Showing 2,341 - 2,360 results of 54,221 for search 'Methil~', query time: 3.72s Refine Results
  1. 2341
  2. 2342

    A congestion control method based on loading-feedback in MTC by Hongguang DUAN, Songpin LU, Lifei WANG, Dan TAN, Jiangqi GAO

    Published 2016-11-01
    “…Through analyzing the access efficiency of machine type communication(MTC)devices in LTE-Advanced system,a loading-feedback control method was proposed.The current access load was estimated and the load of next access slot were calculated using the preamble state information,and the access control parameters for MTC device were adjusted based on the load change dynamically.The good performance of the proposed solution was evaluated by computer simulations.The simulation result shows that the proposed scheme can reduce the impact of nearly simultaneous access of a large number of MTC devices on human-to-human(H2H)devices,decrease the number of retransmissions and improve the access success rate effectively.…”
    Get full text
    Article
  3. 2343

    A Hybrid Algorithm of GA + Simplex Method in the WSN Localization by Feng Wang, Cong Wang, ZiZhong Wang, Xue-ying Zhang

    Published 2015-07-01
    “…In order to solve the large-error problem in the third phase and the poor position accuracy of the least square method in the weighted DV-Hop algorithm, a hybrid algorithm of GA + simplex method was proposed in this paper. …”
    Get full text
    Article
  4. 2344

    A Bursting Liability Evaluation Method Based on Energy Transfer by Yukun Hou, Shankun Zhao, Yang Zhao

    Published 2024-01-01
    “…This paper thus presents a method to evaluate the bursting liability as the product of the energy release ratio and energy transfer ratio and provides a definition for the energy transfer index. …”
    Get full text
    Article
  5. 2345

    PCI planning method based on genetic algorithm in LTE network by Panxing LI, Jing WANG

    Published 2016-03-01
    “…In order to avoid local optimum and the consumption on time and strength in traditional manual planning,an method of PCI planning based on genetic algorithm(GA-PCIAS)was proposed,the method took full consideration of the PCI planning principle,and the interference matrix was introduced to fitness function to reduce the interference in planned area.The simulation results in an dense area show that GA-PCIAS can improve RS-SINR (reference signal-signal to interference plus noise ratio)comparing with the classical sequential PCI allocation on small-scale base station.…”
    Get full text
    Article
  6. 2346

    A Perspective on Explainable Artificial Intelligence Methods: SHAP and LIME by Ahmed M. Salih, Zahra Raisi‐Estabragh, Ilaria Boscolo Galazzo, Petia Radeva, Steffen E. Petersen, Karim Lekadir, Gloria Menegaz

    Published 2025-01-01
    “…SHapley Additive exPlanations (SHAP) and Local Interpretable Model Agnostic Explanation (LIME) are two widely used XAI methods, particularly with tabular data. In this perspective piece, the way the explainability metrics of these two methods are generated is discussed and a framework for the interpretation of their outputs, highlighting their weaknesses and strengths is proposed. …”
    Get full text
    Article
  7. 2347

    Survey of channel estimation method in delay-Doppler domain for OTFS by Wang XING, Xiaogang TANG, Yiqing ZHOU, Chong ZHANG, Zhengang PAN

    Published 2022-12-01
    “…In order to provide reliable communication service for high-mobility scenarios, 6G can consider DD (delay-Doppler) domain based OTFS (orthogonal time frequency space) as its modulation scheme.By mapping the transmitted symbols onto DD domain and transforming them into TF (time-frequency) domain, OTFS endows all the transmitted symbols with the potential of capturing time-frequency full diversity, effectively improving the performance of communication in time-varying fading channels.Due to the superior properties of DD effective channel, the existing OTFS channel estimation methods were mostly carried out in DD domain.Considering the difference of implementation and application scenarios, existing DD channel estimation methods for OTFS were divided into three categories and overviewed, after which the challenges and potential solutions for current DD channel estimation methods were summarized and analyzed.…”
    Get full text
    Article
  8. 2348

    Location privacy-preserving method in LBS based on Voronoi division by AChun-guang M, HOUChang-li Z, ANGSong-tao Y, HAOYun-long Z

    Published 2015-05-01
    “…In view of low efficiency when the anonymous server faces a large number of users,a cooperative anonymous method is proposed for static and dynamic users respectively.Based on the Voronoi division of the global area,a central server organizes the users in its region to achieve cooperative anonymity,the server needn't construct anonymous region alone for each user,and the burden of the server is reduced.In view of providing actual location when users query from a LBS server,a decrease nearest neighbor query algorithm is proposed.A user's actual location is replaced with a stationary anchor location and gets the points of interest candidate set from the LBS server gradually.By running the algorithm,pre-cise results can be got and avoiding exposure to a user's location privacy.The algorithm can also help to reduce the possi-bility of location inference when the anchor chooses closely to the user.Experiments show that our method can guarantee the user's location privacy,and provide a good working efficiency.…”
    Get full text
    Article
  9. 2349
  10. 2350
  11. 2351
  12. 2352
  13. 2353

    Fine-grained privacy operation control method for layout documents by Peijie YIN, Fenghua LI, Ben NIU, Haiyang LUO, Bin KUANG, Lingcui ZHANG

    Published 2023-05-01
    “…In view of the problem of privacy information disclosure caused by uncontrolled forwarding in the context of frequent exchange of privacy information, a fine-grained privacy operation control method for layout documents was proposed, which could achieve differentiated fine-grained privacy operation control according to the requirements of the sharer during the sharing process of privacy information.For the received multimodal layout document, the existing privacy operation control strategy was extracted, which combined the current sharer’s use attribute and the receiver’s privacy protection ability and other factors.The privacy operation control strategy was generated iteratively, and an abstract control strategy generation algorithm framework was given.Based on the iterative privacy operation control strategy and combined with specific operation scenarios, the differentiated data-masking control, exchange boundary control and local use control were carried out for different modes of information components, and the abstract privacy operation control algorithm framework was given.A prototype system for privacy operation control of OFD (open fixed-layout document) was developed to verify the above algorithms.The generation and delivery of iterative privacy operation control strategy based on friendship, as well as the differential data-masking control, exchange boundary control and local use control of OFD were implemented in the instant messaging system.…”
    Get full text
    Article
  14. 2354

    Method for Identifying Abnormal Hot Spots on the Surface of Composite Insulators by LIU Yao

    Published 2024-12-01
    “…【Objective】To avoid the operational risk of high-voltage transmission lines caused by thermal faults of composite insulators, a method for identifying abnormal hot spots on the surface of composite insulators is studied.…”
    Get full text
    Article
  15. 2355
  16. 2356
  17. 2357

    Gear Fault Diagnosis Method Based on Deep Transfer Learning by Liu Shihao, Wang Xiyang, Gong Tingkai

    Published 2023-05-01
    “…Aiming at the problem of insufficient gear fault samples, a fault diagnosis method of transfer learning based on Hilbert-Huang spectrum and pre-trained VGG16 model is proposed. …”
    Get full text
    Article
  18. 2358
  19. 2359
  20. 2360

    Fourier Spectral Method for a Class of Nonlinear Schrödinger Models by Lei Zhang, Weihua Ou Yang, Xuan Liu, Haidong Qu

    Published 2021-01-01
    “…The Fourier spectral method is applied to approximate the spatial direction, and fourth order exponential time-differencing Runge-Kutta method is used to discrete temporal direction. …”
    Get full text
    Article