Showing 14,241 - 14,260 results of 19,511 for search '"algorithms"', query time: 0.09s Refine Results
  1. 14241

    A Note on Two-Agent Scheduling with Resource Dependent Release Times on a Single Machine by Peng Liu, Lini Duan

    Published 2015-01-01
    “…The optimal properties and the optimal polynomial time algorithm are proposed to solve the scheduling problem.…”
    Get full text
    Article
  2. 14242

    Stochastic Representation and Monte Carlo Simulation for Multiterm Time-Fractional Diffusion Equation by Longjin Lv, Luna Wang

    Published 2020-01-01
    “…Finally, a stochastic simulation algorithm was developed for the visualization of sample path of the abnormal diffusion process. …”
    Get full text
    Article
  3. 14243

    Exact Asymptotic Stability Analysis and Region-of-Attraction Estimation for Nonlinear Systems by Min Wu, Zhengfeng Yang, Wang Lin

    Published 2013-01-01
    “…Experiments on some benchmarks are given to illustrate the efficiency of our algorithm.…”
    Get full text
    Article
  4. 14244

    ROUTE FIRST-CLUSTER SECOND METHOD FOR PERSONAL SERVICE ROUTING PROBLEM by MELİKE KÜBRA EKİZ, MUHAMMET BOZDEMİR, BURCU ÖZCAN TÜRKKAN

    Published 2019-06-01
    “…We used the Genetic Algorithm (GA) to improve the route and compared the results by creating different scenarios in clustering methods. …”
    Get full text
    Article
  5. 14245

    CONTROLLING AS A CORPORATE GOVERNANCE TOOL by T. Rogulenko

    Published 2018-09-01
    “…According to the results of the research it is concluded that con-trolling is one of the modern algorithmic and automated tools of the corporate governance system of the economic development strategy in a highly competitive environment and un-predictability of the behavior of economic entities in the market of goods, works, services, currency, securities and etc., which integrates with other management systems in the mode of their parallel automation.…”
    Get full text
    Article
  6. 14246

    High-roubustness keystroke recognition method based on acoustic spatial gradient by Ying LIU, Kangkang HAN, Zhihong QIAN

    Published 2020-05-01
    “…For the fluctuation of CFCC caused by environmental noise is the main reason for the low accuracy of keystroke detection,the spatial characteristics of adjacent between CFCC were studied,and the spatial gradient structure of CFCC based on points was established.On this basis,the effect of CFCC spatial gradient on keystroke content recognition and the selection of precise neighborhood points were studied on training and testing.Finally,a high-robustness keystroke recognition algorithm based on acoustic signals was constructed.Extensive experiments in different environments demonstrate that the proposed CFCC spatial gradient sound feature achieves great performance and the recognition accuracy is 96.15%.…”
    Get full text
    Article
  7. 14247

    Hyperspectral image classification method based on multi-scale proximal feature concatenate network by Hongmin GAO, Xueying CAO, Zhonghao CHEN, Zaijun HUA, Chenming LI, Yue CHEN

    Published 2021-02-01
    “…Aiming at the phenomenon that the hyperspectral classification algorithm based on traditional CNN model was not expressive enough in detail and the network structure was too complex, a hyperspectral image classification method based on multi-scale proximal feature concatenate network (MPFCN) was designed.By introducing multi-scale filter and cavity convolution, the model could be kept light and the discriminative features of the space spectrum could be obtained, and the correlation between the proximal features of the CNN was proposed to further enhance the detail expression.Experimental results on three benchmark hyperspectral image data sets show that the proposed method is superior to other classification models.…”
    Get full text
    Article
  8. 14248

    Victimization analysis model of user network behavior based on network traffic by Shengli ZHOU, Xiaoyang XU

    Published 2021-02-01
    “…The analysis of network victimization is of great significance to the prevention and control of telecom fraud.By studying the network traffic generated by the interaction between users and websites, a victimization identification model of telecom fraud crime based on network behavior flow analysis was proposed, the association rules between different behavior characteristics were analyzed, the behavior sequence features were reconstructed, and the victimization of network behavior sequence with random forest algorithm was evaluated.Based on the network behavior data set of public security organs, the experiment proves that the model can effectively improve the recognition accuracy of network behavior victimization.…”
    Get full text
    Article
  9. 14249

    High order intuitionistic fuzzy time series forecasting model by Ya-nan WANG, Ying-jie LEI, Yang LEI, Xiao-shi FAN

    Published 2016-05-01
    “…A high order intuitionistic fuzzy time series forecasting model was built.In the new model,fuzzy clustering algorithm was used to get unequal intervals,and a more objective technique for ascertaining membership and non-membership functions of intuitionistic fuzzy set was proposed.On these bases,forecasting rules based on mul-ti-dimension intuitionistic fuzzy modus ponens inference were established.At last,contrast experiments on the enroll-ments of the university of Alabama and the daily average temperature of Beijing were carried out,which show that the novel model has a clear advantage of improving the forecasting accuracy.…”
    Get full text
    Article
  10. 14250

    Low-complexity channel estimation in massive MIMO based on Kaptyn series expansion by Bing WANG, Zhengquan LI, Feng YAN, Lianfeng SHEN

    Published 2016-12-01
    “…It is insufficient that the complexity of Kapteyn-MMSE slightly higher than the complexity of Taylor-MMSE, but still far less than the complexity of classical MMSE algorithm.…”
    Get full text
    Article
  11. 14251

    Constraint analysis for extended dynamic fault tree by Qi-xuan WU, Jian-feng MA, Cong SUN, Shuai ZHANG, Shuang ZHANG, Tao ZHENG

