A Novel Approach for Automatic Tongue Deviation Analysis with Auto-Correction

2011 ◽  
Vol 474-476 ◽  
pp. 69-74
Author(s):  
Ming Feng Zhu ◽  
Jian Qiang Du ◽  
Kang Zhang ◽  
Cheng Hua Ding

The article analyzed the old tongue deviation analysis method and introduced a new tongue deviation analysis method with auto-correction aiming at the shortcomings in the old method. This method overcomes the shortcoming that the old method utilized area symmetry to extract central axis and we utilizes the method of shape symmetry analysis to improve the accuracy. In comparison experiment, this method is more accurate than the old one and its efficiency is higher than the old one.

Author(s):  
Jian-Gen Liu ◽  
Xiao-Jun Yang ◽  
Yi-Ying Feng ◽  
Lu-Lu Geng

In this paper, we studied the generalized space and time fractional Korteweg–de Vries (KdV) equation in the sense of the Riemann–Liouville fractional derivative. Initially, the symmetry of this considered equation through the symmetry analysis method was obtained. Next, a one-parameter Lie group of point transformation was yielded. Then, this considered fractional model can be translated into an ordinary differential equation of fractional order via the Erdélyi–Kober fractional differential operator and the Erdélyi–Kober fractional integral operator. Finally, with the help of the nonlinear self-adjointness, conservation laws of the generalized space and time fractional KdV equation can be found. This approach can provide us with a new scheme for studying space and time differential equations of fractional derivative.


Symmetry ◽  
2020 ◽  
Vol 12 (6) ◽  
pp. 1001 ◽  
Author(s):  
Subhadarshan Sahoo ◽  
Santanu Saha Ray ◽  
Mohamed Aly Mohamed Abdou ◽  
Mustafa Inc ◽  
Yu-Ming Chu

New soliton solutions of fractional Jaulent-Miodek (JM) system are presented via symmetry analysis and fractional logistic function methods. Fractional Lie symmetry analysis is unified with symmetry analysis method. Conservation laws of the system are used to obtain new conserved vectors. Numerical simulations of the JM equations and efficiency of the methods are presented. These solutions might be imperative and significant for the explanation of some practical physical phenomena. The results show that present methods are powerful, competitive, reliable, and easy to implement for the nonlinear fractional differential equations.


2012 ◽  
Vol 461 ◽  
pp. 868-871 ◽  
Author(s):  
Qing Ge Zhang

Materials science is an interdisciplinary field applying the properties of matter to various areas of science and engineering. In this article, the notion of orthogonal nonseparable five-variant wavelet packages is presented. A novel approach for constructing them is presented by iteration method and functional analysis method. A feasible approach for constructing two-directional orthogonal wavelet packs is developed. The orthogonality property of five-variant wavelet packs is discussed. Three orthogonality formulas concerning these wavelet packs are estabished. A constructive method for affine frames of is proposed. The sufficient condition for the existence of a class of affine pseudoframes with filter banks is obtained by virtue of a generalized multiresolution analysis.


2017 ◽  
Vol 15 (1) ◽  
pp. 99-109 ◽  
Author(s):  
Jaroslava Janeková ◽  
Jana Fabianová ◽  
Daniela Onofrejová ◽  
Eduard Puškáš ◽  
Michal Buša

2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Zenan Wu ◽  
Liqin Tian ◽  
Yi Zhang ◽  
Yan Wang ◽  
Yuquan Du

At present, most network security analysis theory assumes that the players are completely rational. However, this is not consistent with the actual situation. In this paper, based on the effectiveness constraints on both sides with network attack and defense, with the help of stochastic Petri net and evolutionary game theory, the Petri net model of network attack and defense stochastic evolutionary game is reconstructed, the specific definition of the model is given, and the modeling method is given through the network connection relationship and attack and defense strategy set. Using this model, a quantitative analysis of network attack events is carried out to solve a series of indicators related to system security, namely, attack success rate, average attack time, and average system repair time. Finally, the proposed model and analysis method are applied to a classic network attack and defense process for experimental analysis, and the results verify the rationality and accuracy of the model and analysis method.


2016 ◽  
Author(s):  
Sezen Vatansever ◽  
Zeynep H. Gümüş ◽  
Burak Erman

SummaryWhile mutant K-Ras is an important therapeutic target for human cancers, there are still no drugs that directly target it. Recent promising studies emphasize the significance of dynamics data to selectively target its active/inactive states. However, despite tremendous information on K-Ras, the direction of information flow in the allosteric regulation of its dynamics has not yet been elucidated. Here, we present a novel approach that identifies causality in correlated motions of proteins and apply it to K-Ras dynamics. Specifically, we analyze molecular dynamics simulations data and comprehensively investigate nucleotide-dependent intrinsic K-Ras activity. We show that GTP binding leads to characteristic residue correlations with relatively long decay times by stabilizing K-Ras motions. Furthermore, we identify for the first time driver-follower relationships of correlated motions in the regulation of K-Ras activity. Our results can be utilized for directly targeting mutant K-Ras in future studies.


2021 ◽  
Vol 2021 (1) ◽  
Author(s):  
R. Sadat ◽  
Praveen Agarwal ◽  
R. Saleh ◽  
Mohamed R. Ali

AbstractThrough the Lie symmetry analysis method, the axisymmetric, incompressible, and inviscid fluid is studied. The governing equations that describe the flow are the Euler equations. Under intensive observation, these equations do not have a certain solution localized in all directions $(r,t,z)$ ( r , t , z ) due to the presence of the term $\frac{1}{r}$ 1 r , which leads to the singularity cases. The researchers avoid this problem by truncating this term or solving the equations in the Cartesian plane. However, the Euler equations have an infinite number of Lie infinitesimals; we utilize the commutative product between these Lie vectors. The specialization process procures a nonlinear system of ODEs. Manual calculations have been done to solve this system. The investigated Lie vectors have been used to generate new solutions for the Euler equations. Some solutions are selected and plotted as two-dimensional plots.


2019 ◽  
Vol 5 ◽  
pp. 704-713 ◽  
Author(s):  
Ahmed Abdulwali Mohammed Haidar Al Asbahi ◽  
Feng Zhi Gang ◽  
Wasim Iqbal ◽  
Qaiser Abass ◽  
Muhammad Mohsin ◽  
...  

2020 ◽  
Vol 10 (7) ◽  
pp. 2311
Author(s):  
Keyan He ◽  
Huajie Hong ◽  
Guilin Jiang ◽  
Haipeng Gu

A photoelectric detection system is a typical type of device widely used for detecting purposes based on unmanned aerial vehicles (UAV). Stability accuracy is the key performance index. Compared to traditional analysis methods aimed at unpredictable error-causing sources, assembly errors can be easily controlled during the manufacturing processes. In this research, an analysis method of assembly error effect on stability accuracy is proposed. First, by using kinematics analysis of homogeneous coordinate transformation, stability accuracy is comprehensively modeled and simulated. Then, by analyzing the manufacturing process, assembly errors of axis perpendicularities, run-outs and gyroscopes are defined and modeled. By simulating different carrier movements, the effects caused by assembly errors under various environments are studied. Finally, error sensitivity is proposed by using standard deviation analysis. Results show that the most sensitive assembly errors are identified, and ranked in order of sensitivity as follows: x-component of pitch axis perpendicularity, y-component of the azimuth gyroscope assembly, and z-component of the pitch gyroscope assembly. In conclusion, the results can be used as standards of manufacturing process improvements, and the proposed methods can be used to provide valuable references for real application scenarios.


Sign in / Sign up

Export Citation Format

Share Document