-
10681
Analysis of Fractional Differential Equations with the Help of Different Operators
Published 2022-01-01“…The obtained results demonstrate that the algorithm is very real, simple to apply, and effective in investigating the nature of complicated nonlinear models in science and engineering.…”
Get full text
Article -
10682
Prolonged QT Syndrome in a 27-Year-Old Female Presenting as a Cardiac Arrest after Elective Surgery
Published 2014-01-01“…Cardiac arrest is a true medical emergency and clinicians should base the management on American Heart Association advanced cardiac life support algorithm. The potential triggers of cardiac arrest should be sought. …”
Get full text
Article -
10683
CNN-Based Channel Estimation Method for OTFS System in Satellite-Ground Scenario
Published 2022-09-01“…Orthogonal time frequency space (OTFS) is fully applied in high Doppler communication scenarios due to its good Doppler frequency bias and time delay adaptability.The channel estimation methods for OTFS systems have shortcomings such as high complexity and poor BER performance.A CNN-based channel estimation method for OTFS systems in the terrestrial-satellite scenario using a convolutional neural network (CNN) approach was proposed.Simulation results showed that the deep learning-based method outperformed the conventional method in terms of algorithm complexity and BER in the terrestrial-satellite scenario, thus demonstrating that deep learning is a promising tool for channel estimation in OTFS systems.…”
Get full text
Article -
10684
Certificateless strong designated verifier multi-signature
Published 2016-06-01“…,the definition and security model for certificateless strong designated verifier multi-signature were proposed.Then,the first certificateless strong designated verifier multi-signature scheme from bilinear pairings was constructed and it was proved that the scheme is existentially unforgeable under the computational bilinear Diffie-Hellman assumption and the computational Diffie-Hellman assumption.Moreover,the scheme meets the properties of both strong designated verifier signatures and multi-signatures.The scheme achieves high efficiency since the length of designated verifier multi-signature generated by the scheme is only 160 bits and the computational cost of bilinear pairings necessary for verification algorithm is constant,i.e.,one bilinear pairing.So,it can be applied in wireless networks of the limited computing resources and network bandwidth.…”
Get full text
Article -
10685
Implementation of Surface Radiation and Fluid-Structure Thermal Coupling in Atmospheric Reentry
Published 2012-01-01“…A model that takes into account the radiation reflected by the surface is developed and implemented in a solid solver. A partitioned algorithm performs the coupling between the fluid and the solid thermal fields. …”
Get full text
Article -
10686
Uniqueness of the Level Two Bayesian Network Representing a Probability Distribution
Published 2011-01-01“…Given a Bayesian network over a family 𝐼 of random variables, this paper presents a result on the computation of the probability distribution of a subset 𝑆 of 𝐼 using separately a computation algorithm and D-separation properties. It also shows the uniqueness of the obtained result.…”
Get full text
Article -
10687
PriQoS:priority-differentiated flow control mechanism based on SDN
Published 2017-02-01“…It was difficult to meet the increasing demand of quality of service (QoS) for the best-effort IP network,so it was urgent to develop a kind of QoS control mechanism that was compatible with the existing IP software and hardware resources.Therefore,a priority-differentiated control mechanism based on the software defined networking called PriQoS was proposed.When the network resource was scarce,a multi-queue bandwidth allocation algorithm based on the inte-grated priority of service flow was used to meet the bandwidth requirement with high priority flows.PriQoS was deployed on the network edge,which was no need to modify applications in the end systems and routers in the core network.The mechanism has advantages such as easy to deploy and being compatible with the IP applications and devices.Experimental results show that the PriQoS mechanism can guarantee the QoS of higher priority services.…”
Get full text
Article -
10688
THE EEMD-RA-KU METHOD ON DIAGNOSIS OF BEARING FAULT
Published 2016-01-01“…Aiming at the impact feature in fault signals of the rolling bearings,The improved algorithm diagnosis method EEMD-RA-KU was proposed to capture the impact feature. …”
Get full text
Article -
10689
RESEARCH ON STRESS ANALYSIS OF PINNED CONNECTION BASED ON PHOTOELASTIC EXPERIMENT
Published 2016-01-01“…Based on the results of pinned connection in the tension plate,Setting algorithm parameters of finite element,the results can be used as a reference in the designing and checking of pinned connection.…”
Get full text
Article -
10690
Survey on cluster-based routing protocols for cognitive radio sensor networks
Published 2018-11-01“…Routing protocols could achieve efficient convergecast transmission of sensed data in cognitive radio sensor network (CRSN),and it is of vital importance for the whole network performance.In particular,cluster-based routing protocols could further lower routing selection complexity and improve scalability.Therefore,an overview of cluster-based routing protocols for CRSN was provided.Firstly,after a brief introduction to the concept and advantages of clustering in CRSN,the major factors concerning clustering algorithm design were pointed out.Secondly,the challenges faced by routing protocol design in CRSN and basic design principles were explored.Thirdly,the previous work of cluster-based routing protocols for CRSN was systematically analyzed and summarized.Finally,issues that require urgent solutions and future research directions were suggested.…”
Get full text
Article -
10691
Determination of fracture toughness in plain concrete specimens by R curve
Published 2019-07-01“…Experimental tests and computational algorithm are implemented to investigate crack growth phenomena in C0.7 concrete. …”
Get full text
Article -
10692
