Showing 14,741 - 14,760 results of 19,511 for search '"algorithms"', query time: 0.10s Refine Results
  1. 14741

    Dependable-cooperative channel resource allocation scheme in wireless mesh network by Mingming LI, Guangxue YUE, Shaoqing DAI, Bolin MA

    Published 2017-05-01
    “…For improving utilization of channel resources and service quality effectively in wireless mesh network,a dependable-cooperative channel resource allocation scheme was proposed.According to the adaptive features of mesh node,engaging game theory and establishing reputation mechanism to achieve dependable-cooperative of nodes,and channel resource allocation result was utilized.The comparison of this experiment proves the situation of service level and network utility of cooperative service.The result of it shows that networks benefit will be optimal when the cooperative service level is 3 and node hops synergies with the service level.Comparing with classic syn-ergetic algorithm,with the same context of network topology,dependable-cooperative channel allocation strategy is clearly dominated with 1.04 on UACRR and 1.069.…”
    Get full text
    Article
  2. 14742

    Analysis of Power Coupling Device with Dual Planetary Gear Set based on Dynamic Programming by Shaohua Wang, Sheng Zhang

    Published 2019-06-01
    “…By introducing dynamic programming algorithm, taking the battery SOC as state variable and engine torque and speed as control variable, the fuel consumption of the vehicle is set as the objective function for global optimization. …”
    Get full text
    Article
  3. 14743

    Spectral Element Method for Fractional Klein–Gordon Equations Using Interpolating Scaling Functions by Haifa Bin Jebreen

    Published 2023-01-01
    “…The focus of this paper is on utilizing the spectral element method to find the numerical solution of the fractional Klein–Gordon equation. The algorithm employs interpolating scaling functions (ISFs) that meet specific properties and satisfy the multiresolution analysis. …”
    Get full text
    Article
  4. 14744

    Security analysis and improvement of a certificateless signcryption scheme by Zhen-guo ZHAO

    Published 2015-03-01
    “…Furthermore, the efficiency of the proposed scheme is very high since only four modular exponentiations and five modular exponentiations are needed in the signcryption algoriahm and unsigncryption algorithm separately.…”
    Get full text
    Article
  5. 14745

    A Deployment Method of Middlebox Service Chain Based on Multi-Flow Table by Shiran Liu, Julong Lan, Yuxiang Hu, Tong Duan

    Published 2015-08-01
    “…Aiming at the path cycle and source address binding problem in middlebox service chain deployment,a service chain deployment approach by combining the OpenFlow mechanism and NetFPGA was proposed.First of all,the OpenFlow multi-flow table was used for marking service chains and labeling service sequences so that data packets could be processed correctly according to desired service order;secondly,the service chain deployment algorithm was designed to achieve the mapping relationship between the service path and flow table rules;thirdly,a prototype system was implemented based on the hardware platforms of NetFPGA-10G.Finally,experimental results show that the proposed method have the advantage of feasibility and outperforms compared methods in the aspect of the flow table number and time overhead.…”
    Get full text
    Article
  6. 14746

    Object detection and multimodal learning for product recommendations by Karolina Selwon, Paweł Wnuk

    Published 2025-01-01
    “…The proposed approach is an algorithm for recommending multiple products based on visual and textual features, ensuring compatibility with query items. …”
    Get full text
    Article
  7. 14747

    Cloud storage scheme based on closed-box encryption by Rui-zhong DU, Shao-xuan WANG, Jun-feng TIAN

    Published 2017-07-01
    “…Aiming at protecting the confidentiality of data for cloud storage users,a scheme that encrypt data in cloud service providers was presented.The scheme constructed a closed-box computing environment by virtual machine isolation technique,improved algorithm of RSA to change keys without having to produce large prime numbers,transfer data and keys through SSL and encrypted data in the closed computing environment before storing to the distributed file system.Closed-box computing environment can prevent attacks from cloud administrators and malicious applications in the operating system.It also can guard against data leakage effectively.The result of experiment shows that the confidentiality of data improved and the performance loss is decreased considering to other cloud storage scheme that encrypt data in cloud.…”
    Get full text
    Article
  8. 14748

