-
14221
Stable enclosure based hybrid routing schema in heterogeneous wireless networks
Published 2012-09-01“…The model of heterogeneous wireless networks was analyzed and a hybrid routing schema based on MANET stable enclosure was proposed.This schema could transform the routing protocol between MANET and DTN based on the local topology in real time.In the stable enclosure,AODV was used to improve packet relaying efficiency.When packet relayed to the disconnected area,the routing protocol transcended to Prophet to avoid routing failed.It fully used the advantage of MANET and DTN routing protocol.The feasibility of the proposed algorithm is demonstrated,and it is more efficient than the other DTN routing protocols used in the heterogeneous wireless networks.…”
Get full text
Article -
14222
Merkel Cell Carcinoma: Interdisciplinary Management of a Rare Disease
Published 2013-01-01“…This paper presents an algorithm for contemporary management for the rare and aggressive Merkel cell carcinoma. …”
Get full text
Article -
14223
A New Implementable Prediction-Correction Method for Monotone Variational Inequalities with Separable Structure
Published 2013-01-01“…At each iteration, the algorithm also allows the involved subvariational inequalities to be solved in parallel. …”
Get full text
Article -
14224
An Analysis of the Cluster-Detecting Property of the BCM Neuron
Published 2024-01-01“…While the focus of this work is not to develop a robust state-of-the-art clustering method, we also analyze and discuss the performance of a resulting preliminary clustering algorithm.…”
Get full text
Article -
14225
KINEMATICS CHARACTERISTICS AND MODELING METHOD OF GANTRY PARALLEL STRUCTURE
Published 2015-01-01“…Based on this,the optimization algorithm was proposed to obtain the optimal control parameters for parallel structure,and the method can greatly improve the quick response of the parallel structure.…”
Get full text
Article -
14226
Passive Infrared Sensing Using Plasmonic Resonant Dust Particles
Published 2012-01-01“…Here, we present a computational design algorithm along with experimental results that validate the design methodology.…”
Get full text
Article -
14227
Cross-domain service chain mapping mechanism based on Q-learning
Published 2018-12-01“…On this basis, an effective mapping framework was built and the cross-domain mapping problem was modeled as an ILP with the purpose of minimizing mapping cost. A partitioning algorithm was designed to solve the problem based on Q-learning mechanism under this framework. …”
Get full text
Article -
14228
Reconfigurable Antenna Arrays with Multiple Requirements: A Versatile 3D Approach
Published 2017-01-01“…This paper proposes a deterministic method for the 3D synthesis of antenna arrays that jointly accounts for far-field pattern reconfigurability, polarization setting, dynamic range ratio reduction, and near-field control. The conceived algorithm, which generalizes some existing solutions, relies on a weighted cost function, whose iterative minimization is accomplished by properly derived closed-form expressions. …”
Get full text
Article -
14229
An Iterative Method for Solving Split Monotone Variational Inclusion Problems and Finite Family of Variational Inequality Problems in Hilbert Spaces
Published 2021-01-01“…The purpose of this paper is to study the convergence analysis of an intermixed algorithm for finding the common element of the set of solutions of split monotone variational inclusion problem (SMIV) and the set of a finite family of variational inequality problems. …”
Get full text
Article -
14230
On the Computation of the Efficient Frontier of the Portfolio Selection Problem
Published 2012-01-01“…Computational results are provided to test the efficiency of the algorithm and to illustrate its applications. The procedure has been implemented in Mathematica.…”
Get full text
Article -
14231
Defense strategies selection based on attack-defense evolutionary game model
Published 2017-01-01“…Due to that the current network security researches based on game theory mostly use the completely rationality assumption,which is not consistent with the facts.Under the bounded rationality constraint of network attack-defense,attack-defense evolutionary game model and a method to solve evolutionary stable equilibrium based on the non-cooperative evolutionary game theory was proposed.The optimal defense strategy selection algorithm was designed based on the analysis of the evolutionary stable strategy.The effectiveness of the model and method proposed is verified by simulation results,through which some evolution conclusions of offensive behavior on the premise of limited rationality were drawn.…”
Get full text
Article -
14232
Sparsity-Based Robust Bistatic MIMO Radar Imaging in the Presence of Array Errors
Published 2020-01-01“…The impact of multiplicative array gain-phase errors is changed to be additive through model reformulation, and transmit-receive angle imaging is formulated to a sparse total least square signal problem. Then, an iterative algorithm is proposed to solve the optimization problem. …”
Get full text
Article -
14233
Method to generate attack graphs for assessing the overall security of networks
Published 2009-01-01“…In order to evaluate the overall security of networks, a new method for generating attack graphs was proposed.The method used breadth-first algorithm to search the dependence of network vulnerabilities.To solve the state explosion problem, the strategies that limited the number of attack steps and the reachability of state nodes were adopted in gener-ating attack graphs.The experimental results show that the generated attack graphs can help security administrators to evaluate the overall security of networks, and the adopted optimization strategies are effective to remove redundant edges and nodes in attack graphs and decrease the system overhead during generating attack graphs.…”
Get full text
Article -
14234
LINGUISTIC ANALYSIS FOR THE BELARUSIAN CORPUS WITH THE APPLICATION OF NATURAL LANGUAGE PROCESSING AND MACHINE LEARNING TECHNIQUES
Published 2017-12-01“…The natural language processing of Belarusian corpus with the help of developed algorithm using machine learning was carried out. The precision of developed models of machine learning has been 80–90 %. …”
Get full text
Article -
14235
Calculation Method of Planetary Gear Train Transmission Ratio based on Adjacency Matrix
Published 2019-05-01“…And use MATLAB to automate this algorithm and solve the equation of motion to obtain the gear ratio of the planetary gear train.…”
Get full text
Article -
14236
Scalable Clustering of High-Dimensional Data Technique Using SPCM with Ant Colony Optimization Intelligence
Published 2015-01-01“…Though this is efficient clustering, it is checked for optimization using ant colony algorithm with swarm intelligence. Thus the scalable clustering technique is obtained and the evaluation results are checked with synthetic datasets.…”
Get full text
Article -
14237
A Modified Fast Approximated Power Iteration Subspace Tracking Method for Space-Time Adaptive Processing
Published 2010-01-01“…By applying a modified approximated power iteration subspace tracing algorithm, the principal subspace in which the clutter-plus-interference reside is estimated. …”
Get full text
Article -
14238
Pattern Synthesis of Time-Modulated Array Antenna Based on an Improved Invasive Weed Optimization Method
Published 2019-01-01“…An improved invasive weed optimization (IWO) algorithm is developed in order to determine the optimal parameters describing the pulse sequence used to modulate the excitation weights of array elements. …”
Get full text
Article -
14239
Fuzzy Lattice Reasoning for Pattern Classification Using a New Positive Valuation Function
Published 2012-01-01“…As a consequence, the modified algorithm achieves better classification results. The effectiveness of the modified FLR is demonstrated by examples on several well-known pattern recognition benchmarks.…”
Get full text
Article -
14240
EXPERIMENTAL EVALUATION OF THE SOLID PARTICLES BEHAVIOR IN A VERTICAL AIR FLOW BY USING IMAGING ANALYSIS
Published 2021-01-01“…This article presents a new method of imaging analysis of the behavior of a solid particle, in order to extend this study through experimental applications. The working algorithm implies the analysis of images in different positions of the solid particle in the vertical ascending air flow, analysis in relation to a reference image. …”
Get full text
Article