Showing 13,941 - 13,960 results of 19,511 for search '"algorithms"', query time: 0.12s Refine Results
  1. 13941

    Identification of discrete chaotic maps with singular points by P. G. Akishin, P. Akritas, I. Antoniou, V. V. Ivanov

    Published 2001-01-01
    “…We show that combining a neural network with the numerical algorithm for the determination of the singular point we are able to accurately approximate discrete chaotic maps with singularities.…”
    Get full text
    Article
  2. 13942

    Research and practice on self-organization architecture of smart pipe in mobile internet by Fei XUE, Yuhui XU, Liang ZHANG, Ying LI

    Published 2018-09-01
    “…According to the 3GPP specification,a new self-organization network of smart pipe in mobile internet was addressed.By introducing integrated policy control function,the external signals were supervised periodically,and the best optimized network strategies were predicted by the recurrent neural network algorithm,delivered by PCRF,and updated automatically with feedback of the regulations.This solution was effectively applied in scenarios such as speed limit of large traffic users,network protection under high load,and online advertisement recommendation etc.…”
    Get full text
    Article
  3. 13943

    On Stackelberg Leader with Min-Max Followers to Solve Fuzzy Continuous Static Games by Hamiden Abd El Wahed Khalifa, Dragan Pamucar, Alhanouf Alburaikan, W. A. Afifi

    Published 2022-01-01
    “…The given solution is accompanied by a parametric analysis. An algorithm for identifying the first-kind stability set is presented. …”
    Get full text
    Article
  4. 13944

    New dynamic load balancing method based on roulette wheel selection and its implementation by ZOU Yuan-ping1, LIU Hong-lin2

    Published 2008-01-01
    “…A new dynamic load balancing method based on roulette wheel selection in multi-services network was pro-posed.There were two stages in the method,static resource configuration and dynamic route selection.In the first,the optimization distribution of traffic trunk on parallel LSP was obtained by offline optimization algorithm.In the second,the LSP was selected by roulette wheel selection.The simulation results show that the method is able not only to guaran-tee QoS of the services but also balance the network load dynamically.…”
    Get full text
    Article
  5. 13945

    Stability and Hopf bifurcation in a diffusivepredator-prey system incorporating a prey refuge by Xiaoyuan Chang, Junjie Wei

    Published 2013-05-01
    “…Employing the center manifold theoryand normal form method, an algorithm for determining theproperties of the Hopf bifurcation is derived. …”
    Get full text
    Article
  6. 13946

    Application of computer vision in intelligent security by Zhihong CHEN, Mingxiao WANG

    Published 2021-08-01
    “…The development of computer vision and deep learning technology in the field of artificial intelligence were summarized, the relationship between them was expounded, and its future development trend was proposed combining with 5G technology.The actual case of face capture in a community was analyzed, and the application of computer vision technology in the intelligent security industry of urban governance was focused on, including process design, business logic and algorithm principle, hoping to provide reasonable suggestions and new ideas for experts and scholars in related fields.…”
    Get full text
    Article
  7. 13947

    RAP detection method based on AP fingerprint by Qing LI, Ayong YE, Zhiqiang YAO, Aimin CHEN

    Published 2018-05-01
    “…The access point (AP) is an integral part of the infrastructure mode in wireless network.While the attacks caused by rogue AP (RAP) divulge a lot of users' privates in a large extent,such as the user's location information,surfing behavior on the Internet and social relations.A RAP detection algorithm based on AP fingerprint was proposed.The validity of AP was judged by the unforgeability and stability of the parameters of beacon frames.And the feasibility and effectiveness of the proposed method were further verified by scheme comparisons and experimental analysis.…”
    Get full text
    Article
  8. 13948

    Second-Order Multiplier Iteration Based on a Class of Nonlinear Lagrangians by Yong-Hong Ren

    Published 2014-01-01
    “…Nonlinear Lagrangian algorithm plays an important role in solving constrained optimization problems. …”
    Get full text
    Article
  9. 13949

    A Hybrid Extragradient-Like Method for Variational Inequalities, Equilibrium Problems, and an Infinitely Family of Strictly Pseudocontractive Mappings by Yaqin Wang, Hongkun Xu, Xiaoli Fang

    Published 2012-01-01
    “…Then, we obtain a strong convergence theorem of the iterative sequence generated by the proposed iterative algorithm. Our results extend and improve the results of Issara Inchan (2010) and many others.…”
    Get full text
    Article
  10. 13950

    The scheme of shaping back surface of five-sided carbide inserts on CNC machines by E. V. Vasily’ev, Yu. A. Blokhina, M. M. Lakman

