Showing 13,901 - 13,920 results of 19,511 for search '"algorithms"', query time: 0.09s Refine Results
  1. 13901

    The Multistage Homotopy Perturbation Method for Solving Chaotic and Hyperchaotic Lü System by M. S. H. Chowdhury, Nur Isnida Razali, Waqar Asrar, M. M. Rahman

    Published 2015-01-01
    “…MHPM is a technique adapted from the standard homotopy-perturbation method (HPM) where the HPM is treated as an algorithm in a sequence of time intervals. To ensure the precision of the technique applied in this work, the results are compared with a fourth-order Runge-Kutta method and the standard HPM. …”
    Get full text
    Article
  2. 13902

    Structure Optimization and Test of the Tapered Roller Bearing based on the Decrease of Friction Torque by Mo Yimin, Wang Junping, Chai Shufeng

    Published 2015-01-01
    “…With the target of reducing the friction torque of tapered roller bearing,the globally optimal solution of bearing inner structural parameters is obtained by using the genetic algorithm.The friction torque,gearbox transmission efficiency,and vehicle fuel consumption and sliding distance are tested before and after the bearings are optimized.The results show that,the bearing friction torque is reduced,the gearbox transmission efficiency is increased,and the vehicle fuel consumption is slightly decreased while the vehicle sliding distance is highly improved.…”
    Get full text
    Article
  3. 13903

    Novel blind recognition method for self-synchronized scrambler by Hong-shu LIAO, Ye YUAN, Lu GAN

    Published 2013-01-01
    “…In non-cooperative communication systems,an adversary has to blindly estimate the coding parameters of scrambler from intercepted sequence.On the condition biased information source,a new method was proposed which can blindly recover the generating polynomial of self-synchronized scrambler.This method was based on the corrected squared Euclidean distance which was used to measure the distance between the actual stat ical probability and the uniform distribution.The simulation results verify the theory analysis and the validity of the algorithm.…”
    Get full text
    Article
  4. 13904

    Safe hierarchical virtual network mapping method based on clustering by Xie LU, Lei XU, Manjun ZHANG

    Published 2021-09-01
    “…Based on the 5G network environment, a security hierarchical virtual network mapping method based on K-means clustering was proposed.In particular, the idea of node security classification and the combination of K-menas clustering algorithm was involved to solve the key problems of low security and low mapping efficiency existing in current virtual network mapping.Compared with traditional methods, this research method improves the efficiency of virtual node mapping and enhances the network resilience.…”
    Get full text
    Article
  5. 13905

    A Discrete Method Based on the CE-SE Formulation for the Fractional Advection-Dispersion Equation by Silvia Jerez, Ivan Dzib

    Published 2015-01-01
    “…We obtain a numerical algorithm by using the space-time conservation element and solution element (CE-SE) method for the fractional advection-dispersion equation. …”
    Get full text
    Article
  6. 13906

    Trusted network connect control based on terminal behavior by LIU Wei-wei1, HAN Zhen2, SHEN Chang-xiang3

    Published 2009-01-01
    “…Under the framework of TNC,a new method was proposed to calculate the "healthy status" of a terminal based on analyzing the real-time characteristics of its behavior and process activity.Compared with the existing method,which based on static characteristics,the strategy could get a better performance,especially,on identifying and isolating the terminals with potential risk.The experimental result also shows that the proposed algorithm has the capability of finding and isolating terminals which are infected by malicious codes.…”
    Get full text
    Article
  7. 13907

    Decrease in errors at solution of problems of heat conductivity by finite element method by S. V. Fedorov

    Published 2018-09-01
    “…Comparison with the analytical decision is made. The algorithm of the choice of a step in the automatic mode is offered. …”
    Get full text
    Article
  8. 13908

    Synthesis of Multicriteria Controller by Means of Fuzzy Logic Approach by Andrew Lozynskyy, Lyubomyr Demkiv

    Published 2014-01-01
    “…To find optimal values of membership function’s parameters, genetic algorithm is used. To take into account values of both output and intermediate parameters of the system, a penalty function is considered. …”
    Get full text
    Article
  9. 13909

    CLOSED-LOOP CONTROL OF OXYGEN-CONVERTER MELTING by V. S. Bogushevsky, S. V. Zhuk, S. G. Melnik, E. N. Zubova

    Published 2013-09-01
    “…The model takes into account the kinetics of the process of removing carbon from the melt in the foreign – and intradiffusion limiting process of decarburization. The algorithm of the model is implemented in an automated process control system of converter smelting. …”
    Get full text
    Article
  10. 13910

    The contemporary echocardiography approach to diagnosis of pulmonary hypertension and non-invasive estimation of pulmonary artery pressure by M.Yu. Kolesnyk

