Showing 12,721 - 12,740 results of 19,511 for search '"algorithms"', query time: 0.09s Refine Results
  1. 12721

    A Simple Hybrid Synchronization for a Class of Chaotic Financial Systems by Jiming Zheng, Xiaoshuang Li, Yang Qiu

    Published 2017-01-01
    “…First, a simple single variable controller is obtained to synchronize two identical chaotic financial systems with different initial conditions. Second, a novel algorithm is proposed to determine the variables of the master system that should antisynchronize with corresponding variables of the slave system and use this algorithm to determine the corresponding variables in the chaotic financial systems. …”
    Get full text
    Article
  2. 12722

    Blind estimation of spreading codes for multi-antenna LC-DS-CDMA signals based on tensor decomposition by Zhijin ZHAO, Hui YIN, Fangfang QIANG, Junna SHANG

    Published 2018-10-01
    “…Aiming at the problem of the poor performance of the imputation method for the spreading codes blind estimation of the multi-antenna long-code direct sequence code division multiple access (CDMA) signals.Firstly,using the segmentation idea,the received signals were constructed into a three-dimensional tensor model,and the tensor was divided into sub-tensors according to the spreading gain.The sub-tensors were constructed into the Tucker decomposition model.Secondly,the spreading code fragments and the receiver gain matrixes were obtained from the sub-tensors by Tucker decomposition which was using the variable step gradient descending algorithm.Then,because of the same characteristic of the receiver gain matrixes in each sub-tensor,the permutation matrixes were estimated by using the cross correlation matrixes of the receiver gain matrixes and the order of the spreading code fragments was corrected.Finally,the amplitude of the spreading codes was determined by using the autocorrelation of the spreading codes,and each user’s spreading code was obtained.The simulation results verify the effectiveness of the proposed algorithm.…”
    Get full text
    Article
  3. 12723

    Secure and high throughput routing protocol with QoS constraints in cognitive wireless Mesh networks by Zhu-fang KUANG, Zhi-gang CHEN, Guo-jun WANG, Hui LIU

    Published 2014-11-01
    “…A routing metric SIEB which includes link security,link conflict,link reliability and link available bandwidth was proposed.The SIEB includes link security and link performance two aspects.In order to resist various hole attack,the link trust value based on two hop neighbor feedback is computed in link security weight computing of SIEB.On this basis,a link security weight computing algorithm LSWC and a link performance weight computing algorithm LSPC were proposed,and a distributed routing protocol SIEBP with QoS constraints in cognitive wireless Mesh network was proposed.Finding safety routing path and maximizing the network throughput are the objective of SIEBP.Simulation results show that SIEBP routing protocol can achieve expectation goal.It can not only find safety routing path which can resist black hole attack,gray hole attack and worm hole attack,but also obtain a higher network throughput.…”
    Get full text
    Article
  4. 12724

    Spatial Analysis on Networks: Towards identifying similarity of routes by Panagiotis Agourogiannis, Dimitris Kavroudakis, Marios Batsaris

    Published 2021-12-01
    “…The paper presents an algorithm for finding optimal paths in spatial networks, through the utilization of open source GIS and mathematical analysis of Networks using Graph Theory as well as using geographical proximity attributes of network nodes. …”
    Get full text
    Article
  5. 12725

    Energy efficiency priority IoT task collaborative migration strategy by Longyu ZHOU, Ning YANG, Guanhua QIAO, Ke ZHANG, Qilin ZHENG

    Published 2019-06-01
    “…Mobile edge computing can reduce transmission delay and data processing delay for IoT applications by executing communication and computing operation in the edge network.However,for a large number of IoT device connections,massive service data is simultaneously gathered on the edge computing platform,which will significantly increase the traffic load of the forward link and the computing load of the edge server.In order to meet this challenge,based on diversified IoT application requirements,a task collaborative migration strategy was designed to realize the minimum energy consumption of the system under time delay constraints by optimizing the selection control of equipment transmission.In the absence of perfect channel state prior information,a resource management algorithm based on deep reinforcement learning was proposed to obtain the optimal offloading decision with lower complexity.The simulation results show that the proposed algorithm can significantly reduce the energy consumption of the system and meet the service delay of the task compared with the random transmission selection strategy.…”
    Get full text
    Article
  6. 12726

    Optimization of Contact Path and Transmission Error based on Installation and Adjustment of Spiral Bevel Gear by Mingkang Wang, Changjiang Zhou, Yi Liu, Jian Hong, Shengwen Hou

    Published 2022-01-01
    “…A tooth contact analysis (TCA) algorithm with the misalignment is built by introducing gear pair misalignment. …”
    Get full text
    Article
  7. 12727

    Analysis and Optimization of Tooth Surface Contact Parameter of ZC1 Worm Gear by Song Lijuan, Ji Weixi, Xie Jian, Wang Yu

    Published 2016-01-01
    “…Based on the meshing theory of ZC1 worm gear pair,the tooth surface contact parameters are analyzed by using MATLAB.The results show that the axial module,center distance,lead angle,radius of arc tooth profile of grinding wheel have great influence on tooth surface contact parameters.In general,the center distance is selected in the beginning of design,so the axial module,lead angle,radius of arc tooth profile of grinding wheel are selected as design variable.For improving the meshing performance of worm gear pair,taking the induced normal curvature and lubrication angle as objective function,and combining with the constraints of top thickness of worm,top thickness of worm wheel and undercutting,the optimum mathematical model is established.The improved particle swarm algorithm is adopted as optimization algorithm and the results show that the optimized lubrication angle is larger and induced normal curvature is smaller.The meshing performance of worm gear pair is improved effectively.…”
    Get full text
    Article
  8. 12728

    Hybrid precoding based on distributed partially-connected structure for multiuser massive MIMO by Lei ZHANG, Qin WANG

    Published 2022-01-01
    “…For multiuser massive multiple-input multiple-output (MIMO) systems, to solve the problem of underutilized spatial resources caused by centralized partially-connected structure (PCS) and fixed-matching phase-control algorithm in conventional schemes, a low complexity phased zero-forcing (PZF) hybrid precoding scheme based on distributed PCS was proposed.The logical antenna subarrays with more than the number of radio frequency (RF) chains were designed, so that each RF chain could be connected to multiple distributed subarrays to provide higher spatial diversity gain.Further, by analyzing the influence of phase-control analog precoding on zero-forcing digital precoding, a phase-control analog precoding algorithm via successively maximizing users’ total subarray gains was proposed to maximize the upper bound of system spectral efficiency.Analysis and simulation results show that, compared with the conventional schemes, the proposed scheme can significantly improve the system spectral efficiency while slightly increases the computational complexity, and it is also insensitive to imperfect channel state information.…”
    Get full text
    Article
  9. 12729

    APPLICATION OF IMPROVED EXPERIENCE WAVELET TRANSFORM IN FAULT DIAGNOSIS OF WIND TURBINE GEARBOX by HU Xuan, LI Chun, YE KeHua

    Published 2022-01-01
    “…The results show that the CASNEWT method retains the advantages of the EWT algorithm, which can effectively avoid the modal aliasing effect and the end effect, while greatly improving the robustness of the EWT decomposition algorithm to noise, removes the noise and retains the original signal characteristic information. …”
    Get full text
    Article
  10. 12730

    Data Analysis Method of Intelligent Analysis Platform for Big Data of Film and Television by Youwen Ma, Yi Wan

    Published 2021-01-01
    “…Based on the study of the impact of each attribute of film and television drama on film box office and TV audience rating, it is committed to the prediction of film and television industry and constantly verifies and improves the algorithm model.…”
    Get full text
    Article
  11. 12731

    Research on Two-Level Price-Fluctuation Supply Chain Ordering Strategy Problem by Minchao Zheng, Zhiqing Meng, Rui Shen

    Published 2020-01-01
    “…The optimal order quantity is derived by transforming the bilevel programming model into a single-level model. An algorithm is given for solving the approximate optimal order quantity for the discrete model, and the convergence of the algorithm is proved. …”
    Get full text
    Article
  12. 12732

    Highly scalable intelligent sensory application and time domain matrix for safety-critical system design by Taikyeong Ted Jeong

    Published 2018-04-01
    “…The designs of highly scalable intelligent sensory application—Ethernet-based communication architectures—are moving toward the integration of a fault recovery and fault-detection algorithm on the automotive industry. In particular, each port on the same network interface card design is required to provide highly scalable and low-latency communication. …”
    Get full text
    Article
  13. 12733

    Double array system identification research based on LSTM neural network by Chunhua Gao, Mingyang Wang, Yifei Sima, Zihan Yuan

    Published 2025-01-01
    “…This indicates that the algorithm can accurately reproduce the characteristics of the shaking table itself and shows good performance in time series prediction and data mining. …”
    Get full text
    Article
  14. 12734

    FCM Clustering Approach Optimization Using Parallel High-Speed Intel FPGA Technology by Abedalmuhdi Almomany, Amin Jarrah, Anwar Al Assaf

    Published 2022-01-01
    “…Fuzzy C-Means (FCM) is a widely used clustering algorithm that performs well in various scientific applications. …”
    Get full text
    Article
  15. 12735

    Design and Dynamic Analysis of the Leveling System for Automatic Inspection Robots in Power Tunnels by Xu Shiyang, Wu Binghui, Ji Dongmei, Zhou Jiajun

    Published 2024-04-01
    “…On this basis, the adaptive robust sliding mode algorithm is introduced to optimize and improve the PI controller to improve the stability and adaptive correction ability. …”
    Get full text
    Article
  16. 12736

    Automated and highly parallelized Bayesian optimization scheme for direct drive fusion experiments on OMEGA by V. Gopalaswamy, A. Lees, R. Ejaz, C. A. Thomas, T. J. B. Collins, K. S. Anderson, W. Ebmeyer, R. Betti

    Published 2025-01-01
    “…We use this algorithm to find a markedly improved design for the performance implosions on OMEGA that is predicted to hydroequivalently scale to ignition at 2.15 MJ.…”
    Get full text
    Article
  17. 12737

    A partial overlapping point cloud registration method based on dynamic feature matching by Hui DU, Changliang ZHENG, Chunyu MIAO, Xiaomeng ZHANG

    Published 2021-04-01
    “…The point cloud registration method can effectively complete the registration of point clouds with different overlap rates and various sizes, and ensure the accuracy of the 3D reconstruction model.To address the above issues, a partial overlapping point cloud registration method based on dynamic feature matching named PPCR was proposed.Firstly, the point cloud was divided into sub-point clouds based on the Euclidean distance segmentation method.Secondly, the features of sub-point clouds were extracted.Since the sizes of different point clouds are varied, the scales of the extracted features are also different.Thus, a dynamic time warping (DTW) algorithm was proposed to map the sub-point clouds.Finally, the registration algorithm was iterated to obtain the translation and rotation matrix between point clouds.This matrix was used to complete the registration and stitching between point clouds.Experimental results show that the proposed method can effectively solve the registration problems of partially overlapping point clouds and point clouds with different scales.…”
    Get full text
    Article
  18. 12738

    An integrated optimization model of network behavior victimization identification based on association rule feature extraction by Shengli ZHOU, Linqi RUAN, Rui XU, Xikang ZHANG, Quanzhe ZHAO, Yuanbo LIAN

    Published 2023-08-01
    “…The identification of the risk of network behavior victimization was of great significance for the prevention and warning of telecom network fraud.Insufficient mining of network behavior features and difficulty in determining relationships, an integrated optimization model for network behavior victimization identification based on association rule feature extraction was proposed.The interactive traffic data packets generated when users accessed websites were captured by the model, and the implicit and explicit behavior features in network traffic were extracted.Then, the association rules between features were mined, and the feature sequences were reconstructed using the FP-Growth algorithm.Finally, an analysis model of telecom network fraud victimization based on network traffic analysis was established, combined with the stochastic forest algorithm of particle swarm optimization.The experiments show that compared with general binary classification models, the proposed model has better precision and recall rates and can effectively improve the accuracy of network fraud victimization identification.…”
    Get full text
    Article
  19. 12739

    Spatial and Temporal Variation of Wideband Indoor Channels by David L. Ndzi, Nick Savage, Boris Gremont

    Published 2010-01-01
    “…Singular Value Decomposition Prony algorithm has been used to compute the impulse response from measured channel transfer functions. …”
    Get full text
    Article
  20. 12740

    Research on Resource Allocation of Satellite Internet Service Function Based on SDN/NFV by Meilin XU, Min JIA, Qing GUO

    Published 2022-03-01
    “…Software-defined networks and network function virtualization can effectively solve the problems of difficult management and control of large-scale networks and diffi culties in resource scheduling.Applying the software-defi ned network architecture model and network function virtualization technologies to the large-scale satellite internet can eff ectively solve some problems.This paper proposed a new SDN/NFV-based new satellite internet architecture, different satellite domains could be responsibled for different functions, inter-satellite and inter-domain could used SDN and NVF for eff ective collaboration, effi cient used of network resources, research and optimization of its service function resource allocation technology after VNF deployment, a simulated annealing algorithm based on resource awareness was proposed.Simulation results showed that this algorithm could effectively reduced the end-to-end delay and bandwidth consumption of SFC data fl ow during transmission, and could provided users with better services.…”
    Get full text
    Article