Suggested Topics within your search.
Suggested Topics within your search.
-
12681
Optimal Mobile Sensor Scheduling for a Guaranteed Coverage Ratio in Hybrid Wireless Sensor Networks
Published 2013-04-01Get full text
Article -
12682
-
12683
METHODOLOGICAL BASIS FOR ESTIMATING THE LIFE CYCLE COST OF AIRCRAFT ENGINE, TAKING INTO ACCOUNT THE ATTENDANT RISKS
Published 2020-03-01“…The formation and development of the main areas of technical and economic research in the field of aircraft engine building have been considered. …”
Get full text
Article -
12684
Robust Performance Assessment of Control Systems with Root Contours Analysis
Published 2025-06-01“…Sometimes, there is no possibility for the rapid implementation of a new control algorithm, and the designer only has access to the current tuning of the introduced parameters. …”
Get full text
Article -
12685
Match Stability with a Costly and Flexible Number of Positions
Published 2025-05-01“…To address this issue, we propose an algorithm that generates both stable and slot-stable matches by using flexible, endogenous quotas.…”
Get full text
Article -
12686
DETERMINATION OF TECHNOLOGY OF MANUFACTURE AND MARK OF MINERAL TRANSFORMER OILS BY THEIR OPTICAL SPECTRA
Published 2018-03-01Get full text
Article -
12687
Going to Business or Intending in Science?
Published 2020-10-01“…A mathematical model and an algorithm for simulating the demonstrated situation are developed. …”
Get full text
Article -
12688
Design of multi-key encryption method
Published 2020-11-01“…In order to improve the security in the process of information transmission,the current encryption methods were studied,and the research status was reported which increased the security of encryption by processing the key.According to the principle of segmenting and grouping data in the process of sending and encrypting,a method of multi-key encryption was designed:the segmenting key group and grouping key group were generated by the source key and random number,and the corresponding key was selected for each segmented and grouped data by its sequence number according to the matching algorithm.This method realized the encryption of multi-key in the process of information transmission.Finally,on the one hand,MATLAB was used to test and verify the encryption efficiency of this method.On the other hand,the security of this method was analyzed from the theoretical and mathematical perspective,comparing with the traditional method.It is concluded that this method can increase the security of the traditional method without too much cost much cost.…”
Get full text
Article -
12689
Design and Implementation of High Frequency Broadband Gbit/s System Based on MIMO-OFDM
Published 2014-06-01“…Spectrum bands below 6 GHz have been crowded currently,but demand for high speed wireless communication in low speed environment is growing.Research and development of high-frequency wireless communication system is an important way to alleviate this problem.System structure for high frequency broadband communication was proposed.Physical layer key algorithm such as synchronization,channel estimation and MIMO detection was described briefly.The high frequency broadband Gbit/s system based on MIMO-OFDM was implemented on FPGA based hardware platform.Bandwidth and data rate of the system was tested in indoor environment.Test result shows that performance of the system conforms to design requirements.…”
Get full text
Article -
12690
Analysis of the Application Prospect of Computer Image Processing Technology in UI Design
Published 2022-01-01“…Moreover, this paper has carried out deep research on coordinate transformation and image interpolation and stored the result of coordinate transformation in the coordinate transformation table and weight table. …”
Get full text
Article -
12691
Iterative Inversion of Normal and Lateral Resistivity Logs in Thin-Bedded Rock Formations of the Polish Carpathians
Published 2025-06-01“…The proposed iterative inversion procedure combines a finite element method forward modeling procedure with a particle swarm optimization algorithm to generate high-resolution models of the rock formation. …”
Get full text
Article -
12692
Fault Diagnosis of Vehicle Gearbox based on Support Vector Machine Optimized by Improved Beetle Antennae Search
Published 2022-05-01“…Aiming at the fact that the performance of support vector machine (SVM) in vehicle gearbox fault diagnosis is greatly affected by parameters,a new method of vehicle gearbox fault diagnosis based on improved SVM is proposed based on the research of beetle antennae search (BAS). Compared with BAS,IBAS modified the step size formula and added Gaussian variation behavior,so that the search ability of the algorithm in the early and late period is balanced and has the ability to jump out of the local optimal,and better SVM parameters could be obtained. …”
Get full text
Article -
12693
VNE-AFS:virtual network embedding based on artificial fish swarm
Published 2012-09-01“…Recently virtual network embedding problem had been proposed as a research challenge in the cloud computing environment.In order to reduce the costs,a virtual network embedding algorithms based on artificial fish swarm(VNE-AFS)was proposed.A binary combinatorial optimization model was built according to the constraints on nodes and links between virtual network and substrate network,and the artificial fish swarm algorithm was used to achieve the approximate optimal mapping.The simulation results indicate that the costs of substrate network and computation time are reduced and the success rate,average revenue of embedding and average usage of links are increased compared with the existing virtual network embedding algorithms.…”
Get full text
Article -
12694
College Information Education Management Relying on Interactive Multimedia Teaching Mode
Published 2022-01-01“…Moreover, with the support of intelligent algorithms, this paper constructs a college teaching information management system based on interactive multimedia teaching mode. …”
Get full text
Article -
12695
Pengamanan Dokumen Digital Perusahaan Menggunakan Metode Least Significant Bit (LSB) Dan Algoritma RC4 Stream Chipher
Published 2022-03-01“…The purpose of this study is to provide maximum security for company digital documents, using the Least Significant Bit (LSB) steganography method and the RC4 stream cipher cryptographic algorithm. The expected result of this research is to produce an application that can secure the company's digital documents…”
Get full text
Article -
12696
DESIGNING OF INDIVIDUAL EDUCATIONAL TRAJECTORIES IN THE MASTER DEGREE PROGRAM FOR TEACHERS
Published 2022-05-01“…Individualization is considered as a subject of interdisciplinary research. A comparative analysis of existing theoretical concepts, modern didactic principles is carried out. …”
Get full text
Article -
12697
Cwebs in multiparton scattering amplitude: Structures at four loops
Published 2024-01-01Get full text
Article -
12698
GA optimization on single-chamber muffler hybridized with extended tube under space constraints
Published 2004-01-01Get full text
Article -
12699
-
12700