Articles de revues sur le sujet « Worm Algorithm »

Pour voir les autres types de publications sur ce sujet consultez le lien suivant : Worm Algorithm.

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « Worm Algorithm ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.

1

Rindlisbacher, Tobias, et Philippe de Forcrand. « Worm algorithm for theCPN−1model ». Nuclear Physics B 918 (mai 2017) : 178–219. http://dx.doi.org/10.1016/j.nuclphysb.2017.02.021.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Gaofei, Zheng, Wang Xiufeng et Zhang Yanli. « The self-organizing worm algorithm ». Journal of Systems Engineering and Electronics 18, no 3 (septembre 2007) : 650–54. http://dx.doi.org/10.1016/s1004-4132(07)60143-1.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Delgado, Y., et A. Schmidt. « Worm Algorithm for Abelian Gauge-Higgs Models ». Acta Physica Polonica B Proceedings Supplement 6, no 3 (2013) : 911. http://dx.doi.org/10.5506/aphyspolbsupp.6.911.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Prokof'ev, N. V., B. V. Svistunov et I. S. Tupitsyn. « “Worm” algorithm in quantum Monte Carlo simulations ». Physics Letters A 238, no 4-5 (février 1998) : 253–57. http://dx.doi.org/10.1016/s0375-9601(97)00957-2.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Kerl, John. « A worm algorithm for random spatial permutations ». Physics Procedia 4 (2010) : 61–65. http://dx.doi.org/10.1016/j.phpro.2010.08.009.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Janke, Wolfhard, Thomas Neuhaus et Adriaan M. J. Schakel. « Critical loop gases and the worm algorithm ». Nuclear Physics B 829, no 3 (avril 2010) : 573–99. http://dx.doi.org/10.1016/j.nuclphysb.2009.12.024.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Yang, XinYu, Yi Shi et HuiJun Zhu. « Detection and location algorithm against local-worm ». Science in China Series F : Information Sciences 51, no 12 (27 août 2008) : 1935–46. http://dx.doi.org/10.1007/s11432-008-0132-z.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Salunkhe, Shamal, et Surendra Bhosale. « Nature Inspired Algorithm for Pixel Location Optimization in Video Steganography Using Deep RNN ». International Journal on Engineering, Science and Technology 3, no 2 (16 janvier 2022) : 146–54. http://dx.doi.org/10.46328/ijonest.67.

Texte intégral
Résumé :
The steganography is applied on text, image, video, and audio files. The steganography is useful for safe and secure data transmission. Video steganography is used to preserve confidential information of security applications. To improve security of the message, pixels locations are optimized using nature inspired algorithm. As conventional algorithms have a low convergence rate a new algorithm is proposed. A New algorithm is developed by combining two model algorithms namely, Water wave optimization (WWO) and Earth worm optimization (EWO) and is renamed as proposed Water-Earth Worm Optimization (WEWO) algorithm. The frames are preprocessed and extracted using Discrete Cosine transform (DCT) and Structured Similarity index (SSIM), respectively, as regular processing. For pixel prediction, the fitness function is obtained from neighborhood entropies in proposed algorithm. In this method, secret message is embedded with two level decomposition of Wavelet Transform (WT). In the proposed work is tested with ‘CAVIAR’ dataset. The Proposed WEWO-Deep RNN algorithm performance is tested with modular noises such as, pepper, salt and pepper noises. The proposed method gives enhanced performance, which is seen with the parameters, Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), and Correlation Coefficient (CC) which defines image quality indices.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Wang, Yifan, Prathamesh Pandit, Akhil Kandhari, Zehao Liu et Kathryn A. Daltorio. « Rapidly Exploring Random Tree Algorithm-Based Path Planning for Worm-Like Robot ». Biomimetics 5, no 2 (5 juin 2020) : 26. http://dx.doi.org/10.3390/biomimetics5020026.

Texte intégral
Résumé :
Inspired by earthworms, worm-like robots use peristaltic waves to locomote. While there has been research on generating and optimizing the peristalsis wave, path planning for such worm-like robots has not been well explored. In this paper, we evaluate rapidly exploring random tree (RRT) algorithms for path planning in worm-like robots. The kinematics of peristaltic locomotion constrain the potential for turning in a non-holonomic way if slip is avoided. Here we show that adding an elliptical path generating algorithm, especially a two-step enhanced algorithm that searches path both forward and backward simultaneously, can make planning such waves feasible and efficient by reducing required iterations by up around 2 orders of magnitude. With this path planner, it is possible to calculate the number of waves to get to arbitrary combinations of position and orientation in a space. This reveals boundaries in configuration space that can be used to determine whether to continue forward or back-up before maneuvering, as in the worm-like equivalent of parallel parking. The high number of waves required to shift the body laterally by even a single body width suggests that strategies for lateral motion, planning around obstacles and responsive behaviors will be important for future worm-like robots.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Hilool, Ali Khalid, Soukaena H. Hashem et Shatha H. Jafer. « Intrusion detection system based on bagging with support vector machine ». Indonesian Journal of Electrical Engineering and Computer Science 24, no 2 (1 novembre 2021) : 1100. http://dx.doi.org/10.11591/ijeecs.v24.i2.pp1100-1106.

