Showing 2,041 - 2,060 results of 3,044 for search '"ITER"', query time: 0.05s Refine Results
  1. 2041

    Effect of Location of Delamination on Free Vibration of Cross-Ply Conical Shells by Sudip Dey, Amit Karmakar

    Published 2012-01-01
    “…The standard eigen value problem is solved by applying the QR iteration algorithm. Finite element codes are developed to obtain the numerical results concerning the effects of location of delamination, twist angle and rotational speed on the natural frequencies of cross-ply composite shallow conical shells. …”
    Get full text
    Article
  2. 2042

    Model Modification of the Mill Transmission System Based on the PSO-BP Neural Network by Tao Zheng, Bao Xianle, Guo Qintao, Zhou Tianyang

    Published 2024-02-01
    “…Meanwhile, it does not need a large number of iterative solving steps, avoids the complex nonlinear optimization process of the traditional inverse problem model modification method, improves the efficiency, verifies the feasibility of the PSO-BP neural network method applied to the transmission system of large mill, and lays a foundation for the overall analysis of the subsequent transmission system.…”
    Get full text
    Article
  3. 2043

    Radio resource and trajectory optimization for UAV assisted communication based on user route by Lei LANG, Jingning WANG, Yi WANG, Zitao ZHAO

    Published 2022-03-01
    “…Recently, research on the application of unmanned aerial vehicle (UAV) in wireless communication networks has been widely studied.Aiming at the downlink wireless transmission system of UAV assisted mobile user communication, a method of resource allocation and trajectory optimization based on user route was proposed.According to the known user route, the estimated large-scale channel state information was obtained in advance, and a joint optimization problem of communication bandwidth allocation and trajectory optimization was established to maximize the minimum average rate of users.The problem was a nonconvex optimization problem, and there was nonlinear coupling between the variables.By introducing the method of alternating optimization of auxiliary variables and separated variables, the original problem was decomposed into two approximate convex optimization subproblems which could be solved, and the successive convex approximation was used to iteratively optimize the two subproblems, and an approximate suboptimal solution of the original nonconvex problem was obtained.Simulation results show that the proposed method of resource allocation and trajectory optimization can effectively improve the average data throughput of users, and improve the efficiency of UAV assisted communication on the premise of ensuring the communication quality of all users.…”
    Get full text
    Article
  4. 2044

    From Domestic Setting to Display Space: The Evolution of the Foster Associates’ Work Spaces and Methodology by Gabriel Hernández

    Published 2020-12-01
    “…This article explores how the studio’s spatial configuration, in its many iterations from the beginning of the 1960s to the early 1980s, has enhanced innovation, team interactions and individual contributions.The practice’s distinctive design philosophy has been mirrored in the many workspaces that have housed the practice, from its domestic setting in London’s Hampstead Hill Gardens, to its current main office space in Battersea. …”
    Get full text
    Article
  5. 2045

    LIGHTWEIGHT OPTIMIZATION OF THE AUTOMOBILE FRONT AXLE BASED ON THE IMPROVED MANTA RAY FORAGING ALGORITHM (MT) by LU Jia, WANG Chao

    Published 2023-01-01
    “…The optimization results show that the optimal solution can be obtained after 94 iterations, and the total mass of the automobile front axle after optimization is reduced from 51.95 kg to 43.24 kg, a decrease of 16.75%. …”
    Get full text
    Article
  6. 2046

    Secure beamforming design for IRS-assisted SWIPT Internet of things system by Zhengyu ZHU, Jinlei XU, Gangcan SUN, Ning WANG, Wanming HAO

    Published 2021-04-01
    “…In order to meet the new requirements of intelligent signal processing deployment and physical layer security for green interconnection of things, a design method of secure beamforming was proposed to solve the problem of the shortage of sustainable energy supply in the information and energy transmission at the same time Internet of things (IoT) system assisted by intelligent reflecting surface (IRS).Considering the constraints of secrecy rate, transmit power and IRS reflection phase shift, the optimization problem was modeled as a non-convex quadratic programming problem with quadratic constraints, aiming at maximizing the acquisition power of energy collector, and jointly optimizing the base station transmit beamforming matrix, jammer covariance matrix and IRS phase shift.The non-convex quadratic problem was transformed into an equivalent convex problem by using the relaxation variable, semidefinite relaxation method, auxiliary variable and sequence parameter convex approximation method, and an alternative iterative optimization algorithm was proposed to obtain the feasible solution of the original problem.Simulation results show that the proposed algorithm can converge quickly and improve performance effectively compared with the benchmark scheme.…”
    Get full text
    Article
  7. 2047

    An efficient real-time signal processing method for satellite laser ranging. by Jinyu Wang, Wei Zhu, Weiming Gong

    Published 2024-01-01
    “…However, the recognition rate of the single-stage Graz filtering algorithm for high-orbit satellites is less than 1%, and traditional two-stage filtering algorithms, such as polynomial fitting and iterative filtering techniques, exhibit high false and missed detection rates. …”
    Get full text
    Article
  8. 2048

