Showing 14,561 - 14,580 results of 19,511 for search '"algorithms"', query time: 0.09s Refine Results
  1. 14561

    STUDY OF LIGHTWEIGHT DESIGN ON GIRDER OF BRIDGE CRANE by TANG Hui, YU LanFeng, YAN Fei, ZHAO DengShan

    Published 2015-01-01
    “…In this paper,taking the bridge crane with 20t- 22. 5m as an example,utilization of ANSYS and multidisciplinary design optimization software Isight,based on the theory of Latin hypercube design,BP neural network,Hooke-Jeeves algorithm,presenting a better and faster optimization method for main girder of bridge crane. …”
    Get full text
    Article
  2. 14562

    Inter layer up-sampling filtering scheme applied in SVC by WANG Zhang1, LIU Jian2, YAN Guo-ping2

    Published 2008-01-01
    “…An efficient inter layer up-sampling filtering algorithm in scalable video coding (SVC) was proposed. …”
    Get full text
    Article
  3. 14563

    Adaptive weighted progressive iterative approximation based on coordinate decomposition. by Yushi Liu, Yan Wang, Chengzhi Liu

    Published 2025-01-01
    “…Numerical experiment results indicate that this vector decomposition technique is a critical mathematical operation for improving algorithm efficiency and precisely adjusting the shapes of curves or surfaces to approximate the data set.…”
    Get full text
    Article
  4. 14564

    Methodology of 5G network planning and design for vertical industry with product solutions by Ziyu XIAO, Hongwei LV, Cun ZHAO, Yan HAN, Jian SU

    Published 2021-06-01
    “…The methodology of 5G toB network planning was discussed.The current situation of 5G network was introduced and the challenges of network planning were analyzed for vertical industry requirements with diversification and customization.Then the methodology of 5G toB scenario-oriented planning and design was put forward, based on the network technology system, oriented the future business layout of the industry, focused on the planning ability of accurate identification, on-demand delivery and network elasticity, so as to achieve the goal of on-demand planning and agile network construction.At the same time, on the basis of methodology, an end-to-end planning and design platform algorithm was proposed to achieve the collaborative planning for toC (public network) and toB (vertical network).…”
    Get full text
    Article
  5. 14565

    Overview of reconfigurable intelligent surface for new-generation mobile communication by Zilu GAO, Shaohui SUN, Li LI

    Published 2022-10-01
    “…Reconfigurable intelligent surface technology, which features low cost, low energy consumption and easy deployment, is the potential key technology of 6G.By intelligently regulating electromagnetic waves in space, RIS can assist in building an intelligent and controllable wireless electromagnetic environment, thus providing a new paradigm for the development of mobile communications.Firstly, the basic principle, main technology advantages and application scenarios were analyzed.Then, the key technologies such as channel estimation and beamforming in RIS aided communication transmission were discussed, and relevant research suggestions were given.Finally, the main challenges of RIS technology in practical application were analyzed from the aspects of hardware implementation, algorithm design and network deployment.…”
    Get full text
    Article
  6. 14566

    Research on the efficiency of replication-based storage mechanism by Xiang-yu LUO, Yun WANG, Xiao-mei CHEN, Fei-fei YUAN, Con LI

    Published 2013-07-01
    “…An algorithm-independent description model was established for the ism, and both efficiency-related and efficiency-independent parameters were identified. …”
    Get full text
    Article
  7. 14567

    Robust estimator for indoor node localization by ZHAO Fang1, MA Yan1, 3, LUO Hai-yong 4

    Published 2008-01-01
    “…A novel indoor localization algorithm was presented, which employs robust estimator to identify and restrain ranging outliers or gross errors and uses DFP (davidon fletcher powell) method to majorize the global object function with a convergence within 2 steps. …”
    Get full text
    Article
  8. 14568

    States and Parameters Estimation for Induction Motors Based on a New Adaptive Moving Horizon Estimation by Steve Alan Talla Ouambo, Alexandre Teplaira Boum, Adolphe Moukengue Imano

    Published 2022-01-01
    “…The estimator used is based on a least squares algorithm but includes a dead zone that ensures robustness and a variable forgetting factor that is based on the constant information principle. …”
    Get full text
    Article
  9. 14569

    English Writing Correction Based on Intelligent Text Semantic Analysis by Shuang Yang

    Published 2022-01-01
    “…In order to improve the teaching effect of English writing, this paper combines the intelligent text semantic analysis algorithm to construct an English writing correction model. …”
    Get full text
    Article
  10. 14570

    Round-priority-based anti-collision tag identification method in a mobile radio-frequency identification system by Liqian Zhang, Xueliang Fu, Honghui Li

    Published 2019-05-01
    “…In this article, we proposed a novel tag anti-collision identification method based on tags’ priority called RPA in the mobile radio-frequency identification system. The algorithm sets the priority of recognition according to the sequence of tag entering the recognition area. …”
    Get full text
    Article
  11. 14571

