Showing 10,601 - 10,620 results of 19,511 for search '"algorithm"', query time: 0.09s Refine Results
  1. 10601

    Pulse engineering via projection of response functions by Nicolas Heimann, Lukas Broers, Ludwig Mathey

    Published 2025-01-01
    “…We demonstrate this approach, and compare it to the standard GRAPE algorithm, for the example of a quantum gate on two qubits, demonstrating a clear improvement in convergence and optimal fidelity of the generated protocol.…”
    Get full text
    Article
  2. 10602

    A Fractional Trust Region Method for Linear Equality Constrained Optimization by Honglan Zhu, Qin Ni, Liwei Zhang, Weiwei Yang

    Published 2016-01-01
    “…The global convergence of the proposed algorithm is established and proved. Numerical results for test problems show the efficiency of the trust region method with new fractional model. …”
    Get full text
    Article
  3. 10603

    Minimal coding cost and low delay multicast routing of wireless mesh networks by gang CHENZhi, jian SHENXiao, Li LIU

    Published 2016-01-01
    “…MNCLDMR protocol introduces the concept of topology key nodes and network coding key nodes, serving as the routing metric whether the next hop nodes were network coding key nodes or topology key nodes, using MNCLD algorithm construct multicast tree. Simulation results show that MNCLDMR can achieve expectation goal, form reasonable network coding opportunity and achieve mini l network coding and low delay multicast routing.…”
    Get full text
    Article
  4. 10604

    Congestion control mechanism in VANET for safety messaging by Jian SUN, Hong-zhi LI, Ling-bo GUO, Sheng-lai CHEN

    Published 2014-05-01
    “…Firstly, a basic channel re-source allocation algorithm for periodic safety message (PSM) and event-driven safety message (EDSM) was proposed, which limits the beacon load level below a specific threshold and thus implicitly reserves enough bandwidth for EDSM. …”
    Get full text
    Article
  5. 10605

    Lightweight security architecture design for wireless sensor network by Chao WANG, Guang-yue HU, Huan-guo ZHANG

    Published 2012-02-01
    “…Most previous security proposal did not consider key management or their authentication efficiency was very low.Lightweight security architecture and lightweight security algorithm were proposed for wireless sensor network,The problem of network encounters malicious nodes maybe occur in the procedure of backbone networks networking could be solved by threshold secret sharing mechanism.The lightweight ECC was proposed to optimize the CPK architecture based on normal ECC,authentication was efficient without the third-party CA,and could reduce the computational complexity,the key management could meet the resource limit in wireless sensor network,and the key security depended on the exponential computation complexity of the elliptic discrete logarithm decomposition.The scheme used the improved two-way authentication to ensure the communication security between common node and sink node,which could prevent man-in-the-middle attack.…”
    Get full text
    Article
  6. 10606

    Achieving resist against DHCP man-in-the-middle attack scheme based on key agreement by Zhiqiang YAO, Zhirong ZHU, Guohua YE

    Published 2021-08-01
    “…In order to deal with the issue of the man-in-the-middle attack in the process of using dynamic host configuration protocol, a lightweight scheme was proposed.A new key agreement algorithm was developed based on public key cryptography to generate relevant keys, reducing the key storage burden.On the basis, a secure scheme was proposed, where two-way authentication of participants was designed to prevent the man-in-the-middle attack and digital signatures conforming to protocol specifications was constructed to ensure the legitimacy of the message source.By security analysis, the proposed scheme was demonstrated to be secure and valid against the man-in-the-middle attack and other common attacks.Experimental results show that the proposed scheme has the better performance compared with the related schemes, and can be compatible with both DHCPv4 and DHCPv6.…”
    Get full text
    Article
  7. 10607

    Analyzing the weights and its variation of the three delays in EPA network by Xiu-zhu JIANG, De-jiu DENG, Dong-qin FENG

