-
14841
Analysis of Multimedia Teaching Path of Popular Music Based on Multiple Intelligence Teaching Mode
Published 2022-01-01“…In the stage of music audio segmentation, the deep belief network algorithm is used to accurately carry out music multimedia teaching. …”
Get full text
Article -
14842
Coordinated and unified control technology of IP and optical transport network for power services
Published 2019-03-01“…Based on the advantages of centralized,open and manageable of SDN (software defined networking) technology,a centralized unified control architecture and service coordination control mechanism of IP and optical transport networks for power services was proposed to realize power IP and optical transport network.Under the unified control architecture of IP and optical transport network,the IP layer flow table and optical layer flow table convergence mapping algorithm were proposed based on OpenFlow protocol,and the unified control interaction mechanism between IP and optical transport network was designed to improve power IP and optical transport network.Therefore,the support ability of IP and optical networks to power services can be greatly improved.…”
Get full text
Article -
14843
BUCKLING OF BEAMS WITH A BOUNDARY ELEMENT TECHNIQUE
Published 2022-09-01“…The eigenvalue issues can be reduced to algebraic eigenvalue problems, which are subsequently solvable numerically with the use of an efficient algorithm from the boundary element method. Within this article, the critical load findings of these beams are compared to those obtained using commercial finite element software, and the results are in excellent correlation. …”
Get full text
Article -
14844
Power allocation under per-antenna power constraints in multiuser MIMO systems
Published 2012-10-01“…A low-complexity power allocation algorithm was investigated under per-antenna power constraints(PAPC)in multiuser multiple-input multiple-output (MIMO) systems.It was shown that the optimal power allocation subject to PAPC,aimed at maximizing the sum rate of multiple users with zero forcing (ZF) precoders,had the structure of water-filling with multiple water-levels.Based on this result,the equivalence between PAPC and weighted sum power constraints was proved and a low-complexity suboptimal power allocation method was then proposed.Simulation results show that the proposed method outperforms the existing equal power allocation method and the heuristic method,and it can efficiently reduce the computational complexity with a negligible performance loss compared with the optimal power allocation method.…”
Get full text
Article -
14845
Analysis of stability condition for LDPC codes and optimizing degree sequences over mixed channel
Published 2016-09-01“…Under the circumstance that white Gaussian noise and random erasures exist all at once,the stability condition for LDPC codes over mixed channel was proposed.And it was proved that a good degree sequence of LDPC codes was not optimized over mixed channel.It can also be proved by simulation.The random particle swarm optimization (RPSO) and simulated annealing (SA) algorithm were combined to find some capacity-approaching degree sequences over mixed channel with different erasure probabilities.The threshold of signal-to-noise ratio improves 1.615 9 dB than that of the classical degree sequences calculated by Gaussian approximation over mixed channel.These degree sequences are optimal for optical recording and frequency-hopping communication with narrow-band interference.…”
Get full text
Article -
14846
Multi-objective Optimization Design of an Aviation Split Path Transmission System
Published 2015-01-01“…The promoting the safety performance and lightweight are considered as the objectives,a multi-objective optimization design of an aviation split path transmission system is conducted.To measure the safety performance of the system,gear contact and bending fatigue strength are computed.Afterwards,a multi-objective optimization model that includes maximum safety factors and minimum mass is developed,with the system parameters selected as design variables.Considering the system requirements for load sharing,a dynamics model of the split path transmission system is established so that the load sharing characteristics can be quantifiably measured and restricted.Non-dominated Sorting Genetic Algorithm II(NSGA-II)is adopted to solve the model.The results show that the method promoted can effectively improve the safety performance and reduce the weight at the same time.…”
Get full text
Article -
14847
A scalable load balancing strategy based on distributed server cluster
Published 2017-09-01“…A distributed database load balancing algorithm based on software defined networking was proposed,which separated the data,control and application to calculate the actual load of a single server in the server cluster.By querying the streams sampling record,the minimum number of server paths were determined,the request response time was reduced,the system throughput and fault tolerance were improved,and the full use of the purpose of server resources was achieved.The general load balancing technology was compared with the load balancing technology based on the software defined networking in the internal network of the distributed database experiment,the result shows that in the load state of the different server clusters,the average response time of the latter is smaller than that of the former,and can get better load balancing effect.…”
