Showing 11,481 - 11,500 results of 23,860 for search 'Palyul~', query time: 1.95s Refine Results
  1. 11481

    Coverage scheduling algorithm of mobile sensor nodes for optimizing network lifetime by Haibo YANG, Yourong CHEN, Banteng LIU, Yunkai ZHU, Ziyi SU

    Published 2018-05-01
    “…In order to solve the coverage blind problem caused by deployment and failure of heterogeneous static sensor nodes,a coverage scheduling algorithm of mobile sensor nodes for optimizing network lifetime (CSA) was proposed.CSA considerd heterogeneous perceived radius of static sensor nodes and calculates the location of mobile sensor nodes based on the information of neighbor static sensor nodes.According to the location reported by static sensor nodes,coverage scheduling model was established.Heuristic solution method was proposed,to solve the scheduling model,and optimal location of mobile sensor nodes was obtained.The simulation results show that CSA can improve regional coverage and the number of survival static sensor nodes,improve network lifetime and reduce energy consumption of average static sensor nodes.Under certain conditions,CSA is better than Mno,MNode and MGrid algorithms.…”
    Get full text
    Article
  2. 11482

    Dynamic adaptive trust evaluation model based on interaction-aware by Feng LI, Li-min SHEN, Ya-li SI, Jing-chun NIU

    Published 2012-10-01
    “…A dynamic adaptive trust evaluation model was established based on interaction-aware.The historical interaction window and trustworthy recommendation number was introduced in overall trust evaluation method,which overcomes the shortage of traditional models that lack the capacity to interaction-aware.The direct trust accumulation method based on interaction satisfaction degree iterative calculation was proposed,which achieved the incentive and penalty iterative strategy based on entity stability factor,and effectively inhibits malicious entities with camouflage.A synthetical recommendation trust aggregating method based on combination of direct and indirect recommendation trust was given,which solved the accuracy low and unreliable problems of traditional recommendation methods by introducing entity familiarity factor and scoring similarity factor.Simulation results show that,compared to the existing trust model,the model can effectively improve the accuracy of trust evaluation,and can provide a better capacity of resisting collusive entities.…”
    Get full text
    Article
  3. 11483

    Characteristics of a New Plastic Explosive Named EPX-1 by Ahmed Elbeih

    Published 2015-01-01
    “…The detonation velocity was measured experimentally and the detonation characteristics were calculated by EXPLO5 thermodynamic code. For comparison, Semtex 1A, Semtex 10, Formex P1, and Sprängdeg m/46 were studied. …”
    Get full text
    Article
  4. 11484

    Flow Field Analysis of Spur Gear Meshing Period Under the State of Oil-immersion Lubrication by Zhou Yajie, Wang Bin, Ling Jianhui

    Published 2018-01-01
    “…The variation of oil splash and pressure on meshing point are analyzed under different speeds and directions of gear rotation,the gear resistance moment and the oil churning loss are calculated. The final results show that,under medium and low speed transmission condition,the change of gear rotating direction has greater influence on oil-pumping volume on the meshing area,oil-throwing volume of the outer circle of the gear,pressure on meshing points,and oil churning loss. …”
    Get full text
    Article
  5. 11485

    Financial Risk Avoidance Based on the Sensor Network and Edge Computing by Yong Yu, Xiaoguo Yin

    Published 2022-01-01
    “…Moreover, this paper divides the sensor data into several sliding windows according to the time series, analyzes the offset between the data object and other data in the sliding window by calculating the offset distance, and uses the abnormal level to indicate the possibility of data abnormality. …”
    Get full text
    Article
  6. 11486

    MANAGEMENT PERSONNEL – EFFIENCY AND EVALUATION by D. M. Trach, L. D. Melnichuk

    Published 2019-12-01
    “…For this purpose, it is necessary to develop methods for calculating the effectiveness of decisions and, accordingly, the system of financial incentives. …”
    Get full text
    Article
  7. 11487

    Study on Vibration Reduction Method by Gear Staggering Phase Tuning by Chen Gang, Wei Jing, Ju Guoqiang, Zhang Jiaxiong

    Published 2023-08-01
    “…In this study, a novel method of staggered tooth phase of gears is proposed, the meshing principle of staggered phase tuning gears is studied, the calculation formula of time-varying meshing stiffness of staggered phase tuning gears is derived, and the mapping relationship between staggered phase and vibration response is studied. …”
    Get full text
    Article
  8. 11488

    Network Selection Algorithm Based on Stable Matching Game in Vehicular Heterogeneous Network by Rui Zhang, Jing Hu, Weiwei Xia

    Published 2015-09-01
    “…Firstly, the corresponding weights were calculated by using AHP to obtain the satisfaction function, then, one-to-many two-sided matching problem was converted into one-to-one two-sided matching problem, and optimal matching results could be obtained by constructing the multi-objective optimization model under the condition of stable matching. …”
    Get full text
    Article
  9. 11489

    Estimation of Concentrations Parameters in the Model of Mixture with Varying Concentrations by Rostyslav Maiboroda, Vitaliy Miroshnychenko, Olena Sugakova

    Published 2025-01-01
    “…A fast algorithm for the LS estimator calculation is presented. EML and LS estimators are compared via simulations. …”
    Get full text
    Article
  10. 11490

