首页 > 最新文献

2013 XXIV International Conference on Information, Communication and Automation Technologies (ICAT)最新文献

英文 中文
Calculation of traversing time distributions in semi-Markov chains with application on Petri Nets 半马尔可夫链遍历时间分布的计算及其在Petri网上的应用
F. Hadziomerovic
This paper shows how to obtain probability distribution of traversing time between initial and final states in Markov Chains underlying Petri Nets. The exact closed form solution is obtained for the negative exponential transitions (firing times) with or without one deterministic transition, and the approximate solution for the mix of negative exponential with more than one deterministic transitions. Then the known distribution enables to find the percentile estimates. We apply our method to obtain the percentile of a packet delay in the network. This approach can be applied to any performance tool which reduces to Markov chains, such as Finite State Machines as well as Queuing Networks.
本文给出了Petri网基础上的马尔可夫链在初始状态和最终状态之间穿越时间的概率分布。得到了带或不带一个确定性跃迁的负指数跃迁(发射时间)的精确封闭解,以及带多个确定性跃迁的负指数混合的近似解。然后,已知分布可以找到百分位数估计值。我们应用我们的方法来获得网络中数据包延迟的百分位数。这种方法可以应用于任何简化为马尔可夫链的性能工具,例如有限状态机和排队网络。
{"title":"Calculation of traversing time distributions in semi-Markov chains with application on Petri Nets","authors":"F. Hadziomerovic","doi":"10.1109/ICAT.2013.6684082","DOIUrl":"https://doi.org/10.1109/ICAT.2013.6684082","url":null,"abstract":"This paper shows how to obtain probability distribution of traversing time between initial and final states in Markov Chains underlying Petri Nets. The exact closed form solution is obtained for the negative exponential transitions (firing times) with or without one deterministic transition, and the approximate solution for the mix of negative exponential with more than one deterministic transitions. Then the known distribution enables to find the percentile estimates. We apply our method to obtain the percentile of a packet delay in the network. This approach can be applied to any performance tool which reduces to Markov chains, such as Finite State Machines as well as Queuing Networks.","PeriodicalId":348701,"journal":{"name":"2013 XXIV International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131329471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Solving Laplace differential equation using Markov chains in Monte Carlo method 用蒙特卡罗法求解拉普拉斯微分方程的马尔可夫链
M. Kokorus, K. Sokolija
This paper presents solution to Laplace differential equation by using Markov chains in Monte Carlo method. Considered here was a two-dimensional model that satisfies Dirichlet and Neumann conditions. In particular, electrostatic field was observed in case of homogeneous Neumann condition at one of the domain boundaries.
本文利用蒙特卡罗法中的马尔可夫链给出了拉普拉斯微分方程的解。这里考虑的是一个满足狄利克雷和诺伊曼条件的二维模型。特别地,在其中一个区域边界处观察到了齐次诺伊曼条件下的静电场。
{"title":"Solving Laplace differential equation using Markov chains in Monte Carlo method","authors":"M. Kokorus, K. Sokolija","doi":"10.1109/ICAT.2013.6684079","DOIUrl":"https://doi.org/10.1109/ICAT.2013.6684079","url":null,"abstract":"This paper presents solution to Laplace differential equation by using Markov chains in Monte Carlo method. Considered here was a two-dimensional model that satisfies Dirichlet and Neumann conditions. In particular, electrostatic field was observed in case of homogeneous Neumann condition at one of the domain boundaries.","PeriodicalId":348701,"journal":{"name":"2013 XXIV International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130346356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fault isolation using Model-on-Demand algorithm 使用模型-按需算法进行故障隔离
Hajrudin Efendic, L. Re
This paper discusses the Model-on-Demand algorithm for fault isolation in large and complex technical systems. The main objective of the proposed algorithm is to improve fault isolation performance metrics by applying a structural analysis approach which targets the isolability problem in structurally time-invariant systems. This objective is achieved by the utilization of a reverse modeling approach in order to modify the structural matrix of the system in such a way to improve its isolability property. The proposed algorithm was tested in a real technical system and an overview of the experimental results is given here.
