期刊文献+
共找到282,837篇文章
< 1 2 250 >
每页显示 20 50 100
Circular SAR processing using an improved omega-k type algorithm 被引量:7
1
作者 Leilei KOU Xiaoqing Wang +2 位作者 Jinsong Chong Maosheng Xiang Minhui Zhu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第4期572-579,共8页
An improved circular synthetic aperture radar(CSAR) imaging algorithm of omega-k(ω-k) type mainly for reconstructing an image on a cylindrical surface is proposed.In the typical CSAR ω-k algorithm,the rage traje... An improved circular synthetic aperture radar(CSAR) imaging algorithm of omega-k(ω-k) type mainly for reconstructing an image on a cylindrical surface is proposed.In the typical CSAR ω-k algorithm,the rage trajectory is approximated by Taylor series expansion to the quadratic terms,which limits the valid synthetic aperture length and the angular reconstruction range severely.Based on the model of the CSAR echo signal,the proposed algorithm directly transforms the signal to the two-dimensional(2D) wavenumber domain,not using approximation processing to the range trajectory.Based on form of the signal spectrum in the wavenumber domain,the formula for the wavenumber domain interpolation of the w-k algorithm is deduced,and the wavenumber spectrum of the reference point used for bulk compression is obtained from numerical method.The improved CSAR ω-k imaging algorithm increases the valid synthetic aperture length and the angular area greatly and hence improves the angular resolution of the cylindrical imaging.Additionally,the proposed algorithm can be repeated on different cylindrical surfaces to achieve three dimensional(3D) image reconstruction.The 3D spatial resolution of the CSAR system is discussed,and the simulation results validate the correctness of the analysis and the feasibility of the algorithm. 展开更多
关键词 circular synthetic aperture radar omega-k algorithm wavenumber domain three-dimensional spatial resolution.
在线阅读 下载PDF
An Aggregation Cache Replacement Algorithm Based on Ontology Clustering 被引量:2
2
作者 ZHU Jiang SHEN Qingguo TANG Tang LI Yongqiang 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1141-1146,共6页
This paper describes the theory, implementation, and experimental evaluation of an Aggregation Cache Replacement ( ACR ) algorithm. By considering application background, carefully choosing weight values, using a sp... This paper describes the theory, implementation, and experimental evaluation of an Aggregation Cache Replacement ( ACR ) algorithm. By considering application background, carefully choosing weight values, using a special formula to calculate the similarity, and clustering ontologies by similarity for getting more embedded deep relations, ACR combines the ontology similarity with the value of object and decides which object is to be replaced. We demonstrate the usefulness of ACR through experiments. (a) It is found that the aggregation tree is created wholly differently according to the application cases. Therefore, clustering can direct the content adaptation more accurately according to the user perception and can satisfy the user with different preferences. (b) After comparing this new method with widely-used algorithm Last-Recently-Used (LRU) and First-in-First-out (FIFO) method, it is found that ACR outperforms the later two in accuracy and usability. (c) It has a better semantic explanation and makes adaptation more personalized and more precise. 展开更多
关键词 ontology similarity replacement algorithm content adaptation semantic Web
在线阅读 下载PDF
A New Scheduling Algorithm for Reducing Data Aggregation Latency in Wireless Sensor Networks 被引量:3
3
作者 Meirui Ren Longjiang Guo Jinbao Li 《International Journal of Communications, Network and System Sciences》 2010年第8期679-688,共10页
Existing works on data aggregation in wireless sensor networks (WSNs) usually use a single channel which results in a long latency due to high interference, especially in high-density networks. Therefore, data aggre- ... Existing works on data aggregation in wireless sensor networks (WSNs) usually use a single channel which results in a long latency due to high interference, especially in high-density networks. Therefore, data aggre- gation is a fundamental yet time-consuming task in WSNs. We present an improved algorithm to reduce data aggregation latency. Our algorithm has a latency bound of 16R + Δ – 11, where Δ is the maximum degree and R is the network radius. We prove that our algorithm has smaller latency than the algorithm in [1]. The simulation results show that our algorithm has much better performance in practice than previous works. 展开更多
关键词 REDUCING LATENCY WIRELESS SENSOR Networks SCHEDULING algorithm
在线阅读 下载PDF
Structural optimization and segregation behavior of quaternary alloy nanoparticles based on simulated annealing algorithm 被引量:1
4
作者 陆欣泽 邵桂芳 +2 位作者 许两有 刘暾东 文玉华 《Chinese Physics B》 SCIE EI CAS CSCD 2016年第5期151-158,共8页
