期刊文献+
共找到29篇文章
< 1 2 >
每页显示 20 50 100
Fast and secure elliptic curve scalar multiplication algorithm based on special addition chains
1
作者 刘双根 胡予濮 《Journal of Southeast University(English Edition)》 EI CAS 2008年第1期29-32,共4页
To resist the side chaimel attacks of elliptic curve cryptography, a new fast and secure point multiplication algorithm is proposed. The algorithm is based on a particular kind of addition chains involving only additi... To resist the side chaimel attacks of elliptic curve cryptography, a new fast and secure point multiplication algorithm is proposed. The algorithm is based on a particular kind of addition chains involving only additions, providing a natural protection against side channel attacks. Moreover, the new addition formulae that take into account the specific structure of those chains making point multiplication very efficient are proposed. The point multiplication algorithm only needs 1 719 multiplications for the SAC260 of 160-bit integers. For chains of length from 280 to 260, the proposed method outperforms all the previous methods with a gain of 26% to 31% over double-and add, 16% to22% over NAF, 7% to 13% over4-NAF and 1% to 8% over the present best algorithm--double-base chain. 展开更多
关键词 scalar multiplication algorithm special addition chains side channel attacks double base chain
在线阅读 下载PDF
A SCALABLE HYBRID MODULAR MULTIPLICATION ALGORITHM 被引量:1
2
作者 Meng Qiang Chen Tao +1 位作者 Dai Zibin Chen Quji 《Journal of Electronics(China)》 2008年第3期378-383,共6页
Based on the analysis of several familiar large integer modular multiplication algorithms, this paper proposes a new Scalable Hybrid modular multiplication (SHyb) algorithm which has scalable operands, and presents an... Based on the analysis of several familiar large integer modular multiplication algorithms, this paper proposes a new Scalable Hybrid modular multiplication (SHyb) algorithm which has scalable operands, and presents an RSA algorithm model with scalable key size. Theoretical analysis shows that SHyb algorithm requires m 2 n /2 + 2miterations to complete an mn-bit modular multiplication with the application of an n-bit modular addition hardware circuit. The number of the required iterations can be reduced to a half of that of the scalable Montgomery algorithm. Consequently, the application scope of the RSA cryptosystem is expanded and its operation speed is enhanced based on SHyb al- gorithm. 展开更多
关键词 Modular multiplication Hybrid modular multiplication algorithm RSA SCALABLE
在线阅读 下载PDF
Laser self-mixing interferometer with scalable fringe precision based on phase multiplication algorithm 被引量:1
3
作者 WANG Xiulin XIONG Yanbin +3 位作者 XU Huizhen QIU Lirong LI Zhen HUANG Wencai 《Optoelectronics Letters》 EI 2021年第11期665-668,共4页
In this paper,we present a phase multiplication algorithm(PMA)to obtain scalable fringe precision in laser self-mixing interferometer under a weak feedback regime.Merely by applying the double angle formula on the sel... In this paper,we present a phase multiplication algorithm(PMA)to obtain scalable fringe precision in laser self-mixing interferometer under a weak feedback regime.Merely by applying the double angle formula on the self-mixing signal multiple times,the continuously improved fringe precision will be obtained.Theoretical analysis shows that the precision of the fringe could be improved toλ/2^(n+1).The validity of the proposed method is demonstrated by means of simulated SMI signals and confirmed by experiments under different amplitudes.A fringe precision ofλ/128 at a sampling rate of 500 k S/s has been achieved after doing 6 th the PMA.Finally,an amplitude of 50 nm has been proved to be measurable and the absolute error is 3.07 nm,which is within the theoretical error range.The proposed method for vibration measurement has the advantage of high accuracy and reliable without adding any additional optical elements in the optical path,thus it will play an important role in nanoscale measurement field. 展开更多
关键词 Laser self-mixing interferometer with scalable fringe precision based on phase multiplication algorithm
原文传递
Two Normal Basis Multiplication Algorithms for GF(2^n)
4
作者 樊海宁 刘铎 戴一奇 《Tsinghua Science and Technology》 SCIE EI CAS 2006年第3期264-270,共7页
For software implementations, word-level normal basis multiplication algorithms utilize the full data-path of the processor, and hence are more efficient than the bit-level multiplication algorithm presented in the IE... For software implementations, word-level normal basis multiplication algorithms utilize the full data-path of the processor, and hence are more efficient than the bit-level multiplication algorithm presented in the IEEE standard P1363-2000. In this paper, two word-level normal basis multiplication algorithms are proposed for GF(2^n). The first algorithm is suitable for high complexity normal bases, while the second algorithm is fast for type-I optimal normal bases and low complexity normal bases. Theoretical analyses and experimental results both indicate that the presented algorithms are efficient in GF(2^233), GF(2^283), GF(2^409), and GF(2^571), which are four of the five binary fields recommended by the National Institute of Standards and Technology (NIST) for the elliptic curve digital signature algorithm (ECDSA) applications. 展开更多