    Crop Growth Monitoring System Based on Agricultural Internet of Things Technology by Jienan Wu

    Published 2022-01-01
    “…After improving the fuzzy algorithm, this paper builds an intelligent model, builds the system structure framework according to the actual needs of crop growth monitoring, sets up and analyzes the environmental parameters, and builds the crop growth monitoring system from multiple perspectives. …”
    Get full text
    Article
  9. 14749

    Correspondences between Czech and English Coreferential Expressions by Michal Novák, Anna Nedoluzhko

    Published 2015-09-01
    “…We designed an alignment-refining algorithm for English personal and possessive pronouns and Czech relative pronouns that improves the quality of alignment links not only for the classes it aimed at but also in general. …”
    Get full text
    Article
  10. 14750

    Dynamic Server Cluster Load Balancing in Virtualization Environment with OpenFlow by Wenbo Chen, Zhihao Shang, Xinning Tian, Hui Li

    Published 2015-07-01
    “…Thus, we propose a load balancing algorithm based on server running state, which can calculate comprehensive loading according to the CPU utilization, memory utilization, and network traffic of the servers. …”
    Get full text
    Article
  11. 14751

    Random access for massive Internet of things:current status, challenges and opportunities by Pingzhi FAN, Li LI, Huan CHEN, Gaofeng CHENG, Linjie YANG, Xiaobo TANG

    Published 2021-04-01
    “…In conventional communication systems, the random access (RA) is a necessary procedure for a user equipment (UE) to establish wireless connection to the network before actual data transmission.Focusing on the massive IoT with large number of nodes, the fundamental characteristics and limitations of conventional grant-based RA were firstly discussed.Then, the grant-free RA, semi-grant-free RA and unsourced RA for massive IoT were addressed in details from multiple perspectives, including their system models, protocol frameworks, algorithm procedures, system performance, related pros and cons, as well as critical challenges and potential opportunities.Finally, some highlights on the related key techniques and common issues in random access for massive IoT were concluded.…”
    Get full text
    Article
  12. 14752

    Pilot interference mitigation for TDD cell-free massive MIMO systems by Yue WANG, Fangmin XU, Haiyan CAO

    Published 2022-05-01
    “…To alleviate the pilot interference for cell-free massive multi-input multi-output (MIMO) system and improve system’s performance, a comprehensive approach including the pilot reuse, access point (AP) selection and power allocation was proposed.Firstly, to alleviate the pilot contamination, the pilot assignment based on the order of user distance was proposed, in which the pilot sharing was only allowed when the distance between two users is large enough to reduce the impact of pilot reuse.Then, by AP selection, only the APs which have main impact on the macro diversity gain were selected as the user’s serving APs.Finally, a modified max-min power control algorithm was proposed to improve the system’s average throughput.Simulation results show that the pilot interference mitigation strategy proposed improves the performance of the system significantly.…”
    Get full text
    Article
  13. 14753

    Adaptive SDN switch migration mechanism based on coalitional game by Lan YAO, Julong LAN

    Published 2020-08-01
    “…The problem of poor control plane performance causes in software-defined Networking due to the unreasonable mapping relationship between controllers and switches.To address this issue,an adaptive switch migration mechanism based on coalitional game was proposed.First,comprehensively considering the controller resource utilization,control overhead,and flow establishment time,the switch migration problem was modeled as a combination optimization problem.Then,a game theory was introduced to design a distributed algorithm,where each controller ran control logic independently and implemented coalitional game between controllers to achieve an adaptive switch migration mechanism that adapted to traffic characteristics.The simulation results show that the proposed mechanism can better adapt to the flow characteristics,reduce the control traffic overhead by about 19% and the average flow settling time by 30%,and improve the controller resource utilization.…”
    Get full text
    Article
  14. 14754

    Construction of Target Controllable Image Segmentation Model Based on Homotopy Perturbation Technology by Shu-Li Mei

