Showing 14,781 - 14,800 results of 19,511 for search '"algorithms"', query time: 0.09s Refine Results
  1. 14781

    Prediction of China’s Express Business Volume Based on FGM (1, 1) Model by Chunyan Xiong, Liusan Wu

    Published 2021-01-01
    “…Based on the data of China’s express business volume from 2015 to 2019, this paper uses the improved Particle Swarm Optimization algorithm to calculate the fractional-order r of the FGM (1, 1) model and forecasts China’s express business volume from 2020 to 2023. …”
    Get full text
    Article
  2. 14782

    Beamforming Technology of LEO Satellite in Satellite-Terrestrial Integrated Network by Zhiyong LUO, Ning XIN, Shaohui SUN

    Published 2022-12-01
    “…Because of the difference between satellite-ground link and ground propagation loss characteristics, the spectrum effi ciency index of satellite communication system is far lower than that of terrestrial cellular system in the same period.It is of utility to improve spectral effi ciency by realizing effi cient space division multiplexing with multi-beam antennas.The adaptive beamforming and doppler frequency off set compensation scheme in the LEO multi-beam satellite communication scenario was studied.Firstly, a low-complexity hybrid beamforming scheme was designed.Then, aim at the doppler frequency shifts were diff erent between beams due to their pitch angles, a doppler frequency off set pre-compensation scheme for multi-beam systems was proposed.Finally, the eff ectiveness of the algorithm was verifi ed by MATLAB simulation analysis.…”
    Get full text
    Article
  3. 14783

    INCREMENTAL HARMONIC BALANCE METHOD FOR THE STUDY OF SUPPORT LOOSENESS FAULT’S CHARACTERISTICS by CAO QingSong, XIANG Qin, XIONG GuoLiang

    Published 2015-01-01
    “…Incremental harmonic balance method was exploited to solve the nonlinear equation,and iterative algorithm was applied to gain the vibration periodic solution. …”
    Get full text
    Article
  4. 14784

    Support vector machine based fast Monte Carlo reliability evaluation method for composite power system by Yuxiao LEI, Gengfeng LI, Yuxiong HUANG, Zhaohong BIE

    Published 2019-06-01
    “…A fast Monte Carlo reliability evaluation method for composite power system based on support vector machine (SVM) was proposesd.Firstly,sample data for training the SVM model was obtained by enumerating component failures and calculating the corresponding minimum load shedding.Then,the SVM algorithm was used to mine the nonlinear mapping relationship between component failures and minimum load shedding,and the minimum load shedding estimation model was trained.Finally,the model was combined with the Monte Carlo simulation.By randomly sampling component states,for each state,the estimation model obtained by the training directly gave the minimum load shedding,thereby achieving a rapid assessment of the reliability of the composite power system.The proposed method is applied to the IEEE RTS 79 system,which verifies its effectiveness.…”
    Get full text
    Article
  5. 14785

    Research on Loaded Transmission Error of Internal Short Tooth Spur Gears by Yin Xunmin, Jia Haitao, Zhang Xijin

    Published 2023-06-01
    “…A modification optimization method for internal short tooth spur gear pairs is investigated using the particle swarm algorithm. The research results lay a foundation for improving the meshing performance of internal short tooth spur gears.…”
    Get full text
    Article
  6. 14786

    Global Optimization for Bus Line Timetable Setting Problem by Qun Chen

    Published 2014-01-01
    “…For such a multistage decision problem, this paper designed a dynamic programming algorithm to solve it. Global optimization procedures using dynamic programming are developed. …”
    Get full text
    Article
  7. 14787

