-
14681
DEEP NEURAL NETWORK-BASED APPROACH FOR COMPUTING SINGULAR VALUES OF MATRICES
Published 2025-01-01“…The proposed CNN-based SVD method is evaluated against the conventional SVD algorithm, demonstrating superior performance in terms of computational time and accuracy. …”
Get full text
Article -
14682
Synchronization of a New Chaotic System Using Adaptive Control: Design and Experimental Implementation
Published 2023-01-01“…With the aim of verifying the feasibility and performance of the proposed approach, a comparison with an active control algorithm is developed at the numerical simulation level. …”
Get full text
Article -
14683
Survivability evaluation of network information system based on the cloud model and analytic hierarchy process
Published 2014-08-01“…Considering the problem of quantitative evaluation for qualitative survivability data and indexes of network information systems, the proposed method gives a multi-level survivability evaluation framework based on cloud model theory and AHP method. The algorithm builts a multi-level evaluation indexes system and compute the weight of each index using AHP method. …”
Get full text
Article -
14684
METHOD OF FAULT FEATURE EXTRATION BASED ON CEEMD AND FASTICA
Published 2018-01-01“…First,analyze the CEEMD vibration signals,decompose them into intrinsic mode function( IMF) components signal of different scales; then through the sensitivity evaluation algorithm,decompose and recombine the signals,and use Fast ICA to reduce their noise; in the end,conduct Hilbert envelope spectrum analysis to the signals separated by the Fast ICA,to obtain the fault feature information. …”
Get full text
Article -
14685
Fuzzy-Approximation-Based Novel Back-Stepping Control of Flexible Air-Breathing Hypersonic Vehicles with Nonaffine Models
Published 2019-01-01“…For the unknown functions and uncertainties in each subsystem, fuzzy approximators are used to approximate the total uncertainties, and norm estimation approach is introduced to reduce the computational complexity of the algorithm. Aiming at the saturation problem of actuator, a saturation auxiliary system is designed to transform the original control problem with input constraints into a new control problem without input constraints. …”
Get full text
Article -
14686
SOCIAL TECHNOLOGY OF UNIVERSITY INTERACTION MANAGEMENT WITH STAKEHOLDERS AS A TOOL FOR INCREASING COMPETITIVENESS
Published 2019-06-01“…As an experiment, an experience in the development and implementation of social technology for the organization of interaction of Lipetsk State Technical University with stakeholders has been adduced. The algorithm, principles and tasks of interaction of the educational organization with stakeholders and its place in the strategic management of the University have been described. …”
Get full text
Article -
14687
Fault Diagnosis of Vehicle Gearbox based on Support Vector Machine Optimized by Improved Beetle Antennae Search
Published 2022-05-01“…Compared with BAS,IBAS modified the step size formula and added Gaussian variation behavior,so that the search ability of the algorithm in the early and late period is balanced and has the ability to jump out of the local optimal,and better SVM parameters could be obtained. …”
Get full text
Article -
14688
Method for quality assessment of image mosaic
Published 2013-08-01“…On the basis of the theory of existing methods for image quality assessment,a novel method for quality assessment of mosaicked image based on the information of image edge was presented.The method was in accordance with the features of mosaicked image.Firstly,the edges of image were detected.Then according to the information of image edges,the information of pixel error and structure was considered.The mean value and variance of the difference of edge map were related with the misplacement and the brightness mutation,which influenced the quality of mosaicked image.Lastly,the evaluate procedure was done based on the relationship.The new method was more consistent with the subjective feeling to the mosaicked image quality.This method accurately reflects the real quality of mosaicked image and the performance of the algorithm of image mosaic.…”
Get full text
Article -
14689
LEO mega-constellation network:networking technologies and state of the art
Published 2022-05-01“…The emerging low earth orbit (LEO) mega-constellation network (MCN) represented by Starlink and OneWeb were studied.The system architecture and basic working modes were introduced, and the main features of the emerging broadband MCN were summarized.Based on the system architecture of MCN, the methodology and research progress of five key technologies were investigated and summarized, including network topology dynamics management, space-ground handover scheme, high-efficiency routing algorithm design, gateway placement design, network simulation and performance evaluation.The focus was on recent mega-constellation-related studies.The challenges caused by the large scale and complexity of MCN and the applicability of existing techniques and solutions in MCN were analyzed.…”
Get full text
Article -