Texte intégral
Résumé :
<p>Due to their rapid spread, computer worms perform harmful tasks in networks, posing a security risk; however, existing worm detection algorithms continue to struggle to achieve good performance and the reasons for that are: First, a large amount of irrelevant data affects classification accuracy. Second, individual classifiers do not detect all types of worms effectively. Third, many systems are based on outdated data, making them unsuitable for new worm species. The goal of the study is to use data mining algorithms to detect worms in the network because they have a high ability to detect new types accurately. The proposal is based on the UNSW NB15 dataset and uses a support vector machine to train and test the ensemble bagging algorithm. To detect various types of worms efficiently, the contribution suggests combining correlation and Chi2 feature selection method called Chi2-Corr to select relevant features and using support vector machine (SVM) in the bagging algorithm. The system achieved accuracy reaching 0.998 with Chi2-Corr, and 0.989, 0.992 with correlation and chi-square separately.</p>
Styles APA, Harvard, Vancouver, ISO, etc.
11

Lukyanov, A. S., et A. I. Starikov. « Improving the efficiency of calculation of gear trains and worm drives ». Izvestiya MGTU MAMI 7, no 4-2 (20 avril 2013) : 417–20. http://dx.doi.org/10.17816/2074-0530-68367.

Texte intégral
Résumé :
The paper proposes an improved algorithm for calculating gear train and worm drive enabling comparative analysis and subsequent selection of materials from which the items will be made. On the base of the proposed algorithm, a program was designed for design and checking calculation of gear trains and worm drives.
Styles APA, Harvard, Vancouver, ISO, etc.
12

Navaezadeh, Sedigheh, Mehdi Sadeghzadeh et Ali Harounabadi. « Increasing efficiency in Grid by using glow worm Algorithm ». International Journal of Computer Applications Technology and Research 2, no 5 (20 septembre 2013) : 606–8. http://dx.doi.org/10.7753/ijcatr0205.1015.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
13

Mayeli, Ali, Erfan Mehregan et Mohsen Manna. « Using Glow-worm algorithm to predict companies’ financial distress ». Revista de Investigaciones Universidad del Quindío 34, S3 (19 septembre 2022) : 178–85. http://dx.doi.org/10.33975/riuq.vol34ns3.1018.

Texte intégral
Résumé :
One important research issue in the risk management area is to predict the financial distress of companies. This case has received great attention from banks, companies, managers, and investors. Although there are many studies on this case, the hybrid models (mixed feature selection and classifier models) have been used by researchers in recent years. The main objective of this study is to propose a high-performance predictive model and compare its results with other models that are commonly used for financial distress prediction. To do this, the Glowworm optimization algorithm-based hybrid neural network model was employed. Moreover, the neural network and logistic regression model, which is one of the statistical classifier models were used. The results indicated that the glowworm optimization algorithm (also known as firefly optimization algorithm)-based hybrid neural network model had higher performance compared to the neural network and logistic regression models.
Styles APA, Harvard, Vancouver, ISO, etc.
14

Rindlisbacher, Tobias, Oscar Åkerlund et Philippe de Forcrand. « Sampling of general correlators in worm-algorithm based simulations ». Nuclear Physics B 909 (août 2016) : 542–83. http://dx.doi.org/10.1016/j.nuclphysb.2016.05.026.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
15

Zhang, Wei, Timothy M. Garoni et Youjin Deng. « A worm algorithm for the fully-packed loop model ». Nuclear Physics B 814, no 3 (juin 2009) : 461–84. http://dx.doi.org/10.1016/j.nuclphysb.2009.01.007.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
16

Peng, Sancheng, Min Wu, Guojun Wang et Shui Yu. « Containing smartphone worm propagation with an influence maximization algorithm ». Computer Networks 74 (décembre 2014) : 103–13. http://dx.doi.org/10.1016/j.comnet.2014.09.004.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
17

Nykytyuk, S. O., I. M. Tsymbalyuk, Kh I. Dorozhovska, S. S. Levenets, T. O. Voroncova et M. V. Dollinna. « Lymphadenopathy and worm infestation in children : the action algorithm ». Modern pediatrics. Ukraine, no 8(128) (28 décembre 2022) : 90–97. http://dx.doi.org/10.15574/sp.2022.128.90.