本文讨论了大型复杂技术系统故障隔离的模型-按需算法。该算法的主要目标是通过应用结构分析方法来改善故障隔离性能指标,该方法针对结构定常系统中的可隔离性问题。这一目标是通过利用反向建模方法来修改系统的结构矩阵以提高其隔离性来实现的。本文对该算法在实际技术系统中进行了测试,并对实验结果进行了概述。
{"title":"Fault isolation using Model-on-Demand algorithm","authors":"Hajrudin Efendic, L. Re","doi":"10.1109/ICAT.2013.6684092","DOIUrl":"https://doi.org/10.1109/ICAT.2013.6684092","url":null,"abstract":"This paper discusses the Model-on-Demand algorithm for fault isolation in large and complex technical systems. The main objective of the proposed algorithm is to improve fault isolation performance metrics by applying a structural analysis approach which targets the isolability problem in structurally time-invariant systems. This objective is achieved by the utilization of a reverse modeling approach in order to modify the structural matrix of the system in such a way to improve its isolability property. The proposed algorithm was tested in a real technical system and an overview of the experimental results is given here.","PeriodicalId":348701,"journal":{"name":"2013 XXIV International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133406767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting heat sources from 3D thermal model of indoor environment 利用室内环境三维热模型检测热源
Dinko Osmankovic, J. Velagić
Recent developments in environment sensing and virtual modelling enabled the construction of virtual models of indoor environments with added thermal information. In this paper we present the methods for heat sources extraction from the 3D thermal model of an indoor environment. They are based on known image segmentation techniques but adjusted to work with 3D models with added thermal information. All data are acquired using an autonomous mobile robot platform equipped with 3D laser scanner and thermal imaging camera.
环境传感和虚拟建模的最新发展使得构建具有附加热信息的室内环境虚拟模型成为可能。本文提出了一种从室内环境三维热模型中提取热源的方法。它们基于已知的图像分割技术,但经过调整,可以与添加了热信息的3D模型一起工作。所有数据都是通过配备3D激光扫描仪和热成像相机的自主移动机器人平台获取的。
{"title":"Detecting heat sources from 3D thermal model of indoor environment","authors":"Dinko Osmankovic, J. Velagić","doi":"10.1109/ICAT.2013.6684094","DOIUrl":"https://doi.org/10.1109/ICAT.2013.6684094","url":null,"abstract":"Recent developments in environment sensing and virtual modelling enabled the construction of virtual models of indoor environments with added thermal information. In this paper we present the methods for heat sources extraction from the 3D thermal model of an indoor environment. They are based on known image segmentation techniques but adjusted to work with 3D models with added thermal information. All data are acquired using an autonomous mobile robot platform equipped with 3D laser scanner and thermal imaging camera.","PeriodicalId":348701,"journal":{"name":"2013 XXIV International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131821675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Consensus over multi-hop networked systems subject to heterogeneous time delays 异构时延下多跳网络系统的一致性
S. Manfredi
Today great attention it has been posed on the consensus protocols that allow every agent automatically converge to a common consensus state using only local information received from its one hop neighboring agents. We consider the problem of reaching a consensus in multi-hop networked systems where each agent can access to the state of its m-hops neighboring agents. Additionally the presence of heterogeneous time delays affecting the communication through the multi-hop path is considered. Multi-hop and link time delay are unavoidable features of realistic networked system architectures based on wireless sensor networks. In this scenario, we derive condition to reach a consensus which is an explicit function of the system parameters including the delay bound, network topology, number of hop. Also a tradeoff between the convergence speed and the time delay is discussed.
