-
10541
Dependable-cooperative channel resource allocation scheme in wireless mesh network
Published 2017-05-01“…For improving utilization of channel resources and service quality effectively in wireless mesh network,a dependable-cooperative channel resource allocation scheme was proposed.According to the adaptive features of mesh node,engaging game theory and establishing reputation mechanism to achieve dependable-cooperative of nodes,and channel resource allocation result was utilized.The comparison of this experiment proves the situation of service level and network utility of cooperative service.The result of it shows that networks benefit will be optimal when the cooperative service level is 3 and node hops synergies with the service level.Comparing with classic syn-ergetic algorithm,with the same context of network topology,dependable-cooperative channel allocation strategy is clearly dominated with 1.04 on UACRR and 1.069.…”
Get full text
Article -
10542
Practical Management of Patients with Diabetes Mellitus in Primary Health Care
Published 2011-11-01“…It includes definition, diagnosis and classification, algorithm for disease’s screening, appropriate management of a patient with diabetes mellitus in primary health care, treatment pillars and goals for metabolic control. …”
Get full text
Article -
10543
Structure Design and Finite Element Analysis of a Rope Traction Upper Limb Rehabilitation Robot
Published 2018-01-01“…To ensure the safety and stability of the rehabilitation robot,the static strength analysis and modal analysis of the structure of the upper limb rehabilitative robot is carried out by using ANSYS Workbench.Moreover,the multi-objective genetic algorithm is applied to the lightweight optimization design of the support frame. …”
Get full text
Article -
10544
Optimization of Gain, Impedance, and Bandwidth of Yagi-Uda Array Using Particle Swarm Optimization
Published 2008-01-01“…It is a global optimization technique-like genetic algorithm (GA) but has less computational cost compared to GA. …”
Get full text
Article -
10545
Comment on ‘Targeted Ciphers for Format‐Preserving Encryption’ from Selected Areas in Cryptography 2018
Published 2021-09-01“…The second scheme was designed with an algorithm called Mix–Swap–Unmix that is shown to be equivalent to a particular matching exchange process under a specific setting. …”
Get full text
Article -
10546
Coupled bidirectional flow for adaptive image interpolation
Published 2007-01-01“…An adaptive coupled bidirectional flow process was presenfed,where an inverse diffusion was performed to enhance edges along the normal directions to the isophote lines(edges),while a normal diffusion was done to remove ar-tifacts(“jaggies”) along the tangent directions.The two converse diffusion forces were splitted into a coupled form to stop the cancellation between each other.In order to preserve image features,the nonlinear diffusion coefficients were locally adjusted according to the directional derivatives of the image.And then the above process was applied to image interpolation.Experimental results demonstrate that our interpolation algorithm substantially improves the subjective quality of the interpolated images over conventional interpolations and relative equations.…”
Get full text
Article -
10547
Homology analysis of malware based on graph
Published 2017-11-01“…Malware detection and homology analysis has been the hotspot of malware analysis.API call graph of malware can represent the behavior of it.Because of the subgraph isomorphism algorithm has high complexity,the analysis of malware based on the graph structure with low efficiency.Therefore,this studies a homology analysis method of API graph of malware that use convolutional neural network.By selecting the key nodes,and construct neighborhood receptive field,the convolution neural network can handle graph structure data.Experimental results on 8 real-world malware family,shows that the accuracy rate of homology malware analysis achieves 93%,and the accuracy rate of the detection of malicious code to 96%.…”
Get full text
Article -
10548
Analyse de la production de voyelles anglaises par des apprenants francophones, l’acquisition du contraste /ɪ/–/iː/ à la lumière des k-NN
Published 2019-11-01“…This article addresses the issue of assessing the realizations of /ɪ/ and /iː/ by French learners of English in spontaneous conversations by considering it as a classification problem, which the resort to the k-nearest neighbours algorithm (k-NN) can solve. From a longitudinal corpus of 12 speakers recorded at the university of Paris Diderot over two years, it is shown that in spite of gaps in the numbers of occurrences of tokens for each category, and in spite of the impossibility to use cross-validation, the k-NN method is a reliable means to account for the quality of learners’ vocalic realizations.…”
Get full text
Article -
10549
Research on trust sensing based secure routing mechanism for wireless sensor network
