-
14241
A Note on Two-Agent Scheduling with Resource Dependent Release Times on a Single Machine
Published 2015-01-01“…The optimal properties and the optimal polynomial time algorithm are proposed to solve the scheduling problem.…”
Get full text
Article -
14242
Stochastic Representation and Monte Carlo Simulation for Multiterm Time-Fractional Diffusion Equation
Published 2020-01-01“…Finally, a stochastic simulation algorithm was developed for the visualization of sample path of the abnormal diffusion process. …”
Get full text
Article -
14243
Exact Asymptotic Stability Analysis and Region-of-Attraction Estimation for Nonlinear Systems
Published 2013-01-01“…Experiments on some benchmarks are given to illustrate the efficiency of our algorithm.…”
Get full text
Article -
14244
ROUTE FIRST-CLUSTER SECOND METHOD FOR PERSONAL SERVICE ROUTING PROBLEM
Published 2019-06-01“…We used the Genetic Algorithm (GA) to improve the route and compared the results by creating different scenarios in clustering methods. …”
Get full text
Article -
14245
CONTROLLING AS A CORPORATE GOVERNANCE TOOL
Published 2018-09-01“…According to the results of the research it is concluded that con-trolling is one of the modern algorithmic and automated tools of the corporate governance system of the economic development strategy in a highly competitive environment and un-predictability of the behavior of economic entities in the market of goods, works, services, currency, securities and etc., which integrates with other management systems in the mode of their parallel automation.…”
Get full text
Article -
14246
High-roubustness keystroke recognition method based on acoustic spatial gradient
Published 2020-05-01“…For the fluctuation of CFCC caused by environmental noise is the main reason for the low accuracy of keystroke detection,the spatial characteristics of adjacent between CFCC were studied,and the spatial gradient structure of CFCC based on points was established.On this basis,the effect of CFCC spatial gradient on keystroke content recognition and the selection of precise neighborhood points were studied on training and testing.Finally,a high-robustness keystroke recognition algorithm based on acoustic signals was constructed.Extensive experiments in different environments demonstrate that the proposed CFCC spatial gradient sound feature achieves great performance and the recognition accuracy is 96.15%.…”
Get full text
Article -
14247
Hyperspectral image classification method based on multi-scale proximal feature concatenate network
Published 2021-02-01“…Aiming at the phenomenon that the hyperspectral classification algorithm based on traditional CNN model was not expressive enough in detail and the network structure was too complex, a hyperspectral image classification method based on multi-scale proximal feature concatenate network (MPFCN) was designed.By introducing multi-scale filter and cavity convolution, the model could be kept light and the discriminative features of the space spectrum could be obtained, and the correlation between the proximal features of the CNN was proposed to further enhance the detail expression.Experimental results on three benchmark hyperspectral image data sets show that the proposed method is superior to other classification models.…”
Get full text
Article -
14248
Victimization analysis model of user network behavior based on network traffic
Published 2021-02-01“…The analysis of network victimization is of great significance to the prevention and control of telecom fraud.By studying the network traffic generated by the interaction between users and websites, a victimization identification model of telecom fraud crime based on network behavior flow analysis was proposed, the association rules between different behavior characteristics were analyzed, the behavior sequence features were reconstructed, and the victimization of network behavior sequence with random forest algorithm was evaluated.Based on the network behavior data set of public security organs, the experiment proves that the model can effectively improve the recognition accuracy of network behavior victimization.…”
Get full text
Article -
14249
High order intuitionistic fuzzy time series forecasting model
Published 2016-05-01“…A high order intuitionistic fuzzy time series forecasting model was built.In the new model,fuzzy clustering algorithm was used to get unequal intervals,and a more objective technique for ascertaining membership and non-membership functions of intuitionistic fuzzy set was proposed.On these bases,forecasting rules based on mul-ti-dimension intuitionistic fuzzy modus ponens inference were established.At last,contrast experiments on the enroll-ments of the university of Alabama and the daily average temperature of Beijing were carried out,which show that the novel model has a clear advantage of improving the forecasting accuracy.…”
Get full text
Article -
14250
Low-complexity channel estimation in massive MIMO based on Kaptyn series expansion
Published 2016-12-01“…It is insufficient that the complexity of Kapteyn-MMSE slightly higher than the complexity of Taylor-MMSE, but still far less than the complexity of classical MMSE algorithm.…”
Get full text
Article -
14251
Constraint analysis for extended dynamic fault tree