目前,人们非常关注共识协议,该协议允许每个代理仅使用从其一跳相邻代理接收的本地信息自动收敛到共同的共识状态。在多跳网络系统中,每个智能体都可以访问相邻智能体的m跳状态。此外,还考虑了通过多跳路径影响通信的异构时延的存在。多跳和链路时延是基于无线传感器网络的现实网络系统架构不可避免的特点。在这种情况下,我们导出了达成共识的条件,该条件是系统参数(包括延迟界、网络拓扑、跳数)的显式函数。同时讨论了收敛速度和时延之间的权衡。
{"title":"Consensus over multi-hop networked systems subject to heterogeneous time delays","authors":"S. Manfredi","doi":"10.1109/ICAT.2013.6684035","DOIUrl":"https://doi.org/10.1109/ICAT.2013.6684035","url":null,"abstract":"Today great attention it has been posed on the consensus protocols that allow every agent automatically converge to a common consensus state using only local information received from its one hop neighboring agents. We consider the problem of reaching a consensus in multi-hop networked systems where each agent can access to the state of its m-hops neighboring agents. Additionally the presence of heterogeneous time delays affecting the communication through the multi-hop path is considered. Multi-hop and link time delay are unavoidable features of realistic networked system architectures based on wireless sensor networks. In this scenario, we derive condition to reach a consensus which is an explicit function of the system parameters including the delay bound, network topology, number of hop. Also a tradeoff between the convergence speed and the time delay is discussed.","PeriodicalId":348701,"journal":{"name":"2013 XXIV International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122975542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A compact color descriptor for image retrieval 用于图像检索的紧凑颜色描述符
Vedran Ljubovic, H. Supic
The resource usage in Content-Based Image Retrieval is a frequently neglected issue. This paper describes a novel compact feature vector based on image color histograms in the HSL color space. The images are represented using only 10 bytes per image. It is shown that, in the context of Query-by-Example (QbE) usage scenarios, the method described achieves retrieval performance close to the state of the art image retrieval methods that use considerably more memory. It is also shown that the described method outperforms other methods with similar memory usage.
基于内容的图像检索中的资源利用是一个经常被忽视的问题。提出了一种基于HSL色彩空间中图像颜色直方图的紧凑特征向量。每个图像仅使用10字节表示。结果表明,在按例查询(QbE)使用场景的上下文中,所描述的方法实现的检索性能接近于使用更多内存的最新图像检索方法。在内存使用相似的情况下,所描述的方法优于其他方法。
{"title":"A compact color descriptor for image retrieval","authors":"Vedran Ljubovic, H. Supic","doi":"10.1109/ICAT.2013.6684096","DOIUrl":"https://doi.org/10.1109/ICAT.2013.6684096","url":null,"abstract":"The resource usage in Content-Based Image Retrieval is a frequently neglected issue. This paper describes a novel compact feature vector based on image color histograms in the HSL color space. The images are represented using only 10 bytes per image. It is shown that, in the context of Query-by-Example (QbE) usage scenarios, the method described achieves retrieval performance close to the state of the art image retrieval methods that use considerably more memory. It is also shown that the described method outperforms other methods with similar memory usage.","PeriodicalId":348701,"journal":{"name":"2013 XXIV International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114200034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Intrusion detection using neural network committee machine 入侵检测采用神经网络委员会机
Alma Husagic-Selman, R. Köker, S. Selman
Intrusion detection plays an important role in todays computer and communication technology. As such it is very important to design time efficient Intrusion Detection System (IDS) low in both, False Positive Rate (FPR) and False Negative Rate (FNR), but high in attack detection precision. To achieve that, this paper proposes Neural Network Committee Machine (NNCM) IDS. NNCM IDS consists of Input Reduction System based on Principal Component Analysis (PCA) and Intrusion Detection System, which is represented by three levels committee machine, each based on Back-Propagation Neural Network. To reduce the FNR, the system uses offline System Update, which retrains the networks when new attacks are introduced. The system shows the overall attack detection success of 99.8%.