Get full text
Article -
14848
Optimal Resource Provision of Cloud Center with Guarantee Percentile Response Time
Published 2015-08-01“…In order to minimize resource provisioning cost of commercial cloud center,while guarantee percentile response time SLA,a cloud center model based on queuing theory was proposed.Resource provisioning cost was analyzed from an economic point of view,and the mathematical expressions of cloud center percentile response time were deduced.Meanwhile the minimum provisioning cost algorithm(MPCA)was developed to calculate the minimum cost of cloud center,the affect on cloud center cost by load flow,percentile response time and based response time was analyzed via a large number of experiments.The results show that with MPCA to optimized server number and speed of cloud center,it can achieve cost linear increase with increasing traffic load.…”
Get full text
Article -
14849
RESEARCH ON VIBRATION CONTROL METHOD OF TRAIN PANTOGRAPH
Published 2019-01-01“…A variable universe fuzzy controller is adopted as the control algorithm. The simulation results show that with the increase of train speed, contact force fluctuation is more obvious, this paper studies the power control method of arch vibration compared with the traditional fuzzy control and passive control method under the action of the contact force is not the average coefficient. …”
Get full text
Article -
14850
Research on Gear Modification Optimization Design of Dual Power Drive Gearbox
Published 2022-07-01“…Based on this,through genetic algorithm, the gear comprehensive modification optimization design combining tooth profile modification and helical modification is carried out, and the gear pair before and after modification is compared and analyzed. …”
Get full text
Article -
14851
Combinatorial double auction-based allocation of retrieval tasks in Internet of Things
Published 2015-12-01“…Task allocation mechanism was greatly important to the success of the search service in Internet of Things (IoT).On basis of analyzing the real time characteristics of the IoT data,and the dynamic characteristics of the users,a combinatorial double auction-based retrieval tasks allocation model was introduced,which described the relationships between the workers,the requesters and the system from the perspective of supply and demand.Firstly,a novel metric to evaluate the value of the users’ queries was introduced and a greedy heuristic algorithm to determine the winning requesters and workers was proposed.Then,a critical payment scheme was proposed,which guaranteed that submitted bids of the users reflect their real value.Finally,both the rigid theoretical analysis and simulation result show that the proposed mechanism achieves truthfulness,individual rationality and the efficiency of the service provider is improved.…”
Get full text
Article -
14852
Joint time and beam domain non-orthogonal multiple access
Published 2021-04-01“…In order to improve the system’s ability to accommodate connected devices, a joint time and beam domain non-orthogonal multiple access (NOMA) scheme was proposed, which was suitable for millimeter wave massive multiple-input multiple-output (MIMO) systems.The correlation and difference of the users’ channel were utilized to realize beam-domain NOMA, and sparse spreading technology was utilized to realize time-domain NOMA.With the optimization goal of improving the communication reliability of the system, optimization problem of the joint domain sparse access matrix design was constructed and solved.Finally, the access matrix was reconstructed based on the channel quality of the joint domain, and the interference cancellation operation was added to the message passing algorithm (MPA), which reduced the decoding complexity and improves the communication reliability.…”
Get full text
Article -
14853
WmFall: WiFi-based multistage fall detection with channel state information
Published 2018-10-01“…Considering that falling and sitting are very similar to each other, a special method is designed for distinguishing them with deep learning algorithm. Finally, the fall detection system is evaluated in a laboratory, which has 89% detection precision with false alarm rate of 8% on the average.…”
Get full text
Article -
14854
Optimal Allocation of Shared Manufacturing Resources Based on Bilevel Programming
Published 2021-01-01“…The weights of the upper indicators are determined by Analytic Hierarchy Process (AHP) and Improved Order Relation Analysis (Improved G1) combination weighting method and the bilevel programming model is solved by the Improved Fast Elitist Non-Dominated Sorting Genetic Algorithm (Improved NSGA-II). Finally, the effectiveness of the model is validated by a numerical example.…”
