Showing 11,701 - 11,720 results of 19,511 for search '"Algorithm"', query time: 0.11s Refine Results
  1. 11701

    Achieving Network Localizability in Nonlocalizable WSN with Moving Passive Event by Xiaolei Zhou, Deke Guo, Tao Chen, Xueshan Luo

    Published 2013-10-01
    “…We design a corresponding algorithm in distributed manner for the implementation of our approach. …”
    Get full text
    Article
  2. 11702

    Robust Adaptive Stabilization of Linear Time-Invariant Dynamic Systems by Using Fractional-Order Holds and Multirate Sampling Controls by S. Alonso-Quesada, M. De la Sen

    Published 2010-01-01
    “…A dead zone is included in the parameters estimation algorithm for robustness purposes under the presence of unmodeled dynamics in the controlled dynamic system. …”
    Get full text
    Article
  3. 11703

    Texture mapping of warp knitted shoe upper based on ARAP parameterization method by Guilong Cheng, Aijun Zhang, Yanting Zhang

    Published 2025-01-01
    “…Additionally, discrete harmonic and parametric optimization unfolding algorithms are employed to enhance texture mapping quality. …”
    Get full text
    Article
  4. 11704

    Day-to-Day Traffic Assignment Model considering Information Fusion and Dynamic Route Adjustment Ratio by Manman Li, Jian Lu, Jiahui Sun

    Published 2020-01-01
    “…Through theoretical analyses, we investigate the existence of its fixed point and the influence factors of uniqueness of the fixed point. An iterative-based algorithm that can solve the fixed point is also given. …”
    Get full text
    Article
  5. 11705

    Application of the Moment Of Inertia method to the Critical-Plane Approach by Hao Wu, Marco Antonio Meggiolaro, Jaime Tupiassú Pinho de Castro

    Published 2016-10-01
    “…An efficient computer code with the shear-shear version of the MOI algorithm is also provided in this work…”
    Get full text
    Article
  6. 11706

    Optimization Design and Experimental Study of Low-Pressure Axial Fan with Forward-Skewed Blades by Li Yang, Ouyang Hua, Du Zhao-Hui

    Published 2007-01-01
    “…Using back propagation (BP) neural network and genetic algorithm (GA), the optimization was performed for a radial blade. …”
    Get full text
    Article
  7. 11707

    A Novel Online Portfolio Selection Strategy with Multiperiodical Asymmetric Mean Reversion by Zijin Peng, Weijun Xu, Hongyi Li

    Published 2020-01-01
    “…The MAMR strategy incorporates a multipiecewise loss function with the moving average method and then imitates the passive-aggressive algorithm. We further provide a solution via convex optimization. …”
    Get full text
    Article
  8. 11708

    Spectrum resource allocation method of maximizing transmission rate in cognitive heterogeneous wireless networks by Xiaoqing DONG, Lianglun CHENG, Gengzhong ZHENG, Tao WANG

    Published 2019-09-01
    “…Aiming at the problem that it is difficult to allocate spectrum resources to secondary users efficiently in cognitive heterogeneous wireless networks with heterogeneous spectrum attributes,dynamic channel conditions and diverse service requirements,a spectrum resource allocation strategy with maximum transmission rate was proposed.Firstly,the strategy aimed at maximizing the total transmission rate,and constrained the limited spectrum resources and user service requirements to construct a non-linear multi-constrained spectrum resource allocation 0-1 planning model.Then a polynomial time complexity simplification method was designed.According to idle spectrum information,channel conditions,business requirements and allocation decision history information,and the benefit matrix was constructed and modified to achieve constraint simplification,and the execution efficiency was improved by improving the coefficient matrix transformation strategy of the traditional Hungarian algorithm.Finally,the performance of the method was compared and analyzed by experiments.Experimental results show that the proposed method has higher transmission rate and execution efficiency.…”
    Get full text
    Article
  9. 11709

    Multiobjective Day-Ahead Scheduling of Reconfigurable-Based Microgrids Through Electric Vehicles and Demand Response Integration by Ali Mirzaei, Navid Taghizadegan Kalantari, Sajad Najafi Ravadanegh

    Published 2025-01-01
    “…Because of these two compromising objectives, the evolutionary multiobjective seagull optimization algorithm is utilized to find the best local solutions. …”
    Get full text
    Article
  10. 11710

    PoSW:novel secure deduplication scheme for collaborative cloud applications by Jin-bo XIONG, Su-ping LI, Yuan-yuan ZHANG, Xuan LI, EA-yong Y, Zhi-qiang YAO

    Published 2017-07-01
    “…In order to solve the problems of secure access and deduplication to the shared file in the cloud environment,a novel notion called proof of shared ownership (PoSW) was formalized,and a formal definition of the PoSW was given.Furthermore,a PoSW scheme and an enhanced version of that were proposed.In the PoSW scheme,secure shared file dispersal,convergent encryption and secret sharing algorithm were employed to transform the shared file realize the sharing and authorization for the shared file,and then a novel challenge-response protocol was proposed to achieve the proof of shared ownership and the foundation for the secure deduplication of the shared file was provided.An enhanced PoSW scheme was designed to improve the availability and reliability for different kinds of the shared files by introducing the multi-cloud server providers and using the strategies of both data duplication and secret file dispersal.Security analysis and performance evaluation show the security and efficiency of the proposed scheme.…”
    Get full text
    Article
  11. 11711

    Combined encryption method for CAN bus data based on periodic coupled processing by Wutao QIN, Peng WANG, Yufeng LI

    Published 2023-01-01
    “…In the intelligent connected age, CAN bus transmission faces the urgent demand of light weighted security encryption.Based on this, a fast response and high security CAN bus data encryption method was proposed.Since the 64 bit CAN packets were sent periodically, an online-offline block encryption algorithm coupled with message transmission cycle was proposed.In offline phase, the dynamic session key was generated by using advanced encryption standard.In online phase, the dynamic session key was used to quickly respond to encryption and decryption requests.The online computation delay was greatly reduced by the pre-encryption computation in offline phase, which helped achieving low latency and lightweight computation.At the same time, the ciphertext policy attribute based encryption was used to encrypt the block cipher.The access control policy made by the data sending OBU ensures that only the target OBU can decrypt the block cipher, so as to achieve targeted encryption.…”
    Get full text
    Article
  12. 11712

    RELIABILITY ANALYSIS OF REACTION FORCE DEVELOPED IN THE LUBRICATED REVOLUTE JOINT FOR A SLIDER-CRANK SYSTEM INCLUDING JOINT WITH CLEARANCE AND LUBRICATION by ZHAO Kuan, XUE He, CHEN JianJun, QIAO XinZhou

    Published 2017-01-01
    “…In order to overcome this limitation,the parameters are pretreated through Genetic Algorithm to get the optimum parameters values. Then approximate function relation between random parameters and performance function is derived and the reliability of the reaction force developed in the lubricated revolute joint of the crank-slider mechanism is discussed by Monte-Carlo method. …”
    Get full text
    Article
  13. 11713

    ATKB-PID: an adaptive control method for micro tension under complex hot rolling conditions by Xinkai Xu, Xiangrong Song, Zheng Qi

    Published 2025-01-01
    “…This method incorporates a linear attention layer and utilizes a K-Nearest Neighbors (KNN) algorithm to predict the optimal learning rate and inertia coefficient under actual operating conditions. …”
    Get full text
    Article
  14. 11714

    Systems Thinking Safety Analysis: Nuclear Security Assessment of Physical Protection System in Nuclear Power Plants by Tae Ho Woo

    Published 2013-01-01
    “…The systems thinking algorithm is used for the quantifications by the Vensim software package. …”
    Get full text
    Article
  15. 11715

    Design and Implementation of a New Fast and Efficient MPPT Controller under Different Solar Irradiance Conditions by K. Padmanaban, A. Shunmugalatha, M. S. Kamalesh

    Published 2022-01-01
    “…The power-voltage (P-V) characteristic curve of solar photovoltaic (PV) systems operating in partial shading conditions (PSC) is nonlinear and has multiple local maximum peak power (LMPP) points, rendering many of the maximum power point tracking (MPPT) algorithms ineffective at locating global maximum peak power (GMPP) points. …”
    Get full text
    Article
  16. 11716

    Basins of Convergence in a Multi-Perturbed CR3BP by Alicia Herrero, Santiago Moll-Lopez, José-A. Moraño, Erika Vega-Fleitas, Daniel Villalibre

    Published 2024-12-01
    “…The Newton–Raphson methodis used to implement a searching algorithm. Finally, an application to the Sun–Mars system including the presence of Phobos and Deimos is developed.…”
    Get full text
    Article
  17. 11717

    Design of Large Thinned Arrays Using Different Biogeography-Based Optimization Migration Models by Sotirios K. Goudos, John N. Sahalos

    Published 2016-01-01
    “…Array thinning is a common discrete-valued combinatorial optimization problem. Evolutionary algorithms are suitable techniques for above-mentioned problem. …”
    Get full text
    Article
  18. 11718

    Dispatching Design for Customized Bus of Hybrid Vehicles Based on Reservation Data by Xuemei Zhou, Jiaojiao Xi, Zhen Guan, Xiangfeng Ji

    Published 2021-01-01
    “…Finally, a calculation example is designed and the genetic algorithm is used to solve the model. The results show that the hybrid vehicle solution is more reasonable than the traditional single-vehicle solution and reveal that the model is feasible to optimize scheduling plan. …”
    Get full text
    Article
  19. 11719

    A law of meaning by Bernhard Wälchli, Anna Sjöberg

    Published 2025-01-01
    “…We implement the law in an algorithm using Dunning’s log-likelihood and illustrate it by extracting markers for ‘know’, negation, first person subject and complementizers from translations of the New Testament in a variety sample of 83 languages with manual evaluation of all extracted markers. …”
    Get full text
    Article
  20. 11720

    High Balanced Biorthogonal Multiwavelets with Symmetry by Youfa Li, Shouzhi Yang, Yanfeng Shen, Gengrong Zhang

    Published 2014-01-01
    “…In this paper, we give an algorithm for constructing a pair of biorthogonal symmetric refinable function vectors from any orthogonal refinable function vector, which has symmetric and antisymmetric components. …”
    Get full text
    Article