Alloy nanoparticles exhibit higher catalytic activity than monometallic nanoparticles, and their stable structures are of importance to their applications. We employ the simulated annealing algorithm to systematically... Alloy nanoparticles exhibit higher catalytic activity than monometallic nanoparticles, and their stable structures are of importance to their applications. We employ the simulated annealing algorithm to systematically explore the stable structure and segregation behavior of tetrahexahedral Pt–Pd–Cu–Au quaternary alloy nanoparticles. Three alloy nanoparticles consisting of 443 atoms, 1417 atoms, and 3285 atoms are considered and compared. The preferred positions of atoms in the nanoparticles are analyzed. The simulation results reveal that Cu and Au atoms tend to occupy the surface, Pt atoms preferentially occupy the middle layers, and Pd atoms tend to segregate to the inner layers. Furthermore, Au atoms present stronger surface segregation than Cu ones. This study provides a fundamental understanding on the structural features and segregation phenomena of multi-metallic nanoparticles. 展开更多
关键词 alloy nanoparticle simulated annealing algorithm structural stability SEGRegaTION
原文传递
A Review of Image Steganography Based on Multiple Hashing Algorithm 被引量:1
5
作者 Abdullah Alenizi Mohammad Sajid Mohammadi +1 位作者 Ahmad A.Al-Hajji Arshiya Sajid Ansari 《Computers, Materials & Continua》 SCIE EI 2024年第8期2463-2494,共32页
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a s... Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a significant problem.The development of secure communication methods that keep recipient-only data transmissions secret has always been an area of interest.Therefore,several approaches,including steganography,have been developed by researchers over time to enable safe data transit.In this review,we have discussed image steganography based on Discrete Cosine Transform(DCT)algorithm,etc.We have also discussed image steganography based on multiple hashing algorithms like the Rivest–Shamir–Adleman(RSA)method,the Blowfish technique,and the hash-least significant bit(LSB)approach.In this review,a novel method of hiding information in images has been developed with minimal variance in image bits,making our method secure and effective.A cryptography mechanism was also used in this strategy.Before encoding the data and embedding it into a carry image,this review verifies that it has been encrypted.Usually,embedded text in photos conveys crucial signals about the content.This review employs hash table encryption on the message before hiding it within the picture to provide a more secure method of data transport.If the message is ever intercepted by a third party,there are several ways to stop this operation.A second level of security process implementation involves encrypting and decrypting steganography images using different hashing algorithms. 展开更多
关键词 Image steganography multiple hashing algorithms Hash-LSB approach RSA algorithm discrete cosine transform(DCT)algorithm blowfish algorithm
在线阅读 下载PDF
Modified Omega-K algorithm for processing helicopter-borne frequency modulated continuous waveform rotating synthetic aperture radar data 被引量:2
6
作者 Dong Li Guisheng Liao +1 位作者 Yong Liao Lisheng Yang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2015年第3期476-485,共10页
With appropriate geometry configuration, helicopter- borne rotating synthetic aperture radar (ROSAR) can break through the limitations of monostatic synthetic aperture radar (SAR) on forward-looking imaging. With ... With appropriate geometry configuration, helicopter- borne rotating synthetic aperture radar (ROSAR) can break through the limitations of monostatic synthetic aperture radar (SAR) on forward-looking imaging. With this capability, ROSAR has extensive potential applications, such as self-navigation and self-landing. Moreover, it has many advantages if combined with the frequency modulated continuous wave (FMCW) technology. A novel geometric configuration and an imaging algorithm for helicopter-borne FMCW-ROSAR are proposed. Firstly, by per- forming the equivalent phase center principle, the separated trans- mitting and receiving antenna system is equalized to the case of system configuration with antenna for both transmitting and receiving signals. Based on this, the accurate two-dimensional spectrum is obtained and the Doppler frequency shift effect in- duced by the continuous motion of the platform during the long pulse duration is compensated. Next, the impacts of the velocity approximation error on the imaging algorithm are analyzed in de- tail, and the system parameters selection and resolution analysis are presented. The well-focused SAR image is then obtained by using the improved Omega-K algorithm incorporating the accurate compensation method for the velocity approximation error. FJnally, correctness of the analysis and effectiveness of the proposed al- gorithm are demonstrated through simulation results. 展开更多
关键词 helicopter-borne rotating synthetic aperture radar(ROSAR) frequency modulated continuous wave (FMCW) improved Omega-K algorithm two-dimensional spectrum.
