Showing 14,641 - 14,660 results of 19,511 for search '"algorithms"', query time: 0.12s Refine Results
  1. 14641

    On coding over the spatial-temporal diversity for reliable transmission scheme in low-duty-cycle WSN by Yu-bo YAN, Pan-long YANG, Lei ZHANG, Zheng-lun QIU, Shan-lin HONG

    Published 2012-06-01
    “…A reliable data delivery scheme for low-duty-cycle wireless sensor networks(WSN)was proposed.Using this scheme,the unique spatial-temporal diversity in low-duty-cycle WSN was explored and exploited.Combining with coding schemes,the proposed scheme could achieve higher energy efficiency and lower delivery delay.The coding block allocation problem over multiple paths was formulated.As it was NP-hard,an approximate algorithm to tackle this difficulty was proposed.The impact of network parameters was further analyzed with experimental methods.Extensive simulations also show that,the coding over the spatial-temporal diversity scheme could achieve relatively reliable and low delay delivery with relatively less energy.…”
    Get full text
    Article
  2. 14642

    Two-Dimensional Fuzzy Spatial Relations: A New Way of Computing and Representation by Nadeem Salamat, El-hadi Zahzah

    Published 2012-01-01
    “…In this paper, we propose a method for combining fuzzy topological and directional relations. We also propose an algorithm for defuzzification of relations which provides us a binary topological and directional relation between a 2D object pair. …”
    Get full text
    Article
  3. 14643

    The use of artificial intelligence in counter-disinformation: a world wide (web) mapping by Federico Pilati, Federico Pilati, Federico Pilati, Tommaso Venturini

    Published 2025-02-01
    “…Thus, there is a growing recognition of the need for benchmarking the various ongoing efforts to ensure greater efficacy and coordination in the use of AI and assure that this does not lead to forms of algorithmic censorship. Our goal is to provide a mapping of the projects that use AI to counter disinformation by means of their hyperlink network analysis to shed light on their aims, approaches, and challenges.…”
    Get full text
    Article
  4. 14644

    Research on caching strategy based on transmission delay in Cell-Free massive MIMO systems by Rui WANG, Min SHEN, Yun HE, Xiangyan LIU

    Published 2021-12-01
    “…To meet the ultra-low latency and ultra-high reliability requirements of users in the future mobile Internet, the wireless caching technology was combined with Cell-Free massive MIMO systems.The caching model was designed based on AP cooperative caching and regional popularity evaluation.The transmission delay expression involving AP clustering, cooperative caching, and regional popularity was derived, and the content placement problem was expressed as total content transmission delay minimization.Through the demonstration of the NP-hard and submodular monotony of the optimization problem, the greedy algorithm-based optimization strategy was proposed.Simulation results show that the proposed strategy can effectively reduce the content transmission delay and improve the cache hit rate.…”
    Get full text
    Article
  5. 14645

    QUANTITATIVE STRUCTURE–ACTIVITY RELATIONSHIPS (QSAR) STUDY ON NOVEL 4-AMIDINOQUINOLINE AND 10-AMIDINOBENZONAPHTHYRIDINE DERIVATIVES AS POTENT ANTIMALARIA AGENT by Aliyu Wappah Mahmud, Gideon Adamu Shallangwa, Adamu Uzairu

    Published 2019-06-01
    “…was used to optimize the compounds. Genetic Function Algorithm (GFA) was employed in selecting descriptors and building the model. …”
    Get full text
    Article
  6. 14646

    Radio tomographic imaging localization method based on the improved ellipse weight model by Li LI, Wei KE, Hengkuan XU, Kunliang YU, Yanli WANG

    Published 2018-12-01
    “…Meanwhile, a foreground detection algorithm based on the cross model was proposed to reduce the impact of background noises and pseudo-targets, thereby further improving the imaging quality. …”
    Get full text
    Article
  7. 14647

