Showing 15,341 - 15,360 results of 19,511 for search '"algorithms"', query time: 0.09s Refine Results
  1. 15341

    Service substitution method based on composition context by Hai-yan WANG, Si-rui LI

    Published 2014-09-01
    “…With the variety of requirements from service requesters and the increasing complexity of network environ-ments,service composition has become more and more complicated.In order to decrease redundant information of the substituted service and improve the accuracy of service substitution,the composition context was regarded as the match-ing criteria and tried to substitute failed service with the following two steps.First,a composition context information collecting algorithm (CCICA) was proposed based on the color petri net model of the service workflow,and regarded the composition context as the collecting source of service information.Second,a levenshtein distance-based service substi-tution method (LDBSSM) was given,which was integrated with dependencies between service interfaces.Simulation re-sults show that the proposed LDBSSM method is practical because it can not only reduce redundancy of substituted ser-vice information but also effectively improve the accuracy of service substitution.…”
    Get full text
    Article
  2. 15342

    Nonlinear seismic analysis of a reinforced concrete building for Brazilian conditions and standards by José Vittor Siqueira Cóco, Mauro Schulz

    Published 2025-02-01
    “…The implicit time integration algorithm ensures the equilibrium conditions at the end of each time step. …”
    Get full text
    Article
  3. 15343

    STATIC ANALYSIS AND STRUCTUREOPTIMIZATION OF THE 18 m~3 CONCRETEMIXING TRUCKSUBFRAME by SHI WeiChao, WANG LiJie, DUAN XiaoFeng

    Published 2018-01-01
    “…Aimed at reducing stress and weight,it designed topological Optimization algorithm for optimizing the subframe structure,analyzed the light weighting result and stress statics characteristic of optimized subframe,the result indicated that the stress and weight of the optimized subframe lower than before,the failure problem of maximum stress areahas been solved,the optimized subframe can satisfy the enterprise design requirements.…”
    Get full text
    Article
  4. 15344

    Multiweight Cross-Multimedia Logistics Optimal Path Exploration by Integrating High-Dimensional Deep Learning by Huiying Zhang, Jinjin Guo, Guie Sun

    Published 2021-01-01
    “…Starting from the total amount of logistics, regional layout, enterprise scale, and high-dimensional deep learning algorithm, this paper analyzes the current situation of China’s logistic development through multiweight analysis and explores the best path for multimedia logistics.…”
    Get full text
    Article
  5. 15345

    Discrete Dynamic Modeling Analysis of Rural Revitalization and Ecotourism Sustainable Prediction Based on Big Data by Yao Tang

    Published 2022-01-01
    “…In view of this situation, this paper uses the mathematical algorithm of BP neural network to simulate the structure of brain neural network to deal with this kind of nonlinear relationship problem. …”
    Get full text
    Article
  6. 15346

    Analysis and Research of Deicing Special Vehicle Shovel Ice Device Conveyor by Zhang Zhifu, Huang Qibai, Chen Dingfang, Wang Xiaojuan

    Published 2015-01-01
    “…In view of the phenomenon that icy roads to road traffic accidents have severely affected,a mechanical deicing special vehicle for road deicing,which carried on the reasonable design and layout is devised.The belt drive system of mechanical deicing device is major researched,infinitesimal dynamics equation of conveyor belt is established,and the belt drive system is analyzed in theory.Through theory design and engineering design algorithm,the belt transmission torque and power is analyzed,the foundation for the further study of belt transmission is laid.By using the ANSYS and ADAMS,the stress simulation and dynamics simulation of belt drive systems are carried out,and the correctness of the preliminary design of pulley drive system is validated,the technical support of the optimum design of deicing special vehicle is provided.The study of deicing special vehicle deicing efficiency has played a key role,which with better economic benefits and promotional value.…”
    Get full text
    Article
  7. 15347

    Functional composition in software-defined network based on atomic capacity by UANTong D, ANJu-long L, HENGGuo-zhen C, UYu-xiang H

    Published 2015-05-01
    “…Software-defined network (SDN) enables frequent network functional innovation and evolution,making the control function modularity one of the most hot research fields on SDN.Aiming at network-wide functional composition based on unified module definition and function division,firstly,atomic capacity (AC) is introduced as atomic elements of module function division and an AC-based resource description method is proposed; secondly,functional composition module based on two-level mapping is put forward and a heuristic algorithm to calculate the composition is proposed; fi-nally,an AC-orchestrating layer as extended structure of SDN application layer is devised and then a NetFPGA-10G pro-totype implementation is given.Experimental results show that the method can combine functional instances more effec-tively with better resource utilization.…”
    Get full text
    Article
  8. 15348

    Analysis and Improvement of Key Distribution Scheme for Secure Group Communication by Jia Ning Luo, Ming Hour Yang

