Showing 10,661 - 10,680 results of 19,511 for search '"algorithm"', query time: 0.09s Refine Results
  1. 10661

    Global Optimization for the Sum of Certain Nonlinear Functions by Mio Horai, Hideo Kobayashi, Takashi G. Nitta

    Published 2014-01-01
    “…We prove that this extension makes possible to solve the following nonconvex optimization problems which Pei-Ping and Gui-Xia, 2007, cannot solve, that the sum of the positive (or negative) first and second derivatives function with the variable defined by sum of polynomial fractional function by using branch and bound algorithm.…”
    Get full text
    Article
  2. 10662

    Research on caching strategy based on transmission delay in Cell-Free massive MIMO systems by Rui WANG, Min SHEN, Yun HE, Xiangyan LIU

    Published 2021-12-01
    “…To meet the ultra-low latency and ultra-high reliability requirements of users in the future mobile Internet, the wireless caching technology was combined with Cell-Free massive MIMO systems.The caching model was designed based on AP cooperative caching and regional popularity evaluation.The transmission delay expression involving AP clustering, cooperative caching, and regional popularity was derived, and the content placement problem was expressed as total content transmission delay minimization.Through the demonstration of the NP-hard and submodular monotony of the optimization problem, the greedy algorithm-based optimization strategy was proposed.Simulation results show that the proposed strategy can effectively reduce the content transmission delay and improve the cache hit rate.…”
    Get full text
    Article
  3. 10663

    Global Optimization for Bus Line Timetable Setting Problem by Qun Chen

    Published 2014-01-01
    “…For such a multistage decision problem, this paper designed a dynamic programming algorithm to solve it. Global optimization procedures using dynamic programming are developed. …”
    Get full text
    Article
  4. 10664

    Radio tomographic imaging localization method based on the improved ellipse weight model by Li LI, Wei KE, Hengkuan XU, Kunliang YU, Yanli WANG

    Published 2018-12-01
    “…Meanwhile, a foreground detection algorithm based on the cross model was proposed to reduce the impact of background noises and pseudo-targets, thereby further improving the imaging quality. …”
    Get full text
    Article
  5. 10665

    Fault tolerance of balanced hypercubes by Xin-xin ZHANG, Li XU, Li-mei LIN

    Published 2017-09-01
    “…Fault tolerance is one of the important ways to measure the reliability of multiprocessor interconnection networks.g-restricted edge connectivity and g-restricted connectivity can ensure every remaining component is disconnected ,the number of neighbors of vertex is no less than g,which can measure the fault tolerance and reliability of multiprocessor and multichannel system more accurately.Balanced hypercubes is a variant of the hypercube,which has some specific topological properties,it can better meet the needs of the multiprocessor system and many new networks.The {1,2}-restricted edge connectivity and the {1,2}-restricted connectivity of balanced hypercubes were proposed,which could enrich the evaluation system of network fault tolerance and reliability in balanced hypercubes topology and it laid a good foundation for the fault diagnosis algorithm of balances hypercube.…”
    Get full text
    Article
  6. 10666

    Anomaly detection of large scale network based on data streams by ZHENG Jun, HU Ming-zeng, YUN Xiao-chun, ZHENG Zhong

    Published 2006-01-01
    “…The anomaly detection algorithms of the large scale network(LSN) were required to analysis the vast network traffic of G bit level in real-time and on-the-fly.A novel monitoring mechanism of LSN anomaly detection based on the data stream approach was proposed.The main contributions included: the sketch data structure and the frequent sketch algorithm of data streams were designed for anomaly detection of LSN.Optimized query methods were designed for customizing the security monitoring and detection policy with the correlations of multi data streams.The data reduction was proposed to make it possible that the whole network traffic character could be got using a few of special data streams.The experiments of the real networking environments validate the effectivity of LSN anomaly detection methods.…”
    Get full text
    Article
  7. 10667

    RFID dynamic positioning method by Cheng LI, Song-rong QIAN

    Published 2013-04-01
    “…,the time of arrival (TOA) or the received signal strength indication (RSSI),it improved the accuracy of positioning target based on reference tags and a moving reader.The algorithm was simple but useful.Based on the performance of the prototype system,it demonstrated that the proposed system could accurately position in one of the smallest reference tag cell (within dozens of centimeters) and could be deployed easily with low cost,thus has potential application in RFID warehouse management.…”
    Get full text
    Article
  8. 10668