入侵检测在当今的计算机和通信技术中起着重要的作用。因此,设计一种既低误报率(FPR)又低误报率(FNR),又具有较高的攻击检测精度的高效入侵检测系统是非常重要的。为此,本文提出了神经网络委员会机(NNCM)入侵检测系统。NNCM入侵检测系统由基于主成分分析(PCA)的输入约简系统和基于反向传播神经网络的三级委员会机代表的入侵检测系统组成。为了降低FNR,系统采用离线系统更新(system Update),当有新的攻击出现时对网络进行重新训练。系统总体攻击检测成功率为99.8%。
{"title":"Intrusion detection using neural network committee machine","authors":"Alma Husagic-Selman, R. Köker, S. Selman","doi":"10.1109/ICAT.2013.6684073","DOIUrl":"https://doi.org/10.1109/ICAT.2013.6684073","url":null,"abstract":"Intrusion detection plays an important role in todays computer and communication technology. As such it is very important to design time efficient Intrusion Detection System (IDS) low in both, False Positive Rate (FPR) and False Negative Rate (FNR), but high in attack detection precision. To achieve that, this paper proposes Neural Network Committee Machine (NNCM) IDS. NNCM IDS consists of Input Reduction System based on Principal Component Analysis (PCA) and Intrusion Detection System, which is represented by three levels committee machine, each based on Back-Propagation Neural Network. To reduce the FNR, the system uses offline System Update, which retrains the networks when new attacks are introduced. The system shows the overall attack detection success of 99.8%.","PeriodicalId":348701,"journal":{"name":"2013 XXIV International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115059713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Using closed frequent sets to cluster malwares 使用闭频繁集对恶意软件进行聚类
A. Sprague, Adam Rhodes, Gary Warner
The static analysis of malwares at UAB starts with the receipt of about 5000 malwares each day. One of our goals is to cluster these malwares into families. Each malware is an executable. For processing, we represent each malware by the set of printable strings that it contains. A method we have pursued to cluster malwares into families starts with the data mining technique of generating frequent itemsets. It is difficult to generate frequent itemsets at low support thresholds, which is what our application demands. This paper discusses our successful efforts to overcome this barrier of low support threshold.
UAB对恶意软件的静态分析从每天收到大约5000个恶意软件开始。我们的目标之一是将这些恶意软件分类。每个恶意软件都是一个可执行文件。对于处理,我们通过它包含的一组可打印字符串来表示每个恶意软件。我们所追求的一种将恶意软件聚类到家族中的方法是从生成频繁项集的数据挖掘技术开始的。在低支持阈值下生成频繁项集是很困难的,而这正是我们的应用程序所需要的。本文讨论了我们为克服这一低支持阈值障碍所做的成功努力。
{"title":"Using closed frequent sets to cluster malwares","authors":"A. Sprague, Adam Rhodes, Gary Warner","doi":"10.1109/ICAT.2013.6684043","DOIUrl":"https://doi.org/10.1109/ICAT.2013.6684043","url":null,"abstract":"The static analysis of malwares at UAB starts with the receipt of about 5000 malwares each day. One of our goals is to cluster these malwares into families. Each malware is an executable. For processing, we represent each malware by the set of printable strings that it contains. A method we have pursued to cluster malwares into families starts with the data mining technique of generating frequent itemsets. It is difficult to generate frequent itemsets at low support thresholds, which is what our application demands. This paper discusses our successful efforts to overcome this barrier of low support threshold.","PeriodicalId":348701,"journal":{"name":"2013 XXIV International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132087529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cooperative load balancing algorithm in multiple bottleneck networks 多瓶颈网络中的协同负载均衡算法
S. Manfredi
In this paper we validate the recent introduced cooperative load balancing algorithm ([6]) in a multiple bottleneck scenario. The controller at each router (server or switch) regulates the rates of the heterogeneous sources leveraging on the cooperation of neighboring bottlenecks. The proposed approach guarantees good performance in terms of link utilization, packet loss and fairness. Additionally it is guaranteed queue balancing without requiring rerouting or hop by hop operation differently from the existing approaches. A validation is carried out by a discrete packet experiment simulator in a realistic multi-bottleneck scenario to demonstrate the effectiveness of the key idea of the paper.
