-
14501
Risk assessment model based on fuzzy Petri nets
Published 2013-08-01“…The concept of credibility was introduced, and the security risk assessment model and fuzzy reasoning algorithm based on fuzzy Petri net were also proposed, making use of fuzzy Petri nets method joined together with the AHP to analyze the question, and combining qualitative analysis and quantitative analysis together. …”
Get full text
Article -
14502
Finite-Time Antisaturation Tracking Control for Hypersonic Vehicle with Uncertain Dynamics
Published 2020-01-01“…The minimum learning parameter algorithm based on a radial basis function is employed to approximate the unknown dynamics with low computational burden. …”
Get full text
Article -
14503
Optimal Power Management via Dynamic Power Pools in DC MG Clusters
Published 2025-01-01“…This paper introduces a methodology for managing and controlling microgrid (MG) clusters through the establishment of diverse power pools and optimizing resource allocation based on available generation. The proposed algorithm, incorporating equivalent droop control, facilitates integrated economic optimization by the MG cluster operator (MCO), considering market participation through generation and consumer bids. …”
Get full text
Article -
14504
Approximate Solutions of Fisher's Type Equations with Variable Coefficients
Published 2013-01-01“…Also the results demonstrate that the proposed method is powerful algorithm for solving the nonlinear partial differential equations.…”
Get full text
Article -
14505
Dynamic fair allocation of multi-resources based on shared resource quantity
Published 2016-07-01“…Finally, theoretical analysis and experiments demonstrate that this strategy can satisfy the demands as well as maximize the dominant share on the base of approaching fairness and the im-proved algorithm increases the allocation efficiency in the dynamic system.…”
Get full text
Article -
14506
Research on Collaborative Recommendation Method Based on Multiple Data Sources of Social Network
Published 2015-06-01“…Experimental results show that the proposed algorithm has significantly better precision and reca11 than existing methods.…”
Get full text
Article -
14507
Assessment of crack growth development in main pipeline on the basis of elastoplastic model
Published 2019-11-01“…ANSYS developed an algorithm for modeling crack growth taking into account residual stresses. …”
Get full text
Article -
14508
Front-feedback-based two-stage switch architecture
Published 2011-01-01“…To relax the time constraint of the FTSA(feedback-based two-stage switch architecture),a new scheme called FFTS(front-feedback-based two-stage switch architecture) was proposed,which enabled the cell transmission to take place in parallel with the scheduling process with the adoption of putting the feedback operation before the cell transmission and thus extended the time space of the scheduling algorithm effectively.In addition,the FFTS used the double-cell-buffer mode and re-sequencing buffer to solve the consequent problem such as cell conflict and disordering.Simulation and analysis show that FFTS has a better delay performance compared with the other non-feedback two-stage switch architecture.…”
Get full text
Article -
14509
Conditional Analysis for Mixed Covariates, with Application to Feed Intake of Lactating Sows
Published 2019-01-01“…The methodology accommodates flexible model structure, allows for joint estimation of the quantiles at all levels, and provides a computationally efficient estimation algorithm. Extensive numerical investigation confirms good performance of the proposed method. …”
Get full text
Article -
14510
EXPERIENCE AND PROSPECTS OF MASTER’S DEGREE TRAINING OF ENGINEERING STAFF IN THE FIELD OF METALLURGICAL SCIENCE
Published 2016-08-01“…Need of domination of requirements of the production enterprise is highlighted in master preparation program. The algorithm of interaction of department and technical service of the production enterprise during training of the factory expert in the correspondence practical-focused Master’s degree program is offered.…”
Get full text
Article -
14511
Driver Source-Based Traffic Control Approach for Mitigating Congestion in Freeway Bottlenecks
Published 2022-01-01“…Next, the differential evolution algorithm is employed to calculate the optimal control time at each traffic control on-ramp. …”
Get full text
Article -
14512
CNN-Based Channel Estimation Method for OTFS System in Satellite-Ground Scenario
Published 2022-09-01“…Orthogonal time frequency space (OTFS) is fully applied in high Doppler communication scenarios due to its good Doppler frequency bias and time delay adaptability.The channel estimation methods for OTFS systems have shortcomings such as high complexity and poor BER performance.A CNN-based channel estimation method for OTFS systems in the terrestrial-satellite scenario using a convolutional neural network (CNN) approach was proposed.Simulation results showed that the deep learning-based method outperformed the conventional method in terms of algorithm complexity and BER in the terrestrial-satellite scenario, thus demonstrating that deep learning is a promising tool for channel estimation in OTFS systems.…”
