期刊文献+
共找到18篇文章
< 1 >
每页显示 20 50 100
基于复算性热、动力计算的往复式压缩机参数分析 被引量:3
1
作者 李锦龙 冯乐军 +2 位作者 宫兰华 马平定 田兰君 《石油化工设备》 CAS 2012年第5期81-85,共5页
介绍了压缩机复算性热、动力计算方法,针对往复式压缩机在运行中气阀和磨损类故障频发问题,以某炼油厂航煤加氢装置的2HA/2往复式压缩机和PSA装置的4M20-177/22-BX往复式压缩机为例,采用该方法计算并结合热、动力运行参数分析故障原因,... 介绍了压缩机复算性热、动力计算方法,针对往复式压缩机在运行中气阀和磨损类故障频发问题,以某炼油厂航煤加氢装置的2HA/2往复式压缩机和PSA装置的4M20-177/22-BX往复式压缩机为例,采用该方法计算并结合热、动力运行参数分析故障原因,判断压缩机是否能满足现有工况,说明其有效性。 展开更多
关键词 往复式压缩机 复算热力计算 动力计算 参数分析
下载PDF
往复式压缩机复算性热、动力计算程序开发及应用
2
作者 余永增 《液压气动与密封》 2018年第12期70-73,共4页
针对往复式压缩机在运行中气阀和磨损类故障频发问题,设计了压缩机复算性热、动力计算方法,开发了复算性热、动力计算程序,以某炼厂航煤加氢装置的两台2HA/2往复式压缩机实例验证所开发程序计算的准确性和有效性。
关键词 往复式压缩机 复算热力计算 动力计算 VB程序
下载PDF
往复式压缩机热力计算的程序研究
3
作者 杜虹 巴鹏 《通用机械》 2005年第12期70-73,共4页
热力计算是往复武压缩机的基础。通过对传统计算方法的改进,编制了热力计算程序,成功简化了往复武压缩机的常规热力学计算、复算性计算和动力学计算过程,提高了计算参数的准确性和可靠性。
关键词 热力计算 复算性计算 动力计算
下载PDF
4M20-177/22-BX型压缩机电流波动故障分析及改进
4
作者 刘立平 余永增 +2 位作者 卢世忠 王星联 尹金明 《自动化与仪器仪表》 2014年第3期56-57,共2页
对某厂PSA装置4M20-177/22-BX产品气往复式压缩机电机电流波动、上量不好等故障现象及拆检状况进行详细阐述,对压缩机所有设计参数进行热、动力计算核算,进而对不同负荷下压缩机现有工况进行校核性热动力计算,结合计算结果及拆检情况分... 对某厂PSA装置4M20-177/22-BX产品气往复式压缩机电机电流波动、上量不好等故障现象及拆检状况进行详细阐述,对压缩机所有设计参数进行热、动力计算核算,进而对不同负荷下压缩机现有工况进行校核性热动力计算,结合计算结果及拆检情况分析故障产生的根本原因,最后提出改进措施。 展开更多
关键词 PSA装置 往复式压缩机 电流波动 复算热力计算 动力计算
下载PDF
NBXD-A螺杆转子的铣刀刃形设计
5
作者 董瑞兵 俞论 刘扬娟 《压缩机技术》 2006年第3期13-17,43,共6页
利用铣刀回转曲面与NBXD-A螺杆螺旋齿面相切的原理,推导出它们的接触方程,用数值法解接触方程,求铣刀刃形。然后,选取转子端面型线的坐标和空间接触线的坐标来校核铣刀坐标。
关键词 螺杆压缩机 铣刀刃形 接触条件 安装角 复算性计算
下载PDF
A Concise Joint Transmit/Receive Antenna Selection Algorithm 被引量:4
6
作者 王俊岭 Ana Isabel Pérez-Neira 高梅国 《China Communications》 SCIE CSCD 2013年第3期91-99,共9页
For reducing the computational complexity of the problem of joint transmit and receive antenna selection in Multiple-Input-Multiple-Output (MIMO) systems, we present a concise joint transmit/receive antenna selection ... For reducing the computational complexity of the problem of joint transmit and receive antenna selection in Multiple-Input-Multiple-Output (MIMO) systems, we present a concise joint transmit/receive antenna selection algorithm. Using a novel partition of the channel matrix, we drive a concise formula. This formula enables us to augment the channel matrix in such a way that the computational complexity of the greedy Joint Transmit/Receive Antenna Selection (JTRAS) algorithm is reduced by a factor of 4n L , where n L is the number of selected antennas. A decoupled version of the proposed algorithm is also proposed to further improve the efficiency of the JTRAS algorithm, with some capacity degradation as a tradeoff. The computational complexity and the performance of the proposed approaches are evaluated mathematically and verified by computer simulations. The results have shown that the proposed joint antenna selection algorithm maintains the capacity perormance of the JTRAS algorithm while its computational complexity is only 1/4n L of that of the JTRAS algorithm. The decoupled version of the proposed algorithm further reduces the computational complexity of the joint antenna selection and has better performance than other decoupling-based algorithms when the selected antenna subset is small as compared to the total number of antennas. 展开更多