    A hierarchical colored Petri net–based cyberattacks response strategy making approach for critical infrastructures by Qianxiang Zhu, Yuanqing Qin, Yue Zhao, Zhou Chunjie

    Published 2020-01-01
    “…In this approach, the relationships among cyberattacks, security measures, devices, functions, and station capacity are analyzed and described in a hierarchical way, and the system loss is calculated with the input of abnormal station capacities. …”
    Get full text
    Article
  11. 11491

    Design and Selection of Power Coupling Device for Electric Tractor by Shuyuan Li, Mengnan Liu, Liyou Xu

    Published 2021-05-01
    “…Then,the transmission characteristics of each scheme are compared and analyzed, and two better schemes are selected for power matching and parameter calculation. Based on Simulation X,the simulation model of the dual motor dynamic coupling device is built,the kinematics simulation analysis is carried out,and the final transmission scheme is optimized. …”
    Get full text
    Article
  12. 11492

    Three-dimensional spherical model based XML communication protocols security evaluation method by Hong-yu YANG, Jin-bo YU, Li-xia XIE

    Published 2013-03-01
    “…Thirdly, security components values of XML communication protocol were calculated in the aspects of XML's content, communication load and security vulne-rability. …”
    Get full text
    Article
  13. 11493

    Solution Method of Common Constraint of the Mechanism in the Modified G-K's Formula by Xu Zhaotang

    Published 2023-04-01
    “…In the calculation of mobility of the mechanism using the modified Grübler-Kutzbach's formula of mechanism mobility, the common constraint of the mechanism has to be solved. …”
    Get full text
    Article
  14. 11494

    A bidirectional authentication protocol for RFID based on Syn by Shanhua ZHAN, Shaorong HUANG

    Published 2018-12-01
    “…The RFID system is made up of three parts:tags,readers and databases.The information between tags and readers are transmitted through wireless channel,which is easy to be intercepted by attackers.A two-way authentication protocol based on word Synthesis operation was proposed.The two remainder theorem was used to encrypt communication messages by the proposed protocol,the difficulty of cracking was increased; In the process of each round of communication encryption,a random number was added to make the communication messages inconsistent,so that the tracking attacks could not be initiated by attackers.In the communication message encryption,the word synthesis algorithms was adopted at the same time,the total calculation of the system could be effectively reduced.A random checking mechanism was introduced at the database,enabling a synchronous attack and other attacks to be effectively resisted by the system.Security analysis shows that the protocol has high security,and performance analysis shows that the protocol has the standard of lightweight computation.…”
    Get full text
    Article
  15. 11495

    Real-time image matching for navigation system based on genetic algorithm by LENG Xue-fei1, LIU Jian-ye2, XIONG Zhi2

    Published 2008-01-01
    “…Moreover, the weighted Hausdorff distance algorithm based on bifurcations extraction and the corresponding weight formula was proposed. The calculation of matching search can be reduced and the accuracy of matching results can be improved by using the weighted Hausdorff distance as the fitness function of genetic algorithm. …”
    Get full text
    Article
  16. 11496

    Recovering and Improvement of the Ancient Chinese South-pointing Chariot by Liu Zhao, Yang Muhan, Ma Kaiyue, Hu Zhuanliang

    Published 2018-01-01
    “…To align error on the plane,a three dimensional checking calculation method is put forward. By monitoring the axle’s movement angle,south-pointing on the plane can be realized. …”
    Get full text
    Article
  17. 11497

    Methods of Forage Moisture Testing by Marcelo Wallau, Joao Vendramini

    Published 2019-07-01
    “… Determining forage moisture is an essential procedure for estimating forage mass in pastures, determining harvesting or baling point for preserved forages, and calculating dry matter of feedstuff for total mixed rations. …”
    Get full text
    Article
  18. 11498

    STUDY OF THE DIGITAL ECONOMY DEVELOPMENT: REGIONAL ASPECT by M. Yu. Teplyakova, M. D. Khabib

    Published 2020-06-01
    “…A comparative assessment of the composition and content of international and national indicators for assessing the development of the information society has been given. The calculation on the components of the information and communication technologies Development Index for each subject of the Russian Federation and the Federal districts has been made, as well as the analysis of variations in this Development Index for the constituent entities of the Russian Federation for 2014–2018 has been carried out.…”
    Get full text
    Article
  19. 11499

    RESEARCH ON THE THICK COMPOSITE LAMINATE BOLT JOINT STRENGTH by LIU Tong, XU XiWu, LIN ZhiYu

    Published 2017-01-01
    “…With this method,the failure process and the linking strength of single-lap,single-bolt joints were calculated. The results shows that the load-displacement curve by using global degradation model doesn’t degrade enough and the computing results are more accurate by using the partition degradation model. …”
    Get full text
    Article
  20. 11500

    Composite Fault Feature Extraction of Gearbox based on CPFs by Ye Meitao, Chai Huili

    Published 2018-01-01
    “…Then,the definition of multi-point kurtosis is introduced,and the fault feature period is extracted by calculating the multi-point kurtosis spectrum of each layer of PF,and the PF without periodic impact is eliminated. …”
    Get full text
    Article