Showing 12,161 - 12,180 results of 19,511 for search '"Algorithm"', query time: 0.10s Refine Results
  1. 12161

    Dynamic Modeling and Control of Electromechanical Coupling for Mechanical Elastic Energy Storage System by Yang Yu, Zengqiang Mi

    Published 2013-01-01
    “…The simulation results in three different cases show that the proposed nonlinear dynamic model of MEES system is correct; the designed algorithm has a better control performance in contrast with the conventional PI control.…”
    Get full text
    Article
  2. 12162

    Human Position Detection Based on Depth Camera Image Information in Mechanical Safety by Cheng Zhou, Dacong Ren, Xiangyan Zhang, Cungui Yu, Likai Ju

    Published 2022-01-01
    “…Meanwhile, a human position detection method based on Intel RealSense depth camera and MobileNet-SSD algorithm is proposed and applied to robot safety protection. …”
    Get full text
    Article
  3. 12163

    A QoS Aware Resource Allocation Strategy for 3D A/V Streaming in OFDMA Based Wireless Systems by Young-uk Chung, Yong-Hoon Choi, Suwon Park, Hyukjoon Lee

    Published 2014-01-01
    “…It is formulated as an optimization problem and is solved using a suboptimal heuristic algorithm. Numerical results show that the proposed scheme provides a better quality of service compared to conventional schemes.…”
    Get full text
    Article
  4. 12164

    Layout Optimization of Two Autonomous Underwater Vehicles for Drag Reduction with a Combined CFD and Neural Network Method by Wenlong Tian, Zhaoyong Mao, Fuliang Zhao, Zhicao Zhao

    Published 2017-01-01
    “…Then, based on the CFD data, a back-propagation neural network (BPNN) method is used to describe the relationship between the layout parameters and the drag of the fleet. Finally, a genetic algorithm (GA) is chosen to obtain the optimal layout parameters which correspond to the minimum drag. …”
    Get full text
    Article
  5. 12165

    Research on Dual Security Control for a Non-Linear CPS with Multi-Objective Constraints under DoS Attack and Actuator Fault: An Active-Passive Attack-Tolerant Approach by Li Zhao, Wei Li, Yajie Li

    Published 2022-01-01
    “…Furthermore, a correction compensation algorithm of control quantity is proposed for high-energy DoS attack based on the PID idea to make active-passive attack tolerance more effective. …”
    Get full text
    Article
  6. 12166

    DECODING OF STRUCTURALLY AND LOGICAL CODES by Yu. D. Ivanov, I. N. Nikolov, B. V. Lozka

    Published 2016-07-01
    “…There are shown the basic points of the generalized algorithm of decoding SLC, which is based on the method of perfect matrix arrangement (PMA) of the n-dimensional cube vertices for adequate representation and transformation of boolean functions, which is based on the method of generating sequences of variables for building the maximum coverage of the cube vertices. …”
    Get full text
    Article
  7. 12167

    Distributed trust management scheme based on blockchain in Internet of vehicles by Haibo ZHANG, Yukun CAO, Kaijian LIU, Ruyan WANG

    Published 2023-05-01
    “…Aiming at the security problems caused by the low efficiency and accuracy of malicious vehicle identification in Internet of vehicles, a distributed trust management scheme based on blockchain in Internet of vehicles was proposed.A false information identification strategy was designed by aggregating the scoring information of vehicles, combined with Bayesian inference model.A reputation value updating algorithm was designed by combining the historical interaction information of vehicles and traffic information, malicious vehicles were identified by the reputation threshold.A blockchain was constructed roadside units to realize the distributed storage of traffic data and vehicle reputation values.The traditional proof of work consensus mechanism was improved to dynamically change the difficulty of miner node generating a block through the event level and the number of vehicles involved in scoring, and the waiting mechanism was used to temporarily stop the nodes that had recently blocked from participating in the election process of miner nodes, thus reducing the resource consumption caused by repeated calculations.The simulation results show that the proposed scheme can effectively identify false information, resist the deceptive behavior of malicious vehicles, improve the identification efficiency of malicious vehicles, reduce resource consumption, and is effective and feasible in distributed trust management for Internet of vehicles.…”
    Get full text
    Article
  8. 12168

