Showing 15,741 - 15,760 results of 19,511 for search '"algorithms"', query time: 0.10s Refine Results
  1. 15741

    An Asymmetrical Mixed Higher-Order Discontinuous Galerkin Time Domain Method for Electromagnetic Scattering from the Plasma Sheath around a Hypersonic Vehicle by Jirong Guo, Yiping Han

    Published 2023-01-01
    “…In order to calculate the numerical flux between the two types of grids in the discontinuous Galerkin time domain (DGTD) algorithm, an asymmetric high-order element is constructed as a transition unit. …”
    Get full text
    Article
  2. 15742

    On the Distance Pattern Distinguishing Number of a Graph by Sona Jose, Germina K. Augustine

    Published 2014-01-01
    “…Further, this paper provides an algorithm to determine whether a graph is a distance pattern distinguishing graph or not and hence to determine the distance pattern distinguishing number of that graph.…”
    Get full text
    Article
  3. 15743

    Optimized design of sensing transmission and computing collaborative industrial Internet by Jingbo LI, Li MA, Yang LI, Yingxun FU, Dongchao MA

    Published 2023-06-01
    “…In view of the new scenario and time-sensitive requirements of sensing-transmission end to computing end in the industrial Internet, and to solve the problem of end-to-end delay in applications that were not up to standard, a network optimized design scheme for sensing-transmission cooperative computing was proposed.First, the sensing-transmission computing cooperative network architecture based on cloud-edge-end was proposed to promote the deep integration of multidimensional systems and heterogeneous resources.Secondly, the network topology construction mode was optimized to reduce the average path length of the network, shorten the propagation distance, and offset the problem of signal decay due to the use of higher frequencies.Finally, the routing method was improved, and an integrated algorithm of topology optimization and routing strategy was designed to reduce the queuing delay in the network, control the end-to-end delay within a bounded range, and weaken the “long tail phenomenon”.The experimental results show that the scheme reduces the end-to-end delay and ensures the real-time and reliability of the network by optimizing the network topology and routing strategy and integrating the design.…”
    Get full text
    Article
  4. 15744

    Practical Hybrid Machine Learning Approach for Estimation of Ultimate Load of Elliptical Concrete-Filled Steel Tubular Columns under Axial Loading by Tien-Thinh Le

    Published 2020-01-01
    “…The proposed model was Adaptive Neurofuzzy Inference System (ANFIS) combined with Real Coded Genetic Algorithm (RCGA), denoted as RCGA-ANFIS. The evaluation of the model was performed using the coefficient of determination (R2) and root mean square error (RMSE). …”
    Get full text
    Article
  5. 15745

    APPLICATION OF IMPROVED GWO-SVM IN WIND TURBINE GEARBOX FAULT DIAGNOSIS by HU Xuan, LI Chun, YE KeHua, ZHANG WanFu

    Published 2021-01-01
    “…The improved gray wolf algorithm is used to optimize the support vector machine to diagnose the gearbox fault feature set after dimensionality reduction. …”
    Get full text
    Article
  6. 15746

    Fracture toughness of rough and frictional cracks emanating from a re-entrant corner by Andrea Carpinteri, Andrea Spagnoli, Michele Terzano, Sabrina Vantadori

    Published 2017-06-01
    “…The solution is found using the distributed dislocation method, and an iterative algorithm is needed due to the non-linearity of the model. …”
    Get full text
    Article
  7. 15747

    Dual-station pseudo-Doppler localization method based on particle filtering with stable distribution noise by shuang QIUTian, zhe QIYin

    Published 2016-01-01
    “…Traditional pseudo-Doppler bearing estimation algorithm could accurately calculate the angle of arrival (AOA) with Gaussian noise and high signal to noise ratio (SNR), but it was less robust with stable distribution noise. …”
    Get full text
    Article
  8. 15748

    A Novel Mining Approach for Data Analysis and Processing Using Unmanned Aerial Vehicles by Ali Alenezi, Ahmad Sawalmeh, Hazim Shakhatreh, Muhannad Almutiry, Nasser Aedh Alreshidi

    Published 2022-01-01
    “…Because the problem is non-convex, the particle swarm optimization algorithm is used to solve it and determine an efficient location and trajectory of the UAV.…”
    Get full text
    Article
  9. 15749

    Big data classification method of non relational distributed submission information under differentiated requirements by Lu HAN, Weiyu CHEN, Fei ZHANG, Jianfeng HE, Huaizhen SU

    Published 2023-06-01
    “…The classification method of non-relational distributed submitted information big data under the differentiated demand was studied, aiming at the problem of multi-source heterogeneous, widely distributed submitted information with more differentiated application requirements and inability to distinguish the available information.Firstly, the usability, openness and expansibility of the non-relational distributed submission information database were analyzed.The unstructured database storage TRIP was used to store non-relational distributed submission information by combining the basic requirements of field types.Then, the hashing process within the Hamming hash family was analyzed.Under the constraint of linearity level requirements, cellular automata with multiple attractors were used to optimize the system.The optimal parameters of the multiple attractor cellular automata classifier were improved through genetic algorithm, thus improving the big data classification method.Experimental results show that this method can effectively identify and classify structured data and unstructured data in non relational distributed submission information, and has high classification accuracy.…”
    Get full text
    Article
  10. 15750

    Joint time-frequency interference alignment in the frequency-selective Gaussian interference channel by JING Zhen-hai1, BAI Bao-ming1, MA Xiao3

    Published 2011-01-01
    “…To make up for the limitation that the traditional interference alignment can only align the signal in one dimensional domain,a novel joint time-frequency interference alignment scheme was put forward in the frequency-selective Gaussian interference channel(GIC).After the frequency-selective GIC was changed into a set of parallel GICs,a set of time-frequency alignment matrices were employed which aligned the interference signal not only in time domain but also in frequency domain.An algorithm for calculating the time-frequency alignment matrices was presented based on the convex optimization.Computer simulations show that the joint time-frequency interference alignment can obtain the same performance as the traditional interference alignment while the joint time-frequency interference alignment can shorten the decoding time or reduce the occupation of the frequency resource.The joint time-frequency interference alignment scheme is an extension of the traditional interference alignment and provides a more flexible resource allocation approach between time domain and frequency domain.…”
    Get full text
    Article
  11. 15751

    Joint task offloading and trajectory optimization for multi-UAV assisted mobile edge computing by Jiequ JI, Kun ZHU, Changyan YI, Ran WANG

    Published 2021-03-01
    “…An unmanned aerial vehicle (UAV)-assisted mobile edge computing system was proposed in which multiple UAVs equipped with computing resources were employed to provide computation offloading opportunities for mobile users with limited local resources.The computing tasks of each user can be divided into two parts.One portion was offloaded to its associated UAV for computing and the remaining portion was processed locally.It was aimed at minimizing the sum of the maximum delay among all user devices by jointly optimizing the user scheduling and the UAV trajectory in a finite period.The proposed problem was a mixed-integer non-convex optimization problem.To facilitate solving this problem, it was equivalently converted into a more tractable problem by introducing some auxiliary variables, and then a penalty concave-convex procedure algorithm was proposed to solve the converted problem.Simulation results show that the proposed joint optimization scheme achieves significantly better performance than other benchmark schemes.…”
    Get full text
    Article
  12. 15752

    Developing a Travel Time Estimation Method of Freeway Based on Floating Car Using Random Forests by Juan Cheng, Gen Li, Xianhua Chen

    Published 2019-01-01
    “…Different from other machine learning algorithm as black boxes, Random Forests can provide interpretable results through variable importance. …”
    Get full text
    Article
  13. 15753

    Social media user geolocalization based on multiple mention relationships by Yaqiong QIAO, Xiangyang LUO, Jiangtao MA, Chenliang LI, Meng ZHANG, Ruixiang LI

    Published 2020-12-01
    “…Aiming at the problem that the existing joint user geolocalization methods based on social media text and social relationships do not sufficiently mine the location correlation between heterogeneous data in social media, a social media user geolocalization method based on multiple mention relationships was proposed.First, a heterogeneous network was constructed by comprehensively considering the mention relationship between users, the user's mention relationship with location indicative words, and the user's mention relationship with geographic nouns.Then, a network simplification strategy was proposed to construct a user-location heterogeneous network that connects users live nearby more closely based on the common mention relationship.After that, a biased random walk algorithm was proposed for the graph node sampling to fully explore the network structure and alleviate the sparsity problem of known locations.Finally, a neural network classifier based on a multilayer perceptron was used to infer the user's location.Experimental results on three representative Twitter data sets of GEOTEXT, TW-US and TW-WORLD show that the proposed method can significantly improve the user geolocalization accuracy.…”
    Get full text
    Article
  14. 15754

    Study on Effect of Consumer Information in Personal Credit Risk Evaluation by Hongmei Wen, Xin Sui, Shaopeng Lu

    Published 2022-01-01
    “…This study selects Chinese borrowers’ information from a platform that has both online shopping and consumer loan service as sample, studies the effect of consumer information in personal credit risk evaluation, and uses the lLogistic regression model, light gradient boosting machine (LightGBM) algorithm, and Shapley Additive Explanation (SHAP). …”
    Get full text
    Article
  15. 15755

    Research on the evolution of college online public opinion risk based on improved Grey Wolf Optimizer combined with LSTM model. by Chao Cao, Ziyu Li, Lingzhi Li, Fanglu Luo

    Published 2025-01-01
    “…This research proposes a public opinion crisis prediction model that applies the Grey Wolf Optimizer (GWO) algorithm combined with long short-term memory (LSTM) and implements it to analyze a trending topic on Sina Weibo to validate its prediction accuracy. …”
    Get full text
    Article
  16. 15756

    PCA-based membership inference attack for machine learning models by Changgen PENG, Ting GAO, Huilan LIU, Hongfa DING

    Published 2022-01-01
    “…Aiming at the problem of restricted access failure in current black box membership inference attacks, a PCA-based membership inference attack was proposed.Firstly, in order to solve the restricted access problem of black box membership inference attacks, a fast decision membership inference attack named fast-attack was proposed.Based on the perturbation samples obtained by the distance symbol gradient, the perturbation difficulty was mapped to the distance category for membership inference.Secondly, in view of the low mobility problem of fast-attack, a PCA-based membership inference attack was proposed.Combining the algorithmic ideas based on the perturbation category in the fast-attack and the PCA technology to suppress the low-migration behavior caused by excessive reliance on the model.Finally, experiments show that fast-attack reduces the access cost while ensuring the accuracy of the attack.PCA-based attack is superior to the baseline attack under the unsupervised setting, and the migration rate of model is increased by 10% compared to fast-attack.…”
    Get full text
    Article
  17. 15757

    Achieving Network Localizability in Nonlocalizable WSN with Moving Passive Event by Xiaolei Zhou, Deke Guo, Tao Chen, Xueshan Luo

    Published 2013-10-01
    “…We design a corresponding algorithm in distributed manner for the implementation of our approach. …”
    Get full text
    Article
  18. 15758

    Optimization Design and Experimental Study of Low-Pressure Axial Fan with Forward-Skewed Blades by Li Yang, Ouyang Hua, Du Zhao-Hui

    Published 2007-01-01
    “…Using back propagation (BP) neural network and genetic algorithm (GA), the optimization was performed for a radial blade. …”
    Get full text
    Article
  19. 15759

    Spectrum resource allocation method of maximizing transmission rate in cognitive heterogeneous wireless networks by Xiaoqing DONG, Lianglun CHENG, Gengzhong ZHENG, Tao WANG

    Published 2019-09-01
    “…Aiming at the problem that it is difficult to allocate spectrum resources to secondary users efficiently in cognitive heterogeneous wireless networks with heterogeneous spectrum attributes,dynamic channel conditions and diverse service requirements,a spectrum resource allocation strategy with maximum transmission rate was proposed.Firstly,the strategy aimed at maximizing the total transmission rate,and constrained the limited spectrum resources and user service requirements to construct a non-linear multi-constrained spectrum resource allocation 0-1 planning model.Then a polynomial time complexity simplification method was designed.According to idle spectrum information,channel conditions,business requirements and allocation decision history information,and the benefit matrix was constructed and modified to achieve constraint simplification,and the execution efficiency was improved by improving the coefficient matrix transformation strategy of the traditional Hungarian algorithm.Finally,the performance of the method was compared and analyzed by experiments.Experimental results show that the proposed method has higher transmission rate and execution efficiency.…”
    Get full text
    Article
  20. 15760

    Multiobjective Day-Ahead Scheduling of Reconfigurable-Based Microgrids Through Electric Vehicles and Demand Response Integration by Ali Mirzaei, Navid Taghizadegan Kalantari, Sajad Najafi Ravadanegh

    Published 2025-01-01
    “…Because of these two compromising objectives, the evolutionary multiobjective seagull optimization algorithm is utilized to find the best local solutions. …”
    Get full text
    Article