在线阅读 下载PDF
Non-Negativity Preserving Numerical Algorithms for Problems in Mathematical Finance 被引量:1
7
作者 Yuan Yuan 《Applied Mathematics》 2018年第3期313-335,共23页
We give a study result to analyze a rather different, semi-analytical numerical algorithms based on splitting-step methods with their applications to mathematical finance. As certain subsistent numerical schemes may f... We give a study result to analyze a rather different, semi-analytical numerical algorithms based on splitting-step methods with their applications to mathematical finance. As certain subsistent numerical schemes may fail due to producing negative values for financial variables which require non-negativity preserving. These algorithms which we are analyzing preserve not only the non-negativity, but also the character of boundaries (natural, reflecting, absorbing, etc.). The derivatives of the CIR process and the Heston model are being extensively studied. Beyond plain vanilla European options, we creatively apply our splitting-step methods to a path-dependent option valuation. We compare our algorithms to a class of numerical schemes based on Euler discretization which are prevalent currently. The comparisons are given with respect to both accuracy and computational time for the European call option under the CIR model whereas with respect to convergence rate for the path-dependent option under the CIR model and the European call option under the Heston model. 展开更多
关键词 Stochastic Differential EQUATIONS Numerical Methods Splitting-Step algorithm NON-NegaTIVITY CONVERGENCE Simulation
在线阅读 下载PDF
A recognition method of vibration parameter image based on improved immune negative selection algorithm for rotating machinery 被引量:4
8
作者 窦唯 刘占生 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2009年第1期5-10,共6页
To overcome the limitations of traditional monitoring methods, based on vibration parameter image of rotating machinery, this paper presents an abnormality online monitoring method suitable for rotating machinery usin... To overcome the limitations of traditional monitoring methods, based on vibration parameter image of rotating machinery, this paper presents an abnormality online monitoring method suitable for rotating machinery using the negative selection mechanism of biology immune system. This method uses techniques of biology clone and learning mechanism to improve the negative selection algorithm to generate detectors possessing different monitoring radius, covers the abnormality space effectively, and avoids such problems as the low efficiency of generating detectors, etc. The result of an example applying the presented monitoring method shows that this method can solve the difficulty of obtaining fault samples preferably and extract the turbine state character effectively, it also can detect abnormality by causing various fault of the turbine and obtain the degree of abnormality accurately. The exact monitoring precision of abnormality indicates that this method is feasible and has better on-line quality, accuracy and robustness. 展开更多
关键词 artificial immune system negative selection algorithm abnormality monitor image recognition rotating machinery
在线阅读 下载PDF
A projection-domain iterative algorithm for metal artifact reduction by minimizing the total-variation norm and the negative-pixel energy 被引量:1
9
作者 Gengsheng L.Zeng 《Visual Computing for Industry,Biomedicine,and Art》 EI 2022年第1期1-11,共11页
Metal objects in X-ray computed tomography can cause severe artifacts.The state-of-the-art metal artifact reduction methods are in the sinogram inpainting category and are iterative methods.This paper proposes a proje... Metal objects in X-ray computed tomography can cause severe artifacts.The state-of-the-art metal artifact reduction methods are in the sinogram inpainting category and are iterative methods.This paper proposes a projectiondomain algorithm to reduce the metal artifacts.In this algorithm,the unknowns are the metal-affected projections,while the objective function is set up in the image domain.The data fidelity term is not utilized in the objective function.The objective function of the proposed algorithm consists of two terms:the total variation of the metalremoved image and the energy of the negative-valued pixels in the image.After the metal-affected projections are modified,the final image is reconstructed via the filtered backprojection algorithm.The feasibility of the proposed algorithm has been verified by real experimental data. 展开更多
关键词 Analytical image reconstruction Metal artifact reduction Projection-domain iterative algorithm X-ray computed tomography
在线阅读 下载PDF
Fault Detection Using Negative Selection and Genetic Algorithms 被引量:3
10
作者 Anam ABID Zia Ul HAQ Muhammad Tahir KHAN 《Instrumentation》 2019年第3期39-51,共13页