    Published 2017-09-01
    “…As a new extension of dynamic fault trees,time delay gate was proposed.This new mechanism can be used to model the time delay on the fault propagation from the lower level subsystems to the higher level system.The dynamic Bayesian networks was extend to solve the dynamic fault trees containing time delay gates.An algorithm based on SMT to support the optimized failure distribution under the nondeterministic range constraint of basic events was also proposed.The effectiveness is shown by comparison with existing tools on analyzing and solving real systems,and the effects of range constraints and gate parameter on the failure distribution of systems is illustrated.…”
    Get full text
    Article
  12. 14252

    Method of dynamic integrity measurement for VMM based on adjacency data by Tao WU, Qiu-song YANG, Ye-ping HE

    Published 2015-09-01
    “…Due to its high privilege and complicated runtime memory,dynamic integrity measurement for VMM (virtual machine monitor) was always a great difficulty in the current study.An innovative method based on the adjacency data was proposed,which used a neighbor as the host of a measurement module.According to an integrity model in memory page granularity and a new improved measurement algorithm,dynamic integrity measurement for VMM was imple-mented.Experimental data shows it could detect the integrity broken accurately,only causing a moderate performance loss for computing intensive tasks.…”
    Get full text
    Article
  13. 14253

    Distributed data sinking mechanism based on joint optimization in wireless sensor networks by Tao LIU, Tian-rui LI, Wen-rong TAN, Feng YIN

    Published 2015-07-01
    “…A distributed data sinking mechanism based on joint optimization,abbreviated DDSM,for periodic report wireless sensor networks is proposed,which integrates MAC layer and network layer.In this mechanism,a joint optimization algorithm is provided which connects the routing with the slot allocation.DDSM constructs an appropriate transmission schedule that avoids transmission collisions and choose the optimum routing path that achieves high levels of power conservation.Finally,experiments are performed to evaluate the performance of the proposed mechanism.Simulation results show that DDSM can reduce the energy consumption of nodes and provide longer network lifetime.…”
    Get full text
    Article
  14. 14254

    Environmental-adaptive RSS-based indoor localization by Ting-ting WANG, Wei KE, Chao SUN

    Published 2014-10-01
    “…A novel two-step dictionary learning (DL) framework was proposed to dynamically adjust the overcomplete basis (a.k.a.dictionary) for matching the changes of the RSS measurements,and then the sparse solution can better represent location estimations.Moreover,a modified re-weighting l<sub>1</sub>norm minimization algorithm was proposed to improve reconstruction performance for sparse signals.The effectiveness of the proposed scheme is demonstrated by experimental results where the locations of targets can be obtained from noisy signals,even if the number of targets is not known a priori.…”
    Get full text
    Article
  15. 14255

    Consensus Congestion Control in Multirouter Networks Based on Multiagent System by Xinhao Yang, Sheng Xu, Ze Li

    Published 2017-01-01
    “…Simulation results by MATLAB and Ns2 indicate that the proposed algorithm maintains a high throughput and a low packet drip ratio and improves the quality of the service in the complex network environment.…”
    Get full text
    Article
  16. 14256

    The method of preliminary localization of source of excessive air pollution to increase effectiveness of environmental monitoring and supervision in Russia by L. O. Shtripling, V. V. Bazhenov, Yu. V. Kalinin, N. S. Bazhenova, V. V. Merkulov

    Published 2019-06-01
    “…The paper presents an algorithm for the preliminary assessment of the location of pollution sources, emissions of which could lead to an excess of permissible concentrations in the air. …”
    Get full text
    Article
  17. 14257

    A Resource Allocation Scbeme Based on User's QoS in MIMO Relay System by Tao Guo, Youming Li, Peng Lei, Biao Ji, Chengcheng Li

    Published 2015-04-01
    “…For the resource allocation in OFDMA MIMO relay downlink system,a quality of service aware resource allocation scheme with low complexity under total power constraint was proposed.First,under the assumption of equal power allocation,a selective priority factor was chosen for the relay selecting and subcarrier allocation.The relay selection and subcarriers allocation were carried out depending on the priority factor.Then the optimal power allocation was implemented through convex optimization algorithm.Numerical results show that the proposed scheme can not only achieve the higher capacity of system,but also guarantee the quality of service for each user.…”
    Get full text
    Article
  18. 14258

    A New Model for Reassignment of Tasks to Available Employees in Iraq’s Firms by Dhurgam Kalel Ibrahim Alsaad, Reza Ghanbari, Ali Akbar Sohrabi, Khatere Ghorbani Moghadam

    Published 2020-01-01
    “…Finally, a heuristic algorithm for solving reassignment tasks on laborers is introduced.…”
    Get full text
    Article
  19. 14259

    Construction and Research of Lightweight Cryptography SOPT-S Boxes Based on Inverse Mapping in Galois Field by Zhaolong Fan, Qijian Xu, Yongju Xu, Fei Wang

    Published 2014-04-01
    “…In addition, the hardware overhead is also the same as the latter, so that it can provide a reference for the designing of nonlinear layer of lightweight cryptography algorithm.…”
    Get full text
    Article
  20. 14260

    Study of kinematic parameters of android robot in automated synthesis of motions on velocity vector by F. N. Pritykin

    Published 2022-04-01
    “…The modernization of the method of synthesis of motions of manipulators by speed vector allows to exclude motions the emergence of dead ends in the process of computer simulation. The developed algorithm is based on the use of a database characterising the values of kinematic parameters that specify the permissible instantaneous states of the mechanism of the manipulator at different positions. …”
    Get full text
    Article