    Cooperation Spectrum Sensing Detecting Algorithm Based on Featured Belief Points in Cognitive Radio Network by Hongyan Zheng, Bo Wu, Yanpeng Feng, Xianjun Meng

    Published 2013-02-01
    “…Fina11y,a nove1 approach using characteristics of belief to contro1 the scale of belief states was presented,which exploited the maximum online reward value iteration algorithm to approximate the optima1 value. …”
    Get full text
    Article
  9. 2049

    Research on the Effect of DPSO in Team Selection Optimization under the Background of Big Data by Qian Zhao, Lian-ying Zhang

    Published 2018-01-01
    “…The simulation experiment method is used to qualitatively analyze the main parameters of the particle swarm optimization in this paper. By comparing the iterative results of genetic algorithm, ordinary particle swarm algorithm, and discrete particle swarm algorithm, it is found that the DPSO algorithm is effective and preferred in the study of team selection with the background of big data.…”
    Get full text
    Article
  10. 2050

    Mode selection and resource optimization for UAV-assisted cellular networks by Daquan FENG, Canjian ZHENG, Xiangqi KONG

    Published 2024-03-01
    “…The resource allocation and optimization scheme was studied in a coexistence scenario of unmanned aerial vehicle (UAV) and cellular communication network.To improve spectrum efficiency of the system, UAV users could reuse the cellular spectrum resources to access the network through full duplex or half duplex device-to-device technique.Additionally, a joint access control, mode selection, power control and resource allocation optimization problem was formulated to maximize the overall throughput of the network while ensuring quality of service requirements for both UAV users and ground cellular users.Specifically, the phase 1 method in the convex optimization was adopted for access control and feasibility check, and then the convex and concave procedure (CCCP) iterative algorithm was used to solve the power control problem for feasible UAV user pairs.By using this local optimum value, the original optimization problem can be simplified into a weighted maximization problem.Finally, the Kuhn-Munkres (KM) algorithm was used to match the optimal channel resources and obtain the global optimal throughput value of the system.Numerical results show that the proposed scheme can significantly improve the performance of system.…”
    Get full text
    Article
  11. 2051

    Design of hybrid precoding with successive interference cancellation and alternating direction method of multipliers by Xiongwen ZHAO, Yao LIU, Yu ZHANG, Suiyan GENG, Peng QIN, Zhenyu ZHOU

    Published 2021-05-01
    “…To solve the problem of large power consumption caused by a large number of phase shifter (PS) in millimeter wave multi-antenna systems, a new type of dynamic connection structure was designed.With the goal of maximizing spectrum efficiency, two hybrid precoding schemes, successive interference cancellation (SIC) and successive interference cancellation-alternating direction multiplier (SIC-ADMM), were proposed.In SIC scheme, the sum-rate problem was decomposed into multiple sub-rate problems of different radio frequency links, the analog part was solved by iteration, and the digital part was solved by a low-dimensional equivalent matrix.Based on SIC scheme, an improved SIC-ADMM scheme was further proposed by studying the multi-variable sub-rate problem to achieve rapid convergence and reduce computational complexity effectively.The simulation results show that the proposed schemes have good spectrum and energy efficiencies by comparison with the existing schemes, and are more suitable for large-scale antenna systems.In addition, when a certain percentage of PS is turned off, the proposed scheme can greatly improve energy efficiency by sacrificing a small amount of spectrum efficiency.…”
    Get full text
    Article
  12. 2052

    HWOA-TTA: A New Hybrid Metaheuristic Algorithm for Global Optimization and Engineering Design Applications by Huda Y. Najm, Elaf Sulaiman Khaleel, Eman T. Hamed, Huda I. Ahmed

    Published 2024-01-01
    “…Second, a new approach is included in the research phase to enhance the result with each iteration to a set of unconstrained benchmark test functions and engineering design applications. …”
    Get full text
    Article
  13. 2053

    Method for generating pseudo random numbers based on cellular neural network by Li-hua DONG, Guo-li YAO

    Published 2016-10-01
    “…To overcome the degradation characteristics of chaos system due to finite precision effect and improve the sta-tistical performance of the random number,a new method based on 6th-order cellular neural network (CNN) was given to construct a 64-bit pseudo random number generation (PRNG).In the method,the input and output data in every iteration of 6th-order CNN were controlled to improved the performance of the random number affected by chaos degradation.Then the data were XORed with a variable parameter and the random sequences generated by a Logistic map,by which the repeat of generated sequences was avoided,and the period of output sequences and the key space were expended.Be-sides,the new method was easy to be realized in the software and could generate 64 bit random numbers every time,thus has a high generating efficiency.Test results show that the generated random numbers can pass the statistical test suite NIST SP800-22 completely and thus has good randomness.The method can be applied in secure communication and other fields of information security.…”
    Get full text
    Article
  14. 2054

