Showing 10,641 - 10,660 results of 19,511 for search '"algorithm"', query time: 0.10s Refine Results
  1. 10641

    Adaptive routing and wavelength assignment method based on SDN by Zhongnan ZHAO, Jian WANG, Hongwei GUO

    Published 2019-09-01
    “…Routing and wavelength assignment is an important resource allocation method of all-optical network.Aiming at the problem of traditional method combined with the new architecture,an adaptive multi-objective routing and wavelength assignment method based on SDN was proposed,which could realize the allocation of link resources of all-optical network through self-regulation.Based on the SDN service function chain model,service scheduling time and link service quality were taken as the scheduling objective,routing and wavelength assignment problem was constructed as the 0-1 integer programming problem,meanwhile,binary hybrid topology particle swarm optimization algorithm was used to optimize the network resources for optimal scheduling.The simulation results show that the proposed method is superior to the traditional classical algorithms in the test of recovery time,blocking rate and resource utilization.…”
    Get full text
    Article
  2. 10642

    Video steganalysis scheme based on weighted undirected graph by Ting DA, Zhi-tang LI

    Published 2014-10-01
    “…A new steganalysis scheme based on taking the inter-frame correlation as the undirected graph weights was proposed utilizing the temporal correlation among video frames.First,getting the eigenvector of every video frame brightness by calculating its gray-level co-occurrence matrix,the eigenvector is an eight-dimensional vector.Then,computing the weights of each video frame by using the euclide distance algorithm.The weighted undirected graph which representing the correlations between each frame is constructed.Finally,according to the change of correlations between the frames after embedding information determine whether the video is embedded confidential information.Experimental results show that the method using weighted undirected graph can quickly discriminate stego video and the original video,and have a high accuracy rate.…”
    Get full text
    Article
  3. 10643

    Approximate Solutions of Fisher's Type Equations with Variable Coefficients by A. H. Bhrawy, M. A. Alghamdi

    Published 2013-01-01
    “…Also the results demonstrate that the proposed method is powerful algorithm for solving the nonlinear partial differential equations.…”
    Get full text
    Article
  4. 10644

    Cooperative MIMO transmission scheme for clustered ad hoc networks by Wen-jiang FENG, Wei ZHAO, Dong WANG

    Published 2012-03-01
    “…The potential of cooperative multiple-input multiple-output (CMIMO) transmission was explored.An according CMIMO transmission scheme was proposed for clustered ad hoc networks,including two critical aspects.The first was weighted cooperative node selection algorithm,which synthesized the asymmetrical bi-directional channel state information (CSI) between nodes,as well as the nodes’ residual energy and connectivity.Consequently,a set of optimal nodes was selected to develop the CMIMO system mentioned above.The second was the mechanism of establishing and maintaining virtual link between two virtual nodes.Simulation shows that the proposed CMIMO transmission scheme affords higher capacity against SISO,and the scheme with node selection is more energy-efficient than that without node selection for the 70% energy saved.…”
    Get full text
    Article
  5. 10645

    Dynamic fair allocation of multi-resources based on shared resource quantity by Xiao-lu ZHANG, Xi LIU, Wei-dong LI, Xue-jie ZHANG

    Published 2016-07-01
    “…Finally, theoretical analysis and experiments demonstrate that this strategy can satisfy the demands as well as maximize the dominant share on the base of approaching fairness and the im-proved algorithm increases the allocation efficiency in the dynamic system.…”
    Get full text
    Article
  6. 10646

    New Exact Traveling Wave Solutions of Fractional Time Coupled Nerve Fibers via Two New Approaches by Saud Owyed

    Published 2021-01-01
    “…In this paper, we obtain new soliton solutions of one of the most important equations in biology (fractional time coupled nerve fibers) using two algorithm schemes, namely, exp−ψξ expansion function method and θ′ξ/θ2ξ expansion methods. …”
    Get full text
    Article
  7. 10647

    Rate distortion optimization based on saliency characteristic for HEVC intra coding by Jinlong LI, Fen CHEN, Zongju PENG, Gangyi JIANG, Mei YU

    Published 2017-10-01
    “…Although the perception based rate distortion optimization (RDO) and coding algorithms can improve subjective quality,they significantly decrease rate distortion performance.For the above questions,a saliency-based RDO method was proposed.Firstly,according to the relation between rate distribution and saliency features of coding tree unit in HEVC,a priori saliency-rate model was designed.Furthermore,the initial parameters of the model were determined.Secondly,the rate difference minimization rate distortion model was proposed,and then a calculation method of the adaptive Lagrangian multiplier was derived from the model.Finally,update mechanism of model parameters was designed.Experimental results show that the proposed algorithm can improve the subjective quality while it maintains rate distortion performance.…”
    Get full text
    Article
  8. 10648

