期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Least squares fitting of coordinate parameters model
1
作者 YU Sheng-wen~(1), DONG Jun~(2), WANG Ai-min~(3) (1. Shandong University of Science and Technology, Tai’an 271019, China 2. Bao’an Coal Mine of Huaning Group, Hua’ning, Tai’an 271000, China 3. The Plan Bureau of Laiwu, Laiwu 272000, China) 《中国有色金属学会会刊:英文版》 CSCD 2005年第S1期197-199,共3页
This paper starts with untime-diversification of the time-diversification deformation model and gives displacement distribution model of untime-diversification and simplifies further the study of deformation model. Th... This paper starts with untime-diversification of the time-diversification deformation model and gives displacement distribution model of untime-diversification and simplifies further the study of deformation model. The paper discusses the problem of least squares fitting of coordinate parameters model—parameters of deformation model. During discussion, the basic means of cubic B splines and two steps of multidimensional disorder datum fitting are adopted which can make fitting function calculated mostly approximate coordinate parameters model and it can make calculation easier. 展开更多
关键词 COORDINATE parameter MODEL least SQUARES FITTING two STEPS of multi-dimensional disorder data curve FITTING
在线阅读 下载PDF
A Fast Physical Layer Security-Based Location Privacy Parameter Recommendation Algorithm in 5G IoT
2
作者 Hua Zhao Mingyan Xu +1 位作者 Zhou Zhong Ding Wang 《China Communications》 SCIE CSCD 2021年第8期75-84,共10页
The 5G IoT(Internet of Things,IoT)is easier to implement in location privacy-preserving research.The terminals in distributed network architecture blur their accurate locations into a spatial cloaking region but most ... The 5G IoT(Internet of Things,IoT)is easier to implement in location privacy-preserving research.The terminals in distributed network architecture blur their accurate locations into a spatial cloaking region but most existing spatial cloaking algorithms cannot work well because of man-in-the-middle attacks,high communication overhead,time consumption,and the lower success rate.This paper proposes an algorithm that can recommend terminal’s privacy requirements based on getting terminal distribution information in the neighborhood after cross-layer authentication and therefore help 5G IoT terminals find enough collaborative terminals safely and quickly.The approach shows it can avoid man-in-the-middle attacks and needs lower communication costs and less searching time than 520ms at the same time.It has a great anonymization success rate by 93%through extensive simulation experiments for a range of 5G IoT scenarios. 展开更多
关键词 cross-layer authentication location privacy parameter recommendation 5G IoT
在线阅读 下载PDF
Improving Numerical Weather Prediction in Low Latitudes by Optimizing Diffusion Coefficients
3
作者 刘金达 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 1993年第3期345-352,共8页
The horizontal diffusion coefficients of the operational model (T42L9) in numerical weather prediction are optimized by the steepest descent search of multi-dimensional optimization. In order to improve prediction acc... The horizontal diffusion coefficients of the operational model (T42L9) in numerical weather prediction are optimized by the steepest descent search of multi-dimensional optimization. In order to improve prediction accuracy in low latitudes, the optimum horizontal diffusion coefficients are chosen, with changing variation of the basic diffusion coefficient with the passage of time, and later forecasts are also made better. In view of the averages of forecast verifications of 9 cases, the forecasts with optimum diffusion coefficients are an improvement on operational forecasts. It means that the forecasts are got much better with optimum values of some important parameters by optimization in numerical weather prediction. 展开更多
关键词 multi-dimensional optimization Steepest descent search Optimum horizontal diffusion coefficients Optimum values of parameters
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部