    Multi-layered based network security defense system

    Published 2007-01-01
    “…A multi-layered based network security defense system(MNSDS) was presented.MNSDS adopts multi-layered detection technology: for the detection of IP layer,aggregate-based congestion control algorithm(ABCC) was adopted,narrowing the congestion signature,and thus minimizing collateral damage;then,it employs the detection technology based on the artificial immune principle in TCP and UDP layers AIPT,and detects intrusion by creating a rule database and matching the appropriate rule.The simulation results indicate that the system not only can provide relief from DoS/DDoS attacks equally,but also resolve problems existing in the current defense systems such as low speed high false positive probability and high false positive probability,poor real-time and more artificial interventions.…”
    Get full text
    Article
  12. 14572

    Statics Analysis on Safe Manipulator based on Torque Limiter by Chen Guilan, Cao Yi, Wang Qiang

    Published 2015-01-01
    “…Finally,through the MATLAB algorithm programming,the simplicity and effectiveness of the method steps are verified by numerical examples,which provide a control theoretical basis for manipulator architecture and configuration to calibrate torque limiter.…”
    Get full text
    Article
  13. 14573

    Distributed relay assignment and power allocation for full-duplex two-way relaying in wireless sensor networks by Song Li, Shuo Li, Yanjing Sun

    Published 2017-10-01
    “…The relay assignment subproblem is solved by a stable matching approach based on Gale–Shapley algorithm, while the power allocation of each cooperative link is solved by sequential convex approximation method. …”
    Get full text
    Article
  14. 14574

    Navigation Control Method of Indoor Mobile Robot Based on Visual Servo by Chongfu Huang, Wei Zhang

    Published 2022-01-01
    “…For the problem that the target may be out of the camera’s field of view during the servo process, a control algorithm with field-of-view constraints is proposed, which assigns a certain weight to the image feature error at each moment. …”
    Get full text
    Article
  15. 14575

    Design of Electric Vehicle Two-speed Transmission Ratio based on NEDC by Shuwang Wang, Jian Liu, Zhilin Ma, Leiming Wang

    Published 2020-01-01
    “…Aiming at the design of transmission ratio for two-speed transmission of pure electric vehicle, under the condition that parameters of vehicle and motor are all determined, choosing the transmission ratios as the design variables, the optimization objective function and constraint conditions are established according to the power consumption of 100 kilometers under NEDC(The New European Driving Cycle) working condition and the dynamic performance design requirements of vehicle, then the improved harmony search algorithm is used to calculate the optimal solution of the optimization model under constraint conditions. …”
    Get full text
    Article
  16. 14576

    Research of the Position Forward Solution of 6-PTRT Parallel Robot by Xu Jing, Deng Zilong, Zheng Dongzhi

    Published 2015-01-01
    “…The three- dimensional forward solution equations is transformed into solving the optimization problems,and the forward solutions are calculated by using PSO algorithm. The correctness of the mathematical model is verified by comparing between the experimental results and simulation results. …”
    Get full text
    Article
  17. 14577

    Design of SCMA codebook based on chaotic signal and system performance analysis by Geng ZHAO, Yanyan MA, Yingjie MA

    Published 2019-02-01
    “…Sparse code multiple access (SCMA) technology is one of the multiple access technology schemes for the new generation of 5G.In order to solve the transmission requirement of massive users,the logistic chaos sequence was proposed instead of the random sequence in the original system to select the codeword.The constellation method based on trellis coded modulation (TCM) subset segmentation with the mapping matrix was used to generate codebook in the encoder,and decoded through message passing algorithm (MPA) detection method.The simulation results show that the bit error rate (BER) is low when the system uses the pseudo-random sequence of chaos to select the codeword,and the system also performs well under the condition of high overload rate.…”
    Get full text
    Article
  18. 14578

    Research and design of distributed high-performance network reptiles based on cloud platform by Enming SHI, Xiaojun XIAO, Yu LU

    Published 2017-08-01
    “…With the arrival of large data age,data has become the most valuable resource.And web crawler technology as an important means of external data collection,has become a standard tool for data analysis.A high-performance,convenient cloud-based crawler architecture design was introduced.The overall structure of the reptile to the distributed design and the design of the sub-module was described in detail.Each module of the crawler was encapsulated in Docker,and Kubernetes was used as the resource scheduling and management of the cluster.In the performance of optimization,the MD5 reset tree algorithm,DNS optimization and asynchronous I/O were adopted.Experimental results show that the performance of crawler has obvious advantages compared with the UN optimized scheme.…”
    Get full text
    Article
  19. 14579

    Comparison of traffic flow prediction based on AR model and BP model by Tingting ZHANG, Wuxiong ZHANG, Dong PEI, Cheng ZHAO, Han YU

    Published 2016-02-01
    “…Traffic flow modeling plays an important role in routing,MAC algorithm and protocol designs in vehicular Ad Hoc networks (VANET). …”
    Get full text
    Article
  20. 14580

    The nature of meaning in the age of Google. Google, Indexing, Web, Meaning by Terrence A. Brooks

    Published 2004-01-01
    “…Google's success requires maintaining the secrecy of its parsing algorithm despite the efforts of web authors to gain advantage over the Googlebot. …”
    Get full text
    Article