关键词 finite field normal basis multiplication algorithm
原文传递
A Review of Image Steganography Based on Multiple Hashing Algorithm 被引量:1
5
作者 Abdullah Alenizi Mohammad Sajid Mohammadi +1 位作者 Ahmad A.Al-Hajji Arshiya Sajid Ansari 《Computers, Materials & Continua》 SCIE EI 2024年第8期2463-2494,共32页
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a s... Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a significant problem.The development of secure communication methods that keep recipient-only data transmissions secret has always been an area of interest.Therefore,several approaches,including steganography,have been developed by researchers over time to enable safe data transit.In this review,we have discussed image steganography based on Discrete Cosine Transform(DCT)algorithm,etc.We have also discussed image steganography based on multiple hashing algorithms like the Rivest–Shamir–Adleman(RSA)method,the Blowfish technique,and the hash-least significant bit(LSB)approach.In this review,a novel method of hiding information in images has been developed with minimal variance in image bits,making our method secure and effective.A cryptography mechanism was also used in this strategy.Before encoding the data and embedding it into a carry image,this review verifies that it has been encrypted.Usually,embedded text in photos conveys crucial signals about the content.This review employs hash table encryption on the message before hiding it within the picture to provide a more secure method of data transport.If the message is ever intercepted by a third party,there are several ways to stop this operation.A second level of security process implementation involves encrypting and decrypting steganography images using different hashing algorithms. 展开更多
关键词 Image steganography multiple hashing algorithms Hash-LSB approach RSA algorithm discrete cosine transform(DCT)algorithm blowfish algorithm
在线阅读 下载PDF
Assessing the Robustness of the Negative Binomial Multiple Change Point Algorithm Using Synthetic Data
6
作者 Shalyne Nyambura Anthony Waititu +1 位作者 Antony Wanjoya Herbert Imboga 《Open Journal of Statistics》 2024年第6期775-789,共15页
The Negative Binomial Multiple Change Point Algorithm is a hybrid change detection and estimation approach that works well for overdispersed and equidispersed count data. This simulation study assesses the performance... The Negative Binomial Multiple Change Point Algorithm is a hybrid change detection and estimation approach that works well for overdispersed and equidispersed count data. This simulation study assesses the performance of the NBMCPA under varying sample sizes and locations of true change points. Various performance metrics are calculated based on the change point estimates and used to assess how well the model correctly identifies change points. Errors in estimation of change points are obtained as absolute deviations of known change points from the change points estimated under the algorithm. Algorithm robustness is evaluated through error analysis and visualization techniques including kernel density estimation and computation of metrics such as change point location accuracy, precision, sensitivity and false positive rate. The results show that the model consistently detects change points that are present and does not erroneously detect changes where there are none. Change point location accuracy and precision of the NBMCPA increases with sample size, with best results for medium and large samples. Further model accuracy and precision are highest for changes located in the middle of the dataset compared to changes located in the periphery. 展开更多
关键词 Kernel Density Estimation PRECISION Changepoint Location Accuracy Sensitivity Negative Binomial Multiple Change Point algorithm
在线阅读 下载PDF
Multiple model tracking algorithms based on neural network and multiple process noise soft switching 被引量:2
7
作者 NieXiaohua 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第6期1227-1232,共6页
A multiple model tracking algorithm based on neural network and multiple-process noise soft-switching for maneuvering targets is presented.In this algorithm, the"current"statistical model and neural network are runn... A multiple model tracking algorithm based on neural network and multiple-process noise soft-switching for maneuvering targets is presented.In this algorithm, the"current"statistical model and neural network are running in parallel.The neural network algorithm is used to modify the adaptive noise filtering algorithm based on the mean value and variance of the"current"statistical model for maneuvering targets, and then the multiple model tracking algorithm of the multiple processing switch is used to improve the precision of tracking maneuvering targets.The modified algorithm is proved to be effective by simulation. 展开更多
关键词 maneuvering target current statistical model neural network multiple model algorithm.
在线阅读 下载PDF
A Time-Frequency Associated MUSIC Algorithm Research on Human Target Detection by Through-Wall Radar 被引量:3
8
作者 Xianyu Dong Wu Ren +2 位作者 Zhenghui Xue Xuetian Wang Weiming Li 《Journal of Beijing Institute of Technology》 EI CAS 2022年第1期123-130,共8页
In this paper,a time-frequency associated multiple signal classification(MUSIC)al-gorithm which is suitable for through-wall detection is proposed.The technology of detecting hu-man targets by through-wall radar can b... In this paper,a time-frequency associated multiple signal classification(MUSIC)al-gorithm which is suitable for through-wall detection is proposed.The technology of detecting hu-man targets by through-wall radar can be used to monitor the status and the location information of human targets behind the wall.However,the detection is out of order when classical MUSIC al-gorithm is applied to estimate the direction of arrival.In order to solve the problem,a time-fre-quency associated MUSIC algorithm suitable for through-wall detection and based on S-band stepped frequency continuous wave(SFCW)radar is researched.By associating inverse fast Fouri-er transform(IFFT)algorithm with MUSIC algorithm,the power enhancement of the target sig-nal is completed according to the distance calculation results in the time domain.Then convert the signal to the frequency domain for direction of arrival(DOA)estimation.The simulations of two-dimensional human target detection in free space and the processing of measured data are com-pleted.By comparing the processing results of the two algorithms on the measured data,accuracy of DOA estimation of proposed algorithm is more than 75%,which is 50%higher than classical MUSIC algorithm.It is verified that the distance and angle of human target can be effectively de-tected via proposed algorithm. 展开更多
关键词 through-wall radar multiple signal classification(MUSIC)algorithm inverse fast Four-ier transform(IFFT)algorithm target detection
在线阅读 下载PDF
Dynamic airspace sectorization via improved genetic algorithm 被引量:7
9
作者 Yangzhou Chen Hong Bi +1 位作者 Defu Zhang Zhuoxi Song 《Journal of Modern Transportation》 2013年第2期117-124,共8页
This paper deals with dynamic airspace sectorization (DAS) problem by an improved genetic algorithm (iGA). A graph model is first constructed that represents the airspace static structure. Then the DAS problem is ... This paper deals with dynamic airspace sectorization (DAS) problem by an improved genetic algorithm (iGA). A graph model is first constructed that represents the airspace static structure. Then the DAS problem is formulated as a graph-partitioning problem to balance the sector workload under the premise of ensuring safety. In the iGA, multiple populations and hybrid coding are applied to determine the optimal sector number and airspace sectorization. The sector constraints are well satisfied by the improved genetic operators and protect zones. This method is validated by being applied to the airspace of North China in terms of three indexes, which are sector balancing index, coordination workload index and sector average flight time index. The improvement is obvious, as the sector balancing index is reduced by 16.5 %, the coordination workload index is reduced by 11.2 %, and the sector average flight time index is increased by 11.4 % during the peak-hour traffic. 展开更多
