Showing 15,401 - 15,420 results of 19,511 for search '"algorithms"', query time: 0.09s Refine Results
  1. 15401

    Researches on mobile IP position management based on multicast network collaboration by XUE Jian-sheng1, WAN Lin-yi1, WANG Guang-xing2

    Published 2007-01-01
    “…A method of mobile IP position management which uses group managing function in multicast was proposed.Mobile agent(MA) was set in each autonomous network to form a VPN that manage the position binding information of mobile nodes.By putting nodes together for communicating with mobile host to make a multicast tree,the position bind-ing information of mobile nodes was maintained through the collaborative work of each node in network.The storage structure of binding information table and the algorithm on how to manage mobile position binding information were de-signed.Simulation shown that the method proposed can make correspondent nodes understand mobile node’s care-of ad-dress(CoA) in real-time,decrease registration time and times,decrease transmission delay,for supporting real-time ser-vice wonderfully.At the same time,the loads of home agent and hosts are alleviated.The performance of mobile IP is op-timized.…”
    Get full text
    Article
  2. 15402

    Single image defogging based on fusion strategy by OFan GU, Jin TANG, Zi-xing CAI

    Published 2014-07-01
    “…To effectively enhance the degraded foggy image, a single image defogging algorithm based on fusion strategy was proposed. The strategy does not require the atmospheric scattering model or scene structure, only needs the original degraded image to derive the inputs and weight maps. …”
    Get full text
    Article
  3. 15403

    Communication between nodes in backscatter-assisted wireless powered communication network by Jie TAO, Haijiang GE, Minyuan WU, Qike SHAO, Kaikai CHI

    Published 2021-06-01
    “…At present, there is almost no design on information transmission between the nodes in wireless powered communication network.The high-throughput information transmission between the nodes in backscatter assisted wireless powered communication network was studied.A scheme was proposed which consisted of backscattering/energy transmission phase and active communication phase.The maximum throughput was modeled as a convex optimization problem.Then, based on the relationship between the total backscatter communication duration and the threshold of node energy capture duration, the problem was decomposed into several sub problems that only need to optimize two backscatter durations.An efficient two-level golden section search algorithm was designed to solve the sub problems, and the optimal solution of the original problem was obtained from the optimal solutions of the sub problems.Simulation results show that, compared with pure active communication scheme and pure backscatter communication scheme, the proposed scheme can effectively improve the throughput.…”
    Get full text
    Article
  4. 15404

    Service priority-aware network traffic scheduling mechanism by Huahui LV, Zhida LIN, Hongcong HUANG

    Published 2017-07-01
    “…In view of the problem that network congestion which caused by the uneven distribution in large traffic data,a priority-aware dynamic network traffic scheduling mechanism was proposed.By using the token bucket algorithm,different buckets of different rates were assigned to different services according to the service priorities.The priorities of the service and the remaining buffer space of the user nodes was taken into account to deal with different services.At the same time,the traffic arrival factor,service factor and node cache were regarded as target to define a network traffic scheduling mechanism performance indicator:packet loss rate.The numerical results show that the proposed mechanism can rationally divide the service priorities in the network,effectively utilize the network resources,prevent the network congestion,enhance the network performance,and provide the users with more stable and reliable network service.…”
    Get full text
    Article
  5. 15405

    Robotic Arm Motion Planning Based on an Improved PRM by You Dazhang, Zhao Hengyi, Song Luwen

    Published 2024-12-01
    “…Sobol sequence sampling method was used to improve the connectivity of probabilistic road map and the success rate of the algorithm. Redundant node pruning and progressive route pruning based on dichotomous interpolation were adopted to make the path more approximate to the optimal solution. …”
    Get full text
    Article
  6. 15406

    Data Aggregation Scbeme Based on Multi-Resolution and Compressive Sensing in Wireless Sensor Network by Jianjun Zhao, Huaiyu Wang, Zeyang Zhao, Shengchang Chen

    Published 2014-09-01
    “…When parent collecting clusters receive random measurements, they use inverse DCT and DCT model based CoSaMP algorithm to recover the original data. The proposed scheme was implemented on a SIDnet-SWANS simulation platform and test different sizes of two-dimensional randomly deployed sensor network. …”
    Get full text
    Article
  7. 15407

    Mobile operation and maintenance system of electric power communication access network based on IoT technology by Haiming JIANG, Danni XIA, Yuan LIU, Shiwen ZHAO, Lin FEI, Jingyu REN

    Published 2018-10-01
    “…The mobile operation and maintenance system of electric power communication access network was designed.In this developed system,the technology with intelligent identification of internet of things and data real-time transmission was introduced to the on-site operation and maintenance standardization management of the power communication network.First of all,the mobile operation and maintenance system architecture was built to realize the informatization of on-site operation and maintenance.And then,the TOPSIS algorithm was utilized to allocate the worksheet automatically,which improved the efficiency of fault processing.Besides,by real-time monitoring the site through the system,the intelligent management of the power communication access network was realized.The test results show that the operational management system is able to realize resources unified management,fault intelligent analysis,informatization support of on-site operations management,and also greatly enhance the intelligent operation and management level of power communication access network.…”
    Get full text
    Article
  8. 15408

