Showing 10,521 - 10,540 results of 19,511 for search '"algorithm"', query time: 0.10s Refine Results
  1. 10521

    Research on Q-learning based rate control approach for HTTP adaptive streaming by Li-rong XIONG, Jing-zhi LEI, Xin JIN

    Published 2017-09-01
    “…HTTP adaptive streaming (HAS) has become the standard for adaptive video streaming service.In changing network environments,current hardcoded-based rate adaptation algorithm was less flexible,and it is insufficient to consider the quality of experience (QoE).To optimize the QoE of users,a rate control approach based on Q-learning strategy was proposed.the client environments of HTTP adaptive video streaming was modeled and the state transition rule was defined.Three parameters related to QoE were quantified and a novel reward function was constructed.The experiments were employed by the Q-learning rate control approach in two typical HAS algorithms.The experiments show the rate control approach can enhance the stability of rate switching in HAS clients.…”
    Get full text
    Article
  2. 10522

    Research on Lung Nodule Detection Based on Improved Target Detection Network by Ye Li, Qian Wu, Hongwei Sun, Xuewei Wang

    Published 2020-01-01
    “…The experimental results prove that proposed algorithm is extremely effective.…”
    Get full text
    Article
  3. 10523

    Bandwidth extension method based on nonlinear audio characteristics classification by Li-yan ZHANG, Chang-chun BAO, Xin LIU, Xing-tao ZHANG

    Published 2013-08-01
    “…A bandwidth extension method based on audio classification was proposed.Time series of audio signals were classified into four types based on recurrence plot and recurrence quantification analysis,and the fine spectrums were recovered by taking advantage of four methods respectively.In addition,the spectrum envelope and energy gain were adjusted by Gaussian mixture model and codebook mapping on the basis of soft decision respectively.Subjective and objective testing results indicate that the proposed method has good quality compared with conventional blind bandwidth extension methods,and the performance of ITU-T G.722.1 codec with the proposed algorithm is better than that of G.722.1C codec at the same bit rate.…”
    Get full text
    Article
  4. 10524

    Precision Compensation Method of Tooth Profile in Form Grinding of Modified Helical Gears by Zhang Hao, Su Jianxin, Deng Xiaozhong, Han Zhengyang

    Published 2024-02-01
    “…The coordinate equation of helical gear tooth profile modification and geometric algorithm of form grinding wheel dressing are established, and the section profile of grinding wheel after tooth profile modification is optimized. …”
    Get full text
    Article
  5. 10525

    Hopf Bifurcation of a Differential-Algebraic Bioeconomic Model with Time Delay by Xiaojian Zhou, Xin Chen, Yongzhong Song

    Published 2012-01-01
    “…Using the theories of normal form and center manifold, we also give the explicit algorithm for determining the direction of the Hopf bifurcations and the stability of the bifurcating periodic solutions. …”
    Get full text
    Article
  6. 10526

    Dynamic P2P trust model based on context factors by Yi-chun LIU, Ying-hong LIANG

    Published 2016-08-01
    “…A multi-dimensional trust model was constructed based on the context factors.The direct trust of the interac-tive entities was estimated by integrating the time-decay factor,the transaction impact factor and the participation fre-quency.The trust similarity algorithm was designed based on the Dice similarity and the feedback credibility was aggre-gated from multiple trust chains.The direct interaction,the evaluation similarity and the trust chain was integrated for calculating the recommendation trust.The peer's trust was evaluated by combing the direct trust and the recommendation trust.A new mechanisam was proposed for the trust's update,incentive or punishment according to the peer's behavior on the interaction.The practical example analysis shows that the proposed model can effectively explain the effect of the transaction contextual factors on the entity trust,and can improve the trust sensitivity to the context transaction factors.…”
    Get full text
    Article
  7. 10527

    Music Emotion Research Based on Reinforcement Learning and Multimodal Information by Yue Hu

    Published 2022-01-01
    “…In this paper, a multimodal fusion algorithm for music emotion analysis is proposed, and a dynamic model based on reinforcement learning is constructed to improve the analysis accuracy. …”
    Get full text
    Article
  8. 10528

    The repertory grids method in the investigation of cognitive differentiation in the sphereof communication by T. G. Siroshtanenko

    Published 2019-04-01
    “…Practical experience in the development of a repertory lattice has been generalized. The algorithm for filling the grid, the method of calculating the results and determination of cognitive complexity (cognitive simplicity) in the sphere of communication have been presented. …”
    Get full text
    Article
  9. 10529

    Dynamics of substrate resource selection in network virtualization environment——an evolutionary game approach by Yu YANG, Shan-zhi CHEN, Xin LI

    Published 2012-11-01
    “…The substrate network path selection problem of virtual network was modeled as an evolutionary game.In the process of evolutionary game,virtual networks adjusted the strategies through the iterated game.The replicator dynamics were leveraged equation to analyze the dynamic variation of strategies selection and demonstrates that this dynamics equation is the admissible dynamic to the evolutionary game.The potential game theory was used to analyze the evolutionary process and demonstrates the evolutionary result will converge to the evolutionary equilibrium.At the evolutionary equilibrium,all the virtual networks could get the best selection strategies.Finally,an evolutionary algorithm based on replicator dynamics was proposed.The experiments simulate the process of virtual network selecting the substrate paths in different initial state and reach the evolutionary equilibrium.Simulation results are coincided with the theoretical analysis results.…”
    Get full text
    Article
  10. 10530

    Non-invasive eye tracking technology based on corneal reflex by Di GAO, Gui-sheng YIN, Chun-guang MA

    Published 2012-12-01
    “…For the deficiencies that existing eye tracking devices are complex,have too many restrictions on the position,need to wear special equipment.A novel method of eye tracking technology using the five near-infrared light as the source of corneal reflex was put forward.This method did not need any wearing equipment,and could adapt to the natural head movement,the algorithm designed calculates the position of sight in high accuracy.A novel method of pupil edge fitting was put forward:fitted circularly and removed false points to get accurate position of pupil center,improved mapping accuracy.Used the GrayScale of image to initialize eye position quickly and accurately.Using the theory of cross-ratio invariance to make coordinate mapping,finally calculated the attention coordinate accurately.…”
    Get full text
    Article
  11. 10531

    Pilot based channel estimation in amplify-and-forward MIMO relay networks by Jian ZHOU, Bao-yu ZHENG

    Published 2014-09-01
    “…A channel estimation method in two time slots for two-hop amplify-and-forward MIMO relay channels is pro-posed.An algorithm for computing the optimal pair of source pilot and relay amplify matrix is developed,which mini-mizes the mean square error of the source-to-relay channel estimation subject to both power constraints at the source and the relay.The signal matrices are decomposed into unitary components and diagonal components.Then the bisection method is used to obtain the optimal diagonal components of the source pilot and the relay amplified matrix.The simula-tion results show that the proposed method has no ambiguity in the channel estimates.The effects of the channel correla-tion and the number of antennas on the performance of channel estimation are also analyed.…”
    Get full text
    Article
  12. 10532

    Measurement study on abnormal changes in authoritative resource records of government and educational domains by SUN Junzhe, LU Chaoyi, LIU Baojun, DUAN Haixin, SUN Donghong

    Published 2024-11-01
    “…The system actively captured and continuously monitored 7.5 million important domains globally. An algorithm was developed to filter abnormal changes in resource records, identifying abnormal changes in 896 significant domains within a one-month analysis period. …”
    Get full text
    Article
  13. 10533

    Intelligent adaptive edge systems:exploration and open issues by Xu WANG, Nanxi CHEN, Roujia ZHANG

