Showing 14,221 - 14,240 results of 19,511 for search '"algorithms"', query time: 0.11s Refine Results
  1. 14221

    Stable enclosure based hybrid routing schema in heterogeneous wireless networks by Zhi LI, Yi JIANG, Qian-mu LI, Feng-yu LIU

    Published 2012-09-01
    “…The model of heterogeneous wireless networks was analyzed and a hybrid routing schema based on MANET stable enclosure was proposed.This schema could transform the routing protocol between MANET and DTN based on the local topology in real time.In the stable enclosure,AODV was used to improve packet relaying efficiency.When packet relayed to the disconnected area,the routing protocol transcended to Prophet to avoid routing failed.It fully used the advantage of MANET and DTN routing protocol.The feasibility of the proposed algorithm is demonstrated,and it is more efficient than the other DTN routing protocols used in the heterogeneous wireless networks.…”
    Get full text
    Article
  2. 14222

    Merkel Cell Carcinoma: Interdisciplinary Management of a Rare Disease by Sven Schneider, Dietmar Thurnher, Boban M. Erovic

    Published 2013-01-01
    “…This paper presents an algorithm for contemporary management for the rare and aggressive Merkel cell carcinoma. …”
    Get full text
    Article
  3. 14223

    A New Implementable Prediction-Correction Method for Monotone Variational Inequalities with Separable Structure by Feng Ma, Mingfang Ni, Zhanke Yu

    Published 2013-01-01
    “…At each iteration, the algorithm also allows the involved subvariational inequalities to be solved in parallel. …”
    Get full text
    Article
  4. 14224

    An Analysis of the Cluster-Detecting Property of the BCM Neuron by Lawrence Udeigwe

    Published 2024-01-01
    “…While the focus of this work is not to develop a robust state-of-the-art clustering method, we also analyze and discuss the performance of a resulting preliminary clustering algorithm.…”
    Get full text
    Article
  5. 14225

    KINEMATICS CHARACTERISTICS AND MODELING METHOD OF GANTRY PARALLEL STRUCTURE by XU HuiXing

    Published 2015-01-01
    “…Based on this,the optimization algorithm was proposed to obtain the optimal control parameters for parallel structure,and the method can greatly improve the quick response of the parallel structure.…”
    Get full text
    Article
  6. 14226

    Passive Infrared Sensing Using Plasmonic Resonant Dust Particles by Mark Mirotznik, William Beck, Kimberly Olver, John Little, Peter Pa

    Published 2012-01-01
    “…Here, we present a computational design algorithm along with experimental results that validate the design methodology.…”
    Get full text
    Article
  7. 14227

    Cross-domain service chain mapping mechanism based on Q-learning by Hongqi ZHANG, Rui HUANG, Yingjie YANG, Dexian CHANG, Liancheng ZHANG

    Published 2018-12-01
    “…On this basis, an effective mapping framework was built and the cross-domain mapping problem was modeled as an ILP with the purpose of minimizing mapping cost. A partitioning algorithm was designed to solve the problem based on Q-learning mechanism under this framework. …”
    Get full text
    Article
  8. 14228

    Reconfigurable Antenna Arrays with Multiple Requirements: A Versatile 3D Approach by Massimiliano Comisso, Giulia Buttazzoni, Roberto Vescovo

    Published 2017-01-01
    “…This paper proposes a deterministic method for the 3D synthesis of antenna arrays that jointly accounts for far-field pattern reconfigurability, polarization setting, dynamic range ratio reduction, and near-field control. The conceived algorithm, which generalizes some existing solutions, relies on a weighted cost function, whose iterative minimization is accomplished by properly derived closed-form expressions. …”
    Get full text
    Article
  9. 14229

    An Iterative Method for Solving Split Monotone Variational Inclusion Problems and Finite Family of Variational Inequality Problems in Hilbert Spaces by Wanna Sriprad, Somnuk Srisawat

    Published 2021-01-01
    “…The purpose of this paper is to study the convergence analysis of an intermixed algorithm for finding the common element of the set of solutions of split monotone variational inclusion problem (SMIV) and the set of a finite family of variational inequality problems. …”
    Get full text
    Article
  10. 14230

    On the Computation of the Efficient Frontier of the Portfolio Selection Problem by Clara Calvo, Carlos Ivorra, Vicente Liern

    Published 2012-01-01
    “…Computational results are provided to test the efficiency of the algorithm and to illustrate its applications. The procedure has been implemented in Mathematica.…”
    Get full text
    Article
  11. 14231

    Defense strategies selection based on attack-defense evolutionary game model by Jian-ming HUANG, Heng-wei ZHANG, Jin-dong WANG, Shi-rui HUANG