Published 2017-10-01“…Aiming at the serious impact of the typical network attacks caused by the limited energy and the poor deployment environment of wireless sensor network (WSN) on data transmission,a trust sensing based secure routing mechanism (TSSRM) with the lightweight characteristics and the ability to resist many common attacks simultaneously was proposed.Based on the analysis of the characteristics of network attack,the trust degree calculation model was constructed by combining node’s behavior with energy,at the same time the security route selection algorithm was also optimized by taking trust degree and QoS metrics into account.Performance analysis and simulation results show that TSSRM can improve the security and effectiveness of WSN.…”
Get full text
Article -
10550
STUDY AND APPLICATIONS OF DETECTION METHOD FOR MACHINING QUALITY OF HELICAL SURFACE
Published 2017-01-01“…To ensure the accuracy and efficiency,the model algorithm and data input and visualization is completed. …”
Get full text
Article -
10551
Existence and Numerical Simulation of Solutions for Fractional Equations Involving Two Fractional Orders with Nonlocal Boundary Conditions
Published 2013-01-01“…In addition, we describe the dynamic behaviors of the fractional Langevin equation by using the G2 algorithm.…”
Get full text
Article -
10552
Generalized Minimum Variance Control for MDOF Structures under Earthquake Excitation
Published 2016-01-01“…The control approach based on the Generalized Minimum Variance (GMV) algorithm is developed and presented. Our approach is a generalization to multivariable systems of the GMV strategy designed initially for single-input-single-output (SISO) systems. …”
Get full text
Article -
10553
Strong Convergence Theorems for Zeros of Bounded Maximal Monotone Nonlinear Operators
Published 2012-01-01“…The iteration process does not involve the computation of the resolvent at any step of the process and does not involve the projection of an initial vector onto the intersection of two convex subsets of E, setbacks associated with the classical proximal point algorithm of Martinet 1970, Rockafellar 1976 and its modifications by various authors for approximating of a solution of this equation. …”
Get full text
Article -
10554
Analysis of Power Coupling Device with Dual Planetary Gear Set based on Dynamic Programming
Published 2019-06-01“…By introducing dynamic programming algorithm, taking the battery SOC as state variable and engine torque and speed as control variable, the fuel consumption of the vehicle is set as the objective function for global optimization. …”
Get full text
Article -
10555
3D Simulation of Self-Compacting Concrete Flow Based on MRT-LBM
Published 2018-01-01“…In the present study, the SCC is assumed as a non-Newtonian fluid, and a modified Herschel–Bulkley model is used as constitutive mode. The mass tracking algorithm was used for modeling the liquid-gas interface. …”
Get full text
Article -
10556
Stochastic modeling of structural fatigue damage in High Strength Steel structures
Published 2025-01-01“…Description of the parallel algorithm is provided, and the functionality of the method is shown in an example case. …”
Get full text
Article -
10557
Calculation Method of Planetary Gear Train Transmission Ratio based on Adjacency Matrix
Published 2019-05-01“…And use MATLAB to automate this algorithm and solve the equation of motion to obtain the gear ratio of the planetary gear train.…”
Get full text
Article -
10558
Sparse expression and sensing of fast fading channel for OFDM systems with imperfect carrier synchronization
Published 2013-09-01“…A sparse expression of fast fading channel and its sensing method were proposed for orthogonal frequency-division multiplexing (OFDM) system of sparse pilot under the condition of imperfect carrier synchronization.First,a sparsified core vector based sparse expression of the generalized channel impulse response (G-CIR) was proposed by deriving compressed sensing model of the sparse pilot system.Then,both the sparsified core vector and G-CIR were reconstructed by orthogonal matching pursuit(OMP).Simulation results demonstrate that the proposed algorithm can effectively reduce the bit error rate (BER) of the OFDM system with imper ect carrier synchronization.…”
Get full text
Article -
10559
Spectral Element Method for Fractional Klein–Gordon Equations Using Interpolating Scaling Functions
Published 2023-01-01“…The focus of this paper is on utilizing the spectral element method to find the numerical solution of the fractional Klein–Gordon equation. The algorithm employs interpolating scaling functions (ISFs) that meet specific properties and satisfy the multiresolution analysis. …”
Get full text
Article -
10560
Security analysis and improvement of a certificateless signcryption scheme
Published 2015-03-01“…Furthermore, the efficiency of the proposed scheme is very high since only four modular exponentiations and five modular exponentiations are needed in the signcryption algoriahm and unsigncryption algorithm separately.…”
Get full text
Article