Showing 14,521 - 14,540 results of 19,511 for search '"algorithms"', query time: 0.09s Refine Results
  1. 14521

    FAULT DIAGNOSIS OF RECIPROCATING COMPRESSOR ON THE RESONANCE-BASED SPARSE SIGNAL DECOMPOSITION WITH OPTIMAL Q-FACTOR by WANG JinDong, BU QingChao, ZHAO HaiYang, ZHANG HongBin

    Published 2019-01-01
    “…Reciprocating compressor vibration signal is typical nonlinear and non-stationary,and the vibration information interference coupling, owing to this problem,a fault diagnosis method of reciprocating compressor on the resonance-based sparse signal decomposition with optimal Q-factor was proposed.The method use resonance sparse decomposition to find the low resonance component which its kurtosis is maximum, optimize Q-factor with genetic algorithm and particle swarm optimization to get the optimal Q-factor;then use resonance sparse decomposition to decompose reciprocating compressor vibration signal by the optimal Q-factor;the result shows that this method can diagnose the oversized bearing clearance fault effectively.…”
    Get full text
    Article
  2. 14522
  3. 14523

    Retroperitoneal Extrarenal Angiomyolipomas: An Evidence-Based Approach to a Rare Clinical Entity by Emmanuel J. Minja, Megan Pellerin, Nicole Saviano, Ronald S. Chamberlain

    Published 2012-01-01
    “…Our case report provides a comprehensive literature review and an evidence-based algorithm for taking care of patients with ERAMLs.…”
    Get full text
    Article
  4. 14524

    Dynamic interference coordination scheme based on the iterative joint transmission in ultra dense network by Xiaona LI, Zhongfang WANG, Qian CHENG, Jingwen FU, Shunliang ZHANG

    Published 2020-02-01
    “…In consideration of the rapidly increasing number of cells and users in the ultra-dense network,how to realize dynamic interference coordination by selecting the appropriate joint transmission users was studied,so as to improve the spectral efficiency of the edge users.All users were classified by dynamic coordination cluster division and dynamic joint-muting transmission.The iterative optimization algorithm was used to further improve the system performance and solve the problem of selecting the number of joint transmission users.The simulation results prove that compared with the conventional CoMP JT scheme,the proposed scheme has significant performance gains in the cell edge spectral efficiency without reducing the cell average spectral efficiency.…”
    Get full text
    Article
  5. 14525

    Fully Discrete Finite Element Approximation for the Stabilized Gauge-Uzawa Method to Solve the Boussinesq Equations by Jae-Hong Pyo

    Published 2013-01-01
    “…The stabilized Gauge-Uzawa method (SGUM), which is a 2nd-order projection type algorithm used to solve Navier-Stokes equations, has been newly constructed in the work of Pyo, 2013. …”
    Get full text
    Article
  6. 14526

    Active stabilization of a chaotic urban system by Günter Haag, Tilo Hagel, Timm Sigg

    Published 1997-01-01
    “…Therefore, the system and its parameters are changed during the control process only. The algorithm is applied to an urban system within a metropolitan area obeying a Lorenz-type dynamics as well as to the Hénon attractor as an example for a discrete scenario.…”
    Get full text
    Article
  7. 14527

    Hybrid TOA/AOA Approximate Maximum Likelihood Mobile Localization by Mohamed Zhaounia, Mohamed Adnan Landolsi, Ridha Bouallegue

    Published 2010-01-01
    “…This letter deals with a hybrid time-of-arrival/angle-of-arrival (TOA/AOA) approximate maximum likelihood (AML) wireless location algorithm. Thanks to the use of both TOA/AOA measurements, the proposed technique can rely on two base stations (BS) only and achieves better performance compared to the original approximate maximum likelihood (AML) method. …”
    Get full text
    Article
  8. 14528

    Research on extended access control mechanism in online social network by Rongna XIE, Xiaonan FAN, Lin YUAN, Zichen GUO, Jiayu ZHU, Guozhen SHI

    Published 2021-10-01
    “…Aiming at the problem of inability to extend control over the data published by users in social networks, an extended access mechanism based on privacy labels was proposed.This mechanism granted users and data different types of labels based on the number of user relationship hops and resource forwarding hops, so as to achieve fine-grained extended access control to the data.The generation algorithm and distribution method of privacy labels were proposed.The constraint rules of privacy label were designed and the possible policy conflicts were analyzed.Finally, the test proves that the mechanism achieves fine-grained extended control in social networks, and proves its security and validity of the mechanism.…”
    Get full text
    Article
  9. 14529

    Detection of Fuzzy Association Rules by Fuzzy Transforms by Ferdinando Di Martino, Salvatore Sessa

    Published 2012-01-01
    “…In the extraction of the fuzzy association rules we use the AprioriGen algorithm and a confidence index calculated via the inverse fuzzy transform. …”
    Get full text
    Article
  10. 14530

    Distributed fair cooperative routing in multi-gates wireless mesh network by Hong QIAO, Da-fang ZHANG, Kun XIE, Shi-ming HE, Ji ZHANG

    Published 2015-02-01
    “…Existing cooperative routings cannot fairly allocate the wireless resources,which results in that the throughput of minimum flow cannot satisfy the performance requirement.The multiple flow cooperative routing problem is formulated as a convex optimization problem with the goal of maximizing network utility.Based on dual decomposition and subgradient method,a distributed fair cooperative routing algorithm in multi-gates wireless mesh network-FCRMG is proposed.The simulation results show that,FCRMG can largely improve the throughput of the minimum flow without decreasing the total network throughput,compared with uncooperative routing based on expected transmission time metric and cooperative routing based on contention aware metric.…”
    Get full text
    Article
  11. 14531