关键词 Dynamic airspace sectorization (DAS) Improved genetic algorithm (iGA) Graph model Multiple populations Hybrid coding Sector constraints
在线阅读 下载PDF
VCSRA:A fast and accurate multiple sequence alignment algorithm with a high degree of parallelism
10
作者 Dong Dong Wenhe Su +2 位作者 Wenqiang Shi Quan Zou Shaoliang Peng 《Journal of Genetics and Genomics》 SCIE CAS CSCD 2018年第7期407-410,共4页
Multiple sequence alignment (MSA) is the alignment among more than two molecular biological sequences, which is a fundamental method to analyze evolutionary events such as mutations, insertions, deletions, and re-ar... Multiple sequence alignment (MSA) is the alignment among more than two molecular biological sequences, which is a fundamental method to analyze evolutionary events such as mutations, insertions, deletions, and re-arrangements. In theory, a dynamic programming algorithm can be employed to produce the optimal MSA. However, this leads to an explosive increase in computing time and memory consumption as the number of sequences increases (Taylor, 1990). So far, MSA is still regarded as one of the most challenging problems in bioinformatics and computational biology (Chatzou et al., 2016). 展开更多
关键词 VCSRA A fast and accurate multiple sequence alignment algorithm a high degree of parallelism
原文传递
S-box:six-dimensional compound hyperchaotic map and artificial bee colony algorithm 被引量:1
11
作者 Ye Tian Zhimao Lu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第1期232-241,共10页
Being as unique nonlinear components of block ciphers,substitution boxes(S-boxes) directly affect the security of the cryptographic systems.It is important and difficult to design cryptographically strong S-boxes th... Being as unique nonlinear components of block ciphers,substitution boxes(S-boxes) directly affect the security of the cryptographic systems.It is important and difficult to design cryptographically strong S-boxes that simultaneously meet with multiple cryptographic criteria such as bijection,non-linearity,strict avalanche criterion(SAC),bits independence criterion(BIC),differential probability(DP) and linear probability(LP).To deal with this problem,a chaotic S-box based on the artificial bee colony algorithm(CSABC) is designed.It uses the S-boxes generated by the six-dimensional compound hyperchaotic map as the initial individuals and employs ABC to improve their performance.In addition,it considers the nonlinearity and differential uniformity as the fitness functions.A series of experiments have been conducted to compare multiple cryptographic criteria of this algorithm with other algorithms.Simulation results show that the new algorithm has cryptographically strong S-box while meeting multiple cryptographic criteria. 展开更多
关键词 substitution boxes(S-boxes) multiple cryptographic criteria six-dimensional compound hyperchaotic map artificial bee colony algorithm(ABC).