    Data processing based on the privacy-preserving vector for wireless sensor networks by Wei-ni ZENG, Ya-ping LIN, Ye-qing YI, Shi-ming HE, Peng CHEN

    Published 2015-09-01
    “…To solve the privacy disclosing problem during the data processing phase of wireless sensor networks,a dis-tributed mechanism was proposed.Privacy-preserving vector (vector for short) was constructed.Moreover,lightweight method for vector generation and novel method for using the vector were also presented.Thus,the methods were able to solve the privacy-preserving problem for various data processing funtions such as max/min and data compression effi-ciently.An algorithm based on data hiding and slice was given and then the vector was able to be generated securely and dynamically.Extensive analyses and experiments show that the mechanism is more robust to node compromise attack and thus can preserve privacy more efficiently.Moreover,the mechanism consumes less power.…”
    Get full text
    Article
  9. 10649

    On coding over the spatial-temporal diversity for reliable transmission scheme in low-duty-cycle WSN by Yu-bo YAN, Pan-long YANG, Lei ZHANG, Zheng-lun QIU, Shan-lin HONG

    Published 2012-06-01
    “…A reliable data delivery scheme for low-duty-cycle wireless sensor networks(WSN)was proposed.Using this scheme,the unique spatial-temporal diversity in low-duty-cycle WSN was explored and exploited.Combining with coding schemes,the proposed scheme could achieve higher energy efficiency and lower delivery delay.The coding block allocation problem over multiple paths was formulated.As it was NP-hard,an approximate algorithm to tackle this difficulty was proposed.The impact of network parameters was further analyzed with experimental methods.Extensive simulations also show that,the coding over the spatial-temporal diversity scheme could achieve relatively reliable and low delay delivery with relatively less energy.…”
    Get full text
    Article
  10. 10650

    Prediction of China’s Express Business Volume Based on FGM (1, 1) Model by Chunyan Xiong, Liusan Wu

    Published 2021-01-01
    “…Based on the data of China’s express business volume from 2015 to 2019, this paper uses the improved Particle Swarm Optimization algorithm to calculate the fractional-order r of the FGM (1, 1) model and forecasts China’s express business volume from 2020 to 2023. …”
    Get full text
    Article
  11. 10651

    New Convergence Properties of the Primal Augmented Lagrangian Method by Jinchuan Zhou, Xunzhi Zhu, Lili Pan, Wenling Zhao

    Published 2011-01-01
    “…Different convergence results are discussed dependent on whether the iterative sequence {xk} generated by algorithm is convergent or divergent. Furthermore, under certain convexity assumption, we show that every accumulation point of {xk} is either a degenerate point or a KKT point of the primal problem. …”
    Get full text
    Article
  12. 10652

    Beamforming Technology of LEO Satellite in Satellite-Terrestrial Integrated Network by Zhiyong LUO, Ning XIN, Shaohui SUN

    Published 2022-12-01
    “…Because of the difference between satellite-ground link and ground propagation loss characteristics, the spectrum effi ciency index of satellite communication system is far lower than that of terrestrial cellular system in the same period.It is of utility to improve spectral effi ciency by realizing effi cient space division multiplexing with multi-beam antennas.The adaptive beamforming and doppler frequency off set compensation scheme in the LEO multi-beam satellite communication scenario was studied.Firstly, a low-complexity hybrid beamforming scheme was designed.Then, aim at the doppler frequency shifts were diff erent between beams due to their pitch angles, a doppler frequency off set pre-compensation scheme for multi-beam systems was proposed.Finally, the eff ectiveness of the algorithm was verifi ed by MATLAB simulation analysis.…”
    Get full text
    Article
  13. 10653

    Underdetermined blind source separation based on null-space representation and maximum likelihood by Rong-jie WANG, Yi-ju ZHAN, Hai-feng ZHOU

    Published 2012-03-01
    “…Aiming to the estimation of source numbers,mixing mat ix and source signals under underdetermined case,and a method of underdetermined blind source separation with an unknown number of sources was proposed.Firstly,an algorithm based on S transforms and clustering technology was introduced to estimate the number of sources and mixing mixtures.Then sources were represented as null space form,the recovery of source signals usi a method based on maximum likelihood.The simulation results show that the proposed method can separate sources of super-Gaussian distribution and sub-Gaussian distribution,and compared to other conventional algorithms,estimated mixing matrix and separated sources with higher accuracy.…”
    Get full text
    Article
  14. 10654

