Showing 2,081 - 2,100 results of 2,140 for search 'constraints optimization problem', query time: 0.11s Refine Results
  1. 2081

    Energy-efficiency based buffer-aided relay selection scheme in SWIPT by Xinlong HONG, Xiaorong XU, Yingbiao YAO

    Published 2018-03-01
    “…Aiming at the problem of buffer-aided half-duplex (HD) relay selection in simultaneous wireless information and power transfer(SWIPT) with energy constraint,energy-efficiency priority based buffer-aided relay selection scheme in SWIPT was investigated.Moreover,SWIPT system energy efficiency was studied,and an appropriate mathematical model was constructed to perform energy efficiency based buffer-aided optimal receive/transmit relay selection in SWIPT.Numerical results show that the proposed scheme effectively reduces SWIPT outage probability and achieves the tradeoff between energy efficiency and outage performance in buffer-aided SWIPT.…”
    Get full text
    Article
  2. 2082

    New NOMA power allocation strategy by Yong CAO, Zhen YANG, You-hong FENG

    Published 2017-10-01
    “…Non-orthogonal multiple access(NOMA) has been widely used in the research of the fifth generation communication,due to the advantages of improving the spectrum efficiency and data rate.In order to guarantee the service of users,a new power allocation strategy was proposed to improve the fairness of users in the cell edge.According to the proportional fairness method,the goal was to maximize the proportionality fairness factor among the users with the least fairness in multiplexed users.The nonconvex objective function was transformed into convex function,and the optimal solution of problem was obtained by KKT optimal constraint condition.Simulation results show that the new NOMA-based power allocation strategy proposed outperforms the traditional orthogonal multiple access technology (OMA).…”
    Get full text
    Article
  3. 2083

    Research on Security Consensus for a Class of Delayed Discrete-time Multi-agent System by GAO Yanqiu, JI Lianghao, GAO Ting, YU Nanxiang

    Published 2020-01-01
    “…Under the constraint of a standard deviation from the expected value, a novel high tolerance security consensus algorithm is proposed, which adopts the neighbors’ delayed information sequence and its own information as well.Through the algorithm,an effective optimal information is selected as the control input, so that the systems can achieve secure consensus under the proposed conditions.The algorithm enhances the systems’ resistance ability to malicious agents, and reduces the topology connectivity requirements of the normal agents in the system. …”
    Get full text
    Article
  4. 2084

    Forward Sensitivity Approach to Dynamic Data Assimilation by S. Lakshmivarahan, J. M. Lewis

    Published 2010-01-01
    “…Model error is assumed to stem from incorrect specification of the control elements. The optimal corrections to control are found through solution to an inverse problem. …”
    Get full text
    Article
  5. 2085

    Organic Amendments Improve the Quality of Coal Gob Spoils: A Sustainable Mining Waste Reclamation Method by Zhiming Zhang, Anshuman Satpathy, Kirby Morris, Abhishek RoyChowdhury, Rupali Datta, Dibyendu Sarkar

    Published 2024-10-01
    “…Coal mine tailings can lead to a range of environmental problems, including toxic metal contamination, soil erosion, acid mine drainage, and increased salinity. …”
    Get full text
    Article
  6. 2086

    Vehicle Reidentification via Multifeature Hypergraph Fusion by Wang Li, Zhang Yong, Yuan Wei, Shi Hongxing

    Published 2021-01-01
    “…Vehicle reidentification refers to the mission of matching vehicles across nonoverlapping cameras, which is one of the critical problems of the intelligent transportation system. …”
    Get full text
    Article
  7. 2087

    Low error floor LT coding algorithm by using fixed-length node classification window by Xin SONG, Naiping CHENG, Shuyan NI, Yurong LIAO, Tuofeng LEI