    Published 2023-02-01
    “…The process of shaping the rear surface of a five-sided carbide insert is modeled. An algorithm for the implementation of the kinematic scheme for shaping the rear surface of pentahedral carbide plates using CAD tools has been developed. …”
    Get full text
    Article
  11. 13951

    The Control Data Method: A New Method of Modeling in Population Dynamics by Lin-Fei Nie, Zhi-Dong Teng

    Published 2013-01-01
    “…Using a the approximation property and the machine learning approach of artificial neural networks, a tuning algorithm of unknown parameters is obtained and the factual data of predator-prey can be asymptotically stabilized using a neural network controller. …”
    Get full text
    Article
  12. 13952

    Expeditious Calculations of Electric Power Losses in 0.38–10 kV Electric Networks of Belarusian United Energy Systems by M. I. Fursanov, V. V. Makarevich

    Published 2013-10-01
    “…An algorithmized methodology for expedi­tious calculations of technical losses in 0.38–10 kV electric networks of the Belarusian United Energy Systems has been developed on the basis of performance information which is formed by modern intellectual devices for registration and accumulation of data. …”
    Get full text
    Article
  13. 13953

    A Novel Homotopy Perturbation Method with Applications to Nonlinear Fractional Order KdV and Burger Equation with Exponential-Decay Kernel by Shabir Ahmad, Aman Ullah, Ali Akgül, Manuel De la Sen

    Published 2021-01-01
    “…We provide formulae for the Yang transform of Caputo-Fabrizio fractional order derivatives. We derive an algorithm for the solution of Caputo-Fabrizio (CF) fractional order partial differential equation in series form and show its convergence to the exact solution. …”
    Get full text
    Article
  14. 13954

    Design and development of advanced spatio temporal database models by Garima Jolly, Sunita Bhatti

    Published 2024-09-01
    “…The strategy used decouples the motion planning problem into small tractable problems, which are solved using know path planning algorithm.…”
    Get full text
    Article
  15. 13955

    Computational Tools for Cohomology of Toric Varieties by Ralph Blumenhagen, Benjamin Jurke, Thorsten Rahn

    Published 2011-01-01
    “…After an introduction of the basic definitions and properties of toric geometry, we discuss a specific computational algorithm for the determination of the dimension of line-bundle-valued cohomology groups on toric varieties. …”
    Get full text
    Article
  16. 13956

    Research on Big Data Application for Security by Deli Yang, Tao Zhang

    Published 2015-07-01
    “…Several data sources of big data on security were described,a closer look was taken at the implementation of big data platform on security,the main points and steps during the implementation were also proposed.Specially,detail analysis on the overall architecture and system structure of the big data platform on security were provided,the relationship with the existing video surveillance platform was also described.The implementation of big data platform on security must be promoted on the scale of data characteristics and algorithm maturity.…”
    Get full text
    Article
  17. 13957

    Application of Circuit Model for Photovoltaic Energy Conversion System by Natarajan Pandiarajan, Ramabadran Ramaprabha, Ranganath Muthu

    Published 2012-01-01
    “…The developed model is integrated with DC-DC boost converter with closed-loop control of maximum power point tracking (MPPT) algorithm. Simulation results are validated with the experimental setup.…”
    Get full text
    Article
  18. 13958

    Cognitive radio frequency sense solution based on tracing location by WANG Yi-ming, ZHOU Liu-lei

    Published 2010-01-01
    “…A frequency sense solution based on the double-station cooperation and multi-hop tracing localization was presented for resolving the hidden and exposed problems in the dynamic spectrum resource management so as to improve reliability and efficiency of the frequency sense and increase the utilization of spectrum.In this scheme,the secondary user could detect primary user’s existing by an improved centroid localization algorithm cooperated with a known position user.The detailed steps were proposed,the simulation results were discussed and the performance of the tracing localization was analyzed.…”
    Get full text
    Article
  19. 13959

    Formation of Temperature Mode in Internal Spaces of Armored Machinery by P. I. Dziachek, A. S. Mezentsev

    Published 2010-02-01
    “…An algorithm and a program  have been developed for calculation of temperature mode in a T-72 tank tower while using numerical methods. …”
    Get full text
    Article
  20. 13960

    Actuator Fault Diagnosis in a Boeing 747 Model via Adaptive Modified Two-Stage Kalman Filter by Fikret Caliskan, Youmin Zhang, N. Eva Wu, Jong-Yeob Shin

    Published 2014-01-01
    “…An adaptive modified two-stage linear Kalman filtering algorithm is utilized to identify the loss of control effectiveness and the magnitude of low degree of stuck faults in a closed-loop nonlinear B747 aircraft. …”
    Get full text
    Article