Showing 15,221 - 15,240 results of 19,511 for search '"algorithms"', query time: 0.08s Refine Results
  1. 15221

    Analysis of the Indicators Based on the DS/FH TT&C System by Youyou Xi, Jianhua Hao, Naiping Cheng, Maoguo Liu

    Published 2013-02-01
    “…The novelty and importance in testing of TT&C were analyzed;the meaning of the indicators from both qualitative and quantitative aspects was defined;the test method of the indicators was provided,and a new algorithm used to correct the test error about the stability of the hopping pattern was proposed. …”
    Get full text
    Article
  2. 15222

    Estimation of Concentrations Parameters in the Model of Mixture with Varying Concentrations by Rostyslav Maiboroda, Vitaliy Miroshnychenko, Olena Sugakova

    Published 2025-01-01
    “…Consistency of the LS estimator is demonstrated. A fast algorithm for the LS estimator calculation is presented. …”
    Get full text
    Article
  3. 15223

    ANALYSIS OF THE REASONS OF BREAKAGES OF RETAYNER OF THE CAMP OF PQF AND SOLUTION OF PROBLEMS by A. V. Chubenko

    Published 2015-11-01
    “…The solution assumes change of algorithm of work in the operating programmable logical Simatic S7–400 controler of the rolling mill PQF. …”
    Get full text
    Article
  4. 15224

    Method for determining of statistical characteristics of evaluated distance obtained from measurements of Doppler frequency offsets by V. V. Legkostup

    Published 2022-06-01
    “…Despite the fact that the object guidance loop is closed according to the time difference of arrival information, it is necessary to enter the distance between the object and the center of the navigation system into the algorithm for generating control commands in order to stabilize the frequency response of the control loop and eliminate dynamic errors. …”
    Get full text
    Article
  5. 15225

    Technical Review on Endoscopic Treatment Devices for Management of Upper Gastrointestinal Postsurgical Leaks by Renato Medas, Eduardo Rodrigues-Pinto

    Published 2023-01-01
    “…Our discussion specifically focuses on principles and mechanism of action, advantages and disadvantages of each technique, indications, clinical success, and adverse events. An algorithm for endoscopic approach is proposed.…”
    Get full text
    Article
  6. 15226

    Privacy-preserving trajectory similarity computation method by Haining YU, Hongli ZHANG, Xiangzhan YU, Jiaxing QU, Mengmeng GE

    Published 2022-11-01
    “…To tackle privacy concerns on user information leakage in trajectory outsourcing services, a privacy-preserving trajectory similarity computation (pTSC) method was proposed.A trajectory outsourcing service provider was enabled to store encrypted trajectories from owners, wait for encrypted interested trajectories from requesters, and compute trajectory similarity between an interested trajectory and stored trajectories in ciphertext domain without learning anything about users’ trajectories.To compute a trajectory similarity over encrypted trajectories efficiently, a secure trajectory similarity computation protocol with longest common subsequence was proposed, which used somewhat homomorphic encryption and secure comparison protocol to compute the length of longest common subsequence over two encrypted trajectories.Furthermore, a ciphertext compression algorithm was designed to improve efficiency.Theoretical analysis and experimental evaluations show that pTSC method is secure and efficient.…”
    Get full text
    Article
  7. 15227

    Pilot Position Optimization Design of WLAN System Based on Experiment by Jue Lan, Yunzhou Li, Xin Su, Shidong Zhou

    Published 2015-08-01
    “…Considering the frame structure of IEEE 802.11ac with “leading preamble plus comb-like pilot”,the performance evaluation formula of the correction scheme based on maximum likelihood estimation was derived,according to which the effect of pilot location,channel fading and subcarrier correlation was studied.Furthermore,a signalling exchange method was proposed,which ensured pilot position synchronization on both end,and a low complexity algorithm of pilot optimization according to the frequency channel amplitude information.In this way,the pilot overhead can be reduced without loss of correction performance.The experiment and simulation result shows that for ideal Rayleigh channel data,correction performance improves by 1.85 dB and 7.15 dB for unknown channel amplitude information in frequency domain and known cases respectively.For field experiment channel data,correction performance improves by 1.67 dB and 2.68 dB respectively.…”
    Get full text
    Article
  8. 15228