在线阅读 下载PDF
Some Results for Exact Support Recovery of Block Joint Sparse Matrix via Block Multiple Measurement Vectors Algorithm
12
作者 Yingna Pan Pingping Zhang 《Journal of Applied Mathematics and Physics》 2023年第4期1098-1112,共15页
Block multiple measurement vectors (BMMV) is a reconstruction algorithm that can be used to recover the support of block K-joint sparse matrix X from Y = ΨX + V. In this paper, we propose a sufficient condition for a... Block multiple measurement vectors (BMMV) is a reconstruction algorithm that can be used to recover the support of block K-joint sparse matrix X from Y = ΨX + V. In this paper, we propose a sufficient condition for accurate support recovery of the block K-joint sparse matrix via the BMMV algorithm in the noisy case. Furthermore, we show the optimality of the condition we proposed in the absence of noise when the problem reduces to single measurement vector case. 展开更多
关键词 Support Recovery Compressed Sensing Block Multiple Measurement Vectors algorithm Block Restricted Isometry Property
在线阅读 下载PDF
Layered heuristic algorithm for multiple restriction routes
13
作者 戴伏生 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2010年第1期95-100,共6页
A layered algorithm by bidirectional searching is proposed in this paper to solve the problem that it is difficult and time consuming to reach an optimal solution of the route search with multiple parameter restrictio... A layered algorithm by bidirectional searching is proposed in this paper to solve the problem that it is difficult and time consuming to reach an optimal solution of the route search with multiple parameter restrictions for good quality of service. Firstly, a set of reachable paths to each intermediate node from the source node and the sink node based on adjacent matrix transformation are calculated respectively. Then a temporal optimal path is selected by adopting the proposed heuristic method according to a non-linear cost function. When the total number of the accumulated nodes by bidirectional searching reaches n-2, the paths from two directions to an intermediate node should be combined and several paths via different nodes from the source node to the sink node can be obtained, then an optimal path in the whole set of paths can be taken as the output route. Some simulation examples are included to show the effectiveness and efficiency of the proposed method. In addition, the proposed algorithm can be implemented with parallel computation and thus, the new algorithm has better performance in time complexity than other algorithms. Mathematical analysis indicates that the maximum complexity in time, based on parallel computation, is the same as the polynomial complexity of O(kn2-3kn+k), and some simulation results are shown to support this analysis. 展开更多
关键词 communication network quality of service routing routing algorithm route with multiple restrictions
在线阅读 下载PDF
Fast implementation of length-adaptive privacy amplification in quantum key distribution 被引量:7
14
作者 张春梅 李默 +8 位作者 黄靖正 Patcharapong Treeviriyanupab 李宏伟 李芳毅 王川 银振强 陈巍 Keattisak Sripimanwat 韩正甫 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第9期112-117,共6页
Post-processing is indispensable in quantum key distribution (QKD), which is aimed at sharing secret keys between two distant parties. It mainly consists of key reconciliation and privacy amplification, which is use... Post-processing is indispensable in quantum key distribution (QKD), which is aimed at sharing secret keys between two distant parties. It mainly consists of key reconciliation and privacy amplification, which is used for sharing the same keys and for distilling unconditional secret keys. In this paper, we focus on speeding up the privacy amplification process by choosing a simple multiplicative universal class of hash functions. By constructing an optimal multiplication algorithm based on four basic multiplication algorithms, we give a fast software implementation of length-adaptive privacy amplification. "Length-adaptive" indicates that the implementation of privacy amplification automatically adapts to different lengths of input blocks. When the lengths of the input blocks are 1 Mbit and 10 Mbit, the speed of privacy amplification can be as fast as 14.86 Mbps and 10.88 Mbps, respectively. Thus, it is practical for GHz or even higher repetition frequency QKD systems. 展开更多
关键词 length-adaptive privacy amplification multiplication algorithms quantum key distribution
原文传递
Improved Software Implementation for Montgomery Elliptic Curve Cryptosystem
15
作者 Mohammad Al-Khatib Wafaa Saif 《Computers, Materials & Continua》 SCIE EI 2022年第3期4847-4865,共19页
