Showing 15,181 - 15,200 results of 19,511 for search '"algorithms"', query time: 0.11s Refine Results
  1. 15181

    A hybrid traffic scheduling mechanism applied to large scale time-sensitive networking by Yanjue LI, Wenxuan HAN, Hailong ZHU, Changchuan YIN

    Published 2023-12-01
    “…Aiming at large-scale time-sensitive networking (TSN) scenarios that can only ensure frequency synchronization between devices, a hybrid traffic scheduling mechanism was proposed based on time-aware shaper (TAS) combined with cycle specified queuing and forwarding (CSQF).Firstly, a scheme was investigated for achieving periodic cyclic mapping alignment between two adjacent nodes located in different time domains.Secondly, combining segment routing technology, a heuristic algorithm based on CSQF mechanism for joint routing and scheduling was proposed to complete resource allocation for large bandwidth traffic.The experimental results show that the proposed scheme significantly improves the system resource utilization and scheduling success rate compared to existing research results, achieving efficient TSN traffic scheduling in wide area network scenarios.…”
    Get full text
    Article
  2. 15182

    Software-defined cross-domain scheduling mechanism for time-sensitive networking by Shuo WANG, Yudong HUANG, Tao HUANG, Ru HUO, Yunjie LIU

    Published 2021-10-01
    “…For the cross domain scheduling problem of time-sensitive network, a software-defined cross-domain scheduling mechanism for time-sensitive networking was proposed, which was based on three kinds of wide area clock synchronization technology to ensure nanosecond inter-domain time synchronization.Then, a time slot conflict-free cross domain scheduling model was proposed to solve the problem of time slot alignment caused by inter-domain link delay.The time slot conflict-free constraints were used to strictly limit the arrival time of cross-domain traffic at the edge node.Finally, the gate control list of fusion domains for global scheduling was calculated online.The simulation results show that the model can schedule hundreds of time-sensitive traffic in a typical cross-domain remote control scenario, and has a feasible algorithm execution time in seconds.…”
    Get full text
    Article
  3. 15183

    A Semiparametric Approach for Modeling Partially Linear Autoregressive Model with Skew Normal Innovations by Leila Sakhabakhsh, Rahman Farnoosh, Afshin Fallah, Mohammadhassan Behzadi

    Published 2022-01-01
    “…Then, the conditional maximum-likelihood approach is used to estimate the unknown parameters through the expectation-maximization (EM) algorithm. Some asymptotic properties for the semiparametric method are established. …”
    Get full text
    Article
  4. 15184

    Design method of energy efficiency optimization in PLC-RF wireless transmission networks by Yueyu JIANG, Haoxin CHENG, Kang WANG, Wenjun DAI, Xiaoyu LIU

    Published 2023-04-01
    “…An energy efficiency optimization transmission scheme using angular information-based channel state information (AI-CSI) was proposed for indoor communications, which integrated the power line communication (PLC) with radio frequency (RF) wireless communication.Specifically, by considering that the Wi-Fi wireless network and the PLC network were the primary and secondary networks, an optimization problem was established to maximize the total energy efficiency of the secondary network.Then, in order to solve the problem, the beam forming weight vector was obtained by using zero-forcing method based on AI-CSI, and an optimization algorithm joint Dinkelbach with Lagrange multiplier was further presented to achieve the optimal power allocation.Finally, computer simulations were given to verify the effectiveness and superiority of the proposed scheme.Besides, the influence of key parameters such as the number of employed antennas and served users was also analyzed.…”
    Get full text
    Article
  5. 15185

    Modeling of structural and thermodynamics properties of sigma-phase for the Fe-Cr system by Udovskya A., Kupavtseva M.