    Published 2017-01-01
    “…Due to that the current network security researches based on game theory mostly use the completely rationality assumption,which is not consistent with the facts.Under the bounded rationality constraint of network attack-defense,attack-defense evolutionary game model and a method to solve evolutionary stable equilibrium based on the non-cooperative evolutionary game theory was proposed.The optimal defense strategy selection algorithm was designed based on the analysis of the evolutionary stable strategy.The effectiveness of the model and method proposed is verified by simulation results,through which some evolution conclusions of offensive behavior on the premise of limited rationality were drawn.…”
    Get full text
    Article
  12. 14232

    Sparsity-Based Robust Bistatic MIMO Radar Imaging in the Presence of Array Errors by Wenyu Gao, Jun Li, Daming Zhang, Qinghua Guo

    Published 2020-01-01
    “…The impact of multiplicative array gain-phase errors is changed to be additive through model reformulation, and transmit-receive angle imaging is formulated to a sparse total least square signal problem. Then, an iterative algorithm is proposed to solve the optimization problem. …”
    Get full text
    Article
  13. 14233

    Method to generate attack graphs for assessing the overall security of networks by MAN Da-peng1, ZHOU Yuan2, YANG Wu1, YANG Yong-tian1

    Published 2009-01-01
    “…In order to evaluate the overall security of networks, a new method for generating attack graphs was proposed.The method used breadth-first algorithm to search the dependence of network vulnerabilities.To solve the state explosion problem, the strategies that limited the number of attack steps and the reachability of state nodes were adopted in gener-ating attack graphs.The experimental results show that the generated attack graphs can help security administrators to evaluate the overall security of networks, and the adopted optimization strategies are effective to remove redundant edges and nodes in attack graphs and decrease the system overhead during generating attack graphs.…”
    Get full text
    Article
  14. 14234

    LINGUISTIC ANALYSIS FOR THE BELARUSIAN CORPUS WITH THE APPLICATION OF NATURAL LANGUAGE PROCESSING AND MACHINE LEARNING TECHNIQUES by Yu. S. Hetsevich, I. V. Reentovich

    Published 2017-12-01
    “…The natural language processing of Belarusian corpus with the help of developed algorithm using machine learning was carried out. The precision of developed models of machine learning has been 80–90 %. …”
    Get full text
    Article
  15. 14235

    Calculation Method of Planetary Gear Train Transmission Ratio based on Adjacency Matrix by Zhao Wang, Xinping Wang, Jiexin Zhang

    Published 2019-05-01
    “…And use MATLAB to automate this algorithm and solve the equation of motion to obtain the gear ratio of the planetary gear train.…”
    Get full text
    Article
  16. 14236

    Scalable Clustering of High-Dimensional Data Technique Using SPCM with Ant Colony Optimization Intelligence by Thenmozhi Srinivasan, Balasubramanie Palanisamy

    Published 2015-01-01
    “…Though this is efficient clustering, it is checked for optimization using ant colony algorithm with swarm intelligence. Thus the scalable clustering technique is obtained and the evaluation results are checked with synthetic datasets.…”
    Get full text
    Article
  17. 14237

    A Modified Fast Approximated Power Iteration Subspace Tracking Method for Space-Time Adaptive Processing by Yang Zhiwei, He Shun, Liao Guisheng, Ouyang Shan

    Published 2010-01-01
    “…By applying a modified approximated power iteration subspace tracing algorithm, the principal subspace in which the clutter-plus-interference reside is estimated. …”
    Get full text
    Article
  18. 14238

    Pattern Synthesis of Time-Modulated Array Antenna Based on an Improved Invasive Weed Optimization Method by Zhenkai Zhang, Xinxing Liu, Bing Zhang, Hailin Li

    Published 2019-01-01
    “…An improved invasive weed optimization (IWO) algorithm is developed in order to determine the optimal parameters describing the pulse sequence used to modulate the excitation weights of array elements. …”
    Get full text
    Article
  19. 14239

    Fuzzy Lattice Reasoning for Pattern Classification Using a New Positive Valuation Function by Yazdan Jamshidi Khezeli, Hossein Nezamabadi-pour

    Published 2012-01-01
    “…As a consequence, the modified algorithm achieves better classification results. The effectiveness of the modified FLR is demonstrated by examples on several well-known pattern recognition benchmarks.…”
    Get full text
    Article
  20. 14240

    EXPERIMENTAL EVALUATION OF THE SOLID PARTICLES BEHAVIOR IN A VERTICAL AIR FLOW BY USING IMAGING ANALYSIS by EMILIAN-FLORIN MOSNEGUTU, NARCIS BARSAN, ALEXANDRA-DANA CHITIMUS, CLAUDIA TOMOZEI, MIHAIL RISTEA

    Published 2021-01-01
    “…This article presents a new method of imaging analysis of the behavior of a solid particle, in order to extend this study through experimental applications. The working algorithm implies the analysis of images in different positions of the solid particle in the vertical ascending air flow, analysis in relation to a reference image. …”
    Get full text
    Article