Showing 10,541 - 10,560 results of 19,511 for search '"algorithm"', query time: 0.11s Refine Results
  1. 10541

    Dependable-cooperative channel resource allocation scheme in wireless mesh network by Mingming LI, Guangxue YUE, Shaoqing DAI, Bolin MA

    Published 2017-05-01
    “…For improving utilization of channel resources and service quality effectively in wireless mesh network,a dependable-cooperative channel resource allocation scheme was proposed.According to the adaptive features of mesh node,engaging game theory and establishing reputation mechanism to achieve dependable-cooperative of nodes,and channel resource allocation result was utilized.The comparison of this experiment proves the situation of service level and network utility of cooperative service.The result of it shows that networks benefit will be optimal when the cooperative service level is 3 and node hops synergies with the service level.Comparing with classic syn-ergetic algorithm,with the same context of network topology,dependable-cooperative channel allocation strategy is clearly dominated with 1.04 on UACRR and 1.069.…”
    Get full text
    Article
  2. 10542

    Practical Management of Patients with Diabetes Mellitus in Primary Health Care by Elodia María Rivas Alpizar, Gisela Zerquera Trujillo, Caridad Hernández Gutiérrez, Belkis Vicente Sánchez

    Published 2011-11-01
    “…It includes definition, diagnosis and classification, algorithm for disease’s screening, appropriate management of a patient with diabetes mellitus in primary health care, treatment pillars and goals for metabolic control. …”
    Get full text
    Article
  3. 10543

    Structure Design and Finite Element Analysis of a Rope Traction Upper Limb Rehabilitation Robot by Yu Junwei, Xu Hongbin, Xu Taojin, Zheng Chengjie, Lu Shiqing

    Published 2018-01-01
    “…To ensure the safety and stability of the rehabilitation robot,the static strength analysis and modal analysis of the structure of the upper limb rehabilitative robot is carried out by using ANSYS Workbench.Moreover,the multi-objective genetic algorithm is applied to the lightweight optimization design of the support frame. …”
    Get full text
    Article
  4. 10544

    Optimization of Gain, Impedance, and Bandwidth of Yagi-Uda Array Using Particle Swarm Optimization by Munish Rattan, Manjeet Singh Patterh, B. S. Sohi

    Published 2008-01-01
    “…It is a global optimization technique-like genetic algorithm (GA) but has less computational cost compared to GA. …”
    Get full text
    Article
  5. 10545

    Comment on ‘Targeted Ciphers for Format‐Preserving Encryption’ from Selected Areas in Cryptography 2018 by Dachao Wang, Baocang Wang, Yuan Ping

    Published 2021-09-01
    “…The second scheme was designed with an algorithm called Mix–Swap–Unmix that is shown to be equivalent to a particular matching exchange process under a specific setting. …”
    Get full text
    Article
  6. 10546

    Coupled bidirectional flow for adaptive image interpolation by FU Shu-jun 1, RUAN Qiu-qi 2, MU Cheng-po 3, WANG Wen-qia 1

    Published 2007-01-01
    “…An adaptive coupled bidirectional flow process was presenfed,where an inverse diffusion was performed to enhance edges along the normal directions to the isophote lines(edges),while a normal diffusion was done to remove ar-tifacts(“jaggies”) along the tangent directions.The two converse diffusion forces were splitted into a coupled form to stop the cancellation between each other.In order to preserve image features,the nonlinear diffusion coefficients were locally adjusted according to the directional derivatives of the image.And then the above process was applied to image interpolation.Experimental results demonstrate that our interpolation algorithm substantially improves the subjective quality of the interpolated images over conventional interpolations and relative equations.…”
    Get full text
    Article
  7. 10547

    Homology analysis of malware based on graph by Bing-lin ZHAO, Xi MENG, Jin HAN, Jing WANG, Fu-dong LIU

    Published 2017-11-01
    “…Malware detection and homology analysis has been the hotspot of malware analysis.API call graph of malware can represent the behavior of it.Because of the subgraph isomorphism algorithm has high complexity,the analysis of malware based on the graph structure with low efficiency.Therefore,this studies a homology analysis method of API graph of malware that use convolutional neural network.By selecting the key nodes,and construct neighborhood receptive field,the convolution neural network can handle graph structure data.Experimental results on 8 real-world malware family,shows that the accuracy rate of homology malware analysis achieves 93%,and the accuracy rate of the detection of malicious code to 96%.…”
    Get full text
    Article
  8. 10548

    Analyse de la production de voyelles anglaises par des apprenants francophones, l’acquisition du contraste /ɪ/–/iː/ à la lumière des k-NN by Adrien Méli, Nicolas Ballier

    Published 2019-11-01
    “…This article addresses the issue of assessing the realizations of /ɪ/ and /iː/ by French learners of English in spontaneous conversations by considering it as a classification problem, which the resort to the k-nearest neighbours algorithm (k-NN) can solve. From a longitudinal corpus of 12 speakers recorded at the university of Paris Diderot over two years, it is shown that in spite of gaps in the numbers of occurrences of tokens for each category, and in spite of the impossibility to use cross-validation, the k-NN method is a reliable means to account for the quality of learners’ vocalic realizations.…”
    Get full text
    Article
  9. 10549

    Research on trust sensing based secure routing mechanism for wireless sensor network by Dan-yang QIN, Shuang JIA, Song-xiang YANG, Jing-ya MA, Yan ZHANG, Qun DING