    Published 2016-01-01
    “…Zhou and Huang proposed a key-updated scheme based on ciphertext-policy attribute encryption algorithm to improve the security of key-update mechanism, but their scheme is vulnerable: a malicious group member may send forged key-update messages to control the group. …”
    Get full text
    Article
  9. 15349

    Design of the End-effector of Waste Lithium-ion Battery Handling Robots by Zhang Hongsheng, Deng Ze

    Published 2024-03-01
    “…The rod length and position parameters of six-bar mechanism are optimized by genetic algorithm-BFGS (GA-BFGS) quasi-Newton method and particle swarm optimization-BFGS (PSO-BFGS) quasi-Newton method, and the dynamics model of the six-bar mechanism is established. …”
    Get full text
    Article
  10. 15350

    Research on edge offloading delay optimization of cellular networks based on optimal transport theory by Xiangyu LYU, Yong XIAO, Yi ZHONG, Qiang LI, Xiaohu GE

    Published 2023-12-01
    “…With the development of the internet of things, a large number of user device (UD) were connected to cellular network.Since the changes in the spatial distribution of UD and application requirements, it is necessary to dynamically adjust the UD’ offloading decision.Comprehensively considering various parameter information in the networks such as the spatial distribution of UD, application requirements, and the processing capability of the edge servers on the base station (BS) side, the offloading decision of UD were optimized from the perspective of distribution.Based on the optimal transport theory, a delay optimization algorithm was proposed to reduce the average delay of the UD’ computing tasks offloading process by reasonably planning the offloading BS of the UD in the networks.The simulation results show that the average delay can be reduced by 81.06% using the proposed offloading mechanism based on delay optimization, and the traffic handled by each BS is balanced.…”
    Get full text
    Article
  11. 15351

    Power control strategy with joint of multi-packet reception and fuzzy logic control by Jiang-hong HAN, Song-hua HU, Bin LIU, Zhen CHEN, Lei LIU

    Published 2015-02-01
    “…In order to meet the needs of energy saving in wireless networks,a power control strategy with joint of multi-packet reception and fuzzy logic was proposed.Firstly,based on the power control with successive interference cancellation (SIC),transmission power was divided into several decodable power levels.Secondly,fuzzy logic control algorithm was adopted to select the optimal transmission power for SIC.In addition,three parameters were designed as fuzzy logic control inputs for power selection,which were the distance between transmitters and receivers,the number of neighboring nodes and the residual energy of transmitters.Simulation results show that power control strategy with joint of multi-packet reception and fuzzy logic control not only betters average network throughput than other power control strategy for SIC,but also saves more energy so that the network lifecycle would be significantly extended.…”
    Get full text
    Article
  12. 15352

    Information tracing model based on PageRank by Qian LI, Jia-wei LAI, Yun-peng XIAO, Bin WU

    Published 2017-08-01
    “…In social network,original publisher and important nodes in the diffusion process can be traced by analyzing the spreading network of a hot topic.The participated users and spreading network structure of a hot topic build an information tracing model,which mines the source and important diffusion nodes.Firstly,it analyzed the development trend of a hot topic and extracts the users involved.Secondly,it established a user network according to the following relationship of the users involved.Thirdly,the contribution rate of users on the development of the hot topic was initialized,and the PageRank algorithm was used to construct the information tracing model.Finally,the Top k users were selected as the information publisher and important users of the hot topic according to the contribution rate.Experimental results showed that our model can effectively discover the hot topic of the publisher and important users.…”
    Get full text
    Article
  13. 15353

    DAMAGE IDENTIFICATION METHOD BASED KRIGING MODEL by MA JingJing, YIN Hong, PENG ZhenRui, DONG KangLi

    Published 2020-01-01
    “…Sample points were chosen based on Latin hypercube sampling,and Kriging model was built using acceleration frequency response functions corresponding to the damage parameters;then,Kriging model with good precision was used to replace the finite element model to participate in the optimization process. Cuckoo algorithm was used to obtain the damage parameters,where the objective function with the minimum frequency response deviation was constructed. …”
    Get full text
    Article
  14. 15354

    Research on High-Speed Railway Communication Strategy Based on LIFI Technology by Tingting Chen, Weiwei Hu

    Published 2022-01-01
    “…Moreover, this paper studies the access point allocation problem in indoor LiFi/WiFi hybrid network, fully considers the dynamic change of network load, and introduces a dynamic load balancing algorithm that determines AP allocation in hybrid network based on the data transmission rate as the switching threshold. …”
    Get full text
    Article
  15. 15355

    Application of Kalman filtering based on sequential processing for satellite navigation by Can-hui CHEN, Xiao-lin ZHANG, Hang-yu HUO