14690
Fuzzy Comprehensive Safety Evaluation of Pipeline Disaster in China-Russia Crude Oil Permafrost Region Based on Improved Analytic Hierarchy Process-Entropy Weight Method
Published 2022-01-01“…A comprehensive weight determination method based on improved fuzzy analytic hierarchy process, entropy weight method and Lagrange algorithm is proposed, and a fuzzy comprehensive evaluation model of permafrost pipeline safety is established. …”
Get full text
Article -
14691
A FAULT DIAGNOSIS METHOD BASED ON IMPROVED ARTIFICAL BEE COLONY OPTIMIZE SUPPORT VECTOR MACHINE
Published 2018-01-01“…In order to improve search ability of ABC,Levy flight strategy was introduced and improved the original ABC algorithm. Use the IABC to optimize SVM parameters can effectively improve the classification performance of SVM. …”
Get full text
Article -
14692
A novel chaotic system with one absolute term: stability, ultimate boundedness, and image encryption
Published 2025-01-01“…The system is combined with the 4×4 Toeplitz matrix to generate an encryption algorithm, validated using security and performance analysis. …”
Get full text
Article -
14693
A New Type-2 Soft Set: Type-2 Soft Graphs and Their Applications
Published 2017-01-01“…Finally, we describe an application of type-2 soft graphs in communication networks and present procedure as an algorithm.…”
Get full text
Article -
14694
SOME PROBLEMS OF STUDENT INDIVIDUAL WORK ORGANIZATION AT TECHNICAL UNIVERSITY
Published 2017-07-01“…Among them the authors mark out the discrepancy between the traditional interpretation of a term “student individual work” by the academic community and its treatment by the Ministry of Education and Science of the Russian Federation, the low students’ motivation to individual work, the lack of a clear selection algorithm of certain forms and methods of individual work that have already proved their efficiency and understandable for lecturers, university teachers’ disregard to different levels of students’ preparedness to self- dependent work. …”
Get full text
Article -
14695
Improved method of Tor network flow watermarks based on IPD interval
Published 2019-08-01“…Tor is an anonymous network mechanism that provides services for hiding traffic sources,but it has the problem that the entry traffic flows of Tor are clearly identifiable.Bridge protocols such as obfs4 come into being to solve this problem,which brings new challenges that have not yet been overcome.An IPD interval scheme is proposed,which uses the clustering characteristics of k-means to improve the original scheme,so that the added flow watermark can be detected efficiently in the three modes of obfs4 bridges.The results of experiments show that the improved algorithm has higher detection rate and recognition rate,and has good adaptability to variable netflow traffic,which is conducive to the construction of a nice secure network environment.…”
Get full text
Article -
14696
Efficient traceable identity-based signature scheme
Published 2009-01-01“…Compared with the existing schemes without suffering from key escrow, the scheme is the most efficient scheme and the signing algorithm needs only one scalar multiplication in the additive group while the reverse operation requires only three scalar multiplications.…”
Get full text
Article -
14697
Control Allocation Design of Reaction Control System for Reusable Launch Vehicle
Published 2014-01-01“…In this paper, an indexed control method was proposed for RCS preallocation, a 0-1 integer programming algorithm was designed for RCS allocation controller, and then this RCS scheme’s effect was analyzed. …”
Get full text
Article -
14698
Application Research and Implementation of Load Balance Technology in General Collection Platform
Published 2013-12-01“…Through the interpretation of dynamic load balancing principles, the research for task scheduling algorithm, the expound to build the cloud resource pool hardware solution, the implementation for different scenarios designed mechanism and the configuration instructions and load monitoring for flexible weighting factors, that has the dynamic load balance techniques applied successfully in general collection platform for x86-based private cloud resource pool. …”
Get full text
Article -
14699
Three-Dimensional Path Planning of Constant Thrust Unmanned Aerial Vehicle Based on Artificial Fluid Method
Published 2020-01-01“…In particular, this paper addresses a novel algorithm of constant thrust fitting which is proposed through the impulse compensation, and then the constant thrust switching control scheme based on the isochronous interpolation method is given. …”
Get full text
Article -
14700
Analysis of the Fractional-Order Delay Differential Equations by the Numerical Method
Published 2022-01-01“…The obtained results have confirmed the greater accuracy than the modified Laguerre wavelet method, the Chebyshev wavelet method, and the modified wavelet-based algorithm. Moreover, based on the novelty and scientific importance, the present method can be extended to solve other nonlinear fractional-order delay differential equations.…”
Get full text
Article