Showing 2,021 - 2,040 results of 2,140 for search 'constraints optimization problem', query time: 0.13s Refine Results
  1. 2021

    Osobno je političko u Ženskoj sobi Marilyn French by Borka Lekaj Lubina

    Published 2024-06-01
    “…Even though the novel shows that the personal becomes political in the emancipation of the heroine from the constraints of the female private sphere, the novel fails to convey the optimism of broader change in the depiction of Mira’s friends whose lives show that emancipation is a long and difficult journey indeed.Keywords: emancipation narratives, feminist Bildungsroman, The Women's Room, personal is political…”
    Get full text
    Article
  2. 2022

    Research on Chinese predicate head recognition based on Highway-BiLSTM network by Ruizhang HUANG, Wenfan JIN, Yanping CHEN, Yongbin QIN, Qinghua ZHENG

    Published 2021-01-01
    “…Aiming at the problem of difficult recognition and uniqueness of Chinese predicate head, a Highway-BiLSTM model was proposed.Firstly, multi-layer BiLSTM networks were used to capture multi-granular semantic dependence in a sentence.Then, a Highway network was adopted to alleviate the problem of gradient disappearance.Finally, the output path was optimized by a constraint layer which was designed to guarantee the uniqueness of predicate head.The experimental results show that the proposed method effectively improves the performance of predicate head recognition.…”
    Get full text
    Article
  3. 2023

    Secure data offloading strategy for multi-UAV wireless networks based on minimum energy consumption by Gaofeng CUI, Yuanyuan XU, Shanghong ZHANG, Weidong WANG

    Published 2021-05-01
    “…To solve the problems of ground passive eavesdropping when ground users offload data to the multi-UAV(unmanned aerial vehicle) edge computing network, a secure data offloading strategy that minimized system energy consumption by jointly optimizing user matching and resource allocation was proposed.Considering the constraints of system delay, communication resources and computing resources, the probability of security interruption was used to restrict the security performance of the data offload process.By using block coordinate descent and successive convex approximation algorithm, the user transmission power, offload factor, UAV computing resource allocation and jamming power were jointly optimized.A pair-wise stable user matching algorithm was proposed to minimize the total energy consumption of UAV system.Simulation results demonstrate that the algorithm can realize the safe offloading of data, and has good performance in energy consumption and delay by comparing with the conventional strategies.…”
    Get full text
    Article
  4. 2024

    Secure data offloading strategy for multi-UAV wireless networks based on minimum energy consumption by Gaofeng CUI, Yuanyuan XU, Shanghong ZHANG, Weidong WANG

    Published 2021-05-01
    “…To solve the problems of ground passive eavesdropping when ground users offload data to the multi-UAV(unmanned aerial vehicle) edge computing network, a secure data offloading strategy that minimized system energy consumption by jointly optimizing user matching and resource allocation was proposed.Considering the constraints of system delay, communication resources and computing resources, the probability of security interruption was used to restrict the security performance of the data offload process.By using block coordinate descent and successive convex approximation algorithm, the user transmission power, offload factor, UAV computing resource allocation and jamming power were jointly optimized.A pair-wise stable user matching algorithm was proposed to minimize the total energy consumption of UAV system.Simulation results demonstrate that the algorithm can realize the safe offloading of data, and has good performance in energy consumption and delay by comparing with the conventional strategies.…”
    Get full text
    Article
  5. 2025

    Design of Two-phase Slug Flow Microreactors Using Reduced Order Flow Model by Takaki Yamazaki, Keisuke Miyabayashi, Osamu Tonomura

    Published 2025-07-01
    “…The goal of this study is therefore to develop a model-based methodology for deriving optimal design and operating variables for SFMRs under constraints on production. …”
    Get full text
    Article
  6. 2026

    STUDI EVALUASI PELAKSANAAN DAN KELEMBAGAAN PELAKSANA PROGRAM BENGKULU REGIONAL DEVELOPMENT PROJECT (BRDP) by Nusril Nusril, M. Mustopa Romdhon, Indra Cahyadinata

    Published 2005-03-01
    “… This research aims to explores level of success, constraints and benefits of BRDP on rural poor  community. …”
    Get full text
    Article
  7. 2027

    Decarbonizing Aviation: A Comparative Analysis of Power-to-Liquid and Biomass-Derived Sustainable Fuels by Ren Sijie

    Published 2025-01-01
    “…While promising, PtL suffers from problems of energy inefficiency, production inefficiencies, and financial constraints. …”
    Get full text
    Article
  8. 2028

    Colored Multi-Agent Path Finding: Solving Approaches by Roman Barták, Marika Ivanová, Jiří Švancara

    Published 2021-04-01
    “…We also investigate methods for obtaining lower bounds on optimal solutions based on constraint and continuous relaxation techniques.…”
    Get full text
    Article
  9. 2029

    Coordinated beamforming for cognitive multi-cell networks with wiretap channels by Dong-hua CHEN, Xiu-xiu ZHANG, Wei-bo XIE

    Published 2014-11-01
    “…Owing to the coupling among the vectors to be optimized,the problem becomes non-convex and non-linear.Accordingly,a centralized coordinated beamforming design method was proposed by constraining the leakage interference and using the semi-definite relaxation,and on the base of it,a decentralized algorithm was also proposed by decomposing the centralized design problem into a group of sub-problems on each cell’s base by using dual decomposition.Simulation results show that the proposed schemes make effective reduction in power consumption while guarantee the legal users’ secrecy rate requirement and the cognitive interference constraint.Moreover,the proposed decentralized method not only reduces the computational complexity,but also has the same performance as the centralized algorithm.…”
    Get full text
    Article
  10. 2030

