-
16161
Divisive hierarchical clustering for energy saving and latency reduction in UAV-assisted WSANs
Published 2025-01-01“…Furthermore, we utilize unmanned aerial vehicles (UAVs) for simultaneous data collection and develop a modified improved partheno genetic algorithm incorporating the Davies–Bouldin index for UAV scheduling. …”
Get full text
Article -
16162
Application of federated learning in predicting breast cancer
Published 2025-01-01“…Subsequently, each participant then sends the updated model parameters to the central server, where the FedAvg algorithm combines them to produce a global model. …”
Get full text
Article -
16163
Time series and semantics-based chinese microblog topic detection and tracking method
Published 2016-05-01“…As a widely used tool in social networks,microblog is definitely with short document,quick broadcasting and topic changeable,which results in big challenging for social topic detection and tracking.A new systematic framework for micro-blog topic detection and tracking was proposed based on the microblog clustering using temporal trend and semantic similarity.Firstly,a feature words selection method for hot topics was presented by defining the temporal frequent words set.Secondly,an initially clustering was conducted depending on the selected temporal frequent words set.As far as the overlaps between initial clusters concerned,an effective overlap elimination algorithm was proposed,by introducing the extended short document semantic membership,to separate any possible overlapped initial clusters.Finally,an aggregated topic clustering method was employed using the cluster semantic similarity matrix.The experiments were at last done on some real-world dataset from Sina microblog.It show that the method for chinese microblog topic detection and tracking can obtain excellent performance and results.…”
Get full text
Article -
16164
Strategic issues of raising international financing
Published 2022-07-01“…For the solution of one of the key strategic goals of corporate finance – execution of mergers and acquisitions transactions – we present an algorithm of raising financing by using syndicated loans and eurobonds.…”
Get full text
Article -
16165
APOPTOSIS IN CITY SYSTEMS: A BIOMIMETIC APPROACH TO CITY REGENERATION
Published 2013-05-01“…Aided with streamlined programmatic principles, computational and algorithmic design, city systems are studied in an African context. …”
Get full text
Article -
16166
GENERAL MODEL AND STABILITY STUDY OF CYLINDIRCAL GRINDING CHATTER (MT)
Published 2023-01-01“…In this model, Newton iterative method was used to solve the transcendental equation with time delay, Gaussian elimination method was used to improve the iterative convergence speed, the continuation algorithm was used to continuously provide effective initial values to improve the accuracy of the iterative results, and the accurate grinding stability boundary was obtained. …”
Get full text
Article -
16167
Energy-Efficient Robust Control for Direct Drive and Energy Recuperation Hydraulic Servo System
Published 2020-01-01“…Moreover, the optimized parameters are obtained by the simulated annealing algorithm. To further reduce the energy consumption, the variable supply pressure control circuit is introduced into the system. …”
Get full text
Article -
16168
Set reconciliation based on counting Bloom filters
Published 2012-08-01“…A new set reconciliation algorithm was presented,which called counting-Bloom-filter based set reconciliation(CBFSR).This method represented sets S<sub>A</sub> and S<sub>B</sub> as counting Bloom filters,subtracts S<sub>A</sub>'s counting Bloom filter from S<sub>B</sub>'s counting Bloom filter,the differences denoted CBF(S<sub>B</sub>)−CBF(S<sub>A</sub>),then determined S<sub>B</sub>−S<sub>A</sub> elements in S<sub>B</sub> with CBF(S<sub>B</sub>)−CBF(S<sub>A</sub>),and finally performed union operation on S<sub>B</sub>−S<sub>A</sub> and S<sub>A</sub>.Simulation resdts show counting-Bloom-filter based set reconciliation combines the advantages of exact set reconciliation and approximate set reconciliation,besides gaining all S<sub>B</sub>−S<sub>A</sub> elements with single-round messgage exchanges,it can apply to update-intensive distributed systems because counting Bloom filters support element deletion operation.…”
Get full text
Article -
16169
Relationship between Green Financing and Investment Logic and Effectiveness Evaluation of Financing Decisions
Published 2022-01-01“…Specifically, a decision model was established for the government participation in green financing via green product subsidy, and a solving algorithm was developed for the model. After that, the authors analyzed the correlations of green financing with the investment level and investment efficiency of green enterprises. …”
Get full text
Article -
16170
Design Methodology of a New Wavelet Basis Function for Fetal Phonocardiographic Signals
Published 2013-01-01“…In this work, a novel algorithm based on wavelet transform has been developed for denoising of fPCG signals. …”
Get full text
Article -
16171
Dynamic Contact Analysis of Torus-involute Gear
Published 2015-01-01“…Taking the torus-involute gear as study object,according to the theory of gear meshing and the gear hobbing process,the tooth surface equations of torus-involute gears with convex and concave teeth are derived by using the tooth surface equation of counterpart rack.According to the mathematical conditions of neither undercutting nor tooth pointing,based on MATLAB,the Graphical User Interface which contains geometric parameter designs of torus-involute gear is developed.In the light of the tooth surface equations of torus-involute gear,the three-dimensional coordinates of torus-involute gear are calculated which can be used to develop the3-D solid models.The Hypermesh is used to mesh the 3-D models of torus-involute gear.Based on the nonlinear contact algorithm,the finite element models of convex and concave torus-involute gears meshing are established which can be used to implement the dynamic contact analysis in ABAQUS.The results reveal that the width of torus-involute gears is limited by gear undercutting or tooth pointing and the maximum contact stress will be steady after hobbing for a while.The contact stress is small when just a pair of gear teeth are meshing,while the contact stress is large when two pairs of gear teeth are meshing.…”
Get full text
Article -
16172
RESEARCH ON DYNAMICS CHARACTERISTICS OF SPUR GEAR BASED ON DYNAMIC MSEH STIFFNESS
Published 2024-02-01“…In order to study the influence of rotational speed on mesh stiffness, an algorithm of calculating the dynamic mesh stiffness which related to rotational speed was proposed based on finite element framework by using the average acceleration method. …”
Get full text
Article -
16173
Federated learning-based user access strategy and energy consumption optimization in cell-free massive MIMO network
Published 2023-10-01“…To solve the problem that how users choose access points in cell-free massive multiple-input multiple-output (CF-mMIMO) network, a prioritized access strategy for poorer users based on channel coefficient ranking was proposed.First, users were evaluated and ranked for their channel quality and stability after channel sensing, and suitable access points were selected in sequence according to the order of the channel state information.Second, considering issues such as users' energy consumption and data security, a federal learning framework was used to enhance user's data privacy and security.Meanwhile, an alternating optimization variables algorithm based on energy consumption optimization was proposed to optimize the multi-dimensional variables, for the purpose of minimizing the total energy consumption of the system.Simulation results show that compared with the traditional user-centric in massive MIMO, the proposed access strategy can improve the average uplink reachable rate of users by 20%, and the uplink rate of users with poor channels can be double improved; in terms of energy consumption optimization, the total energy consumption can be reduced by much more than 50% after optimization.…”
Get full text
Article -
16174
FAULT DIAGNOSIS OF ROLLING BEARINGS BASED ON SDP AND IMPROVED SAM⁃MobileNetv2
Published 2024-08-01“…Traditional fault diagnosis methods for rolling bearings are difficult to accurately and efficiently achieve fault classification.A method of rolling bearing fault classification based on symmetrized dot pattern(SDP)and improved SAM⁃MobileNetv2 was proposed.Firstly,the bearing vibration signal was transformed into two⁃dimensional images with rich characteristic information by SDP algorithm.Secondly,the two⁃dimensional images were fed into the SAM⁃MobileNetv2 network model,which extracted and classified fault feature information.Improved SAM⁃MobileNetv2 networks used the adaptive activation function ACON to replace the ReLU6 activation function in SAM⁃MobileNetv2 to improve model classification performance.Finally,this model was compared with various models.The experimental results show that this model can accurately and efficiently realize the classification of rolling bearing faults,using Case Western Reserve University bearing fault data with an accuracy rate of 99.5%,using the University of Ottawa bearing failure data with an accuracy rate of 97.2%.…”
Get full text
Article -
16175
Multiple-Feature Extracting Modules Based Leak Mining System Design
Published 2013-01-01“…In this paper, we implement a crawler mining system that is equipped with SQL injection vulnerability detection, by means of an algorithm developed for the web crawler. In addition, we analyze portal sites of the governments of various countries or regions in order to investigate the information leaking status of each site. …”
Get full text
Article -
16176
The Evidence of Cooperative Binding of a Ligand to G4 DNA
Published 2017-01-01“…The cross-validation between a new hard + soft modelling and conventional stepwise complex formation algorithm has been conducted. A number of simulated examples will illustrate the methodology. …”
Get full text
Article -
16177
Research of Multi-objective Parameter Decoupled Optimization Method for Hybrid Electric Vehicle
Published 2019-06-01“…Aiming at this problem, a multi-parameter decouped optimization method is proposed, which adopts hybrid optimization strategy, taking the dynamic targets as constraint conditions and using particle swarm optimization algorithm to optimize powertrain parameter, the Particle swarm optimization (PSO) is used to optimize the energy management strategy and shifting strategy under different parameters. …”
Get full text
Article -
16178
Stochastic Generation of Subsurface Profiles for Realistic Simulation of Through-the-Earth Communication Systems
Published 2019-01-01“…Given the difficulties in implementing underground measurements taking years to achieve enough database for a variety of mines and depths, we propose, as a more versatile solution, realistic simulations of a variety of underground structures to statistically characterize magnetic field attenuation. An algorithm based on the Monte Carlo method is presented and uses the Finite Element Method (FEM) to compute field propagation through each random structure. …”
Get full text
Article -
16179
Detection method of LDoS attack based on ACK serial number step-length
Published 2018-07-01“…Low-rate denial of service (LDoS) attack is a potential security threat to big data centers and cloud computing platforms because of its strong concealment.Based on the analysis of network traffic during the LDoS attack,statistical analysis was given of ACK packets returned by the data receiver to the sender,and result reveals the sequence number step had the characteristics of volatility during the LDoS attack.The permutation entropy method was adopted to extract the characteristics of volatility.Hence,an LDoS attack detection method based on ACK serial number step permutation entropy was proposed.The serial number was sampled and the step length was calculated through collecting the ACK packets that received at the end of sender.Then,the permutation entropy algorithm with strong time-sensitive was used to detect the mutation step time,and achieve the goal of detecting LDoS attack.A test-bed was designed and built in the actual network environment for the purpose of verifying the proposed approach performance.Experimental results show that the proposed approach has better detection performance and has achieved better detection effect.…”
Get full text
Article -
16180
An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs
Published 2024-01-01“…To address these requirements, we propose a threshold elliptic curve digital signature algorithm that counters malicious adversaries in environments with three or more participants. …”
Get full text
Article