    Published 2012-11-01
    “…Three delay factors of EPA micro segment:queuing delay,node information processing delay and transmission and propagation delay was analied,and the weight influence of the three major factors of delay on the real-time performance was discussed,through the analysis of the number of nodes in the N and scheduling algorithm factor α on the effects of delay variation,reached two conclusions:1) N=8 is the inflection point of phenomenon of "two eight"between queue delay and node information processing delay;2)when α□0.32,queuing delay will be reduced to be the secondary factors for the influence of the delay.The conclusions provide EPA network reference directions for measures to improve the real-time performance.…”
    Get full text
    Article
  8. 10608

    PM2.5 concentration prediction model based on random forest regression analysis by Xu DU, Jingyu FENG, Shaoqing LV, Wei SHI

    Published 2017-07-01
    “…The random foreat regression algorithm was introduced to solve the shortcomings of neural network in predicting the PM2.5 concentration,such as over-fitting,complex network structure,low learning efficiency.A novel PM2.5 concentration prediction model named RFRP was designed by analyzing the 22 characteristic factors including the meteorological conditions,the concentration of air pollutants and the season.The historical meteorological data of Xi’an in 2013—2016 were collected to verify the effectiveness of the model.The experimental results show that the proposed model can not only predict the PM2.5 concentration effectively,but also improve the operating efficiency of the model without affecting the prediction accuracy.The average run time of the proposed model is 0.281 s,which is about 5.58% of the neural network prediction model.…”
    Get full text
    Article
  9. 10609

    Delayed Presentation of Tetralogy of Fallot with Isolated Cyanosis by Zachary Zemore, Avni Sharma, Kerri Carter, Aline Baghdassarian

    Published 2018-01-01
    “…This case serves as an example of a missed diagnosis by screening efforts and reaffirms the resuscitation algorithm of a hypoxic pediatric patient that all emergency providers should be familiar with.…”
    Get full text
    Article
  10. 10610

    Integrity verification protocol based on privacy homomorphism data aggregation by Xing LI, Chun-yan LI, Liang-min WANG

    Published 2014-11-01
    “…Secure data aggregation in wireless sensor networks can effectively prevent privacy leakage,data tampering and other issues,it also achieves efficient data transmission.An integrity verification protocol based on privacy homomorphism data aggregation (IV-PHDA) was presented.The protocol uses homomorphism encryption to ensure data privacy,then it used random detection nodes to detect the integrity of the aggregated results to verify whether the aggregation node faithfully transmit each data packet.The theoretical analysis and simulation comparison verify the performance of the algorithm,the results show that this protocol can detect data integrity through transmission,and achieve better privacy protection and higher data accuracy.…”
    Get full text
    Article
  11. 10611

    Simulation of plutonium-aerosol rise under chemical explosion conditions by Hongyi Yao, Yonggang Huo, Xingfu Cai, Sufen Li, Haowei Wang

    Published 2025-01-01
    “…Based on the Chapman model and Levenberg–Marquardt algorithm, the simulation results of the plutonium aerosol-cloud height were fitted to obtain it as a function of time. …”
    Get full text
    Article
  12. 10612

    An improvement on the efficiency bounds and efficiency classifications in DEA with imprecise data by Bohlool Ebrahimi, Duško Tešić

    Published 2024-12-01
    “…To overcome the problems, we propose a simple, practical algorithm to estimate the expected value of efficiencies, which is inspired by considering the DEA axioms to the imprecise data.…”
    Get full text
    Article
  13. 10613

    Permutation Flowshop Scheduling in ED Aluminium Using Metaheuristic Approaches by Haposan Vincentius Manalu, Fatiha Widyanti, Nur Mayke Eka Normasari, Andiny Trie Oktavia, Achmad Pratama Rifai

    Published 2024-01-01
    “…Experiments are performed in this research to evaluate the three algorithms. The result using the simulated annealing algorithm is considered better because it has a shorter makespan. …”
    Get full text
    Article
  14. 10614

