Search scope:
排序: Display mode:
Frontiers of Engineering Management Pages 5-19 doi: 10.1007/s42524-022-0229-x
Keywords: digitalization supply chain resilience robustness collaboration formal contract
Test-driven verification/validation of model transformations
László LENGYEL,Hassan CHARAF
Frontiers of Information Technology & Electronic Engineering 2015, Volume 16, Issue 2, Pages 85-97 doi: 10.1631/FITEE.1400111
Keywords: Graph rewriting based model transformations Verification/validation Test-driven verification
Anewhierarchical software architecture towards safety-critical aspects of a drone system Special Feature on Intelligent Robats
Xiao-rui ZHU, Chen LIANG, Zhen-guo YIN, Zhong SHAO, Meng-qi LIU, Hao CHEN
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 3, Pages 353-362 doi: 10.1631/FITEE.1800636
Keywords: Safety-critical Drone Software architecture Formal verification
Semantic Consistency and Correctness Verification of Digital Traffic Rules
Lei Wan,Changjun Wang,Daxin Luo,Hang Liu,Sha Ma,Weichao Hu,
Engineering doi: 10.1016/j.eng.2023.04.016
Keywords: Autonomous driving Traffic rules Digitization Formalization Verification
The provable security formal analysis of 802.11i authentication scheme
Song Yubo,Hu Aiqun,Yao Bingxin
Strategic Study of CAE 2010, Volume 12, Issue 1, Pages 67-73
Keywords: 802.11i Bellare-Rogaway model provable security formal analysis
Availability growth models and verification of power equipment
Jinyuan SHI, Jiamin XU
Frontiers in Energy 2021, Volume 15, Issue 2, Pages 529-538 doi: 10.1007/s11708-019-0624-0
Keywords: repairable system power equipment electric generating unit power station auxiliary transmission and distribution installation reliability availability availability growth model
Modelling and experimental verification on concrete-filled steel tubular columns with L or T section
LU Xilin, LI Xueping, WANG Dan
Frontiers of Structural and Civil Engineering 2007, Volume 1, Issue 2, Pages 163-169 doi: 10.1007/s11709-007-0017-z
Keywords: hysteretic confining mechanism Concrete-filled in-filled composite
Cunwen WANG, Xiaoling DUAN, Weiguo WANG, Zihao LI, Yuanhang QIN
Frontiers in Energy 2012, Volume 6, Issue 4, Pages 413-419 doi: 10.1007/s11708-012-0212-z
Keywords: lignocellulose dilute acid hydrolysis shrinking core model
Numerical simulation and experimental verification of chemical reactions for SCR DeNO
Qiang ZHANG, Yonglin FAN, Wenyan LI
Frontiers of Chemical Science and Engineering 2010, Volume 4, Issue 4, Pages 523-528 doi: 10.1007/s11705-010-0520-y
Keywords:
SCR
NO
Design method and verification of a hybrid prosthetic mechanism with energy-damper clutchable device
Frontiers of Mechanical Engineering 2021, Volume 16, Issue 4, Pages 747-764 doi: 10.1007/s11465-021-0644-4
Keywords: hybrid transfemoral prosthetic mechanism energy recycling wearable mechanical clutched device mechanical adaptive stability
Remi CHANDRAN, Tsuyoshi FUJITA, Minoru FUJII, Shuichi ASHINA, Kei GOMI, Rizaldi BOER, Muhammad ARDIANSYAH, Seiya MAKI
Frontiers in Energy 2018, Volume 12, Issue 3, Pages 376-388 doi: 10.1007/s11708-018-0559-x
Keywords: MRV CBIT UNFCCC Indonesia Japan ICT based monitoring climate policy
Man-machine verification of mouse trajectory based on the random forestmodel Research Articles
Zhen-yi XU, Yu KANG, Yang CAO, Yu-xiao YANG
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 7, Pages 925-929 doi: 10.1631/FITEE.1700442
Identifying code has been widely used in man-machine verification to maintain network security.The challenge in engaging man-machine verification involves the correct classification of man and machineIn this study, we propose a random forest (RF) model for man-machine verification based on the mouse
Keywords: Man-machine verification Random forest Support vector machine Logistic regression Performance metrics
The Theoretic Evaluation and Verification for the Necking Force of the Cone-shaped Concave Die
Hu Chengwu,Luo Wenbo,Peng Yanrong
Strategic Study of CAE 2005, Volume 7, Issue 6, Pages 54-56
Necking force is the main failure factor to the unstabitily of the thin-wall cylindrical parts. In order to improve the calculation precision of the necking force , Сторожев and Унксов separately put forward two different calculation methods about the necking force of the thin-wall cylindrical parts which take into consideation the thickness changing, the hardening effect and the friction function. In this paper, the results of the two calculation methods are analyzed by example,and are compared with experimented data. The results of two calculation methods are close to each other, and tally with experimented data.