关键词 MIMO systems antenna selection channel capacity
下载PDF
VOICE ACTIVITY DETECTION UNDER RAYLEIGH DISTRIBUTION 被引量:1
7
作者 Li Yu Chen Jianming Tan Hongzhou 《Journal of Electronics(China)》 2009年第4期552-556,共5页
This paper presents an improved Voice Activity Detection (VAD) algorithm which uses the Signal-to-Noise Ratio (SNR) measure. We assume that noise Power Spectral Density (PSD) in each spectral bin follows a Rayle... This paper presents an improved Voice Activity Detection (VAD) algorithm which uses the Signal-to-Noise Ratio (SNR) measure. We assume that noise Power Spectral Density (PSD) in each spectral bin follows a Rayleigh distribution. Rayleigh distributions with its asymmetric tail characteristics give a better description of the noise PSD distribution than Gaussian distribution. Under this asstlmption, a new threshold updating expression is derived. Since the analytical integral of the false alarm probability, the threshold updating expression can be represented without the inverse complementary error function and low computational complexity is achieved in our system. Experimental results show that the proposed VAD outperforms or at least is comparable with the VAD scheme presented by Davis under several noise environments and has a lower computational complexity. 展开更多
关键词 Statistical Voice Activity Detection (VAD) Threshold update Rayleigh distribution Computational complexity
下载PDF
Multi-Bit Sliding Stack Decoding Algorithm for OVXDM 被引量:3
8
作者 peng lin yafeng wang daoben li 《China Communications》 SCIE CSCD 2018年第4期179-191,共13页
Overlapped x domain multiplexing(OVXDM) is a promising encoding technique to obtain high spectral efficiency by utilizing inter-symbol interference(ISI) intelligently. However, the computational complexity of maximum ... Overlapped x domain multiplexing(OVXDM) is a promising encoding technique to obtain high spectral efficiency by utilizing inter-symbol interference(ISI) intelligently. However, the computational complexity of maximum likelihood sequence detection(MLSD) increases exponentially with the growth of spectral efficiency in OVXDM, which is unbearable for practical implementations. In this paper, based on a novel path metric associating adjacent symbols, we propose a multi-bit sliding stack decoding(Multi-Bit SSD) algorithm to achieve multiple-bit decoding simultaneously in OVXDM. Theoretical analysis is provided for the algorithm, which indicates the relationship between the performance and parameters including multiplexing waveform, overlapping fold and sliding window size. Simulation results show that the proposed algorithm can achieve better decoding performance and higher spectral efficiency than conventional fast decoding algorithms. 展开更多
关键词 overlapped multiplexing princi-ple maximum likelihood (ML) rule spectralefficiency bit error rate (BER).
