-
14781
Prediction of China’s Express Business Volume Based on FGM (1, 1) Model
Published 2021-01-01“…Based on the data of China’s express business volume from 2015 to 2019, this paper uses the improved Particle Swarm Optimization algorithm to calculate the fractional-order r of the FGM (1, 1) model and forecasts China’s express business volume from 2020 to 2023. …”
Get full text
Article -
14782
Beamforming Technology of LEO Satellite in Satellite-Terrestrial Integrated Network
Published 2022-12-01“…Because of the difference between satellite-ground link and ground propagation loss characteristics, the spectrum effi ciency index of satellite communication system is far lower than that of terrestrial cellular system in the same period.It is of utility to improve spectral effi ciency by realizing effi cient space division multiplexing with multi-beam antennas.The adaptive beamforming and doppler frequency off set compensation scheme in the LEO multi-beam satellite communication scenario was studied.Firstly, a low-complexity hybrid beamforming scheme was designed.Then, aim at the doppler frequency shifts were diff erent between beams due to their pitch angles, a doppler frequency off set pre-compensation scheme for multi-beam systems was proposed.Finally, the eff ectiveness of the algorithm was verifi ed by MATLAB simulation analysis.…”
Get full text
Article -
14783
INCREMENTAL HARMONIC BALANCE METHOD FOR THE STUDY OF SUPPORT LOOSENESS FAULT’S CHARACTERISTICS
Published 2015-01-01“…Incremental harmonic balance method was exploited to solve the nonlinear equation,and iterative algorithm was applied to gain the vibration periodic solution. …”
Get full text
Article -
14784
Support vector machine based fast Monte Carlo reliability evaluation method for composite power system
Published 2019-06-01“…A fast Monte Carlo reliability evaluation method for composite power system based on support vector machine (SVM) was proposesd.Firstly,sample data for training the SVM model was obtained by enumerating component failures and calculating the corresponding minimum load shedding.Then,the SVM algorithm was used to mine the nonlinear mapping relationship between component failures and minimum load shedding,and the minimum load shedding estimation model was trained.Finally,the model was combined with the Monte Carlo simulation.By randomly sampling component states,for each state,the estimation model obtained by the training directly gave the minimum load shedding,thereby achieving a rapid assessment of the reliability of the composite power system.The proposed method is applied to the IEEE RTS 79 system,which verifies its effectiveness.…”
Get full text
Article -
14785
Research on Loaded Transmission Error of Internal Short Tooth Spur Gears
Published 2023-06-01“…A modification optimization method for internal short tooth spur gear pairs is investigated using the particle swarm algorithm. The research results lay a foundation for improving the meshing performance of internal short tooth spur gears.…”
Get full text
Article -
14786
Global Optimization for Bus Line Timetable Setting Problem
Published 2014-01-01“…For such a multistage decision problem, this paper designed a dynamic programming algorithm to solve it. Global optimization procedures using dynamic programming are developed. …”
Get full text
Article -
14787
Fault tolerance of balanced hypercubes
Published 2017-09-01“…Fault tolerance is one of the important ways to measure the reliability of multiprocessor interconnection networks.g-restricted edge connectivity and g-restricted connectivity can ensure every remaining component is disconnected ,the number of neighbors of vertex is no less than g,which can measure the fault tolerance and reliability of multiprocessor and multichannel system more accurately.Balanced hypercubes is a variant of the hypercube,which has some specific topological properties,it can better meet the needs of the multiprocessor system and many new networks.The {1,2}-restricted edge connectivity and the {1,2}-restricted connectivity of balanced hypercubes were proposed,which could enrich the evaluation system of network fault tolerance and reliability in balanced hypercubes topology and it laid a good foundation for the fault diagnosis algorithm of balances hypercube.…”
Get full text
Article -
14788
RFID dynamic positioning method
Published 2013-04-01“…,the time of arrival (TOA) or the received signal strength indication (RSSI),it improved the accuracy of positioning target based on reference tags and a moving reader.The algorithm was simple but useful.Based on the performance of the prototype system,it demonstrated that the proposed system could accurately position in one of the smallest reference tag cell (within dozens of centimeters) and could be deployed easily with low cost,thus has potential application in RFID warehouse management.…”
Get full text
Article -
14789
Research on Tooth Wear Testing Technology of Face Gears Based on Reverse Engineering
Published 2022-11-01“…According to the measurement principle, the conversion matrix of the measuring coordinates is deduced; by measuring the tooth profile deviation and with the error compensation algorithm, the compensation point of the measuring point is obtained and the control equation of NURBS surface fitting is presented; a test bench is built, and an example operation is carried out to compare and analyze the standard tooth surface and the worn surface. …”
Get full text
Article -
14790
Performance evaluation of primary user and secondary user based on CSMA protocol in CRSN
Published 2016-04-01“…For the problem of uncertainty owing to the highly variable physical layer characteristics in cognitive radio sensor networks(CRSN),two fundamental performance metrics(bandwidth and delay)were formulated and the performance of medium access control protocol based on CSMA was analyzed. Firstly,CSMA algorithm was used to estimate potential bandwidth of secondary user under the given PU traffic model. …”