    Cooperative spectrum sensing method and performance analysis based on similarity between evidences by Zhiguo SUN, Xinyue REN, Zengmao CHEN, Ming DIAO

    Published 2020-12-01
    “…The Dempster-Shafer(DS) evidence theory was applied to cooperative spectrum sensing and address the paradox of evidence in classical DS evidence theory, a new weighted distance measure based algorithm was proposed.Firstly, the evidences were extracted for each sensing user.Then, the weighted distance measure of extracted basic probability assignment data was adopted as the similarity between evidences of sensing users.Finally, the similarity of evidences was transformed into credibility, which was utilized as the weight to obtain the weighted average of basic probability assignment.In order to reduce the amount of data reported to the fusion center, the projection approximation method was employed to adjust the basic probability assignment.Both theoretical analysis and simulation results show that the proposed method can improve the detection performance of spectrum sensing while the paradox of evidence exists.Compared with traditional methods the cooperation overhead is reduced.…”
    Get full text
    Article
  9. 15229

    Topology Optimization Design of the Planar 3-RPR Fully Compliant Parallel Mechanism by Sha Sai, Zhang Rongxing, Zhou Lei, An Ziming

    Published 2016-01-01
    “…Based on the differential kinematics of parallel mechanism displacement vector differential mapping relation between input and output,through establishing a planar 3-RPR topology optimization model of fully compliant parallel mechanism( SIMP interpolation model),the solution is optimized by using the optimization criterion method( OC) algorithm,and by using the Heaviside filtering technology,the checkerboard phenomenon is restrained and processed. …”
    Get full text
    Article
  10. 15230

    STRUCTURE OPTIMIZATION DESIGN FOR THE ROTARY WORKTABLE OF GANTRY MACHINING CENTER BASED ON RESPONSE SURFACE METHODOLOGY by ZHENG Bin, ZHANG JingDong

    Published 2018-01-01
    “…Then,the multi-objective optimization algorithm is adopted to optimize the response surface model and combined with the production technique to determine the best optimization scheme. …”
    Get full text
    Article
  11. 15231

    Blind audio watermarking mechanism based on variational Bayesian learning by Xin TANG, Zhao-feng MA, Xin-xin NIU, Yi-xian YANG

    Published 2015-01-01
    “…In order to improve the performance of audio watermarking detection,a blind audio watermarking mechanism using the statistical characteristics based on MFCC features of audio frames was proposed.The spread spectrum watermarking was embedded in the DCT coefficients of audio frames.MFCC features extracted from watermarked audio frames as well as un-watermarked ones were trained to establish their Gaussian mixture models and to estimate the parameters by vatiational Bayesian learning method respectively.The watermarking was detected according to the maximum likelihood principle.The experimental results show that our method can lower the false detection rate compared with the method using EM algorithm when the audio signal was under noise and malicious attacks.Also,the experiments show that the proposed method achieves better performance in handling insufficient training data as well as getting rid of over-fitting problem.…”
    Get full text
    Article
  12. 15232

    Low complexity decoder over time-selective fading channels by ZHANG Bi-jun, ZHU Guang-xi, SUN Jun, LIU Wen-ming

    Published 2006-01-01
    “…The intra symbol interferences within the all groups were firstly sup-pressed in virtue of the construction of orthogonal matrices and then obtained the all groups’ transmitted symbols based on the group detection technique using the simplified matrix inverse algorithm. The computational complexities of the proposed decoder were decreased greatly compared with the existed conversational decoding scheme. …”
    Get full text
    Article
  13. 15233

    Analysis of Pulse System Dynamics of Phase Synchronization in Multiple Capture Mode by A. L. Shilina

    Published 2003-08-01
    “…The paper considers a model, a method and an algorithm of the simulation of the pulse system dynamics of phase synchronization in the multiple capture mode. …”
    Get full text
    Article
  14. 15234

