Search alternatives:
whole » while (Expand Search)
Showing 381 - 400 results of 1,170 for search 'whole algorithm', query time: 0.10s Refine Results
  1. 381

    Piecewise Model and Parameter Obtainment of Governor Actuator in Turbine by Jie Zhao, Li Wang, Dichen Liu, Jun Wang

    Published 2015-01-01
    “…Several testing functions are selected to compare genetic algorithm and particle swarm optimization algorithm (GA-PSO) with other basic intelligence algorithms. …”
    Get full text
    Article
  2. 382

    Enhancement of underwater acoustic signal based on denoising automatic-encoder by Jingwei YIN, Wuxiong LUO, Li LI, Xiao HAN, Longxiang GUO, Jianfeng WANG

    Published 2019-10-01
    “…Aiming at the difficulty of feature extraction of echo signal in active sonar,a self-encoder algorithm based on the combination of denoising self-encoder and convolution denoising self-encoder was proposed.Firstly,the preprocessing of noisy signal was carried out by using the advantage of denoising self-encoder in signal as a whole,and then the local feature of signal was optimized by combining convolutional denoising self-encoder to denoise the signal locally,so as to enhance the signal.The time domain waveform of the received signal is used as the feature input by the algorithm,and retains the signal’s amplitude and phase characteristics.The experimental results show that the algorithm not only effectively reduces the noise component in the signal,but also achieves better recovery effect in both time and frequency domains.…”
    Get full text
    Article
  3. 383

    铰链四杆刚体导引机构综合的区间逃逸粒子群算法 by 易建, 何兵, 车林仙

    Published 2008-01-01
    “…The length of the bars is regarded as the restrict condition to obtain the unconstrained optimization model for rigid-body guidance approximate kinematc synthesis of hinged 4-bar linkages and this optimal problem is solved by means of the particle swarm optimization (PSO) algorithm. All approximate solutions of the mechanism is difficultly obtained,using directly the PSO algorithm to solve this problem in its whole space of solutions. …”
    Get full text
    Article
  4. 384

    Efficiency identity-based threshold group signature scheme by LIU Hong-wei 1, 2, XIE Wei-xin 2, YU Jian-ping 2

    Published 2009-01-01
    “…Threshold group signature was used to guarantee the security of the collective decision.To improve the efficiency,a new identity-based cryptography threshold group signature scheme was proposed basing on bilinear pairing and secret sharing.In this scheme,the master key was distributed into the whole group and the user’s signature key was stored in a threshold way,these methods ensured the whole security of signature systems.The scheme with a identity-based t-out-of-n secret sharing algorithm was highly-efficient.The careful analysis and the comparison of computational efficiency show that this scheme is secure and efficient.…”
    Get full text
    Article
  5. 385

    DACH: An Efficient and Reliable Way to Integrate WSN with IPv6 by Dequan Yang, Qiao Guo

    Published 2012-12-01
    “…Then we propose an adaptive cluster head selection algorithm which employs a strategy to choose the most suitable cluster heads; meantime, this selection algorithm is integrated into DACH. …”
    Get full text
    Article
  6. 386

    Resource allocation strategy based on optimal matching auction in the enterprise network by Xin CONG, Lingling ZI, Xueli SHEN

    Published 2019-08-01
    “…To address the issue that the owners of computer are selfish in the enterprise networks,which caused the low available number of resource nodes and low efficiency of resource allocation,an optimized matching resource allocation strategy OMRA was proposed and its core was the auction mechanism.Selfishness was restrained and the number of available resources was increased by OMRA,so as the operating efficiency of the whole auction market was improved.First,the initial prices were determined by normalizing the costs of different type of resources on the beginning of auction.Secondly,an optimal matching auction algorithm was designed to maximize the interests of the auction markets.Then,service perfecting algorithm was performed such that the sellers could get more services at the current transaction value,thus ensuring the benefits of resource providers.At last,a request price updating algorithm was adopted to assurance that both sellers and buyers could get priorities in the next auction processing.Compared with the cloud resource allocating algorithm via fitness-enabled auction (CRAA/FA),the experiment results indicate that the efficiency of resource allocation improves by 10% and the benefits of market increase by 11.4%.…”
    Get full text
    Article
  7. 387

    Twenty First Century’s Challenges, Changing Trends and Urdu Novel: A Critical Analysis by Mehroona Leghari

    Published 2022-09-01
    “…The individual of this Century suffers from duality/binary opposition where he is in an isolation/alone but not in the previous sense as he is at the same time sitting in middle of the whole world. This Mob, not his family, but the whole world has gathered at his fingertips, Man has begun to travel for centuries in minutes and seconds.Youval Noh Hariri a Nobel Prize winner philosopher of new era says man has been hacked by his own discovered biotechnology and information technology. …”
    Get full text
    Article
  8. 388

    Research on Discrete Dynamic System Modeling of Vocal Performance Teaching Platform Based on Big Data Environment by Xiaohui Gong

    Published 2022-01-01
    “…The collection of data and information is realized from the aspects of students’ class state, vocal music examination results, classroom interaction, etc., and the comprehensive analysis is carried out using the deep recursive neural network algorithm, to realize the multiple analysis and objective evaluation of the whole process of different teaching modes of national vocal music in music colleges and universities, according to the different characteristics and teaching objectives of the teaching process of national vocal music in music colleges and universities The standard requires accurate analysis and evaluation. …”
    Get full text
    Article
  9. 389

    Trail-Using Ant Behavior Based Energy-Efficient Routing Protocol in Wireless Sensor Networks by Soon-gyo Jung, Byungseok Kang, Sanggil Yeoum, Hyunseung Choo

    Published 2016-04-01
    “…By employing the behaviors, the protocol establishes and manages the routing trails energy efficiently in the whole network. Simulation results show that the proposed protocol has low communication overhead and reduces up to 55% energy consumption compared to the existing ACO algorithm.…”
    Get full text
    Article
  10. 390

    Modeling and Evolutionary Optimization on Multilevel Production Scheduling: A Case Study by Ruifeng Shi, Chunxia Shangguan, Hong Zhou

    Published 2010-01-01
    “…An integrated model, which can cope with the whole multilevel scheduling information simultaneously, is proposed in this paper, and a specific evolutionary algorithm is designed to solve the integrated model with a twin-screw coding strategy. …”
    Get full text
    Article
  11. 391

    Next generation network resource allocation method based on cooperative game and decision-making in advance by RAO Xiang, ZHANG Shun-yi, SUN Yan-fei, DING Wen-tao

    Published 2009-01-01
    “…It’s an important way to guarantee QoS for the next generation network(NGN) with diverse services by allo-cating resources reasonably and optimizing the efficiency of whole network according to diverse service styles.A net-work resource allocating method based on co-operative game theory for NGN was proposed and analyzed,and it had a weakness which brought about overgreat system costing.In order to overcome this weakness,an idea about deci-sion-making in advance was added,and an improved resource allocation algorithm was proposed,which could guarantee the efficiency of whole network best and reduce the system costing.Simulation results of this method show its validity.…”
    Get full text
    Article
  12. 392

    Artificial Intelligent Techniques with Watermarking by Nada Saleem, Baydaa Khaleel, Shahbaa Khaleel

    Published 2009-07-01
    “…The second developed <em>(RBFW)</em> algorithm used <em>RBF</em> neural network for embedding and extracting of watermark based on intensity of whole image. …”
    Get full text
    Article
  13. 393

    A Multicast Routing Protocol with Pruning and Energy Balancing for Wireless Sensor Networks by Juhua Pu, Xiaolan Tang, Fengkun Wang, Zhang Xiong

    Published 2012-09-01
    “…Energy balancing algorithm protects nodes with low power from running out of energy and dying out, and thus it can balance total energy consumption of the whole network and prolong the network lifetime. …”
    Get full text
    Article
  14. 394

