Showing 15,201 - 15,220 results of 19,511 for search '"algorithms"', query time: 0.11s Refine Results
  1. 15201

    Yosida Complementarity Problem with Yosida Variational Inequality Problem and Yosida Proximal Operator Equation Involving XOR-Operation by Rais Ahmad, Arvind Kumar Rajpoot, Imran Ali, Ching-Feng Wen

    Published 2021-01-01
    “…For this purpose, we establish an algorithm based on fixed point formulation. Our approach is based on a proximal operator technique involving a subdifferential operator. …”
    Get full text
    Article
  2. 15202

    Design of low power and high speed FFT/IFFT processor for UWB system by LIU Liang, WANG Xue-jing, YE Fan, REN Jun-yan

    Published 2008-01-01
    “…A new 128/64-point FFT/IFFT processor used in Ultra-Wide-Band(UWB) system was presented.The proces-sor,which is based on 8×8×2 mixed radix algorithm,can deal with multiple inputs more efficiently for MIMO applica-tions.A new eight-path-feedback structure,which can provide a higher throughput and lower power dissipation,was proposed.The test chip has been fabricated using SMIC 0.13μm single-poly and eight-metal CMOS process with a core area of 1.44mm2.The throughput of this chip is up to 1Gsample/s,and the power dissipation is 39.6mW when it works at the throughput of 500Msample/s which meets the UWB standard.This chip reduces 40% of core area and saves 45% of power dissipation compared with those existing 128-point FFT processors.…”
    Get full text
    Article
  3. 15203

    Deep and robust resource allocation for random access network based with imperfect CSI by Weihua WU, Guanhua CHAI, Qinghai YANG, Runzi LIU

    Published 2020-07-01
    “…A deep and robust resource allocation framework was proposed for the random access based wireless networks,where both the communication channel state information (C-CSI) and the interference channel state information (I-CSI) were uncertain.The proposed resource allocation framework considered the optimization objective of wireless networks as a learning problem and employs deep neural network (DNN) to approximate optimal resource allocation policy through unsupervised manner.By modeling the uncertainties of CSI as ellipsoid sets,two concatenated DNN units were proposed,where the first was uncertain CSI processing unit and the second was the power control unit.Then,an alternating iterative training algorithm was developed to jointly train the two concatenated DNN units.Finally,the simulations verify the effectiveness of the proposed robust leaning approach over the nonrobust one.…”
    Get full text
    Article
  4. 15204

    Research of the Transfer Method of Four-dimensional Coordinate to Three-dimensional Coordinate by Ran Xiaoyan, Zhang Bai

    Published 2016-01-01
    “…The coordinate measure machine(CMM) with rotary table is often use in the field of precision measurement.Because of the error evaluation requires that all measured point must be expressed in the same coordinate system,but the workpiece coordinate system is changed in the process of measuring because of rotation of rotary table,so it is difficult to evaluate errors.Therefore,a model for coordinate transfer from four-dimensional coordinate system to three- dimensional coordinate system is created.Through the transfer algorithm of coordinate system,the four- dimensional coordinate with rotary table can be transferred to a three dimension Cartesian coordinate by utilizing rotary table coordinate system to act as medial coordinate system,then,it can be transferred to workpiece coordinate system or machine coordinate system,sequentially,the error evaluation is realized.The experimental results show that the mathematical model is right,and it can meet the requirement of precise measurement.…”
    Get full text
    Article
  5. 15205

    Evaluation of the Safety of High-Salt Wastewater Treatment in Coal Chemical Industry Based on the AHP Fuzzy Method by Shijun Guo, Shubham Sharma, Alibek Issakhov, Nima Khalilpoor

    Published 2021-01-01
    “…An AHR fuzzy mathematics evaluation algorithm is used to compare experimental values with simulated numerical values in brine. …”
    Get full text
    Article
  6. 15206

    Optimization method for attribute-based cryptographic access control in mobile cloud computing by Jian LIU, Ming XIAN, Huimei WANG, Hong RONG

    Published 2018-07-01
    “…For the problem of secure data sharing and access control in mobile cloud,the drawback of traditional cryptographic access control schemes was deeply analyzed.Considering the truth that mobile devices were usually equipped with limited resources,an optimized attribute-based cryptographic access control scheme was proposed in this study.In the proposed scheme,a third party proxy was introduced into the system model,and the two-layer encryption method was applied.Combining traditional attribute-based encryption (ABE) algorithm with multi-secret sharing and split measurement of ABE encryption,the scheme could greatly reduce the cost of mobile users in terms of data publish and access management.Theoretical and experimental analysis shows that the contribution can well meet the requirements of mobile cloud in terms of security,computational complexity and communication cost,which means that it is promising for future applications.…”
    Get full text
    Article
  7. 15207