Published 2017-09-01“…As a new extension of dynamic fault trees,time delay gate was proposed.This new mechanism can be used to model the time delay on the fault propagation from the lower level subsystems to the higher level system.The dynamic Bayesian networks was extend to solve the dynamic fault trees containing time delay gates.An algorithm based on SMT to support the optimized failure distribution under the nondeterministic range constraint of basic events was also proposed.The effectiveness is shown by comparison with existing tools on analyzing and solving real systems,and the effects of range constraints and gate parameter on the failure distribution of systems is illustrated.…”
Get full text
Article -
14252
Method of dynamic integrity measurement for VMM based on adjacency data
Published 2015-09-01“…Due to its high privilege and complicated runtime memory,dynamic integrity measurement for VMM (virtual machine monitor) was always a great difficulty in the current study.An innovative method based on the adjacency data was proposed,which used a neighbor as the host of a measurement module.According to an integrity model in memory page granularity and a new improved measurement algorithm,dynamic integrity measurement for VMM was imple-mented.Experimental data shows it could detect the integrity broken accurately,only causing a moderate performance loss for computing intensive tasks.…”
Get full text
Article -
14253
Distributed data sinking mechanism based on joint optimization in wireless sensor networks
Published 2015-07-01“…A distributed data sinking mechanism based on joint optimization,abbreviated DDSM,for periodic report wireless sensor networks is proposed,which integrates MAC layer and network layer.In this mechanism,a joint optimization algorithm is provided which connects the routing with the slot allocation.DDSM constructs an appropriate transmission schedule that avoids transmission collisions and choose the optimum routing path that achieves high levels of power conservation.Finally,experiments are performed to evaluate the performance of the proposed mechanism.Simulation results show that DDSM can reduce the energy consumption of nodes and provide longer network lifetime.…”
Get full text
Article -
14254
Environmental-adaptive RSS-based indoor localization
Published 2014-10-01“…A novel two-step dictionary learning (DL) framework was proposed to dynamically adjust the overcomplete basis (a.k.a.dictionary) for matching the changes of the RSS measurements,and then the sparse solution can better represent location estimations.Moreover,a modified re-weighting l<sub>1</sub>norm minimization algorithm was proposed to improve reconstruction performance for sparse signals.The effectiveness of the proposed scheme is demonstrated by experimental results where the locations of targets can be obtained from noisy signals,even if the number of targets is not known a priori.…”
Get full text
Article -
14255
Consensus Congestion Control in Multirouter Networks Based on Multiagent System
Published 2017-01-01“…Simulation results by MATLAB and Ns2 indicate that the proposed algorithm maintains a high throughput and a low packet drip ratio and improves the quality of the service in the complex network environment.…”
Get full text
Article -
14256
The method of preliminary localization of source of excessive air pollution to increase effectiveness of environmental monitoring and supervision in Russia
Published 2019-06-01“…The paper presents an algorithm for the preliminary assessment of the location of pollution sources, emissions of which could lead to an excess of permissible concentrations in the air. …”
Get full text
Article -
14257
A Resource Allocation Scbeme Based on User's QoS in MIMO Relay System
Published 2015-04-01“…For the resource allocation in OFDMA MIMO relay downlink system,a quality of service aware resource allocation scheme with low complexity under total power constraint was proposed.First,under the assumption of equal power allocation,a selective priority factor was chosen for the relay selecting and subcarrier allocation.The relay selection and subcarriers allocation were carried out depending on the priority factor.Then the optimal power allocation was implemented through convex optimization algorithm.Numerical results show that the proposed scheme can not only achieve the higher capacity of system,but also guarantee the quality of service for each user.…”
Get full text
Article -
14258
A New Model for Reassignment of Tasks to Available Employees in Iraq’s Firms
Published 2020-01-01“…Finally, a heuristic algorithm for solving reassignment tasks on laborers is introduced.…”
Get full text
Article -
14259
Construction and Research of Lightweight Cryptography SOPT-S Boxes Based on Inverse Mapping in Galois Field
Published 2014-04-01“…In addition, the hardware overhead is also the same as the latter, so that it can provide a reference for the designing of nonlinear layer of lightweight cryptography algorithm.…”
Get full text
Article -
14260
Study of kinematic parameters of android robot in automated synthesis of motions on velocity vector
Published 2022-04-01“…The modernization of the method of synthesis of motions of manipulators by speed vector allows to exclude motions the emergence of dead ends in the process of computer simulation. The developed algorithm is based on the use of a database characterising the values of kinematic parameters that specify the permissible instantaneous states of the mechanism of the manipulator at different positions. …”
Get full text
Article