    Research on dynamic traffic control strategy of IoT cloud service by Qineng LING, Yichuan WANG, Jiabing YANG, Kan ZHENG

    Published 2018-12-01
    “…Flow control is very important to ensure quality of service in cloud service system.A dynamic two-level flow control strategy was proposed.Using the improved minimum connection number algorithm based on the actual cloud service system,the integrated load of the service node was calculated,load balancing was performed on each service node and the load was distributed reasonably.Within the service node,a dynamic hierarchical threshold adjustment strategy was proposed to control traffic dynamically.The actual cloud service system performance test shows that with the dynamic two-level flow control strategy,the RPS of the service node is significantly better than the RPS without the strategy,and the resource utilization of the service node is improved.…”
    Get full text
    Article
  9. 10669

    Design, Simulation, and Optimization of an Irregularly Shaped Microstrip Patch Antenna for Air-to-Ground Communications by L. A. R. Ramirez, J. C. A. Santos

    Published 2017-01-01
    “…The process started with the design of a rectangular patch antenna with the traditional transmission line and cavity methods, followed by a simulation with the finite-difference time-domain method (FDTD) in conjunction with a genetic algorithm (GA). The aim of the study was to design an efficient patch antenna. …”
    Get full text
    Article
  10. 10670

    Modeling the distance error and performance analysis in IR-UWB positioning system by MENG Jing1, ZHANG Qin-yu1, ZHANG Nai-tong12, CHEN Ping2, LIU Ning-ning3

    Published 2011-01-01
    “…The multipath and NLOS distance errors in indoor positioning due to the propagation characteristics of IR-UWB were analyzed,based on the coherent TOA ranging algorithm.Utilized the statistical information of IEEE 802.15.4a channel model,the multipath error was modeled in terms of system bandwidth in both LOS and NLOS envi-ronment.And the NLOS extra distance error was derived in terms of obstacle thickness,transceiver distance and the in-cidence angle as the IR-UWB signal propagated through walls.The positioning performance via triangulation was ana-lyzed as given the prior information of the NLOS distance error in completely NLOS environment.…”
    Get full text
    Article
  11. 10671

    Research on Tooth Wear Testing Technology of Face Gears Based on Reverse Engineering by Zhang Jun, Li Fangfang, Wang Yanzhong

    Published 2022-11-01
    “…According to the measurement principle, the conversion matrix of the measuring coordinates is deduced; by measuring the tooth profile deviation and with the error compensation algorithm, the compensation point of the measuring point is obtained and the control equation of NURBS surface fitting is presented; a test bench is built, and an example operation is carried out to compare and analyze the standard tooth surface and the worn surface. …”
    Get full text
    Article
  12. 10672

    APPLICATION RESEARCH OF HIGH STRENGTH STEEL TO COMMERCIAL VEHICLE FRONTAL IMPACT SAFETY DESIGN by LEI Fei, LI GuiTao, XIE XiaoPing

    Published 2017-01-01
    “…Firstly the global sensitivity analysis was carried out to choose the prominent parts,then their material were changed into HSS,the optimization was conducted by employing NAGA- Ⅱ algorithm with their thickness chosen as design variables. …”
    Get full text
    Article
  13. 10673

    Performance evaluation of primary user and secondary user based on CSMA protocol in CRSN by Ying LIU, Li ZHENG, Yuansong LI

    Published 2016-04-01
    “…For the problem of uncertainty owing to the highly variable physical layer characteristics in cognitive radio sensor networks(CRSN),two fundamental performance metrics(bandwidth and delay)were formulated and the performance of medium access control protocol based on CSMA was analyzed. Firstly,CSMA algorithm was used to estimate potential bandwidth of secondary user under the given PU traffic model. …”
    Get full text
    Article
  14. 10674

    Design of full-connected hybrid precoding based on an equivalent channel in millimeter-wave massive MIMO system by Haiyan CAO, Zhiyao MA, Yingjuan ZHI, Renqing LIU, Fangmin XU, Xin FANG

    Published 2021-01-01
    “…In order to improve the performance of hybrid precoding scheme based on fully connected structure in millimeter-wave massive MIMO system, a hybrid precoding scheme based on an equivalent channel with two-step design method was proposed.Firstly, the equivalent channel was constructed by combining the analog precoding matrix at the transmitter, the analog combining matrix and the channel matrix at the receiver, and the analog part of the transceiver was designed to maximize the equivalent channel gain.Furthermore, the least squares criterion was applied to derive the digital precoding matrix and the digital combination matrix column by column to design the digital part of the transceiver.Simulation results show that the proposed algorithm can approximate the optimal digital precoding scheme and has lower complexity and stronger fault tolerance.…”
    Get full text
    Article
  15. 10675

    An Energy-Efficient Collaborative Target Tracking Framework in Distributed Wireless Sensor Networks by Lin Shang, Kang Zhao, Zhengguo Cai, Dan Gao, Maolin Hu

    Published 2014-07-01
    “…The proposed fusion algorithm is based on neural network aggregation model and Gaussian particle filtering (GPF) estimation. …”
    Get full text
    Article
  16. 10676

    Pairing-free equality test over short ciphertexts by Huijun Zhu, Licheng Wang, Haseeb Ahmad, Xinxin Niu

    Published 2017-06-01
    “…Moreover, we simplify the encryption algorithm, as well as reduce the ciphertext storage space.…”
    Get full text
    Article
  17. 10677

    IMPROVEMENT OF TECHNOLOGY OF SALES ON THE BASIS OF USE OF MECHANISMS OF SEARCH OPTIMIZATION by N. Kazakova, L. Mikhailova, A. Sazonov

    Published 2019-03-01
    “…The details of the process of drawing up an algorithm of search optimization of the website including necessary actions for carrying out internal and external optimization have been presented. …”
    Get full text
    Article
  18. 10678

    Study on Active and Passive Control of Order Vibration for Electric Vehicle Power Train by Yuanyuan Zhang, Peng Yu, Jian Wang

    Published 2020-05-01
    “…Secondly,in consideration of active control effect,the best gear modification parameters are obtained,transmission error volatility is reduced by joint optimization with elitist retention genetic algorithm and gear engagement finite element model. …”
    Get full text
    Article
  19. 10679

    Block ciphers identification scheme based on the distribution character of randomness test values of ciphertext by Yang WU, Tao WANG, Meng XING, Jin-dong LI

    Published 2015-04-01
    “…By researching deficiency of current encryption algorithms identification schemes,a block ciphers identification scheme is proposed based on the distribution character of randomness test values for ciphertext.Firstly,the numbers of randomness test values for AES,Camellia,DES,3DES,SMS4 are respectively calculated based on the frequency test,frequency test in block,run test and originally clustered by the k-means algorithm.Secondly,in order to identify the block ciphers in each clustering,the dimensions of eigenvectors to the frequency test,frequency test in block,run test are calculated on the principle of reducing the comparability between eigenvectors.Eventually,the experimental results of AES,Camellia,DES,3DES,SMS4 demonstrate that the proposed scheme effectively identified the above representative block ciphers,and the correlative research can promote the further encryption algorithms identification research.…”
    Get full text
    Article
  20. 10680

    Carrier frequency offsets estimation for distributed MIMO system based on SOMP method by Yanyan HUANG, Hua PENG

    Published 2018-08-01
    “…By utilizing the half invariant property of high-order cyclic cumulants,the equation of signals and its high-order cyclic cumulants was rederivated first.Then simultaneous orthogonal matching pursuit (SOMP) method was used to jointly reconstruct multiple receiving signals’ high-order cyclic cumulants.At last,according to the fourfold relationship between carrier frequency offsets and cyclic frequencies of main non-zeros high-order cyclic cumulants,multiple transmitting signals’ carrier frequency offsets were obtained.Comparing with existing algorithms,the correlation between receiving signals is fully used by the proposed algorithm,the carrier frequency offset estimation performance at low signal to noise is improved and the pilots numbers are reduced.…”
    Get full text
    Article