Texte intégral
Résumé :
Fever is a common complaint in children with lymphadenopathy. Reactive lymphadenopathy is defined as the presence of one or more lymph nodes with a diameter of more than 1.5-2.0 cm. A thorough diagnosis of lymphadenitis accompanied by hyperthermic syndrome is necessary. Purpose - is to determine the diagnostic algorithm of actions based on the example of a clinical case of fever of unclear origin. Clinical case. The peculiarity of this case is a prolonged hyperthermic syndrome with lymphadenitis against the background of helminthic invasion (toxocarosis). During her stay in the hospital, the girl’s condition was serious due to hyperthermic syndrome and lymphadenopathy. The diagnostic algorithm for this condition in children is proposed. During the examination, a diagnosis of Reactive cervical lymphadenopathy of infectious-allergic genesis; concomitant - «Parasitic invasion is mixed (toxocariasis, ascariasis). Fever» was established. The child’s condition upon admission was severe, due to intoxication and hyperthermic syndrome. The treatment was effective, the patient’s condition improved during the hospitalization. But establishing a diagnosis required the cooperation of doctors of many specialties and a large number of additional examinations. Conclusions. Therefore, it is necessary to form the alertness of pediatricians to toxocarosis and increase the level of knowledge about the correct diagnostic algorithm in such cases. Informing health care professionals about such lymphadenopathy and helminthic infestation in children should help practitioners distinguish them from febrile reactions or other conditions and improve treatment outcomes. The research was carried out in accordance with the principles of the Declaration of Helsinki. Informed consent of the child’s parents was obtained for the research. No conflict of interests was declared by the authors.
Styles APA, Harvard, Vancouver, ISO, etc.
18

Layana Castro, Pablo E., Joan Carles Puchalt, Antonio García Garví et Antonio-José Sánchez-Salmerón. « Caenorhabditis elegans Multi-Tracker Based on a Modified Skeleton Algorithm ». Sensors 21, no 16 (20 août 2021) : 5622. http://dx.doi.org/10.3390/s21165622.

Texte intégral
Résumé :
Automatic tracking of Caenorhabditis elegans (C. egans) in standard Petri dishes is challenging due to high-resolution image requirements when fully monitoring a Petri dish, but mainly due to potential losses of individual worm identity caused by aggregation of worms, overlaps and body contact. To date, trackers only automate tests for individual worm behaviors, canceling data when body contact occurs. However, essays automating contact behaviors still require solutions to this problem. In this work, we propose a solution to this difficulty using computer vision techniques. On the one hand, a skeletonization method is applied to extract skeletons in overlap and contact situations. On the other hand, new optimization methods are proposed to solve the identity problem during these situations. Experiments were performed with 70 tracks and 3779 poses (skeletons) of C. elegans. Several cost functions with different criteria have been evaluated, and the best results gave an accuracy of 99.42% in overlapping with other worms and noise on the plate using the modified skeleton algorithm and 98.73% precision using the classical skeleton algorithm.
Styles APA, Harvard, Vancouver, ISO, etc.
19

Y.K, Mogal. « A Multi-objective Optimization Approach for Design of Worm and Worm Wheel Based on Genetic Algorithm ». Bonfring International Journal of Man Machine Interface 3, no 1 (30 mars 2013) : 08–12. http://dx.doi.org/10.9756/bijmmi.4403.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
20

Sheetal, Annabathula Phani, et Kongara Ravindranath. « High Efficient Virtual Machine Migration Using Glow Worm Swarm Optimization Method for Cloud Computing ». Ingénierie des systèmes d information 26, no 6 (27 décembre 2021) : 591–97. http://dx.doi.org/10.18280/isi.260610.

Texte intégral
Résumé :
In this paper, high efficient Virtual Machine (VM) migration using GSO algorithm for cloud computing is proposed. This algorithm contains 3 phases: (i) VM selection, (ii) optimum number of VMs selection, (iii) VM placement. In VM selection phase, VMs to be migrated are selected based on their resource utilization and fault probability. In phase-2, optimum number of VMs to be migrated are determined based on the total power consumption. In VM placement phase, Glowworm Swarm Optimization (GSO) is used for finding the target VMs to place the migrated VMs. The fitness function is derived in terms of distance between the main server and the other server, VM capacity and memory size. Then the VMs with best fitness functions are selected as target VMs for placing the migrated VMs. The proposed algorithms are implemented in Cloudsim and performance results show that PEVM-GSO algorithm attains reduced power consumption and response delay with improved CPU utilization.
Styles APA, Harvard, Vancouver, ISO, etc.
21

ZUO, Jia-liang, Ya-nan KOU, Ren-nong YANG, Ying ZHANG, Pei HOU et Li-bing HUANG. « Comprehensive tolerance warning method of worm based on greedy algorithm ». Journal of Computer Applications 30, no 2 (23 mars 2010) : 529–31. http://dx.doi.org/10.3724/sp.j.1087.2010.00529.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
22

Rasheed, M. M., O. Ghazali et N. M. Norwawi. « Server Scanning Worm Detection by using Intelligent Failure Connection Algorithm ». Research Journal of Information Technology 2, no 4 (1 avril 2010) : 228–34. http://dx.doi.org/10.3923/rjit.2010.228.234.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
23

Ghelase, Daniela, et Luiza Daschievici. « ASPECTS REGARDING OPTIMAL DESIGN FOR THE WORM-GEAR DRIVE ». International Journal of Modern Manufacturing Technologies 13, no 3 (25 décembre 2021) : 59–65. http://dx.doi.org/10.54684/ijmmt.2021.13.3.59.

