-
11701
Achieving Network Localizability in Nonlocalizable WSN with Moving Passive Event
Published 2013-10-01“…We design a corresponding algorithm in distributed manner for the implementation of our approach. …”
Get full text
Article -
11702
Robust Adaptive Stabilization of Linear Time-Invariant Dynamic Systems by Using Fractional-Order Holds and Multirate Sampling Controls
Published 2010-01-01“…A dead zone is included in the parameters estimation algorithm for robustness purposes under the presence of unmodeled dynamics in the controlled dynamic system. …”
Get full text
Article -
11703
Texture mapping of warp knitted shoe upper based on ARAP parameterization method
Published 2025-01-01“…Additionally, discrete harmonic and parametric optimization unfolding algorithms are employed to enhance texture mapping quality. …”
Get full text
Article -
11704
Day-to-Day Traffic Assignment Model considering Information Fusion and Dynamic Route Adjustment Ratio
Published 2020-01-01“…Through theoretical analyses, we investigate the existence of its fixed point and the influence factors of uniqueness of the fixed point. An iterative-based algorithm that can solve the fixed point is also given. …”
Get full text
Article -
11705
Application of the Moment Of Inertia method to the Critical-Plane Approach
Published 2016-10-01“…An efficient computer code with the shear-shear version of the MOI algorithm is also provided in this work…”
Get full text
Article -
11706
Optimization Design and Experimental Study of Low-Pressure Axial Fan with Forward-Skewed Blades
Published 2007-01-01“…Using back propagation (BP) neural network and genetic algorithm (GA), the optimization was performed for a radial blade. …”
Get full text
Article -
11707
A Novel Online Portfolio Selection Strategy with Multiperiodical Asymmetric Mean Reversion
Published 2020-01-01“…The MAMR strategy incorporates a multipiecewise loss function with the moving average method and then imitates the passive-aggressive algorithm. We further provide a solution via convex optimization. …”
Get full text
Article -
11708
Spectrum resource allocation method of maximizing transmission rate in cognitive heterogeneous wireless networks
Published 2019-09-01“…Aiming at the problem that it is difficult to allocate spectrum resources to secondary users efficiently in cognitive heterogeneous wireless networks with heterogeneous spectrum attributes,dynamic channel conditions and diverse service requirements,a spectrum resource allocation strategy with maximum transmission rate was proposed.Firstly,the strategy aimed at maximizing the total transmission rate,and constrained the limited spectrum resources and user service requirements to construct a non-linear multi-constrained spectrum resource allocation 0-1 planning model.Then a polynomial time complexity simplification method was designed.According to idle spectrum information,channel conditions,business requirements and allocation decision history information,and the benefit matrix was constructed and modified to achieve constraint simplification,and the execution efficiency was improved by improving the coefficient matrix transformation strategy of the traditional Hungarian algorithm.Finally,the performance of the method was compared and analyzed by experiments.Experimental results show that the proposed method has higher transmission rate and execution efficiency.…”
Get full text
Article -
11709
Multiobjective Day-Ahead Scheduling of Reconfigurable-Based Microgrids Through Electric Vehicles and Demand Response Integration
Published 2025-01-01“…Because of these two compromising objectives, the evolutionary multiobjective seagull optimization algorithm is utilized to find the best local solutions. …”
Get full text
Article -
11710
PoSW:novel secure deduplication scheme for collaborative cloud applications
Published 2017-07-01“…In order to solve the problems of secure access and deduplication to the shared file in the cloud environment,a novel notion called proof of shared ownership (PoSW) was formalized,and a formal definition of the PoSW was given.Furthermore,a PoSW scheme and an enhanced version of that were proposed.In the PoSW scheme,secure shared file dispersal,convergent encryption and secret sharing algorithm were employed to transform the shared file realize the sharing and authorization for the shared file,and then a novel challenge-response protocol was proposed to achieve the proof of shared ownership and the foundation for the secure deduplication of the shared file was provided.An enhanced PoSW scheme was designed to improve the availability and reliability for different kinds of the shared files by introducing the multi-cloud server providers and using the strategies of both data duplication and secret file dispersal.Security analysis and performance evaluation show the security and efficiency of the proposed scheme.…”
