Study on Security Analysis and Management of Motor Based on Fuzzy Theory

2012 ◽  
Vol 591-593 ◽  
pp. 692-696
Author(s):  
Hua Chen Lu

Technique problems on motor security analysis and management are solved based on fuzzy theory. Combining such theory with present research of car engine structure and its related technique, based on abroad investigation of car engine malfunctions, index system suitable for motor engine security analysis is developed and fuzzy theory, a mature theory in the management science is induced in the security analysis. In the study, method and techniques for car engine security analysis and management are proposed. The real case proves that this index system and analytical technique are applicable, the analytical result could be used as theoretical references for security management, production manufacture and improvement, it could be used for analyzing similar automobile products.

2021 ◽  
Author(s):  
Daniele Gardiol ◽  
Tiberio Cuppone ◽  
Giovanni Ascione ◽  
Dario Barghini ◽  
Albino Carbognani ◽  
...  

<p>PRISMA is the italian fireball network dedicated to observation of bright meteors and recovery of freshly fallen meteorites. Since the very beginning of the project, we experienced an increasing enthusiastic participation of non-professionals, starting from amateur astronomers and reaching an ever wider audience among citizens. Nowadays PRISMA has become an established italian stakeholder in the field of meteors and meteorites, being the reference for visual warnings, video recording of fireballs and report of suspect meteorite finds.</p> <p>In this contribution we will describe our experience on this topic and the methodologies we have developed to capitalize such potential, by actively training and involving citizens in activities focused on meteorite/meteorwrong identification and organized on-field search campaigns. We will show an application to the real case of the 15<sup>th</sup> march 2021 meteorite-dropping bolide in sourthern Italy, near the city of Isernia.</p>


2019 ◽  
Vol 28 (09) ◽  
pp. 1950147
Author(s):  
Lei Zhang ◽  
Jing Li ◽  
Songtao Yang ◽  
Yi Liu ◽  
Xu Zhang ◽  
...  

The query probability of a location which the user utilizes to request location-based service (LBS) can be used as background knowledge to infer the real location, and then the adversary may invade the privacy of this user. In order to cope with this type of attack, several algorithms had provided query probability anonymity for location privacy protection. However, these algorithms are all efficient just for snapshot query, and simply applying them in the continuous query may bring hazards. Especially that, continuous anonymous locations which provide query probability anonymity in continuous anonymity are incapable of being linked into anonymous trajectories, and then the adversary can identify the real trajectory as well as the real location of each query. In this paper, the query probability anonymity and anonymous locations linkable are considered simultaneously, then based on the Markov prediction, we provide an anonymous location prediction scheme. This scheme can cope with the shortage of the existing algorithms of query probability anonymity in continuous anonymity locations difficult to be linked, and provide query probability anonymity service for the whole process of continuous query, so this scheme can be used to resist the attack of both of statistical attack as well as the infer attack of the linkable. At last, in order to demonstrate the capability of privacy protection in continuous query and the efficiency of algorithm execution, this paper utilizes the security analysis and experimental evaluation to further confirm the performance, and then the process of mathematical proof as well as experimental results are shown.


1999 ◽  
Vol 1999 (511) ◽  
pp. 1-42 ◽  
Author(s):  
Hermann König ◽  
Carsten Schütt ◽  
Nicole Tomczak-Jaegermann

Abstract The projection constants of the lpn-spaces for 1 ≦ p ≦ 2 satisfy with in the real case and in the complex case. Further, there is c < 1 such that the projection constant of any n-dimensional space Xn with 1-symmetric basis can be estimated by . The proofs of the results are based on averaging techniques over permutations and a variant of Khintchine's inequality which states that


2020 ◽  
Vol 30 (1) ◽  
pp. 109-119
Author(s):  
Aleksandar Lebl ◽  
Dragan Mitic ◽  
Zarko Markov ◽  
Verica Vasiljevic

The output power of traffic channels in one cell of GSM like systems is estimated in this paper. We consider the real case: the number of users is much higher than the number of channels, the output power of one channel depends on the cube of the distance between a mobile user and the base station, and the distribution of users in the cell is uniform. We derive the expressions for cumulative distribution of output power of one channel and for the mean output power of the whole base station. Results of the calculation are confirmed by computer simulation.


Author(s):  
Mohammed Shurrab ◽  
Ghaleb Y. Abbasi ◽  
Osama Eljamal ◽  
Jalal T. Tanatrah

Repetitive construction activities have the same activities which are performed repeatedly. Repetitive projects include: pipelines, highways, and multi-story buildings. Repetitive projects have been modelled widely using the traditional network techniques although, they have some disadvantages. Furthermore, different approached have been developed for repetitive activities including the graphical and analytical techniques. The objective of this research is to add new enhancements on an approach called Repetitive Project Model (RPM) which is related to the repetitive construction projects. The enhancements incorporating the incentives and penalties within the RPM. This model incorporates a network technique, a graphical technique, and an analytical technique. A numerical example was demonstrated in this research paper to aid on using the suggested model in the real-life application.


1983 ◽  
Vol 93 (3) ◽  
pp. 477-484 ◽  
Author(s):  
C. T. C. Wall

A complete and satisfying account of the classification of pencils of binary cubics over an algebraically closed field was given by Newstead (2). Extending these results to the real case is not a matter of mere routine since new questions arise, for example the separation of roots of the cubics in a pencil (as well as their reality).


Sign in / Sign up

Export Citation Format

Share Document