Texte intégral
Résumé :
It is known that, from the point of view of the accuracy of a machine-tool, at its design, the dynamic behaviour of each element of the kinematic chains prevails. Worm-gear drives are widely used in the different machine-tools and robots. Therefore, it is important that during meshing, as far as possible, there are no vibrations, shocks, power losses, noise and low durability. These requirements can be met if, for example, the gear ratio is constant during meshing, without transmission errors, which means that the worm-gear drive should have a high accuracy. The accuracy improvement of the worm-gear drive has long been a focus of attention for machine-tools designers. Thus, this paper presents various approaches to solving such problems, based on modelling and simulation, such as: estimating the load share of worm-gear drives and to calculate the instantaneous tooth meshing stiffness and loaded transmission errors; the desired worm-gear drive design configuration by altering the optimum set of worm-gear drive design parameters which are suitable for the required performance by associating it with SVM (Support Vector Machine); optimization approach for design of worm-gear drive based on Genetic Algorithm; design optimization of worm-gear drive with reduced power loss; etc. The optimization of the worm-gear design is an important problem for the research because the design variables are correlated to each other. An optimal design algorithm developed by the authors of this paper, for worm-gear drive, is also presented.
Styles APA, Harvard, Vancouver, ISO, etc.
24

Tang, Yuqi. « Detection and Prevention to Network Worm Virus Based on Segmentation Algorithm ». International Journal of Security and Its Applications 9, no 9 (30 septembre 2015) : 123–30. http://dx.doi.org/10.14257/ijsia.2015.9.9.11.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
25

Huang, Chu, Sencun Zhu, Quanlong Guan et Yongzhong He. « A software assignment algorithm for minimizing worm damage in networked systems ». Journal of Information Security and Applications 35 (août 2017) : 55–67. http://dx.doi.org/10.1016/j.jisa.2017.05.004.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
26

Mercado, Ydalia Delgado, Christof Gattringer et Alexander Schmidt. « Surface worm algorithm for abelian Gauge–Higgs systems on the lattice ». Computer Physics Communications 184, no 6 (juin 2013) : 1535–46. http://dx.doi.org/10.1016/j.cpc.2013.02.001.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
27

Du, Yi-Hong, et Shi-Hua Liu. « Epidemic Model of Algorithm-Enhanced Dedicated Virus through Networks ». Security and Communication Networks 2018 (7 juin 2018) : 1–7. http://dx.doi.org/10.1155/2018/4691203.

Texte intégral
Résumé :
Wi-Fi networks almost cover all active areas around us and, especially in some densely populated regions, Wi-Fi signals are strongly overlapped. The broad and overlapped coverage brings much convenience at the cost of great security risks. Conventionally, a worm virus can infect a router and then attack other routers within its signal coverage. Nowadays, artificial intelligence enables us to solve problems efficiently from available data via computer algorithm. In this paper, we endow the virus with some abilities and present a dedicated worm virus which can pick susceptible routers with kernel density estimation (KDE) algorithm as the attacking tasks automatically. This virus can also attack lower-encryption-level routers first and acquire fast-growing numbers of infected routers on the initial stage. We simulate an epidemic behavior in the collected spatial coordinate of routers in a typical area in Beijing City, where 56.0% routers are infected in 18 hours. This dramatical defeat benefits from the correct infection seed selection and a low-encryption-level priority. This work provides a framework for a computer-algorithm-enhanced virus exploration and gives some insights on offence and defence to both hackers and computer users.
Styles APA, Harvard, Vancouver, ISO, etc.
28

Said, Mokhtar, Ali M. El-Rifaie, Mohamed A. Tolba, Essam H. Houssein et Sanchari Deb. « An Efficient Chameleon Swarm Algorithm for Economic Load Dispatch Problem ». Mathematics 9, no 21 (1 novembre 2021) : 2770. http://dx.doi.org/10.3390/math9212770.