    An UAV-Assisted Edge Computing Resource Allocation Strategy for 5G Communication in IoT Environment by Hao Liu

    Published 2022-01-01
    “…Based on the optimization of the UAV trajectory, communication scheduling, and the energy consumption model of the UAV, the problem of the total computational cost minimization is formulated. Then, the genetic algorithm is improved by introducing a penalty function to solve this problem, in which selection, crossover, and mutation operations are iterated to obtain the optimal allocation strategy for computational resources. …”
    Get full text
    Article
  9. 15409

    Research on fusion model based on deep learning for text content security enhancement by Shaomin WANG, Zheng WANG, Hua REN

    Published 2020-05-01
    “…The rapid expansion of information content on the internet and the mobile internet has resulted in violations of laws and regulations and bad information,which affects the content security of the internet space.Traditional text content security recognition methods based on matching of sensitive words ignore context semantics,resulting in high false positive rate and low accuracy.Based on the analysis of traditional text content security recognition methods,a fusion recognition model using deep learning and a model fusion algorithm process were proposed.Text content security recognition system based on the fusion recognition model using deep learning and experimental verification was introducted deeply.Results show that the proposed model can effectively solve the problem of high false positive rate caused by the lack of semantic understanding of traditional recognition methods,and improve the accuracy of the bad information detection.…”
    Get full text
    Article
  10. 15410

    Massive unsourced multiple access scheme based on block sequence codebook and compressed sensing by Jing ZHANG, Lin MA, Chulong LIANG, Hongxu GAO

    Published 2023-12-01
    “…A massive unsourced multiple access scheme based on block sequence codebook and compressed sensing was proposed for sporadic burst scenario in massive machine type communication (mMTC).Firstly, a large-capacity spreading codebook generation scheme was designed according to a specific shift pattern, thus the codebook space was expanded.Secondly, the sparse structure of uplink signal was combined with multi-carrier technology to support overlapping transmission of multi-user data on some subcarriers, thus the spectral efficiency was improved.Finally, a multi-carrier CS-MUD model was established, and a group orthogonal matching pursuit algorithm based on codebook sequence blocks was designed to achieve the joint detection of active users and their uplink data.Simulation results show that the proposed scheme can effectively reduce the bit error rate of massive random access.…”
    Get full text
    Article
  11. 15411

    Underwater acoustic OFDM channel equalization based on virtual time reversal mirror by Yan-ling YIN, Gang QIAO, Song-zuo LIU

    Published 2015-01-01
    “…To solve the problem of the severe inter-symbol interference of orthogonal frequency division multiplexing (OFDM) communication caused by underwater acoustic multipath channel,a virtual time reversal channel equalization scheme was proposed.VTRM was able to shorten the channel impulse response and alleviate the phase distortion caused by the acoustic channel for its characteristic of the temporal compression and phase conjugation in frequency domain.The matching pursuit (MP) algorithm was applied to estimate the channel impulse response which could estimate the channel amplitude,time delay and phase accurately.It provided the channel information for the VTRM channel equalization.It also improved a lot compared to the traditional matching correlation channel estimation method which couldn't estimate the channel phase and the estimation precision was low.The simulation,pool trail and Songhua lake experiment show that the performance of VTRM channel equalization is better than that of the PTRM and LS channel equalization in the OFDM underwater acoustic communication.…”
    Get full text
    Article
  12. 15412

    Cloud native intelligent operation and maintenance technology by Long XUE, Gang LU, Qi ZHOU, Huiyan ZHANG, Tingjun WAN

    Published 2020-12-01
    “…Relying on the advantages of simple and fast applications,easy deployment of applications,and on-demand scaling of running applications,cloud native technology has been rapidly promoted.However,with the application of cloud native,the system architecture has become more complex and the scale of resources has become larger,and there is an urgent need for more intelligent operation and maintenance.Using intelligent operation and maintenance can better assist cloud-native application development,reduce operation and maintenance costs,and improve service quality.The application scenarios,key points,classic practices and existing problems of intelligent operation and maintenance were analyzed,and a cloud-native intelligent operation and maintenance architecture were proposed,and the main principles of the three scenarios:the trend prediction,data anomaly detection and fault location diagnosing in the core service algorithm platform were introduced in detail,and finally the future of intelligent operation and maintenance were looked forward.…”
    Get full text
    Article
  13. 15413

    Kinematics Analysis of a Parallel Mixing Machine and Its Scale Optimal Design by Chen Jing, Guo Qian, Zhu Wei

    Published 2024-10-01
    “…Taking the variation change of the attitude angles of the moving platform as the objective function, the differential evolution algorithm was used to optimize the scale parameters of the mechanism, and the obtained mechanism has better mixing motion performance than that before the optimization.…”
    Get full text
    Article
  14. 15414

    Diagrammatic Analysis of Nonhomogeneous Diffusion by Julio A. Hernández

    Published 2014-01-01
    “…This study introduces a diagrammatic algorithm, inspired in previous ones employed to analyze multicyclic chemical systems, to derive expressions for nonhomogeneous diffusion coefficients and to study the effects of volume exclusion. …”
    Get full text
    Article
  15. 15415

    Markov Regime Switching of Stochastic Volatility Lévy Model on Approximation Mode by Arthit Intarasit

    Published 2013-01-01
    “…Regime switching of stochastic volatility Lévy process is employed in an approximation mode for model calibration and the calibration of parameters model done based on EM algorithm. Finally, some empirical results are illustrated via applications to the Bangkok Stock Exchange of Thailand index.…”
    Get full text
    Article
  16. 15416

    Method of short text strategy mining based on sub-semantic space by Yang SUN, Li SU, Xing ZHANG, Fengsheng WANG, Haitao DU

    Published 2020-03-01
    “…To solve the problem of identifying short text data accurately,a method of short text strategy mining based on sub-semantic space was proposed.Firstly,semantic space technology was used to solve the problem of “vocabularygap” and “data sparseness” in short text analysis.Then,based on clustering algorithm,the semantic space was divided into several sub-semantic spaces,and association rules were mined in the sub-semantic space,which improved the efficiency and quality of strategy generation.Finally,binary tree was used to merge strategies and generate the simplest strategy set.Experiments show that compared with the traditional classification model,the accuracy rate of the strategy set generated by the proposed scheme can achieve 85% when the false positive rate is 6.5%.In the processing of illegal short messages,using this technology to mine potential policy sets has strong coverage ability,high accuracy and strong practicability.…”
    Get full text
    Article
  17. 15417

    Machine Learning Applications based on SVM Classification A Review by Dakhaz Mustafa Abdullah, Adnan Mohsin Abdulazeez

    Published 2021-04-01
    “…This paper, therefore, attempts to deal with data processing, using a support vector machine (SVM) algorithm in different fields since it is a reliable, efficient classification method in the area of machine learning. …”
    Get full text
    Article
  18. 15418

    Research on Avoidance of Energy Hole Scheme in the Wireless Mesh Network by Chunlong Lu, Yuchun Cao, Guangxue Yue

    Published 2013-11-01
    “…In order to avoid the energy hole problem in wireless mesh network, the non-uniform distribution strategy about the cluster nodes was put forward, the energy efficiency optimization equilibrium routing algorithm was designed. When the distribution of cluster nodes in the wireless mesh network met the certain relations, the network could optimize the energy consumption efficiency equilibrium. …”
    Get full text
    Article
  19. 15419

    Feature selection method for software defect number prediction based on maximum information coefficient by Guoqing LIU, Xingqi WANG, Dan WEI, Jinglong FANG, Yanli SHAO

    Published 2021-05-01
    “…The traditional feature selection method only considers the linear correlation between variables and ignores the nonlinear correlation, so it is difficult to select effective feature subsets to build the effective model to predict the number of faults in software modules.Considering the linear and nonlinear relationship, a feature selection method based on maximum information coefficient (MIC) was proposed.The proposed method separated the redundancy analysis and correlation analysis into two phases.In the previous phase, the cluster algorithm, which was based on the correlation between features, was used to divide the redundant features into the same cluster.In the later phase, the features in each cluster were sorted in descending order according to the correlation between features and the number of software defects, and then the top features were selected to form the feature subset.The experimental results show that the proposed method can improve the prediction performance of software defect number prediction model by effectively removing redundant and irrelevant features.…”
    Get full text
    Article
  20. 15420

    Research on content distribution mechanism of MP2P networks by Guo-yin ZHANG, Lu LI, Jian-guo SUN, Xiang-hui WANG

    Published 2013-05-01
    “…In consideration of the current MP2P network disturbance from frequent location changes of the mobile nodes,the limited computing power and storage capacity,a flexible strategy of partition management by assigning different functions to nodes according to some standards,regarding a subnet as a unit and using super-nodes to manage subnets were proposed.In order to speed up the data transmission and replacement efficiency,data was processed with partial network coding technology.Additionally,a trans-subnet query algorithm was proposed to link subnets,conduct informa-tion exchange between subnets and resource location.Results of the experiment manifested that this strategy can effi-ciently increase the resource download success rate and hit rate,reduce the average delay,improve the content distribu-tion efficiency of MP2P networks,and simultaneously enhance system robustness.…”
    Get full text
    Article