期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
通风网络软件解算误差影响因素分析及对策 被引量:1
1
作者 宫良伟 周伟 《科技风》 2015年第18期103-104,共2页
本文提出了影响矿井通风网络软件解算的三个因素:网络结构本身、通风网络解算数学模型和巷道的属性数据,并分析了误差产生的原因和减少误差的对策。
关键词 实际网络图 网络算数学模型 局部阻力
下载PDF
北斗与其他星座在GNSS变形监控系统中的数据对比分析 被引量:3
2
作者 高绍伟 李长青 +2 位作者 郑阔 姜晶 丛嘉志 《测绘通报》 CSCD 北大核心 2017年第4期21-24,43,共5页
以某露天煤矿排土场边坡GNSS变形监测项目为例,在设计变形监测系统的基础上,利用华测HCMonitor变形监测系统专用软件,对监测数据采用不同卫星监测系统数据进行了组合定位,分析和对比了解算数据,探讨了北斗卫星导航系统(BDS)的应用效果... 以某露天煤矿排土场边坡GNSS变形监测项目为例,在设计变形监测系统的基础上,利用华测HCMonitor变形监测系统专用软件,对监测数据采用不同卫星监测系统数据进行了组合定位,分析和对比了解算数据,探讨了北斗卫星导航系统(BDS)的应用效果并提出了合理的建议。 展开更多
关键词 监测系统 组合定位 解算数据
下载PDF
基于轨迹发生器的捷联惯导算法仿真研究 被引量:7
3
作者 罗宇锋 刘勇 《河南理工大学学报(自然科学版)》 CAS 北大核心 2015年第6期867-871,共5页
为了克服基于半实物的捷联惯导算法仿真研究容易受到各种干扰因素影响的缺陷,更好检验仿真性能,提出一种基于轨迹发生器的捷联惯导算法仿真研究方法。通过给出系统结构图,根据任务要求设计出载体的轨迹发生器,从而获得惯性器件和载体导... 为了克服基于半实物的捷联惯导算法仿真研究容易受到各种干扰因素影响的缺陷,更好检验仿真性能,提出一种基于轨迹发生器的捷联惯导算法仿真研究方法。通过给出系统结构图,根据任务要求设计出载体的轨迹发生器,从而获得惯性器件和载体导航参数的输出,进而通过捷联惯导解算得出的解算数据与轨迹发生器的输出数据对比,获得载体输出误差数据。最后,对轨迹发生器和误差数据进行Matlab仿真验证,实验结果表明了该方法的正确性和有效性,达到了检验捷联惯导仿真性能的目的,具有一定工程实际意义。 展开更多
关键词 捷联惯导 轨迹发生器 解算数据 误差数据
下载PDF
关于雷达影像干涉测量的若干理论问题 被引量:6
4
作者 舒宁 《武汉大学学报(信息科学版)》 EI CSCD 北大核心 2001年第2期155-159,共5页
就雷达影像干涉测量的若干理论问题进行了讨论 ,提出了一种高程解算数学模型 ,该模型基于相邻两点对于同一天线的相位差 ,以精确可靠的控制点为出发点 ,可以不必顾及基线估计 ;提出了将控制点影像坐标与卫星位置参量按成像方程进行平差 ... 就雷达影像干涉测量的若干理论问题进行了讨论 ,提出了一种高程解算数学模型 ,该模型基于相邻两点对于同一天线的相位差 ,以精确可靠的控制点为出发点 ,可以不必顾及基线估计 ;提出了将控制点影像坐标与卫星位置参量按成像方程进行平差 ,以保证相位解缠和高程解算对控制点和卫星位置精度的要求 。 展开更多
关键词 雷达干涉测量 高程算数学模型 卫星位置参量 控制点精度 微波遥感
下载PDF
A Symbol Timing Recovery Algorithm of M-PSK Signals for Burst Modem Applications with Small Packet Size 被引量:1
5
作者 Yu Chi Lan Chen Chao Lv 《China Communications》 SCIE CSCD 2016年第6期138-146,共9页
Feedforward symbol timing recovery techniques are particularly important for initial acquisition in burst modems. However, these techniques either have large calculation burden or sensitive to frequency offsets. In th... Feedforward symbol timing recovery techniques are particularly important for initial acquisition in burst modems. However, these techniques either have large calculation burden or sensitive to frequency offsets. In this paper, we proposed an efficient symbol timing recovery algorithm of MPSK signals named OMQ(Ordered Maximum power using Quadratic approximation partially) algorithm which is based on the Quadratic Approximation(QA) algorithm. We used ordered statistic sorting method to reduce the computational complexity further, meanwhile maximum mean power principle was used to decrease frequency offset sensitivity. The proposed algorithm adopts estimation-down sampling structure which is suitable for small packet size transmission. The results show that, while comparing with the QA algorithm, the computational complexity is reduced by 75% at most when 8 samples per symbol are used. The proposed algorithm shows better performance in terms of the jitter variance and sensitivity to frequency offsets. 展开更多
关键词 symbol timing maximum mean power ordered statistic Quadratic Approximation
下载PDF
Determination of metastable zone and induction time of analgin for cooling crystallization 被引量:7
6
作者 Ling Zhou Zhao Wang +3 位作者 Meijing Zhang Mingxia Guo Shijie Xu Qiuxiang Yin 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2017年第3期313-318,共6页
The solubility, metastable zone width, and induction time of analgin for unseeded batch cooling crystallization in ethanol–aqueous system were experimentally determined. The solubility data could be well described by... The solubility, metastable zone width, and induction time of analgin for unseeded batch cooling crystallization in ethanol–aqueous system were experimentally determined. The solubility data could be well described by the van't Hoff equation model. The metastable zone width at various cooling rates was measured, and some parameters of nucleation kinetic were calculated using the Ny'vlt theory. Furthermore, the induction period of various temperatures and supersaturation ratios was also measured. According to classical nucleation theory, some nucleation parameters and interfacial energy was calculated through the induction time(t_(ind)) data. Homogeneous nucleation tended to occur when the supersaturation is high, whereas heterogeneous nucleation was more likely to occur when the supersaturation is low. 展开更多
关键词 ANALGIN Cooling crystallization Primary nucleation Metastable zone Induction time
下载PDF
Random seismic noise attenuation by learning-type overcomplete dictionary based on K-singular value decomposition algorithm 被引量:2
7
作者 XU Dexin HAN Liguo +1 位作者 LIU Dongyu WEI Yajie 《Global Geology》 2016年第1期55-60,共6页
