With the surge of earth observation demands, the agile optical satellite scheduling has become a practical problem, which is hard to solve owing to the huge solution space and complex constraints. This paper proposes ...
详细信息
Main lobe interferences usually cause the distortion and peak offset of main lobe and the heighten of side lobe level in adaptive beamformers. The block matrix algorithm utilized the direction vector which was determi...
详细信息
The pipeline network interfered by the stray currents has been verified to be a complex nonlinear dynamical *** paper shows that the chaotic characteristic could be utilized in the stray currents *** prove this,this p...
详细信息
ISBN:
(纸本)9781538629185
The pipeline network interfered by the stray currents has been verified to be a complex nonlinear dynamical *** paper shows that the chaotic characteristic could be utilized in the stray currents *** prove this,this paper establishes an equivalent chaotic control *** we analyze this model by using Melnikov method and find out the condition under which the chaotic phenomenon will be *** order to get a sufficient proof for identifying the conclusion,simulation experiments are used to verify the validity of the control method.
Software vulnerabilities are the root cause of various information security incidents while dynamic taint analysis is an emerging program analysis technique. In this paper, to maximize the use of the technique to dete...
详细信息
Software vulnerabilities are the root cause of various information security incidents while dynamic taint analysis is an emerging program analysis technique. In this paper, to maximize the use of the technique to detect software vulnerabilities, we present SwordDTA, a tool that can perform dynamic taint analysis for binaries. This tool is flexible and extensible that it can work with commodity software and hardware. It can be used to detect software vulnerabilities with vulnerability modeling and taint check. We evaluate it with a number of commonly used real-world applications. The experimental results show that SwordDTA is capable of detecting at least four kinds of softavare vulnerabilities including buffer overflow, integer overflow, division by zero and use-after-free, and is applicable for a wide range of software.
This paper designs a soft robot with a multi-chamber,multi-airbag mimicking soft biological structure,where the airbags of the same chamber are interconnected with each *** upper and lower chambers are separated by an...
详细信息
This paper designs a soft robot with a multi-chamber,multi-airbag mimicking soft biological structure,where the airbags of the same chamber are interconnected with each *** upper and lower chambers are separated by an intermediate layer(thin plate),which is extended and widened to achieve robot movement and *** applying pressure to the different chambers of the soft robot,it is possible to produce a variety of bionic movements of the inchworm and *** to the strong nonlinearity and infinite number of degrees of freedom properties of the material,it is impossible to obtain the analytical solution of the bending morphology and pressure of the soft robot ***,a method to establish a mathematical model of soft robot deformation based on the classical stacked plate theory is proposed,and a chain composite model of soft robot bending motion is established based on the large-deflection modeling *** paper proposes a method to generate a multi-mode soft robot motion control based on the Central Pattern Generator(CPG)using a single controller,which achieves the switching of sine wave-like patterns,half-wave-like patterns,and dragging patterns by adjust-ing frequency,amplitude and period of ***,a pneumatic control platform is built for the validation of the theoretical model and different experimental models of the motion of the *** comparation of the different motion modes of the soft robot under similar non-load and load conditions.
To study the influence of temperature and internal leakage on the performance of magnetorheological(MR)damper,a single-rod straight-cylinder MR damper with an inside temperature sensor is designed in this study.A unif...
详细信息
To study the influence of temperature and internal leakage on the performance of magnetorheological(MR)damper,a single-rod straight-cylinder MR damper with an inside temperature sensor is designed in this study.A unified model for MR damper is given,and a new two-step parameters identification method is proposed to determine model *** experiment,in which the damper is heated by long-time displacement excitation,is designed to study the effect of temperature and internal *** influence mechanism of temperature and internal leakage on MR damper is analyzed through theoretical derivation and experimental results in this study.
Static software defect prediction problem is one crucial problem in software test, to measure the performance, several indexes are introduced. In this paper, a two-objective software defect prediction model is employe...
详细信息
The problem of protein folding structure prediction is a classical NP problem. In this paper, we present a new hybrid artificial plant optimization algorithm, in which one new golden section operator is designed to mi...
详细信息
For the purpose of achieving high-performance information sharing in the simulation grid, an information capability-based Three Phase High-performance Information Sharing Approach (TPHPISA for short) is advanced. The ...
详细信息
Under the guidance of the theories of complex Adaptive system and Artificial Societies, modeling and simulation of international politics evolution in crisis was studied. The Model of International Politics Evolution ...
详细信息
暂无评论