    Published 2012-01-01
    “…Energetic parameters of 3SLM were calculated by fitting procedure fixed to results obtained by ab-initio calculations conducted for paramagnetic states of differently ordered complexes stayed at the sigma-phase’s crystal structure for Fe-Cr system at 0 K. Respective algorithm and computer program have allowed to calculate an atom distribution of components upon the sub-lattices of s-phase at 300 - 1100 K. …”
    Get full text
    Article
  6. 15186

    Efficient Prediction of Superlattice and Anomalous Miniband Topology from Quantum Geometry by Valentin Crépel, Jennifer Cano

    Published 2025-01-01
    “…Our method also applies to anomalous (interaction-generated) bands, for which we derive an efficient algorithm to determine all Chern numbers compatible with a self-consistent solution to the Hartree-Fock equations. …”
    Get full text
    Article
  7. 15187

    An energy conservation method for locating wireless sensor network nodes in smart grid by Chong WANG, Zeng ZENG

    Published 2016-03-01
    “…Wireless sensor network has been increasingly applied for detecting,monitoring and locating targets in smart grid.In a wireless sensor network,energy is deemed as a critical resource and life of the system can be prolonged by energy saving strategy.A node detection and localization method based on energy-aware was presented.The method could be used for the clustering-based wireless sensor networks.It employed a posterior algorithm using a two-step communication protocol between the clustering head sensor and sensors inside.Only a small amount of node information was needed for the clustering head to run the localization program to determine the subset of sensors for further localization.In this way,consumption of energy and demand for communication bandwidth could be reduced,and the system life could be prolonged as well.Experiment results show that this locating method is able to save up to 32% of energy.…”
    Get full text
    Article
  8. 15188

    A method for shorting of the system Polar code based on bit-reverse permutation by Shunlan LIU, Haibo BIAN, Aiming HU

    Published 2019-10-01
    “…Polar code,as a channel coding scheme in 3GPP standard,has good error correction performance.In order to further improve performance of the BER of the punctured Polar code,the shortening algorithm based on bit-reverse permuation was applied to the system Polar code,and a shortened system polar code was proposed.Simulation results show that in the AWGN channel,under the condition of high code rate,the performance of the BER of the proposed method is better than both the punctured system Polar code and the shortened Polar code.When the code rate is 3/4 and the BER is 10<sup>-4</sup>,the proposed method can obtain a gain of about 0.5 dB than the shortened Polar code,and a gain of about 0.25 dB than the punctured system Polar code.…”
    Get full text
    Article
  9. 15189

    Application of Discrete Mathematical Model in Edge Distortion Correction of Moving Image by Qingwei Xu, Zhoufeng Liu

    Published 2022-01-01
    “…According to the image binarization, the moving target region is segmented, the motion fuzzy degradation model is constructed by using the discrete mathematical model, the global structure information of the image is considered by the structure similarity, the image gradient is transformed from the rectangular coordinate system to the polar coordinate system, the image deconvolution algorithm of the edge distribution of the natural image is used to enhance the image edge features, and the edge distortion correction of the moving image is realized. …”
    Get full text
    Article
  10. 15190

    Novel reversible data hiding based on difference expansion by Jian-gao LUO, Guo-qiang HAN, Yan WO

    Published 2016-02-01
    “…A novel reversible data hiding algorithm based on difference expansion called ACD was proposed, which used the so-called adaptive change direction technology. …”
    Get full text
    Article
  11. 15191

    Research on Management Model Based on Deep Learning by Yuting Zhao

    Published 2021-01-01
    “…In this study, the focus was on the development of management models and future prediction for the cost and risk by using an improved deep learning (DL) algorithm. Management model can be defined as the management activities that are interlinked and organized inside organization of institutions. …”
    Get full text
    Article
  12. 15192

    Active defense technology against intelligent jammer by Zhibin FENG, Yuhua XU, Zhiyong DU, Xin LIU, Wen LI, Hao HAN, Xiaobo ZHANG

    Published 2022-10-01
    “…In the complex electromagnetic countermeasure environment, the intelligent development of jammer has caused a serious threat to wireless communication, while the traditional anti-jamming methods often passively adjusted the working mode or parameters, which will be at a disadvantage or even suppressed in the face of intelligent jammer.To solve this problem, a technical framework of active defense against jammer was proposed, aiming to disrupt the learning process of the intelligent jammer and reduce the jamming efficacy.In order to gradually achieve the goals of “understanding opponent”“controlling opponent” and “defeating opponent”, under the guidance of game theory and adversarial machine learning, the key technologies were discussed from three aspects: backward reasoning of jammer, algorithm vulnerability analysis and confrontational strategy design, independent optimization and online decision-making of anti-jamming strategy.Finally, combined with two specific cases, the feasibility and effectiveness of the proposed technical framework were verified.…”
    Get full text
    Article
  13. 15193

    A Rendezvous Scheme for Self-Organizing Cognitive Radio Sensor Networks by Junhyung Kim, Gisu Park, Kijun Han