    TOPOLOGY OPTIMIZATION DESIGN METHOD FOR HINGE-FREE MULTI-INPUT MULTI-OUTPUT COMPLIANT MECHANISMS UNDER BUCKLING CONSTRAINTS (MT) by GAN Wei, RONG JianHua, ZHAO Lei, HE YiFan, LI ZhengWei, ZHOU Quan

    Published 2022-01-01
    “…Then, the sensitivities of the objective function and buckling constraints are derived, and the MMA algorithm is adopted to optimize the topology optimization model. …”
    Get full text
    Article
  9. 12169

    Proxy re-encryption based multi-factor access control scheme in cloud by Mang SU, Guozhen SHI, Anmin FU, Yan YU, Wei JIN

    Published 2018-02-01
    “…Cloud computing is one of the space-ground integration information network applications.Users can access data and retrieve service easily and quickly in cloud.The confidentiality and integrity of the data cloud have a direct correspondence to data security of the space-ground integration information network.Thus the data in cloud is transferred with encrypted form to protect the information.As an important technology of cloud security,access control should take account of multi-factor and cipher text to satisfy the complex requirement for cloud data protection.Based on this,a proxy re-encryption based multi-factor access control (PRE-MFAC) scheme was proposed.Firstly,the aims and assumptions of PRE-MFAC were given.Secondly,the system model and algorithm was defined.Finally,the security and properties of PRE-MFAC were analyzed.The proposed scheme has combined the PRE and multi-factor access control together and realized the multi-factor permission management of cipher text in cloud.Meanwhile,it can make the best possible use of cloud in computing and storing,then reduce the difficulty of personal user in cryptographic computing and key managing.…”
    Get full text
    Article
  10. 12170

    Optimal Design and Analysis of Traction Steering Mechanism for Loading Transport Vehicle by Ruochao Wang, Zhikuan Yin, Zisheng Liu, Zijue Wang, Taiming Zhang, Jiantao Yao

    Published 2021-05-01
    “…A trapezoidal traction steering mechanism based on Ackerman principle is designed, and uses the sequential quadratic programming genetic algorithm in multivariate nonlinear programming to optimize the specific dimensions of the trapezoidal traction steering mechanism, the size parameters which more satisfy the Ackerman principle are obtained. …”
    Get full text
    Article
  11. 12171

    SHAPE OPTIMIZATION OF NONLINEAR CURVED BEAM AND DESIGN OF CONSTANT PRESSURE SUPPORT DEVICE by XIE Miao, ZHANG WenZhuo, Ll WeiDong, LlU Jie, ZHOU QingHai, XING XuWen

    Published 2024-02-01
    “…The characteristics of Nonlinear Plane Curved Beam with negative stiffness are briefly described by using B-spline curve. Based on genetic algorithm and nonlinear finite element method , the shape of the nonlinear plane curved beam with negative stiffness is designed and optimized. …”
    Get full text
    Article
  12. 12172

    DFDA-AD: An Approach with Dual Feature Extraction Architecture and Dual Attention Mechanism for Image Anomaly Detection by Babak Masoudi

    Published 2024-12-01
    “…Two attention mechanisms are improved and developed in this paper, which provide more important feature maps for clustering by K-means algorithm. The evaluation of the model's performance was done on the MVTec AD data set, and the results of the evaluations for anomaly detection and localization were satisfactory compared to several other approaches that have been recently proposed.…”
    Get full text
    Article
  13. 12173

    DYNAMIC LOAD SIMULATION OF 4WD SUV AND FATIGUE LIFE ANALYSIS OF FRAME by GE WenTao, LIU Zhou, DUAN LongYang, JIA HuiFang, GONG ChunHui

    Published 2019-01-01
    “…The fatigue life of frame has been predicted by applying Miner Counting Algorithm for Acuminated Fatigue Analysis,the analysis result has shown that the fatigue life can satisfy the target,and the vehicle has ultimately passed the durability validation of proving ground,which has shown that the analysis result is accorded with the test.…”
    Get full text
    Article
  14. 12174

    Exact makespan minimization of unrelated parallel machines by Åblad, Edvin, Strömberg, Ann-Brith, Spensieri, Domenico