Texte intégral
Résumé :
Economic Load Dispatch (ELD) is a complicated and demanding problem for power engineers. ELD relates to the minimization of the economic cost of production, thereby allocating the produced power by each unit in the most possible economic manner. In recent years, emphasis has been laid on minimization of emissions, in addition to cost, resulting in the Combined Economic and Emission Dispatch (CEED) problem. The solutions of the ELD and CEED problems are mostly dominated by metaheuristics. The performance of the Chameleon Swarm Algorithm (CSA) for solving the ELD problem was tested in this work. CSA mimics the hunting and food searching mechanism of chameleons. This algorithm takes into account the dynamics of food hunting of the chameleon on trees, deserts, and near swamps. The performance of the aforementioned algorithm was compared with a number of advanced algorithms in solving the ELD and CEED problems, such as Sine Cosine Algorithm (SCA), Grey Wolf Optimization (GWO), and Earth Worm Algorithm (EWA). The simulated results established the efficacy of the proposed CSA algorithm. The power mismatch factor is the main item in ELD problems. The best value of this factor must tend to nearly zero. The CSA algorithm achieves the best power mismatch values of 3.16×10−13, 4.16×10−12 and 1.28×10−12 for demand loads of 700, 1000, and 1200 MW, respectively, of the ELD problem. The CSA algorithm achieves the best power mismatch values of 6.41×10−13 , 8.92×10−13 and 1.68×10−12 for demand loads of 700, 1000, and 1200 MW, respectively, of the CEED problem. Thus, the CSA algorithm was found to be superior to the algorithms compared in this work.
Styles APA, Harvard, Vancouver, ISO, etc.
29

Kim, Jihwan, et Hyeongcheol Lee. « Motor position control algorithm for an automated manual transmission of the agricultural tractor ». Proceedings of the Institution of Mechanical Engineers, Part C : Journal of Mechanical Engineering Science 229, no 18 (9 octobre 2015) : 3341–49. http://dx.doi.org/10.1177/0954406215610360.

Texte intégral
Résumé :
This paper presents a motor position control algorithm for an automated manual transmission (AMT) of the agricultural tractor, based on modified linear quadratic tracking (LQT). In this paper, the modified LQT is derived from the conventional LQT by applying the Luenberger observer in order to design an output feedback controller. A dynamic model of the actuator is derived to represent characteristics of the worm geared DC motor and the proposed control algorithm is applied and tuned with the model. The proposed position control algorithm of the worm geared motor using the modified LQT can improve disturbance rejection performance without changing the hardware configuration of the AMT. The simulation results show the validity of the proposed control algorithm.
Styles APA, Harvard, Vancouver, ISO, etc.
30

S.Abdulrasool, A., et S. M. Abbas. « Reservoir Computing : Size and Connectivity Optimization using the "Worm Algorithm" ; ». International Journal of Computer Applications 69, no 4 (17 mai 2013) : 18–22. http://dx.doi.org/10.5120/11830-7532.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
31

Goranin, N., et A. Cenys. « Genetic algorithm based Internet worm propagation strategy modeling under pressure of countermeasures ». Journal of Engineering Science and Technology Review 2, no 1 (juin 2009) : 43–47. http://dx.doi.org/10.25103/jestr.021.08.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
32

ShunChieh Lin, ChunHo Tung, DingAn Chiang et ChungI Chang. « A Modified Two-phase Knowledge Acquisition Algorithm to Construct Worm Knowledge Base ». INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences 3, no 3 (30 avril 2011) : 136–46. http://dx.doi.org/10.4156/aiss.vol3.issue3.17.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
33

LI, Qiang, et Yang XIANG. « An Algorithm of Online Accumulation for Reconstructing the Path of Worm Propagation ». Journal of Software 21, no 4 (11 mars 2010) : 802–15. http://dx.doi.org/10.3724/sp.j.1001.2010.03514.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
34

Korzec, Tomasz, Ingmar Vierhaus et Ulli Wolff. « Performance of a worm algorithm in ϕ4 theory at finite quartic coupling ». Computer Physics Communications 182, no 7 (juillet 2011) : 1477–80. http://dx.doi.org/10.1016/j.cpc.2011.03.018.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
35

Qin, Jianhua, Wenrong Wang et Xiao Liu. « Parameter Tuning of Brushless DC Motor for Improving Control Effect with Worm Algorithm ». European Journal of Electrical Engineering 23, no 3 (21 juin 2021) : 229–35. http://dx.doi.org/10.18280/ejee.230307.

Texte intégral
Résumé :
Aiming at the problem of low control precision and small applicable scope caused by adjusting control parameters in Ziegler-Nichols (ZN) method, a parameter tuning method based on Worm algorithm (WOA) is proposed for Brushless DC motor. Firstly, the model of speed control is established by proportional integral method for Brushless DC motor with two - phase conduction and three - phase full bridge drive. Then the fitness function of the controller is constructed by the Integral Absolute Error (IAE). Finally, the early optimization process, the later movement rule and the peak extraction rule are determined for WOA, and the controller parameter tuning process is designed. Simulation results under constant and sinusoidal conditions show the effectiveness of the proposed method. WOA was compared with ZN, genetic algorithm (GA), differential evolution algorithm (DE) and particle swarm optimization algorithm (PSO) in the experiment. The experimental results show that the control effect (CE) of WOA under uniform speed has been improved by 2.56% on average, and has been improved by 16.93% on average under sinusoidal speed. Compared with previous methods, this method can be used for parameter adjustment of complex control with higher control precision.
Styles APA, Harvard, Vancouver, ISO, etc.
36

Litvin, F. L., et V. Kin. « Computerized Simulation of Meshing and Bearing Contact for Single-Enveloping Worm-Gear Drives ». Journal of Mechanical Design 114, no 2 (1 juin 1992) : 313–16. http://dx.doi.org/10.1115/1.2916948.