    Published 2014-01-01
    “…In this paper, we propose a hopping sequence algorithm to provide an effective method to implement a rendezvous without relying on a dedicated control channel. …”
    Get full text
    Article
  14. 15194

    A Metro Freight Plan for Mixed Passenger and Freight Transportation by Yutao Ye, Junhua Guo, Lixin Yan

    Published 2022-01-01
    “…Finally, through actual case studies, an improved variable neighborhood search algorithm (VNS) was used to verify the effectiveness of the model, and the sensitivity of different train capacities, train headway, and cargo operation cost to the cost of metro freight was also discussed. …”
    Get full text
    Article
  15. 15195

    Inter-carrier interference cancellation using spatial characteristics for high-mobility OFDM communication systems by Wei WANG, Qin-ye YIN, Peng-cheng MU

    Published 2015-08-01
    “…High-mobility orthogonal frequency division multiplexing(OFDM)systems suffered severe inter-carrier interference(ICI)from Doppler spreading.On the basis of the characteristics of wireless propagation in practical scenarios,a method which employed the WINNER Ⅱ channel model to represent the practical wireless channel and an antenna array as the receiver to eliminate ICI in space-domain was proposed.The direction of arrival estimation algorithm and the beamforming network were used to separate the received signals in space-domain.Multi-beam diversity gain was obtained finally by means of combining the signals which have been compensated for Doppler frequency shifts(DFS)respectively.Simulation results demonstrate that the proposed method not only effectively reduces ICI and the error floors,but also obtains a 5~7 dB signal-to-interference gain over systems without use of the proposed method.…”
    Get full text
    Article
  16. 15196

    Insights into the Prevalence of Software Project Defects by Javier Alfonso-Cendón, Manuel Castejón Limas, Joaquín B. Ordieres Meré, Juan Pavón

    Published 2014-01-01
    “…This analysis has been complemented with the use of a hierarchical clustering algorithm with a dissimilarity based on the likelihood ratio statistic, for exploratory purposes. …”
    Get full text
    Article
  17. 15197

    Performance analysis of dual-media cooperative communication based on wireless and power line under hybrid fading by Zhixiong Chen, Yifang Jing, Dongsheng Han, Lijiao Wang

    Published 2019-05-01
    “…Effectiveness and reliability of the algorithm and theoretical formula were verified through simulation, and influence rules of hybrid channel fading and power distribution on the system performance were analyzed.…”
    Get full text
    Article
  18. 15198

    A survey of neural architecture search by Mingjie HE, Jie ZHANG, Shiguang SHAN

    Published 2019-05-01
    “…Recently,deep learning has achieved impressive success on various computer vision tasks.The neural architecture is usually a key factor which directly determines the performance of the deep learning algorithm.The automated neural architecture search methods have attracted more and more attentions in recent years.The neural architecture search is the automated process of seeking the optimal neural architecture for specific tasks.Currently,the neural architecture search methods have shown great potential in exploring high-performance and high-efficiency neural architectures.In this paper,a survey in this research field and categorize existing methods based on their performance estimation methods,search spaces and architecture search strategies were presented.Specifically,there were four performance estimation methods for computation cost reduction,two typical neural architecture search spaces and two types of search strategies based on discrete and continuous spaces respectively.Neural architecture search methods based on continuous space are becoming the trend of researches on neural architecture search.…”
    Get full text
    Article
  19. 15199

    Gearbox Fault Diagnosis based on LMD Approximate Entropy and PSO-ELM by Zhang Yuxue, Pan Hongxia

    Published 2017-01-01
    “…Finally,the input weights of ELM and the threshold value of the hidden layer neurons are optimized by the particle swarm optimization algorithm,the model of PSO-ELM is established,and the approximate entropy values are input into the ELM and PSO-ELM models to recognize and classify the fault types of the gearbox of different conditions. …”
    Get full text
    Article
  20. 15200

    Utility-driven based co-allocation resource reservation strategy in computational grid by Chang-song DING, Zhi-ying WANG, Zhi-gang HU

    Published 2014-05-01
    “…The validity of the model and its algorithm were presented theoreti-cally. The performance of the proposed strategy was simulated in a grid simulation system using the real task load of the practical grid system. …”
    Get full text
    Article