The transformation of basic functions is one of the most commonly used techniques for seismic denoising,which employs sparse representation of seismic data in the transform domain. The choice of transform base functio... The transformation of basic functions is one of the most commonly used techniques for seismic denoising,which employs sparse representation of seismic data in the transform domain. The choice of transform base functions has an influence on denoising results. We propose a learning-type overcomplete dictionary based on the K-singular value decomposition( K-SVD) algorithm. To construct the dictionary and use it for random seismic noise attenuation,we replace fixed transform base functions with an overcomplete redundancy function library. Owing to the adaptability to data characteristics,the learning-type dictionary describes essential data characteristics much better than conventional denoising methods. The sparsest representation of signals is obtained by the learning and training of seismic data. By comparing the same seismic data obtained using the learning-type overcomplete dictionary based on K-SVD and the data obtained using other denoising methods,we find that the learning-type overcomplete dictionary based on the K-SVD algorithm represents the seismic data more sparsely,effectively suppressing the random noise and improving the signal-to-noise ratio. 展开更多
关键词 sparse representation seismic denoising signal-to-noise ratio K-singular value decomposition learning-type overcomplete dictionary.
下载PDF
A new algorithm of brain volume contours segmentation
8
作者 吴建明 施鹏飞 《Journal of Zhejiang University Science》 CSCD 2003年第3期294-299,共6页
This paper explores brain CT slices segmentation technique and some related problems, including contours segmentation algorithms, edge detector, algorithm evaluation and experimental results. This article describes a ... This paper explores brain CT slices segmentation technique and some related problems, including contours segmentation algorithms, edge detector, algorithm evaluation and experimental results. This article describes a method for contour-based segmentation of anatomical structures in 3D medical data sets. With this method, the user manually traces one or more 2D contours of an anatomical structure of interest on parallel planes arbitrarily cutting the data set. The experimental results showes the segmentation based on 3D brain volume and 2D CT slices. The main creative contributions in this paper are: (1) contours segmentation algorithm; (2) edge detector; (3) algorithm evaluation. 展开更多
关键词 CT slices Contours segmentation Edge detector
下载PDF
Chaotic digital cryptosystem using serial peripheral interface protocol and its ds PIC implementation 被引量:1
9
作者 Rodrigo MéNDEZ-RAMíREZ Adrian ARELLANO-DELGADO +2 位作者 César CRUZ-HERNáNDEZ Fausto ABUNDIZ-PéREZ Rigoberto MARTíNEZ-CLARK 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2018年第2期165-179,共15页
The current massive use of digital communications demands a secure link by using an embedded system(ES) with data encryption at the protocol level. The serial peripheral interface(SPI) protocol is commonly used by... The current massive use of digital communications demands a secure link by using an embedded system(ES) with data encryption at the protocol level. The serial peripheral interface(SPI) protocol is commonly used by manufacturers of ESs and integrated circuits for applications in areas such as wired and wireless communications. We present the design and experimental implementation of a chaotic encryption and decryption algorithm applied to the SPI communication protocol. The design of the chaotic encryption algorithm along with its counterpart in the decryption is based on the chaotic Hénon map and two methods for blur and permute(in combination with DNA sequences). The SPI protocol is configured in 16 bits to synchronize a transmitter and a receiver considering a symmetric key. Results are experimentally proved using two low-cost dsPIC microcontrollers as ESs. The SPI digital-to-analog converter is used to process, acquire, and reconstruct confidential messages based on its properties for digital signal processing. Finally, security of the cryptogram is proved by a statistical test. The digital processing capacity of the algorithm is validated by dsPIC microcontrollers. 展开更多
关键词 Chaotic systems Statistical tests Embedded systems dsPIC microcontroller Serial peripheral interface (SPI)protocol
原文传递
Sparse bivariate polynomial factorization
10
作者 WU WenYuan CHEN JingWei FENG Yong 《Science China Mathematics》 SCIE 2014年第10期2123-2142,共20页
Motivated by Sasaki's work on the extended Hensel construction for solving multivariate algebraic equations, we present a generalized Hensel lifting, which takes advantage of sparsity, for factoring bivariate polynom... Motivated by Sasaki's work on the extended Hensel construction for solving multivariate algebraic equations, we present a generalized Hensel lifting, which takes advantage of sparsity, for factoring bivariate polynomial over the rational number field. Another feature of the factorization algorithm presented in this article is a new recombination method, which can solve the extraneous factor problem before lifting based on numerical linear algebra. Both theoretical analysis and experimental data show that the algorithm is etIicient, especially for sparse bivariate polynomials. 展开更多
关键词 polynomial factorization sparse polynomial generalized Hensel lifting
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部