In this paper,negative selection and genetic algorithms are combined and an improved bi-objective optimization scheme is presented to achieve optimized negative selection algorithm detectors.The main aim of the optima... In this paper,negative selection and genetic algorithms are combined and an improved bi-objective optimization scheme is presented to achieve optimized negative selection algorithm detectors.The main aim of the optimal detector generation technique is maximal nonself space coverage with reduced number of diversified detectors.Conventionally,researchers opted clonal selection based optimization methods to achieve the maximal nonself coverage milestone;however,detectors cloning process results in generation of redundant similar detectors and inefficient detector distribution in nonself space.In approach proposed in the present paper,the maximal nonself space coverage is associated with bi-objective optimization criteria including minimization of the detector overlap and maximization of the diversity factor of the detectors.In the proposed methodology,a novel diversity factorbased approach is presented to obtain diversified detector distribution in the nonself space.The concept of diversified detector distribution is studied for detector coverage with 2-dimensional pentagram and spiral self-patterns.Furthermore,the feasibility of the developed fault detection methodology is tested the fault detection of induction motor inner race and outer race bearings. 展开更多
关键词 Detector Coverage Diversity Factor Fault Detection Genetic algorithm Negative Selection algorithm
原文传递
Steganography Algorithm to Hide Secret Message inside an Image 被引量:1
11
作者 Rosziati Ibrahim Teoh Suk Kuan 《Computer Technology and Application》 2011年第2期102-108,共7页
In this paper, the authors propose a new algorithm to hide data inside image using steganography technique. The proposed algorithm uses binary codes and pixels inside an image. The zipped file is used before it is con... In this paper, the authors propose a new algorithm to hide data inside image using steganography technique. The proposed algorithm uses binary codes and pixels inside an image. The zipped file is used before it is converted to binary codes to maximize the storage of data inside the image. By applying the proposed algorithm, a system called Steganography Imaging System (gig) is developed. The system is then tested to see the viability of the proposed algorithm. Various sizes of data are stored inside the images and the Peak signal-to-noise ratio (PSNR) is also captured for each of the images tested. Based on the PSNR value of each images, the stego image has a higher PSNR value. Hence this new steganography algorithm is very efficient to hide the data inside the image. 展开更多
关键词 Steganography algorithm secret key image processing data retrieval.
在线阅读 下载PDF
A novel trilinear decomposition algorithm:Three-dimension non-negative matrix factorization
12
作者 Hong Tao Gao Dong Mei Dai Tong Hua Li 《Chinese Chemical Letters》 SCIE CAS CSCD 2007年第4期495-498,共4页
Non-negative matrix factorization (NMF) is a technique for dimensionality reduction by placing non-negativity constraints on the matrix. Based on the PARAFAC model, NMF was extended for three-dimension data decompos... Non-negative matrix factorization (NMF) is a technique for dimensionality reduction by placing non-negativity constraints on the matrix. Based on the PARAFAC model, NMF was extended for three-dimension data decomposition. The three-dimension nonnegative matrix factorization (NMF3) algorithm, which was concise and easy to implement, was given in this paper. The NMF3 algorithm implementation was based on elements but not on vectors. It could decompose a data array directly without unfolding, which was not similar to that the traditional algorithms do, It has been applied to the simulated data array decomposition and obtained reasonable results. It showed that NMF3 could be introduced for curve resolution in chemometrics. 展开更多
关键词 Three-dimension non-negative matrix factorization NMF3 algorithm Data decomposition CHEMOMETRICS
在线阅读 下载PDF
Designing thermal demultiplexer: Splitting phonons by negative mass and genetic algorithm optimization
13
作者 Yu-Tao Tan Lu-Qin Wang +2 位作者 Zi Wang Jiebin Peng Jie Ren 《Chinese Physics B》 SCIE EI CAS CSCD 2021年第3期36-40,共5页
We propose the concept of thermal demultiplexer, which can split the heat flux in different frequency ranges intodifferent directions. We demonstrate this device concept in a honeycomb lattice with dangling atoms. Fro... We propose the concept of thermal demultiplexer, which can split the heat flux in different frequency ranges intodifferent directions. We demonstrate this device concept in a honeycomb lattice with dangling atoms. From the view ofeffective negative mass, we give a qualitative explanation of how the dangling atoms change the original transport property.We first design a two-mass configuration thermal demultiplexer, and find that the heat flux can flow into different ports incorresponding frequency ranges roughly. Then, to improve the performance, we choose the suitable masses of danglingatoms and optimize the four-mass configuration with genetic algorithm. Finally, we give out the optimal configuration witha remarkable effect. Our study finds a way to selectively split spectrum-resolved heat to different ports as phonon splitter,which would provide a new means to manipulate phonons and heat, and to guide the design of phononic thermal devices inthe future. 展开更多
关键词 phonon transport thermal demultiplexer optimization algorithm
原文传递
Erratum to“Designing thermal demultiplexer:Splitting phonons by negative mass and genetic algorithm optimization”
14
作者 Yu-Tao Tan Lu-Qin Wang +2 位作者 Zi Wang Jiebin Peng Jie Ren 《Chinese Physics B》 SCIE EI CAS CSCD 2021年第9期653-653,共1页
Equations(8)and(9)in the original paper[Chin.Phys.B 30036301(2021)]are corrected.
