Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    PROCEEDINGS

    Distribution Transport: A High-Efficiency Method for Orbital Uncertainty Propagation

    Changtao Wang1, Honghua Dai1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.29, No.3, pp. 1-2, 2024, DOI:10.32604/icces.2024.010943

    Abstract Orbital uncertainty propagation is fundamental in space situational awareness-related missions such as orbit prediction and tracking. Linear models and full nonlinear Monte Carlo simulations were primarily used to propagate uncertainties [1]. However, these methods hampered the application due to low precision and intensive computation. Over the past two decades, numerous nonlinear uncertainty propagators have been proposed. Among these methods, the state transition tensor (STT) method has been widely used due to its controllable accuracy and high efficiency [2]. However, this method has two drawbacks. First, its semi-analytical formulation is too intricate to implement, which hinders… More >

  • Open Access

    ARTICLE

    A Multi-Strategy-Improved Northern Goshawk Optimization Algorithm for Global Optimization and Engineering Design

    Liang Zeng1,2, Mai Hu1, Chenning Zhang1, Quan Yuan1, Shanshan Wang1,2,*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1677-1709, 2024, DOI:10.32604/cmc.2024.049717 - 18 July 2024

    Abstract Optimization algorithms play a pivotal role in enhancing the performance and efficiency of systems across various scientific and engineering disciplines. To enhance the performance and alleviate the limitations of the Northern Goshawk Optimization (NGO) algorithm, particularly its tendency towards premature convergence and entrapment in local optima during function optimization processes, this study introduces an advanced Improved Northern Goshawk Optimization (INGO) algorithm. This algorithm incorporates a multifaceted enhancement strategy to boost operational efficiency. Initially, a tent chaotic map is employed in the initialization phase to generate a diverse initial population, providing high-quality feasible solutions. Subsequently, after… More >

  • Open Access

    ARTICLE

    Machine Learning for Modeling and Control of Industrial Clarifier Process

    M. Rajalakshmi1, V. Saravanan2, V. Arunprasad3, C. A. T. Romero4, O. I. Khalaf5, C. Karthik1,*

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 339-359, 2022, DOI:10.32604/iasc.2022.021696 - 26 October 2021

    Abstract In sugar production, model parameter estimation and controller tuning of the nonlinear clarification process are major concerns. Because the sugar industry’s clarification process is difficult and nonlinear, obtaining the exact model using identification methods is critical. For regulating the clarification process and identifying the model parameters, this work presents a state transition algorithm (STA). First, the model parameters for the clarifier are estimated using the normal system identification process. The STA is then utilized to improve the accuracy of the system parameters that have been identified. Metaheuristic algorithms such as Genetic Algorithm (GA), Particle Swarm More >

  • Open Access

    ARTICLE

    A Network Security Risk Assessment Method Based on a B_NAG Model

    Hui Wang1, Chuanhan Zhu1, Zihao Shen1,*, Dengwei Lin2, Kun Liu1, MengYao Zhao3

    Computer Systems Science and Engineering, Vol.38, No.1, pp. 103-117, 2021, DOI:10.32604/csse.2021.014680 - 01 April 2021

    Abstract Computer networks face a variety of cyberattacks. Most network attacks are contagious and destructive, and these types of attacks can be harmful to society and computer network security. Security evaluation is an effective method to solve network security problems. For accurate assessment of the vulnerabilities of computer networks, this paper proposes a network security risk assessment method based on a Bayesian network attack graph (B_NAG) model. First, a new resource attack graph (RAG) and the algorithm E-Loop, which is applied to eliminate loops in the B_NAG, are proposed. Second, to distinguish the confusing relationships between… More >

Displaying 1-10 on page 1 of 4. Per Page