The last decade witnessed rapid increase in multimedia and other applications that require transmitting and protecting huge amount of data streams simultaneously.For such applications,a high-performance cryptosystem i... The last decade witnessed rapid increase in multimedia and other applications that require transmitting and protecting huge amount of data streams simultaneously.For such applications,a high-performance cryptosystem is compulsory to provide necessary security services.Elliptic curve cryptosystem(ECC)has been introduced as a considerable option.However,the usual sequential implementation of ECC and the standard elliptic curve(EC)form cannot achieve required performance level.Moreover,the widely used Hardware implementation of ECC is costly option and may be not affordable.This research aims to develop a high-performance parallel software implementation for ECC.To achieve this,many experiments were performed to examine several factors affecting ECC performance including the projective coordinates,the scalar multiplication algorithm,the elliptic curve(EC)form,and the parallel implementation.The ECC performance was analyzed using the different factors to tune-up them and select the best choices to increase the speed of the cryptosystem.Experimental results illustrated that parallel Montgomery ECC implementation using homogenous projection achieves the highest performance level,since it scored the shortest time delay for ECC computations.In addition,results showed thatNAF algorithm consumes less time to perform encryption and scalar multiplication operations in comparison withMontgomery ladder and binarymethods.Java multi-threading technique was adopted to implement ECC computations in parallel.The proposed multithreaded Montgomery ECC implementation significantly improves the performance level compared to previously presented parallel and sequential implementations. 展开更多
关键词 Elliptic curve cryptosystem parallel software implementation MULTI-THREADING scalar multiplication algorithms modular arithmetic
在线阅读 下载PDF
An Efficient Method against Side-Channel Attacks on ECC
16
作者 LIU Shuanggen HU Yupu XU Wensheng 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1573-1576,共4页
Side-channel attacks (SCA) may exploit leakage information to break cryptosystems. In this paper we present a new SCA resistant Elliptic Curve scalar multiplication algorithm. The proposed algorithm, builds a sequen... Side-channel attacks (SCA) may exploit leakage information to break cryptosystems. In this paper we present a new SCA resistant Elliptic Curve scalar multiplication algorithm. The proposed algorithm, builds a sequence of bit-strings representing the scalar k, characterized by the fact that all bit-strings are different from zero; this property will ensure a uniform computation behavior for the algorithm, and thus will make it secure against simple power analysis attacks (SPA). With other randomization techniques, the proposed countermeasures do not penalize the computation time. The proposed scheme is more efficient than MOEller's one, its cost being about 5% to 10% smaller than MOEller's one. 展开更多
关键词 side-channel attacks ECC scalar multiplication algorithm
在线阅读 下载PDF
New empirical model to evaluate groundwater flow into circular tunnel using multiple regression analysis 被引量:6
17
作者 Farhadian Hadi Katibeh Homayoon 《International Journal of Mining Science and Technology》 SCIE EI CSCD 2017年第3期415-421,共7页
There are various analytical, empirical and numerical methods to calculate groundwater inflow into tun- nels excavated in rocky media. Analytical methods have been widely applied in prediction of groundwa- ter inflow ... There are various analytical, empirical and numerical methods to calculate groundwater inflow into tun- nels excavated in rocky media. Analytical methods have been widely applied in prediction of groundwa- ter inflow to tunnels due to their simplicity and practical base theory. Investigations show that the real amount of water infiltrating into jointed tunnels is much less than calculated amount using analytical methods and obtained results are very dependent on tunnel's geometry and environmental situations. In this study, using multiple regression analysis, a new empirical model for estimation of groundwater seepage into circular tunnels was introduced. Our data was acquired from field surveys and laboratory analysis of core samples. New regression variables were defined after perusing single and two variables relationship between groundwater seepage and other variables. Finally, an appropriate model for estima- tion of leakage was obtained using the stepwise algorithm. Statistics like R, R2, R2e and the histogram of residual values in the model represent a good reputation and fitness for this model to estimate the groundwater seepage into tunnels. The new experimental model was used for the test data and results were satisfactory. Therefore, multiple regression analysis is an effective and efficient way to estimate the groundwater seeoage into tunnels. 展开更多