Keywords: necking force theoretic evaluation verification
Parametric study on damage control design of SMA dampers in frame-typed steel piers
Xiaoqun LUO, Hanbin GE, Tsutomu USAMI,
Frontiers of Structural and Civil Engineering 2009, Volume 3, Issue 4, Pages 384-394 doi: 10.1007/s11709-009-0065-7
Keywords: damage control design shape memory alloy parameter study displacement-based verification strain-basedverification time history analysis
Study of verification index for biological treatment technology of wastewater
Xu Chunlian,Zhang Wei,Song Qianwu,Huang Haiming,Tian Yanli,Chen Dong
Strategic Study of CAE 2013, Volume 15, Issue 3, Pages 44-48
The precondition for ETV is to establish a scientific verification programexperience of foreign ETV index system and evaluation methods, carrying out the design for the verificationVerification indicators consist of reference index, test index, evaluation index, which
Keywords: biological treatment technology verification assessment index
Title Author Date Type Operation
Digitalization for supply chain resilience and robustness: The roles of collaboration and formal contracts
Journal Article
Test-driven verification/validation of model transformations
László LENGYEL,Hassan CHARAF
Journal Article
Anewhierarchical software architecture towards safety-critical aspects of a drone system
Xiao-rui ZHU, Chen LIANG, Zhen-guo YIN, Zhong SHAO, Meng-qi LIU, Hao CHEN
Journal Article
Semantic Consistency and Correctness Verification of Digital Traffic Rules
Lei Wan,Changjun Wang,Daxin Luo,Hang Liu,Sha Ma,Weichao Hu,
Journal Article
The provable security formal analysis of 802.11i authentication scheme
Song Yubo,Hu Aiqun,Yao Bingxin
Journal Article
Availability growth models and verification of power equipment
Jinyuan SHI, Jiamin XU
Journal Article
Modelling and experimental verification on concrete-filled steel tubular columns with L or T section
LU Xilin, LI Xueping, WANG Dan
Journal Article
Establishment and verification of a shrinking core model for dilute acid hydrolysis of lignocellulose
Cunwen WANG, Xiaoling DUAN, Weiguo WANG, Zihao LI, Yuanhang QIN
Journal Article
Numerical simulation and experimental verification of chemical reactions for SCR DeNO
Qiang ZHANG, Yonglin FAN, Wenyan LI
Journal Article
Design method and verification of a hybrid prosthetic mechanism with energy-damper clutchable device
Journal Article
Expert networks as science-policy interlocutors in the implementation of a monitoring reporting and verification
Remi CHANDRAN, Tsuyoshi FUJITA, Minoru FUJII, Shuichi ASHINA, Kei GOMI, Rizaldi BOER, Muhammad ARDIANSYAH, Seiya MAKI
Journal Article
Man-machine verification of mouse trajectory based on the random forestmodel
Zhen-yi XU, Yu KANG, Yang CAO, Yu-xiao YANG
Journal Article
The Theoretic Evaluation and Verification for the Necking Force of the Cone-shaped Concave Die
Hu Chengwu,Luo Wenbo,Peng Yanrong
Journal Article
Parametric study on damage control design of SMA dampers in frame-typed steel piers
Xiaoqun LUO, Hanbin GE, Tsutomu USAMI,
Journal Article