Showing 15,881 - 15,900 results of 19,511 for search '"algorithms"', query time: 0.11s Refine Results
  1. 15881

    Game-theoretical analysis of mobile contributors in mobile crowd sourcing network with word of mouth mode by Feng ZENG, Runhua WANG, Jia PENG, Zhigang CHEN

    Published 2019-03-01
    “…The crowdsourcer who calls for sensing service can recruit enough mobile contributors quickly with the word of mouth mode,improving the quality of sensing tasks.The behavior of mobile contributors in mobile crowdsourcing with the WoM was investigated.It was supposed that each mobile contributor was rational,seeking for the highest utility.The behavior of mobile contributors with a two-level Stackelberg game was formulated.In the first-level game,a mobile contributor who directly worked for the crowdsourcer acted as the leader,while contributors invited by first-level contributors were followers called the second-level contributors.In the second-level game,the second-level contributors were the leaders and contributors invited by them were followers.The Nash equilibrium for each Stackelberg game was proved was existed and unique,and designed an algorithm to reach the equilibrium.Backward induction approach to compute the best response of each game was adopted,and the simulation results show the correctness of theoretical analysis for the interaction among contributors in crowdsoucing with WoM.…”
    Get full text
    Article
  2. 15882

    Gear Cutting Machining of Klingelnberg Cyclo-palloid Bevel Gear based on Monolithic Cutter Disc by Wang Zhiyong, Yang Weiyin, Zhang Yu, Zhai Huaming

    Published 2018-01-01
    “…According to the structure parameters of two-part cutters,the method for designing cutter-head and cutter blade of monolithic cutter disc is proposed.According to the curvature relationship between the meshed tooth flanks,a method for determining the amount of modification of cutter radius is established by iteration algorithm. According to the cutting principle and gear meshing theory,the formula for calculating the machine setting parameters and cutter parameters are derived.The processing experiment is completed on domestic CNC spiral bevel gear cutting machine with monolithic cutter disc. …”
    Get full text
    Article
  3. 15883

    Acoustic Signal Aided Detection Method of Spiral Bevel Gears Based on PSO-MCKD by Li Xianshan, Tian Yu, Wei Lilin, Zhao Xiaofeng, Yan Changfeng

    Published 2024-01-01
    “…Combined with the particle swarm optimization(PSO) algorithm and the maximum correlated kurtosis deconvolution(MCKD) based signal processing methods, the effect of different axial deviations on the gear mesh acoustic signals is investigated. …”
    Get full text
    Article
  4. 15884

    Study on the Dynamic Data Acquisition Method of Poly-rib Belt by Wang Enjun, Xiao Jun, Liao Yide, He Chao, Lei Jinyu

    Published 2017-01-01
    “…At last,the marking signs that have become several kinds of typically deformable are recognized by using the this algorithm and Hough transform detection method,then comparing the errors between the two methods and analyzing correlation of the dynamic data which is obtained by the experiment and the laser rangefinder. …”
    Get full text
    Article
  5. 15885

    Trajectory Tracking of a Flexible Robot Manipulator by a New Optimized Fuzzy Adaptive Sliding Mode-Based Feedback Linearization Controller by M. J. Mahmoodabadi, N. Nejadkourki

    Published 2020-01-01
    “…Finally, a multiobjective particle swarm optimization algorithm is used to find the optimum fuzzy rules. …”
    Get full text
    Article
  6. 15886

    Inverse Kinematics and Reachable Workspace of UPS/UPR/SP Parallel Mechanism by Longfei Li, Yaohong Zhao, Bin Sun, Ruiqin Li, Guowang Pang

    Published 2022-04-01
    “…Firstly,the degree of freedom of UPS/UPR/SP parallel mechanism is analyzed by using screw theory,and the degree of freedom of the mechanism is analyzed and verified based on the improved Kutzbach-Grübler formula; then,particle swarm optimization (PSO) algorithm and closed vector method are used to solve the forward and inverse solutions of the mechanism,and the reachable workspace of the mechanism is solved by using the limit search method in Matlab software; Finally,the mechanism is applied to the express sorting with high accuracy of position accumulation. …”
    Get full text
    Article
  7. 15887