PHOTOEMISSION METHOD OF TEMPERATURE MEASURING IN THE PROCESS OF SPARK PLASMA SINTERING POWDERS OF REFRACTORY METALS
Published 2015-04-01“…Construction and algorithm of the photoemission pyrometer based on a photomultiplier are outlined; the calibration procedure is set out. …”
Get full text
Article -
10693
Multiuser computation offloading for edge-cloud collaboration using submodular optimization
Published 2020-10-01“…A computation offloading scheme based on edge-cloud computing was proposed to improve the system utility of multiuser computation offloading.This scheme improved the system utility while considering the optimization of edge-cloud resources.In order to tackle the problems of computation offloading mode selection and edge-cloud resource allocation,a greedy algorithm based on submodular theory was developed by fully exploiting the computing and communication resources of cloud and edge.The simulation results demonstrate that the proposed scheme effectively reduces the delay and energy consumption of computing tasks.Additionally,when computing tasks are offloaded to edge and cloud from devices,the proposed scheme still maintains stable system utilities under ultra-limited resources.…”
Get full text
Article -
10694
Energy-saving scheme supporting ONU modularization with independent-discontinuous transceiving
Published 2015-07-01“…To effectively solve the contradiction between energy-saving and packet delay performance in green passive optical network,an energy-saving scheme supporting ONU modularization with independent-discontinuous transceiving is proposed.Utilizing the technology of optical network unit modularization,each module could switch to sleep or awake mode independently and transmit data in specified time slots discontinuously.Simultaneously,to enhance the quality of service of the overall network,the real-time packets are transmitted in the first sub-cycle based on the sub-cycle division strategy.Furthermore,an independent bandwidth allocation algorithm is proposed,which makes the scheme have more advantages in the asymmetric network traffic scenarios.Simulation results verify that the proposed scheme further reduce the network energy consumption on the premise of guarantee the packet delay.…”
Get full text
Article -
10695
Approximate Analytical Solution for a Coupled System of Fractional Nonlinear Integrodifferential Equations by the RPS Method
Published 2020-01-01“…In this work, a modified residual power series method is implemented for providing efficient analytical and approximate solutions for a class of coupled system of nonlinear fractional integrodifferential equations. The proposed algorithm is based on the concept of residual error functions and generalized power series formula. …”
Get full text
Article -
10696
Convolutive blind source separation method based on tensor decomposition
Published 2021-08-01“…A convolutive blind source separation algorithm was proposed based on tensor decomposition framework, to address the estimation of mixed filter matrix and the permutation alignment of frequency bin simultaneously.Firstly, the tensor models at all frequency bins were constructed according to the estimated autocorrelation matrix of the observed signals.Secondly, the factor matrix corresponding to each frequency bin was calculated by tensor decomposition technique as the estimated mixed filter matrix for that bin.Finally, a global optimal permutation strategy with power ratio as the permutation alignment measure was adopted to eliminate the permutation ambiguity in all the frequency bins.Experimental results demonstrate that the proposed method achieves better separation performance than other existing algorithms when dealing with convolutive mixed speech under different simulation conditions.…”
Get full text
Article -
10697
Analysis and Discussion on Group Mobility Model in Ubiquitous Network
Published 2013-10-01“…Research on group mobility models has an important effect on the design of communication protocols,the evaluation of algorithm performance and other issues in the ubiquitous network.In the ubiquitous network,a variety of terminals provide certain service for users at the same time,and how to integrate terminal capacity effectively need good group mobility model.The characteristics and suitable scenes of the various group mobility models for Ad Hoc network in the past were summarized,and taking the environment of multiple terminals and multiple networks working for the same goal into consideration,the implementation scheme of group mobility model in the scene of personal service was discussed based on the experience of users,the key technical requirements were also proposed.…”
Get full text
Article -
10698
A Shifted Jacobi-Gauss Collocation Scheme for Solving Fractional Neutral Functional-Differential Equations
Published 2014-01-01“…Numerical results demonstrate the accuracy, and versatility of the proposed algorithm.…”
Get full text
Article -
10699
Spatial error concealment method based on tensor voting
Published 2011-01-01“…As the existing spatial error concealment algorithms is lack of the recovery accuracy in complex texture areas,a spatial error concealment method based on tensor voting was proposed,which extracted structural information by using tensor voting.On this basis,an improved spatial error concealment algorithm which combined with the traditional algo-rithms was further proposed.Firstly the lost marc blocks were classified into three categories,and then the appropriate concealment method was chose to recover the lost macro blocks according to the type of lost macro blocks.Experimental results show that the proposed method improves the recovery accuracy effectively and avoids the edge disorder phe-nomenon,especially in the region with more complex texture,the subjective and objective quality of concealed image is improved greatly.…”
Get full text
Article -
10700
Development of a Wearable-Sensor-Based Fall Detection System
Published 2015-01-01“…The system monitors the movements of human body, recognizes a fall from normal daily activities by an effective quaternion algorithm, and automatically sends request for help to the caregivers with the patient’s location.…”
Get full text
Article