在本文中,我们在多瓶颈场景中验证了最近引入的协作负载平衡算法([6])。每个路由器(服务器或交换机)上的控制器利用相邻瓶颈的协作来调节异构源的速率。该方法在链路利用率、丢包率和公平性方面保证了良好的性能。此外,它保证队列平衡,而不需要重路由或与现有方法不同的逐跳操作。在一个真实的多瓶颈场景下,用离散分组实验模拟器进行了验证,验证了本文核心思想的有效性。
{"title":"Cooperative load balancing algorithm in multiple bottleneck networks","authors":"S. Manfredi","doi":"10.1109/ICAT.2013.6684036","DOIUrl":"https://doi.org/10.1109/ICAT.2013.6684036","url":null,"abstract":"In this paper we validate the recent introduced cooperative load balancing algorithm ([6]) in a multiple bottleneck scenario. The controller at each router (server or switch) regulates the rates of the heterogeneous sources leveraging on the cooperation of neighboring bottlenecks. The proposed approach guarantees good performance in terms of link utilization, packet loss and fairness. Additionally it is guaranteed queue balancing without requiring rerouting or hop by hop operation differently from the existing approaches. A validation is carried out by a discrete packet experiment simulator in a realistic multi-bottleneck scenario to demonstrate the effectiveness of the key idea of the paper.","PeriodicalId":348701,"journal":{"name":"2013 XXIV International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114311988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mathematical modeling of vehicle frontal crash by a double spring-mass-damper model 基于双弹簧-质量-阻尼器模型的汽车正面碰撞数学建模
B. Munyazikwiye, H. Karimi, K. Robbersmyr
This paper presents development of a mathematical model to represent the real vehicle frontal crash scenario. The vehicle is modeled by a double spring-mass-damper system. The front mass m1 represents the chassi of the vehicle and rear mass m2 represents the passenger compartment. The physical parameters of the model (Stiffness and dampers) are estimated using Nonlinear least square method (Levenberg-Marquart algorithm) by curve fitting the response of a double spring-mass-damper system to the experimental displacement data from the real vehicle crash. The model is validated by comparing the results from the model with the experimental results from real crash tests available.
本文介绍了一个数学模型的发展,以表示真实的汽车正面碰撞场景。车辆采用双弹簧-质量-阻尼系统建模。前质量m1代表车辆的底盘,后质量m2代表乘客舱。采用非线性最小二乘法(Levenberg-Marquart算法)拟合双弹簧-质量-阻尼系统对实际车辆碰撞试验位移数据的响应,估计了模型的物理参数(刚度和阻尼器)。通过与实际碰撞试验结果的比较,验证了模型的正确性。
{"title":"Mathematical modeling of vehicle frontal crash by a double spring-mass-damper model","authors":"B. Munyazikwiye, H. Karimi, K. Robbersmyr","doi":"10.1109/ICAT.2013.6684071","DOIUrl":"https://doi.org/10.1109/ICAT.2013.6684071","url":null,"abstract":"This paper presents development of a mathematical model to represent the real vehicle frontal crash scenario. The vehicle is modeled by a double spring-mass-damper system. The front mass m1 represents the chassi of the vehicle and rear mass m2 represents the passenger compartment. The physical parameters of the model (Stiffness and dampers) are estimated using Nonlinear least square method (Levenberg-Marquart algorithm) by curve fitting the response of a double spring-mass-damper system to the experimental displacement data from the real vehicle crash. The model is validated by comparing the results from the model with the experimental results from real crash tests available.","PeriodicalId":348701,"journal":{"name":"2013 XXIV International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122407272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2013 XXIV International Conference on Information, Communication and Automation Technologies (ICAT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1