    Research on dynamic traffic control strategy of IoT cloud service by Qineng LING, Yichuan WANG, Jiabing YANG, Kan ZHENG

    Published 2018-12-01
    “…Flow control is very important to ensure quality of service in cloud service system.A dynamic two-level flow control strategy was proposed.Using the improved minimum connection number algorithm based on the actual cloud service system,the integrated load of the service node was calculated,load balancing was performed on each service node and the load was distributed reasonably.Within the service node,a dynamic hierarchical threshold adjustment strategy was proposed to control traffic dynamically.The actual cloud service system performance test shows that with the dynamic two-level flow control strategy,the RPS of the service node is significantly better than the RPS without the strategy,and the resource utilization of the service node is improved.…”
    Get full text
    Article
  8. 14648

    APPLICATION RESEARCH OF HIGH STRENGTH STEEL TO COMMERCIAL VEHICLE FRONTAL IMPACT SAFETY DESIGN by LEI Fei, LI GuiTao, XIE XiaoPing

    Published 2017-01-01
    “…Firstly the global sensitivity analysis was carried out to choose the prominent parts,then their material were changed into HSS,the optimization was conducted by employing NAGA- Ⅱ algorithm with their thickness chosen as design variables. …”
    Get full text
    Article
  9. 14649

    New concept for the value function of prospect theory by Kazuo Sano

    Published 2024-11-01
    “…Additionally, we have conducted empirical studies on algorithmic trading strategies that employ different value function specifications.…”
    Get full text
    Article
  10. 14650

    THE EEMD-RA-KU METHOD ON DIAGNOSIS OF BEARING FAULT by WU GuangHe, DING JianMing, LIN JianHui, ZHAO QiuYuan

    Published 2016-01-01
    “…Aiming at the impact feature in fault signals of the rolling bearings,The improved algorithm diagnosis method EEMD-RA-KU was proposed to capture the impact feature. …”
    Get full text
    Article
  11. 14651

    PHOTOEMISSION METHOD OF TEMPERATURE MEASURING IN THE PROCESS OF SPARK PLASMA SINTERING POWDERS OF REFRACTORY METALS by D. V. Minko, O. O. Kuznechik

    Published 2015-04-01
    “…Construction and algorithm of the photoemission pyrometer based on a photomultiplier are outlined; the calibration procedure is set out. …”
    Get full text
    Article
  12. 14652

    Position Tracking Control for Permanent Magnet Linear Motor via Continuous-Time Fast Terminal Sliding Mode Control by Wei Gao, Xiuping Chen, Haibo Du, Song Bai

    Published 2018-01-01
    “…For the position tracking control problem of permanent magnet linear motor, an improved fast continuous-time nonsingular terminal sliding mode control algorithm based on terminal sliding mode control method is proposed. …”
    Get full text
    Article
  13. 14653

    Multiuser computation offloading for edge-cloud collaboration using submodular optimization by Bing LIANG, Wen JI

    Published 2020-10-01
    “…A computation offloading scheme based on edge-cloud computing was proposed to improve the system utility of multiuser computation offloading.This scheme improved the system utility while considering the optimization of edge-cloud resources.In order to tackle the problems of computation offloading mode selection and edge-cloud resource allocation,a greedy algorithm based on submodular theory was developed by fully exploiting the computing and communication resources of cloud and edge.The simulation results demonstrate that the proposed scheme effectively reduces the delay and energy consumption of computing tasks.Additionally,when computing tasks are offloaded to edge and cloud from devices,the proposed scheme still maintains stable system utilities under ultra-limited resources.…”
    Get full text
    Article
  14. 14654

    AI in enhancing cultural sensitivity by Dwi Mariyono, Mufidul Abror

    Published 2024-12-01
    “…However, challenges such as algorithmic bias and unequal access persist, underscoring the need for ethical frameworks and culturally responsive pedagogies. …”
    Get full text
    Article
  15. 14655

