-
15261
A cooperative multicast efficient resource allocation scheme based on limited feedback
Published 2017-10-01“…A joint subcarrier and power allocation scheme based on limited feedback for cooperative multicast network was proposed to minimize the consumed power under constrain of QoS requirement.The new scheme worked in two steps.Firstly,subcarriers were distributed to different multicast groups with equal rate assumption according to limited feedback information,where fair subcarrier allocation scheme was used to achieve a tradeoff between power and fairness.Then,a cooperative power iterative scheme was adopted to allocate power effectively,where target rate on each subcarrier was computed by water-filling algorithm in the first place and then a power iterate process was implemented to optimize power allocation.Simulation and comparison results show that the new scheme significantly reduces uplink feedback overhear and the required power and the multicast service outage of cooperative scheme is much less than those of the direct scheme.Besides,cooperative power iterative scheme has lower computational complexity and therefore is suitable for practical system.…”
Get full text
Article -
15262
DAGUARD: distributed backdoor attack defense scheme under federated learning
Published 2023-05-01“…In order to solve the problems of distributed backdoor attack under federated learning, a distributed backdoor attack defense scheme (DAGUARD) under federated learning was proposed based on the assumption that the server selected no more than half of malicious clients for global aggregation.The partial update strategy of the triple gradient optimization algorithm (TernGrad) was designed to solve the backdoor attack and inference attack, an adaptive density clustering defense scheme was designed to solve the backdoor attacks with relatively large angle deflection, the adaptive clipping scheme was designed to limit the enhancement backdoor attack that amplify the gradients and the adaptive noise-enhancing scheme was designed to weaken distributed backdoor attacks.The experimental results show that in the federated learning scenario, the proposed scheme has better defense performance and defense stability than existing defense strategies.…”
Get full text
Article -
15263
Inverse Fuzzy-Directed Graph With an Application in Traffic Flow Problem
Published 2024-01-01“…The concluding segment demonstrates the practicality of employing the IFDG algorithm to identify the most congested traffic flows in Kumbakonam, Tamil Nadu, India.…”
Get full text
Article -
15264
Analysis of customers' electricity consumption behavior for peak load shifting
Published 2017-05-01“…In order to implement well-directed peak load shifting for massive customers,a method for analyzing massive customers' electricity consumption behavior for peak load shifting was proposed.Firstly,clustering algorithm was used to cluster daily load curves of the main power grid in the previous year and get load characteristics in different dates.Then the load curves of all customers under every date cluster were clustered,the peak load shifting method was derived by comparing the load characteristics of the main power grid and customers.Finally,the peak load shifting method in a future day was given by date matching between the future day with a historical day using dynamic time warping (DTW).Empirical study shows that the method is conductive to peak-valley electricity pricing and orderly electricity consump-tion and can further achieve peak load shifting and stable operation of the main power grid.…”
Get full text
Article -
15265
Active Mode Switching Control Strategy of Hybrid Electric Vehicle based on Identification of Road Gradient
Published 2019-09-01“…On the basis of determining the working mode first,taking the minimum fuel consumption as the objective function,the optimal torque allocation is carried out in real time with dynamic programming algorithm. On the premise of economy,the hybrid power system can achieve the shift gear at the uphill moment to meet the needs of driver's power performance and drivability.…”
Get full text
Article -
15266
Research of a Novel Ship-loading Energy Circulatory System under Multi-process State
Published 2015-01-01“…For the problems of high energy consumption,low utilization in ship sailing process,a new type of ship-loading energy circulatory system is presented,the system with the process of the flow field around the sports field of the ships as a power source kinetic energy is transformed into electrical energy.In the model,according to the changing of the sailing process state,the DMC-PID mixed prediction control algorithm is introduced to adjust the transmission ratio of belt drive in the system.Finally,the variable law of the belt drive parameters characteristic and performance indicators of the ship-loading energy circulatory system under the condition of transmission ratio under control are studied.The results show that the designed novel ship-loading energy circulatory system is feasible through analysis of performance indicators,since the introduction of variable transmission ratio belt drive system and DMC-PID control system in the energy circulatory system,the performance of the system is improved.…”
Get full text
Article -
15267
Gated Channel Attention Mechanism YOLOv3 Network for Small Target Detection
Published 2022-01-01“…In order to solve the problem of low recognition rate and high missed rate in current target detection task, this paper proposes an improved YOLOv3 algorithm based on a gated channel attention mechanism (GCAM) and adaptive up-sampling module. …”
Get full text
Article -
15268
LIGHTWEIGHT DESIGN OF A SMALL FAMILY CAR DISC BRAKE BASED ON ANSYS (MT)
Published 2023-01-01“…NSGA-II hybrid variant algorithm based on the control elite strategy in Ansys was used to optimize the brake disc. …”
Get full text
Article -
15269
CNID: Research of Network Intrusion Detection Based on Convolutional Neural Network