下载PDF
A novel maneuvering multi-target tracking algorithm based on multiple model particle filter in clutters 被引量:2
9
作者 胡振涛 Pan Quan Yang Feng 《High Technology Letters》 EI CAS 2011年第1期19-24,共6页
To solve the problem of strong nonlinear and motion model switching of maneuvering target tracking system in clutter environment, a novel maneuvering multi-target tracking algorithm based on multiple model particle fi... To solve the problem of strong nonlinear and motion model switching of maneuvering target tracking system in clutter environment, a novel maneuvering multi-target tracking algorithm based on multiple model particle filter is presented in this paper. The algorithm realizes dynamic combination of multiple model particle filter and joint probabilistic data association algorithm. The rapid expan- sion of computational complexity, caused by the simple combination of the interacting multiple model algorithm and particle filter is solved by introducing model information into the sampling process of particle state, and the effective validation and utilization of echo is accomplished by the joint proba- bilistic data association algorithm. The concrete steps of the algorithm are given, and the theory analysis and simulation results show the validity of the method. 展开更多
关键词 maneuvering multi-target tracking multiple model particle filter interacting multiple model IMM) joint probabilistic data association
下载PDF
An algorithm for moving target detection in IR image based on grayscale distribution and kernel function 被引量:6
10
作者 王鲁平 张路平 +1 位作者 赵明 李飚 《Journal of Central South University》 SCIE EI CAS 2014年第11期4270-4278,共9页
A fast algorithm based on the grayscale distribution of infrared target and the weighted kernel function was proposed for the moving target detection(MTD) in dynamic scene of image series. This algorithm is used to de... A fast algorithm based on the grayscale distribution of infrared target and the weighted kernel function was proposed for the moving target detection(MTD) in dynamic scene of image series. This algorithm is used to deal with issues like the large computational complexity, the fluctuation of grayscale, and the noise in infrared images. Four characteristic points were selected by analyzing the grayscale distribution in infrared image, of which the series was quickly matched with an affine transformation model. The image was then divided into 32×32 squares and the gray-weighted kernel(GWK) for each square was calculated. At last, the MTD was carried out according to the variation of the four GWKs. The results indicate that the MTD can be achieved in real time using the algorithm with the fluctuations of grayscale and noise can be effectively suppressed. The detection probability is greater than 90% with the false alarm rate lower than 5% when the calculation time is less than 40 ms. 展开更多
关键词 moving target detection gray-weighted kernel function dynamic background
下载PDF
Preventing“Bad”Content Dispersal in Named Data Networking 被引量:2
11
作者 Yi Wang Zhuyun Qi Bin Liu 《China Communications》 SCIE CSCD 2018年第6期109-119,共11页
Named Data Networking(NDN)improves the data delivery efficiency by caching contents in routers. To prevent corrupted and faked contents be spread in the network,NDN routers should verify the digital signature of each ... Named Data Networking(NDN)improves the data delivery efficiency by caching contents in routers. To prevent corrupted and faked contents be spread in the network,NDN routers should verify the digital signature of each published content. Since the verification scheme in NDN applies the asymmetric encryption algorithm to sign contents,the content verification overhead is too high to satisfy wire-speed packet forwarding. In this paper, we propose two schemes to improve the verification performance of NDN routers to prevent content poisoning. The first content verification scheme, called "user-assisted",leads to the best performance, but can be bypassed if the clients and the content producer collude. A second scheme, named ``RouterCooperation ‘', prevents the aforementioned collusion attack by making edge routers verify the contents independently without the assistance of users and the core routers no longer verify the contents. The Router-Cooperation verification scheme reduces the computing complexity of cryptographic operation by replacing the asymmetric encryption algorithm with symmetric encryption algorithm.The simulation results demonstrate that this Router-Cooperation scheme can speed up18.85 times of the original content verification scheme with merely extra 80 Bytes transmission overhead. 展开更多