Texte intégral
Résumé :
Single-enveloping worm-gear drives are considered. A general approach to computerized simulation of meshing for such misaligned drives is proposed. The proposed algorithm makes it possible to determine the transfer point where ideal line contact turns into real point contact and the transmission errors and the shift of bearing contact caused by the misalignment. Numerical examples for involute worm-gear drives are presented.
Styles APA, Harvard, Vancouver, ISO, etc.
37

Su, Fei, Wen Jing Xu, Zhao Wen Lin et Yan Ma. « Internet Worm Modeling and Analysis in IPv6 Networks ». Advanced Materials Research 268-270 (juillet 2011) : 1514–19. http://dx.doi.org/10.4028/www.scientific.net/amr.268-270.1514.

Texte intégral
Résumé :
With the development of IPv6, it is taken as a natural cover to defend against Internet worm due to its huge address space. We demonstrate that an intelligent worm can compromise the IPv6 network according to using adaptive means. Based on the analysis of the scanning strategies in IPv6 network and correlative typical propagation technologies, a general worm model named Next Generation Internet worm model (NGIWM) is established for analyzing the propagation of IPv6 worm which is made up of three layers. The three layers have the function to accelerate the spread of NGIWM, and make NGIWM has the capability to form large scale of prevalence. The result indicates the rationality of scanning strategies and the effectiveness of the propagation compared to IPv4 network worm. The simulation shows that the implementation of NGIWM has the potential to become a major threat to IPv6 network. The performance of the worm depends heavily on domain name generator algorithm and scanning strategies in local network. We also analyze the effect of experiment parameters on the model in the simulation part. In the future, detailed implementation of the proposed model and more defense mechanisms are to be studied.
Styles APA, Harvard, Vancouver, ISO, etc.
38

Cai, Shan Le, Yan Wei Cai et Wen Tao Huang. « The Optimization of Tooth Form Fitting Error on Worm Type Shaving Cutter ». Advanced Materials Research 591-593 (novembre 2012) : 356–60. http://dx.doi.org/10.4028/www.scientific.net/amr.591-593.356.

Texte intégral
Résumé :
In order to solve the flank concave problem of the rotary gear shaving cutter, a new worm type shaving cutter has been manufactured, which will be used on a gear hobbing achieving freedom shaving. And its tooth precision can reach 6-7 level. The main contents includes the worm normal section curve equation of the worm type shaving cutter involutes, the optimization of tooth fitting error and the linear fitting of the tooth curve of the normal section by the MATLAB genetic algorithm toolbox. According to GB/T6084-2001 hob series standard, the results showed that the error theory is less than 1/6 of the AA level.
Styles APA, Harvard, Vancouver, ISO, etc.
39

Yu, Dexin, Xuesong Zhang, Guangdong Tian, Zhigang Jiang, Zhiming Liu, Tiangang Qiang et Changshu Zhan. « Disassembly Sequence Planning for Green Remanufacturing Using an Improved Whale Optimisation Algorithm ». Processes 10, no 10 (3 octobre 2022) : 1998. http://dx.doi.org/10.3390/pr10101998.

Texte intégral
Résumé :
Currently, practical optimisation models and intelligent solution algorithms for solving disassembly sequence planning are attracting more and more attention. Based on the importance of energy efficiency in product disassembly and the trend toward green remanufacturing, this paper proposes a new optimisation model for the energy-efficient disassembly sequence planning. The minimum energy consumption is used as the evaluation criterion for disassembly efficiency, so as to minimise the energy consumption during the dismantling process. As the proposed model is a complex optimization problem, called NP-hard, this study develops a new extension of the whale optimisation algorithm to allow it to solve discrete problems. The whale optimisation algorithm is a recently developed and successful meta-heuristic algorithm inspired by the behaviour of whales rounding up their prey. We have improved the whale optimisation algorithm for predation behaviour and added a local search strategy to improve its performance. The proposed algorithm is validated with a worm reducer example and compared with other state-of-the-art and recent metaheuristics. Finally, the results confirm the high solution quality and efficiency of the proposed improved whale algorithm.
Styles APA, Harvard, Vancouver, ISO, etc.
40

TEODOR, VIRGIL GABRIEL, GEORGIANA-ALEXANDRA MOROSANU, NICUSOR BAROIU, RAZVAN SEBASTIAN CRACIUN et VIOREL PAUNOIU. « PROFILING OF THE HOB TOOL FOR WORM SHAFTS DEFORMATION ». Journal of Engineering Studies and Research 28, no 4 (9 février 2023) : 131–41. http://dx.doi.org/10.29081/jesr.v28i4.015.