    Published 2017-10-01
    “…Aiming at the serious impact of the typical network attacks caused by the limited energy and the poor deployment environment of wireless sensor network (WSN) on data transmission,a trust sensing based secure routing mechanism (TSSRM) with the lightweight characteristics and the ability to resist many common attacks simultaneously was proposed.Based on the analysis of the characteristics of network attack,the trust degree calculation model was constructed by combining node’s behavior with energy,at the same time the security route selection algorithm was also optimized by taking trust degree and QoS metrics into account.Performance analysis and simulation results show that TSSRM can improve the security and effectiveness of WSN.…”
    Get full text
    Article
  10. 10550

    STUDY AND APPLICATIONS OF DETECTION METHOD FOR MACHINING QUALITY OF HELICAL SURFACE by DONG ZongZheng, KUANG YuChun, ZHANG Cong, YU JiangHai

    Published 2017-01-01
    “…To ensure the accuracy and efficiency,the model algorithm and data input and visualization is completed. …”
    Get full text
    Article
  11. 10551

    Existence and Numerical Simulation of Solutions for Fractional Equations Involving Two Fractional Orders with Nonlocal Boundary Conditions by Jing Zhao, Peifen Lu, Yiliang Liu

    Published 2013-01-01
    “…In addition, we describe the dynamic behaviors of the fractional Langevin equation by using the G2 algorithm.…”
    Get full text
    Article
  12. 10552

    Generalized Minimum Variance Control for MDOF Structures under Earthquake Excitation by Lakhdar Guenfaf, Mohamed Azira

    Published 2016-01-01
    “…The control approach based on the Generalized Minimum Variance (GMV) algorithm is developed and presented. Our approach is a generalization to multivariable systems of the GMV strategy designed initially for single-input-single-output (SISO) systems. …”
    Get full text
    Article
  13. 10553

    Strong Convergence Theorems for Zeros of Bounded Maximal Monotone Nonlinear Operators by C. E. Chidume, N. Djitté

    Published 2012-01-01
    “…The iteration process does not involve the computation of the resolvent at any step of the process and does not involve the projection of an initial vector onto the intersection of two convex subsets of E, setbacks associated with the classical proximal point algorithm of Martinet 1970, Rockafellar 1976 and its modifications by various authors for approximating of a solution of this equation. …”
    Get full text
    Article
  14. 10554

    Analysis of Power Coupling Device with Dual Planetary Gear Set based on Dynamic Programming by Shaohua Wang, Sheng Zhang

    Published 2019-06-01
    “…By introducing dynamic programming algorithm, taking the battery SOC as state variable and engine torque and speed as control variable, the fuel consumption of the vehicle is set as the objective function for global optimization. …”
    Get full text
    Article
  15. 10555

    3D Simulation of Self-Compacting Concrete Flow Based on MRT-LBM by Liu-Chao Qiu, Yu Han

    Published 2018-01-01
    “…In the present study, the SCC is assumed as a non-Newtonian fluid, and a modified Herschel–Bulkley model is used as constitutive mode. The mass tracking algorithm was used for modeling the liquid-gas interface. …”
    Get full text
    Article
  16. 10556

    Stochastic modeling of structural fatigue damage in High Strength Steel structures by Jiri Brozovsky, Martin Krejsa, Petr Lehner, Premysl Parenica, Stanislav Seitl

    Published 2025-01-01
    “…Description of the parallel algorithm is provided, and the functionality of the method is shown in an example case. …”
    Get full text
    Article
  17. 10557

    Calculation Method of Planetary Gear Train Transmission Ratio based on Adjacency Matrix by Zhao Wang, Xinping Wang, Jiexin Zhang

    Published 2019-05-01
    “…And use MATLAB to automate this algorithm and solve the equation of motion to obtain the gear ratio of the planetary gear train.…”
    Get full text
    Article
  18. 10558

    Sparse expression and sensing of fast fading channel for OFDM systems with imperfect carrier synchronization by Yong FANG, Wei-jie ZHAO, Min WANG

    Published 2013-09-01
    “…A sparse expression of fast fading channel and its sensing method were proposed for orthogonal frequency-division multiplexing (OFDM) system of sparse pilot under the condition of imperfect carrier synchronization.First,a sparsified core vector based sparse expression of the generalized channel impulse response (G-CIR) was proposed by deriving compressed sensing model of the sparse pilot system.Then,both the sparsified core vector and G-CIR were reconstructed by orthogonal matching pursuit(OMP).Simulation results demonstrate that the proposed algorithm can effectively reduce the bit error rate (BER) of the OFDM system with imper ect carrier synchronization.…”
    Get full text
    Article
  19. 10559

    Spectral Element Method for Fractional Klein–Gordon Equations Using Interpolating Scaling Functions by Haifa Bin Jebreen

    Published 2023-01-01
    “…The focus of this paper is on utilizing the spectral element method to find the numerical solution of the fractional Klein–Gordon equation. The algorithm employs interpolating scaling functions (ISFs) that meet specific properties and satisfy the multiresolution analysis. …”
    Get full text
    Article
  20. 10560

    Security analysis and improvement of a certificateless signcryption scheme by Zhen-guo ZHAO

    Published 2015-03-01
    “…Furthermore, the efficiency of the proposed scheme is very high since only four modular exponentiations and five modular exponentiations are needed in the signcryption algoriahm and unsigncryption algorithm separately.…”
    Get full text
    Article