نتایج جستجو برای: linear damage rule
تعداد نتایج: 847832 فیلتر نتایج به سال:
To date the term “Fatigue Damage” has had an ambiguous usage in fatigue community. This paper explains reason for poor predictive results of existing damage rules, such as Miner’s rule, through precise observation small crack growth during multiple step loadings. For exact evaluation it is crucially important to attend phenomenon continuous decrease limit with until final failure. It stress amp...
In this study, a Multi-Objective Genetic Algorithm (MOGA) is utilized to extract interpretable and compact fuzzy rule bases for modeling nonlinear Multi-input Multi-output (MIMO) systems. In the process of non- linear system identi cation, structure selection, parameter estimation, model performance and model validation are important objectives. Furthermore, se- curing low-level and high-level ...
We continue our work [5] on the logic of multisets (or on the multiset semantics of linear logic), by interpreting further the additive disjunction t. To this purpose we employ a more general class of processes, called free, the axiomatization of which requires a new rule (not compatible with the full LL), the cancellation rule. Disjunctive multisets are modeled as finite sets of multisets. The...
The statistical properties of the certainty equivalence control rule and of the least squares estimates generated by this rule are examined experimentally in a linear model with two unknown parameters. It is found that the least squares certainty equivalence rule converges to its true value with probability one and is asymptotically efficient, having an asymptotic distribution with a variance a...
The 1984 article by Martin, Odlyzko and Wolfram on Wolfram’s Rule 90 heightened interest in the area of linear cellular automata defined on a vector space over a finite field [8]. In this article we find the closed form expression for the minimal polynomial of Rule 90, which is then used to completely characterize the dynamics of the map. In addition, we show that the standard basis vectors in ...
Maximum length CA has wide range of applications in design of linear block code, cryptographic primitives and VLSI testing particularly in Built-In-Self-Test. In this paper, an algorithm to compute all n-cell maximum length CA-rule vectors is proposed. Also rule vectors for each primitive polynomial in GF (2) to GF (2) have been computed by simulation and they have been listed.Programmable rule...
By grouping several sites together into one a cellular automaton can be transformed into another with more states and a smaller neighbor hood if the neighborhood has just two sites we can think of the resulting CA rule as a binary operation We show that if the blocked rule satis es an identity which holds for a broad class of algebras then the underly ing rule must have essentially the same str...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید