Abstract
In order to accurately detect the fuzzy anomaly data existing in big data networks, it is necessary to study the localization and recognition algorithm. The current algorithms have problems related to poor noise reduction, low recognition efficiency, high energy consumption and low accuracy. A novel localization and recognition algorithm for fuzzy anomaly data in big data networks is proposed. The multi-wavelet denoising method is used to remove the noise signals existing in the network. The k-means algorithm is utilized for network clustering, and the association mode between nodes and the unitary linearity regression model is adopted to eliminate spatially and temporally redundant data that exist in big data networks. The similarity anomaly detection method based on multi-feature aggregation identifies fuzzy anomaly data existing in big data networks, establishes an anomaly data localization model, and completes the localization and recognition of fuzzy anomaly data. Experimental results show that the proposed method has good noise reduction, high recognition efficiency, low energy consumption and high accuracy of localization and recognition.
1 Introduction
Due to the interference of deployment methods, limited energy, environmental noise, internal manufacturing defects, etc. nodes in big data networks are prone to failure or abnormal readings. This results in segmentation of the network, dynamic changes in topology and packet loss when the network is congested, especially for large-scale and high-density deployment scenarios [1]. A large number of sensor nodes may be randomly distributed in complex and harsh environments with other external interferences, such as direct electromagnetic communication interference, artificial or non-human physical and chemical factors. This can cause failure and damage to the node itself, resulting in noise, errors and defects in the collected data. Inexpensive sensor nodes have very limited computing power, memory, energy, communication bandwidth and other resources; it is inevitable that they will generate unreliable or inaccurate data [2]. When fuzzy abnormal data is present in the big data networks, it is more vulnerable to external malicious attacks, such as denial-of-service attacks, black hole attacks and eavesdropping, which pose a threat to the safe operation of big data networks. This motivates the need for locating and identifying fuzzy anomaly data. The current localization and recognition algorithm of fuzzy anomaly data have problems related to poor noise reduction, low recognition efficiency, high energy consumption, and low accuracy. Thus, localization and identification algorithms need to be further studied [3].
Liu et al. [4] proposed a localization recognition algorithm for network fuzzy anomaly data based on information gain feature selection. The algorithm normalizes the network data through the preprocessor and selects important features based on the information gain dimension reduction method. The dimension of the data set is reduced, and a random classifier is used for training and prediction to locate and identify the fuzzy anomaly data. The algorithm does not effectively remove the noise signal existing in the big data networ. Zhao et al. [5] came up with a localization and recognition algorithm for network fuzzy anomaly data based on migration learning and DS theory. The algorithm uses the migration learning method to model known network attacks and considers differences between the fuzzy abnormal data. The analysis of the unknown network behavior by the trained classifier, combined with the DS evidence theory, is used to detect the fuzzy anomaly data with inconsistent distribution. The algorithm is prone to error in the training process, and the obtained localization and recognition results have low accuracy. Zhou and Xiong have proposed a localization and recognition algorithm for network fuzzy anomaly data based on data mining. The algorithm first extracts the network state signal, preprocesses the signal through a wavelet transform, and extracts the characteristics of network state anomaly detection. The fuzzy anomaly data detection is modeled with an echo state network, and the parameters of this network are optimized with a genetic algorithm, so as to achieve optimal localization and recognition of the fuzzy anomaly data. The algorithm takes a long time to identify fuzzy anomaly data, and there is a problem of low recognition efficiency [6]. Liu and Li [7] developed a localization and recognition algorithm for network anomaly data based on compressed sensing. The algorithm establishes a detection model for fuzzy anomaly data, and uses compressed sensing technology to process the temperature measurement data of the lower-level detection node collected by the upper observation node. This is combined with the sparse temperature data to construct an effective sparse matrix and measurement matrix, redefining the orthogonal transform preprocessing strategy of the measurement matrix. This makes the CS observation dictionary satisfy the constraint equidistant condition and redefines the discrete spider coding mode. The spider population is continuously co-evolved to obtain the position information of non-zero elements in the sparse results. The least squares method is utilized to obtain the amplitude information of non-zero elements and the paradigm population is iteratively evolved to obtain the parameter sequence. The localization and recognition of fuzzy anomaly data are completed by detecting the correlation threshold of the parameter sequence. When the abnormal data is located and identified, there is less residual energy in the network node, and there is a problem of high energy consumption.
In summary, a localization and recognition algorithm for fuzzy anomaly data in big data networks is proposed. The specific steps are as follows:
1) The multi-wavelet variation denoising method is used to remove noise in the network.
2) The association mode between nodes and the linear regression model are utilized to eliminate the redundant data.
3) The localization and recognition of fuzzy anomaly data are completed by the similarity anomaly detection method based on multi-feature aggregation.
Experimental results and analysis verify the overall effectiveness of the localization and recognition algorithm for fuzzy anomaly data in big data networks.
2 Methods
2.1 Multi-wavelet variation denoising
The localization and recognition algorithm for fuzzy anomaly data in the big data networks removes the noise present in the network signal through multi-wavelet variation. A new threshold function is constructed to perform secondary denoising on the processed signal [8]. The specific algorithm is as follows:
Let the discrete sample sequence of the original signal f (x) in the big data network be
The basic idea of the wavelet algorithm is to decompose the signal
Where,
For the wavelet coefficient
In the formula, j = 1, 2, 3. The wavelet coefficient of the second wavelet transform on the scale 1 is set as 0, that is,
The wavelet coefficients are reconstructed with the wavelet coefficients of other scales of the first wavelet transform to obtain the denoised signal in the big data network:
Where
Where wj,k represents the wavelet coefficient of the signal decomposition and λ is the threshold. The big data network signal is denoised twice by a new threshold function to obtain the denoised big data network signal
2.2 Redundant data removal
The localization and recognition algorithm for fuzzy anomaly data in the big data network uses k-means algorithm to cluster the network, and mines the association mode between nodes to eliminate spatially redundant data. It establishes a linear regression model in the sensor nodes to remove temporal redundant data in the big data network, so as to improve the recognition efficiency of the algorithm.
2.2.1 Clustering
The k-means algorithm is used for clustering. The sensor data is first transmitted to the cluster head and then to the base station by the cluster head, so that a large number of nodes directly transmit the sensing data to the sink node, causing excessive energy consumption and premature death of the node [9].
The k-means algorithm is a typical distance-based clustering algorithm. Euclidean distance is used as the evaluation index of similarity measurement. That is to say, the smaller the distance between two objects, the greater the similarity. Sensing nodes in the network are densely deployed, and the spatial correlation of the sensed data from similar nodes is stronger. The specific steps of the clustering algorithm are as follows:
1) Randomly select k cluster centroid nodes in the big data network.
2) Determine the cluster to which each sensor node si belongs. Calculate the Euclidean distance from node si to each cluster centroid node uj. The node with the smallest Euclidean distance is selected as the cluster centroid node and marked asO[j, i] = 1, indicating that centroid node u j is the centroid node of node si.
3) Recalculate the mean of each cluster.
4) Repeat the second and third step until the cluster centroid node no longer moves.
2.2.2 Spatial correlation judgment
According to the spatial change characteristics of physical phenomena, within a certain temporal range, the perceptual data collected between adjacent sensing nodes are the same or similar, or the difference is approximately constant [10]. The localization and recognition algorithm for fuzzy anomaly data in the big data network mines the association pattern between two nodes through the historical perceptual data. If the fitting error of the historical raw data sequence of the cluster head node ui and the intracluster node sj is less than the given error threshold ε, it can be determined that the intra-cluster node s j is spatially related to the cluster head node ui. If the fitting error of the historical raw data sequence of the cluster head node and the intra-cluster node is greater than a given error threshold, it is spatially redundant data in the big data network, which should be eliminated.
In a certain temporal range, the latest m consecutive historical sensing data points of cluster head node ui and intra-cluster node sj are Ui = {ui(1), ui(2), · · · , ui(m)} and Xj = {xj(1), xj(2), · · · , xj(m)} respectively, then the spatial correlation between nodes ui and sj can be determined as follows:
First: the sequence of differences formed by nodes ui and sj is X(i,j), and the expression of
Where,
Second: calculate the mean value l of raw data sequence of nodes ui and sj from the difference sequence
Third: calculate the fitting error Error of the two sequences according to the mean l:
Fourth: if the fitting error Error is smaller than the given error threshold ε, it can be assumed that the sensing data of the two nodes are related, and the correlation pattern l is stored in the correlation matrix C [i, j], and vice versa, which is spatially redundant data.
Fifth: repeat First - Fourth until all the correlation patterns of the intra-cluster node and the cluster head node are determined.
When the sink node receives the sensing data of the cluster head node, the sensing data of s j is restored by using the following formula:
so that the recovered error Error is less than ε.
2.2.3 Temporal correlation judgment
The nodes in the big data network periodically collect data in a high-frequency manner. For the data collected by a single node, the sampling time t can be regarded as an independent variable, and the corresponding data xi(t) is used as a piecewise linear function relationship of the dependent variable [11]. For nodes that are required to send data, the localization and recognition algorithm for fuzzy anomaly data in the big data network uses a linear regression model to eliminate temporally redundant data.
It is assumed that the linear relationship between the acquisition time t of the node si and the data xi(t) is the regression equation:
Knowing that the data sequence of the node si is Xi = {xi(1), xi(2), · · · , xi(m)}, β0 and β1 are parameters in the unitary linear regression model that are fitted according to the least squares method. The equations for resolving these parameters are:
The m data points collected by the node si are sequentially distributed along the time axis near the fitted regression line. The constructed unitary linear regression model is shown in Figure 1.
In this diagram, δ is the absolute error of the m + 1-th data point and the actual value of the node si.
The formula for calculating δ is as follows:

The unitary linear regression model
2.3 Localization and recognition of fuzzy anomaly data
2.3.1 Data similarity
Similarity is a concept in mathematics. It is used to judge the degree of difference between two data samples. The “distance” is often used to describe the degree of similarity. The larger the distance, the smaller the similarity between the two data samples [12]. A data sample can be two numbers, two sequences, or more generally, two vectors. The localization and recognition algorithm for fuzzy anomaly data in the big data network uses the Euclidean distance, as the standard to measure the similarity, and realize the localization and recognition of the fuzzy anomaly data.
Let De be the Euclidean distance between the two sets of samples X and Y in N-dimensional space L. The formula for calculating De is as follows:
X = (X1, X2, X3, · · · , Xn), Y = (Y1, Y2, Y3, · · · , Yn).
Let De1 represent the Euclidean distance between two matrix samples P and Q in N × M space S. The formula for calculating De1 is as follows:
Let Sim(P, Q) represent the similarity of De1, and the formula for calculating De1 is:
Where P, Q are again N × M-dimensional matrices, i = 1, 2, · · · , n and j = 1, 2, · · · , m.
Using multi-feature similarity methods to detect fuzzy anomaly data in big data networks, it is first necessary to construct a feature set of normal network states [13]. Through long-term data collection, the data is analyzed, clustered and aggregated to form a feature set per unit time and a threshold marked by time. If a uniform standard threshold is used, the periodicity of the network traffic cannot be reflected and the time stamp threshold is used, that is, the real-time traffic of a specific time period is discriminated by the threshold of a specific time, which can effectively reduce the false alarm rate [14].
The specific algorithm is as follows:
1. Initialization of feature set update times n. The initial value of n is determined by the total time T and the sampling interval time t of the training data, the expression of n is as follows:
2.
3. The counter T is incremented by 1 each time the standard feature set needs to be updated.
4. Collect network characteristic data once every sampling time.
5. Define the 6 ×M-dimensional real-time feature matrix I, which is used to store the feature information of the fuzzy anomaly data of the big data network.
Each row corresponds to one feature set. When there are less than m attributes in each category, it is set to 0. Each feature set is handled differently. Whenthe source network segment exit traffic is to be stored, the cosine is required to set the column number of each network segment in the matrix [15, 16, 17, 18, 19, 20, 21,].
Let the network segments A, B, and C correspond to the first, second and third column in the matrix respectively. The data of each sampling time needs to be stored according to regulations. To store the destination port traffic characteristics, it is divided into {(0, 100), (101, 1000), (1001, 3000), (3001, 5000), · · · , (9000, 65535)} by port number segment. Each port number segment corresponds to the columns in the matrix, in order:
Similarly, the 6 × M standard feature set matrix S is obtained from the training data:
Calculate the Euclidean distance De(I, S) of the real-time feature set matrix and the standard feature set matrix:
Where i = 1, 2, · · · , 6, j = 1, 2, · · · , m. The similarity Sim(I, S) of the real-time feature set matrix and the standard feature set matrix is obtained by the Euclidean distance De(I, S):
If the similarity value is higher than the threshold ξT of this period, it is normal data, and the feature set is updated. Each attribute of the standard feature set matrix and the corresponding attribute of the real-time feature set matrix are weighted and averaged, and the updated feature set attribute is Sij(n + 1), and the expression is:
Let S(n + 1) represent the updated feature set matrix, and the calculation formula is:
If the similarity value is lower than the threshold ξT of this period, it is the fuzzy anomaly data, and the positioning model DW of the fuzzy anomaly data is constructed to complete the localization and recognition of the fuzzy anomaly data of the big data network:
Where ai represents the distance between adjacent servers in the big data network and r represents the correction factor.
3 Results
In order to verify the overall effectiveness of the localization and recognition algorithm for fuzzy anomaly data in the big data network, it is necessary to test the localization and recognition algorithm. The operating system of this test is Windows 7.0 and the experimentation platform is Matlab. There is a large amount of noise in the big data network, which will affect the localization and recognition of fuzzy outlier data. The localization and recognition algorithm for fuzzy anomaly data in the big data network (algorithm 1), the localization and recognition algorithm for fuzzy anomaly data in the network based on information gain feature selection (algorithm 2), the localization and recognition algorithm for fuzzy anomaly data in the network based on migration learning and DS theory (algorithm 3) and the localization and recognition algorithm for fuzzy anomaly data in the network based on data mining (algorithm 4) are all tested. Four different algorithms are used to remove the noise existing in the big data network, and the denoising effects of the four different algorithms are compared. The test results are shown in Figure 2.
Analysis of Figure 2(a) shows that the localization and recognition algorithm for fuzzy anomaly data in the big data network is used to denoise the signal, and the signal frequency is smoother and fluctuates less frequently than the signal before the denoising. Analysis of Figure 2(b), (c) and (d) display the localization and recognition algorithm for fuzzy anomaly data in the network based on information gain feature selection, migration learning and DS theory and data mining applied to denoise the signal. The difference between the signal frequency before and after denoising is small, also the frequency after denoising fluctuates greatly. Comparing the denoising results of the four different algorithms, we can see that the localization and recognition algorithm for fuzzy anomaly data in the big data network can effectively remove the noise existing in the big data network. As the localization and recognition algorithm for fuzzy anomaly data in the big data network uses the wavelet transform method to denoise signal and construct a new threshold function to quadrate the signal, which effectively removes the noise and improves the signal-to-noise ratio.
All of the algorithms were tested, and the time used by four different algorithms to identify fuzzy anomaly data are compared, the test results are shown in Figure 3.
Analysis of Figure 3(a) shows that when the localization and recognition algorithms are used to identify the fuzzy anomaly data, the time used in multiple iterations is within 6 s. Figure 3(b) and (d) show that the time used in multiple iterations is as high as 8 seconds. When the network fuzzy anomaly data location recognition algorithm based on migration learning and DS theory are used to identify the fuzzy anomaly data existing in the big data network, the time used in multiple iterations is as high

Denoising effects of the four different algorithms

Recognition time of the four different algorithms
as 11 seconds. Comparing the test results of the four different algorithms, the time used by the big data network fuzzy anomaly data localization and recognition algorithm is less than the time used by the other algorithms, because it removes the spatial and the temporal redundant data existing in the big data network before localization and recognition, the time taken for processing the data is reduced and the recognition efficiency of the algorithm is improved.
In order to further verify the overall effectiveness of the localization and recognition algorithm for fuzzy anomaly data in big data networks, the algorithms are tested in terms of energy consumption of fuzzy anomaly data localization, these results are shown in Figure 4.
Analysis of Figure 4(a) shows that after the localization and recognition algorithm is utilized for identifying and recognizing fuzzy anomaly data, the residual energy of the nodes in the network is above 800 Am. Figure 4(b) shows that when the network fuzzy anomaly data localization and recognition algorithm based on information gain feature selection is utilized to locate the fuzzy anomaly data, the residual energy of the nodes in the network is below 700 Am. Figure 4(c) shows that when the network fuzzy anomaly data localization and recognition algorithm based on migration learning and DS theory is utilized to locate the fuzzy anomaly data, the residual energy of the nodes in the network is below 500 Am. It can be seen that when the network fuzzy anomaly data localization and recognition algorithm based on data mining is utilized to locate the fuzzy anomaly data, the residual energy of the nodes in the network is below 400 Am.
4 Discussion
τ is the correction factor in the process of fuzzy data anomaly recognition in big data network. When the correction factor τ is in the interval [2–4], the accuracy of the localization and recognition of the big data network fuzzy anomaly data is high. The result is shown in Figure 5.
Analysis of Figure 5(a) shows thatwhen the correction factor is used in the interval [0, 2], the accuracy of the fuzzy anomaly data localization and recognition algorithm fluctuates between 20%-50%. It can be seen from Figure 5(b) that when the correction factor is used in the interval [2, 4], the accuracy is maintained at around 80%. It can be seen from Figure 5(c) that when the correction factor is taken in the interval [4, 6], the accuracy fluctuates between 5%-35%. In summary, when the correction factor is in the interval [2, 4], the accuracy of the localization and recognition is at its highest.

Residual energy of nodes of the four different algorithms

Accuracy of correction factor in different intervals
5 Conclusion
Rapid detection of fuzzy anomaly data in big data networks, further identification of fuzzy anomaly data and reasonable response are prerequisites for ensuring the effective operation of big data networks. This is also the frontiers of current academic and industrial research. The current localization and recognition algorithms for fuzzy anomaly data have problems of poor denoising effect, low recognition efficiency, high energy consumption and low accuracy of localization and recognition results. A new localization and recognition algorithm for fuzzy anomaly data in large data networks is proposed, which solves these problems and provides conditions for the safe operation of big data networks.
References
[1] Yan D., Dong Y., Research on Massive Network Traffic Data Analysis Based on Cloud Computing, Autom. Instrum., 2017, (9), 32-34.Search in Google Scholar
[2] Liao J.J., Feng G.H. Cloud Security Vulnerability Scanning System Based on Distributed Virtual Nodes Management, J. China Acad. Electr. Inform. Technol., 2016, 11 (5), 483-489.Search in Google Scholar
[3] Wang R.L., Network to Detect Abnormal Data in the Database Optimization Simulation, Comp. Simul., 2017, 34 (5), 410-413.Search in Google Scholar
[4] Liu R.J., Jia B., Xin Y., Network Anomaly Detection Model Based on Information Gain Feature Selection. J. Comp. Appl., 2016, 36 (a02), 49-53.Search in Google Scholar
[5] Zhao X.J., Liu Z., Sun J., New Network Anomaly Detection Using Transfer Learning and D-S Theory, Appl. Res. Comp., 2016, 33 (4), 1137-1140.Search in Google Scholar
[6] Zhou P., Xiong Y.Y., Anomaly Detection of Network State Based on Data Mining, J. Jilin Univ. (Sci. Ed.), 2017, 55 (5), 1269-1273.Search in Google Scholar
[7] Liu Z.Z., Li S.N., An Anomaly Detection Method for Wireless Sensor Networks Based on Compressed Sensing and GM (1, 1), J. Xi’an Jiaotong Univ., 2017, 51 (2), 40-46.Search in Google Scholar
[8] Li A., An Improved Study of Abnormal Data Monitoring of Hospital Communication Networks, Electr. Design Eng., 2017, 26 (5), 165-168.Search in Google Scholar
[9] Xu P., Zhang J.D., Optical Fiber Network Abnormal Data Detection Based on Improved Genetic Algorithm. Bulletin Sci. Technol., 2016, 32 (7), 163-166.Search in Google Scholar
[10] Tang Y., Huang J.J., Lai M.L., Abnormal Behavior Detection Based on Integral Channel Feature Algorithm, Sci. Technol. Eng., 2016, 16 (21), 284-288.Search in Google Scholar
[11] Zhang Q.C., Sun F., Wang Y.C., Under Environment of Internet Web Database Abnormal Data Detection Method Research, Comp. Meas. Contr., 2017, 25 (9), 170-173.Search in Google Scholar
[12] Han S.Y., No J.G., Shin J.H., Conditional Abnormality Detection Based on Ami Data Mining, IET Gener. Trans. Distr., 2016, 10 (12), 3010-3016.10.1049/iet-gtd.2016.0048Search in Google Scholar
[13] Ding J., Liu Y., Zhang L., An Anomaly Detection Approach for Multiple Monitoring Data Series Based on Latent Correlation Probabilistic Model, Appl. Intel., 2016, 44 (2), 340-361.10.1007/s10489-015-0713-7Search in Google Scholar
[14] Hu X., Hu S., Huang Y., Video Anomaly Detection Using Deep Incremental Slow Feature Analysis Network, IET Comp. Vis., 2016, 10 (4), 258-265.10.1049/iet-cvi.2015.0271Search in Google Scholar
[15] Noble J., Adams N., Real-Time Dynamic Network Anomaly Detection. IEEE Intel. Sys., 2018, 33 (2), 5-18.10.1109/MIS.2018.022441346Search in Google Scholar
[16] Celik A., Sakin E.D., Sakin E., Seyrek A., Surface Carbon Stocks of Soil Under Pistachio Cover on Southeastern Turkey, Appl. Ecol. Envir. Res., 2017, 15(3), 747-758.10.15666/aeer/1503_747758Search in Google Scholar
[17] Pyskunov S.O., Maksimyk Y.V., Valer V.V., Finite Element Analysis of Influence of Non-Homogenous Temperature Field On Designed Lifetime of Spatial Structural Elements Under Creep Conditions, Appl. Math. Nonlin. Sci., 2016, 1(1), 253-262.10.21042/AMNS.2016.1.00020Search in Google Scholar
[18] Gao W., Farahani M.R., Aslam A., Hosamani S., Distance Learning Techniques for Ontology Similarity Measuring and Ontology Mapping. Cluster Computing-the J. Net. Soft. Tools Appl., 2017, 20(2SI), 959-968.10.1007/s10586-017-0887-3Search in Google Scholar
[19] Liu Z., Peng W., Zare Y., Hui D., Rhee K.Y., Predicting the Electrical Conductivity in Polymer Carbon Nanotube Nanocomposites Based On the Volume Fractions and Resistances of the Nanoparticle, Interphase, and Tunneling Regions in Conductive Networks, Rsc Adv., 2018, 8(34), 19001-19010.10.1039/C8RA00811FSearch in Google Scholar
[20] López J.C.C., Quiles A.N., Bauset J.V.R., Ferragud M.D.R., Computing the Two First Probability Density Functions of the Random Cauchy-Euler Differential Equation: Study About Regular-Singular Points, Appl. Math. Nonlin. Sci., 2017, 2(1), 213-224.10.21042/AMNS.2017.1.00018Search in Google Scholar
[21] Wahi N., Bhatia A.K., Bhadauria S., Impact of Protozoan Vahlkampfia Sp On the Growth of Algae Chlorella Vulgaris Glamtr, J. Envir. Biol., 2018, 39(1), 109-115.10.22438/jeb/39/1/MRN-663Search in Google Scholar
© 2018 Huajie Zhang et al., published by De Gruyter
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.
Articles in the same Issue
- Regular Articles
- A modified Fermi-Walker derivative for inextensible flows of binormal spherical image
- Algebraic aspects of evolution partial differential equation arising in the study of constant elasticity of variance model from financial mathematics
- Three-dimensional atom localization via probe absorption in a cascade four-level atomic system
- Determination of the energy transitions and half-lives of Rubidium nuclei
- Three phase heat and mass transfer model for unsaturated soil freezing process: Part 1 - model development
- Three phase heat and mass transfer model for unsaturated soil freezing process: Part 2 - model validation
- Mathematical model for thermal and entropy analysis of thermal solar collectors by using Maxwell nanofluids with slip conditions, thermal radiation and variable thermal conductivity
- Constructing analytic solutions on the Tricomi equation
- Feynman diagrams and rooted maps
- New type of chaos synchronization in discrete-time systems: the F-M synchronization
- Unsteady flow of fractional Oldroyd-B fluids through rotating annulus
- A note on the uniqueness of 2D elastostatic problems formulated by different types of potential functions
- On the conservation laws and solutions of a (2+1) dimensional KdV-mKdV equation of mathematical physics
- Computational methods and traveling wave solutions for the fourth-order nonlinear Ablowitz-Kaup-Newell-Segur water wave dynamical equation via two methods and its applications
- Siewert solutions of transcendental equations, generalized Lambert functions and physical applications
- Numerical solution of mixed convection flow of an MHD Jeffery fluid over an exponentially stretching sheet in the presence of thermal radiation and chemical reaction
- A new three-dimensional chaotic flow with one stable equilibrium: dynamical properties and complexity analysis
- Dynamics of a dry-rebounding drop: observations, simulations, and modeling
- Modeling the initial mechanical response and yielding behavior of gelled crude oil
- Lie symmetry analysis and conservation laws for the time fractional simplified modified Kawahara equation
- Solitary wave solutions of two KdV-type equations
- Applying industrial tomography to control and optimization flow systems
- Reconstructing time series into a complex network to assess the evolution dynamics of the correlations among energy prices
- An optimal solution for software testing case generation based on particle swarm optimization
- Optimal system, nonlinear self-adjointness and conservation laws for generalized shallow water wave equation
- Alternative methods for solving nonlinear two-point boundary value problems
- Global model simulation of OH production in pulsed-DC atmospheric pressure helium-air plasma jets
- Experimental investigation on optical vortex tweezers for microbubble trapping
- Joint measurements of optical parameters by irradiance scintillation and angle-of-arrival fluctuations
- M-polynomials and topological indices of hex-derived networks
- Generalized convergence analysis of the fractional order systems
- Porous flow characteristics of solution-gas drive in tight oil reservoirs
- Complementary wave solutions for the long-short wave resonance model via the extended trial equation method and the generalized Kudryashov method
- A Note on Koide’s Doubly Special Parametrization of Quark Masses
- On right-angled spherical Artin monoid of type Dn
- Gas flow regimes judgement in nanoporous media by digital core analysis
- 4 + n-dimensional water and waves on four and eleven-dimensional manifolds
- Stabilization and Analytic Approximate Solutions of an Optimal Control Problem
- On the equations of electrodynamics in a flat or curved spacetime and a possible interaction energy
- New prediction method for transient productivity of fractured five-spot patterns in low permeability reservoirs at high water cut stages
- The collinear equilibrium points in the restricted three body problem with triaxial primaries
- Detection of the damage threshold of fused silica components and morphologies of repaired damage sites based on the beam deflection method
- On the bivariate spectral quasi-linearization method for solving the two-dimensional Bratu problem
- Ion acoustic quasi-soliton in an electron-positron-ion plasma with superthermal electrons and positrons
- Analysis of projectile motion in view of conformable derivative
- Computing multiple ABC index and multiple GA index of some grid graphs
- Terahertz pulse imaging: A novel denoising method by combing the ant colony algorithm with the compressive sensing
- Characteristics of microscopic pore-throat structure of tight oil reservoirs in Sichuan Basin measured by rate-controlled mercury injection
- An activity window model for social interaction structure on Twitter
- Transient thermal regime trough the constitutive matrix applied to asynchronous electrical machine using the cell method
- On the zagreb polynomials of benzenoid systems
- Integrability analysis of the partial differential equation describing the classical bond-pricing model of mathematical finance
- The Greek parameters of a continuous arithmetic Asian option pricing model via Laplace Adomian decomposition method
- Quantifying the global solar radiation received in Pietermaritzburg, KwaZulu-Natal to motivate the consumption of solar technologies
- Sturm-Liouville difference equations having Bessel and hydrogen atom potential type
- Study on the response characteristics of oil wells after deep profile control in low permeability fractured reservoirs
- Depiction and analysis of a modified theta shaped double negative metamaterial for satellite application
- An attempt to geometrize electromagnetism
- Structure of traveling wave solutions for some nonlinear models via modified mathematical method
- Thermo-convective instability in a rotating ferromagnetic fluid layer with temperature modulation
- Construction of new solitary wave solutions of generalized Zakharov-Kuznetsov-Benjamin-Bona-Mahony and simplified modified form of Camassa-Holm equations
- Effect of magnetic field and heat source on Upper-convected-maxwell fluid in a porous channel
- Physical cues of biomaterials guide stem cell fate of differentiation: The effect of elasticity of cell culture biomaterials
- Shooting method analysis in wire coating withdrawing from a bath of Oldroyd 8-constant fluid with temperature dependent viscosity
- Rank correlation between centrality metrics in complex networks: an empirical study
- Special Issue: The 18th International Symposium on Electromagnetic Fields in Mechatronics, Electrical and Electronic Engineering
- Modeling of electric and heat processes in spot resistance welding of cross-wire steel bars
- Dynamic characteristics of triaxial active control magnetic bearing with asymmetric structure
- Design optimization of an axial-field eddy-current magnetic coupling based on magneto-thermal analytical model
- Thermal constitutive matrix applied to asynchronous electrical machine using the cell method
- Temperature distribution around thin electroconductive layers created on composite textile substrates
- Model of the multipolar engine with decreased cogging torque by asymmetrical distribution of the magnets
- Analysis of spatial thermal field in a magnetic bearing
- Use of the mathematical model of the ignition system to analyze the spark discharge, including the destruction of spark plug electrodes
- Assessment of short/long term electric field strength measurements for a pilot district
- Simulation study and experimental results for detection and classification of the transient capacitor inrush current using discrete wavelet transform and artificial intelligence
- Magnetic transmission gear finite element simulation with iron pole hysteresis
- Pulsed excitation terahertz tomography – multiparametric approach
- Low and high frequency model of three phase transformer by frequency response analysis measurement
- Multivariable polynomial fitting of controlled single-phase nonlinear load of input current total harmonic distortion
- Optimal design of a for middle-low-speed maglev trains
- Eddy current modeling in linear and nonlinear multifilamentary composite materials
- The visual attention saliency map for movie retrospection
- AC/DC current ratio in a current superimposition variable flux reluctance machine
- Influence of material uncertainties on the RLC parameters of wound inductors modeled using the finite element method
- Cogging force reduction in linear tubular flux switching permanent-magnet machines
- Modeling hysteresis curves of La(FeCoSi)13 compound near the transition point with the GRUCAD model
- Electro-magneto-hydrodynamic lubrication
- 3-D Electromagnetic field analysis of wireless power transfer system using K computer
- Simplified simulation technique of rotating, induction heated, calender rolls for study of temperature field control
- Design, fabrication and testing of electroadhesive interdigital electrodes
- A method to reduce partial discharges in motor windings fed by PWM inverter
- Reluctance network lumped mechanical & thermal models for the modeling and predesign of concentrated flux synchronous machine
- Special Issue Applications of Nonlinear Dynamics
- Study on dynamic characteristics of silo-stock-foundation interaction system under seismic load
- Microblog topic evolution computing based on LDA algorithm
- Modeling the creep damage effect on the creep crack growth behavior of rotor steel
- Neighborhood condition for all fractional (g, f, n′, m)-critical deleted graphs
- Chinese open information extraction based on DBMCSS in the field of national information resources
- 10.1515/phys-2018-0079
- CPW-fed circularly-polarized antenna array with high front-to-back ratio and low-profile
- Intelligent Monitoring Network Construction based on the utilization of the Internet of things (IoT) in the Metallurgical Coking Process
- Temperature detection technology of power equipment based on Fiber Bragg Grating
- Research on a rotational speed control strategy of the mandrel in a rotary steering system
- Dynamic load balancing algorithm for large data flow in distributed complex networks
- Super-structured photonic crystal fiber Bragg grating biosensor image model based on sparse matrix
- Fractal-based techniques for physiological time series: An updated approach
- Analysis of the Imaging Characteristics of the KB and KBA X-ray Microscopes at Non-coaxial Grazing Incidence
- Application of modified culture Kalman filter in bearing fault diagnosis
- Exact solutions and conservation laws for the modified equal width-Burgers equation
- On topological properties of block shift and hierarchical hypercube networks
- Elastic properties and plane acoustic velocity of cubic Sr2CaMoO6 and Sr2CaWO6 from first-principles calculations
- A note on the transmission feasibility problem in networks
- Ontology learning algorithm using weak functions
- Diagnosis of the power frequency vacuum arc shape based on 2D-PIV
- Parametric simulation analysis and reliability of escalator truss
- A new algorithm for real economy benefit evaluation based on big data analysis
- Synergy analysis of agricultural economic cycle fluctuation based on ant colony algorithm
- Multi-level encryption algorithm for user-related information across social networks
- Multi-target tracking algorithm in intelligent transportation based on wireless sensor network
- Fast recognition method of moving video images based on BP neural networks
- Compressed sensing image restoration algorithm based on improved SURF operator
- Design of load optimal control algorithm for smart grid based on demand response in different scenarios
- Face recognition method based on GA-BP neural network algorithm
- Optimal path selection algorithm for mobile beacons in sensor network under non-dense distribution
- Localization and recognition algorithm for fuzzy anomaly data in big data networks
- Urban road traffic flow control under incidental congestion as a function of accident duration
- Optimization design of reconfiguration algorithm for high voltage power distribution network based on ant colony algorithm
- Feasibility simulation of aseismic structure design for long-span bridges
- Construction of renewable energy supply chain model based on LCA
- The tribological properties study of carbon fabric/ epoxy composites reinforced by nano-TiO2 and MWNTs
- A text-Image feature mapping algorithm based on transfer learning
- Fast recognition algorithm for static traffic sign information
- Topical Issue: Clean Energy: Materials, Processes and Energy Generation
- An investigation of the melting process of RT-35 filled circular thermal energy storage system
- Numerical analysis on the dynamic response of a plate-and-frame membrane humidifier for PEMFC vehicles under various operating conditions
- Energy converting layers for thin-film flexible photovoltaic structures
- Effect of convection heat transfer on thermal energy storage unit
Articles in the same Issue
- Regular Articles
- A modified Fermi-Walker derivative for inextensible flows of binormal spherical image
- Algebraic aspects of evolution partial differential equation arising in the study of constant elasticity of variance model from financial mathematics
- Three-dimensional atom localization via probe absorption in a cascade four-level atomic system
- Determination of the energy transitions and half-lives of Rubidium nuclei
- Three phase heat and mass transfer model for unsaturated soil freezing process: Part 1 - model development
- Three phase heat and mass transfer model for unsaturated soil freezing process: Part 2 - model validation
- Mathematical model for thermal and entropy analysis of thermal solar collectors by using Maxwell nanofluids with slip conditions, thermal radiation and variable thermal conductivity
- Constructing analytic solutions on the Tricomi equation
- Feynman diagrams and rooted maps
- New type of chaos synchronization in discrete-time systems: the F-M synchronization
- Unsteady flow of fractional Oldroyd-B fluids through rotating annulus
- A note on the uniqueness of 2D elastostatic problems formulated by different types of potential functions
- On the conservation laws and solutions of a (2+1) dimensional KdV-mKdV equation of mathematical physics
- Computational methods and traveling wave solutions for the fourth-order nonlinear Ablowitz-Kaup-Newell-Segur water wave dynamical equation via two methods and its applications
- Siewert solutions of transcendental equations, generalized Lambert functions and physical applications
- Numerical solution of mixed convection flow of an MHD Jeffery fluid over an exponentially stretching sheet in the presence of thermal radiation and chemical reaction
- A new three-dimensional chaotic flow with one stable equilibrium: dynamical properties and complexity analysis
- Dynamics of a dry-rebounding drop: observations, simulations, and modeling
- Modeling the initial mechanical response and yielding behavior of gelled crude oil
- Lie symmetry analysis and conservation laws for the time fractional simplified modified Kawahara equation
- Solitary wave solutions of two KdV-type equations
- Applying industrial tomography to control and optimization flow systems
- Reconstructing time series into a complex network to assess the evolution dynamics of the correlations among energy prices
- An optimal solution for software testing case generation based on particle swarm optimization
- Optimal system, nonlinear self-adjointness and conservation laws for generalized shallow water wave equation
- Alternative methods for solving nonlinear two-point boundary value problems
- Global model simulation of OH production in pulsed-DC atmospheric pressure helium-air plasma jets
- Experimental investigation on optical vortex tweezers for microbubble trapping
- Joint measurements of optical parameters by irradiance scintillation and angle-of-arrival fluctuations
- M-polynomials and topological indices of hex-derived networks
- Generalized convergence analysis of the fractional order systems
- Porous flow characteristics of solution-gas drive in tight oil reservoirs
- Complementary wave solutions for the long-short wave resonance model via the extended trial equation method and the generalized Kudryashov method
- A Note on Koide’s Doubly Special Parametrization of Quark Masses
- On right-angled spherical Artin monoid of type Dn
- Gas flow regimes judgement in nanoporous media by digital core analysis
- 4 + n-dimensional water and waves on four and eleven-dimensional manifolds
- Stabilization and Analytic Approximate Solutions of an Optimal Control Problem
- On the equations of electrodynamics in a flat or curved spacetime and a possible interaction energy
- New prediction method for transient productivity of fractured five-spot patterns in low permeability reservoirs at high water cut stages
- The collinear equilibrium points in the restricted three body problem with triaxial primaries
- Detection of the damage threshold of fused silica components and morphologies of repaired damage sites based on the beam deflection method
- On the bivariate spectral quasi-linearization method for solving the two-dimensional Bratu problem
- Ion acoustic quasi-soliton in an electron-positron-ion plasma with superthermal electrons and positrons
- Analysis of projectile motion in view of conformable derivative
- Computing multiple ABC index and multiple GA index of some grid graphs
- Terahertz pulse imaging: A novel denoising method by combing the ant colony algorithm with the compressive sensing
- Characteristics of microscopic pore-throat structure of tight oil reservoirs in Sichuan Basin measured by rate-controlled mercury injection
- An activity window model for social interaction structure on Twitter
- Transient thermal regime trough the constitutive matrix applied to asynchronous electrical machine using the cell method
- On the zagreb polynomials of benzenoid systems
- Integrability analysis of the partial differential equation describing the classical bond-pricing model of mathematical finance
- The Greek parameters of a continuous arithmetic Asian option pricing model via Laplace Adomian decomposition method
- Quantifying the global solar radiation received in Pietermaritzburg, KwaZulu-Natal to motivate the consumption of solar technologies
- Sturm-Liouville difference equations having Bessel and hydrogen atom potential type
- Study on the response characteristics of oil wells after deep profile control in low permeability fractured reservoirs
- Depiction and analysis of a modified theta shaped double negative metamaterial for satellite application
- An attempt to geometrize electromagnetism
- Structure of traveling wave solutions for some nonlinear models via modified mathematical method
- Thermo-convective instability in a rotating ferromagnetic fluid layer with temperature modulation
- Construction of new solitary wave solutions of generalized Zakharov-Kuznetsov-Benjamin-Bona-Mahony and simplified modified form of Camassa-Holm equations
- Effect of magnetic field and heat source on Upper-convected-maxwell fluid in a porous channel
- Physical cues of biomaterials guide stem cell fate of differentiation: The effect of elasticity of cell culture biomaterials
- Shooting method analysis in wire coating withdrawing from a bath of Oldroyd 8-constant fluid with temperature dependent viscosity
- Rank correlation between centrality metrics in complex networks: an empirical study
- Special Issue: The 18th International Symposium on Electromagnetic Fields in Mechatronics, Electrical and Electronic Engineering
- Modeling of electric and heat processes in spot resistance welding of cross-wire steel bars
- Dynamic characteristics of triaxial active control magnetic bearing with asymmetric structure
- Design optimization of an axial-field eddy-current magnetic coupling based on magneto-thermal analytical model
- Thermal constitutive matrix applied to asynchronous electrical machine using the cell method
- Temperature distribution around thin electroconductive layers created on composite textile substrates
- Model of the multipolar engine with decreased cogging torque by asymmetrical distribution of the magnets
- Analysis of spatial thermal field in a magnetic bearing
- Use of the mathematical model of the ignition system to analyze the spark discharge, including the destruction of spark plug electrodes
- Assessment of short/long term electric field strength measurements for a pilot district
- Simulation study and experimental results for detection and classification of the transient capacitor inrush current using discrete wavelet transform and artificial intelligence
- Magnetic transmission gear finite element simulation with iron pole hysteresis
- Pulsed excitation terahertz tomography – multiparametric approach
- Low and high frequency model of three phase transformer by frequency response analysis measurement
- Multivariable polynomial fitting of controlled single-phase nonlinear load of input current total harmonic distortion
- Optimal design of a for middle-low-speed maglev trains
- Eddy current modeling in linear and nonlinear multifilamentary composite materials
- The visual attention saliency map for movie retrospection
- AC/DC current ratio in a current superimposition variable flux reluctance machine
- Influence of material uncertainties on the RLC parameters of wound inductors modeled using the finite element method
- Cogging force reduction in linear tubular flux switching permanent-magnet machines
- Modeling hysteresis curves of La(FeCoSi)13 compound near the transition point with the GRUCAD model
- Electro-magneto-hydrodynamic lubrication
- 3-D Electromagnetic field analysis of wireless power transfer system using K computer
- Simplified simulation technique of rotating, induction heated, calender rolls for study of temperature field control
- Design, fabrication and testing of electroadhesive interdigital electrodes
- A method to reduce partial discharges in motor windings fed by PWM inverter
- Reluctance network lumped mechanical & thermal models for the modeling and predesign of concentrated flux synchronous machine
- Special Issue Applications of Nonlinear Dynamics
- Study on dynamic characteristics of silo-stock-foundation interaction system under seismic load
- Microblog topic evolution computing based on LDA algorithm
- Modeling the creep damage effect on the creep crack growth behavior of rotor steel
- Neighborhood condition for all fractional (g, f, n′, m)-critical deleted graphs
- Chinese open information extraction based on DBMCSS in the field of national information resources
- 10.1515/phys-2018-0079
- CPW-fed circularly-polarized antenna array with high front-to-back ratio and low-profile
- Intelligent Monitoring Network Construction based on the utilization of the Internet of things (IoT) in the Metallurgical Coking Process
- Temperature detection technology of power equipment based on Fiber Bragg Grating
- Research on a rotational speed control strategy of the mandrel in a rotary steering system
- Dynamic load balancing algorithm for large data flow in distributed complex networks
- Super-structured photonic crystal fiber Bragg grating biosensor image model based on sparse matrix
- Fractal-based techniques for physiological time series: An updated approach
- Analysis of the Imaging Characteristics of the KB and KBA X-ray Microscopes at Non-coaxial Grazing Incidence
- Application of modified culture Kalman filter in bearing fault diagnosis
- Exact solutions and conservation laws for the modified equal width-Burgers equation
- On topological properties of block shift and hierarchical hypercube networks
- Elastic properties and plane acoustic velocity of cubic Sr2CaMoO6 and Sr2CaWO6 from first-principles calculations
- A note on the transmission feasibility problem in networks
- Ontology learning algorithm using weak functions
- Diagnosis of the power frequency vacuum arc shape based on 2D-PIV
- Parametric simulation analysis and reliability of escalator truss
- A new algorithm for real economy benefit evaluation based on big data analysis
- Synergy analysis of agricultural economic cycle fluctuation based on ant colony algorithm
- Multi-level encryption algorithm for user-related information across social networks
- Multi-target tracking algorithm in intelligent transportation based on wireless sensor network
- Fast recognition method of moving video images based on BP neural networks
- Compressed sensing image restoration algorithm based on improved SURF operator
- Design of load optimal control algorithm for smart grid based on demand response in different scenarios
- Face recognition method based on GA-BP neural network algorithm
- Optimal path selection algorithm for mobile beacons in sensor network under non-dense distribution
- Localization and recognition algorithm for fuzzy anomaly data in big data networks
- Urban road traffic flow control under incidental congestion as a function of accident duration
- Optimization design of reconfiguration algorithm for high voltage power distribution network based on ant colony algorithm
- Feasibility simulation of aseismic structure design for long-span bridges
- Construction of renewable energy supply chain model based on LCA
- The tribological properties study of carbon fabric/ epoxy composites reinforced by nano-TiO2 and MWNTs
- A text-Image feature mapping algorithm based on transfer learning
- Fast recognition algorithm for static traffic sign information
- Topical Issue: Clean Energy: Materials, Processes and Energy Generation
- An investigation of the melting process of RT-35 filled circular thermal energy storage system
- Numerical analysis on the dynamic response of a plate-and-frame membrane humidifier for PEMFC vehicles under various operating conditions
- Energy converting layers for thin-film flexible photovoltaic structures
- Effect of convection heat transfer on thermal energy storage unit