    Design of Reverse Curves Adapted to the Satellite Measurements by Wladyslaw Koc

    Published 2016-01-01
    “…This is a sequential operation involving successive parts of the mentioned layout. This universal algorithm can be easily applied to the computer software which will allow generating, in an automatic way, other geometrical layouts. …”
    Get full text
    Article
  8. 15888

    Theory and Application of Vessel Speed Dynamic Control considering Safety and Environmental Factors by Tianrui Zhou, Qinyou Hu, Zhihui Hu, Jiamao Zhi

    Published 2022-01-01
    “…In the second stage, the speed dynamic control model considering safety and environmental factors is established by combining multisource data and particle swarm optimisation algorithm. The model’s superiority and advantage are validated by experiments conducted on an ocean-going ship. …”
    Get full text
    Article
  9. 15889

    Earth Pressure on Retaining Wall with Surface-Inclined Cohesive Fill Based on Principal Stress Rotation by Hengli Wang, Zhengsheng Zou, Jian Liu, Xinyu Wang

    Published 2021-01-01
    “…The proposed method is compared with the existing algorithm, and the influences of the inclination and the cohesion of the fill are analyzed. …”
    Get full text
    Article
  10. 15890

    Research on P2P security overlay network model by SUN Zhi-xin1, ZHANG Zhen-wei1, GONG Jing2

    Published 2009-01-01
    “…To enhance the security of P2P software and the convenience in the use of trust mechanism, simple vector distance classifications and kademlia algorithm were adopted on the basis of the global trust model. …”
    Get full text
    Article
  11. 15891

    User behavior pattern mining method based on multi-dimension and multi-granularity analysis in telecom networks by Xiaotao CHENG, Lixin JI, Ruiyang HUANG, Hongtao YU, Yizhuo YANG

    Published 2018-10-01
    “…In order to better understand the behavior of users in telecom networks,it takes CDR (call detail record) data of large-scale telecom network as the research object.By using the mixed probability model and feature engineering method,the multi-dimension characteristics of the call time,call frequency and connections are analyzed from the perspective of user groups and individuals.It is further refined from different time granularities such as hour,day,and week to realize effective discovery of call behavior patterns for different user groups.The distribution characteristics of user behavior are modeled by mixed probability model,which solves the problem of describing the distribution characteristics such as user's call time and frequency.Based on the dataset of a regional telecom network,the performance of decision tree,naive Bayes and SVM classification algorithm are compared.It proves the validity and computational feasibility of the proposed method.The differences in communication behavior patterns of different groups are also compared by taking the service numbers like express,flight and bank as examples.…”
    Get full text
    Article
  12. 15892

    Planning approach of survivable fiber-wireless broadband access network by Hongjun TAN, Yamin XIE, Yejun LIU

    Published 2016-05-01
    “…The emerging fiber-wireless(FiWi)broadband access network provides not only the new technological references for flexible broadband access anywhere and anytime,but also the research opportunities for the cost-efficient design of survivable broadband access network.The study of survivable FiWi access network planning was focused on,and an approach of survivable network planning based on wireless-rerouting protection was proposed.When any fiber link cuts,the failed optical network unit(ONU)can transfer its traffic into other normal ONUs.Solving the joint optimization problem of wireless routers placement,backup radios configuration and ONU capacity allocation was put more importance on,aiming to fully protect all traffic with the minimum deployment cost.The method of integer linear programming was employed to obtain the optimal solution for small-scale network planning.The heuristic algorithm was also proposed for the large-scale network planning.Simulation results demonstrate the effectiveness of the proposed approach in reducing network deployment cost.…”
    Get full text
    Article
  13. 15893

    Cooperative game based bandwidth allocation mechanism live migration of multiple virtual machines by Yong CUI, Yu-song LIN, Run-zhi LI, Zong-min WANG

    Published 2016-04-01
    “…Under many scenarios, multiple virtual machines in the same server need to be moved online concurrently.Since live migration algorithm utilizes bandwidth as more as possible to send data, there is a bandwidth competition among the concurrent migration processes, which cannot guarantee the optimal allocation for the bandwidth and finally degrades the overall performance of the parallel live migration. …”
    Get full text
    Article
  14. 15894

    Research on multidimensional dynamic defense strategy for microservice based on deep reinforcement learning by Dacheng ZHOU, Hongchang CHEN, Weizhen HE, Guozhen CHENG, Hongchao HU

    Published 2023-04-01
    “…Aiming at the problem that it is hard for security defense strategies in cloud native to guarantee the quality of service under dynamic requests, a multidimensional dynamic defense strategy for microservice based on deep reinforcement learning, named D2RA strategy, was proposed to provide dynamic configuration schemes that ensure security defense performance and quality of service for microservices under dynamical requests.Firstly, based on the characteristics of multiple replicas and invocation chains of microservices, a microservices state graph was established to depict the maps between requests, system configuration and security performance, quality of service, and resource overhead of microservices.Secondly, the D2RA framework was designed and a dynamic strategy optimization algorithm based on deep Q-network was proposed for microservices to provide fast and optimal system configurations update scheme under dynamic requests.The simulation results show that D2RA effectively allocate resources under dynamic requests, and achieve 19.07% more defense effectiveness and 42.31% higher quality of service as compared to the existing methods.…”
    Get full text
    Article
  15. 15895

    Option Pricing under Two-Factor Stochastic Volatility Jump-Diffusion Model by Guohe Deng

    Published 2020-01-01
    “…We derive a semianalytical formula for European vanilla option and develop a fast and accurate numerical algorithm for the computation of the option prices using the fast Fourier transform (FFT) technique. …”
    Get full text
    Article
  16. 15896

    Research on flood defense mechanism of SDN control layer:detection and mitigation by Qizhao ZHOU, Junqing YU, Dong LI

    Published 2021-11-01
    “…Aiming at the problem of spoofing flood defense in the control layer of SDN, a controller defense mechanism (CDM)was proposed, including a flood detection mechanism based on key features multi-classification and a flood mitigation mechanism based on SAVI.The flood feature analysis module of the control layer was designed for flood detection, and boosting algorithm was used to overlay each feature weak classifier to form an enhanced classifier, which can achieve more accurate classification spoofing flooding attack effect by continuously reducing the residual in the calculation.In CDM, a flood mitigation mechanism based on SAVI was deployed to realize flood mitigation, which performed flood packet path filtering based on binding-verification mode, and updated the flood features of access layer switches with dynamic polling mode to reduce redundant model update load.The experimental results show that the proposed method has the characteristics of low overhead and high precision.CDM effectively increases the security of the control layer, and reduces the time of host classification of spoofing flood attack and the CPU consumption of corresponding controller.…”
    Get full text
    Article
  17. 15897

    Gene Coexpression Network Comparison via Persistent Homology by Ali Nabi Duman, Harun Pirim

    Published 2018-01-01
    “…We quantify multiscale topological features of each network using persistent homology and apply a hierarchical clustering algorithm to the distance matrix whose entries are pairwise bottleneck distance between the networks. …”
    Get full text
    Article
  18. 15898

    COMMUNITY-ACQUIRED PNEUMONIA COMPLICATED BY SEPSIS CAUSED BY KLEBSIELLA PNEUMONIAE: A CASE REPORT by A.V. Lavrenko

    Published 2017-12-01
    “…Shown the diagnostic algorithm, which is acceptable both in the presence and in the absence of laboratory verification of the disease. …”
    Get full text
    Article
  19. 15899

    Visual Localization of an Internal Inspection Robot for the Oil-Immersed Transformer by Yingbin Feng, Yahui Kou, Yanju Liu

    Published 2023-01-01
    “…First, in order to solve the problem of blur, distortion, and low contrast of the image obtained by the camera in the deteriorated and discolored transformer oil, an image enhancement algorithm based on multiscale fusion is developed to provide a reliable data source for robot localization. …”
    Get full text
    Article
  20. 15900

    Appropriateness of Liver Biopsy by Thierry Poynard, Vlad Ratziu, Pierre Bedossa

    Published 2000-01-01
    “…Therefore, further evaluation of the appropriateness of liver biopsy in the practical algorithm of such diseases is needed.…”
    Get full text
    Article