-
14561
STUDY OF LIGHTWEIGHT DESIGN ON GIRDER OF BRIDGE CRANE
Published 2015-01-01“…In this paper,taking the bridge crane with 20t- 22. 5m as an example,utilization of ANSYS and multidisciplinary design optimization software Isight,based on the theory of Latin hypercube design,BP neural network,Hooke-Jeeves algorithm,presenting a better and faster optimization method for main girder of bridge crane. …”
Get full text
Article -
14562
Inter layer up-sampling filtering scheme applied in SVC
Published 2008-01-01“…An efficient inter layer up-sampling filtering algorithm in scalable video coding (SVC) was proposed. …”
Get full text
Article -
14563
Adaptive weighted progressive iterative approximation based on coordinate decomposition.
Published 2025-01-01“…Numerical experiment results indicate that this vector decomposition technique is a critical mathematical operation for improving algorithm efficiency and precisely adjusting the shapes of curves or surfaces to approximate the data set.…”
Get full text
Article -
14564
Methodology of 5G network planning and design for vertical industry with product solutions
Published 2021-06-01“…The methodology of 5G toB network planning was discussed.The current situation of 5G network was introduced and the challenges of network planning were analyzed for vertical industry requirements with diversification and customization.Then the methodology of 5G toB scenario-oriented planning and design was put forward, based on the network technology system, oriented the future business layout of the industry, focused on the planning ability of accurate identification, on-demand delivery and network elasticity, so as to achieve the goal of on-demand planning and agile network construction.At the same time, on the basis of methodology, an end-to-end planning and design platform algorithm was proposed to achieve the collaborative planning for toC (public network) and toB (vertical network).…”
Get full text
Article -
14565
Overview of reconfigurable intelligent surface for new-generation mobile communication
Published 2022-10-01“…Reconfigurable intelligent surface technology, which features low cost, low energy consumption and easy deployment, is the potential key technology of 6G.By intelligently regulating electromagnetic waves in space, RIS can assist in building an intelligent and controllable wireless electromagnetic environment, thus providing a new paradigm for the development of mobile communications.Firstly, the basic principle, main technology advantages and application scenarios were analyzed.Then, the key technologies such as channel estimation and beamforming in RIS aided communication transmission were discussed, and relevant research suggestions were given.Finally, the main challenges of RIS technology in practical application were analyzed from the aspects of hardware implementation, algorithm design and network deployment.…”
Get full text
Article -
14566
Research on the efficiency of replication-based storage mechanism
Published 2013-07-01“…An algorithm-independent description model was established for the ism, and both efficiency-related and efficiency-independent parameters were identified. …”
Get full text
Article -
14567
Robust estimator for indoor node localization
Published 2008-01-01“…A novel indoor localization algorithm was presented, which employs robust estimator to identify and restrain ranging outliers or gross errors and uses DFP (davidon fletcher powell) method to majorize the global object function with a convergence within 2 steps. …”
Get full text
Article -
14568
States and Parameters Estimation for Induction Motors Based on a New Adaptive Moving Horizon Estimation
Published 2022-01-01“…The estimator used is based on a least squares algorithm but includes a dead zone that ensures robustness and a variable forgetting factor that is based on the constant information principle. …”
Get full text
Article -
14569
English Writing Correction Based on Intelligent Text Semantic Analysis
Published 2022-01-01“…In order to improve the teaching effect of English writing, this paper combines the intelligent text semantic analysis algorithm to construct an English writing correction model. …”
Get full text
Article -
14570
Round-priority-based anti-collision tag identification method in a mobile radio-frequency identification system
Published 2019-05-01“…In this article, we proposed a novel tag anti-collision identification method based on tags’ priority called RPA in the mobile radio-frequency identification system. The algorithm sets the priority of recognition according to the sequence of tag entering the recognition area. …”
Get full text
Article -
14571
Multi-layered based network security defense system