关键词 named data networking ROUTER content verification encryption algorithm
下载PDF
NEW FAST ALGORITHM FOR 2-D ANGLE-OF-ARRIVAL ESTIMATION
12
作者 Wang Hongyang Liao Guisheng Wu Yuntao 《Journal of Electronics(China)》 2005年第5期465-469,共5页
Based on propagator method, a fast 2-D Angle-Of-Arrival (AOA) algorithm is proPosed in this paper. The proposed algorithm does not need the Eigen-Value Decomposition (EVD) or Singular Value Decomposition (SVD) of the ... Based on propagator method, a fast 2-D Angle-Of-Arrival (AOA) algorithm is proPosed in this paper. The proposed algorithm does not need the Eigen-Value Decomposition (EVD) or Singular Value Decomposition (SVD) of the Sample Covariance Matrix (SCM), thus the fast algorithm has lower computational complexity with insignificant performance degradation when comparing with conventional subspace approaches. Furthermore, the proposed algorithm has no performance degradation. Finally, computer simulations verify the effectiveness of the proposed algorithm. 展开更多
关键词 Angle-Of-Arrival(AOA) Computational complexity Subspace approach
下载PDF
HASM-AD Algorithm Based on the Sequential Least Squares
13
作者 WANG Shihai YUE Tianxiang 《Geo-Spatial Information Science》 2010年第4期285-293,共9页
The HASM(high accuracy surface modeling) technique is based on the fundamental theory of surfaces,which has been proved to improve the interpolation accuracy in surface fitting.However,the integral iterative solution ... The HASM(high accuracy surface modeling) technique is based on the fundamental theory of surfaces,which has been proved to improve the interpolation accuracy in surface fitting.However,the integral iterative solution in previous studies resulted in high temporal complexity in computation and huge memory usage so that it became difficult to put the technique into application,especially for large-scale datasets.In the study,an innovative model(HASM-AD) is developed according to the sequential least squares on the basis of data adjustment theory.Sequential division is adopted in the technique,so that linear equations can be divided into groups to be processed in sequence with the temporal complexity reduced greatly in computation.The experiment indicates that the HASM-AD technique surpasses the traditional spatial interpolation methods in accuracy.Also,the cross-validation result proves the same conclusion for the spatial interpolation of soil PH property with the data sampled in Jiangxi province.Moreover,it is demonstrated in the study that the HASM-AD technique significantly reduces the computational complexity and lessens memory usage in computation. 展开更多
关键词 surface modeling HASM spatial interpolation sequential least squares
原文传递
Computing Sparse GCD of Multivariate Polynomials via Polynomial Interpolation
14
作者 TANG Min LI Bingyu ZENG Zhenbing 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2018年第2期552-568,共17页
The problem of computing the greatest common divisor(GCD) of multivariate polynomials, as one of the most important tasks of computer algebra and symbolic computation in more general scope, has been studied extensiv... The problem of computing the greatest common divisor(GCD) of multivariate polynomials, as one of the most important tasks of computer algebra and symbolic computation in more general scope, has been studied extensively since the beginning of the interdisciplinary of mathematics with computer science. For many real applications such as digital image restoration and enhancement,robust control theory of nonlinear systems, L1-norm convex optimization in compressed sensing techniques, as well as algebraic decoding of Reed-Solomon and BCH codes, the concept of sparse GCD plays a core role where only the greatest common divisors with much fewer terms than the original polynomials are of interest due to the nature of problems or data structures. This paper presents two methods via multivariate polynomial interpolation which are based on the variation of Zippel's method and Ben-Or/Tiwari algorithm, respectively. To reduce computational complexity, probabilistic techniques and randomization are employed to deal with univariate GCD computation and univariate polynomial interpolation. The authors demonstrate the practical performance of our algorithms on a significant body of examples. The implemented experiment illustrates that our algorithms are efficient for a quite wide range of input. 展开更多
关键词 Ben-Or/Tiwari algorithm multivariate polynomial interpolation sparse GCD Zippel's algorithm.
