Showing 14,681 - 14,700 results of 19,511 for search '"algorithms"', query time: 0.11s Refine Results
  1. 14681

    DEEP NEURAL NETWORK-BASED APPROACH FOR COMPUTING SINGULAR VALUES OF MATRICES by Diyari A. Hassan

    Published 2025-01-01
    “…The proposed CNN-based SVD method is evaluated against the conventional SVD algorithm, demonstrating superior performance in terms of computational time and accuracy. …”
    Get full text
    Article
  2. 14682
  3. 14683

    Survivability evaluation of network information system based on the cloud model and analytic hierarchy process by Yan-hua LIU, Guo-long CHEN, Rui-fen WU

    Published 2014-08-01
    “…Considering the problem of quantitative evaluation for qualitative survivability data and indexes of network information systems, the proposed method gives a multi-level survivability evaluation framework based on cloud model theory and AHP method. The algorithm builts a multi-level evaluation indexes system and compute the weight of each index using AHP method. …”
    Get full text
    Article
  4. 14684

    METHOD OF FAULT FEATURE EXTRATION BASED ON CEEMD AND FASTICA by HUANG GangJing, FAN YuGang, HUANG GuoYong

    Published 2018-01-01
    “…First,analyze the CEEMD vibration signals,decompose them into intrinsic mode function( IMF) components signal of different scales; then through the sensitivity evaluation algorithm,decompose and recombine the signals,and use Fast ICA to reduce their noise; in the end,conduct Hilbert envelope spectrum analysis to the signals separated by the Fast ICA,to obtain the fault feature information. …”
    Get full text
    Article
  5. 14685

    Fuzzy-Approximation-Based Novel Back-Stepping Control of Flexible Air-Breathing Hypersonic Vehicles with Nonaffine Models by Xingge Li, Gang Li

    Published 2019-01-01
    “…For the unknown functions and uncertainties in each subsystem, fuzzy approximators are used to approximate the total uncertainties, and norm estimation approach is introduced to reduce the computational complexity of the algorithm. Aiming at the saturation problem of actuator, a saturation auxiliary system is designed to transform the original control problem with input constraints into a new control problem without input constraints. …”
    Get full text
    Article
  6. 14686

    SOCIAL TECHNOLOGY OF UNIVERSITY INTERACTION MANAGEMENT WITH STAKEHOLDERS AS A TOOL FOR INCREASING COMPETITIVENESS by T. Bolshunova

    Published 2019-06-01
    “…As an experiment, an experience in the development and implementation of social technology for the organization of interaction of Lipetsk State Technical University with stakeholders has been adduced. The algorithm, principles and tasks of interaction of the educational organization with stakeholders and its place in the strategic management of the University have been described. …”
    Get full text
    Article
  7. 14687

    Fault Diagnosis of Vehicle Gearbox based on Support Vector Machine Optimized by Improved Beetle Antennae Search by Wenshan Qiao, Jin Hua, Meihong Chen

    Published 2022-05-01
    “…Compared with BAS,IBAS modified the step size formula and added Gaussian variation behavior,so that the search ability of the algorithm in the early and late period is balanced and has the ability to jump out of the local optimal,and better SVM parameters could be obtained. …”
    Get full text
    Article
  8. 14688

    Method for quality assessment of image mosaic by Guo-ting WAN, Jun-ping WANG, Jin LI, Hong-hua CAO, Song WANG, Le WANG, IYA-ning L, Rong WEI

    Published 2013-08-01
    “…On the basis of the theory of existing methods for image quality assessment,a novel method for quality assessment of mosaicked image based on the information of image edge was presented.The method was in accordance with the features of mosaicked image.Firstly,the edges of image were detected.Then according to the information of image edges,the information of pixel error and structure was considered.The mean value and variance of the difference of edge map were related with the misplacement and the brightness mutation,which influenced the quality of mosaicked image.Lastly,the evaluate procedure was done based on the relationship.The new method was more consistent with the subjective feeling to the mosaicked image quality.This method accurately reflects the real quality of mosaicked image and the performance of the algorithm of image mosaic.…”
    Get full text
    Article
  9. 14689

    LEO mega-constellation network:networking technologies and state of the art by Quan CHEN, Lei YANG, Jianming GUO, Xingchen LI, Yong ZHAO, Xiaoqian CHEN

    Published 2022-05-01
    “…The emerging low earth orbit (LEO) mega-constellation network (MCN) represented by Starlink and OneWeb were studied.The system architecture and basic working modes were introduced, and the main features of the emerging broadband MCN were summarized.Based on the system architecture of MCN, the methodology and research progress of five key technologies were investigated and summarized, including network topology dynamics management, space-ground handover scheme, high-efficiency routing algorithm design, gateway placement design, network simulation and performance evaluation.The focus was on recent mega-constellation-related studies.The challenges caused by the large scale and complexity of MCN and the applicability of existing techniques and solutions in MCN were analyzed.…”
    Get full text
    Article
  10. 14690

    Fuzzy Comprehensive Safety Evaluation of Pipeline Disaster in China-Russia Crude Oil Permafrost Region Based on Improved Analytic Hierarchy Process-Entropy Weight Method by Yangyang Shen, Dongxu Chen, Min Zhang, Ting Zuo

