نتایج جستجو برای: base method

تعداد نتایج: 1851768  

F. Rahimzadeh Rofooei and H. Saadatnia,

The base isolation systems are among the passive control devices that have been used over the last three decades to limit the seismic-induced response of structures. In this regard, the Uniform Building Code provisions (UBC) has incorporated a special section for the seismic design of base isolated structures since its 1991 edition. Due to the importance of the behavior of these structures unde...

Journal: :iranian journal of fuzzy systems 2010
jin-xuan fang

in this paper, the concept of {sl local base with  stratifiedstructure} in $i$-topological vector spaces is introduced. weprove that every $i$-topological vector space has a balanced localbase with stratified structure. furthermore, a newcharacterization of $i$-topological vector spaces by means of thelocal base with stratified structure is given.

Journal: :Nihon Hotetsu Shika Gakkai Zasshi 1966

Journal: :Journal of the Japan society of photogrammetry and remote sensing 1993

Journal: :International Journal of Computers Communications & Control 2017

2011
Yolanda Vidal Leonardo Acho Jose Rodellar

This paper proposes a fault detection method for hysteretic base-isolation systems. One of the key contr butions of this work is a Lyapunov-based restoring force observer that leads to the design of a robust fault detection scheme. The different fault types considered are stiffness and damping variations in the system. The proposed fault estimation method provides a direct estimate of the size ...

2015
Liviu-Cristian Dutu Gilles Mauris Philippe Bolon

Rule base generation from numerical data has been a dynamic research topic within the fuzzy community in the last decades, and several well-established methods have been proposed. While some authors presented simple, empirical approaches, but which generally show high error rates, others turned to complex heuristic techniques to improve accuracy. In this paper, an extension of the classical Wan...

1997
Jussipekka Leiwo Yuliang Zheng

Denial of service attack is an attempt from any authorized or unauthorized entity to allocate resources excessively to prevent nor mal operation of the system A method will be presented to specify and enforce a resource allocation policy to prevent denial of service attacks Resource allocation policy can be formally derived from a waiting time policy where maximum acceptable response times for ...

2005
Akinori Ito Yen-Ling Lim

We are developing a CALL system to train English pronunciation for Japanese native speakers. However, the precision of the error detection was not very high because the threshold for the detection was not optimum. To improve the detection accuracy, we propose a new method to optimize the thresholds of error detection. The proposed method makes several clusters of the pronunciation error rules, ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید