Showing 14,161 - 14,180 results of 19,511 for search '"algorithms"', query time: 0.08s Refine Results
  1. 14161

    Voronoi acoustic source localization mechanism based on counter captured time difference by Na XIA, Cheng-chun NI, Chao-nong XU, Sheng DING, Rong ZHENG

    Published 2013-11-01
    “…In the stage of computing the acoustic source position with the time difference data, Voronoi diagram was introduced to reduce the searching space to improve the success percentage and convergence speed of the algorithm. Both the theoretical analysis and experiment results demonstrate that this acoustic localization mechanism is energy efficient, in real-time and robust in localization computing. …”
    Get full text
    Article
  2. 14162

    Power Splitting Characteristic of Star Gearing based on Deformation Compatibility by Sun Zhenyu, Feng Jin, Du Jinfu

    Published 2016-01-01
    “…The deformation compatibility equations and the torque balance equations of a star gearing with three branches are estabished based on the characteristic that the system composes a closed-loop of power flow.In consideration of the parts manufacturing errors,assembly errors,bearing stiffness and float,the power splitting coefficient of each star gear and the system are calculated by using the theory of equivalent mesh error.The relation between the errors,float and the bearing stiffness and power splitting are analyzed from the perspective of statics,and comparing with planetary transmission.A new algorithm is proposed,the reference for the engineering application is provided.…”
    Get full text
    Article
  3. 14163

    Study on the Meshing Force and Meshing Rigidity of Cylinder Sine Oscillation Tooth Transmission by Zeng Yunyun, Yuan Xinmei, Zhou Sizhu

    Published 2015-01-01
    “…Based on the hypothesis of stretch small distortion and distortion congruity,the model and algorithm of meshing force analysis under theoretical conditions are given.According to the Hertz theory and geometric relation of meshing pair,the meshing rigidity models of the meshing pair are established,and the calculation formulas of the meshing rigidity and the principal curvature of the contact point are deduced.The presented methods is illustrated through an example,and the distributing characteristic of meshing forces,sum of principal curvature and meshing rigidity of this type of transmission device is acquired.The acquired result can be adopted as the analytical base for structure design,vibration analysis.…”
    Get full text
    Article
  4. 14164

    Selecting Negative Samples for PPI Prediction Using Hierarchical Clustering Methodology by J. M. Urquiza, I. Rojas, H. Pomares, J. Herrera, J. P. Florido, O. Valenzuela

    Published 2012-01-01
    “…In the present work, a new approach is proposed to construct a PPI predictor training a support vector machine model through a mutual information filter-wrapper parallel feature selection algorithm and an iterative and hierarchical clustering to select a relevance negative training set. …”
    Get full text
    Article
  5. 14165

    Exact Probabilities and Confidence Limits for Binomial Samples: Applied to the Difference between Two Proportions by Lorentz Jäntschi, Sorana D. Bolboacă

    Published 2010-01-01
    “…An exact probabilities method is proposed for computing the confidence limits of medical binomial parameters obtained based on the 2×2 contingency table. The developed algorithm was described and assessed for the difference between two binomial proportions (a bidimensional parameter). …”
    Get full text
    Article
  6. 14166

    Efficiency identity-based threshold group signature scheme by LIU Hong-wei 1, 2, XIE Wei-xin 2, YU Jian-ping 2

    Published 2009-01-01
    “…Threshold group signature was used to guarantee the security of the collective decision.To improve the efficiency,a new identity-based cryptography threshold group signature scheme was proposed basing on bilinear pairing and secret sharing.In this scheme,the master key was distributed into the whole group and the user’s signature key was stored in a threshold way,these methods ensured the whole security of signature systems.The scheme with a identity-based t-out-of-n secret sharing algorithm was highly-efficient.The careful analysis and the comparison of computational efficiency show that this scheme is secure and efficient.…”
    Get full text
    Article
  7. 14167

    Research on mapping method of logical carrying network across multiple domains by Min ZHANG, Chun-ming WU, Bin WANG, Ming JIANG

    Published 2012-08-01
    “…In order to solve the mapping problem of logical carrying network across multiple domains,a hierarchical linear program model was presented,which aims to minimize the cost of mapping.Based on this model,a mapping algorithm for logical carrying network across multiple domains was designed using primal decomposition and subgradient optimization technique.The correctness of this method was proved by theoretical analysis,and the validity of the proposed method was assessed by a collection of numerical simulation experiments through the performance of convergence and runtime,as well as mapping request acceptance ratio and revenue in a dynamical network environment.…”
    Get full text
    Article
  8. 14168

    Investigation of combustion patterns in furnace type chemical reactor with non-stoichiometric combustion of fuel in the Ansys CFX software package by P. A. Batrakov, D. G. Mumladze

    Published 2018-09-01
    “…The paper presents the computational model, the initial conditions, and describes the calculation algorithm and the formation of the diffusion scheme. …”
    Get full text
    Article
  9. 14169

    Sector determination for SVPWM based four‐switch three‐phase VSI by O.C. Kivanc, S.B. Ozturk

    Published 2017-03-01
    “…Simulation and experimental results show the feasibility and effectiveness of the proposed SVPWM algorithm for FSTP inverter.…”
    Get full text
    Article
  10. 14170

    Solovay–Kitaev Approximations of Special Orthogonal Matrices by Anuradha Mahasinghe, Sachiththa Bandaranayake, Kaushika De Silva

    Published 2020-01-01
    “…We further develop a version of the Solovay–Kitaev algorithm and discuss the computational experience.…”
    Get full text
    Article
  11. 14171

    Flight Path Reconstruction and Parameter Estimation Using Output-Error Method by Benedito Carlos de Oliveira Maciel, Luiz Carlos Sandoval Góes, Elder Moreira Hemerly, Nei Salis Brasil Neto

    Published 2006-01-01
    “…This work describes the application of the output-error method using the Levenberg-Marquardt optimization algorithm to the Flight Path Reconstruction (FPR) problem, which constitutes an important preliminary step towards the aircraft parameter identification. …”
    Get full text
    Article
  12. 14172

    Short path first overlay building by WU Guo-fu, HAN Gang, DOU Wen-hua

    Published 2010-01-01
    “…Shorter path first strategy to build topology matching overlay was presented.First,passive landmark based network distance prediction method was presented,and the network distance between peers could be predicted correctly with low overload and deployment cost.Then,table based diagonal space-filling curve map algorithm was presented,which could accelerate topology information selection.Finally,the process of building overlay using shorter path firs(SPF) strategy was described in detail.Experiment results shown that the SPF overlay can improve the topology matching remarkably.…”
    Get full text
    Article
  13. 14173

    Research on Soil Cutting with a Flat Cutter Using a Simulation Model by Asset Altynbayev, Alexandr Ganyukov

    Published 2025-01-01
    “…The research aims to develop an algorithm for modelling the process of cutting an infinite volume of soil with a flat cutter in the Abaqus software package. …”
    Get full text
    Article
  14. 14174

    The Laboratory Diagnosis of Lyme Borreliosis: Guidelines from the Canadian Public Health Laboratory Network by Canadian Public Health Laboratory Network

    Published 2007-01-01
    “…Unless patients are carefully selected and an appropriately sensitive and specific testing algorithm is applied, large numbers of patients without Lyme borreliosis will be incorrectly diagnosed. …”
    Get full text
    Article
  15. 14175
  16. 14176

    Bit error rate performance analysis of TCM-8PSK system based on band-limited nonlinear satellite channel by LI Jing1, LIU Zhen-fang3, LI Ai-hong2, SHEN Rong-jun2

    Published 2006-01-01
    “…The performance of error probability for TCM-8PSK over the band-limited nonlinear satellite channel was de-rived firstly.Then,the dynamic simulation tool—— Simulink included in Matlab was used to simulate and verify the derivation result and the optimal working point for QPSK and TCM-8PSK were found under the condition of Saleh nonlinear model.Finally,the equalization algorithm used to improve the effects of nonlinear distortion was presented and at the same time the performance was simulated.The results of derivation and simulation show that it is necessary to study of TCM-8PSK for nonlinear satellite channel.…”
    Get full text
    Article
  17. 14177

    Certificateless generalized signcryption scheme in the standard model by Shu-fen NIU, Ling NIU, Cai-fen WANG, Ya-hong LI

    Published 2017-04-01
    “…In 2010,Liu,et al.proposed a certificateless signcryption scheme in the standard model,but many analyses revealed that Liu's scheme was insecure in fact.To overcome the disadvantages,the scheme was improved and a certificateless generalized signcryption scheme was constructed.In addition,a formal security model for the proposed scheme against the malicious-but-passive KGC attacks was introduced.Furthermore,the proposed scheme was proven to be secure under the decisional bilinear Diffie-Hellman and the computational Diffie-Hellman intractability assumptions in the standard model.Numerical results illustrate that the proposed algorithm is efficient.…”
    Get full text
    Article
  18. 14178

    Identifying the Effective Factors on Neuropathic Diseases in Patients with Chronic pain Using Deep Neural Networks by Mobin Shaterian, Mohammad Teshnehlab

    Published 2020-09-01
    “…By using the deep neural network and the nearest neighbor and the genetic algorithm and the auto encoder, the list of features was obtained with a precision measurement of 75 percentage. …”
    Get full text
    Article
  19. 14179

    Structural Damage Detection Based on Modal Parameters Using Continuous Ant Colony Optimization by Aditi Majumdar, Bharadwaj Nanda, Dipak Kumar Maiti, Damodar Maity

    Published 2014-01-01
    “…An inverse problem is formulated to minimize the objective function, defined in terms of discrepancy between the vibration data identified by modal testing and those computed from analytical model, which then solved to locate and assess the structural damage using continuous ant colony optimization algorithm. The damage is formulated as stiffness reduction factor. …”
    Get full text
    Article
  20. 14180

    Visual tracking using interactive factorial hidden Markov models by Jin Wook Paeng, Junseok Kwon

    Published 2021-08-01
    “…Abstract The authors present a novel tracking algorithm based on a factorial hidden Markov model (FHMM) that can utilise the structured information of a target. …”
    Get full text
    Article