    Tension Distribution and Dynamics Analysis of a Cable-driven Humanoid Wrist by Gui Heli, Wang Zhaodong, Cao Yi

    Published 2020-06-01
    “…At the same time, taking into account the redundant actuation and single-direction force for the cables, the cable tension distribution optimization model is established, and the cable tension distribution is obtained by genetic algorithm. Secondly, aiming at the influence of the cable mass, a more accurate dynamics model is established by considering catenary. …”
    Get full text
    Article
  8. 15208

    Rough decision rules extraction and reduction based on granular computing by Hong-can YAN, Feng ZHANG, Bao-xiang LIU

    Published 2016-10-01
    “…Rule mining was an important research content of data mining,and it was also a hot research topic in the fields of decision support system,artificial intelligence,recommendation system,etc,where attribute reduction and minimal rule set extraction were the key links.Most importantly,the efficiency of extraction was determined by its application.The rough set model and granular computing theory were applied to the decision rule reduction.The decision table was granulated by granulation function,the grain of membership and the concept granular set construction algorithm gener-ated the initial concept granular set.Therefore,attribute reduction could be realized by the distinguish operator of concept granule,and decision rules extraction could be achieved by visualization of concept granule lattice.Experimental result shows that the method is easier to be applied to computer programming and it is more efficient and practical than the existing methods.…”
    Get full text
    Article
  9. 15209

    Energy-efficient cooperative sensing and transmission in relay-assisted cognitive radio network by Li FENG, Yu-jun KUANG, Bin-wei WU, Xin-chuan FU

    Published 2017-05-01
    “…An innovative EE-oriented cooperative sensing and transmission scheme in relay-assisted cognitive radio networks,called energy-efficient best-relay cooperative transmission (BCT) was proposed.Based on the BCT scheme,mean energy efficiency (MEE) maximization problem with sensing duration and transmitting power as optimization variables was modeled for fading channels under constraint of minimal secondary outage probability.By virtue of Jensen’s inequality,the original optimization problem was decomposed into two relatively independent subproblems which solved sensing duration and power allocation respectively.And for the two subproblems,an efficient cross iteration based algorithm was proposed to obtain the suboptimal solutions.Both analytical and simulation results demonstrate that the proposals can achieve significantly higher EE while enhancing reliability of secondary transmission remarkably compared to non-cooperation single cognitive transmission schemesin high QoS requirement.…”
    Get full text
    Article
  10. 15210

    Session topic mining for interactive text based on conversational content by Jie PENG, Yongge SHI, Shengbao GAO

    Published 2016-09-01
    “…Traditional theme mining model generally digs out the document theme from the interactive text only.In order to explore the session topic and improve the universality of mining model,a kind of interactive text session topic generation model based on the content of the dialogue was put forward.Firstly,by analyzing the characteristics of interactive text and based on the concept of topic tree,a dialog spanning tree was defined with a five-layer structure.Based on this and LDA,the model of session topic generation(ST-LDA)was built.At last,Gibbs sampling method was adopted to deduce the ST-LDA and obtaining session topic and its distribution probability.The results show that the ST-LDA model can dig out a session topic effectively from the interactive text.Besides,the results can reduce the complexity of the classification algorithm and can be back to the theme—participants association.It also has a good universality.…”
    Get full text
    Article
  11. 15211

    Principal component analysis of time delay in large IP network by Xuan WEI, Xiaoying HUANG

    Published 2021-04-01
    “…Network time delay is one of the key indexes to evaluate network performance.Principal component analysis (PCA) is a kind of multivariable analysis and declination algorithm commonly used in the field of data mining.Based on PCA analysis of time delay in large IP networks, aiming to find out the deep reason of time delay and the interdependencies among nodes of the network, a scientific and reasonable network time delay evaluation system was built, and effective suggestions for IP network construction and optimization were finally got.The off-line analysis of the historical network delay is only a preliminary application of the PCA.In the future, PCA can be applied to the real-time on-line monitoring and analysis of the network performance, such as network traffic, network delay, network packet loss, etc., in combination with the network topology, current network traffic direction, routing, distance and other related factors, thus the efficiency and quality of network operations can be further improved.…”
    Get full text
    Article
  12. 15212

    Self-Adaptive Predictor-Corrector Approach for General Variational Inequalities Using a Fixed-Point Formulation by Kubra Sanaullah, Saleem Ullah, Muhammad Shoaib Arif, Kamaleldin Abodayeh, Rabia Fayyaz

    Published 2022-01-01
    “…Convergence analyses of the suggested algorithm are demonstrated. Moreover, numerical analysis shows that we establish the new best method for solving general variational inequality which performs better than the previous one. …”
    Get full text
    Article
  13. 15213