Get full text
Article -
14855
Prediction and modeling of connectivity probability in vehicular Ad Hoc networks
Published 2016-03-01“…Recently,with the rapid development of vehicular communication technology,IoV(internet of vehicles)as one of the applications of IoT(internet of things),is attracting more and more attention as well as its basic applications.The algorithm of predicting the connectivity probability based on highway model was proposed.Also,the joint distribution of vehicles on highway was studied,and the equation calculating the boundaries of connectivity probability on one road segment was analyzed quantitatively.The diagram presenting the relationship between the connectivity probability on one road segment and the average number of vehicles in each tuple was depicted by Rstudio.As a consequence,the model of connectivity probability on one path was achieved by calculating the products of the connectivity probability on all road segments along one path.The analysis result shows that the connectivity probability on one path can be improved by increasing the communication range or the density of vehicles.…”
Get full text
Article -
14856
Two-layer threat analysis model integrating macro and micro
Published 2021-02-01“…The existing threat analysis models failed to comprehensively analyze the propagation of advanced security threats integrating the threat development trend and propagation path.In order to solve the problem, a two-layer threat analysis model named TL-TAM was established.The upper layer of the model depicted the threat development trend.The lower layer depicted the threat propagation path considering social engineering and networks can.Based on the model, prediction algorithm of threat development was proposed.The experimental result shows that the model can comprehensively analyze the threat propagation at multiple levels, overcome the defect that the threat analysis model based on attack graph is limited to technical vulnerability attack, and is more suitable for dynamic tracking analysis of advanced security threats.…”
Get full text
Article -
14857
Similarity Property and Slide Attack of Block Cipher FESH
Published 2023-01-01“…Taking FESH, an award-winning block cipher of the National Cryptographic Algorithm Design Competition 2019, as an example, similarity properties of the encryption and key transformation are found, owing to the similar structures that the encryption and key transformation adopted, and the constants generation. …”
Get full text
Article -
14858
Development of the conceptual and terminological apparatus of warehousing logistics in the works of Russian and foreign authors
Published 2022-07-01“…The main approaches to the basic concepts of warehousing logistics in the works of russian and foreign authors are considered. the peculiarities of understanding the terms “warehouse”, “warehousing”, “warehousing system” are revealed. the main historical stages of the development of warehouses and storage facilities are reflected. based on the information provided, the following key features are highlighted: the warehouse is a complex system with its own interconnections and internal processes; a modern warehouse economy should be formed according to an optimized logistics system, of which it is a part, and be able to adapt to the slightest fluctuations and changes in this system; difficulties arising in the field of building a warehousing system can be solved with the help of a competently and clearly developed warehouse model based on the application of a logistics approach and the development of an adaptive warehouse management algorithm.…”
Get full text
Article -
14859
Research on consensus mechanism optimization for IoT blockchain
Published 2020-02-01“…The essence of the blockchain is a decentralized distributed ledger system.The Internet of things is interconnected by massive heterogeneous terminals and has natural distributed characteristics.Therefore,the combinedIoT blockchain is widely optimistic.At the same time,due to the heterogeneity of the IoT-aware terminal,the limited computing capacity and the ability of data transmission,the IoT blockchain faces great challenges.The password consensus technology has become a key issue.On the basis of summarizing the current blockchain consensus algorithm,its applicability to the IoT blockchain was analyzed,the current application status of several IoT blockchain platforms and consensus mechanisms was introduced,and the optimization research progress of the consensus mechanismin IoT blockchain was described.Finally,the optimization technology of the IoT blockchain and the potential research directions were summarized.…”
Get full text
Article -
14860
Comparison of Quadratic– and Median-Based Roughness Penalties for Penalized-Likelihood Sinogram Restoration in Computed Tomography
Published 2006-01-01“…Since the quadratic penalty allows for derivation of an algorithm that is guaranteed to monotonically increase the penalized-likelihood objective function, we find it to be preferable to the median-based penalty.…”
Get full text
Article