关键词 phonon transport thermal demultiplexer optimization algorithm
原文传递
An Improved Image Steganography Security and Capacity Using Ant Colony Algorithm Optimization
15
作者 Zinah Khalid Jasim Jasim Sefer Kurnaz 《Computers, Materials & Continua》 SCIE EI 2024年第9期4643-4662,共20页
This advanced paper presents a new approach to improving image steganography using the Ant Colony Optimization(ACO)algorithm.Image steganography,a technique of embedding hidden information in digital photographs,shoul... This advanced paper presents a new approach to improving image steganography using the Ant Colony Optimization(ACO)algorithm.Image steganography,a technique of embedding hidden information in digital photographs,should ideally achieve the dual purposes of maximum data hiding and maintenance of the integrity of the cover media so that it is least suspect.The contemporary methods of steganography are at best a compromise between these two.In this paper,we present our approach,entitled Ant Colony Optimization(ACO)-Least Significant Bit(LSB),which attempts to optimize the capacity in steganographic embedding.The approach makes use of a grayscale cover image to hide the confidential data with an additional bit pair per byte,both for integrity verification and the file checksumof the secret data.This approach encodes confidential information into four pairs of bits and embeds it within uncompressed grayscale images.The ACO algorithm uses adaptive exploration to select some pixels,maximizing the capacity of data embedding whileminimizing the degradation of visual quality.Pheromone evaporation is introduced through iterations to avoid stagnation in solution refinement.The levels of pheromone are modified to reinforce successful pixel choices.Experimental results obtained through the ACO-LSB method reveal that it clearly improves image steganography capabilities by providing an increase of up to 30%in the embedding capacity compared with traditional approaches;the average Peak Signal to Noise Ratio(PSNR)is 40.5 dB with a Structural Index Similarity(SSIM)of 0.98.The approach also demonstrates very high resistance to detection,cutting down the rate by 20%.Implemented in MATLAB R2023a,the model was tested against one thousand publicly available grayscale images,thus providing robust evidence of its effectiveness. 展开更多
关键词 STegaNOGRAPHY STegaNALYSIS capacity optimization ant colony algorithm
在线阅读 下载PDF
On Liu Yi’s Positive-Negative Root Extraction Algorithm
16
《Wuhan University Journal of Natural Sciences》 CAS 1997年第1期3-10,共8页
OnLiuYi’sPositive┐NegativeRootExtractionAlgorithmWangRongbinDepartmentofMathematics,WuhanUniversity,Wuhan430... OnLiuYi’sPositive┐NegativeRootExtractionAlgorithmWangRongbinDepartmentofMathematics,WuhanUniversity,Wuhan430072,ChinaAbstrac... 展开更多
关键词 ROOT EXTRACTION LIU On algorithm YI 秦九韶 演段 释锁 朱世杰
在线阅读 下载PDF
Research on a randomized real-valued negative selection algorithm
17
作者 张凤斌 王胜文 郝忠孝 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2006年第6期745-747,共3页
A real-valued negative selection algorithm with good mathematical foundation is presented to solve some of the drawbacks of previous approach. Specifically, it can produce a good estimate of the optimal number of dete... A real-valued negative selection algorithm with good mathematical foundation is presented to solve some of the drawbacks of previous approach. Specifically, it can produce a good estimate of the optimal number of detectors needed to cover the non-self space, and the maximization of the non-self coverage is done through an optimization algorithm with proven convergence properties. Experiments are performed to validate the assumptions made while designing the algorithm and to evaluate its performance. 展开更多
关键词 intrusion detection immune systems negative selection algorithm
在线阅读 下载PDF
An Adaptive Image Calibration Algorithm for Steganalysis
18
作者 Xuyu Xiang Jiaohua Qin +2 位作者 Junshan Tan Neal N.Xiong 《Computers, Materials & Continua》 SCIE EI 2020年第2期963-976,共14页
In this paper,a new adaptive calibration algorithm for image steganalysis is proposed.Steganography disturbs the dependence between neighboring pixels and decreases the neighborhood node degree.Firstly,we analyzed the... In this paper,a new adaptive calibration algorithm for image steganalysis is proposed.Steganography disturbs the dependence between neighboring pixels and decreases the neighborhood node degree.Firstly,we analyzed the effect of steganography on the neighborhood node degree of cover images.Then,the calibratable pixels are marked by the analysis of neighborhood node degree.Finally,the strong correlation calibration image is constructed by revising the calibratable pixels.Experimental results reveal that compared with secondary steganography the image calibration method significantly increased the detection accuracy for LSB matching steganography on low embedding ratio.The proposed method also has a better performance against spatial steganography. 展开更多
