CASIA OpenIR

浏览/检索结果: 共5条,第1-5条 帮助

限定条件        
已选(0)清除 条数/页:   排序方式:
A Computational Model for Measuring Trust in Mobile Social Networks Using Fuzzy Logic 期刊论文
International Journal of Automation and Computing, 2020, 卷号: 17, 期号: 6, 页码: 812-821
作者:  Farzam Matinfar
浏览  |  Adobe PDF(696Kb)  |  收藏  |  浏览/下载:731/544  |  提交时间:2021/02/22
Trust  fuzzy clustering  mobile social networks  trust calculation model  fuzzy logic.  
A Survey on Fault Diagnosis and Fault Tolerant Methodologies for Permanent Magnet Synchronous Machines 期刊论文
International Journal of Automation and Computing, 2020, 卷号: 17, 期号: 6, 页码: 763-787
作者:  Erphan A. Bhuiyan;  Md. Maeenul Azad Akhand;  Sajal K. Das;  Md. F. Ali;  Z. Tasneem;  Md. R. Islam;  D. K. Saha;  Faisal R. Badal;  Md. H. Ahamed;  S. I. Moyeen
Adobe PDF(2346Kb)  |  收藏  |  浏览/下载:236/89  |  提交时间:2021/02/22
Permanent magnet synchronous machine (PMSM)  fault diagnosis  fault tolerant control system (FTCS)  fault detection  stability.  
Image Encryption Application of Chaotic Sequences Incorporating Quantum Keys 期刊论文
International Journal of Automation and Computing, 2020, 卷号: 17, 期号: 1, 页码: 123-138
作者:  Bin Ge;  Hai-Bo Luo
浏览  |  Adobe PDF(2559Kb)  |  收藏  |  浏览/下载:146/52  |  提交时间:2021/02/22
Logistic chaotic system  quantum key  nonlinear operation  sequence performance  image encryption algorithm.  
Hidden Markov Model Approach for Software Reliability Estimation with Logic Error 期刊论文
International Journal of Automation and Computing, 2020, 卷号: 17, 期号: 2, 页码: 305-320
作者:  R. Bharathi;  R. Selvarani
浏览  |  Adobe PDF(1248Kb)  |  收藏  |  浏览/下载:214/75  |  提交时间:2021/02/22
Hidden Markov model (HMM)  reliability  logic error  safety critical  software failure.  
The Propagation Background in Social Networks: Simulating and Modeling 期刊论文
International Journal of Automation and Computing, 2020, 卷号: 17, 期号: 3, 页码: 353-363
作者:  Kai Li;  Tong Xu;  Shuai Feng;  Li-Sheng Qiao;  Hua-Wei Shen;  Tian-Yang Lv;  Xue-Qi Cheng;  En-Hong Chen
Adobe PDF(1398Kb)  |  收藏  |  浏览/下载:157/59  |  提交时间:2021/02/22
Social network  information overload  propagation background  simulating  modeling.