    Biobanking in the hospital of a multidisciplinary research medical center as a potential for a wide research range. Part I. Organizational and methodological aspects by A. I. Borisova, O. V. Kopylova, M. S. Pokrovskaya, I. A. Efimova, A. V. Pustelenin, А. I. Ershova, O. M. Drapkina

    Published 2023-12-01
    “…Aim. To develop an algorithm and manage total biobanking of samples of whole blood, serum and plasma of patients in the hospital of the National Medical Research Center for Therapy and Preventive Medicine in order to create a detailed biosample collection through the integration of electronic medical records and a biobank database.Material and methods. …”
    Get full text
    Article
  15. 395

    Next generation network resource allocation method based on cooperative game and decision-making in advance by RAO Xiang, ZHANG Shun-yi, SUN Yan-fei, DING Wen-tao

    Published 2009-01-01
    “…It’s an important way to guarantee QoS for the next generation network(NGN) with diverse services by allo-cating resources reasonably and optimizing the efficiency of whole network according to diverse service styles.A net-work resource allocating method based on co-operative game theory for NGN was proposed and analyzed,and it had a weakness which brought about overgreat system costing.In order to overcome this weakness,an idea about deci-sion-making in advance was added,and an improved resource allocation algorithm was proposed,which could guarantee the efficiency of whole network best and reduce the system costing.Simulation results of this method show its validity.…”
    Get full text
    Article
  16. 396

    Rolling Bearing Remaining Useful Life Prognosis Method based on Improved CHSMM by Zhu Shuo, Bai Ruilin, Ji Feng

    Published 2018-01-01
    “…A rolling bearing remaining useful life prognostics method based on improved Continuous hidden semi-Markov model( CHSMM) is proposed,aiming at the problem that the CHSMM algorithm prognostics accuracy is low for remaining useful life of rolling bearings. …”
    Get full text
    Article
  17. 397

    Energy Management Strategy Based on the Driving Cycle Model for Plugin Hybrid Electric Vehicles by Xiaoling Fu, Huixuan Wang, Naxin Cui, Chenghui Zhang

    Published 2014-01-01
    “…The state of charge (SOC) profile can be obtained by the DP algorithm for the whole driving cycle. In order to optimize the energy management strategy in the hybrid power system, the optimal motor torque control sequence can be calculated using the DP algorithm for the segments between the traffic intersections. …”
    Get full text
    Article
  18. 398

    A New Privacy-Preserving Scheme for Continuous Query in Location-Based Social Networking Services by Eric Ke Wang, Yunming Ye

    Published 2014-05-01
    “…In this paper, we analyze the existing location privacy protection systems and algorithms for location based services; considering their disadvantages of slow responding time and high anonymization costs, we propose a new enhanced greedy cloaking algorithm which predicts a cloaking area at the initial query to be the cloaking region in the whole query lifetime by the comprehensive computation of privacy monitor, quality monitor, and dynamic adjuster. …”
    Get full text
    Article
  19. 399

    A Hierarchical Children’s Dance Movement Pose Estimation Method Based on Sequence Multiscale Feature Fusion Representation by Yanan Qin, Tao Huang, Guanzhen Tang

    Published 2022-01-01
    “…By comparing the pose feature extraction algorithm with the actual recognition effect, the recognition rates of the dancer’s upper body, infiltration, and whole body have increased by 14.2, 10.6, and 12.6, respectively. …”
    Get full text
    Article
  20. 400

    The mine locomotive wireless network strategy based on successive interference cancellation with dynamic power control by Lei Shi, Yu Gao, Zhenchun Wei, Xu Ding, Yi Shi

    Published 2017-05-01
    “…Based on this concept, we propose a polynomial complexity algorithm named max-SIC-set algorithm. Simulation results show that our algorithm can increase throughput significantly compared with the algorithm using successive interference cancellation only (no power control) and with the algorithm without using successive interference cancellation and power control.…”
    Get full text
    Article