    Adaptive traffic distributing based on dynamic topology for multipath routing in MANET by AN Hui-yao1, LU Xi-cheng2, PENG Wei2, PENG YU-hang2

    Published 2006-01-01
    “…By implementing the algorithm on the OPNET modeler, the results demonstrate that adaptive dynamic traffic distributing multipath routing is indeed a viable alternative to MANET routing approach.…”
    Get full text
    Article
  15. 10615

    An Improved Backward/Forward Sweep Power Flow Method Based on a New Network Information Organization for Radial Distribution Systems by Saad Ouali, Abdeljabbar Cherkaoui

    Published 2020-01-01
    “…This paper presents a load flow algorithm based on the backward/forward sweep principle, flexible with network topology changes, with an improvement in ensuring a minimum number of searching for connections between nodes in the calculation sequence in the forward and the backward sweep, by organizing the radial distribution system information into a main line and its derivations. …”
    Get full text
    Article
  16. 10616

    UAV Path Prediction for CD&R to Manned Aircraft in a Confined Airspace for Cooperative Mission by Chin E. Lin, Ya-Hsien Lai

    Published 2018-01-01
    “…In this paper, a new path prediction approach for unmanned aerial vehicles (UAVs) for conflict detection and resolution (CD&R) to manned aircraft in cooperative mission in a confined airspace is proposed. Path prediction algorithm is established to estimate UAV flight trajectory to predict conflict threat to manned aircraft in time advances (front-end process of CD&R system). …”
    Get full text
    Article
  17. 10617

    Bayesian Estimation of the Stress-Strength Reliability Based on Generalized Order Statistics for Pareto Distribution by Zahra Karimi Ezmareh, Gholamhossein Yari

    Published 2023-01-01
    “…To solve this problem, we propose an acceptance-rejection algorithm to generate a sample of the posterior distribution. …”
    Get full text
    Article
  18. 10618

    Large-scale resource state monitoring strategy in network function virtualization environment by Meisheng HAI, Peng YI, Yiming JIANG, Jichao XIE

    Published 2019-12-01
    “…In order to improve the utilization of the infrastructure resource and efficiently deploy the service function chain dynamically in network function virtualization,the orchestration management domain needs to monitor the network resources and virtual network function status in real time,but real-time monitoring will bring large communication overhead.An intelligent distributed monitoring strategy with minimal network communication overhead was proposed.The improved label propagation algorithm intelligently subnets and selects agent monitoring nodes to achieve efficient monitoring of resource and virtual function status and minimize monitoring information communication overhead.The simulation results show that the monitoring strategy proposed reduces the monitoring information communication overhead in the network by about 13%.…”
    Get full text
    Article
  19. 10619

    XOR-FREE Implementation of Convolutional Encoder for Reconfigurable Hardware by Gaurav Purohit, Kota Solomon Raju, Vinod Kumar Chaubey

    Published 2016-01-01
    “…This paper presents a novel XOR-FREE algorithm to implement the convolutional encoder using reconfigurable hardware. …”
    Get full text
    Article
  20. 10620

    Particle filtering based semi-blind estimation for MIMO-OFDM time-varying channel by JING Yuan, YIN Fu-liang, ZENG Shuo

    Published 2007-01-01
    “…A semi-blind channel estimation method based on the particle filtering was proposed for the MIMO-OFDM wireless communication system.By optimizing the particles distribution locally,the traditional particle filtering algorithm was modified,and a local optimized particle filtering was proposed.This local optimized particle filtering can achieve the low MSE,and improve the precision of the MIMO-OFDM time-varying channel estimation.Since this method was per-formed in frequency domain,it was not necessary to know(or estimate) the length of the channel.Compared with exist-ing approaches,the proposed method was more robust to the non-gauss distribution noise and the detection performance is nearly optimal.The simulation results show the effectiveness of the proposed method.…”
    Get full text
    Article