Published 2007-01-01“…A multi-layered based network security defense system(MNSDS) was presented.MNSDS adopts multi-layered detection technology: for the detection of IP layer,aggregate-based congestion control algorithm(ABCC) was adopted,narrowing the congestion signature,and thus minimizing collateral damage;then,it employs the detection technology based on the artificial immune principle in TCP and UDP layers AIPT,and detects intrusion by creating a rule database and matching the appropriate rule.The simulation results indicate that the system not only can provide relief from DoS/DDoS attacks equally,but also resolve problems existing in the current defense systems such as low speed high false positive probability and high false positive probability,poor real-time and more artificial interventions.…”
Get full text
Article -
14572
Statics Analysis on Safe Manipulator based on Torque Limiter
Published 2015-01-01“…Finally,through the MATLAB algorithm programming,the simplicity and effectiveness of the method steps are verified by numerical examples,which provide a control theoretical basis for manipulator architecture and configuration to calibrate torque limiter.…”
Get full text
Article -
14573
Distributed relay assignment and power allocation for full-duplex two-way relaying in wireless sensor networks
Published 2017-10-01“…The relay assignment subproblem is solved by a stable matching approach based on Gale–Shapley algorithm, while the power allocation of each cooperative link is solved by sequential convex approximation method. …”
Get full text
Article -
14574
Navigation Control Method of Indoor Mobile Robot Based on Visual Servo
Published 2022-01-01“…For the problem that the target may be out of the camera’s field of view during the servo process, a control algorithm with field-of-view constraints is proposed, which assigns a certain weight to the image feature error at each moment. …”
Get full text
Article -
14575
Design of Electric Vehicle Two-speed Transmission Ratio based on NEDC
Published 2020-01-01“…Aiming at the design of transmission ratio for two-speed transmission of pure electric vehicle, under the condition that parameters of vehicle and motor are all determined, choosing the transmission ratios as the design variables, the optimization objective function and constraint conditions are established according to the power consumption of 100 kilometers under NEDC(The New European Driving Cycle) working condition and the dynamic performance design requirements of vehicle, then the improved harmony search algorithm is used to calculate the optimal solution of the optimization model under constraint conditions. …”
Get full text
Article -
14576
Research of the Position Forward Solution of 6-PTRT Parallel Robot
Published 2015-01-01“…The three- dimensional forward solution equations is transformed into solving the optimization problems,and the forward solutions are calculated by using PSO algorithm. The correctness of the mathematical model is verified by comparing between the experimental results and simulation results. …”
Get full text
Article -
14577
Design of SCMA codebook based on chaotic signal and system performance analysis
Published 2019-02-01“…Sparse code multiple access (SCMA) technology is one of the multiple access technology schemes for the new generation of 5G.In order to solve the transmission requirement of massive users,the logistic chaos sequence was proposed instead of the random sequence in the original system to select the codeword.The constellation method based on trellis coded modulation (TCM) subset segmentation with the mapping matrix was used to generate codebook in the encoder,and decoded through message passing algorithm (MPA) detection method.The simulation results show that the bit error rate (BER) is low when the system uses the pseudo-random sequence of chaos to select the codeword,and the system also performs well under the condition of high overload rate.…”
Get full text
Article -
14578
Research and design of distributed high-performance network reptiles based on cloud platform
Published 2017-08-01“…With the arrival of large data age,data has become the most valuable resource.And web crawler technology as an important means of external data collection,has become a standard tool for data analysis.A high-performance,convenient cloud-based crawler architecture design was introduced.The overall structure of the reptile to the distributed design and the design of the sub-module was described in detail.Each module of the crawler was encapsulated in Docker,and Kubernetes was used as the resource scheduling and management of the cluster.In the performance of optimization,the MD5 reset tree algorithm,DNS optimization and asynchronous I/O were adopted.Experimental results show that the performance of crawler has obvious advantages compared with the UN optimized scheme.…”
Get full text
Article -
14579
Comparison of traffic flow prediction based on AR model and BP model
Published 2016-02-01“…Traffic flow modeling plays an important role in routing,MAC algorithm and protocol designs in vehicular Ad Hoc networks (VANET). …”
Get full text
Article -
14580
The nature of meaning in the age of Google. Google, Indexing, Web, Meaning
Published 2004-01-01“…Google's success requires maintaining the secrecy of its parsing algorithm despite the efforts of web authors to gain advantage over the Googlebot. …”
Get full text
Article