Showing 16,121 - 16,140 results of 19,511 for search '"algorithms"', query time: 0.08s Refine Results
  1. 16121

    VIBRATION MEASUREMENT METHOD OF WIND TURBINE BLADE BASED ON BINOCULAR PHOTOGRAM METRY by YAKUP AhMat, WANG WenYun, GULBAHAR TohTi, SUN Zhi, MAMTIMIN GeNi

    Published 2020-01-01
    “…binocular photogrammetry vibration measurement method for considering the radial and tangential distortion parameters calibration by using the Levenberg-Marquardt algorithm based nonlinear optimization was proposed. …”
    Get full text
    Article
  2. 16122

    Adaptive control of single-input single-output hybrid systems possessing interacting discrete- and continuous-time dynamics by M. de la Sen

    Published 2005-01-01
    “…As a result there are also mixed continuous-time and discrete signals present in the system associated either with the solutions of differential equations which depend at the same time on both discrete-time and continuous-time forcing terms and on generalized difference equations associated with discretized and digital signals. The estimation algorithm is of a continuous-time nature since the plant parameter estimates are updated for all time. …”
    Get full text
    Article
  3. 16123

    Sentiment Analysis of Mobile Phone Reviews Using XGBoost and Word Vectors by Wang Zekai

    Published 2025-01-01
    “…The research is based on the consumer reviews of online cell phone e-commerce, The paper constructs a sentiment dictionary in this field based on the Sentiment Oriented Point Mutual Information (SO-PMI) algorithm, and the sentiment weight of the review word vectors. …”
    Get full text
    Article
  4. 16124

    Joint frequency and DOA estimation using spatial-temporal co-prime sampling with off-grid sources by Wang-han LYU, Hua-li WANG, Shan-xiang MU, Feng LIU

    Published 2017-02-01
    “…A method of joint frequency and direction of arrival (DOA) estimation using spatial-temporal co-prime sam-pling with off-grid sources was proposed to solve the problem of two-dimensional (2D) mismatches of signals.Firstly,the received signal was sampled by spatio-temporal co-prime sampling technique to construct 2D sparse reconstruction model with the filled coarray.Then the frequency mismatch term and angle mismatch term were incorporated into the re-ceived data model.Based on the above modified model,an improved greedy algorithm was presented to obtain the fre-quency mismatch and angle mismatch by estimating the spectrum leakage terms jointly.So the 2D off-grid sources can be corrected to accurate positions.The method can increase the degrees of freedom (DOF) in the space-frequency domain.Moreover,the method has reduced the amount of computation,and it can improve the frequency and DOA estimation accuracy in the meantime.Simulation results demonstrate the correctness and effectiveness of the proposed approach.…”
    Get full text
    Article
  5. 16125

    Analysis of Farmer Relocation Selection Behavior Based on Bayesian Network by Song Li, Yanbo Guo

    Published 2022-01-01
    “…In the research process of migration direction, the research structure shows that 60.1% of farmers want to stay in the countryside, rather than migrate through Bayesian network algorithm. The results of regression analysis by establishing a multivariate logistic model show that there is a strong willingness to choose small towns and large cities. …”
    Get full text
    Article
  6. 16126

    SAMPLING OF THE PLAN OF REPAIRS OF THE MAIN EQUIPMENT IN THE ELECTRICAL POWER SYSTEM by O. I. Alexandrov

    Published 2017-07-01
    “…The main problems that hinder mathematical modeling of decision-making concerning operational applications for the repair of the main power equipment of power system are: the need for a coherent account of a large number of limiting factors and indicators of effectiveness of the solutions; the need of information and algorithmic trade-offs with the objectives of adjacent levels of spatial, temporal and functional hierarchy; the lack of developments in the standardization of information structures that adequately reflect the process of finding solutions; the computational complexity of several restrictions of the optimization problem subject to mandatory registration.…”
    Get full text
    Article
  7. 16127

    Mobile Performance Intelligent Evaluation of IoT Networks Based on DNN by Zhen Tang, Xiaobin Fu, Pingping Xiao

    Published 2022-01-01
    “…Employing the deep neural network (DNN), an OP intelligent prediction algorithm is proposed. Then, the numerical simulations are conducted to confirm the ASEP and OP performance analysis. …”
    Get full text
    Article
  8. 16128

    Comparison and Correction of Runoff Simulation Based on XGBoost and SWAT by LIANG Lisha, JIANG Xiaolei, HU Leyi, SHEN Jing, ZHANG Liping, FU Xiaolei

    Published 2024-01-01
    “…Based on the extreme gradient boosting (XGBoost) algorithm and soil and water assessment tool (SWAT) model, a runoff simulation model was constructed by using the observed hydrological data of Waizhou hydrological station in Ganjiang River Basin, and the simulation effects of the two models were compared. …”
    Get full text
    Article
  9. 16129

    Stress Assessment of a Steel Bullet LPG Tank Under Differential Settlement Based on Geodetic Measurements and Sensitivity Analysis by Ferenc Tomasz, Gierasimczyk Rafał, Mikulski Tomasz

    Published 2024-12-01
    “…A numerical model of the structure and sand-gravel pillow is analysed using the finite element method, and the impact of variation in the stiffness of the sand-gravel pillow on the vertical displacement of the tank is determined. The algorithm involves six iterations of calculations, and after each iteration, the stiffness modified sand-gravel pillow is determined. …”
    Get full text
    Article
  10. 16130

    Design of an Adaptive Distributed Critical-Care Extensive Response Network (AD-CERN) Using Cooperative Overlay Network by V. Akilandeswari, S. Mercy Shalinie

    Published 2014-03-01
    “…In this network, each node will be trained independently based on Naïve Bayes classification algorithm to react against any critical services in the network. …”
    Get full text
    Article
  11. 16131

    An Integrative Approach to Accurate Vehicle Logo Detection by Hao Pan, Bailing Zhang

    Published 2013-01-01
    “…An enhanced Adaboost algorithm, together with two types of features of Haar and HOG, is proposed to detect vehicles. …”
    Get full text
    Article
  12. 16132

    Stochastic Electric Vehicle Network with Elastic Demand and Environmental Costs by Jie Ma, Hua Wang, Tianpei Tang

    Published 2020-01-01
    “…The computational feasibility of the algorithm is tested in a large-scale network. Through a comparison analysis, we show the benefits of introducing EVs into the urban transportation network in the SUEED circumstance. …”
    Get full text
    Article
  13. 16133

    Heston-GA Hybrid Option Pricing Model Based on ResNet50 by Zheng Yang, Liqin Zhang, Xiangxing Tao, Yanting Ji

    Published 2022-01-01
    “…Based on the optimization of Heston model parameters by genetic algorithm (GA), ResNet50 model is used to correct the deviation between market option price and Heston price, so a new hybrid option pricing model is established based on the empirical research on the European call options of Huatai-PB CSI 300ETF (code 510300), Harvest CSI 300ETF (code 159919), and SSE 50ETF (code 510050). (3) Results. …”
    Get full text
    Article
  14. 16134

    Fractional synchrosqueezing transform for enhanced multicomponent signal separation by Yangyang Li, Dzati Athiar Ramli

    Published 2024-08-01
    “…Furthermore, as the sample size increases, the proposed algorithm shows satisfactory computational efficiency.…”
    Get full text
    Article
  15. 16135

    Study on energy saving strategy and Nash equilibrium of base station in cognitive radio network by Xiao-tong MA, Shun-fu JIN, Jian-ping LIU, Zhan-qiang HUO

    Published 2016-07-01
    “…From the perspective of economics, a profit function was constructed and a nonlinear optimization algorithm was designed to investigate the Nash equilibrium and the socially optimal behavior of the secondary user packets, then a pricing policy of licensed spectrum for secondary users was formulated. …”
    Get full text
    Article
  16. 16136

    Probabilistic prediction of fatigue damage based on linear fracture mechanics by M. Krejsa, L. Koubova, J. Flodr, J. Protivinsky, Q. T. Nguyen

    Published 2016-12-01
    “…For probabilistic calculation of fatigue crack progression was used the original and new probabilistic methods - the Direct Optimized Probabilistic Calculation (“DOProC”), which is based on optimized numerical integration. The algorithm of the probabilistic calculation was applied in the FCProbCalc code (“Fatigue Crack Probabilistic Calculation”), using which is possible to carry out the probabilistic modelling of propagation of fatigue cracks in a user friendly environment very effectively.…”
    Get full text
    Article
  17. 16137

    Optimization mechanism of attack and defense strategy in honeypot game with evidence for deception by Lihua SONG, Yangyang JIANG, Changyou XING, Guomin ZHANG

    Published 2022-11-01
    “…Using game theory to optimize honeypot behavior is an important method in improving defender’s trapping ability.Existing work tends to use over simplified action spaces and consider isolated game stages.A game model named HoneyED with expanded action spaces and covering comprehensively the whole interaction process between a honeypot and its adversary was proposed.The model was focused on the change in the attacker’s beliefs about its opponent’s real identity.A pure-strategy-equilibrium involving belief was established for the model by theoretical analysis.Then, based on the idea of deep counterfactual regret minimization (Deep-CFR), an optimization algorithm was designed to find an approximate hybrid-strategy-equilibrium.Agents for both sides following hybrid strategies from the approximate equilibrium were obtained.Theoretical and experimental results show that the attacker should quit the game when its belief reaches a certain threshold for maximizing its payoff.But the defender’s strategy is able to maximize the honeypot’s profit by reducing the attacker’s belief to extend its stay as long as possible and by selecting the most suitable response to attackers with different deception recognition abilities.…”
    Get full text
    Article
  18. 16138

    Spectrum Sharing with Vehicular Communication in Cognitive Small-Cell Networks by Guilu Wu, Hongyun Chu

    Published 2020-01-01
    “…Hence, an improved genetic simulated annealing algorithm is designed to achieve NE. Simulation results demonstrate that the NE point for the price of the primary service provider exists. …”
    Get full text
    Article
  19. 16139

    OPTIMIZATION DESIGN OF CABIN STRUT BASED ON ISIGHT AND PYTHON FOR CIVIL AIRCRAFT by FANG Yang, ZHANG WeiWen, ZHANG YangYang

    Published 2021-01-01
    “…It utilizes multi-island genetic algorithm for optimization analysis,and an iterative optimization process for the follow-up strut analysis is established. …”
    Get full text
    Article
  20. 16140

    Trajectory Planning of Energy Consumption Optimal Redundant Manipulators with Constraints by Yuanfei Zhou, Haitao Tang

    Published 2022-08-01
    “…In order to improve the computational efficiency of trajectory optimization, a new penalty algorithm is designed through dealing with the kinematic and dynamic constraints in the cost function calculation, so as to avoid running the inverse dynamic model when all the constraints are not met. …”
    Get full text
    Article