    Generative blockchain-based covert communication model based on Markov chain by Wei SHE, Xinpeng RONG, Wei LIU, Zhao TIAN

    Published 2022-10-01
    “…To solve the problems of high channel construction risk, information crossover, and insufficient concealment in the blockchain covert communication, a generative blockchain-based covert communication model based on Markov chain was proposed.First, the text data set was used by sender to obtain the candidate words set and trained the Markov model to obtain the transition probability matrix, generated the Huffman tree set.Secret message to be transmitted was performed iterative Huffman decoding on the binary stream to obtain a set of highly readable carring-secret message statements that conformed to normal language and semantic characteristics, a generative steganography was used to complete secret message embedding.Then, the carring-secret message was ring-signed and published to the blockchain as a normal transaction packing and block generation were completed in the network.Finally, the same text data set was used by the receiver to obtain the Huffman tree of transition probability weights, the binary stream of secret message was obtained by reverse operation.Simulation results demonstrate that, compares with the current similar models, the proposed model can further improve the embedding strength and time efficiency, reduce the risk of covert channel construction, avoid information crossover, and improve the concealment.…”
    Get full text
    Article
  15. 2055

    Information activities and resources in an episode of gourmet cooking by J. Hartel

    Published 2006-01-01
    “…</b> Interview transcripts and field notes were studied for themes through an iterative process of inductive and deductive analysis. …”
    Get full text
    Article
  16. 2056

    Coverage path planning for multi-AUV considering ocean currents and sonar performance by Xukai Mu, Wei Gao

    Published 2025-01-01
    “…Finally, multi-AUV path planning is achieved through iterations of the PSO algorithm and the ELKAI solver. …”
    Get full text
    Article
  17. 2057

    A Fractional Model for the Dynamics of Smoking Tobacco Using Caputo–Fabrizio Derivative by Belaynesh Melkamu, Benyam Mebrate

    Published 2022-01-01
    “…The solution of the proposed model, which is carried out using a fixed-point theorem and an iterative method, exists and is unique. Furthermore, the model is biologically meaningful, that is, positive and bounded. …”
    Get full text
    Article
  18. 2058

    Rapid IO routing strategy based on improved glowworm swarm optimization algorithm by Congyue YIN, Xingming ZHANG, Quan REN, Shuai WEI

    Published 2018-06-01
    “…Aiming at the problem of Qo S routing in Rapid IO network,a Rapid IO routing strategy based on improved glowworm swarm optimization algorithm was proposed.Firstly,gaussian mutation and storage mechanism were used to optimize the traditional firefly algorithm.Gaussian mutation can effectively control the scattering degree of the solution in the search space of the algorithm,so that the algorithm avoids falling into a local optimum.The storage mechanism is conducive to evaluating and storing the historical state of each glowworm,preventing information loss.Then combine the improved glowworm swarm optimization algorithm with the actual Rapid IO network Qo S problem and select the final best routing strategy.The experimental results show that in the simulated Rapid IO test network,the improved glowworm swarm optimization algorithm has a delay of 42 ms,delayed jitter of 8 ms,a minimum cost of 64 ms,and a total of 8 iterations,which is more stable than other algorithm curves.It can find the optimal solution more quickly and show the best performance,effectively solving the Qo S routing problem of Rapid IO network.…”
    Get full text
    Article
  19. 2059

    Development of a Single Detector Ring Micro Crystal Element Scanner: QuickPET II by Robert S. Miyaoka, Marie L. Janes, Kisung Lee, Byungki Park, Paul E. Kinahan, Tom K. Lewellen

    Published 2005-04-01
    “…In addition to the scanner and data acquisition system, we have developed an iterative reconstruction that includes a model of the system's detector response function. …”
    Get full text
    Article
  20. 2060

    APT attack threat-hunting network model based on hypergraph Transformer by Yuancheng LI, Yukun LIN

    Published 2024-02-01
    “…To solve the problem that advanced persistent threat (APT) in the Internet of things (IoT) environment had the characteristics of strong concealment, long duration, and fast update iterations, it was difficult for traditional passive detection models to quickly search, a hypergraph Transformer threat-hunting network (HTTN) was proposed.The HTTN model had the function of quickly locating and discovering APT attack traces in IoT systems with long time spans and complicated information concealment.The input cyber threat intelligence (CTI) log graph and IoT system kernel audit log graph were encoded into hypergraphs by the model, and the global information and node features of the log graph were calculated through the hypergraph neural network (HGNN) layer, and then they were extracted for hyperedge position features by the Transformer encoder, and finally the similarity score was calculated by the hyperedge, thus the threat-hunting of APT was realized in the network environment of the Internet of things system.It is shown by the experimental results in the simulation environment of the Internet of things that the mean square error is reduced by about 20% compared to mainstream graph matching neural networks, the Spearman level correlation coefficient is improved by about 0.8%, and improved precision@10 is improved by about 1.2% by the proposed HTTN model.…”
    Get full text
    Article