    Published 2021-09-01
    “…To solve the problem of high error floor for LT codes in additive white Gaussian noise (AWGN) channels, an improved coding scheme was designed.A fixed-length classification window was used to sort out the information nodes with relatively small degrees.Then these nodes would be forced to participate in the coding process frequently, so that they could obtain sufficiently high reliability.To design the optimal parameters, firstly, the bit error rate (BER) performance of LT codes and the cause of the error floor were analyzed, and the theoretical BER lower bound was introduced as the first constraint.Secondly, the extrinsic information gain loss ratio (GLR) was designed to measure the convergence behavior of the improved LT code, and maximizing the GLR was denoted as the second constraint.Finally, the influence of different parameters on algorithm efficiency and coding complexity were analyzed, and the principle of priority selection of parameters was pointed out as the third constraint.The simulation results show that compared with the conventional LT code, the proposed algorithm can reduce the error floor by nearly three orders of magnitude.Besides, the designed LT code outperforms the existing LT codes in literature in terms of bit error rate (BER) performance.…”
    Get full text
    Article
  8. 2088

    Big data classification method of non relational distributed submission information under differentiated requirements by Lu HAN, Weiyu CHEN, Fei ZHANG, Jianfeng HE, Huaizhen SU

    Published 2023-06-01
    “…The classification method of non-relational distributed submitted information big data under the differentiated demand was studied, aiming at the problem of multi-source heterogeneous, widely distributed submitted information with more differentiated application requirements and inability to distinguish the available information.Firstly, the usability, openness and expansibility of the non-relational distributed submission information database were analyzed.The unstructured database storage TRIP was used to store non-relational distributed submission information by combining the basic requirements of field types.Then, the hashing process within the Hamming hash family was analyzed.Under the constraint of linearity level requirements, cellular automata with multiple attractors were used to optimize the system.The optimal parameters of the multiple attractor cellular automata classifier were improved through genetic algorithm, thus improving the big data classification method.Experimental results show that this method can effectively identify and classify structured data and unstructured data in non relational distributed submission information, and has high classification accuracy.…”
    Get full text
    Article
  9. 2089

    Multiple‐input multiple‐output with frequency diverse array radar transmit beamforming design for low‐probability‐of‐intercept in cluttered environments by Panke Jiang, Pengcheng Gong, Yuntao Wu, Xiong Deng

    Published 2022-09-01
    “…The idea of the transmit beamforming matrix design is to minimise the transmit power in a specific direction and simultaneously maximise the signal‐to‐interference‐plus‐noise ratio under the power constraint on each array element. To this end, a constrained multiple‐ratio fractional programming model with concerning the transmit beam matrix and the receive filter is first constructed, and then, it is transformed into two suboptimisation problems using a circular iterative approach. …”
    Get full text
    Article
  10. 2090

    Network Lifetime Maximization in Wireless Sensor Networks with a Path-Constrained Mobile Sink by Thong Huynh, Won-Joo Hwang

    Published 2015-11-01
    “…Wireless sensor networks with the mobile sink can help to prevent the hot-spot problem and improve the network lifetime. However, in practice, the trajectories of the sink can not ideally change due to the obstacle of the environment or the requirement of the application. …”
    Get full text
    Article
  11. 2091

    “A banana in the tailpipe”: a qualitative study of patient flow in the healthcare system by Mahnaz Samadbeik, Andrew Staib, Justin Boyle, Sankalp Khanna, Emma Bosley, Elizabeth McCourt, Daniel Bodnar, James Lind, Jodie A. Austin, Clair Sullivan

    Published 2025-05-01
    “…The capacity challenges involved inefficient resource allocation, resource constraints, and patient volume growth. The process challenges included bed management, modernization struggles, private hospital issues, funding model problems, information sharing gaps, coordination challenges, transition issues, particularly delayed discharges from inpatient wards, and problems in healthcare management and patient communication. …”
    Get full text
    Article
  12. 2092

    Analisis Kendala Potensial Penerapan Total Quality Management Hotel Plaza Semarang by Hendrajaya -

    Published 2011-03-01
    “…This study aims to determine the constraint factors and to analyze the potential problems of TQM implementation of Plaza Semarang Hotel. …”
    Get full text
    Article
  13. 2093