    Published 2021-03-01
    “…Edge intelligence has emerged as a promising trend of the new generation of Internet of things.Edge computing devices are widely distributed, with various diverse end devices and services, delay sensitive, and serve mobile terminals.Therefore, the edge system needs to provide flexible, diverse, reconfigurable and scalable services.From the application fields of adaptive edge computing, the application requirements of intelligent adaptive edge systems were explored, the existing adaptive edge systems and their basic framework were analyzed and summarized, and the application of artificial intelligence technologies was discussed, such as deep learning and reinforcement learning.Then, how to design a special intelligent algorithm in specific application fields was introduced.Finally, the research status and future challenges in this field were discussed.…”
    Get full text
    Article
  14. 10534

    Multidisciplinary Collaborative Reliability Analysis of the Gear Reducer based on Inverse Reliability Strategy by Wang Liangliang, Peng Jinshuan, Shao Yiming

    Published 2015-01-01
    “…To overcome the high computational cost of reliability analysis,a reliability analysis method which combines the multidisciplinary genetic algorithm collaborative optimization( GA- CO) based on the inverse reliability strategy( IRS) is proposed( IRS- GA- CO). …”
    Get full text
    Article
  15. 10535

    Economic Development Trend Prediction Model Based on Unsupervised Learning in the Internet of Things Environment by Min Kuang

    Published 2021-01-01
    “…In order to explore the economic development trend under the environment of the Internet of Things, this paper improves the chaotic algorithm of the Internet of Things and constructs an economic development trend analysis system based on big data technology. …”
    Get full text
    Article
  16. 10536

    Implementation of a Three-Dimensional Pedometer Automatic Accumulating Walking or Jogging Motions in Arbitrary Placement by Jia-Shing Sheu, Wei-Cian Jheng, Chih-Hung Hsiao

    Published 2014-01-01
    “…The user’s motion state is calculated using a walk/run mode switching algorithm.…”
    Get full text
    Article
  17. 10537

    Modified Newtonian Dynamics: A Falsification of Cold Dark Matter by R. H. Sanders

    Published 2009-01-01
    “…MOND may be viewed as an algorithm for calculating the distribution of force in an astronomical object from the observed distribution of baryonic matter. …”
    Get full text
    Article
  18. 10538

    Application of Constrained Robust Independent Component Analysis in the Fault Diagnosis of Rolling Element Bearing by Liao Qiang, Li Xunbo, Huang Bo

    Published 2015-01-01
    “…The method of independent component analysis is widely used in mechanical equipment fault diagnosis domain.A novel method named as constrained robust independent component analysis( cRobust ICA)based on Robust ICA algorithm is proposed which utilized prior information about the fault characteristic frequency.Firstly,how to create the reference signal is discussed.Then,the measurement function between reference signal and desired independent component( IC) is defined.At last,an enhanced contrast function is acquired by modifying a generally used kurtosis contrast function with closeness measurement.A contrastive study on the conventional Fast ICA is adopted to demonstrate the effectiveness and accuracy of the cRobust ICA by numerical simulations and experiments.…”
    Get full text
    Article
  19. 10539

    Health Promotion Effects of Sports Training Based on HMM Theory and Big Data by Haiyan Song, Yao Ma, Hongwei Chen

    Published 2022-01-01
    “…Firstly, the characteristic information of human health status after sports training is collected based on big data technology, and the evaluation index and evaluation algorithm of human health status after sports training are constructed. …”
    Get full text
    Article
  20. 10540

    Early-warning schemes for alarm mutation in networks based on control chart by Xing SU, Lu ZHANG

    Published 2016-03-01
    “…The amount of various network elements and alarms trigged is pretty startling with the expansion of the network.The traditional network operation and maintenance,that is,passively processed worksheet after the occurrence of network failure one by one,has been unable to adapt to the complex network management today.The various types of important service-related network alarm titles were sorted out,and the fluctuation under control for kinds of important alarms by control chart,establishes the graded early-warning model and algorithm for alarm mutation in networks combining with the service-related analysis,were analyzed.At last,a dynamic closed-loop control mechanism,which was preceded by fault occurred and actively digs into hidden troubles,was proposed.…”
    Get full text
    Article