Showing 12,681 - 12,700 results of 25,328 for search 'research algorithm', query time: 0.19s Refine Results
  1. 12681
  2. 12682
  3. 12683

    METHODOLOGICAL BASIS FOR ESTIMATING THE LIFE CYCLE COST OF AIRCRAFT ENGINE, TAKING INTO ACCOUNT THE ATTENDANT RISKS by E. A. Ozdoeva, O. A. Smolyakov

    Published 2020-03-01
    “…The formation and development of the main areas of technical and economic research in the field of aircraft engine building have been considered. …”
    Get full text
    Article
  4. 12684

    Robust Performance Assessment of Control Systems with Root Contours Analysis by Karlova-Sergieva Vesela

    Published 2025-06-01
    “…Sometimes, there is no possibility for the rapid implementation of a new control algorithm, and the designer only has access to the current tuning of the introduced parameters. …”
    Get full text
    Article
  5. 12685

    Match Stability with a Costly and Flexible Number of Positions by James Gilmore, David Porter

    Published 2025-05-01
    “…To address this issue, we propose an algorithm that generates both stable and slot-stable matches by using flexible, endogenous quotas.…”
    Get full text
    Article
  6. 12686
  7. 12687

    Going to Business or Intending in Science? by R. S. Rogulin

    Published 2020-10-01
    “…A mathematical model and an algorithm for simulating the demonstrated situation are developed. …”
    Get full text
    Article
  8. 12688

    Design of multi-key encryption method by Yuqing ZHONG, Hao WANG, Zebing LIN, Min WANG, Liye CHEN

    Published 2020-11-01
    “…In order to improve the security in the process of information transmission,the current encryption methods were studied,and the research status was reported which increased the security of encryption by processing the key.According to the principle of segmenting and grouping data in the process of sending and encrypting,a method of multi-key encryption was designed:the segmenting key group and grouping key group were generated by the source key and random number,and the corresponding key was selected for each segmented and grouped data by its sequence number according to the matching algorithm.This method realized the encryption of multi-key in the process of information transmission.Finally,on the one hand,MATLAB was used to test and verify the encryption efficiency of this method.On the other hand,the security of this method was analyzed from the theoretical and mathematical perspective,comparing with the traditional method.It is concluded that this method can increase the security of the traditional method without too much cost much cost.…”
    Get full text
    Article
  9. 12689

    Design and Implementation of High Frequency Broadband Gbit/s System Based on MIMO-OFDM by Junyu Peng, Sunzeng Cai, Zhenghang Zhu, Jing Xu, Ting Zhou

    Published 2014-06-01
    “…Spectrum bands below 6 GHz have been crowded currently,but demand for high speed wireless communication in low speed environment is growing.Research and development of high-frequency wireless communication system is an important way to alleviate this problem.System structure for high frequency broadband communication was proposed.Physical layer key algorithm such as synchronization,channel estimation and MIMO detection was described briefly.The high frequency broadband Gbit/s system based on MIMO-OFDM was implemented on FPGA based hardware platform.Bandwidth and data rate of the system was tested in indoor environment.Test result shows that performance of the system conforms to design requirements.…”
    Get full text
    Article
  10. 12690

    Analysis of the Application Prospect of Computer Image Processing Technology in UI Design by Guofeng Ma, Junhong Yang

    Published 2022-01-01
    “…Moreover, this paper has carried out deep research on coordinate transformation and image interpolation and stored the result of coordinate transformation in the coordinate transformation table and weight table. …”
    Get full text
    Article
  11. 12691

    Iterative Inversion of Normal and Lateral Resistivity Logs in Thin-Bedded Rock Formations of the Polish Carpathians by Michał Wilkosz

    Published 2025-06-01
    “…The proposed iterative inversion procedure combines a finite element method forward modeling procedure with a particle swarm optimization algorithm to generate high-resolution models of the rock formation. …”
    Get full text
    Article
  12. 12692

    Fault Diagnosis of Vehicle Gearbox based on Support Vector Machine Optimized by Improved Beetle Antennae Search by Wenshan Qiao, Jin Hua, Meihong Chen

    Published 2022-05-01
    “…Aiming at the fact that the performance of support vector machine (SVM) in vehicle gearbox fault diagnosis is greatly affected by parameters,a new method of vehicle gearbox fault diagnosis based on improved SVM is proposed based on the research of beetle antennae search (BAS). Compared with BAS,IBAS modified the step size formula and added Gaussian variation behavior,so that the search ability of the algorithm in the early and late period is balanced and has the ability to jump out of the local optimal,and better SVM parameters could be obtained. …”
    Get full text
    Article
  13. 12693

    VNE-AFS:virtual network embedding based on artificial fish swarm by Qiang ZHU, Hui-qiang WANG, Hong-wu LV, Zhen-dong WANG

    Published 2012-09-01
    “…Recently virtual network embedding problem had been proposed as a research challenge in the cloud computing environment.In order to reduce the costs,a virtual network embedding algorithms based on artificial fish swarm(VNE-AFS)was proposed.A binary combinatorial optimization model was built according to the constraints on nodes and links between virtual network and substrate network,and the artificial fish swarm algorithm was used to achieve the approximate optimal mapping.The simulation results indicate that the costs of substrate network and computation time are reduced and the success rate,average revenue of embedding and average usage of links are increased compared with the existing virtual network embedding algorithms.…”
    Get full text
    Article
  14. 12694

    College Information Education Management Relying on Interactive Multimedia Teaching Mode by Ruicheng Li

    Published 2022-01-01
    “…Moreover, with the support of intelligent algorithms, this paper constructs a college teaching information management system based on interactive multimedia teaching mode. …”
    Get full text
    Article
  15. 12695

    Pengamanan Dokumen Digital Perusahaan Menggunakan Metode Least Significant Bit (LSB) Dan Algoritma RC4 Stream Chipher by Handa Gustiawan, Hesti Rian

    Published 2022-03-01
    “…The purpose of this study is to provide maximum security for company digital documents, using the Least Significant Bit (LSB) steganography method and the RC4 stream cipher cryptographic algorithm. The expected result of this research is to produce an application that can secure the company's digital documents…”
    Get full text
    Article
  16. 12696

    DESIGNING OF INDIVIDUAL EDUCATIONAL TRAJECTORIES IN THE MASTER DEGREE PROGRAM FOR TEACHERS by Irina Igropulo, Alina Dunaenko

    Published 2022-05-01
    “…Individualization is considered as a subject of interdisciplinary research. A comparative analysis of existing theoretical concepts, modern didactic principles is carried out. …”
    Get full text
    Article
  17. 12697
  18. 12698
  19. 12699
  20. 12700