Showing 1,361 - 1,380 results of 120,517 for search '"Methodism"', query time: 0.15s Refine Results
  1. 1361

    Multi-station positioning accuracy and enhancement method for 5G by Feilong ZHAO, Lili WANG

    Published 2023-09-01
    “…RAT-dependent is a satellite independent positioning technology of 5G.3GPP gives the Cramer-Rao lower bound (CRLB) of the positioning accuracy under the ideal condition of a single station and the simulation positioning accuracy of multi-station under different network configurations.Based on the actual network conditions, the analysis framework, accuracy range of multi-station positioning accuracy and the corresponding improvement method were proposed.The experimental results show that the RAT-dependent positioning accuracy is closely related to network technologies, and the positioning accuracy of the optimized scheme can be improved by 20%~30% compared with the non-optimized scheme.…”
    Get full text
    Article
  2. 1362

    User role analysis method based on directed topological potential by Song-qing DUAN, Xing-long YU, Bin WU, Bai WANG

    Published 2014-12-01
    “…The majority of real-world networks are directed,weighted and dynamic.Aiming at the problem of node role analysis in directed weighted network,a novel node role analysis method based on directed topological potential is pro-posed,which can divide nodes into four roles based on their behavior pattern and local influence.Then,a node role-based dynamic networks evolution analysis method is introduced,which can model the dynamics of behavioral roles represent-ing the main connectivity patterns over time and detect the significant event.The experiment results indicate that pro-posed approaches can effectively estimate the node role and detect the dynamics of network evolution.…”
    Get full text
    Article
  3. 1363

    Speaker verification method based on deep information divergence maximization by Chen CHEN, Yafeng RONG, Chaoqun JI, Deyun CHEN, Yongjun HE

    Published 2021-07-01
    “…To solve the problem that the nonlinear relationship between speaker representations cannot be accurately captured in speaker verification, an objective function based on depth information divergence maximization was proposed.It could implicitly represent the nonlinear relationship between speaker representations by calculating the similarity between their distributions.Under the supervision of the optimization goal of maximizing the statistical correlation, the deep neural network was optimized towards the direction that the within-class data was more compact and the between-class data were far away from each other, and finally the discrimination of deep speaker representation space could be effectively improved.Experimental results show that compared with other deep learning methods, the relative EER of the proposed method is reduced by 15.80% at most, which significantly improves the system performance.…”
    Get full text
    Article
  4. 1364
  5. 1365

    An Underdetermined Blind Source Separation Method with Application to Modal Identification by Gang Yu

    Published 2019-01-01
    “…In this paper, we first review the drawbacks of the conventional BSS methods and then propose a novel underdetermined BSS method for addressing the modal identification with limited sensors. …”
    Get full text
    Article
  6. 1366
  7. 1367
  8. 1368

    An Efficient Higher-Order Quasilinearization Method for Solving Nonlinear BVPs by Eman S. Alaidarous, Malik Zaka Ullah, Fayyaz Ahmad, A.S. Al-Fhaid

    Published 2013-01-01
    “…The construction of higher-order convergent methods depends on a decomposition method which is different from Adomain decomposition method (Motsa and Sibanda, 2013). …”
    Get full text
    Article
  9. 1369

    Wu’s Characteristic Set Method for SystemVerilog Assertions Verification by Xinyan Gao, Ning Zhou, Jinzhao Wu, Dakui Li

    Published 2013-01-01
    “…We propose a verification solution based on characteristic set of Wu’s method towards SystemVerilog assertion checking over digital circuit systems. …”
    Get full text
    Article
  10. 1370
  11. 1371

    Method, Design, and Evaluation of an Exoskeleton for Lifting a Load In Situ by Xin Li, Weihao Li, Qiang Li

    Published 2021-01-01
    “…This paper presents a design method and realization of an exoskeleton for a specific scenario of lifting a load in situ. …”
    Get full text
    Article
  12. 1372

    Bending Moment Calculations for Piles Based on the Finite Element Method by Yu-xin Jie, Hui-na Yuan, Hou-de Zhou, Yu-zhen Yu

    Published 2013-01-01
    “…Using the finite element analysis program ABAQUS, a series of calculations on a cantilever beam, pile, and sheet pile wall were made to investigate the bending moment computational methods. The analyses demonstrated that the shear locking is not significant for the passive pile embedded in soil. …”
    Get full text
    Article
  13. 1373
  14. 1374

    Fuzzy Interpolation and Other Interpolation Methods Used in Robot Calibrations by Ying Bai, Nailong Guo, Gerald Agbegha

    Published 2012-01-01
    “…A novel interpolation algorithm, fuzzy interpolation, is presented and compared with other popular interpolation methods widely implemented in industrial robots calibrations and manufacturing applications. …”
    Get full text
    Article
  15. 1375
  16. 1376

    RESEARCH ON ACCELERATED FATIGUE TESTING METHOD OF THE WORM AND GEAR TRANSMISSION by BAI GuoZhen, WANG QiaoRan

    Published 2015-01-01
    “…This paper presented specific calculation method,and analyzed reliability and feasibility of accelerated fatigue of worm and gear.…”
    Get full text
    Article
  17. 1377

    IMPROVED FINITE ELEMENT TRANSFER MATRIX METHOD FOR STRUCTURAL DYNAMICS by LV JianDong, HE Bin, YAO LiKe, FAN QinShan

    Published 2015-01-01
    “…The finite element transfer matrix method provides an efficient means to solve complex engineering problems,the state vector of traditional finite element transfer matrix method usually include linear and angular displacement,resulting in solving the transient dynamic problems has a strong dependence on numerical method. …”
    Get full text
    Article
  18. 1378
  19. 1379

    Automatic method for searching integral distinguishers of ARX block ciphers by Ya HAN, Mingsheng WANG

    Published 2018-05-01
    “…Firstly,based on three subsets division property propagation technique,the propagation function of the K-set and L-set of ARX block ciphers was constructed respectively.All vectors in L-set affected the propagation of K-set when propagate through xored round key operation.With SAT/SMT solver,round reduced integral propagation functions of ARX block ciphers could be established.Finally,by exhausting all possible input integral characteristics with proper data complexity,round reduced integral distinguishers of ARX block ciphers could be found.The proposed method can be used for searching integral distinguishers of ARX block ciphers including SIMON-like family block ciphers,HIGHT,SPECK family block ciphers and LEA effectively.…”
    Get full text
    Article
  20. 1380

    Clustering-based dynamic privacy preserving method for social networks by Yong-hao GU, Jiu-chuan LIN, Da GUO

    Published 2015-11-01
    “…Due to the dynamic characteristics of the social network graph structure,an effective dynamic privacy preserving method was needed.To solve the problems of the existing dynamic privacy preservation methods,such as attacker’s too little background knowledge and the low adaptability to the dynamic characteristics of graph structure,a clustering-based dynamic privacy preservation method was provided.The analysis shows that the proposed method can resist many kinds of background knowledge attacks and has good adaptability to the dynamic characteristics of the social network graph structure.…”
    Get full text
    Article