Showing 16,061 - 16,080 results of 19,511 for search '"algorithms"', query time: 0.09s Refine Results
  1. 16061

    A Hybrid Method to Predict the Remaining Useful Life of Scroll Wheel of Control Rod Drive Mechanism by Kang Zhu, Xinwen Zhao, Liming Zhang, Hang Yu

    Published 2022-01-01
    “…First, the particle filtering algorithm, whose state transfer equation is established on the segmental damage physical model, is used to predict the degradation state of the scroll wheel. …”
    Get full text
    Article
  2. 16062

    Load Characteristics and Modeling Methods for the Flow Regulator of a Solid Ducted Rocket by An Wang, Qinghua Zeng

    Published 2019-01-01
    “…Through the use of the genetic algorithm, the rotational inertia and parameters of the system load and working load were identified by stages. …”
    Get full text
    Article
  3. 16063

    Multi-feature fusion-based consumer perceived risk prediction and its interpretability study. by Lin Qi, Yunjie Xie, Qianqian Zhang, Jian Zhang, Yanhong Ma

    Published 2025-01-01
    “…Using the PCA-K-medoids-XGBoost algorithm, we developed a predictive model for perceived risk. …”
    Get full text
    Article
  4. 16064

    One-Shot M-Array Pattern Based on Coded Structured Light for Three-Dimensional Object Reconstruction by Xiaojun Jia, Zihao Liu

    Published 2021-01-01
    “…The decoding approach relies on the robust pattern element tracking algorithm (PETA) and generic features of pattern elements to segment and cluster the projected structured light pattern from a single captured image. …”
    Get full text
    Article
  5. 16065

    Dynamical behavior analysis and control of time-varying lifting system based on fuzzy adaptive back-stepping controller by Wang Lei, Cao Guohua

    Published 2025-01-01
    “…Thirdly, based on Lyapunov function, the asymptotic stability of the system under the proposed control algorithm is verified. Finally, compared with proportion–integration–differentiation (PID) back-stepping controller, the efficiency of the proposed controller is proven by applying excitation with different frequency and uncertain parameters, and the adaptability and robustness are illustrated to validate under mixed frequency disturbance by simulation compared with PID back-stepping controller. …”
    Get full text
    Article
  6. 16066

    Aerial reconfigurable intelligent surfaces-assisted full-duplex UAV secure communication by LUO Junsong, HUANG Ping, LUO Xinyue, LAI Huan, DUO Bin, YUAN Xiaojun

    Published 2024-07-01
    “…An optimization problem was designed to maximize the minimum average achievable security rate by jointly optimizing user communication scheduling, transmission power, the interference power sent by UAV, their flight trajectories, and the phase shifts and trajectories of ARIS. An iterative algorithm based on alternating optimization (AO), semi-definite relaxation (SDR) techniques, and successive convex approximation (SCA) was proposed to obtain high-quality suboptimal solutions. …”
    Get full text
    Article
  7. 16067

    Passenger Flow Path Prediction Based on Urban Rail Transit AFC Data: An Example of Chengdu, China by Yu Wang, Qixuan Qin, Jialiang Chen, Jiangbo Wang, Kai Liu

    Published 2023-01-01
    “…Furthermore, a two-way search algorithm is developed to search the optimal paths between origin-destination (OD) pairs by considering interchange constraints. …”
    Get full text
    Article
  8. 16068

    3D DC Resistivity Inversion with Topography Based on Regularized Conjugate Gradient Method by Jian-ke Qiang, Xue Han, Shi-kun Dai

    Published 2013-01-01
    “…By incorporating topography into inversion, the artificial anomaly which is actually caused by topography can be eliminated. As a result, this algorithm potentially can be applied to process the DC resistivity data collected in mountain area. …”
    Get full text
    Article
  9. 16069

    Secure hidden keyword searchable encryption schemewith fine-grained and flexible access control by Yang YANG, Bo-gang LIN, Mao-de MA

    Published 2013-08-01
    “…Aiming at solving these problems, a hidden keyword searchable encryp-tion scheme with fine-grained access control was proposed utilizing CP-ABE (ciphertext-policy attribute based encryp-tion) algorithm. Data owners allocate specific and flexible access policy on their data that is stored on a third-party data server. …”
    Get full text
    Article
  10. 16070

    Prediction and Analysis of Slope Stability Based on IPSO-SVM Machine Learning Model by Yu Wang, Erxia Du, Sanqiang Yang, Li Yu

    Published 2022-01-01
    “…Considering the above characteristics, this study proposes an improved particle swarm optimization of support vector machine (IPSO-SVM) algorithm model, which combines optimized particle swarm optimization (IPSO) and support vector machine (SVM) and applies it to slope stability prediction. …”
    Get full text
    Article
  11. 16071

    Innovation of Urban Circular Economy Growth Path Based on Neural Network by Weifeng Qiu, Yi Yang

    Published 2025-01-01
    “…Moreover, it has obvious advantages over the traditional algorithm in terms of error and recall rate. Compared with the actual economic data, the economic data predicted by the model is quite consistent, and the prediction of future data by the model basically accords with the development goal of the regional master plan. …”
    Get full text
    Article
  12. 16072

    Precision assembly error analysis of parts based on multi-constraint surface matching by Wenbin Tang, Tong Yan, Jinshan Sun, Yadong Li

    Published 2025-01-01
    “…A nonlinear control mechanism is further introduced to dynamically adjust inertia weight, and a simulated annealing mechanism is integrated into the particle swarm optimization algorithm to enhance the efficiency of the surface matching process. …”
    Get full text
    Article
  13. 16073

    Pore structure characterization of porous building material by X-ray computed tomography (XCT) and X-ray microscopy (XRM) by Chengnan Shi, Jeroen Soete, Hans Janssen

    Published 2025-02-01
    “…Additionally, scanning the same sample with a finer voxel size naturally captures more details, and allows the pore network extraction algorithm to better preserve pore structure. On the other hand, the impact of sample size on pore network characterization for ceramic brick is negligible if the oversized sample allows sufficient X-ray transmission.  …”
    Get full text
    Article
  14. 16074

    Delay-constrained and jitter-optimized traffic allocation for multipath routing in wireless mesh networks by CHEN Zhi-gang1, ZENG Feng1, LI Qing-hua1

    Published 2011-01-01
    “…In order to improve the QoS for multimedia application,which focused on the delay-constrained and jit-ter-optimized traffic allocation problem in multipath routing.First of all,based on the network calculus theory,a deep analysis on the upper bound of delay in the single route transmission was dore,and deduce the upper bound formulation of delay and jitter in multiple route transmission,and find out the maximum income rate satisfying the delay constraint for a route.Then,based on the upper bound of delay and jitter,a delay-constrained and jitter-optimized traffic allocation algorithm DCJOTA was proposed,which distributes the traffic to a route in proportion to its maximum income rate,and does some adjustment to optimize the jitter.At last,the implement methods of DCJOTA were given to run in NS2,and simulation is done.Experimental results show that the DCJOTA embedded multipath routing protocol DCJO-AOMDV outperforms AOMDV at the term of end-to-end delay and jitter.Compared with AOMDV,DCJO-AOMDV has made the end-to-end delay and jitter decreased by 3.9% and 24.5% respectively.But,DCJOTA puts a litter complexity on the rout-ing protocol,which leads to the network throughput decreased by 1.7% in DCJO-AOMDV.…”
    Get full text
    Article
  15. 16075

    Relations of Society Concepts and Religions from Wikipedia Networks by Klaus M. Frahm, Dima L. Shepelyansky

    Published 2025-01-01
    “…Using the reduced Google matrix algorithm, we determine relations and interactions of 23 society concepts and 17 religions represented by their respective articles for each of the eight editions. …”
    Get full text
    Article
  16. 16076

    A Three-Step Heuristic Approach to the Electric Vehicle Path Planning Problem considering Charging by Shengping Yu, Yunfang Wang, Ruiyou Zhang, Junxiang Wang

    Published 2023-01-01
    “…Taking into account real-time traffic information and energy consumption information related to road conditions, a three-step heuristic algorithm based on preprocessing traffic network, charging path planning, and subpath planning is proposed for the electric vehicle path planning problem. …”
    Get full text
    Article
  17. 16077

    Spatial spectrum based blind spectrum sensing for multi-antenna cognitive radio system by Chang LIU, SajjadAli Syed, Rui ZHANG, Si-ying LI, Jie WANG, Ming-lu JIN

    Published 2015-04-01
    “…State-of-the-art sensing methods only exploit three dimensions of the spectrum space:frequency,time and space whereas the angle dimension has not been exploited well enough for opportunistic spectrum access.Motivated by this,the authors apply angle of arrival (AOA) estimation algorithm to spectrum sensing and propose two blind spectrum sensing methods based on spatial spectrum.First is based on the ratio of maximum to minimum delay-sum spatial spectrum; the other is based on the ratio of average to minimum delay-sum spatial spectrum.Taking the advantage of spatial matched filtering,the proposed methods can achieve high probability of detection as well as offer the AOA information for spectrum access,which improve the spectrum efficiency.In addition,utilizing latest random matrix theories (RMT),this work quantifies the detection threshold and derives the probabilities of detection for the proposed methods in theory.Extensive simulations carried out in Nakagami-m fading channel indicate that the proposed methods outperform the existing blind spectrum sensing methods.…”
    Get full text
    Article
  18. 16078

    A Time Modulated Printed Dipole Antenna Array for Beam Steering Application by Ruchi Gahley, Banani Basu

    Published 2017-01-01
    “…Differential Evolution algorithm is used to modify the time sequences of the RF switches connected to the antennas to generate radiation pattern with optimum dynamic efficiency by suppressing sideband radiations. …”
    Get full text
    Article
  19. 16079

    Characterization of the Evolution of Nonlinear Uniform Cellular Automata in the Light of Deviant States by Pabitra Pal Choudhury, Sudhakar Sahoo, Mithun Chakraborty

    Published 2011-01-01
    “…The concept of deviant and nondeviant states is introduced, and hence an algorithm is proposed for deducing the State Transition Diagram of a nonlinear CA rule from that of its nearest linear rule. …”
    Get full text
    Article
  20. 16080

    Aggregatable Subvector Commitment with Efficient Updates by Qing Xu, Chenyang Gao, Yunling Wang

    Published 2025-01-01
    “…Additionally, we employ the Karatsuba algorithm to efficiently perform large-integer multiplication, which improves the aggregation and verification of proofs. …”
    Get full text
    Article