Get full text
Article -
14513
Stochastic Inversion Method for Concrete Dams on the Basis of Bayesian Back Analysis Theory
Published 2019-01-01“…Fast Fourier transform algorithm is introduced to generate random fields for SFEM analysis. …”
Get full text
Article -
14514
Analysis and Discussion on Group Mobility Model in Ubiquitous Network
Published 2013-10-01“…Research on group mobility models has an important effect on the design of communication protocols,the evaluation of algorithm performance and other issues in the ubiquitous network.In the ubiquitous network,a variety of terminals provide certain service for users at the same time,and how to integrate terminal capacity effectively need good group mobility model.The characteristics and suitable scenes of the various group mobility models for Ad Hoc network in the past were summarized,and taking the environment of multiple terminals and multiple networks working for the same goal into consideration,the implementation scheme of group mobility model in the scene of personal service was discussed based on the experience of users,the key technical requirements were also proposed.…”
Get full text
Article -
14515
Fast and resource efficient method for indoor localization based on fingerprint with varied scales
Published 2019-01-01“…To improve the prediction speed in indoor localization,a novel algorithm based on fingerprint with varied scales was proposed.It divided the region of interest into distinct zones with distinctive coverage indicators,and reference positions with different distribution density were set in the region.According the time relevance and strength vary of the RSS from the anchors,the grids-matching process was greatly sped up for the usage of coverage indictors and the features of the location fingerprint extracted with the PCA,which made the proposed method fit the demand of application with limited power and memory.Experimental results indicate that accuracy of the positioning is ensured with the reduced energy-consuming,and more flexible about the number of anchors and the grid distribution.…”
Get full text
Article -
14516
Research on system log anomaly detection based on deep learning
Published 2019-10-01“…The system log reflects the running status of the system and records the activity information of specific events in the system.Therefore,the rapid and accurate detection of the system abnormal log is important to the security and stability of the system.A log anomaly detection algorithm based on GRU neural network is proposed.Log parsing is implemented based on log key technology.Log anomaly detection is realized by using anomaly detection model of execution path and anomaly detection model of parameter value.The system has the advantages of less parameters and faster training.It improves the running speed while achieving higher detection accuracy,and is suitable for log analysis of large information systems.…”
Get full text
Article -
14517
Development of selective line detection method with single-phase earth fault for industrial 6–35 kV networks with isolated neutral with non-sinusoidal load
Published 2023-11-01“…It is proposed to modernize the existing algorithm for relative measurement of the level of higher harmonics. …”
Get full text
Article -
14518
Dynamic Combined Optimal Scheduling of Electric Energy and Natural Gas Energy Consumption in Data Center
Published 2022-01-01“…Then the particle swarm algorithm is used to simulate the schedule. The results show that using natural gas as supplementary energy supply can effectively reduce the overall energy consumption of data center in considering the service delay level of data center.…”
Get full text
Article -
14519
Network status aware routing in content-centric network
Published 2016-06-01“…To improve the efficiency of content delivery and to reduce the network overhead of content centric network (CCN),a network status aware routing(NSAR)mechanism was proposed.NSAR utilized data packets from the content server nodes to collect network statuses.The forwarding probability of the matching ports of the nodes on the path would be updated according to the network statuses.The subsequent interest packet forwarding would be based on the updated forwarding probability.Therefore the content delivery efficiency would be improved.Simulation results show that NSAR can effectively reduce the average delay of content requests and the number of packets in network as well as the network bandwidth overhead compared with the traditional routing algorithm in CCN.…”
Get full text
Article -
14520
Numerical Analysis of Unsaturated Soil Slopes under Rainfall Infiltration Based on the Modified Glasgow Coupled Model
Published 2020-01-01“…Combined with Euler’s backward implicit integration algorithm, a numerical program was established for simulating the proposed model. …”
Get full text
Article