Texte intégral
Résumé :
The paper presents an algorithm for profiling the hob tool designed to generate by plastic deformation the worm shafts from the composition of worm-wheel gear type, used in the seat adjustment mechanisms of some Audi and Mercedes cars. The active surface of the hob tool is a cylindrical helical surface of constant pitch. Two such tandem tools are used for deformation, the semi-finished product being positioned between them. During generation, the tools rotate around their own axes, which, combined with their helical surface, causes a helical movement of the blank. The active surfaces of the tools are mutually winding on the helical flanks of the generated worm. In the paper, two applications were developed for the generation of worms whose dimensions were determined by 3D scanning.
Styles APA, Harvard, Vancouver, ISO, etc.
41

Spada, Gabriele, Stefano Giorgini et Sebastiano Pilati. « Path-Integral Monte Carlo Worm Algorithm for Bose Systems with Periodic Boundary Conditions ». Condensed Matter 7, no 2 (29 mars 2022) : 30. http://dx.doi.org/10.3390/condmat7020030.

Texte intégral
Résumé :
We provide a detailed description of the path-integral Monte Carlo worm algorithm used to exactly calculate the thermodynamics of Bose systems in the canonical ensemble. The algorithm is fully consistent with periodic boundary conditions, which are applied to simulate homogeneous phases of bulk systems, and it does not require any limitation in the length of the Monte Carlo moves realizing the sampling of the probability distribution function in the space of path configurations. The result is achieved by adopting a representation of the path coordinates where only the initial point of each path is inside the simulation box, the remaining ones being free to span the entire space. Detailed balance can thereby be ensured for any update of the path configurations without the ambiguity of the selection of the periodic image of the particles involved. We benchmark the algorithm using the non-interacting Bose gas model for which exact results for the partition function at finite number of particles can be derived. Convergence issues and the approach to the thermodynamic limit are also addressed for interacting systems of hard spheres in the regime of high density.
Styles APA, Harvard, Vancouver, ISO, etc.
42

Wang, Yifan, Zehao Liu, Akhil Kandhari et Kathryn A. Daltorio. « Obstacle Avoidance Path Planning for Worm-like Robot Using Bézier Curve ». Biomimetics 6, no 4 (30 septembre 2021) : 57. http://dx.doi.org/10.3390/biomimetics6040057.

Texte intégral
Résumé :
Worm-like robots have demonstrated great potential in navigating through environments requiring body shape deformation. Some examples include navigating within a network of pipes, crawling through rubble for search and rescue operations, and medical applications such as endoscopy and colonoscopy. In this work, we developed path planning optimization techniques and obstacle avoidance algorithms for the peristaltic method of locomotion of worm-like robots. Based on our previous path generation study using a modified rapidly exploring random tree (RRT), we have further introduced the Bézier curve to allow more path optimization flexibility. Using Bézier curves, the path planner can explore more areas and gain more flexibility to make the path smoother. We have calculated the obstacle avoidance limitations during turning tests for a six-segment robot with the developed path planning algorithm. Based on the results of our robot simulation, we determined a safe turning clearance distance with a six-body diameter between the robot and the obstacles. When the clearance is less than this value, additional methods such as backward locomotion may need to be applied for paths with high obstacle offset. Furthermore, for a worm-like robot, the paths of subsequent segments will be slightly different than the path of the head segment. Here, we show that as the number of segments increases, the differences between the head path and tail path increase, necessitating greater lateral clearance margins.
Styles APA, Harvard, Vancouver, ISO, etc.
43

Parveen, Katheeja, Sheik Abdul Khader et Munir Ahamed Rabbani. « Energy aware improved least and most significant bit arbitration algorithm for WORM tags ». Egyptian Informatics Journal 13, no 2 (juillet 2012) : 75–83. http://dx.doi.org/10.1016/j.eij.2012.04.003.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
44

Hattori, Kiyohiko, Eri Homma, Toshinori Kagawa, Masayuki Otani, Naoki Tatebe, Yasunori Owada, Lin Shan, Katsuhiro Temma et Kiyoshi Hamaguchi. « Generalized measuring-worm algorithm : high-accuracy mapping and movement via cooperating swarm robots ». Artificial Life and Robotics 21, no 4 (1 septembre 2016) : 451–59. http://dx.doi.org/10.1007/s10015-016-0301-x.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
45

Mohan, L. V., et M. S. Shunmugam. « An orthogonal array based optimization algorithm for computer-aided measurement of worm surface ». International Journal of Advanced Manufacturing Technology 30, no 5-6 (12 novembre 2005) : 434–43. http://dx.doi.org/10.1007/s00170-005-0097-7.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
46

Makadia, Jiten, et C. D. Sankhavara. « Optimization of Shell and Tube Heat Exchanger Using Alpha Tuning Elephant Herding Optimization (EHO) Technique ». International Journal of Engineering Research in Africa 52 (janvier 2021) : 92–101. http://dx.doi.org/10.4028/www.scientific.net/jera.52.92.

