Showing 10,681 - 10,700 results of 19,511 for search '"algorithm"', query time: 0.12s Refine Results
  1. 10681

    Analysis of Fractional Differential Equations with the Help of Different Operators by Naveed Iqbal, Moteb Fheed Saad Al Harbi, Saleh Alshammari, Shamsullah Zaland

    Published 2022-01-01
    “…The obtained results demonstrate that the algorithm is very real, simple to apply, and effective in investigating the nature of complicated nonlinear models in science and engineering.…”
    Get full text
    Article
  2. 10682

    Prolonged QT Syndrome in a 27-Year-Old Female Presenting as a Cardiac Arrest after Elective Surgery by Aibek E. Mirrakhimov, Prakruthi Voore, Alaa M. Ali

    Published 2014-01-01
    “…Cardiac arrest is a true medical emergency and clinicians should base the management on American Heart Association advanced cardiac life support algorithm. The potential triggers of cardiac arrest should be sought. …”
    Get full text
    Article
  3. 10683

    CNN-Based Channel Estimation Method for OTFS System in Satellite-Ground Scenario by Cheng GUO, Le YU, Lidong ZHU

    Published 2022-09-01
    “…Orthogonal time frequency space (OTFS) is fully applied in high Doppler communication scenarios due to its good Doppler frequency bias and time delay adaptability.The channel estimation methods for OTFS systems have shortcomings such as high complexity and poor BER performance.A CNN-based channel estimation method for OTFS systems in the terrestrial-satellite scenario using a convolutional neural network (CNN) approach was proposed.Simulation results showed that the deep learning-based method outperformed the conventional method in terms of algorithm complexity and BER in the terrestrial-satellite scenario, thus demonstrating that deep learning is a promising tool for channel estimation in OTFS systems.…”
    Get full text
    Article
  4. 10684

    Certificateless strong designated verifier multi-signature by Hong-zhen DU, Qiao-yan WEN

    Published 2016-06-01
    “…,the definition and security model for certificateless strong designated verifier multi-signature were proposed.Then,the first certificateless strong designated verifier multi-signature scheme from bilinear pairings was constructed and it was proved that the scheme is existentially unforgeable under the computational bilinear Diffie-Hellman assumption and the computational Diffie-Hellman assumption.Moreover,the scheme meets the properties of both strong designated verifier signatures and multi-signatures.The scheme achieves high efficiency since the length of designated verifier multi-signature generated by the scheme is only 160 bits and the computational cost of bilinear pairings necessary for verification algorithm is constant,i.e.,one bilinear pairing.So,it can be applied in wireless networks of the limited computing resources and network bandwidth.…”
    Get full text
    Article
  5. 10685

    Implementation of Surface Radiation and Fluid-Structure Thermal Coupling in Atmospheric Reentry by Ojas Joshi, Pénélope Leyland

    Published 2012-01-01
    “…A model that takes into account the radiation reflected by the surface is developed and implemented in a solid solver. A partitioned algorithm performs the coupling between the fluid and the solid thermal fields. …”
    Get full text
    Article
  6. 10686

    Uniqueness of the Level Two Bayesian Network Representing a Probability Distribution by Linda Smail

    Published 2011-01-01
    “…Given a Bayesian network over a family 𝐼 of random variables, this paper presents a result on the computation of the probability distribution of a subset 𝑆 of 𝐼 using separately a computation algorithm and D-separation properties. It also shows the uniqueness of the obtained result.…”
    Get full text
    Article
  7. 10687

    PriQoS:priority-differentiated flow control mechanism based on SDN by Zhi SUN, Ming CHEN

    Published 2017-02-01
    “…It was difficult to meet the increasing demand of quality of service (QoS) for the best-effort IP network,so it was urgent to develop a kind of QoS control mechanism that was compatible with the existing IP software and hardware resources.Therefore,a priority-differentiated control mechanism based on the software defined networking called PriQoS was proposed.When the network resource was scarce,a multi-queue bandwidth allocation algorithm based on the inte-grated priority of service flow was used to meet the bandwidth requirement with high priority flows.PriQoS was deployed on the network edge,which was no need to modify applications in the end systems and routers in the core network.The mechanism has advantages such as easy to deploy and being compatible with the IP applications and devices.Experimental results show that the PriQoS mechanism can guarantee the QoS of higher priority services.…”
    Get full text
    Article
  8. 10688