    Fault tolerance of balanced hypercubes by Xin-xin ZHANG, Li XU, Li-mei LIN

    Published 2017-09-01
    “…Fault tolerance is one of the important ways to measure the reliability of multiprocessor interconnection networks.g-restricted edge connectivity and g-restricted connectivity can ensure every remaining component is disconnected ,the number of neighbors of vertex is no less than g,which can measure the fault tolerance and reliability of multiprocessor and multichannel system more accurately.Balanced hypercubes is a variant of the hypercube,which has some specific topological properties,it can better meet the needs of the multiprocessor system and many new networks.The {1,2}-restricted edge connectivity and the {1,2}-restricted connectivity of balanced hypercubes were proposed,which could enrich the evaluation system of network fault tolerance and reliability in balanced hypercubes topology and it laid a good foundation for the fault diagnosis algorithm of balances hypercube.…”
    Get full text
    Article
  8. 14788

    RFID dynamic positioning method by Cheng LI, Song-rong QIAN

    Published 2013-04-01
    “…,the time of arrival (TOA) or the received signal strength indication (RSSI),it improved the accuracy of positioning target based on reference tags and a moving reader.The algorithm was simple but useful.Based on the performance of the prototype system,it demonstrated that the proposed system could accurately position in one of the smallest reference tag cell (within dozens of centimeters) and could be deployed easily with low cost,thus has potential application in RFID warehouse management.…”
    Get full text
    Article
  9. 14789

    Research on Tooth Wear Testing Technology of Face Gears Based on Reverse Engineering by Zhang Jun, Li Fangfang, Wang Yanzhong

    Published 2022-11-01
    “…According to the measurement principle, the conversion matrix of the measuring coordinates is deduced; by measuring the tooth profile deviation and with the error compensation algorithm, the compensation point of the measuring point is obtained and the control equation of NURBS surface fitting is presented; a test bench is built, and an example operation is carried out to compare and analyze the standard tooth surface and the worn surface. …”
    Get full text
    Article
  10. 14790

    Performance evaluation of primary user and secondary user based on CSMA protocol in CRSN by Ying LIU, Li ZHENG, Yuansong LI

    Published 2016-04-01
    “…For the problem of uncertainty owing to the highly variable physical layer characteristics in cognitive radio sensor networks(CRSN),two fundamental performance metrics(bandwidth and delay)were formulated and the performance of medium access control protocol based on CSMA was analyzed. Firstly,CSMA algorithm was used to estimate potential bandwidth of secondary user under the given PU traffic model. …”
    Get full text
    Article
  11. 14791

    Design of full-connected hybrid precoding based on an equivalent channel in millimeter-wave massive MIMO system by Haiyan CAO, Zhiyao MA, Yingjuan ZHI, Renqing LIU, Fangmin XU, Xin FANG

    Published 2021-01-01
    “…In order to improve the performance of hybrid precoding scheme based on fully connected structure in millimeter-wave massive MIMO system, a hybrid precoding scheme based on an equivalent channel with two-step design method was proposed.Firstly, the equivalent channel was constructed by combining the analog precoding matrix at the transmitter, the analog combining matrix and the channel matrix at the receiver, and the analog part of the transceiver was designed to maximize the equivalent channel gain.Furthermore, the least squares criterion was applied to derive the digital precoding matrix and the digital combination matrix column by column to design the digital part of the transceiver.Simulation results show that the proposed algorithm can approximate the optimal digital precoding scheme and has lower complexity and stronger fault tolerance.…”
    Get full text
    Article
  12. 14792

    An Energy-Efficient Collaborative Target Tracking Framework in Distributed Wireless Sensor Networks by Lin Shang, Kang Zhao, Zhengguo Cai, Dan Gao, Maolin Hu

    Published 2014-07-01
    “…The proposed fusion algorithm is based on neural network aggregation model and Gaussian particle filtering (GPF) estimation. …”
    Get full text
    Article
  13. 14793

    Pairing-free equality test over short ciphertexts by Huijun Zhu, Licheng Wang, Haseeb Ahmad, Xinxin Niu

    Published 2017-06-01
    “…Moreover, we simplify the encryption algorithm, as well as reduce the ciphertext storage space.…”
    Get full text
    Article
  14. 14794

    Study on Active and Passive Control of Order Vibration for Electric Vehicle Power Train by Yuanyuan Zhang, Peng Yu, Jian Wang

