-
13581
FEATURES OF APPLICATION OF METHODS OF NETWORK PLANNING AT PROJECT MANAGEMENT AT THE ENTERPRISES OF MECHANICAL ENGINEERING
Published 2017-01-01“…Authors have presented an algorithm and an example of creation of the chart.…”
Get full text
Article -
13582
Research on Information Security Mechanism Used in Network Video Surveillance System
Published 2013-08-01“…Information security mechanism is a key part of security network video surveillance system,including service data security and multimedia data security,and there are a lot of security solutions and specifications now.Two typical specifications on the network video surveillance system were selected to analyze their information security mechanism and the encryption algorithm,and the suggestions on common data protection mechanism were given out.…”
Get full text
Article -
13583
Study on performance optimization for Chinese speech retrieval
Published 2009-01-01“…A new unit, named word fragment of language model was proposed to take full advantage of the Chinese linguistic information among adjacent syllables, and an algorithm for word fragment selection was studied.The experimental results show, with the language model based on word fragment, syllable accuracy for recognizer is improved and the speech retrieval system gives better performance than the one with only syllable based model.…”
Get full text
Article -
13584
Stress Analysis in Glass Artwork
Published 2011-01-01“…The proposed method is based on the principles of photoelasticity combining imaging and quantitative measures with an image processing algorithm. The main goal was to develop a methodology to help glass artists to determine the ability of their work to resist the thermal shocks by giving them a hazard map based on the stress map of the glass piece.…”
Get full text
Article -
13585
Generalized Complementarity Problem with Three Classes of Generalized Variational Inequalities Involving ⊕ Operation
Published 2021-01-01“…Under certain appropriate conditions, we establish equivalence between them. An iterative algorithm is defined for solving one of the three generalized variational inequalities involving XOR operation. …”
Get full text
Article -
13586
Stability and bifurcation of numerical discretization Nicholson blowflies equation with delay
Published 2006-01-01“…Applying the theory of normal form and center manifold, we not only discuss the linear stability of the equilibrium and the existence of the local Hopf bifurcations, but also give the explicit algorithm for determining the direction of bifurcation and stability of the periodic solution of bifurcation.…”
Get full text
Article -
13587
ESTIMATION OF MAXIMUM ACTIVE POWER TRANSMISSION TO LOAD FOR ACTIVE MULTI-POLAR DEVICES
Published 2005-12-01“…In this case we firstly determine a multi-polar equivalent for a circuit with active elements and then the obtained relations are estimated. The proposed algorithm for calculating electric circuits with active multi-polar devices is illustrated on some examples.…”
Get full text
Article -
13588
Numerical Solution of Two-Dimensional Linear Fuzzy Fredholm Integral Equations by the Fuzzy Lagrange Interpolation
Published 2018-01-01“…Then, we prove convergence analysis and numerical stability analysis for the proposed numerical algorithm by two theorems. Finally, by some examples, we show the efficiency of the proposed method.…”
Get full text
Article -
13589
Network traffic analysis system based on IPFIX
Published 2013-09-01“…To deal with the large-scale traffic capture and management in high speed network,the performance of IPFIX system was studied.An optimized architecture was proposed and implemented based on improved binary information integration to collect data and improved multi-layer hash algorithm to storage data.This system was deployed in Tsinghua university campus network and can scale to the 10 GB network traffic collection and accurate pricing.…”
Get full text
Article -
13590
Strong Convergence Theorems for a Finite Family of λi-Strict Pseudocontractions in 2-Uniformly Smooth Banach Spaces by Metric Projections
Published 2012-01-01“…A new hybrid projection algorithm is considered for a finite family of λi-strict pseudocontractions. …”
Get full text
Article -
13591
Total Least Squares Method for Robust Source Localization in Sensor Networks Using TDOA Measurements
Published 2011-08-01“…A total least squares (TLSs) algorithm is developed by a linear closed-form solution for this problem, and the uncertainty of the sensor location is formulated as a perturbation. …”
Get full text
Article -
13592
Communication P Systems on Simplicial Complexes with Applications in Cluster Analysis
Published 2012-01-01“…Examples are given to show the effect of the algorithm. The new P systems provide an alternative for traditional membrane computing.…”
Get full text
Article -
13593
Variational Approaches to Optimal Control Design for Elastic Body Motions
Published 2015-09-01“…Based on the generalized formulations, a numerical algorithm is developed to design the optimal displacement of such elastic beams. …”
Get full text
Article -
13594
Modules for Pipelined Mixed Radix FFT Processors
Published 2016-01-01“…The cores are designed by the method of spatial SDF mapping into the hardware, which provides the minimized hardware volume at the cost of slowdown of the algorithm by r times. Their clock frequency is equal to the data sampling frequency. …”
Get full text
Article -
13595
Collision and information error of topologies in clustering protocol
Published 2011-01-01“…After the analysis of the collision in the CSMA and TDMA multiple access methods,and information error of topologies information in clustering protocol,a measurement index is introduced for the information error,and several methods are given in order to improve the index.The algorithm is combined with IEEE 802.15.4 protocol,and remarkable simulation conclusions are drawn from NS2 with the analysis of the impact of communication distance and movement speed.…”
Get full text
Article -
13596
A Frame-Based Conjugate Gradients Direct Search Method with Radial Basis Function Interpolation Model
Published 2017-01-01“…In this paper, we propose a new hybrid direct search method where a frame-based PRP conjugate gradients direct search algorithm is combined with radial basis function interpolation model. …”
Get full text
Article -
13597
Approximating the Inverse of a Square Matrix with Application in Computation of the Moore-Penrose Inverse
Published 2014-01-01“…Numerical results including the comparisons with different existing methods of the same type in the literature will also be presented to manifest the superiority of the new algorithm in finding approximate inverses.…”
Get full text
Article -
13598
The Management of Ureteropelvic Junction Obstruction Presenting with Prenatal Hydronephrosis
Published 2009-01-01“…Herein, an appropriate algorithm and a review of the literature are discussed.…”
Get full text
Article -
13599
Multiobjective Optimization of Turning Cutting Parameters for J-Steel Material
Published 2016-01-01“…An alternative approach for identifying the trade-off frontier was also tested via multiobjective implementation of the Efficient Global Optimization (m-EGO) algorithm. The m-EGO algorithm was successful in identifying two points within the good range of the trade-off frontier with 36% fewer experimental samples.…”
Get full text
Article -
13600
Designing of a wide-area power system stabilizer using an exponential distribution optimizer and fuzzy controller considering time delays
Published 2025-01-01“…Abstract In this paper, explore the effectiveness of a new Wide Area Fuzzy Power System Stabilizer (WAFPSS), optimized using the Exponential Distribution Optimization (EDO) algorithm, and applied to an IEEE three-area, six-machine power system model. …”
Get full text
Article