Get full text
Article -
11711
Combined encryption method for CAN bus data based on periodic coupled processing
Published 2023-01-01“…In the intelligent connected age, CAN bus transmission faces the urgent demand of light weighted security encryption.Based on this, a fast response and high security CAN bus data encryption method was proposed.Since the 64 bit CAN packets were sent periodically, an online-offline block encryption algorithm coupled with message transmission cycle was proposed.In offline phase, the dynamic session key was generated by using advanced encryption standard.In online phase, the dynamic session key was used to quickly respond to encryption and decryption requests.The online computation delay was greatly reduced by the pre-encryption computation in offline phase, which helped achieving low latency and lightweight computation.At the same time, the ciphertext policy attribute based encryption was used to encrypt the block cipher.The access control policy made by the data sending OBU ensures that only the target OBU can decrypt the block cipher, so as to achieve targeted encryption.…”
Get full text
Article -
11712
RELIABILITY ANALYSIS OF REACTION FORCE DEVELOPED IN THE LUBRICATED REVOLUTE JOINT FOR A SLIDER-CRANK SYSTEM INCLUDING JOINT WITH CLEARANCE AND LUBRICATION
Published 2017-01-01“…In order to overcome this limitation,the parameters are pretreated through Genetic Algorithm to get the optimum parameters values. Then approximate function relation between random parameters and performance function is derived and the reliability of the reaction force developed in the lubricated revolute joint of the crank-slider mechanism is discussed by Monte-Carlo method. …”
Get full text
Article -
11713
ATKB-PID: an adaptive control method for micro tension under complex hot rolling conditions
Published 2025-01-01“…This method incorporates a linear attention layer and utilizes a K-Nearest Neighbors (KNN) algorithm to predict the optimal learning rate and inertia coefficient under actual operating conditions. …”
Get full text
Article -
11714
Systems Thinking Safety Analysis: Nuclear Security Assessment of Physical Protection System in Nuclear Power Plants
Published 2013-01-01“…The systems thinking algorithm is used for the quantifications by the Vensim software package. …”
Get full text
Article -
11715
Design and Implementation of a New Fast and Efficient MPPT Controller under Different Solar Irradiance Conditions
Published 2022-01-01“…The power-voltage (P-V) characteristic curve of solar photovoltaic (PV) systems operating in partial shading conditions (PSC) is nonlinear and has multiple local maximum peak power (LMPP) points, rendering many of the maximum power point tracking (MPPT) algorithms ineffective at locating global maximum peak power (GMPP) points. …”
Get full text
Article -
11716
Basins of Convergence in a Multi-Perturbed CR3BP
Published 2024-12-01“…The Newton–Raphson methodis used to implement a searching algorithm. Finally, an application to the Sun–Mars system including the presence of Phobos and Deimos is developed.…”
Get full text
Article -
11717
Design of Large Thinned Arrays Using Different Biogeography-Based Optimization Migration Models
Published 2016-01-01“…Array thinning is a common discrete-valued combinatorial optimization problem. Evolutionary algorithms are suitable techniques for above-mentioned problem. …”
Get full text
Article -
11718
Dispatching Design for Customized Bus of Hybrid Vehicles Based on Reservation Data
Published 2021-01-01“…Finally, a calculation example is designed and the genetic algorithm is used to solve the model. The results show that the hybrid vehicle solution is more reasonable than the traditional single-vehicle solution and reveal that the model is feasible to optimize scheduling plan. …”
Get full text
Article -
11719
A law of meaning
Published 2025-01-01“…We implement the law in an algorithm using Dunning’s log-likelihood and illustrate it by extracting markers for ‘know’, negation, first person subject and complementizers from translations of the New Testament in a variety sample of 83 languages with manual evaluation of all extracted markers. …”
Get full text
Article -
11720
High Balanced Biorthogonal Multiwavelets with Symmetry
Published 2014-01-01“…In this paper, we give an algorithm for constructing a pair of biorthogonal symmetric refinable function vectors from any orthogonal refinable function vector, which has symmetric and antisymmetric components. …”
Get full text
Article