    Published 2021-05-01
    “…Our computational studies indicate that the proposed algorithm is competitive with state-of-the-art methods on different types of instances. …”
    Get full text
    Article
  15. 12175

    Optimized Sizing, Selection, and Economic Analysis of Battery Energy Storage for Grid-Connected Wind-PV Hybrid System by Hina Fathima, K. Palanisamy

    Published 2015-01-01
    “…The sizing methodology is optimized using bat optimization algorithm to minimize the cost of investment and losses incurred by the system in form of load shedding and wind curtailment. …”
    Get full text
    Article
  16. 12176

    Adaptive channel status based access class barring scheme for traffic emergency communication by Jiao WANG, Gongan QIU, Shibing ZHANG

    Published 2022-01-01
    “…In high-density cellular vehicle-to-everything (C-V2X), effective massive access method of cluster communications is the basis to assure the performance index for different services and enhance the spectrum efficiency under limited resource.An improved access class barring (ACB) scheme was proposed using channel status information based on computing power of communication terminal in C-V2X.The base station estimated the communication density within its cover range, generated the ACB factor using the communication density, and broadcasted the ACB.According to signal to interference plus noise ratio (SINR) and ACB factor of the received broadcast signal, the vehicular communication terminal computed the access probability, and compared with ACB factor.When the access probability was more than the ACB factor, the terminal selected a preamble randomly from the preamble pool with the probability which equal to the access probability or one.The terminal transmited the selected preamble to the base station for finishing the access program.The simulation results show that the scheme proposed has 5%~20% advantage over S-Aloha and machine to machine opportunistic splitting algorithm (M2M-OSA) schemes in average access collision probability.It reduces the average access delay effectively.…”
    Get full text
    Article
  17. 12177

    Privacy protection scheme for internet of vehicles based on homomorphic encryption and block chain technology by Ruijin WANG, Yucheng TANG, Weiqi ZHANG, Fengli ZHANG

    Published 2020-02-01
    “…In order to solve the problem that the security of traditional internet of vehicles devices is relatively low,which may threaten the privacy of users,a privacy protection scheme based on homomorphic encryption and block chain technology was proposed.This scheme added the authentication service composed of two level nodes to the proposed model to realize the permission control of roles in the model.In order to record the information of the internet of vehicles devices,a new block data structure based on homomorphic encryption (HEBDS) was proposed,which enabled the privacy data to be written into the block after being processed by the Paillier encryption algorithm,and then written into the blockchain network by the gateway node obtaining the accounting right.This scheme realized the data processing in ciphertext state,and made up for the shortage of all data disclosure in blockchain network.Through the analysis of the security of the scheme,it is proved that the scheme has the characteristics of unforgeability and privacy data security.Through homomorphic encryption of privacy data and upload to blockchain network,the scheme can distribute,share and calculate privacy data in ciphertext state,which can protect customer privacy more effectively than traditional internet of vehicles model.…”
    Get full text
    Article
  18. 12178

    Pervasive Urban Sensing with Large-Scale Mobile Probe Vehicles by Yanmin Zhu, Xuemei Liu, Yin Wang

    Published 2013-02-01
    “…As case one, we discuss the design of a sensing algorithm for detecting the instant state of traffic lights. …”
    Get full text
    Article
  19. 12179

    Smolyak-Grid-Based Flutter Analysis with the Stochastic Aerodynamic Uncertainty by Yuting Dai, Chao Yang

    Published 2014-01-01
    “…In order to enhance the computational efficiency, the integration algorithm, namely, Smolyak sparse grids, was employed to calculate the coefficients of the stochastic polynomial basis. …”
    Get full text
    Article
  20. 12180

    Faster-than-Clifford simulations of entanglement purification circuits and their full-stack optimization by Vaishnavi L. Addala, Shu Ge, Stefan Krastanov

    Published 2025-01-01
    “…We develop a simulation algorithm for distillation circuits with per-gate complexity of $${\mathcal{O}}(1)$$ O ( 1 ) , drastically faster than $${\mathcal{O}}(N)$$ O ( N ) Clifford simulators or $${\mathcal{O}}({2}^{N})$$ O ( 2 N ) wavefunction simulators over N qubits. …”
    Get full text
    Article