-
14281
Smart home service perception degradation positioning scheme based on the network resource tree and information entropy
Published 2022-05-01“…With the accelerating pace of development of the science and technology and informatization, the smart home market is developing rapidly.It brings great convenience to people’s lives, also brings new operation and maintenance tests to operators.A scheme based on big data and AI algorithm, combined with the network resource tree and information entropy was proposed for perceptual real-time monitoring of smart home services, delimiting, segmenting and locating perceptual degradation class faults, aiming to solve the problems of more end-to-end links of smart home services and difficulties in manual location of group faults and single user faults.…”
Get full text
Article -
14282
Adaptive Semidiscrete Finite Element Methods for Semilinear Parabolic Integrodifferential Optimal Control Problem with Control Constraint
Published 2013-01-01“…Furthermore, we introduce an adaptive algorithm to guide the mesh refinement. Finally, a numerical example is given to demonstrate the theoretical results.…”
Get full text
Article -
14283
Region-of-interest based fast transcoding for mobile video terminals
Published 2009-01-01“…A fast transcoding scheme based on region of interest(ROI) was proposed for mobile video terminals.According to the target displaying size,the ROIs were automatically detected from the input H.264 video stream based on visual attention model in the video server.The video stream was automatically generated at the proxy server by video transcoding for mobile terminals.Moreover,a fast mode decision algorithm was proposed for video transcoding.Experimental results demonstrate that the proposed approach can not only reduce the bandwidth occupation,but also obtain excellent video quality with a low computational complexity.…”
Get full text
Article -
14284
A Fisco-Bcos platform based accurate performance analysis model of blockchain system
Published 2023-01-01“…In order to solve the problems such as difficult to estimate the performance of blockchain system and determine the requirement of hardware facilities, an accurate model of blockchain TPS based on model and data was established under different network structures.Considering the network architecture, the consensus algorithm, the communication of nodes and other elements, the precise model of TPS was established based on the blockchain transaction model of Fisco-Bcos platform and a large amount of actual data fitting.Through the TPS test of the actual blockchain system, the results show that the prediction TPS model established can maintain high prediction accuracy under different network architecture.…”
Get full text
Article -
14285
SSMCI:verification mechanism for security protocols centered on the attacker
Published 2017-10-01“…A automatic verification mechanism for security protocols analysis was proposed.The attacker model was proposed and the concept of ‘need’ was defined,a knowledge set which was necessary for the attacker to compose a target message term but unknown to the attacker.The attacker model was established as needed.The mechanism centered on the attacker was designed,in which whether add a protocol session was determined by the attacker.This might cause contradiction in time sequence,so some back-track algorithm was adopted to solve this contradiction.Experiments show that the system can verify the security of the protocol,and the number of state space is slightly better than the Scyther tool.…”
Get full text
Article -
14286
Boerhaave's Syndrome: Still a Diagnostic and Therapeutic Challenge in the 21st Century
Published 2013-01-01“…Based on time of presentation and eventual presence of sepsis, a therapeutic algorithm is proposed.…”
Get full text
Article -
14287
Scheme of node identify authentication in distributed file interaction system
Published 2013-08-01“…Under the mutual identity authentication, a scheme based on distributed cloud storage system was proposed, using symmetric encryption algorithm and hash function to realize bidirectional authentication process. …”
Get full text
Article -
14288
Local relief approximation with deterministic methods for optimizing production facilities layout on rough terrain
Published 2018-09-01“…Localization of the relief vicinity is performed algorithmically depending on the current values of the geometric image center coordinates of the certain facility foundation. …”
Get full text
Article -
14289
Modification of Nonlinear Conjugate Gradient Method with Weak Wolfe-Powell Line Search
