Showing 15,641 - 15,660 results of 19,511 for search '"algorithms"', query time: 0.10s Refine Results
  1. 15641

    STRENGTH SIMULATION OF PLASTIC HELICAL GEARS IN NEW CAR DOOR LOCK BASED ON FINITE ELEMENT ANALYSIS by YANG Meng, KAN ShuLin, XIE Chao

    Published 2017-01-01
    “…To study the stress of plastic helical gears in the new type car door lock under the working condition,establish the finite element model of helical gear mesh through ABAQUS,the contact process of plastic helical gears is simulated and analyzed based on nonlinear contact algorithm,and obtain the contact stress and bending stress of plastic helical gears. …”
    Get full text
    Article
  2. 15642

    Ternary polynomial based key management scheme for wireless sensor network by Zhi-tao GUAN, Yue XU, Jun WU

    Published 2013-12-01
    “…A ternary polynomial based key management (KMTP) scheme was proposed,which is effective in cluster based wireless sensor networks.Firstly,the base station will give each node one unique identi ier to ensure the validity of the node.Then,algorithm of the inner-cluster and inter-cluster key pre-distribution based on the ternary polynomial of the same order was stated,which can ensure the value of the cracking threshold is bigger than the number of nodes of a clus-ter and all clusters separately,which means it's very hard to be cracked even all nodes of a cluster or all clusters are com-promised.To assure the communication security,inter-cluster multi-hop routing mechanism was designed based on con-structing secure conjunct neighbor table.Finally,the updating parameter and the updating authentication number were in-troduced in rekeying phase.The analysis shows that the proposed scheme can meet the security requirement of key man-agement,and it also has less computation cost and storage cost than the existing schemes.…”
    Get full text
    Article
  3. 15643

    Coupled Finite Volume Methods and Extended Finite Element Methods for the Dynamic Crack Propagation Modelling with the Pressurized Crack Surfaces by Shouyan Jiang, Chengbin Du

    Published 2017-01-01
    “…Having constructed the approximation of dynamic extended finite element methods, the derivation of governing equation for dynamic extended finite element methods is presented. The implicit time algorithm is elaborated for the time descritisation of dominant equation. …”
    Get full text
    Article
  4. 15644

    Numerical Treatment of the Model for HIV Infection of CD4+T Cells by Using Multistep Laplace Adomian Decomposition Method by Nurettin Doğan

    Published 2012-01-01
    “…Fourth-order Runge-Kutta method (RK4) is used to evaluate the effectiveness of the proposed algorithm. When we do not know the exact solution of a given problem, generally we use the RK4 method for comparison since it is widely used and accepted. …”
    Get full text
    Article
  5. 15645

    Multi-Users Dynamic Bandwidth Allocation Technology of SDTN by Jianxiang CHU, Yin HUANG, Chong WANG, Yunze CAO

    Published 2022-12-01
    “…The TT&C and data transmission of spacecraft are divided into two methods: space-based and ground-based.Among them, space-based method has the advantages of global coverage, access at any time, and real-time information return, and have a wide range of application prospects.But it also puts forward certain requirements for the dynamic bandwidth allocation of its multi-spacecraft.Based on the studied of medium-orbit TT&C, data transmission constellation network architecture and multiple access protocols, a dynamic bandwidth allocation algorithm for on-doard multi-beam, multi-spacecraft users, and multi-task priorities for data transmission tasks was proposed.It was very suitable for the on-demand and real-time resource allocation of data transmission requests of multiple spacecraft in the mid-orbit constellation, and could be used as a multiple access protocol model for space-based measurement and control and data transmission access networks.…”
    Get full text
    Article
  6. 15646

    Blind source separation communication anti-jamming technology and practice by Fuqiang YAO, Miao YU, Pengcheng GUO, Miaomiao GU

    Published 2023-10-01
    “…Aiming at the threat of broad frequency band suppressing jamming and the inherent contradiction between spectrum resources and communication anti-jamming ability, a method was proposed to add the statistics domain dimension on the basis of spread spectrum anti-jamming, which promoted the transformation of communication anti-jamming from hard anti-jamming to accommodate the jamming.The statistical characteristics difference between communication signal and jamming signal was utilized by blind source separation (BSS) communication anti-jamming technology to separate signals, which could improve the communication anti-jamming ability without increasing spectrum resources.To understand and improve the development process of BSS communication anti-jamming (BSSCA) from theory and algorithm to engineering practice, the basic principle of BSSCA was described, the key technologies such as multi-channel BSS and single channel BSS were emphasized.The main characteristics and existing problems of BSSCA were analyzed.Finally, the development priorities of this field were pointed out.…”
    Get full text
    Article
  7. 15647

    STUDY ON BUFFETING ACTIVE CONTROL BASED ON MACRO FIBER COMPOSITES by SUN Jie, HUANG TingXuan, SUN LuJun, ZHU DongFang, HUANG Jing

    Published 2020-01-01
    “…The aerodynamic forces were simulated by the doublet-lattice method and the control laws were designed applying the negative velocity feedback algorithm. The influences of airflow velocity on the inherent characteristics of vertical tail and the control mechanism of buffeting active control were studied. …”
    Get full text
    Article
  8. 15648

    Compactness on Soft Topological Ordered Spaces and Its Application on the Information System by T. M. Al-shami

    Published 2021-01-01
    “…In the end, we provide an algorithm for expecting the missing values of objects on the information system depending on the concept of ordered soft compact spaces.…”
    Get full text
    Article
  9. 15649

    Investigation on SIW Slot Antenna Array with Beam Scanning Ability by Yanfei Li, Yang Li

    Published 2019-01-01
    “…A sparse substrate integrated waveguide (SIW) slot antenna array and its application on phase scanning are studied in this paper. The genetic algorithm is used to optimize the best arrangement for 8-element and 7-element sparse arrays over an aperture of 4.5λ0. …”
    Get full text
    Article
  10. 15650

    The Digipolitical and African Political Thought by Claudia Favarato

    Published 2025-01-01
    “…This understanding rests on three premises: the characteristics of the digital, a sui generis virtual reality; the algorithmic architecture of the cyber socio-political space; and the onto-relational nature of the political subjects, which entails the interplay of the analogue with digital-humans. …”
    Get full text
    Article
  11. 15651

    Performance analysis of covert wireless communication based on beam forming with noise uncertainty by Yuda LIN, Liang JIN, You ZHOU, Yangming LOU

    Published 2020-07-01
    “…In order to establish covert wireless communication in Rayleigh fading environment with noise uncertainty,a scheme of downlink covert wireless communication based on complex Gaussian random coding and beam forming was adopted,and more importantly,the performance of covert wireless communication was analysed.Firstly,the covert probability of communication was analyzed by using the hypothesis test theory.Secondly,the optimal detection threshold of the illegal detection party was given and proved,and the closed expressions of the average covert probability,connection interruption probability and covert throughput of the system were further obtained.Finally,by jointly designing the transmission power and target covert rate,the optimal goal of the maximum covert throughput of the system was achieved,and the corresponding algorithm based on step search was given.The simulation results show that the beam forming technology could provide some gain for covert wireless communication.Compared with the ideal case in which the legitimate receiver is not affected by the noise uncertainty,the covert throughput in non-ideal case is significantly reduced and almost not affected by the basic noise level of the environment.…”
    Get full text
    Article
  12. 15652

    Traffic-Aware Data Delivery Scheme for Urban Vehicular Sensor Networks by Chunmei Ma, Nianbo Liu

    Published 2013-01-01
    “…Besides the packet forwarding through intersections, we also propose an improved geographically greedy routing algorithm for packet forwarding in straightway mode. …”
    Get full text
    Article
  13. 15653

    Monitoring Area Coverage Based on Control Multimedia Nodes Position in Mixed Underwater Mobile Wireless Sensor Networks by Qiangyi Li, Ningzhong Liu

    Published 2022-01-01
    “…Simulation results show that this algorithm can improve the coverage effect of mixed wireless sensor networks and reduce the moving distance of mobile nodes.…”
    Get full text
    Article
  14. 15654

    Evaluation method for information security capability of mobile phone user based on behavior ontology under unconscious condition by Cheng-cheng MAI, Bo CHEN, Jia-kun ZHOU, Ling YU

    Published 2016-10-01
    “…A security capacity assessment method based on security behavior ontology,was proposed to collect users' be-havior data from their smartphones under unconscious condition to solve the problem of detecting mobile phone users' real existing insecure behaviors.A security behavior ontology was set up for formalizing the phone,message,network and App behavior data of mobile phone users and relevant rules were also set down for determining and associating inse-cure actions.Referring to the notion of attack graph,an insecure behavior detection algorithm was proposed based on behavior association graph for analyzing the paths of insecure behaviors dynamically.Furthermore,a competency model of information security capability assessment was presented for realizing the quantitative evaluation of information secu-rity capability of users.The experiment results prove the effectiveness of present competency model for insecure behavior path detection and security ability assessment.…”
    Get full text
    Article
  15. 15655

    Research on network attack analysis method based on attack graph of absorbing Markov chain by Haiyan KANG, Molan LONG

    Published 2023-02-01
    “…Existing intrusion path studies based on attack graph lack consideration of factors other than basic network environment information when calculating the state transition probability.In order to analyze the security of target network comprehensively and reasonably, a network attack analysis method based on attack graph of absorbing Markov chain was proposed.Firstly, a state transition probability normalization algorithm based on vulnerability life cycle was proposed based on attack graph.Secondly, the attack graph was mapped to the absorbing Markov chain and the state transition probability matrix was given.Finally, the state transition probability matrix was calculated to comprehensively analyze the node threat degree, attack path length and expected impact of the target network.The results show that the proposed method can effectively analyze the expected influence of node threat degree, attack path length and vulnerability life cycle on the whole network, which is helpful for security research personnel to better understand the security state of the network.…”
    Get full text
    Article
  16. 15656

    Revolutionizing colorectal cancer detection: A breakthrough in microbiome data analysis. by Mwenge Mulenga, Arutchelvan Rajamanikam, Suresh Kumar, Saharuddin Bin Muhammad, Subha Bhassu, Chandramathi Samudid, Aznul Qalid Md Sabri, Manjeevan Seera, Christopher Ifeanyi Eke

    Published 2025-01-01
    “…This innovative approach markedly enhances the Area Under the Curve (AUC) performance of the Deep Neural Network (DNN) algorithm in colorectal cancer (CRC) detection using gut microbiome data, elevating it from 0.800 to 0.923. …”
    Get full text
    Article
  17. 15657

    Generation and study of the synthetic brain electron microscopy dataset for segmentation purpose by N.A. Sokolov, E.P. Vasiliev, A.A. Getmanskaya

    Published 2023-10-01
    “…In this work, we present an algorithm for the synthesis of 6 types of organelles. …”
    Get full text
    Article
  18. 15658

    基于加速度频响函数的改进响应面模型修正 by 杨成浩, 彭珍瑞, 董海棠

    Published 2021-01-01
    “…In order to improve the accuracy of model updating,the acceleration frequency response function is introduced into the improved response surface model updating.Firstly,the modal participation criterion and the effective independence method are applied to determine the best incentive point and the measuring point; the sample points are selected according to the parameters to be modified; the acceleration frequency response functions of the sample points are calculated; the initial response surface model is constructed.Secondly,the predicted value is tested by using the triple variance criterion; the outliers far from the response surface are eliminated.Thirdly,the initial response surface model is optimized to obtain the optimal solution as a new sample point; the weighted response surface model is constructed by using the ratio weighting method.Then,the finite element model is replaced by the improved response surface model; the objective function is constructed with the minimum of frequency response difference; the modified parameters are solved by cuckoo algorithm.The typical truss structure model is used to verify the effectiveness.The results show that the accuracy and efficiency of the improved response surface model are improved.…”
    Get full text
    Article
  19. 15659

    Incoherent dictionary learning and sparse representation for single-image rain removal by Hong-zhong TANG, Xiang WANG, Xiao-gang ZHANG, Xiao LI, Li-zhen MAO

    Published 2017-07-01
    “…The incoherent dictionary learning and sparse representation algorithm was present and it was applied to single-image rain removal.The incoherence of the dictionary was introduced to design a new objective function in the dictionary learning,which addressed the problem of reducing the similarity between rain atoms and non-rain atoms.The divisibility of rain dictionary and non-rain dictionary could be ensured.Furthermore,the learned dictionary had similar properties to the tight frame and approximates the equiangular tight frame.The high frequency in the rain image could be decomposed into a rain component and a non-rain component by performing sparse coding based learned incoherent dictionary,then the non-rain component in the high frequency and the low frequency were fused to remove rain.Experimental results demonstrate that the learned incoherent dictionary has better performance of sparse representation.The recovered rain-free image has less residual rain,and preserves effectively the edges and details.So the visual effect of recovered image is more sharpness and natural.…”
    Get full text
    Article
  20. 15660

    Design of beamforming for IRS multi-partition-aided THz multi-subarray by Zufan ZHANG, Rui TANG

    Published 2023-08-01
    “…In the IRS-aided THz communication system, in order to break the channel sparsity limitation on the system spatial multiplexing gain, a hybrid beam forming architecture with wide-spaced multi-subarrays at the transceiver/transmitter side was proposed and the transmission scheme of IRS multi-partition-aided THz multi-subarrays was designed.Firstly, a non-convex objective function with multivariate coupling and non-convex constraints was constructed based on the principle of maximizing spectrum efficiency.Then, the optimization problem was decoupled into two easy-to-solve sub-problems, namely, the reflection coefficient matrix design of IRS and the hybrid beamforming matrix design at the transceiver/receiver.Finally, the Riemannian manifold optimization algorithm was used to calculate the reflection coefficient matrix of IRS, and the closed solution of the hybrid beamforming matrix design at the transceiver/receiver was obtained through mathematical derivation.Simulation results show that compared with the baseline scheme, the proposed scheme can achieve better spectrum efficiency.…”
    Get full text
    Article