    THE EEMD-RA-KU METHOD ON DIAGNOSIS OF BEARING FAULT by WU GuangHe, DING JianMing, LIN JianHui, ZHAO QiuYuan

    Published 2016-01-01
    “…Aiming at the impact feature in fault signals of the rolling bearings,The improved algorithm diagnosis method EEMD-RA-KU was proposed to capture the impact feature. …”
    Get full text
    Article
  9. 10689

    RESEARCH ON STRESS ANALYSIS OF PINNED CONNECTION BASED ON PHOTOELASTIC EXPERIMENT by QU FuZheng, WANG Qi, ZHANG ChunGuang, PAN DeGuo, XIE ZhengYi

    Published 2016-01-01
    “…Based on the results of pinned connection in the tension plate,Setting algorithm parameters of finite element,the results can be used as a reference in the designing and checking of pinned connection.…”
    Get full text
    Article
  10. 10690

    Survey on cluster-based routing protocols for cognitive radio sensor networks by Jihong WANG, Wenxiao SHI

    Published 2018-11-01
    “…Routing protocols could achieve efficient convergecast transmission of sensed data in cognitive radio sensor network (CRSN),and it is of vital importance for the whole network performance.In particular,cluster-based routing protocols could further lower routing selection complexity and improve scalability.Therefore,an overview of cluster-based routing protocols for CRSN was provided.Firstly,after a brief introduction to the concept and advantages of clustering in CRSN,the major factors concerning clustering algorithm design were pointed out.Secondly,the challenges faced by routing protocol design in CRSN and basic design principles were explored.Thirdly,the previous work of cluster-based routing protocols for CRSN was systematically analyzed and summarized.Finally,issues that require urgent solutions and future research directions were suggested.…”
    Get full text
    Article
  11. 10691

    Determination of fracture toughness in plain concrete specimens by R curve by Chbani Hamza, Saadouki Bouchra, Barakat Mohamed

    Published 2019-07-01
    “…Experimental tests and computational algorithm are implemented to investigate crack growth phenomena in C0.7 concrete. …”
    Get full text
    Article
  12. 10692

    PHOTOEMISSION METHOD OF TEMPERATURE MEASURING IN THE PROCESS OF SPARK PLASMA SINTERING POWDERS OF REFRACTORY METALS by D. V. Minko, O. O. Kuznechik

    Published 2015-04-01
    “…Construction and algorithm of the photoemission pyrometer based on a photomultiplier are outlined; the calibration procedure is set out. …”
    Get full text
    Article
  13. 10693

    Multiuser computation offloading for edge-cloud collaboration using submodular optimization by Bing LIANG, Wen JI

    Published 2020-10-01
    “…A computation offloading scheme based on edge-cloud computing was proposed to improve the system utility of multiuser computation offloading.This scheme improved the system utility while considering the optimization of edge-cloud resources.In order to tackle the problems of computation offloading mode selection and edge-cloud resource allocation,a greedy algorithm based on submodular theory was developed by fully exploiting the computing and communication resources of cloud and edge.The simulation results demonstrate that the proposed scheme effectively reduces the delay and energy consumption of computing tasks.Additionally,when computing tasks are offloaded to edge and cloud from devices,the proposed scheme still maintains stable system utilities under ultra-limited resources.…”
    Get full text
    Article
  14. 10694

    Energy-saving scheme supporting ONU modularization with independent-discontinuous transceiving by Yu XIONG, Jian-jun GUAN, Ru-yan WANG