Published 2020-01-01“…In this paper, a multiclassification network intrusion detection model based on convolutional neural network is proposed, and the algorithm is optimized. First, the data is preprocessed, the original one-dimensional network intrusion data is converted into two-dimensional data, and then the effective features are learned using optimized convolutional neural networks, and, finally, the final test results are produced in conjunction with the Softmax classifier. …”
Get full text
Article -
15270
Forward Kinematics Analysis of 2RUS/RRS Parallel Mechanism
Published 2018-01-01“…The FK problem of 2 RUS/2 RRS are numerically verified by inverse Broyden algorithm in Quasi-Newton method.…”
Get full text
Article -
15271
Two Improved Cancellation Techniques for Direct-Conversion Receivers
Published 2016-01-01“…It can improve the integrity of the baseband signal and reduces the complexity of the subsequent software algorithm. Experimental results show that two kinds of improved technology can improve the performance of DCR and expand its scope of application.…”
Get full text
Article -
15272
Application of Big Data Analysis in Cost Control of Marine Fishery Breeding
Published 2022-01-01“…In order to improve the stability of the cost control of marine fishery culture, a method of controlling the cost of marine fishery culture based on big data analysis algorithm was proposed. We establish the cost analysis model of marine fishery, use the big data correlation analysis method to conduct distributed mining on the cost characteristics of marine fishery, deeply grasp the relevance of data characteristics, use the information fusion method to build the constraint parameter analysis model of aquaculture cost operation, limit the amount of calculation, and use the adaptive neural network weighted training method to adaptively optimize the cost control to avoid falling into local optimization. …”
Get full text
Article -
15273
Complement Diagnostics: Concepts, Indications, and Practical Guidelines
Published 2012-01-01“…Here, we summarize indications, techniques, and interpretations for basic complement analyses and present an algorithm, which we follow in our routine laboratory.…”
Get full text
Article -
15274
VIBRATION MODAL ANALYSIS AND RESEARCH OF CANTILEVER BEAM BASED ON POLY IIR METHOD
Published 2019-01-01“…In the end,the experimental modal algorithm based on Poly IIR is applied to identify the modal parameters of simply supported beam. …”
Get full text
Article -
15275
Nanosecond level time synchronization in datacenter network based on Telemetry architecture
Published 2021-10-01“…To solve the problems of the traditional local time synchronization architecture being disconnected from centralized management, requiring extra interaction overhead, meanwhile with less time data susceptible to outliers, the nanosecond level time synchronization system was proposed based on Telemetry for the high-precision time synchronization requirements of data center networks.Combined with the outlier factor detection algorithm, timestamp information within the background traffic of the data center was collected, the large amount of time information reported was processed and analyzed, and a centralized automatic synchronization with nanosecond level precision was eventually achieved, which was convenient for subsequent global network scheduling.The proposed system was implemented and evaluated on the programmable switch.Experimental results show that between multiple hops and at different link rates, the nodes can achieve high-precision time synchronization at the nanosecond level.…”
Get full text
Article -
15276
Multi-channel based edge-learning graph convolutional network
Published 2022-09-01“…Usually the edges of the graph contain important information of the graph.However, most of deep learning models for graph learning, such as graph convolutional network (GCN) and graph attention network (GAT), do not fully utilize the characteristics of multi-dimensional edge features.Another problem is that there may be noise in the graph that affects the performance of graph learning.Multilayer perceptron (MLP) was used to denoise and optimize the graph data, and a multi-channel learning edge feature method was introduced on the basis of GCN.The multi-dimensional edge attributes of the graph were encoded, and the attributes contained in the original graph were modeled as multi-channel.Each channel corresponds to an edge feature attribute to constrain the training of graph nodes, which allows the algorithm to learn multi-dimensional edge features in the graph more reasonably.Experiments based on Cora, Tox21, Freesolv and other datasets had proved the effectiveness of denoising methods and multi-channel methods.…”
Get full text
Article -
15277
Hexapeptide dalargin in clinical gastroenterology: 30 years' of clinical application of the drug
Published 2016-08-01“…Article presents results of use of hexapeptide, algorithm and guideline on its application are analyzed, possible mechanisms of action are discussed. …”
Get full text
Article -
15278
Simulating Chemistry with Fermionic Optical Superlattices
Published 2025-01-01“…Our work enables the application of recent quantum algorithmic techniques, such as double factorization and quantum tailored coupled cluster, to present-day fermionic optical lattice systems with significant improvements in the required number of experimental repetitions. …”
Get full text
Article -
15279
RESEARCH ON BEARING FAILURES OF LARGE-SCALE WIND TURBINES WITH IMPROVED MULTI-SCALE MORPHOLOGY
Published 2021-01-01“…Experimental and comparative results show that the algorithm proposed in this paper has a certain of advantages.…”
Get full text
Article -
15280
The Optimal Supply Decision Based on Dynamic Multiobjective Optimization and Prediction
Published 2022-01-01“…The dynamic prediction protocol is obtained by considering the variation in production and material costs by an evolutionary algorithm. The model enables users to determine material supply protocol in continuous time and autonomously adapt to changes in the manufacturers’ production goals within a lower convergence time.…”
Get full text
Article