    Cookie based online tracing method for cyberlockers resource by Hai-lun LIN, Yan LI, Wei-ping WANG, Yin-liang YUE, Zheng LIN

    Published 2016-12-01
    “…Meanwhile, through cumula-tive hash algorithm, it can speed up the validation of tracing results. …”
    Get full text
    Article
  12. 14532

    Analysis and improvement of an identity-based signature scheme from lattices by ANGChun-li Y, ANJian-hua Y, HENGShi-hui Z, ANGLi-cheng W, ANGYu Y

    Published 2015-05-01
    “…Liu et al proposed an identity-based signature from lattices in 2013,and proved that it can achieve strong un-forgeability in the standard model.Through analysis,the security proof of this scheme has some defect,and then show that the scheme cannot prove the strong unforgeability under selective identity and adaptive chosen-message attacks.Then,using Boyen signing technique (PKC 2010) inpoves the signing algorithm,and proves the strong unforgeability under selective identity and adaptive chosen-message attacks (SU-sID-CMA) in the standard model.In addition,it com-pares the efficiency and security of the scheme and the other identity-based signatures from lattices.…”
    Get full text
    Article
  13. 14533

    An Entropy Based Anomaly Traffic Detection Approach in SDN by Mingxin Wang, Huachun Zhou, Jia Chen, Hongke Zhang

    Published 2015-09-01
    “…The attacks can be detected based on the entropy variation of the identifier and locate the type of attack with the classification algorithm. As the anomaly patterns were detected, the security center would cooperate with the central controller to install the flow table to alleviate the influence of the attack. …”
    Get full text
    Article
  14. 14534

    Alert processing based on attack graph and multi-source analyzing by Wei-xin LIU, Kang-feng ZHENG, Bin WU, Yi-xian YANG

    Published 2015-09-01
    “…Current attack graph-based alert correlation cannot deal with graph relation between alerts properly,and a large number of redundant attack paths may arise when trying to find out missing alerts and predict future attacks.A multi-source alert analyzing method was proposed,fully utilizing graph relation and threshold to correlate mapped alerts and eventually reduce false positive rate as well as true negative rate.To improve the speed of the algorithm,a parallel alert processing system (AG-PAP) was proposed.AG-PAP is tested on distributed environment which gets satisfied effec-tiveness and performance.…”
    Get full text
    Article
  15. 14535

    A New Technique for Solving Neutral Delay Differential Equations Based on Euler Wavelets by Mutaz Mohammad, Alexander Trounev

    Published 2022-01-01
    “…Based on the operational matrix, the neutral delay differential equations are reduced to a system of algebraic equations, which is solved through a numerical algorithm. The effectiveness and efficiency of the technique have been illustrated by several examples of neutral delay differential equations. …”
    Get full text
    Article
  16. 14536

    Channel impulse response insensitive feature for non-coherent signal detection in molecular communication by Limin XIAO, Xiangrong XU, Zhuangkun WEI, Shenghan LIU, Yiwen LIU

    Published 2020-09-01
    “…To solve the inter-symbol interference (ISI) and background noise challenges of molecular communication via diffusion (MCvD),four ISI-resistant signal-features were deployed,and a reliable non-coherent signal detection algorithm,which was insensitive to different types of molecular channel impulse response (CIR),was proposed.Also,an adaptive decision threshold and theoretical bound of bit error rate (BER) were deduced.Simulation results demonstrate a lower BER of the proposed non-coherent scheme compared to the state-of-the-art schemes in the same order of computational complexity,therefore suggesting its potential applications for future nano-scale MC.…”
    Get full text
    Article
  17. 14537

    Analysis and Optimization on Workspace of 2-PrRS-PR(P)S Parallel Metamorphic Mechanism by Ma Kun, Ma Hongwei, Tian Haibo

    Published 2020-03-01
    “…Aiming at the maximized workspace volume,the optimized structural parameters is obtained by Genetic Algorithm and single variable analysis.…”
    Get full text
    Article
  18. 14538

    Next generation network resource allocation method based on cooperative game and decision-making in advance by RAO Xiang, ZHANG Shun-yi, SUN Yan-fei, DING Wen-tao

    Published 2009-01-01
    “…It’s an important way to guarantee QoS for the next generation network(NGN) with diverse services by allo-cating resources reasonably and optimizing the efficiency of whole network according to diverse service styles.A net-work resource allocating method based on co-operative game theory for NGN was proposed and analyzed,and it had a weakness which brought about overgreat system costing.In order to overcome this weakness,an idea about deci-sion-making in advance was added,and an improved resource allocation algorithm was proposed,which could guarantee the efficiency of whole network best and reduce the system costing.Simulation results of this method show its validity.…”
    Get full text
    Article
  19. 14539

    Determination of symmetry plane on human brain CT images by Darius Grigaitis, Mečys Meilūnas

    Published 2023-11-01
    “… A method of automatic detection of human brain symmetry plain in computed tomography (CT) images is  described. An algorithm consists of four steps: region of interest, symmetry curve detection, symmetry axis evaluation and calculation of symmetry plane. …”
    Get full text
    Article
  20. 14540

    Optimization and Performance Analysis of Rail-Train Coupling System with Inerters by Shichang Han, Xian Wang, Chunxi Yang, Guowei Xie, Zhongcheng Qiu, Chen Wang

    Published 2021-01-01
    “…Optimizations for only inertance and all suspension parameters are carried out by the particle swarm algorithm (PSO). Performance benefits for both the train and the rail system are demonstrated and suspension layouts with inerters connected in parallel and series are compared with the traditional one in both time domain and frequency domain.…”
    Get full text
    Article