-
16621
Numerical Analysis for U-Shaped Thin-Walled Structure Reinforced Timber Beam Based on Thin-Layer Beam Theory
Published 2019-01-01“…This paper presents a theoretical model, taking into account the shear deformation subjected to the influence of U-shaped member by geometric parameters as flange height based on thin-layer beam theory, to analyze the structural bending behavior of U-shaped member reinforced timber composite beams, and the feasible design forms of U-section have been pointed out. The algorithm for this composite beam is the most practical and effective method to meet the accurate solution. …”
Get full text
Article -
16622
Remaining Useful Life Estimation of Fan Slewing Bearings in Nonlinear Wiener Process with Random Covariate Effect
Published 2022-01-01“…Thirdly, the maximum likelihood estimation algorithm is used to estimate the RUL parameters depending on the historical degradation data. …”
Get full text
Article -
16623
Routh–Hurwitz Stability and Quasiperiodic Attractors in a Fractional-Order Model for Awareness Programs: Applications to COVID-19 Pandemic
Published 2022-01-01“…Furthermore, the proposed awareness program models are numerically simulated based on the predictor-corrector algorithm and some clinical data of the COVID-19 pandemic in KSA. …”
Get full text
Article -
16624
Synthesis of shared aperture thinned interleaved arrays with elements in concentric rings
Published 2023-02-01“…Among planar array antennas, concentric ring array (CRA) antennas have received considerable interest since it is symmetric and provides invariant beam pattern for 360° azimuthal coverage.In case of limited antenna aperture, there is great value to thinned interleaved CRA with low peak side lobe levels and a narrow main beam.The application of the cubic interpolation and density-weighting method in shared aperture array design was demonstrated by the low peak side lobe level synthesis of CRA.By adopting the Fourier-Bessel transform the relationship between the element’s excitation and array pattern, thinned interleaved problems were formulated as time-frequency synthesis problems.On the basis of the density-weighting method, element excitations of interleaved sub-array were carefully selected in an odd-even manner, which ensured the pattern matching of the generated sub-array.The iterative FFT algo rithm was adopted to thin the concentric ring array.Simulation results show that the proposed algorithm can achieve a favorable thinned and interleaved concentric ring array design with matched power patterns and low peak sidelobe levels.The problem of thinned and interleaved concentric ring arrays is solved, and the design of multi-function shared aperture thinned interleaved arrays with elements in concentric rings is realized.…”
Get full text
Article -
16625
Time Management: Strategy of Students’ Preparation for Examinations without Emergency Rush
Published 2020-03-01“…The article works out and proves the algorithm of calculating the real resource of time needed to prepare for examinations, that was tested in student groups and showed its effectiveness on the basis of the examinations’ results.…”
Get full text
Article -
16626
Evaluation of Cruise Ship Supply Logistics Service Providers with ANP-RBF
Published 2021-01-01“…We propose an incremental algorithm that can effectively avoid the influence of subjective factors and increase the dynamic nature of evaluation. …”
Get full text
Article -
16627
Indoor localization system based on virtual access points with filtering schemes
Published 2019-07-01“…The performance testing of the algorithm in different indoor environments resulted in 3.18 and 3.59 m error distances. …”
Get full text
Article -
16628
Inherent stochasticity, noise and limits of detection in continuous and time-gated fluorescence systems.
Published 2024-01-01“…Both the ensemble and stochastic models presented in this work have been verified using Monte Carlo molecular dynamic simulations that utilize the Gillespie algorithm. The implications of the model on the design of biomolecular fluorescence detection systems are explored in three relevant numerical examples. …”
Get full text
Article -
16629
Digital Design and Research of Reliability Allocation of the Gear Transmission System
Published 2024-04-01“…The basic reliability model and task reliability model of the complex gear transmission system are established, and the traversal algorithm of the automatic reliability model generation is studied. …”
Get full text
Article -
16630
Train Repathing in Emergencies Based on Fuzzy Linear Programming
Published 2014-01-01“…The model in this paper was solved and the computation results prove the availability of the model and efficiency of the algorithm.…”
Get full text
Article -
16631
QSAR STUDY OF 2-SUBSTITUTED PHENYL-2-OXO-, 2-HYDROXYL- AND 2-ACYLLOXYETHYLSULFONAMIDES AS FUNGICIDES
Published 2019-06-01“…The model was developed using Genetic Function Algorithm (GFA). Out of the four models developed, model 1 was selected as the optimum model with good statistical parameters; R2 = 0.954, R2adj =0.941, cross validation R2/ Q2cv = 0.888 and R2pred = 0.839. …”
Get full text
Article -
16632
Application of IoT and blockchain technology in the integration of innovation and industrial chains in high-tech manufacturing
Published 2025-04-01“…This study introduces BD-IoTQNet, a novel framework designed to address these challenges by integrating data fusion, anomaly detection using the Isolation Forest algorithm, and blockchain-enabled DQM (Data Quality Management). …”
Get full text
Article -
16633
A Robust Method to Suppress Jamming for GNSS Array Antenna Based on Reconstruction of Sample Covariance Matrix
Published 2017-01-01“…In antijamming application of satellite navigation system, if active jamming is received from array antenna main-lobe, main-lobe distortion happens when the adaptive filtering algorithm forms main-lobe nulling. A robust method to suppress jamming for satellite navigation by reconstructing sample covariance matrix without main-lobe nulling is proposed in this paper. …”
Get full text
Article -
16634
ECMO: An Efficient and Confidential Outsourcing Protocol for Medical Data
Published 2025-01-01“…To address these limitations in medical data outsourcing, we present ECMO, a novel protocol that combines an ordered additive secret sharing algorithm with a unique index permutation method. This approach efficiently outsources medical data while safeguarding both the data itself and access patterns from potential leakage. …”
Get full text
Article -
16635
Optimal transmission strategy of diamond channel with limited battery capacity of source node
Published 2021-06-01“…In order to solve the problem that the energy harvesting uncertainty of node in wireless energy harvesting network makes it difficult for the system to design a reasonable transmission strategy, a diamond channel with limited battery capacity of the source node were constructed.The goal was to maximize the end-to-end throughput of the system.Under the conditions of meeting the constraints of energy and data causality between transmission nodes and no battery energy overflow, a model to maximize the end-to-end throughput of the system was built, and an optimal offline transmission power and rate allocation strategy was proposed.Firstly, based on theoretical analysis and formula derivation, the strategy transformed the optimal transmission problem into the optimal transmission problem on the side of the broadcast channel, and used the water-filling algorithm to solve the optimal total power from the source node to the relay node.Then, the throughput of the source node to each relay node was analyzed based on the cutoff power level in the broadcast channel throughput maximization problem.Finally, according to the data arrival of the relay node, the iterative water-filling method was used to solve the optimal transmission power from the relay node to the destination node, and the optimal rate was solved by extending the optimal rate of the multiple access channel.Simulation results demonstrate the feasibility and correctness of the proposed optimization policies.…”
Get full text
Article -
16636
Signal Control Strategy for Supersaturated Traffic at Urban Road Intersections with a Large Technical Grade Gap
Published 2021-01-01“…To reduce the risk of queuing overflow on the urban minor road at the intersection under supersaturation where the capacity of the arterial and minor roads shows extreme disparity, reduce the adverse effects caused by long queues of vehicles on the minor road, and comprehensively balance the multiobjective requirements such as priority of the main road, queuing restrictions, and delay on the minor road, the minor road queue model at the end of red, a road remaining capacity model, and multiparameter coordinated signal control model were established, and a multiobjective genetic algorithm was used to optimize this solution. As an example, the multiparameter coordinated control strategy decreased the delay per vehicle by approximately 17% and the queue length by approximately 30%–50% on the minor road and slightly increased the delay per vehicle at the intersection and the length on the main road queue. …”
Get full text
Article -
16637
Construction of advanced persistent threat attack detection model based on provenance graph and attention mechanism
Published 2024-03-01“…In response to the difficulty of existing attack detection methods in dealing with advanced persistent threat (APT) with longer durations, complex and covert attack methods, a model for APT attack detection based on attention mechanisms and provenance graphs was proposed.Firstly, provenance graphs that described system behavior based on system audit logs were constructed.Then, an optimization algorithm was designed to reduce the scale of provenance graphs without sacrificing key semantics.Afterward, a deep neural network (DNN) was utilized to convert the original attack sequence into a semantically enhanced feature vector sequence.Finally, an APT attack detection model named DAGCN was designed.An attention mechanism was applied to the traceback graph sequence.By allocating different weights to different positions in the input sequence and performing weight calculations, sequence feature information of sustained attacks could be extracted over a longer period of time, which effectively identified malicious nodes and reconstructs the attack process.The proposed model outperforms existing models in terms of recognition accuracy and other metrics.Experimental results on public APT attack datasets show that, compared with existing APT attack detection models, the accuracy of the proposed model in APT attack detection reaches 93.18%.…”
Get full text
Article -
16638
Multiobjective Optimization of Sustainable WCO for Biodiesel Supply Chain Network Design
Published 2021-01-01“…In order to effectively solve the model, a Pareto optimal NSGAII heuristic algorithm is proposed and applied to a practical case study of restaurants in Jiangsu Province. …”
Get full text
Article -
16639
Client-Driven Joint Cache Management and Rate Adaptation for Dynamic Adaptive Streaming over HTTP
Published 2013-01-01“…Based on the philosophy of CLICRA, this paper proposes a rate adaptation algorithm, which selects bitrates for the next media segments to be requested by using the predicted buffered media time in the client. …”
Get full text
Article -
16640
An Empirical Analysis of the Role of Piano Performance in Alleviating Psychological Trauma in People with Psychological Isolation Disorder
Published 2022-01-01“…Finally, the support vector machine with optimized parameters of the genetic algorithm was used to classify the positive, neutral, and negative samples with 89.23% accuracy. …”
Get full text
Article