原文传递
Mesh parameterization based on edge collapse
15
作者 Jiang QIAN Xiu-zi YE +1 位作者 Cui-hao FANG San-yuan ZHANG 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2009年第8期1153-1159,共7页
Parameterizations that use mesh simplification to build the base domain always adopt the vertex removal scheme.This paper applies edge collapse to constructing the base domain instead.After inducing the parameterizati... Parameterizations that use mesh simplification to build the base domain always adopt the vertex removal scheme.This paper applies edge collapse to constructing the base domain instead.After inducing the parameterization of the original mesh over the base domain,new algorithms map the new vertices in the simplified mesh back to the original one according to the edge transition sequence to integrate the parameterization.We present a direct way,namely edge classification,to deduce the sequence.Experimental results show that the new parameterization features considerable saving in computing complexity and maintains smoothness. 展开更多
关键词 Edge collapse Vertex removal MAPPING Edge classification
原文传递
Grid Methods in Computational Real Algebraic (and Semialgebraic) Geometry
16
作者 felipe cucker 《Chinese Annals of Mathematics,Series B》 SCIE CSCD 2018年第2期373-396,共24页
In recent years, a family of numerical algorithms to solve problems in real algebraic and semialgebraic geometry has been slowly growing. Unlike their counterparts in symbolic computation they are numerically stable. ... In recent years, a family of numerical algorithms to solve problems in real algebraic and semialgebraic geometry has been slowly growing. Unlike their counterparts in symbolic computation they are numerically stable. But their complexity analysis, based on the condition of the data, is radically different from the usual complexity analysis in symbolic computation as these numerical algorithms may run forever on a thin set of ill-posed inputs. 展开更多
关键词 Numerical algorithms COMPLEXITY Condition Semialgebraic geometry
原文传递
Greedy Algorithm Computing Minkowski Reduced Lattice Bases with Quadratic Bit Complexity of Input Vectors
17
作者 Hao CHEN Liqing XU 《Chinese Annals of Mathematics,Series B》 SCIE CSCD 2011年第6期857-862,共6页
The authors present an algorithm which is a modilication of the Nguyen-Stenle greedy reduction algorithm due to Nguyen and Stehle in 2009. This algorithm can be used to compute the Minkowski reduced lattice bases for ... The authors present an algorithm which is a modilication of the Nguyen-Stenle greedy reduction algorithm due to Nguyen and Stehle in 2009. This algorithm can be used to compute the Minkowski reduced lattice bases for arbitrary rank lattices with quadratic bit complexity on the size of the input vectors. The total bit complexity of the algorithm is O(n^2·(4n!)^n·(n!/2^n)^n/2·(4/3)^n(n-1)/2).log^2 A)where n is the rank of the lattice and A is maximal norm of the input base vectors. This is an O(log^2 A) algorithm which can be used to compute Minkowski reduced bases for the fixed rank lattices. A time complexity n!. 3n(log A)^O(1) algorithm which can be used to compute the successive minima with the help of the dual Hermite-Korkin-Zolotarev base was given by Blomer in 2000 and improved to the time complexity n!- (log A)^O(1) by Micciancio in 2008. The algorithm in this paper is more suitable for computing the Minkowski reduced bases of low rank lattices with very large base vector sizes. 展开更多
关键词 LATTICE Successive minima Minkowski reduced bases Greedy reduction
原文传递
On the complexity of average path length for biological networks and patterns
18
作者 Waqar Asif Hassaan Khaliq Qureshi +1 位作者 Adnan Iqbal Muttukrishnan Rajarajan 《International Journal of Biomathematics》 2014年第4期51-61,共11页
Path length calculation is a frequent requirement in studies related to graph theoretic problems such as genetics. Standard method to calculate average path length (APL) of a graph requires traversing all nodes in t... Path length calculation is a frequent requirement in studies related to graph theoretic problems such as genetics. Standard method to calculate average path length (APL) of a graph requires traversing all nodes in the graph repeatedly, which is computationally expensive for graphs containing large number of nodes. We propose a novel method to calculate APL for graphs commonly required in the studies of genetics. The proposed method is computationally less expensive and less time-consuming compared to standard method. 展开更多
关键词 REDUCTIONISM average path length protein protein interaction.
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部