    A Search Method of NN Reducer’s Transmission Ratio by Yifei Lin, Honghua Zhao, Hongkai Wang, Yan Hu, shouyin Lu, Hui Zhang

    Published 2022-04-01
    “…An adaptive differential evolution algorithm is improved, and the forced intervention differential evolution algorithm based on the change of the optimal trait is proposed, which adjusts the mutation operator timely based on the change process of the optimal trait in each evolutionary period. …”
    Get full text
    Article
  14. 2094

    Behavioral Biases in Investor Decision-Making: A Comparative Meta-Analysis of Behavioral Finance Research by Seyed Amir Sabet, Saeed Aibaghi esfahani, Abdolmajid Abdolbaghi Ataabadi

    Published 2025-12-01
    “…Classical finance assumes a structured decision-making process comprising problem recognition, solution identification, alternative evaluation, and optimal choice selection, but empirical evidence reveals systematic irrationalities, which behavioral finance addresses by incorporating psychological perspectives to demonstrate how cognitive and emotional biases distort investor behavior. …”
    Get full text
    Article
  15. 2095

    A GNSS Anti-jamming Technology of UAV for Geological Hazard Monitoring by ZHANG Yonggang, ZHOU Chaorong, SHEN Feng

    Published 2024-06-01
    “…The extended steering vector is overlapped as the constraint of the optimal adaptive filtering criterion. …”
    Get full text
    Article
  16. 2096

    Presenting the conceptual model of organizational democracy with an emphasis on the development of employees' psychological capital by Sattar jahantabi neghad, Foad Makvandi, ezat allah Kiani, ghanbar Amirnegad, Vahid Chenari

    Published 2025-02-01
    “…Also, getting everyone's opinion in counseling sessions and using techniques such as brainstorming is effective in achieving optimal and effective models for the development of psychological capital.…”
    Get full text
    Article
  17. 2097

    A Novel Design of Hybrid Precoder in Multicell, Multiuser Heterogeneous Network by Mohammad Reza Pouryeganeh, Azim Fard, Mohammad Bagher Tavakoli

    Published 2022-01-01
    “…In this paper, the precoders capable of maximizing the weighted sum rate (WSR) for multicell scenarios under power budget constraint conditions per cell were considered based on the MIMO system performance. …”
    Get full text
    Article
  18. 2098

    Resource Scheduling with Uncertain Execution Time in Cloud Computing by LI Cheng-yan, CAO Ke-han, FENG Shi-xiang, SUN Wei

    Published 2019-02-01
    “…For the problem of cloud computing resource scheduling, based on the fuzzy programming theory, a fuzzy cloud resource scheduling model under timecost constraint was set up, the uncertain execution time of tasks is represented by the triangular fuzzy number, and the target is to minimize the average value and standard deviation of the evaluation function An improved chaotic ant colony algorithm was proposed to solve the model, the elitist strategy is introduced to optimize the pheromone updating, a chaotic mapping with infinite folding times is used for chaotic search, and the adaptive chaotic disturbance mechanism is designed to enhance the global searching ability The model and algorithm were tested on the Cloudsim platform, the reliability of the model was proved, and the experimental results showed that the proposed algorithm had better performance in convergence speed, solution ability and load balance…”
    Get full text
    Article
  19. 2099

    Factors influencing the effectiveness of SM-VCE method in solving 3D surface deformation by Xupeng Liu, Guangyu Xu, Mingkai Chen, Tengxu Zhang

    Published 2025-01-01
    “…As of now, there are two main types of methods for recovering coseismic 3D surface deformations: the first type is to solve the problem directly by using the least squares method based on observations from three or more viewpoints, and the second type solves the problem by combining ascending and descending InSAR line-of-sight (LOS) observations with constraint models. …”
    Get full text
    Article
  20. 2100

    Vertebra CT Image Segmentation Method Based on Improved U-Net Model by LIU Xia, YU Hong-bo, LI Bing, WANG Bo

    Published 2021-06-01
    “…Firstly,it was improved and optimized on the basis of the classic u-net model. …”
    Get full text
    Article