Published 2017-01-01“…Based on its simple algorithm, low memory requirement, and the speed of obtaining the solution, this method is widely used in many fields, such as engineering, computer science, and medical science. …”
Get full text
Article -
14290
Submassive Pulmonary Thromboembolism in a Patient with Thrombocytopenia: Therapeutic Challenge
Published 2019-01-01“…The case establishes a therapeutic challenge for the treating group, leading us to carry out an extensive search of the literature and propose a management algorithm in this complex situation.…”
Get full text
Article -
14291
Adaptive modulation technology in LTE-Advanced system
Published 2017-07-01“…Adaptive modulation technology is an important research content of AMC technology in LTE-Advanced system.The β value of new MCS levels were studied,in which the higher order modulation 256QAM was used,then the general β value of new MCS levels by the iterative algorithm in several different channel models were obtained,according to the convexity of the mean square error function,and compared with the traditional MCS levels.The simulation results show that the new MCS levels provide higher system performance when SNR is high,and the optimized β value makes CQI calculation more accurately.…”
Get full text
Article -
14292
Delving into biomarkers and predictive modeling for CVD mortality: a 20-year cohort study
Published 2025-02-01“…This study aims to develop a predictive model for CVD-related mortality using a machine learning-based feature selection algorithm and assess its performance compared to existing models. …”
Get full text
Article -
14293
Design and performance analysis of wireless body area networks in complex indoor e-Health hospital environments for patient remote monitoring
Published 2016-09-01“…Ensuring good performance of the deployed wireless networks in this kind of environment is mandatory and obtaining accurate radio propagation estimations by means of a computationally efficient algorithm is a key issue. For that purpose, an in-house three-dimensional ray launching algorithm is employed, which provides radio frequency power distribution values, power delay profiles, and delay spread values for the complete volume of complex indoor scenarios. …”
Get full text
Article -
14294
EDUCATIONAL TRAINING SIMULATOR FOR MONITORING READING TECHNIQUE AND SPEED BASED ON SPEECH-TO-TEXT (STT) METHODS
Published 2024-10-01“…The results of testing children with dyslalia, meaning the rearrangement of sounds in words when reading, also showed that the Jaro algorithm has a shorter line comparison time for large text arrays (by 7%). …”
Get full text
Article -
14295
A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks
Published 2022-09-01“…The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. In the proposed energy-efficient routing protocol, an existing genetic algorithm is enhanced by adding an encoding strategy, a crossover procedure, and an improved mutation operation that helps determine the nodes. …”
Get full text
Article -
14296
Organ Donation Conversations on X and Development of the OrgReach Social Media Marketing Strategy: Social Network Analysis
Published 2025-02-01“…NodeXL Pro was used to retrieve and analyze the data, and a network visualization was created by drawing upon the Clauset-Newman-Moore cluster algorithm and the Harel-Koren Fast Multiscale layout algorithm. …”
Get full text
Article -
14297
An Object-Oriented Systems Engineering Point of View to Develop Controllers of Quadrotor Unmanned Aerial Vehicles
Published 2020-01-01“…The Q-UAV dynamics and control architecture are combined with the MDA/MBSE specialization as follows: the Computation Independent Model (CIM) is defined by specifying the use-case model together with the UKF algorithm and hybrid automata to intensively gather the control requirements. …”
Get full text
Article -
14298
Pembangunan Aplikasi Latihan Soal IPA SD dengan Gamifikasi dan Mersenne Twister
Published 2020-02-01“…The questions generated by this application will be randomly given with the use of Mersenne Twister algorithm so that the chance of getting the same question will be minimize. …”
Get full text
Article -
14299
Displacement of hydrocarbon liquids by water using the models of zonally heterogeneous deformable formations
Published 2025-01-01“…To predict the well flow rate, an algorithm it is necessary to determine the noted reservoir parameters at any time. …”
Get full text
Article -
14300
Automated Analysis of Service Life of Air-Lines of the Electricity Transmission of Electric Power Systems
Published 2021-10-01“…The methodology and algorithm of methodological support of the management of electric power systems and grid enterprises in the organization of operation, maintenance and repair have been developed.…”
Get full text
Article