-
13941
Identification of discrete chaotic maps with singular points
Published 2001-01-01“…We show that combining a neural network with the numerical algorithm for the determination of the singular point we are able to accurately approximate discrete chaotic maps with singularities.…”
Get full text
Article -
13942
Research and practice on self-organization architecture of smart pipe in mobile internet
Published 2018-09-01“…According to the 3GPP specification,a new self-organization network of smart pipe in mobile internet was addressed.By introducing integrated policy control function,the external signals were supervised periodically,and the best optimized network strategies were predicted by the recurrent neural network algorithm,delivered by PCRF,and updated automatically with feedback of the regulations.This solution was effectively applied in scenarios such as speed limit of large traffic users,network protection under high load,and online advertisement recommendation etc.…”
Get full text
Article -
13943
On Stackelberg Leader with Min-Max Followers to Solve Fuzzy Continuous Static Games
Published 2022-01-01“…The given solution is accompanied by a parametric analysis. An algorithm for identifying the first-kind stability set is presented. …”
Get full text
Article -
13944
New dynamic load balancing method based on roulette wheel selection and its implementation
Published 2008-01-01“…A new dynamic load balancing method based on roulette wheel selection in multi-services network was pro-posed.There were two stages in the method,static resource configuration and dynamic route selection.In the first,the optimization distribution of traffic trunk on parallel LSP was obtained by offline optimization algorithm.In the second,the LSP was selected by roulette wheel selection.The simulation results show that the method is able not only to guaran-tee QoS of the services but also balance the network load dynamically.…”
Get full text
Article -
13945
Stability and Hopf bifurcation in a diffusivepredator-prey system incorporating a prey refuge
Published 2013-05-01“…Employing the center manifold theoryand normal form method, an algorithm for determining theproperties of the Hopf bifurcation is derived. …”
Get full text
Article -
13946
Application of computer vision in intelligent security
Published 2021-08-01“…The development of computer vision and deep learning technology in the field of artificial intelligence were summarized, the relationship between them was expounded, and its future development trend was proposed combining with 5G technology.The actual case of face capture in a community was analyzed, and the application of computer vision technology in the intelligent security industry of urban governance was focused on, including process design, business logic and algorithm principle, hoping to provide reasonable suggestions and new ideas for experts and scholars in related fields.…”
Get full text
Article -
13947
RAP detection method based on AP fingerprint
Published 2018-05-01“…The access point (AP) is an integral part of the infrastructure mode in wireless network.While the attacks caused by rogue AP (RAP) divulge a lot of users' privates in a large extent,such as the user's location information,surfing behavior on the Internet and social relations.A RAP detection algorithm based on AP fingerprint was proposed.The validity of AP was judged by the unforgeability and stability of the parameters of beacon frames.And the feasibility and effectiveness of the proposed method were further verified by scheme comparisons and experimental analysis.…”
Get full text
Article -
13948
Second-Order Multiplier Iteration Based on a Class of Nonlinear Lagrangians
Published 2014-01-01“…Nonlinear Lagrangian algorithm plays an important role in solving constrained optimization problems. …”
Get full text
Article -
13949
A Hybrid Extragradient-Like Method for Variational Inequalities, Equilibrium Problems, and an Infinitely Family of Strictly Pseudocontractive Mappings
Published 2012-01-01“…Then, we obtain a strong convergence theorem of the iterative sequence generated by the proposed iterative algorithm. Our results extend and improve the results of Issara Inchan (2010) and many others.…”
Get full text
Article -
13950
The scheme of shaping back surface of five-sided carbide inserts on CNC machines
Published 2023-02-01“…The process of shaping the rear surface of a five-sided carbide insert is modeled. An algorithm for the implementation of the kinematic scheme for shaping the rear surface of pentahedral carbide plates using CAD tools has been developed. …”
Get full text
Article -
13951
The Control Data Method: A New Method of Modeling in Population Dynamics
Published 2013-01-01“…Using a the approximation property and the machine learning approach of artificial neural networks, a tuning algorithm of unknown parameters is obtained and the factual data of predator-prey can be asymptotically stabilized using a neural network controller. …”
Get full text
Article -
13952
Expeditious Calculations of Electric Power Losses in 0.38–10 kV Electric Networks of Belarusian United Energy Systems
Published 2013-10-01“…An algorithmized methodology for expeditious calculations of technical losses in 0.38–10 kV electric networks of the Belarusian United Energy Systems has been developed on the basis of performance information which is formed by modern intellectual devices for registration and accumulation of data. …”
Get full text
Article -
13953
A Novel Homotopy Perturbation Method with Applications to Nonlinear Fractional Order KdV and Burger Equation with Exponential-Decay Kernel
Published 2021-01-01“…We provide formulae for the Yang transform of Caputo-Fabrizio fractional order derivatives. We derive an algorithm for the solution of Caputo-Fabrizio (CF) fractional order partial differential equation in series form and show its convergence to the exact solution. …”
Get full text
Article -
13954
Design and development of advanced spatio temporal database models
Published 2024-09-01“…The strategy used decouples the motion planning problem into small tractable problems, which are solved using know path planning algorithm.…”
Get full text
Article -
13955
Computational Tools for Cohomology of Toric Varieties
Published 2011-01-01“…After an introduction of the basic definitions and properties of toric geometry, we discuss a specific computational algorithm for the determination of the dimension of line-bundle-valued cohomology groups on toric varieties. …”
Get full text
Article -
13956
Research on Big Data Application for Security
Published 2015-07-01“…Several data sources of big data on security were described,a closer look was taken at the implementation of big data platform on security,the main points and steps during the implementation were also proposed.Specially,detail analysis on the overall architecture and system structure of the big data platform on security were provided,the relationship with the existing video surveillance platform was also described.The implementation of big data platform on security must be promoted on the scale of data characteristics and algorithm maturity.…”
Get full text
Article -
13957
Application of Circuit Model for Photovoltaic Energy Conversion System
Published 2012-01-01“…The developed model is integrated with DC-DC boost converter with closed-loop control of maximum power point tracking (MPPT) algorithm. Simulation results are validated with the experimental setup.…”
Get full text
Article -
13958
Cognitive radio frequency sense solution based on tracing location
Published 2010-01-01“…A frequency sense solution based on the double-station cooperation and multi-hop tracing localization was presented for resolving the hidden and exposed problems in the dynamic spectrum resource management so as to improve reliability and efficiency of the frequency sense and increase the utilization of spectrum.In this scheme,the secondary user could detect primary user’s existing by an improved centroid localization algorithm cooperated with a known position user.The detailed steps were proposed,the simulation results were discussed and the performance of the tracing localization was analyzed.…”
Get full text
Article -
13959
Formation of Temperature Mode in Internal Spaces of Armored Machinery
Published 2010-02-01“…An algorithm and a program have been developed for calculation of temperature mode in a T-72 tank tower while using numerical methods. …”
Get full text
Article -
13960
Actuator Fault Diagnosis in a Boeing 747 Model via Adaptive Modified Two-Stage Kalman Filter
Published 2014-01-01“…An adaptive modified two-stage linear Kalman filtering algorithm is utilized to identify the loss of control effectiveness and the magnitude of low degree of stuck faults in a closed-loop nonlinear B747 aircraft. …”
Get full text
Article