Get full text
Article -
14791
Design of full-connected hybrid precoding based on an equivalent channel in millimeter-wave massive MIMO system
Published 2021-01-01“…In order to improve the performance of hybrid precoding scheme based on fully connected structure in millimeter-wave massive MIMO system, a hybrid precoding scheme based on an equivalent channel with two-step design method was proposed.Firstly, the equivalent channel was constructed by combining the analog precoding matrix at the transmitter, the analog combining matrix and the channel matrix at the receiver, and the analog part of the transceiver was designed to maximize the equivalent channel gain.Furthermore, the least squares criterion was applied to derive the digital precoding matrix and the digital combination matrix column by column to design the digital part of the transceiver.Simulation results show that the proposed algorithm can approximate the optimal digital precoding scheme and has lower complexity and stronger fault tolerance.…”
Get full text
Article -
14792
An Energy-Efficient Collaborative Target Tracking Framework in Distributed Wireless Sensor Networks
Published 2014-07-01“…The proposed fusion algorithm is based on neural network aggregation model and Gaussian particle filtering (GPF) estimation. …”
Get full text
Article -
14793
Pairing-free equality test over short ciphertexts
Published 2017-06-01“…Moreover, we simplify the encryption algorithm, as well as reduce the ciphertext storage space.…”
Get full text
Article -
14794
Study on Active and Passive Control of Order Vibration for Electric Vehicle Power Train
Published 2020-05-01“…Secondly,in consideration of active control effect,the best gear modification parameters are obtained,transmission error volatility is reduced by joint optimization with elitist retention genetic algorithm and gear engagement finite element model. …”
Get full text
Article -
14795
Analysis of Fractional Differential Equations with the Help of Different Operators
Published 2022-01-01“…The obtained results demonstrate that the algorithm is very real, simple to apply, and effective in investigating the nature of complicated nonlinear models in science and engineering.…”
Get full text
Article -
14796
Certificateless strong designated verifier multi-signature
Published 2016-06-01“…,the definition and security model for certificateless strong designated verifier multi-signature were proposed.Then,the first certificateless strong designated verifier multi-signature scheme from bilinear pairings was constructed and it was proved that the scheme is existentially unforgeable under the computational bilinear Diffie-Hellman assumption and the computational Diffie-Hellman assumption.Moreover,the scheme meets the properties of both strong designated verifier signatures and multi-signatures.The scheme achieves high efficiency since the length of designated verifier multi-signature generated by the scheme is only 160 bits and the computational cost of bilinear pairings necessary for verification algorithm is constant,i.e.,one bilinear pairing.So,it can be applied in wireless networks of the limited computing resources and network bandwidth.…”
Get full text
Article -
14797
Uniqueness of the Level Two Bayesian Network Representing a Probability Distribution
Published 2011-01-01“…Given a Bayesian network over a family 𝐼 of random variables, this paper presents a result on the computation of the probability distribution of a subset 𝑆 of 𝐼 using separately a computation algorithm and D-separation properties. It also shows the uniqueness of the obtained result.…”
Get full text
Article -
14798
PriQoS:priority-differentiated flow control mechanism based on SDN
Published 2017-02-01“…It was difficult to meet the increasing demand of quality of service (QoS) for the best-effort IP network,so it was urgent to develop a kind of QoS control mechanism that was compatible with the existing IP software and hardware resources.Therefore,a priority-differentiated control mechanism based on the software defined networking called PriQoS was proposed.When the network resource was scarce,a multi-queue bandwidth allocation algorithm based on the inte-grated priority of service flow was used to meet the bandwidth requirement with high priority flows.PriQoS was deployed on the network edge,which was no need to modify applications in the end systems and routers in the core network.The mechanism has advantages such as easy to deploy and being compatible with the IP applications and devices.Experimental results show that the PriQoS mechanism can guarantee the QoS of higher priority services.…”
Get full text
Article -
14799
Survey on cluster-based routing protocols for cognitive radio sensor networks
Published 2018-11-01“…Routing protocols could achieve efficient convergecast transmission of sensed data in cognitive radio sensor network (CRSN),and it is of vital importance for the whole network performance.In particular,cluster-based routing protocols could further lower routing selection complexity and improve scalability.Therefore,an overview of cluster-based routing protocols for CRSN was provided.Firstly,after a brief introduction to the concept and advantages of clustering in CRSN,the major factors concerning clustering algorithm design were pointed out.Secondly,the challenges faced by routing protocol design in CRSN and basic design principles were explored.Thirdly,the previous work of cluster-based routing protocols for CRSN was systematically analyzed and summarized.Finally,issues that require urgent solutions and future research directions were suggested.…”
Get full text
Article -
14800
Determination of fracture toughness in plain concrete specimens by R curve
Published 2019-07-01“…Experimental tests and computational algorithm are implemented to investigate crack growth phenomena in C0.7 concrete. …”
Get full text
Article