-
14141
Numerical Approach Based on Two-Dimensional Fractional-Order Legendre Functions for Solving Fractional Differential Equations
Published 2017-01-01“…Finally, error analysis shows that the algorithm is convergent.…”
Get full text
Article -
14142
Systematic Framework for Reflectarray Synthesis Based on Phase Optimization
Published 2012-01-01“…Optimization based on the Levenberg-Marquardt algorithm is used to obtain the phase distribution of the reflection coefficients required on the reflectarray surface, in order to achieve the pattern specifications. …”
Get full text
Article -
14143
A Computational Realization of a Semi-Lagrangian Method for Solving the Advection Equation
Published 2014-01-01“…Performance of a sequential algorithm and several parallel implementations with the OpenMP and CUDA technologies in the C language has been studied.…”
Get full text
Article -
14144
A Hybrid IP/GA Approach to the Parallel Production Lines Scheduling Problem
Published 2016-01-01“…Based on them, a hybrid integer programming/genetic algorithm (IP/GA) approach is proposed to solve the problem. …”
Get full text
Article -
14145
Global Optimization for the Sum of Certain Nonlinear Functions
Published 2014-01-01“…We prove that this extension makes possible to solve the following nonconvex optimization problems which Pei-Ping and Gui-Xia, 2007, cannot solve, that the sum of the positive (or negative) first and second derivatives function with the variable defined by sum of polynomial fractional function by using branch and bound algorithm.…”
Get full text
Article -
14146
Identification technology for city freeway users based on XDR big data analysis
Published 2021-11-01“…In the scene of city freeway, the driving speed is relatively faster, the flow of people is denser, and the customers have higher requirements for communication experience.Firstly, the architecture of big data platform for mobile network quality control was introduced.Then, the identification algorithm for city freeway users based on XDR big data analysis was proposed.Finally, through XDR big data analyzing and processing, the user track on freeway was output, which followed by matching with the fingerprints database of freeways.The identification accuracy for city freeway users was improved, and wireless network quality monitoring of city freeways was supported.…”
Get full text
Article -
14147
A Modified Approach to Distributed Bregman ADMM for a Class of Nonconvex Consensus Problems
Published 2025-01-01“…Initial numerical trials have shown encouraging outcomes, suggesting notable efficiency enhancements in the refined distributed Bregman ADMM algorithm.…”
Get full text
Article -
14148
Economical heuristics for fully interval integer multi-objective fuzzy and non-fuzzy transportation problems
Published 2024-01-01“…Our results show that the proposed algorithm hugely outperforms the best solution approaches.…”
Get full text
Article -
14149
Design, Simulation, and Optimization of an Irregularly Shaped Microstrip Patch Antenna for Air-to-Ground Communications
Published 2017-01-01“…The process started with the design of a rectangular patch antenna with the traditional transmission line and cavity methods, followed by a simulation with the finite-difference time-domain method (FDTD) in conjunction with a genetic algorithm (GA). The aim of the study was to design an efficient patch antenna. …”
Get full text
Article -
14150
Research on the implementation mechanism of multipath traffic proportion of IPv6 Overlay network
Published 2018-08-01“…Based on IPv6 overlay network,two key technologies,multihoming and multipath routing were analyzed.According to logic functions,architectures of overlay nodes were presented.The mechanism of multipath traffic proportion of IPv6 overlay network was discussed on emphasis.A simplified scheme of traffic proportion according to path bandwidth was proposed,and the design and implementation of the scheme were carried out.Experimental results show that the efficiency of the algorithm of multipath traffic proportion is much higher than that of single path,and the advantage is more obvious with increasing data packets.…”
Get full text
Article -
14151
New Generalized Mixed Equilibrium Problem with Respect to Relaxed Semi-Monotone Mappings in Banach Spaces
Published 2012-01-01“…Furthermore, we also introduce a hybrid projection algorithm for finding a common element in the solution set of a generalized mixed equilibrium problem and the fixed point set of an asymptotically nonexpansive mapping. …”
Get full text
Article -
14152
Implementation of Surface Radiation and Fluid-Structure Thermal Coupling in Atmospheric Reentry
Published 2012-01-01“…A model that takes into account the radiation reflected by the surface is developed and implemented in a solid solver. A partitioned algorithm performs the coupling between the fluid and the solid thermal fields. …”
Get full text
Article -
14153
Key security detection based on dynamic binary instrumentation
Published 2017-11-01“…For the key security problem in the cryptographic software,the method of key security detection based on dynamic binary instrumentation was proposed.Aimed at CryptoAPI cryptographic software,the method firstly pointed out the potential key security vulnerabilities by analyzing the key applying patterns of CryptoAPI.Then it recorded cryptographic data information during the execution of the program dynamically using Pin platform.On this basis,a relevance vulnerability detection algorithm was designed to detect the key security.Test result indicated that it can effectively detect the two kinds of key security vulnerabilities.…”
Get full text
Article -
14154
Research on pulse width model of optical signal based on effects of combined physical impairments
Published 2012-11-01“…For the accurate assessment of physical impairments,the suppression or enhancement effect of self phase modulation (SPM) on group velocity dispersion(GVD) were analyzed.Then,a pulse width model based on their combined effects on signal distortion was proposed.This model considered the effects of combined physical impairments,and it was applied in the simulation of the impairment-aware routing and wavelength assignment(IA-RWA) algorithm.The results indicate that comprehensive consideration of the effects caused by combined physical impairments is conductive to accurately avoid more serious physical impairments during routing and reduces blocking rate.…”
Get full text
Article -
14155
A Shifted Jacobi-Gauss Collocation Scheme for Solving Fractional Neutral Functional-Differential Equations
Published 2014-01-01“…Numerical results demonstrate the accuracy, and versatility of the proposed algorithm.…”
Get full text
Article -
14156
Continuous location privacy protection mechanism based on differential privacy
Published 2021-08-01“…Aiming at the problem of users’ location privacy leakage caused by continuously using LBS, a road privacy level (RPL) algorithm was proposed based on road topological network, which divided the privacy level of the road sections around the sensitive locations.Then, a differential privacy location protection mechanism (DPLPM) was proposed.Privacy budget was allocated for sensitive road sections and Laplace noise was added to realize the privacy protection of location data.The experimental results show that the mechanism has high data availability while protecting the privacy of location information.…”
Get full text
Article -
14157
Formation Control for Unmanned Aerial Vehicles with Directed and Switching Topologies
Published 2016-01-01“…Sufficient conditions to achieve formation with directed and switching topologies are provided and an explicit expression of the formation reference function is given. Furthermore, an algorithm to design the gain matrices of the protocol is presented. …”
Get full text
Article -
14158
Nonlinear Finite-Horizon Regulation and Tracking for Systems with Incomplete State Information Using Differential State Dependent Riccati Equation
Published 2014-01-01“…This can be accomplished by the integration of the differential SDRE filter algorithm and the finite-horizon state dependent Riccati equation (SDRE) technique. …”
Get full text
Article -
14159
Septic Lateral Sinus Thrombosis: Sinus Exploration Is Unnecessary
Published 2016-01-01“…The algorithm of treatment of septic lateral sinus thrombosis (SLST) has undergone a paradigm shift with the understanding of the natural history of sigmoid sinus thrombosis. …”
Get full text
Article -
14160
Research on multi-tenant data partition mechanism for SaaS application based on shared schema
Published 2012-09-01“…In SaaS model,the multi-tenant data using shared schema partitioned in multiple nodes of the cloud environment was put forward in advance.Based on this,a data partition model and algorithm for multi-tenants to support SaaS application was proposed.Through comparsion with many data partition technology and cloud database solutions mainly for analysis application and lack of transaction support,the theoretical analysis and experimental results reveal that the proposed data partition mechanism can effectively realize the dynamic scalability of the system in cloud environment,at the same time to minimize the cost of the distributed transaction.…”
Get full text
Article