关键词 Calibration algorithm neighborhood node degree ordinary pixel sensitive pixel STegaNALYSIS
在线阅读 下载PDF
A Cuckoo Search Detector Generation-based Negative Selection Algorithm
19
作者 Ayodele Lasisi Ali M.Aseere 《Computer Systems Science & Engineering》 SCIE EI 2021年第8期183-195,共13页
The negative selection algorithm(NSA)is an adaptive technique inspired by how the biological immune system discriminates the self from nonself.It asserts itself as one of the most important algorithms of the artificia... The negative selection algorithm(NSA)is an adaptive technique inspired by how the biological immune system discriminates the self from nonself.It asserts itself as one of the most important algorithms of the artificial immune system.A key element of the NSA is its great dependency on the random detectors in monitoring for any abnormalities.However,these detectors have limited performance.Redundant detectors are generated,leading to difficulties for detectors to effectively occupy the non-self space.To alleviate this problem,we propose the nature-inspired metaheuristic cuckoo search(CS),a stochastic global search algorithm,which improves the random generation of detectors in the NSA.Inbuilt characteristics such as mutation,crossover,and selection operators make the CS attain global convergence.With the use of Lévy flight and a distance measure,efficient detectors are produced.Experimental results show that integrating CS into the negative selection algorithm elevated the detection performance of the NSA,with an average increase of 3.52%detection rate on the tested datasets.The proposed method shows superiority over other models,and detection rates of 98%and 99.29%on Fisher’s IRIS and Breast Cancer datasets,respectively.Thus,the generation of highest detection rates and lowest false alarm rates can be achieved. 展开更多
关键词 Negative selection algorithm detector generation cuckoo search OPTIMIZATION
在线阅读 下载PDF
Modelling the temporal-varied nonlinear velocity profile of debris flow using a stratification aggregation algorithm in 3D-HBP-SPH framework
20
作者 HAN Zheng XIE Wendu +5 位作者 ZENG Chuicheng LI Yange CHEN Guangqi CHEN Ningsheng HU Guisheng WANG Weidong 《Journal of Mountain Science》 SCIE CSCD 2024年第12期3945-3960,共16页
Estimation of velocity profile within mud depth is a long-standing and essential problem in debris flow dynamics.Until now,various velocity profiles have been proposed based on the fitting analysis of experimental mea... Estimation of velocity profile within mud depth is a long-standing and essential problem in debris flow dynamics.Until now,various velocity profiles have been proposed based on the fitting analysis of experimental measurements,but these are often limited by the observation conditions,such as the number of configured sensors.Therefore,the resulting linear velocity profiles usually exhibit limitations in reproducing the temporal-varied and nonlinear behavior during the debris flow process.In this study,we present a novel approach to explore the debris flow velocity profile in detail upon our previous 3D-HBPSPH numerical model,i.e.,the three-dimensional Smoothed Particle Hydrodynamic model incorporating the Herschel-Bulkley-Papanastasiou rheology.Specifically,we propose a stratification aggregation algorithm for interpreting the details of SPH particles,which enables the recording of temporal velocities of debris flow at different mud depths.To analyze the velocity profile,we introduce a logarithmic-based nonlinear model with two key parameters,that a controlling the shape of velocity profile and b concerning its temporal evolution.We verify the proposed velocity profile and explore its sensitivity using 34 sets of velocity data from three individual flume experiments in previous literature.Our results demonstrate that the proposed temporalvaried nonlinear velocity profile outperforms the previous linear profiles. 展开更多
关键词 Debris flow Velocity profile Temporal varied feature NONLINEAR Stratification aggregation algorithm
原文传递
上一页 1 2 250 下一页 到第
使用帮助 返回顶部