    METHODOLOGICAL BASIS FOR ESTIMATING THE LIFE CYCLE COST OF AIRCRAFT ENGINE, TAKING INTO ACCOUNT THE ATTENDANT RISKS by E. A. Ozdoeva, O. A. Smolyakov

    Published 2020-03-01
    “…At this stage, it is necessary to describe clearly the algorithm that will be the basis for the risk assessment of the aircraft engine development.…”
    Get full text
    Article
  16. 14656

    Multi-factor identity authentication scheme for trusted sharing of cultural resources by Miaomiao WANG, Lanlan RUI, Siya XU

    Published 2023-10-01
    “…To solve the problems of data leakage and identity impersonation caused by traditional single factor authentication, a multi-factor identity authentication scheme based on blockchain was proposed for the trusted sharing of cultural resources.Considering a variety of identity factors, a heterogeneous digital identity model was constructed using the tamper resistance and distribution of the blockchain distributed ledger.Through asymmetric encryption algorithm and exclusive OR (XOR) operation, the trusted reuse of heterogeneous digital identity and fast authentication of multi-agent access were realized.Security analysis and simulation results show that the proposed scheme outperforms existing multi-factor authentication schemes in terms of security and efficiency, and can effectively reduce the cost of identity authentication.…”
    Get full text
    Article
  17. 14657

    Development of a GPU-enhanced time-dependent Monte Carlo neutron transport version of McCARD by Ko Woo Kyoung, Jeong Seong Jeong, Kim Young In, Shim Hyung Jin

    Published 2024-01-01
    “…This version introduces an MC neutron tracking module that employs an event-based algorithm and features a generalized lattice geometry treatment module. …”
    Get full text
    Article
  18. 14658

    Design of a Small Quadruped Robot with Parallel Legs by Ming Lu, Baorui Jing, Hao Duan, Guanbin Gao

    Published 2022-01-01
    “…The rotation angle of each actuator for the quadruped robot is analyzed by the inverse kinematics algorithm. Moreover, the trajectory of the foot-end, including support and swing phases, is planned to reduce the impact between the foot-end and the ground. …”
    Get full text
    Article
  19. 14659

    Optimal strategy selection method for moving target defense based on signaling game by Lyu JIANG, Hengwei ZHANG, Jindong WANG

    Published 2019-06-01
    “…To solve the problem of the optimal strategy selection for moving target defense,the defense strategy was defined formally,the defense principle from the perspective of attack surface shifting and exploration surface enlarging was taken into account.Then,network attack-defense behaviors were analyzed from the sight of dynamic confrontation and bounded information.According to the analysis of attack-defense game types and confrontation process,the moving target defense model based on signaling game was constructed.Meanwhile,the method to quantify strategies was improved and the solution of perfect Bayesian equilibrium was proposed.Furthermore,the optimal defense strategy selection algorithm was designed by the equilibrium analysis.Finally,the simulation demonstrates the effectiveness and feasibility of the proposed optimal strategy and selection method.…”
    Get full text
    Article
  20. 14660

    Defense decision-making method based on incomplete information stochastic game and Q-learning by Hongqi ZHANG, Junnan YANG, Chuanfu ZHANG

    Published 2018-08-01
    “…Most of the existing stochastic games are based on the assumption of complete information,which are not consistent with the fact of network attack and defense.Aiming at this problem,the uncertainty of the attacker’s revenue was transformed to the uncertainty of the attacker type,and then a stochastic game model with incomplete information was constructed.The probability of network state transition is difficult to determine,which makes it impossible to determine the parameter needed to solve the equilibrium.Aiming at this problem,the Q-learning was introduced into stochastic game,which allowed defender to get the relevant parameter by learning in network attack and defense and to solve Bayesian Nash equilibrium.Based on the above,a defense decision algorithm that could learn online was designed.The simulation experiment proves the effectiveness of the proposed method.…”
    Get full text
    Article