    Source cell-phone identification from recorded speech using non-speech segments by Anshan PEI, Rangding WANG, Diqun YAN

    Published 2017-07-01
    “…Source cell-phone identification has become a hot topic in multimedia forensics.A novel cell-phone identification method was proposed based on the silent segments of recorded speech.Firstly,the silent segments were obtained using adaptive endpoint detection algorithm.Then,the mean of Mel frequency coefficients (MFC) was extracted as the characteristics for device identification.Finally,the CfsSubsetEval evaluation function of WEKA platform was selected according to the best priority (BestFirst) search,and support vector machine (SVM) was used for classification.Twenty-three popular models of the cell-phones were evaluated in the experiment.Experimental results show that the proposed method is feasible and the average recognition rates are 99.23% and 99.00% on the TIMIT database and the CKC-SD database.At the same time,the proposed feature performs was demonstrated better than the MFC features and the Mel frequency cepstrum coefficients (MFCC) features of the speech segments.…”
    Get full text
    Article
  15. 15235

    A novel motion control approach for tethered wheeled mobile robot on extreme terrain by Xiaotao Wang, Xingyu Wang, Jiayou Zhang

    Published 2025-01-01
    “…Simulations are performed to verify the effectiveness of the proposed algorithm.…”
    Get full text
    Article
  16. 15236

    Prosodic organization of English folk riddles and the mechanism of their decoding by Larysa Taranenko

    Published 2016-12-01
    “…Within the process of cognitive model formation the author performs a conceptual analysis of the riddle compositional structure, presented as a systemic algorithmic scheme. It is confirmed that a characteristic feature of a folk riddle is its division into two elements: the first one is the description of an object, further differentiated into “topic” and “commentary”, while the second one is the riddle answer, or solution, generated directly in the recipient’s mind as a result of his/her mental activities. …”
    Get full text
    Article
  17. 15237

    Research on security architecture of strong PUF by adversarial learning by Yan LI, Wei LIU, Yuanlu SUN

    Published 2021-06-01
    “…To overcome the vulnerability of strong physical unclonable function, the adversarial learning model of strong PUF was presented based on the adversarial learning theory, then the training process of gradient descent algorithm was analyzed under the framework of the model, the potential relationship between the delay vector weight and the prediction accuracy was clarified, and an adversarial sample generation strategy was designed based on the delay vector weight.Compared with traditional strategies, the prediction accuracy of logistic regression under new strategy was reduced by 5.4% ~ 9.5%, down to 51.4%.The physical structure with low overhead was designed corresponding to the new strategy, which then strengthened by symmetrical design and complex strategy to form a new PUF architecture called ALPUF.ALPUF not only decrease the prediction accuracy of machine learning to the level of random prediction, but also resist hybrid attack and brute force attack.Compared with other PUF security structures, ALPUF has advantages in overhead and security.…”
    Get full text
    Article
  18. 15238

    Antiswing Control and Trajectory Planning for Offshore Cranes: Design and Experiments by Ronny Landsverk, Jing Zhou, Daniel Hagen

    Published 2024-10-01
    “…We present a trajectory tracking technique explicitly crafted for swing suppression under control, rooted in the principles of the iterative learning algorithm and based on physics. The proposed antiswing control strategy guarantees asymptotic convergence of the payload's swing, angular velocity, and angular acceleration to desired values. …”
    Get full text
    Article
  19. 15239

    Fuzzy Sliding Mode Control Method for AUV Buoyancy Regulation System by Wende Zhao, Decheng Wang, Zhenzhong Chu, Mingjun Zhang

    Published 2021-01-01
    “…Then, the sliding mode control algorithm is combined with the fuzzy system to improve the control accuracy. …”
    Get full text
    Article
  20. 15240

    First-Train Timetable Synchronization in Metro Networks under Origin-Destination Demand Conditions by Hetian Chai, Xiaopeng Tian, Huimin Niu

    Published 2022-01-01
    “…Then, the Nondominated Sorted Genetic Algorithm-II (NSGA-II) is adopted to solve the proposed model, and an improved technique is elaborated to reduce the alternative route choices. …”
    Get full text
    Article