关键词 Groundwater inflow Analytical equation Multiple regression analysis Stepwise algorithm Tunnel
在线阅读 下载PDF
Measuring Mental Workload Using ERPs Based on FIR,ICA,and MARA 被引量:1
18
作者 Yu Sun Yi Ding +1 位作者 Junyi Jiang Vincent G.Duffy 《Computer Systems Science & Engineering》 SCIE EI 2022年第5期781-794,共14页
Mental workload is considered to be strongly linked to human performance,and the ability to measure it accurately is key for balancing human health and work.In this study,brain signals were elicited by mental arithmet... Mental workload is considered to be strongly linked to human performance,and the ability to measure it accurately is key for balancing human health and work.In this study,brain signals were elicited by mental arithmetic tasks of varying difficulty to stimulate different levels of mental workload.In addition,a finite impulse response(FIR)filter,independent component analysis(ICA),and multiple artifact rejection algorithms(MARAs)were used to filter event-related potentials(ERPs).Then,the data consisting of ERPs,subjective ratings of mental workload,and task performance,were analyzed through the use of variance and Spearman’s correlation during a simulated computer task.We found that participants responded faster and performed better in the easy task condition,followed by the medium and high-difficulty conditions,which verifies the validity of the ERP filtering.Moreover,larger P2 and P3 waveforms were evoked as the task difficulty increased,and a higher task difficulty elicited a more enhanced N300.Correlation analysis revealed a negative relationship between the amplitude of P3 and the subjective ratings,and a positive relationship between the P3 amplitude and accuracy.The results presented in this paper demonstrate that a combination of FIR,ICA,and MARA methods can filter ERPs in the non-invasive real-time measurement of workload.Additionally,frontocentral P2,N3,and parietal P3 components showed differences between genders.The proposed measurement of mental workload can be useful for real-time identification of mental states and can be applied to human-computer interaction in the future. 展开更多
关键词 Mental workload event-related potentials finite impulse response filter independent component analysis multiple artifact rejection algorithms
在线阅读 下载PDF
FAST MUSIC SPECTRUM PEAK SEARCH VIA METROPOLIS-HASTINGS SAMPLER 被引量:5
19
作者 Guo Qinghua Liao Guisheng 《Journal of Electronics(China)》 2005年第6期599-604,共6页
A fast MUltiple SIgnal Classification (MUSIC) spectrum peak search algorithm is devised, which regards the power of the MUSIC spectrum function as target distribution up to a constant of proportionality, and uses Metr... A fast MUltiple SIgnal Classification (MUSIC) spectrum peak search algorithm is devised, which regards the power of the MUSIC spectrum function as target distribution up to a constant of proportionality, and uses Metropolis-Hastings (MH) sampler, one of the most popular Markov Chain Monte Carlo (MCMC) techniques, to sample from it. The proposed method reduces greatly the tremendous computation and storage costs in conventional MUSIC techniques i.e., about two and four orders of magnitude in computation and storage costs under the conditions of the experiment in the paper respectively. 展开更多
关键词 MUltiple Signal Classification (MUSIC) algorithm Metropolis-Hastlngs (MH)sampler Markov Chain Monte Carlo (MCMC)
在线阅读 下载PDF
Stability of multiple fans in mine ventilation networks 被引量:6
20
作者 El-Nagdy K.A. 《International Journal of Mining Science and Technology》 SCIE EI 2013年第4期558-560,共3页
In large mines,single fan is usually not enough to ventilate all the working areas.Single mine-fan approach cannot be directly applied to multiple-fan networks because the present of multiple pressures and air quantit... In large mines,single fan is usually not enough to ventilate all the working areas.Single mine-fan approach cannot be directly applied to multiple-fan networks because the present of multiple pressures and air quantities associated with each fan in the network.Accordingly,each fan in a multiple-fan system has its own mine characteristic curve,or a subsystem curve.Under some consideration,the conventional concept of a mine characteristic curve of a single-fan system can be directly extended to that of a particular fan within a multiple-fan system.In this paper the mutual effect of the fans on each other and their effect on the stability of the ventilation network were investigated by Hardy Cross algorithm combined with a switching-parameters technique.To show the validity and reliability of this algorithm,the stability of the ventilation system of Abu-Tartur Mine(one of the largest underground mine in Egypt)has been studied. 展开更多
关键词 Mine ventilation Multiple fan ventilated network Hardy Cross algorithm Switching parameters technique Abu-Tartur Mine
在线阅读 下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部