    Published 2013-01-01
    “…So, the bottleneck of the variational model on image segmentation is the lower efficiency of the algorithm. Combining the multiscale wavelet interpolation operator and HPM, a semianalytical numerical method can be obtained, which can improve the computational efficiency and accuracy greatly. …”
    Get full text
    Article
  15. 14755

    Optimum Design of Load Capacity of Cycloidal Pin Wheel by Leilei Xu, Jianxin Su

    Published 2022-08-01
    “…Matlab is used to call the genetic algorithm in its optimization toolbox for solution. …”
    Get full text
    Article
  16. 14756

    Operation Optimization of Microgrid System Based on Intelligent System Model by Jian Kang

    Published 2022-01-01
    “…In addition, this paper adopts the method of extracting the harmonic current command in the synchronous coordinate system based on the band-pass filter composed of SOGI and combines the RDFT algorithm to determine the number of harmonics that can be compensated and the degree of compensation for the harmonic number. …”
    Get full text
    Article
  17. 14757

    Defense-enhanced dynamic heterogeneous redundancy architecture based on executor partition by Ting WU, Chengnan HU, Qingnan CHEN, Anbang CHEN, Qiuhua ZHENG

    Published 2021-03-01
    “…Aiming at the security problem when servants are faced with common vulnerabilities, an improved DHR architecture called IDHR was proposed.On the basis of DHR, an executor-partition module that divided the executor-set to several executor pools by the heterogeneity among the executors was introduced to improve the heterogeneity among the executor pools.Moreover, the scheduling algorithm was improved by choosing executor pools randomly at first, and then choosing the executors from these pools randomly.Finally, through two experimental schemes of random simulation and Web server emulation, the security evaluation of the proposed IDHR architecture was carried out from two aspects of attack success rate and control rate.Experimental results show that the security of the IDHR architecture, especially when the common vulnerability is unknown, is significantly better than the traditional DHR architecture.…”
    Get full text
    Article
  18. 14758

    Calculating the feature method of short text based on analytic hierarchy process by Xue-qiang ZOU, Xiu-guo BAO, Xiao-jun HUANG, Hong-yuan MA, Qing-sheng YUAN

    Published 2016-12-01
    “…Furthermore, this method was also implemented in the traditional clustering algorithm. Experimental results show that, compared with the traditional tf-idf method, the improved approach has a better clustering effect on the average scattering for clusters and the total separation between clusters.…”
    Get full text
    Article
  19. 14759

    Link prediction method based on the similarity of high path by Qiuyang GU, Bao WU, Renyong CHI

    Published 2021-07-01
    “…For the problem that the existing link prediction method has many problems, including low accuracy and low efficiency, a method of high-order path similarity link prediction was proposed.Firstly, the path was used as the judging feature to predict missing links in complex networks, which could make resource allocation more effective and restricts information leakage by punishing public neighbor pairs.Secondly, by using high order paths as judging features, the available long paths between seed nodes would be punished.Finally, several real complex network datasets were used for numerical examples calculation.Experimental results show that the proposed algorithm is more accurate and efficient than other baseline methods.…”
    Get full text
    Article
  20. 14760

    Collaborative Recommendation for Online Social Networks Based on User Behavior Cognitive by Jin Qi, Bin Xu, Xiaoxuan Hu, Bianjia Xu, Xinglin Xiao

    Published 2015-10-01
    “…Recently,online social network(OSN)has become essential tools for information sharing and communication in people’s work and life.How to cognitive massive,complex,large-area and spatiotemporal association user behavior information and provide personalized re1commendation services have become problems need special attention in development of OSN.Thus,a frame of collaborative recommendation for OSN based on user behavior cognitive was proposed which used collaborative filtering algorithm to provide personalized recommendation services on the basis of analysis of behavior of user characteristics,text information and interest preferences,etc.Experimental results verify that the proposed collaborative recommendation strategy based on user behavior cognitive has good stability and actual application effect.…”
    Get full text
    Article