This paper presents the Neuron Self-adaptive PID control of Brushless DC (BLDC) Motor. It is difficult to tune the parameters and get satisfied control characteristics by using normal PID controller. As the single neu...
详细信息
ISBN:
(纸本)9780769542966
This paper presents the Neuron Self-adaptive PID control of Brushless DC (BLDC) Motor. It is difficult to tune the parameters and get satisfied control characteristics by using normal PID controller. As the single neuron has the ability of self-learning, the simple structure and it is easy for computing, In order to control the BLDC motor, a single neuron self-adaptive PID controller is designed as the controller of the BLDC motor. The experimental results verify that a single neuron self-adaptive PID controller has better control performance than the normal PID controller.
The algorithm applied to video watermark based on HVS is rare recently , but adaptively selecting the embedding position and the embedding strength according to the host(such as videos, images etc.) is necessary, whic...
详细信息
Incomplete preferences of agents may render service selection ineffective. We address this problem by proposing a set of collaborative approaches to complementing agents' incomplete preferences in a qualitative wa...
详细信息
Incomplete preferences of agents may render service selection ineffective. We address this problem by proposing a set of collaborative approaches to complementing agents' incomplete preferences in a qualitative way. For an agent, the approaches first find its similar agents, and then base the similar agents' qualitative preferences to complement this agent's missing preferences. We analyze and compare these approaches and provide experimental results to justify our arguments. We also compare our approach with the classic collaborative filtering and show the competitive advantages of our approach in service selection. Our work thus serves as an important step towards effective service selection.
DDoS detection has been the research focus in the field of information security. Existing detecting methods such as Hurst parameter method and Markov model must ensure that the network traffic signal f(t) is a station...
详细信息
DDoS detection has been the research focus in the field of information security. Existing detecting methods such as Hurst parameter method and Markov model must ensure that the network traffic signal f(t) is a stationary signal. But its stability is just a regular assumption and has no strict mathematical proof. Therefore methods mentioned above lack of reliable theoretical support. This article introduces Hilbert-HuangTtransformation(HHT) . HHT does not need to be based on signal stability,but it monitors the similarity between Hilbert marginal spectrums of adjacent observation sequences so as to realize DDoS detection. The method is experimented on DARPA 1999 data and simulating data respectively. Experimental results show that the method behaves better than existing Hurst parameter method in distinguishing both the normal and the attacked traffic.
A new security test for substitution boxes(S-boxes),the nonlinearity profile test,is presented,together with its results over the S-boxes of DES and *** test can be used to measure the global nonlinearity for an S-box...
详细信息
A new security test for substitution boxes(S-boxes),the nonlinearity profile test,is presented,together with its results over the S-boxes of DES and *** test can be used to measure the global nonlinearity for an S-box effectively,which overcomes the disadvantage of existing methods that cannot evaluate the nonlinear capacity of an S-box against attacks which keep some input bits constant.
It is one of the important factors in iterative block ciphers design that proper rounds are used to resist differential analysis, linear analysis and many other kinds of attack. Block ciphers usually adopt loop codes ...
详细信息
It is one of the important factors in iterative block ciphers design that proper rounds are used to resist differential analysis, linear analysis and many other kinds of attack. Block ciphers usually adopt loop codes in software and repetition structures in hardware in order to reduce complexity and cost. This paper presents an effective fault-electromagnetic attack which can change the rounds of block ciphers in running process, by inducing appropriate fault to the cryptographic chip. The executing rounds of the attacked block cipher can be detected from the electromagnetic radiation track of cryptographic chip. Then the secret key can be deduced directly or with simple mathematical analysis. The simulation result of lightweight block cipher PRESENT shows that the suggested attack is feasible and efficient, when it is implemented with single chip microcomputer. Furthermore, countermeasures are given to resist this kind of attack.
Formal concept analysis and rough set analysis are two complementary approaches for analyzing data. This paper studies approaches to constructing fuzzy concept lattices based on generalized fuzzy rough approximation o...
详细信息
Formal concept analysis and rough set analysis are two complementary approaches for analyzing data. This paper studies approaches to constructing fuzzy concept lattices based on generalized fuzzy rough approximation operators. For a residual implicator θ satisfying θ (a, b) = θ(1-b, 1-a) and its dual σ, a pair of (θ, σ)-fuzzy rough approximation operators is defined. We then propose three kinds of fuzzy operators, and examine some of their basic properties. Thus, three complete fuzzy concept lattices can be produced, for which the properties are analogous to those of the classical concept lattices.
Recently Vadim Lyubashevsky etc. built LWE problem on ring and proposed a public cryptosystem based on RLWE, which, to a certain extent, solved the defect of large public key of this kind, but it didn't offer p...
详细信息
Recently Vadim Lyubashevsky etc. built LWE problem on ring and proposed a public cryptosystem based on RLWE, which, to a certain extent, solved the defect of large public key of this kind, but it didn't offer parameter selections and performance analysis in detail. In this paper an improved scheme is proposed by sharing a ring' polynomial vector that makes public key as small as 1/m of the original scheme in multi-user environments. In additions, we introduce a parameter r to control both the private key space size and decryption errors probability, which greatly enhances the flexibly and practicality. The correctness, security and efficiency are analyzed in detail and choice of parameters is studied, at last concrete parameters are recommended for the new scheme.
Homologous recombination is a fundamental cellular process that is most widely used by cells to rearrange genes and accurately repair DNA double-strand breaks. It may result in the formation of a critical intermediate...
详细信息
暂无评论