    Application of Image Reconstruction Based on Inverse Radon Transform in CT System Parameter Calibration and Imaging by Chun-li Wang, Hao-chi Zhang, Ze-yu Zeng, Jun-hui Yu, Yang Wang

    Published 2021-01-01
    “…According to the requirements of CT system parameter calibration and imaging, using OpenCV and MATLAB software, the reverse Radon transform and the Canny edge detection algorithm in the projection edge methods can determine the position and geometry of two different media in the square tray based on given data. …”
    Get full text
    Article
  15. 10655

    TDMA-based user scheduling policies for federated learning by Meixia TAO, Dong WANG, Rui SUN, Naifu ZHANG

    Published 2021-06-01
    “…To improve the communication efficiency in FL (federated learning), for the scenario with heterogeneous edge user's computing capacity and channel state, a class of time division multiple access (TDMA) based user scheduling policies were proposed for FL.The proposed policies aim to minimize the system delay in each round of model training subject to a given sample size constraint required for computing in each round.In addition, the convergence rate of the proposed scheduling algorithms was analyzed from a theoretical perspective to study the tradeoff between the convergence performance and the total system delay.The selection of the optimal batch size was further analyzed.Simulation results show that the convergence rate of the proposed algorithm is at least 30% higher than all the considered benchmarks.…”
    Get full text
    Article
  16. 10656

    INCREMENTAL HARMONIC BALANCE METHOD FOR THE STUDY OF SUPPORT LOOSENESS FAULT’S CHARACTERISTICS by CAO QingSong, XIANG Qin, XIONG GuoLiang

    Published 2015-01-01
    “…Incremental harmonic balance method was exploited to solve the nonlinear equation,and iterative algorithm was applied to gain the vibration periodic solution. …”
    Get full text
    Article
  17. 10657

    Support vector machine based fast Monte Carlo reliability evaluation method for composite power system by Yuxiao LEI, Gengfeng LI, Yuxiong HUANG, Zhaohong BIE

    Published 2019-06-01
    “…A fast Monte Carlo reliability evaluation method for composite power system based on support vector machine (SVM) was proposesd.Firstly,sample data for training the SVM model was obtained by enumerating component failures and calculating the corresponding minimum load shedding.Then,the SVM algorithm was used to mine the nonlinear mapping relationship between component failures and minimum load shedding,and the minimum load shedding estimation model was trained.Finally,the model was combined with the Monte Carlo simulation.By randomly sampling component states,for each state,the estimation model obtained by the training directly gave the minimum load shedding,thereby achieving a rapid assessment of the reliability of the composite power system.The proposed method is applied to the IEEE RTS 79 system,which verifies its effectiveness.…”
    Get full text
    Article
  18. 10658

    A feature selection method based on instance learning and cooperative subset search by Xiaoyuan XU, Li HUANG

    Published 2017-06-01
    “…Feature subset selection is a key problem in such data mining classification tasks.In practice,the filter methods ignore the correlations between genes which are prevalent in gene expression data,additionally,existing methods are not specially conceived to handle the small sample size of the data which is one of the main causes of feature selection instability.In order to deal with these issues,a new hybrid,filter wrapper was proposed,and a cooperative subset search(CSS),was then researched with a classifier algorithm to represent an evaluation system of wrappers.The method was experimentally tested and compared with state-of-the-art algorithms based on several high-dimension allow sample size cancer data sets.Results show that the proposed approach outperforms other methods in terms of accuracy and stability of the selected subset.…”
    Get full text
    Article
  19. 10659

    Research on Loaded Transmission Error of Internal Short Tooth Spur Gears by Yin Xunmin, Jia Haitao, Zhang Xijin

    Published 2023-06-01
    “…A modification optimization method for internal short tooth spur gear pairs is investigated using the particle swarm algorithm. The research results lay a foundation for improving the meshing performance of internal short tooth spur gears.…”
    Get full text
    Article
  20. 10660

    Mining Alarm Association Rules Based on Comprehensive Related Confidence by Huisheng Gao, Yingmin Li

    Published 2014-10-01
    “…The traditional association rules mining algorithms preferred to applying single sliding time window, and the mined alarm association rules were high support-high confidence. …”
    Get full text
    Article