    SDN Communication Quality Assurance Strategy witb DDoS Defense and Routing Optimization by Jiahua Zhang, Zhongxue Yang, Jiangping Wang, Yukai Shi, Liang Wei

    Published 2015-04-01
    “…A SDN communication quality assurance strategy which organic combines DDoS threat identification with route optimization was put forward.It means,when the intent link was congestive attacked by DDoS,it wi11 identify and filter the abnormal data packet,and wi11 generate optimized routing to ensure the quality of network communications.First of a11,a distributed intrusion detection system under SDN framework was designed.The system realizes the detection recognition,filtration and treatment about the DDoS threat,such as cheating message,excepting message and destroying message.Secondly,a kind of best algorithm about generating routing path was realized.The experimental result shows that the network deployment plan which mentioned in this paper,can identify and filter the aggressive data packet,and the average network data transmission delay doesn't increase sharply when the network is under attack.…”
    Get full text
    Article
  14. 15214

    Bus Route Design Problem for Rural Tourism Objectives: A Multiobjective Approach by Juchen Li, Xiucheng Guo, Ruiying Lu, Pei Liu

    Published 2022-01-01
    “…A solution approach is put forward based on the initial solution set generation procedure and strengthens the elitist genetic algorithm. Finally, the bus network in a rural tourism destination of Nanjing is taken as the case study to validate the feasibility and efficiency of the proposed model.…”
    Get full text
    Article
  15. 15215

    A Scalable MAC Protocol Supporting Simple Multimedia Traffic QoS in WSNs by JeongSeok On, HahnEarl Jeon, Jaiyong Lee

    Published 2011-08-01
    “…And if there are the some link failures in multi-hop transmission, the protocol can recover the links quickly. Using this algorithm, the proposed MAC protocol outperforms the IEEE 802.11e EDCF and the IEEE 802.15.4 MAC protocol in terms of the end-to-end delay and stable transmission of multimedia streaming data.…”
    Get full text
    Article
  16. 15216

    Financial Risk Avoidance Based on the Sensor Network and Edge Computing by Yong Yu, Xiaoguo Yin

    Published 2022-01-01
    “…In order to improve the effect of financial risk aversion, this paper studies the financial risk aversion system combined with the edge computing method of the sensor network and proposes a sensor data anomaly detection algorithm based on the offset distance. Moreover, this paper divides the sensor data into several sliding windows according to the time series, analyzes the offset between the data object and other data in the sliding window by calculating the offset distance, and uses the abnormal level to indicate the possibility of data abnormality. …”
    Get full text
    Article
  17. 15217

    Ecological modelling: A computational analysis of air pollution discourses in English print media of India and Pakistan. by Sana Rabbani, Fasih Ahmed

    Published 2025-01-01
    “…The study applied Latent Dirichlet Allocation (LDA), a robust algorithm for analyzing the large text corpus. The study underpinned Computational Grounded Theory, which relies on the fact that computation is a way to reveal the hidden meanings beyond the text. …”
    Get full text
    Article
  18. 15218

    Artificial intelligence in healthcare: A focus on the best practices by Haddiya Intissar, Ramdani Sara

    Published 2024-01-01
    “…However, alongside this potential, challenges and ethical considerations remain. Data privacy, algorithmic bias, transparency of AI decision-making, and responsible use are crucial areas that require careful attention. …”
    Get full text
    Article
  19. 15219

    Fault Feature Extraction Method of Gearbox based on Parameter Optimization VMD by Ding Chengjun, Fu Xiaoyang, Feng Yubo, Zhang Liang

    Published 2020-03-01
    “…Firstly,the drosophila optimization algorithm is used to search for the most optimal combination of the variational mode decomposition's <italic>K</italic> and <italic>α</italic>,aiming at the minimum local entropy of the decomposition result. …”
    Get full text
    Article
  20. 15220

    Eenergy effiency access strategy:towards hybrid wireless sensor network by Ya-song WANG, Qin-yu ZHANG, Yun-he LI, Jing HAN

    Published 2013-09-01
    “…A dynamically access mechanism of non-real-time sensor nodes with adaptive listening and sleeping,against the background,co-existence of real-time traffic and non-real-time traffic in the networks,was studied.The energy consumption is very slow while the node is in a sleep state; however,the long sleep time may make the network nodes miss transmission opportunity.Thus,according to the usage of the channel,a reasonable set of wireless sensor network nodes sleep time in the network energy consumption and transmission efficiency could be adjusted to maximize the energy transmission efficiency of wireless sensor network.Firstly,the continuous-time Markov modeling the problem was used and analyzed.Then system model based on perturbation analysis theory was proposed to obtain the gradient algorithm for solving the optimal sleep time.Finally,the feasibility of the recommended program is verified by comparing the theoretical results and computer simulation.…”
    Get full text
    Article