三级结构均以α-螺旋为主,其次是无规则卷曲,然后以延伸链三种构象形式存在;分析的特定位点中磷酸化位点数量最多,尤其是蛋白激酶C磷酸化位点最多。原核表达实验结果显示:当IPTG浓度在0.2 mmol/L、30℃、经1 h诱导CjHGLO1蛋白可获表达;当IPTG浓度在0.1 mmol/L、30℃、诱导1.5 h CjHGLO2蛋白可获表达;当IPTG浓度在0.5 mmol/L、16℃、过夜(>16 h)诱导CjHDEF蛋白可获表达;当IPTG浓度在0.3 mmol/L、20℃、诱导5 h CjHTM6蛋白可获表达。这些研究为山茶B-function基因的更深入研究奠定了基础。 展开更多
关键词 重瓣 山茶花 b-function基因 生物信息学分析 原核表达
下载PDF
Intelligibility evaluation of enhanced whisper in joint time-frequency domain 被引量:1
8
作者 周健 魏昕 +1 位作者 梁瑞宇 赵力 《Journal of Southeast University(English Edition)》 EI CAS 2014年第3期261-266,共6页
Some factors influencing the intelligibility of the enhanced whisper in the joint time-frequency domain are evaluated. Specifically, both the spectrum density and different regions of the enhanced spectrum are analyze... Some factors influencing the intelligibility of the enhanced whisper in the joint time-frequency domain are evaluated. Specifically, both the spectrum density and different regions of the enhanced spectrum are analyzed. Experimental results show that for a spectrum of some density, the joint time-frequency gain-modification based speech enhancement algorithm achieves significant improvement in intelligibility. Additionally, the spectrum region where the estimated spectrum is smaller than the clean spectrum, is the most important region contributing to intelligibility improvement for the enhanced whisper. The spectrum region where the estimated spectrum is larger than twice the size of the clean spectrum is detrimental to speech intelligibility perception within the whisper context. 展开更多
关键词 whispered speech enhancement intelligibilityevaluation real-valued discrete Gabor transform joint time-frequency analysis
下载PDF
Linear Prolate Functions for Signal Extrapolation with Time Shift
9
作者 Daniela Valente Michael Cada Jacek Ilow 《Applied Mathematics》 2017年第4期417-427,共11页
We propose a low complexity iterative algorithm for band limited signal extrapolation. The extrapolation method is based on the decomposition of finite segments of the signal via truncated series of real-valued linear... We propose a low complexity iterative algorithm for band limited signal extrapolation. The extrapolation method is based on the decomposition of finite segments of the signal via truncated series of real-valued linear prolate functions. Our theoretical derivation shows that given a truncated series (up to a selectable value) of prolate functions, it is possible to extrapolate the band limited function elsewhere if each extrapolated portion of the function is subject only to moderate truncation errors that we quantify in this paper. The effects of different sources of errors have been analyzed via extensive simulations. We have investigated a property of the signal decomposition formula based on linear prolate functions whereby the integration interval does not need to be symmetric with respect to the origin while time-shifted prolate functions are used in the series. 展开更多
关键词 real-valued BAND LIMITED EIGENVECTORS SIGNAL Decomposition SIGNAL EXTRAPOLATION
下载PDF
A FRAMEWORK FOR REAL-VALUED CIPHER SYSTEMS
10
作者 Zhaozhi ZHANG Nan JIANG 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2007年第4期486-491,共6页
Most cipher systems designed thus far are binary-valued or integer-valued cipher systems. Their security relies on the assumption that one-way functions exist. Though the existence of one-way functions has not been pr... Most cipher systems designed thus far are binary-valued or integer-valued cipher systems. Their security relies on the assumption that one-way functions exist. Though the existence of one-way functions has not been proved yet, most cryptographic researchers believe that one-way functions exist. In addition, many candidates for one-way functions have been proposed. Therefore, the key step for developing real-valued cipher systems is to define real one-way functions and to propose candidates for them. In this paper, based on computational complexity theory over the real field, we give two definitions of real one-way functions; one is for digital one-way functions and the other is for general one-way functions. Candidates for these two classes of one-way functions are also proposed. Moreover, we present two examples to demonstrate that the candidates for both digital one-way functions and general one-way functions can be applied to construct secure real-valued cipher systems. 展开更多
关键词 Computational complexity theory digital one-way function general one-way function real-valued cipher system.
原文传递
Hybrid Methodology for Structural Health Monitoring Based on Immune Algorithms and Symbolic Time Series Analysis
11
作者 Rongshuai Li Akira Mita Jin Zhou 《Journal of Intelligent Learning Systems and Applications》 2013年第1期48-56,共9页
This hybrid methodology for structural health monitoring (SHM) is based on immune algorithms (IAs) and symbolic time series analysis (STSA). Real-valued negative selection (RNS) is used to detect damage detection and ... This hybrid methodology for structural health monitoring (SHM) is based on immune algorithms (IAs) and symbolic time series analysis (STSA). Real-valued negative selection (RNS) is used to detect damage detection and adaptive immune clonal selection algorithm (AICSA) is used to localize and quantify the damage. Data symbolization by using STSA alleviates the effects of harmful noise in raw acceleration data. This paper explains the mathematical basis of STSA and the procedure of the hybrid methodology. It also describes the results of an simulation experiment on a five-story shear frame structure that indicated the hybrid strategy can efficiently and precisely detect, localize and quantify damage to civil engineering structures in the presence of measurement noise. 展开更多
关键词 Structural Health Monitoring Adaptive IMMUNE CLONAL SELECTION Algorithm SYMBOLIC Time Series Analysis real-valued Negative SELECTION Building Structures
下载PDF
Image Encryption Algorithm Based on Compressive Sensing and Fractional DCT via Polynomial Interpolation 被引量:1
12
作者 Ya-Ru Liang Zhi-Yong Xiao 《International Journal of Automation and computing》 EI CSCD 2020年第2期292-304,共13页
Based on compressive sensing and fractional discrete cosine transform(DCT)via polynomial interpolation(PI-FrDCT),an image encryption algorithm is proposed,in which the compression and encryption of an image are accomp... Based on compressive sensing and fractional discrete cosine transform(DCT)via polynomial interpolation(PI-FrDCT),an image encryption algorithm is proposed,in which the compression and encryption of an image are accomplished simultaneously.It can keep information secret more effectively with low data transmission.Three-dimensional piecewise and nonlinear chaotic maps are employed to obtain a generating sequence and the exclusive OR(XOR)matrix,which greatly enlarge the key space of the encryption system.Unlike many other fractional transforms,the output of PI-FrDCT is real,which facilitates the storage,transmission and display of the encrypted image.Due to the introduction of a plain-image-dependent disturbance factor,the initial values and system parameters of the encryption scheme are determined by cipher keys and plain-image.Thus,the proposed encryption scheme is very sensitive to the plain-image,which makes the encryption system more secure.Experimental results demonstrate the validity and the reliability of the proposed encryption algorithm. 展开更多
关键词 Compressive sensing FRACTIONAL discrete COSINE transform(DCT)via polynomial interpolation image encryption threedimensional PIECEWISE and nonlinear chaotic maps real-valued output
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部