    Published 2015-07-01
    “…To effectively solve the contradiction between energy-saving and packet delay performance in green passive optical network,an energy-saving scheme supporting ONU modularization with independent-discontinuous transceiving is proposed.Utilizing the technology of optical network unit modularization,each module could switch to sleep or awake mode independently and transmit data in specified time slots discontinuously.Simultaneously,to enhance the quality of service of the overall network,the real-time packets are transmitted in the first sub-cycle based on the sub-cycle division strategy.Furthermore,an independent bandwidth allocation algorithm is proposed,which makes the scheme have more advantages in the asymmetric network traffic scenarios.Simulation results verify that the proposed scheme further reduce the network energy consumption on the premise of guarantee the packet delay.…”
    Get full text
    Article
  15. 10695

    Approximate Analytical Solution for a Coupled System of Fractional Nonlinear Integrodifferential Equations by the RPS Method by Ayed Al e’damat

    Published 2020-01-01
    “…In this work, a modified residual power series method is implemented for providing efficient analytical and approximate solutions for a class of coupled system of nonlinear fractional integrodifferential equations. The proposed algorithm is based on the concept of residual error functions and generalized power series formula. …”
    Get full text
    Article
  16. 10696

    Convolutive blind source separation method based on tensor decomposition by Baoze MA, Tianqi ZHANG, Zeliang AN, Pan DENG

    Published 2021-08-01
    “…A convolutive blind source separation algorithm was proposed based on tensor decomposition framework, to address the estimation of mixed filter matrix and the permutation alignment of frequency bin simultaneously.Firstly, the tensor models at all frequency bins were constructed according to the estimated autocorrelation matrix of the observed signals.Secondly, the factor matrix corresponding to each frequency bin was calculated by tensor decomposition technique as the estimated mixed filter matrix for that bin.Finally, a global optimal permutation strategy with power ratio as the permutation alignment measure was adopted to eliminate the permutation ambiguity in all the frequency bins.Experimental results demonstrate that the proposed method achieves better separation performance than other existing algorithms when dealing with convolutive mixed speech under different simulation conditions.…”
    Get full text
    Article
  17. 10697

    Analysis and Discussion on Group Mobility Model in Ubiquitous Network by Shuyuan Zhao, Jihong Zhao, Hua Qu

    Published 2013-10-01
    “…Research on group mobility models has an important effect on the design of communication protocols,the evaluation of algorithm performance and other issues in the ubiquitous network.In the ubiquitous network,a variety of terminals provide certain service for users at the same time,and how to integrate terminal capacity effectively need good group mobility model.The characteristics and suitable scenes of the various group mobility models for Ad Hoc network in the past were summarized,and taking the environment of multiple terminals and multiple networks working for the same goal into consideration,the implementation scheme of group mobility model in the scene of personal service was discussed based on the experience of users,the key technical requirements were also proposed.…”
    Get full text
    Article
  18. 10698

    A Shifted Jacobi-Gauss Collocation Scheme for Solving Fractional Neutral Functional-Differential Equations by A. H. Bhrawy, M. A. Alghamdi

    Published 2014-01-01
    “…Numerical results demonstrate the accuracy, and versatility of the proposed algorithm.…”
    Get full text
    Article
  19. 10699

    Spatial error concealment method based on tensor voting by GAN Nan, GONG Sheng-rong, WANG Zhao-hui, LIU Chun-ping, LIU Quan

    Published 2011-01-01
    “…As the existing spatial error concealment algorithms is lack of the recovery accuracy in complex texture areas,a spatial error concealment method based on tensor voting was proposed,which extracted structural information by using tensor voting.On this basis,an improved spatial error concealment algorithm which combined with the traditional algo-rithms was further proposed.Firstly the lost marc blocks were classified into three categories,and then the appropriate concealment method was chose to recover the lost macro blocks according to the type of lost macro blocks.Experimental results show that the proposed method improves the recovery accuracy effectively and avoids the edge disorder phe-nomenon,especially in the region with more complex texture,the subjective and objective quality of concealed image is improved greatly.…”
    Get full text
    Article
  20. 10700

    Development of a Wearable-Sensor-Based Fall Detection System by Falin Wu, Hengyang Zhao, Yan Zhao, Haibo Zhong

    Published 2015-01-01
    “…The system monitors the movements of human body, recognizes a fall from normal daily activities by an effective quaternion algorithm, and automatically sends request for help to the caregivers with the patient’s location.…”
    Get full text
    Article