    Published 2018-06-01
    “…The review presents the contemporary possibilities of echocardiography in the diagnosis of pulmonary hypertension. The algorithm used to determine probability of the pulmonary hypertension by means of echocardiography based on 2015 ESC guidelines is presented. …”
    Get full text
    Article
  11. 13911

    Features of the Calculated Determination of the Thermal State of the Turbo Generator Brush-Contact Device by Anton Ye. Kovryha

    Published 2024-12-01
    “…The author provides an algorithm for analytical calculation of the device, determines the expected temperatures of the elements provided that additional filters are installed in the ventilation duct. …”
    Article
  12. 13912

    Forward/Backward Decomposition for Dispersive Wave Propagation Measurements by Nicholas A. Corbin, Pablo Tarazaga

    Published 2025-01-01
    “…The theory is presented, along with algorithmic implementation and experimental validation on a Timoshenko beam. …”
    Get full text
    Article
  13. 13913

    Research on Application of Regression Least Squares Support Vector Machine on Performance Prediction of Hydraulic Excavator by Zhan-bo Chen

    Published 2014-01-01
    “…First, the mathematical model of the regression least squares support vector machine is studied, and then the algorithm of the regression least squares support vector machine is designed. …”
    Get full text
    Article
  14. 13914

    A Polarity Reversion Elimination Method for LTE-Advanced Frequency Offset Estimation by Guoqing Jia, Shanji Chen, Chao Chen, Xiaohong Ji, Weidong Fang

    Published 2015-08-01
    “…Traditional fractional frequency offset(FFO)estimation algorithm pay less attention to FFO polarity estimation.Noise and channel fading induced FFO estimation polarity reversion degrades the frequency synchronization performance inevitably.An efficient FFO polarity detection method was proposed in LTE-Advanced system to solve the problem,which utilized the mirror symmetry property of time-domain primary synchronization signal(PSS).Numerical results show that the proposed method can depress FFO polarity reversion efficiently.…”
    Get full text
    Article
  15. 13915

    Application of invariant moment method for HAPS ISAR imaging with micro parts by Zhao-qun QI, Xiao-jun JING, Si-qing YOU, Hai-bin SUN

    Published 2013-08-01
    “…To resolve the micromotion in the HAPS(high altitude platform station) ISAR system,the invariant moment method for ISAR imaging with micro parts was proposed.Firstly,invariant moment tool was applied to classify the echoes of different sub-aperture,and then the sub-aperture echoes reducing the quality of image was separated.Finally the remaining echoes were used to do sub-aperture splicing imaging.From the simulation results,the algorithm is proved to be simple and can improve the quality of ISAR image obviously.…”
    Get full text
    Article
  16. 13916

    Research on Lung Nodule Detection Based on Improved Target Detection Network by Ye Li, Qian Wu, Hongwei Sun, Xuewei Wang

    Published 2020-01-01
    “…The experimental results prove that proposed algorithm is extremely effective.…”
    Get full text
    Article
  17. 13917

    Wu’s Characteristic Set Method for SystemVerilog Assertions Verification by Xinyan Gao, Ning Zhou, Jinzhao Wu, Dakui Li

    Published 2013-01-01
    “…We define a suitable subset of SVAs so that an efficient polynomial modeling mechanism for both circuit descriptions and assertions can be applied. We present an algorithm framework based on the algebraic representations using characteristic set of polynomial system. …”
    Get full text
    Article
  18. 13918

    Comment on ‘Targeted Ciphers for Format‐Preserving Encryption’ from Selected Areas in Cryptography 2018 by Dachao Wang, Baocang Wang, Yuan Ping

    Published 2021-09-01
    “…The second scheme was designed with an algorithm called Mix–Swap–Unmix that is shown to be equivalent to a particular matching exchange process under a specific setting. …”
    Get full text
    Article
  19. 13919

    Optimization for Due-Window Assignment Scheduling with Position-Dependent Weights by Li-Yan Wang, Dan-Yang Lv, Bo Zhang, Wei-Wei Liu, Ji-Bo Wang

    Published 2020-01-01
    “…Optimal properties of the problem are given, and then, a polynomial-time algorithm is provided to solve the problem. An extension to the problem is offered by assuming general position-dependent processing time.…”
    Get full text
    Article
  20. 13920

    Simple power analysis attack on random pseudo operations by Min WANG, Zhen WU

    Published 2012-05-01
    “…Random pseudo-operations on elliptic curve scalar multiplication algorithm,less secure than it claimed by simple power analysis (SPA)attacks.Even in the single curve SPA,it leaks lots of useful key information.Multiple curve recursive approximation attack(MCRAA),a new multiple curve SPA attack,was proposed to get all of the key information with a small curve set.When the length of the key is n,the size of the set is O(lbn) which was confirmed by experiment.…”
    Get full text
    Article