    Published 2012-01-01
    “…In order to reduce the operational volume and ensure the real-time capability of navigation algorithm of Kalman filtering,a novel filtering method called single-satellite sequential extended Kalman filtering (S<sup>3</sup>EKF) was proposed based on extended Kalman filtering (EKF) and sequential processing,where the single-satellite was as basic filtering unit.Simulation results show that,compared with the traditional EKF method,the S<sup>3</sup>EKF method can decrease the computation load efficiently when the number of visible satellites is no less than 7,and the reduction of computation load increases with the increase of the satellite’s visible n r,the decrease will reach more than 50% when the number of visible satellites is no less than 15.On the other hand,the consistency and stability of navigation solution are good when the satellites and their number are time-vraiant in S<sup>3</sup>EKF method.…”
    Get full text
    Article
  16. 15356

    Random access scheme for different MTC scenario requirement by Zhefu WU, Xinyuan YANG, Wenchao ZHAI, Huimei HAN

    Published 2020-11-01
    “…For the different random access requirements of the mixed scenarios of ultra-reliable low latency (URLLC) and massive machine type communications (mMTC) in MTC,a random access scheme based on devices grouping was proposed.The proposed scheme divided the MTC devices into several groups based on the timing advance (TA) information:for the URLLC scenario,preamble resources were reserved for core devices in each group,and the URLLC devices accessed the network via the contention-free mechanism,to satisfy the ultra-reliable low latency access requirement; for the mMTC scenario,the base station utilized the different TA information in different group to identify devices selecting the same preamble,and performed successive interference cancellation (SIC) algorithm to detect the data information,to satisfy the massive access requirement.Simulation results demonstrate that the proposed scheme can significantly increase the number of the successful devices.…”
    Get full text
    Article
  17. 15357

    Optimization Design of Brake Disc Structure for Brake Squeal Suppression by Pan Gongyu, Liu Zhikang, Xu Qizhao, Chen Lin

    Published 2022-12-01
    “…By combining the central composite test design, Response Surface Method (RSM) surrogate model method and the Pointer optimization algorithm, and taking the minimum weighted brake squeal tendency coefficient as the optimization goal, the structural optimization design is carried out for the unilateral disc height, heat sink rib height, elastic modulus and disc cap height of the brake disc. …”
    Get full text
    Article
  18. 15358

    Study on the rearrangeability of 3n-1 stages shuffle-exchange network by GE Fang-bin1, ZHANG Tao1, SONG Jin-yu1, ZHAO Min1, CHEN Wei-hua2

    Published 2011-01-01
    “…Rearrangeability is an essential issue in study of SE(shuffle-exchange) network and its application.Currently,there are no practical methods to realize rearrangeability of SE networks when n>4.Based on the fact,a policy to realize the rearrangeability was proposed in 3n-1 stages Omega network.In the policy,the problem of constructing no conflict routing was translated into how to rearrange routing inputs and decompose routing sequence.A method to rearrange routing inputs by adjusting conflict nodes and expanding routings without conflict was offered.The feasibility of ex-panding routings without conflict was proved,and an algorithm of expanding routings was provided.The rearrangeability of Omega network was first realized when n=5.If Ge conjecture on decomposing routing sequence is constructively proved,how to realize the rearrangeability of the 3n-1 Omega network would be perfectly solved by the policy.…”
    Get full text
    Article
  19. 15359

    Array amplitude-phase and mutual coupling error joint correction method based on sparse Bayesian by Ding WANG, Weigang GAO, Zhidong WU

    Published 2022-09-01
    “…In the actual array direction finding system, there are often a variety of errors such as amplitude and phase, mutual coupling, which lead to serious deterioration of array direction finding performance.In order to solve the problem of array direction finding misalignment in the presence of low signal-to-noise ratio, small snapshots and multiple errors, the spatial sparsity of signals were introduced, and Bayesian sparse reconstruction technology was used to solve the passive correction and joint estimation of array signal azimuth in the presence of amplitude-phase and mutual coupling errors.The over-complete model of the received signal with error was constructed, and the posterior probability density function of the received signal was obtained.The EM algorithm was used to iteratively optimize the probability density function to solve the corresponding parameters.At the same time, the CRLB of array error and signal azimuth was derived, and by experimental simulation verifies the effectiveness of the proposed method.…”
    Get full text
    Article
  20. 15360

    Subspace-Based Anomaly Detection for Large-Scale Campus Network Traffic by Xiaofeng Zhao, Qiubing Wu

    Published 2023-01-01
    “…Under the two test sets of public dataset and collected campus network data information of a university, the detection performance of the proposed anomaly detection method is compared with other anomaly detection algorithm models. The results show that the proposed detection model is superior to other models in speed and accuracy under the open dataset. …”
    Get full text
    Article