Showing 16,101 - 16,120 results of 19,511 for search '"algorithms"', query time: 0.09s Refine Results
  1. 16101

    Parametric Nonlinear Model Reduction Using K-Means Clustering for Miscible Flow Simulation by Norapon Sukuntee, Saifon Chaturantabut

    Published 2020-01-01
    “…Next, we perform the K-means clustering algorithm on these parameter vectors to find the centroids. …”
    Get full text
    Article
  2. 16102

    Combined effects of basalt fiber geometrical characteristics on pavement performance of asphalt mixtures. by Heng Zhou, Mengxin Li, Guyue Jin, Mengyu Guo, Yingjun Jiang

    Published 2025-01-01
    “…Additionally, a random forest algorithm is adopted to perform a weight analysis of fiber characteristics and their correlation with pavement performance.…”
    Get full text
    Article
  3. 16103

    Motion Deblurring in Image Color Enhancement by WGAN by Jiangfan Feng, Shuang Qi

    Published 2020-01-01
    “…The key idea of this paper is to introduce a novel multitask learning algorithm for image motion deblurring and color enhancement, which enables us to enhance the color effect of an image while eliminating motion blur. …”
    Get full text
    Article
  4. 16104

    Electricity meter area identification technology based on channel coding theory by Yinghai XIE, Yu ZHANG

    Published 2021-12-01
    “…Station area identification has always been a problem in the ubiquitous power Internet of things, a new analytical model similar to fading channel was established for the station area identification, and based on the remote on-load voltage regulation function of on-load capacity and voltage regulation distribution transformer, the channel coding theory was applied to solve the problem.In order to identify station area of the smart meters, different special voltage regulation schemes with the properties of repeated coding and block coding were applied synchronously.At the same time, the power consumption information acquisition system was used to collect the voltage of each smart meter in this period.Finally, the recognition of each meter was realized based on the principle of minimum distance of decoding algorithm.The theoretical analysis and test results show that, compared with the traditional technology, the new technology can realize the high accuracy identification of a large number of meters in the on-load capacity and voltage regulation distribution transformer area in the existing power grid system without upgrading, which has high engineering application value.…”
    Get full text
    Article
  5. 16105

    Detection and Prevention of Selective Forwarding-Based Denial-of-Service Attacks in WSNs by Youngho Cho, Gang Qu

    Published 2013-08-01
    “…Finally, as a complementary defensive method to our detection and avoidance approaches, we introduce a prevention routing algorithm that proactively prevents the attack and provide our preliminary results to evaluate its performance.…”
    Get full text
    Article
  6. 16106

    FAULT DIAGNOSIS NEW METHOD OF ROLLING BEARING BASED ON ADAPTIVE REDUNDANT LIFTING SCHEME PACKET by XIAO ShunGen, SONG MengMeng, LAI LianFeng

    Published 2015-01-01
    “…Aiming at feature identification of weak signal for rolling bearing fault,an adaptive redundant lifting scheme packet( ARLSP) diagnostic method of undecimated operation was proposed to solve the faults distortion that caused by traditional wavelet packet or lifting wavelet transform using sample operation.ARLSP was based on the principle of lifting scheme.Initial undecimated prediction and update operator were calculated by Lagrange interpolating subdivision,and then constructed an ARLSP decomposition and reconstruction algorithm.Simulation signals were tried out by denoising and anti frequency aliasing,results show that ARLSP method was superior to the traditional wavelet packet in denoising capabilities,and there are no frequency aliasing.Moreover,taking an experiment on an asynchronous motor,the vibration signals of the rolling bearings 6205 under conditions of no fault,the inner ring fault,outer ring fault and rolling fault were measured.ARLSP method has been successfully used to extract characteristic frequency and frequency multiplication for various faults,and has got a higher diagnostic accuracy than traditional wavelet packet.…”
    Get full text
    Article
  7. 16107

    DYNAMIC RELIABILITY ANALYSIS OF PHOTOVOLTAIC SUPPORT SYSTEM CONSIDERING MULTIPLE UNCERTAINTIES by ZHONG Wei, YANG HuanHong, MA XiangDong, HUANG LongAn

    Published 2024-08-01
    “…Dynamic reliability analysis method of photovoltaic support system(PSS)was proposed considering the multiple uncertainties.Firstly,the reliability analysis model of PSS was constructed based on the probability density evolution method(PDEM),including the probability conservation equation,basic governing equation and density evolution equation.Then,the finite element analysis model of PSS was built,including the structural stress model,load combination form,and mesh generation algorithm.In simulation,the randomness in load combination and structures were incorporated,in which consists of six basic random parameters and 44 representative systems.The solution efficiency was improved by the joint simulation of PDEM and Abaqus.Results show that stress and displacement are two failure modes of PSS,and the influence of the latter is more obvious.The reliability index under the basic load combination condition is 0.928.As wind speed increases,the structural reliability decreases.In the high⁃speed range larger than 40 m/s,the uncertainty in structure itself will overestimate the reliability level of PSS,which should be paid attention in design.…”
    Get full text
    Article
  8. 16108

    Certificateless ciphertext retrieval scheme with multi-user and multi-keyword based on cloud-edge collaboration by Xiaodong YANG, Tian TIAN, Jiaqi WANG, Meijuan LI, Caifen WANG

    Published 2022-05-01
    “…To solve the problems of single-user search, single-keyword search, high computational cost and low-security level of ciphertext data retrieval in the industrial Internet of things environment, a certificateless ciphertext retrieval scheme with multi-user and multi-keyword based on cloud-edge collaboration was proposed.A user access permissions table was set and once encryption algorithm was executed to realize multi-user search and update users’ access permissions.A cloud-side collaborative computing model was introduced to match keyword ciphertext and keyword trapdoor efficiently by a linear scanning method when the keyword ciphertext does not entirely contain the search keyword.Key escrow and certificate management problems were solved by utilizing certificateless encryption system.Keyword ciphertext authentication was ensured by using digital signature technology.The security analysis results show that the proposed scheme can resist internal keyword guessing attacks under the random oracle model.Simulation results show that the proposed scheme has higher computational efficiency compared with similar schemes.…”
    Get full text
    Article
  9. 16109

    Benchmarking of Multispectral Pansharpening: Reproducibility, Assessment, and Meta-Analysis by Luciano Alparone, Andrea Garzelli

    Published 2024-12-01
    “…As a major outcome of this study, an improved version of the additive wavelet luminance proportional (AWLP) pansharpening algorithm offers all of the favorable characteristics of an ideal benchmark, namely, performance, speed, absence of adjustable running parameters, reproducibility of results with varying datasets and landscapes, and automatic correction of the path radiance term introduced by the atmosphere. …”
    Get full text
    Article
  10. 16110

    Sensor Placement Optimization of Vibration Test on Medium-Speed Mill by Lihua Zhu, Jun Dai, Guoliang Bai

    Published 2015-01-01
    “…The OSP of medium-speed mill was conducted using the effective independence method (EfI) and QR decomposition algorithm. The results showed that the order of modal shapes had an important influence on the optimization results. …”
    Get full text
    Article
  11. 16111

    Panoramic video coding based on spherical distortion with spatio-temporal dependency by Xu YANG, Ce ZHU, Hongwei GUO, Lei LUO

    Published 2023-10-01
    “…The planar coding distortion, which affects objective quality, and spherical distortion, which affects subjective quality, as well as existing independent rate-distortion optimization techniques that fail to consider the temporal propagation of spherical distortion and its impact on coding performance, result in coding performance degradation.To address these issues, a spatio-temporal dependent spherical distortion model was proposed for optimizing panoramic video coding.Firstly, a spatial mapping model was proposed to map spherical distortions to coding distortions, aiming to align subjective and objective quality assessments.Secondly, a temporal propagation model for spherical distortions was introduced to enhance the overall coding performance of all coding units in the propagation chain.Finally, the coding parameters were adjusted by computing the weights for spatial mapping and temporal propagation of spherical distortions.Experimental results demonstrate that, under low-delay encoding configurations, compared to the VTM14.0, a state-of-the-art video coding benchmark, the proposed algorithm achieves an average bitrate savings of 7.4% (up to 22.1%) and reduction in coding time of 9%.…”
    Get full text
    Article
  12. 16112

    Hall Current Effect of Magnetic-Optical-Elastic-Thermal-Diffusive Semiconductor Model during Electrons-Holes Excitation Processes by Abdulkafi M. Saeed, Kh. Lotfy, Alaa. A. El-Bary

    Published 2022-01-01
    “…Mathematically, the Laplacian computational inversion algorithm with a numerical approximation is used to achieve the fundamental physical quantities numerically in the time domain. …”
    Get full text
    Article
  13. 16113

    Application of LCD-SVD Technique and CRO-SVM Method to Fault Diagnosis for Roller Bearing by Songrong Luo, Junsheng Cheng, HungLinh Ao

    Published 2015-01-01
    “…Thirdly, a support vector machine (SVM) classifier based on Chemical Reaction Optimization (CRO) algorithm, called CRO-SVM method, is designed for classification of fault location. …”
    Get full text
    Article
  14. 16114

    Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network Coding by Jen-Yeu Chen, Yi-Ying Tseng

    Published 2012-12-01
    “…In this paper, a distributed algorithm is developed to effectively detect, locate, and isolate the Byzantine attackers in a wireless ad hoc network with random linear network coding (RLNC). …”
    Get full text
    Article
  15. 16115

    Product Selection and Components Replenishment Model of ATO Manufacturer under Heterogeneous Demand by Yuyu Li, Bo Huang

    Published 2013-01-01
    “…Furthermore, we propose an algorithm to obtain the optimal solution on the set of products and the components replenishment quantities. …”
    Get full text
    Article
  16. 16116

    The tolerance balancing optimization with multiple constraints on the form and function of the discrete functional surface by Chuanyuan Zhou, Xiaomei Guo, Xiaoxiao Wei

    Published 2025-01-01
    “…The tolerance contribution is incorporated into the nonlinear inertial weight particle swarm algorithm. By balancing the influence of tolerance on geometric function and surface form, and the extent of the tolerance optimization, the part tolerances that meet the requirements of geometric function and surface form are solved and the tolerance balancing optimization is achieved.…”
    Get full text
    Article
  17. 16117

    Generalized Exponential Fuzzy Entropy Approach for Automatic Segmentation of Chest CT with COVID-19 Infection by Saud S. Alotaibi, Ahmed Elaraby

    Published 2022-01-01
    “…To address this challenge, we propose a novel framework involving an optimization technique algorithm to solve a multilevel thresholding problem based on information theory to segment abnormal lung CT scans. …”
    Get full text
    Article
  18. 16118

    HARQ scheme for sparse code multiple access based on network coding by Ke LAI, Jing LEI, Wei LIU, Lei WEN

    Published 2022-09-01
    “…To fulfill the stringent reliability and throughput demand of the beyond-5G and the forthcoming 6G, a novel network coding (NC) based hybrid automatic retransmission request (HARQ) for low-density parity check (LDPC) coded SCMA was proposed.Two incorrectly received packets from different time slots were retransmitted by using NC principle under multi-user scenario.By doing so, the information came from two packets could be conveyed in one retransmission.Moreover, extra coding gain could be attained at the receiver.Furthermore, since the similarity between SCMA detector and LDPC decoder, and the one check node feature of NC decoder, a SCMA, LDPC and NC joint decoder based on message passing algorithm (MPA) was proposed.The proposed scheme could fully utilize the soft messages come from current and previous transmissions, and thus exploiting satisfied coding gain from NC.Simulation results show that the superiority of the proposed novel HARQ scheme for SCMA over the conventional HARQ on both throughput and reliability.…”
    Get full text
    Article
  19. 16119

    Trajectory Tracking Control of Mecanum Wheels Mobile Platform Based on MPC by Huang Xiaoyu, Sun Yongzhi, Li Jinrong, Wang Yiting, Yang Qiwei

    Published 2023-11-01
    “…Simulation experiments demonstrate that the controller designed in this study has better convergence speed and tracking accuracy than the commonly used trajectory algorithm, and it can provide good robustness to control the mobile platform of Mecanum wheels.…”
    Get full text
    Article
  20. 16120

    Pairing-free certificateless blockchain-based access authentication method for spatial information network by HUO Ru, WANG Zhihao, SHAO Zihao, HUANG Tao

    Published 2024-08-01
    “…Furthermore, a certificateless public key without pairing and elliptic curve hybrid encryption algorithm based on blockchain was proposed, and an access authentication mechanism was designed to ensure the security of the access authentication process and the traceability of operations. …”
    Get full text
    Article