    Published 2022-01-01
    “…A comprehensive weight determination method based on improved fuzzy analytic hierarchy process, entropy weight method and Lagrange algorithm is proposed, and a fuzzy comprehensive evaluation model of permafrost pipeline safety is established. …”
    Get full text
    Article
  11. 14691

    A FAULT DIAGNOSIS METHOD BASED ON IMPROVED ARTIFICAL BEE COLONY OPTIMIZE SUPPORT VECTOR MACHINE by WU YinHua, XU QiongYan

    Published 2018-01-01
    “…In order to improve search ability of ABC,Levy flight strategy was introduced and improved the original ABC algorithm. Use the IABC to optimize SVM parameters can effectively improve the classification performance of SVM. …”
    Get full text
    Article
  12. 14692

    A novel chaotic system with one absolute term: stability, ultimate boundedness, and image encryption by Ali A. Shukur, Ammar Ali Neamah, Viet-Thanh Pham, Giuseppe Grassi

    Published 2025-01-01
    “…The system is combined with the 4×4 Toeplitz matrix to generate an encryption algorithm, validated using security and performance analysis. …”
    Get full text
    Article
  13. 14693

    A New Type-2 Soft Set: Type-2 Soft Graphs and Their Applications by Khizar Hayat, Muhammad Irfan Ali, Bing-Yuan Cao, Xiao-Peng Yang

    Published 2017-01-01
    “…Finally, we describe an application of type-2 soft graphs in communication networks and present procedure as an algorithm.…”
    Get full text
    Article
  14. 14694

    SOME PROBLEMS OF STUDENT INDIVIDUAL WORK ORGANIZATION AT TECHNICAL UNIVERSITY by I. O. LEUSHIN, I. V. LEUSHINA

    Published 2017-07-01
    “…Among them the authors mark out the discrepancy between the traditional interpretation of a term “student individual work” by the academic community and its treatment by the Ministry of Education and Science of the Russian Federation, the low students’ motivation to individual work, the lack of a clear selection algorithm of certain forms and methods of individual work that have already proved their efficiency and understandable for lecturers, university teachers’ disregard to different levels of students’ preparedness to self- dependent work. …”
    Get full text
    Article
  15. 14695

    Improved method of Tor network flow watermarks based on IPD interval by Jie DU, Yongzhong HE, Ye DU

    Published 2019-08-01
    “…Tor is an anonymous network mechanism that provides services for hiding traffic sources,but it has the problem that the entry traffic flows of Tor are clearly identifiable.Bridge protocols such as obfs4 come into being to solve this problem,which brings new challenges that have not yet been overcome.An IPD interval scheme is proposed,which uses the clustering characteristics of k-means to improve the original scheme,so that the added flow watermark can be detected efficiently in the three modes of obfs4 bridges.The results of experiments show that the improved algorithm has higher detection rate and recognition rate,and has good adaptability to variable netflow traffic,which is conducive to the construction of a nice secure network environment.…”
    Get full text
    Article
  16. 14696

    Efficient traceable identity-based signature scheme by DU Hong-zhen1, WEN Qiao-yan2

    Published 2009-01-01
    “…Compared with the existing schemes without suffering from key escrow, the scheme is the most efficient scheme and the signing algorithm needs only one scalar multiplication in the additive group while the reverse operation requires only three scalar multiplications.…”
    Get full text
    Article
  17. 14697

    Control Allocation Design of Reaction Control System for Reusable Launch Vehicle by Rongjun Mu, Xin Zhang

    Published 2014-01-01
    “…In this paper, an indexed control method was proposed for RCS preallocation, a 0-1 integer programming algorithm was designed for RCS allocation controller, and then this RCS scheme’s effect was analyzed. …”
    Get full text
    Article
  18. 14698

    Application Research and Implementation of Load Balance Technology in General Collection Platform by Yuan Zhang, Taofeng Guo, Panxiang Zhang, Jianjun Gao, Jiayan Zang

    Published 2013-12-01
    “…Through the interpretation of dynamic load balancing principles, the research for task scheduling algorithm, the expound to build the cloud resource pool hardware solution, the implementation for different scenarios designed mechanism and the configuration instructions and load monitoring for flexible weighting factors, that has the dynamic load balance techniques applied successfully in general collection platform for x86-based private cloud resource pool. …”
    Get full text
    Article
  19. 14699

    Three-Dimensional Path Planning of Constant Thrust Unmanned Aerial Vehicle Based on Artificial Fluid Method by Yongqiang Qi, Shuai Li, Yi Ke

    Published 2020-01-01
    “…In particular, this paper addresses a novel algorithm of constant thrust fitting which is proposed through the impulse compensation, and then the constant thrust switching control scheme based on the isochronous interpolation method is given. …”
    Get full text
    Article
  20. 14700

    Analysis of the Fractional-Order Delay Differential Equations by the Numerical Method by Saadia Masood, Muhammad Naeem, Roman Ullah, Saima Mustafa, Abdul Bariq

    Published 2022-01-01
    “…The obtained results have confirmed the greater accuracy than the modified Laguerre wavelet method, the Chebyshev wavelet method, and the modified wavelet-based algorithm. Moreover, based on the novelty and scientific importance, the present method can be extended to solve other nonlinear fractional-order delay differential equations.…”
    Get full text
    Article