    Low-carbon operation strategy of AC/DC hybrid distribution network considering demand response and distributed robust game by XIAO Wenqiao, LIU Jichun

    Published 2025-03-01
    “…Column and constraint generation (CCG) algorithm is used to decompose the model into master-slave problems to solve the model. …”
    Get full text
    Article
  11. 2031

    Fault Tolerance of Oscillatory Neural Network: Device Oscillator-Based Small Network to Digital Oscillator-Based Large Networks by Sai Shubham, Nikhilesh Myanapuri, Siddharth Mohanty, Sandip Lashkare

    Published 2025-01-01
    “…This work illustrates the fault tolerance of the ONN in solving constraint optimization problems such as vertex coloring and digit recognition problems. …”
    Get full text
    Article
  12. 2032

    A balanced sensor scheduling for multitarget localization in a distributed multiple-input multiple-output radar network by Chenggang Wang, Zengfu Wang, Xiong Xu, Yuhang Hao

    Published 2021-07-01
    “…In this article, we consider the problem of optimally selecting a subset of transmitters from a transmitter set available to a multiple-input and multiple-output radar network. …”
    Get full text
    Article
  13. 2033

    Multi-User Task Offloading Strategy in RIS-Aided Multi-AP Mobile Edge Computing Networks by Wen Zhou, Ling Miao, Dan Deng, Min Hua, Dan Xiang, Chunguo Li

    Published 2025-01-01
    “…For the first link, the objective function and the latency constraint are relaxed to render the problem more tractable. …”
    Get full text
    Article
  14. 2034

    Physical layer security of MIMO wireless systems with adaptive modulation by Hui LI, Guangqiu LI, Yancui LUO, Huizhi LIU

    Published 2023-07-01
    “…To solve the problems of low spectral efficiency and poor performance of physical layer security (PLS) in single-input single-output (SISO) wireless systems with adaptive modulation in the presence of an active eavesdropper, multiple-input multiple-output (MIMO) wireless systems with secure adaptive modulation (SAM) were proposed.The design idea was to improve the spectral efficiency of the main channel by antenna diversity technology, which used the transmit antenna selection (TAS) at the transmitter and the maximal ratio combining (MRC) at the legitimate receiver to improve the signal-to-noise ratio.Simultaneously, the PLS of the legitimate receiver was guaranteed by limiting the bit error rate of the active eavesdropper so that it could not demodulate the confidential information from the main channel.With the joint constraints of the average transmission power and PLS, the optimal switching thresholds and the analytical expressions of spectral efficiency and the eavesdropper’s average bit error rate of the SAM-MIMO systems were derived.Numerical and simulation results show that SAM systems using TAS/MRC technology can not only improve the spectral efficiency of the main channel, but also ensure the PLS against the active eavesdropper, compared with the SAM-SISO systems.…”
    Get full text
    Article
  15. 2035

    Impact of blockchain technology on supply chain collaboration: A case study of JD Chain by Chen Zhirui

    Published 2024-01-01
    “…By leveraging distributed ledgers, consensus mechanisms, smart contracts, and cryptographic techniques, blockchain effectively tackles problems related to privacy protection, information traceability, and authenticity within traditional supply chains. …”
    Get full text
    Article
  16. 2036

    A Scalable Multi-Target Tracking Algorithm for Wireless Sensor Networks by Songhwai Oh

    Published 2012-09-01
    “…The proposed algorithm has been successfully applied to real-time multi-target tracking problems using wireless sensor networks.…”
    Get full text
    Article
  17. 2037
  18. 2038

    Delay and energy minimization for MEC-based secure communication by Pinyi REN, Qian XU

    Published 2020-11-01
    “…Considering a physical-layer-security-aided confidential document transmission problem,a secure transmission strategy was proposed where the base station equipped with a mobile edge computing (MEC) server served as a relay to help compress,forward,and decompress.First,the Poisson point process was used to calculate the secure transmission probability for the scenario with multiple potential eavesdroppers.Then,a delay and energy minimization problem was formulated under a constraint on the two-hop secure transmission probability.The optimal compression and decompression scheme was obtained using the one-dimensional search combined with linear programming.Simulation results show that the document compression is necessary for the link with small achievable secrecy rate under a given secure transmission probability; otherwise,the document should be directly transmitted without compression.…”
    Get full text
    Article
  19. 2039

    A location-dependent task assignment mechanism in vehicular crowdsensing by Lanlan Rui, Pan Zhang, Haoqiu Huang, Xuesong Qiu

    Published 2016-09-01
    “…To solve this challenge, we first establish mathematical model of multi-vehicle collaborative task assignment problem, considering vehicle’s time budget constraint, location, and multiple requirements of sensing tasks. …”
    Get full text
    Article
  20. 2040

    Propuesta de un modelo matemático para la optimización de la producción. Una aplicación en la industria ladrillera de San José Cúcuta by Jorge Andrés Silva Manchego, Wlamyr Palacios Alvarado, Álvaro Junior Caicedo Rolón

    Published 2023-01-01
    “…To this end, linear programming is being used to improve operational efficiency in the manufacturing of its products by finding optimal solutions to planning problems. To achieve optimal production, a linear programming mathematical model was used as a key optimization tool. …”
    Get full text
    Article