Texte intégral
Résumé :
Swarm Intelligence algorithms like PSO (Particle Swarm Optimization), ACO (Ant Colony Optimization), ABC (Artificial Bee Colony), Glow-worm swarm Optimization, etc. have been utilized by researchers for solving optimization problems. This work presents the application of a novel modified EHO (Elephant Herding Optimization) for cost optimization of shell and tube heat exchanger. A comparison of the results obtained by EHO in two benchmark problems shows that it is superior to those obtained with genetic algorithm and particle swarm optimization. The overall cost reduction is 13.3 % and 9.68% for both the benchmark problem compared to PSO. Results indicate that EHO can be effectively utilized for solving real-life optimization problems.
Styles APA, Harvard, Vancouver, ISO, etc.
47

Seyed Mahmood Hashemi. « An approach for stock buying with evolutionary optimization algorithms ». World Journal of Advanced Engineering Technology and Sciences 7, no 2 (30 novembre 2022) : 071–78. http://dx.doi.org/10.30574/wjaets.2022.7.2.0038.

Texte intégral
Résumé :
Providing stock buying with more profit for buyer is challenging procedure in buying operation. In other words, buyers expect more profit with less cost. Many influence parameters cause this procedure being attractive. One of them is liquidity. There are some measurements for liquidity. With complete and detailed model and with detailed variables and in the static environment (with no changing in conditions), we can use common approach for optimization to buy proper stocks, but in a dynamic environment (which many of circumstances are changed) with incomplete models and with noisy variables (probably), common approaches cannot satisfy all requirements. In spite of common approaches for optimization, we can use Evolutionary Optimization Algorithms. In this paper, three evolutionary optimization algorithms (Particle Swarm Optimization, The Wale Optimization algorithm and the Worm Optimization algorithm), in multi-objective mode, are used to buy the stocks of three Iranian banks and then benefits and weakness of evolutionary algorithms are compared.
Styles APA, Harvard, Vancouver, ISO, etc.
48

Hu, Hangyu, Mingda Wang, Mingyu Ouyang et Guangmin Hu. « Toward Network Worm Victims Identification Based on Cascading Motif Discovery ». Electronics 8, no 2 (5 février 2019) : 183. http://dx.doi.org/10.3390/electronics8020183.

Texte intégral
Résumé :
Network worms spread widely over the global network within a short time, which are increasingly becoming one of the most potential threats to network security. However, the performance of traditional packet-oriented signature-based methods is questionable in the face of unknown worms, while anomaly-based approaches often exhibit high false positive rates. It is a common scenario that the life cycle of network worms consists of the same four stages, in which the target discovery phase and the transferring phase have specific interactive patterns. To this end, we propose Network Flow Connectivity Graph (NFCG) for identifying network worm victims. We model the flow-level interactions as graph and then identify sets of frequently occurring motifs related to network worms through Cascading Motif Discovery algorithm. In particular, a cascading motif is jointly extracted from graph target discovery phase and transferring phase. If a cascading motif exists in a connected behavior graph of one host, the host would be identified as a suspicious worm victim; the excess amount of suspicious network worm victims is used to reveal the outbreak of network worms. The simulated experiments show that our proposed method is effective and efficient in network worm victims’ identification and helpful for improving network security.
Styles APA, Harvard, Vancouver, ISO, etc.
49

Shvalb, Nir, Boaz Ben Moshe et Oded Medina. « A real-time motion planning algorithm for a hyper-redundant set of mechanisms ». Robotica 31, no 8 (11 juin 2013) : 1327–35. http://dx.doi.org/10.1017/s0263574713000489.

Texte intégral
Résumé :
SUMMARYWe introduce a novel probabilistic algorithm (CPRM) for real-time motion planning in the configuration space${\EuScript C}$. Our algorithm differs from a probabilistic road map (PRM) algorithm in the motion between a pair of anchoring points (local planner) which takes place on the boundary of the obstacle subspace${\EuScript O}$. We define a varying potential fieldfon ∂${\EuScript O}$as a Morse function and follow$\vec{\nabla} f$. We then exemplify our algorithm on a redundant worm climbing robot withndegrees of freedom and compare our algorithm running results with those of the PRM.
Styles APA, Harvard, Vancouver, ISO, etc.
50

Yin, Xin, Tadahiro Fujimoto, Norishige Chiba et Hiromi T. Tanaka. « Modeling of Wood Aging Caused by Biological Deterioration ». Journal of Advanced Computational Intelligence and Intelligent Informatics 12, no 2 (20 mars 2008) : 125–31. http://dx.doi.org/10.20965/jaciii.2008.p0125.

Texte intégral
Résumé :
We propose visually simulating wood aging by microorganisms using an ant colony optimization algorithm to generate wood aging patterns. Ants deposit pheromone similar to termites and wood deterioration caused by termites is simulated using this algorithm. Patterns generated by this algorithm resemble many pattern in nature, meaning ant paths are representative of worm paths and ant pheromones are representative of microorganism growth. We demonstrate the effectiveness of this technique in experiments.
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie