Showing 16,621 - 16,640 results of 19,511 for search '"algorithms"', query time: 0.09s Refine Results
  1. 16621

    Numerical Analysis for U-Shaped Thin-Walled Structure Reinforced Timber Beam Based on Thin-Layer Beam Theory by Hui Liu, Jun Hu, Guohui Li, Guangying Mo

    Published 2019-01-01
    “…This paper presents a theoretical model, taking into account the shear deformation subjected to the influence of U-shaped member by geometric parameters as flange height based on thin-layer beam theory, to analyze the structural bending behavior of U-shaped member reinforced timber composite beams, and the feasible design forms of U-section have been pointed out. The algorithm for this composite beam is the most practical and effective method to meet the accurate solution. …”
    Get full text
    Article
  2. 16622

    Remaining Useful Life Estimation of Fan Slewing Bearings in Nonlinear Wiener Process with Random Covariate Effect by Mingjun Liu, Zengshou Dong, Hui Shi, Yujia Zheng, Min Zhang

    Published 2022-01-01
    “…Thirdly, the maximum likelihood estimation algorithm is used to estimate the RUL parameters depending on the historical degradation data. …”
    Get full text
    Article
  3. 16623

    Routh–Hurwitz Stability and Quasiperiodic Attractors in a Fractional-Order Model for Awareness Programs: Applications to COVID-19 Pandemic by Taher S. Hassan, E. M. Elabbasy, A.E. Matouk, Rabie A. Ramadan, Alanazi T. Abdulrahman, Ismoil Odinaev

    Published 2022-01-01
    “…Furthermore, the proposed awareness program models are numerically simulated based on the predictor-corrector algorithm and some clinical data of the COVID-19 pandemic in KSA. …”
    Get full text
    Article
  4. 16624

    Synthesis of shared aperture thinned interleaved arrays with elements in concentric rings by Zhigang GU, Longjun LI, Jikuan HU

    Published 2023-02-01
    “…Among planar array antennas, concentric ring array (CRA) antennas have received considerable interest since it is symmetric and provides invariant beam pattern for 360° azimuthal coverage.In case of limited antenna aperture, there is great value to thinned interleaved CRA with low peak side lobe levels and a narrow main beam.The application of the cubic interpolation and density-weighting method in shared aperture array design was demonstrated by the low peak side lobe level synthesis of CRA.By adopting the Fourier-Bessel transform the relationship between the element’s excitation and array pattern, thinned interleaved problems were formulated as time-frequency synthesis problems.On the basis of the density-weighting method, element excitations of interleaved sub-array were carefully selected in an odd-even manner, which ensured the pattern matching of the generated sub-array.The iterative FFT algo rithm was adopted to thin the concentric ring array.Simulation results show that the proposed algorithm can achieve a favorable thinned and interleaved concentric ring array design with matched power patterns and low peak sidelobe levels.The problem of thinned and interleaved concentric ring arrays is solved, and the design of multi-function shared aperture thinned interleaved arrays with elements in concentric rings is realized.…”
    Get full text
    Article
  5. 16625

    Time Management: Strategy of Students’ Preparation for Examinations without Emergency Rush by M. A. Lukashenko, T. V. Telegina

    Published 2020-03-01
    “…The article works out and proves the algorithm of calculating the real resource of time needed to prepare for examinations, that was tested in student groups and showed its effectiveness on the basis of the examinations’ results.…”
    Get full text
    Article
  6. 16626

    Evaluation of Cruise Ship Supply Logistics Service Providers with ANP-RBF by Liling Huang, Yong Tan, Xu Guan

    Published 2021-01-01
    “…We propose an incremental algorithm that can effectively avoid the influence of subjective factors and increase the dynamic nature of evaluation. …”
    Get full text
    Article
  7. 16627

    Indoor localization system based on virtual access points with filtering schemes by Dong Myung Lee, Boney Labinghisa

    Published 2019-07-01
    “…The performance testing of the algorithm in different indoor environments resulted in 3.18 and 3.59 m error distances. …”
    Get full text
    Article
  8. 16628

    Inherent stochasticity, noise and limits of detection in continuous and time-gated fluorescence systems. by Nicholas H Vitale, Arjang Hassibi, Hyongsok Tom Soh, Boris Murmann, Thomas H Lee

    Published 2024-01-01
    “…Both the ensemble and stochastic models presented in this work have been verified using Monte Carlo molecular dynamic simulations that utilize the Gillespie algorithm. The implications of the model on the design of biomolecular fluorescence detection systems are explored in three relevant numerical examples. …”
    Get full text
    Article
  9. 16629

    Digital Design and Research of Reliability Allocation of the Gear Transmission System by Han Yingying, Ai Hongxu, Shen Qiang, Li Ziyuan, Li Wei

    Published 2024-04-01
    “…The basic reliability model and task reliability model of the complex gear transmission system are established, and the traversal algorithm of the automatic reliability model generation is studied. …”
    Get full text
    Article
  10. 16630

    Train Repathing in Emergencies Based on Fuzzy Linear Programming by Xuelei Meng, Bingmou Cui

    Published 2014-01-01
    “…The model in this paper was solved and the computation results prove the availability of the model and efficiency of the algorithm.…”
    Get full text
    Article
  11. 16631

    QSAR STUDY OF 2-SUBSTITUTED PHENYL-2-OXO-, 2-HYDROXYL- AND 2-ACYLLOXYETHYLSULFONAMIDES AS FUNGICIDES by Yusuf Isyaku, Adamu Uzairu, Sani Uba

    Published 2019-06-01
    “…The model was developed using Genetic Function Algorithm (GFA). Out of the four models developed, model 1 was selected as the optimum model with good statistical parameters; R2 = 0.954, R2adj =0.941, cross validation R2/ Q2cv = 0.888 and R2pred = 0.839. …”
    Get full text
    Article
  12. 16632

    Application of IoT and blockchain technology in the integration of innovation and industrial chains in high-tech manufacturing by Zepei Li, Peng Zheng, Yanjia Tian

    Published 2025-04-01
    “…This study introduces BD-IoTQNet, a novel framework designed to address these challenges by integrating data fusion, anomaly detection using the Isolation Forest algorithm, and blockchain-enabled DQM (Data Quality Management). …”
    Get full text
    Article
  13. 16633

    A Robust Method to Suppress Jamming for GNSS Array Antenna Based on Reconstruction of Sample Covariance Matrix by Yanyun Gong, Ling Wang, Rugui Yao, Zhaolin Zhang

    Published 2017-01-01
    “…In antijamming application of satellite navigation system, if active jamming is received from array antenna main-lobe, main-lobe distortion happens when the adaptive filtering algorithm forms main-lobe nulling. A robust method to suppress jamming for satellite navigation by reconstructing sample covariance matrix without main-lobe nulling is proposed in this paper. …”
    Get full text
    Article
  14. 16634

    ECMO: An Efficient and Confidential Outsourcing Protocol for Medical Data by Xiangyi Meng, Yuefeng Du, Cong Wang

    Published 2025-01-01
    “…To address these limitations in medical data outsourcing, we present ECMO, a novel protocol that combines an ordered additive secret sharing algorithm with a unique index permutation method. This approach efficiently outsources medical data while safeguarding both the data itself and access patterns from potential leakage. …”
    Get full text
    Article
  15. 16635

    Optimal transmission strategy of diamond channel with limited battery capacity of source node by Taoshen LI, Li SUN, Zhe WANG

    Published 2021-06-01
    “…In order to solve the problem that the energy harvesting uncertainty of node in wireless energy harvesting network makes it difficult for the system to design a reasonable transmission strategy, a diamond channel with limited battery capacity of the source node were constructed.The goal was to maximize the end-to-end throughput of the system.Under the conditions of meeting the constraints of energy and data causality between transmission nodes and no battery energy overflow, a model to maximize the end-to-end throughput of the system was built, and an optimal offline transmission power and rate allocation strategy was proposed.Firstly, based on theoretical analysis and formula derivation, the strategy transformed the optimal transmission problem into the optimal transmission problem on the side of the broadcast channel, and used the water-filling algorithm to solve the optimal total power from the source node to the relay node.Then, the throughput of the source node to each relay node was analyzed based on the cutoff power level in the broadcast channel throughput maximization problem.Finally, according to the data arrival of the relay node, the iterative water-filling method was used to solve the optimal transmission power from the relay node to the destination node, and the optimal rate was solved by extending the optimal rate of the multiple access channel.Simulation results demonstrate the feasibility and correctness of the proposed optimization policies.…”
    Get full text
    Article
  16. 16636

    Signal Control Strategy for Supersaturated Traffic at Urban Road Intersections with a Large Technical Grade Gap by Baiqun Ding, Liu Yang, He Xu, Yongming He

    Published 2021-01-01
    “…To reduce the risk of queuing overflow on the urban minor road at the intersection under supersaturation where the capacity of the arterial and minor roads shows extreme disparity, reduce the adverse effects caused by long queues of vehicles on the minor road, and comprehensively balance the multiobjective requirements such as priority of the main road, queuing restrictions, and delay on the minor road, the minor road queue model at the end of red, a road remaining capacity model, and multiparameter coordinated signal control model were established, and a multiobjective genetic algorithm was used to optimize this solution. As an example, the multiparameter coordinated control strategy decreased the delay per vehicle by approximately 17% and the queue length by approximately 30%–50% on the minor road and slightly increased the delay per vehicle at the intersection and the length on the main road queue. …”
    Get full text
    Article
  17. 16637

    Construction of advanced persistent threat attack detection model based on provenance graph and attention mechanism by Yuancheng LI, Hao LUO, Xinyu WANG, Jiexuan YUAN

    Published 2024-03-01
    “…In response to the difficulty of existing attack detection methods in dealing with advanced persistent threat (APT) with longer durations, complex and covert attack methods, a model for APT attack detection based on attention mechanisms and provenance graphs was proposed.Firstly, provenance graphs that described system behavior based on system audit logs were constructed.Then, an optimization algorithm was designed to reduce the scale of provenance graphs without sacrificing key semantics.Afterward, a deep neural network (DNN) was utilized to convert the original attack sequence into a semantically enhanced feature vector sequence.Finally, an APT attack detection model named DAGCN was designed.An attention mechanism was applied to the traceback graph sequence.By allocating different weights to different positions in the input sequence and performing weight calculations, sequence feature information of sustained attacks could be extracted over a longer period of time, which effectively identified malicious nodes and reconstructs the attack process.The proposed model outperforms existing models in terms of recognition accuracy and other metrics.Experimental results on public APT attack datasets show that, compared with existing APT attack detection models, the accuracy of the proposed model in APT attack detection reaches 93.18%.…”
    Get full text
    Article
  18. 16638

    Multiobjective Optimization of Sustainable WCO for Biodiesel Supply Chain Network Design by Nana Geng, Yixiang Sun

    Published 2021-01-01
    “…In order to effectively solve the model, a Pareto optimal NSGAII heuristic algorithm is proposed and applied to a practical case study of restaurants in Jiangsu Province. …”
    Get full text
    Article
  19. 16639

    Client-Driven Joint Cache Management and Rate Adaptation for Dynamic Adaptive Streaming over HTTP by Chenghao Liu, Miska M. Hannuksela, Moncef Gabbouj

    Published 2013-01-01
    “…Based on the philosophy of CLICRA, this paper proposes a rate adaptation algorithm, which selects bitrates for the next media segments to be requested by using the predicted buffered media time in the client. …”
    Get full text
    Article
  20. 16640

    An Empirical Analysis of the Role of Piano Performance in Alleviating Psychological Trauma in People with Psychological Isolation Disorder by Xia Cao

    Published 2022-01-01
    “…Finally, the support vector machine with optimized parameters of the genetic algorithm was used to classify the positive, neutral, and negative samples with 89.23% accuracy. …”
    Get full text
    Article