    Published 2020-05-01
    “…Secondly,in consideration of active control effect,the best gear modification parameters are obtained,transmission error volatility is reduced by joint optimization with elitist retention genetic algorithm and gear engagement finite element model. …”
    Get full text
    Article
  15. 14795

    Analysis of Fractional Differential Equations with the Help of Different Operators by Naveed Iqbal, Moteb Fheed Saad Al Harbi, Saleh Alshammari, Shamsullah Zaland

    Published 2022-01-01
    “…The obtained results demonstrate that the algorithm is very real, simple to apply, and effective in investigating the nature of complicated nonlinear models in science and engineering.…”
    Get full text
    Article
  16. 14796

    Certificateless strong designated verifier multi-signature by Hong-zhen DU, Qiao-yan WEN

    Published 2016-06-01
    “…,the definition and security model for certificateless strong designated verifier multi-signature were proposed.Then,the first certificateless strong designated verifier multi-signature scheme from bilinear pairings was constructed and it was proved that the scheme is existentially unforgeable under the computational bilinear Diffie-Hellman assumption and the computational Diffie-Hellman assumption.Moreover,the scheme meets the properties of both strong designated verifier signatures and multi-signatures.The scheme achieves high efficiency since the length of designated verifier multi-signature generated by the scheme is only 160 bits and the computational cost of bilinear pairings necessary for verification algorithm is constant,i.e.,one bilinear pairing.So,it can be applied in wireless networks of the limited computing resources and network bandwidth.…”
    Get full text
    Article
  17. 14797

    Uniqueness of the Level Two Bayesian Network Representing a Probability Distribution by Linda Smail

    Published 2011-01-01
    “…Given a Bayesian network over a family 𝐼 of random variables, this paper presents a result on the computation of the probability distribution of a subset 𝑆 of 𝐼 using separately a computation algorithm and D-separation properties. It also shows the uniqueness of the obtained result.…”
    Get full text
    Article
  18. 14798

    PriQoS:priority-differentiated flow control mechanism based on SDN by Zhi SUN, Ming CHEN

    Published 2017-02-01
    “…It was difficult to meet the increasing demand of quality of service (QoS) for the best-effort IP network,so it was urgent to develop a kind of QoS control mechanism that was compatible with the existing IP software and hardware resources.Therefore,a priority-differentiated control mechanism based on the software defined networking called PriQoS was proposed.When the network resource was scarce,a multi-queue bandwidth allocation algorithm based on the inte-grated priority of service flow was used to meet the bandwidth requirement with high priority flows.PriQoS was deployed on the network edge,which was no need to modify applications in the end systems and routers in the core network.The mechanism has advantages such as easy to deploy and being compatible with the IP applications and devices.Experimental results show that the PriQoS mechanism can guarantee the QoS of higher priority services.…”
    Get full text
    Article
  19. 14799

    Survey on cluster-based routing protocols for cognitive radio sensor networks by Jihong WANG, Wenxiao SHI

    Published 2018-11-01
    “…Routing protocols could achieve efficient convergecast transmission of sensed data in cognitive radio sensor network (CRSN),and it is of vital importance for the whole network performance.In particular,cluster-based routing protocols could further lower routing selection complexity and improve scalability.Therefore,an overview of cluster-based routing protocols for CRSN was provided.Firstly,after a brief introduction to the concept and advantages of clustering in CRSN,the major factors concerning clustering algorithm design were pointed out.Secondly,the challenges faced by routing protocol design in CRSN and basic design principles were explored.Thirdly,the previous work of cluster-based routing protocols for CRSN was systematically analyzed and summarized.Finally,issues that require urgent solutions and future research directions were suggested.…”
    Get full text
    Article
  20. 14800

    Determination of fracture toughness in plain concrete specimens by R curve by Chbani Hamza, Saadouki Bouchra, Barakat Mohamed

    Published 2019-07-01
    “…Experimental tests and computational algorithm are implemented to investigate crack growth phenomena in C0.7 concrete. …”
    Get full text
    Article