-
10841
Research on Green Transport Mode of Chinese Bulk Cargo Based on Fourth-Party Logistics
Published 2021-01-01“…This paper improves the particle swarm optimization algorithm to compare the integrated cost and carbon emissions of different bulk fourth-party transport networks to verify the benefits of the fourth-party logistics on bulk cargo transport networks’ cost reduction and emission reduction. …”
Get full text
Article -
10842
Single-Machine Scheduling to Minimize Total Completion Time and Tardiness with Two Competing Agents
Published 2014-01-01“…We consider a single-machine two-agent problem where the objective is to minimize a weighted combination of the total completion time and the total tardiness of jobs from the first agent given that no tardy jobs are allowed for the second agent. A branch-and-bound algorithm is developed to derive the optimal sequence and two simulated annealing heuristic algorithms are proposed to search for the near-optimal solutions. …”
Get full text
Article -
10843
Improved method of Tor network flow watermarks based on IPD interval
Published 2019-08-01“…Tor is an anonymous network mechanism that provides services for hiding traffic sources,but it has the problem that the entry traffic flows of Tor are clearly identifiable.Bridge protocols such as obfs4 come into being to solve this problem,which brings new challenges that have not yet been overcome.An IPD interval scheme is proposed,which uses the clustering characteristics of k-means to improve the original scheme,so that the added flow watermark can be detected efficiently in the three modes of obfs4 bridges.The results of experiments show that the improved algorithm has higher detection rate and recognition rate,and has good adaptability to variable netflow traffic,which is conducive to the construction of a nice secure network environment.…”
Get full text
Article -
10844
Research on deep differential fault analysis against MIBS
Published 2010-01-01“…The MIBS algorithm and its differential fault analysis principle were presented,then three differential fault analysis methods against MIBS were proposed based on different depth of fault model and verified through experiments.Experiment results demonstrate that due to its Feistel structure and S-box differential feature,MIBS is vulnerable to deep differential fault attack.The best result is that after injecting one 4-bit fault into the 30th round left register,both the fault location and fault differential are unknown,the 64-bit MIBS master key searching space can be reduced to 224 and be re-covered after one minute brute-force-search.Moreover,the fault analysis method can provide some ideas on differential fault analysis against other block ciphers using S-box.…”
Get full text
Article -
10845
Location Strategy for Traffic Emission Remote Sensing Monitors to Capture the Violated Emissions
Published 2019-01-01“…The problem is formulated into a graph theory problem, and then a novel adapted metaheuristic algorithm is used to solve the problem. The methodology, using a benchmark problem, has managed to solve the problem to the optimality. …”
Get full text
Article -
10846
Face recognition under unconstrained based on LBP and deep learning
Published 2014-06-01“…The results of experiments on LFW(labeled faces in the wild) show that the algorithm can obtain higher recognition rate than traditional algorithms(such as PCA, SVM, LBP).Otherwise, the recognition rate on Yale and Yale-B are also very high, the experi-mental results show that deep learning net with LBP texture as its input can classify face images correctly.…”
Get full text
Article -
10847
Efficient traceable identity-based signature scheme
Published 2009-01-01“…Compared with the existing schemes without suffering from key escrow, the scheme is the most efficient scheme and the signing algorithm needs only one scalar multiplication in the additive group while the reverse operation requires only three scalar multiplications.…”
Get full text
Article -
10848
MND for Helping People with Different Disabilities
Published 2014-07-01“…Smart phones are used to communicate with the sensor nodes to take instructions to navigate through the appropriate path. Dijkstra's algorithm is used for navigation. MND WSN also monitors the disabled person while navigating. …”
Get full text
Article -
10849
Control Allocation Design of Reaction Control System for Reusable Launch Vehicle
Published 2014-01-01“…In this paper, an indexed control method was proposed for RCS preallocation, a 0-1 integer programming algorithm was designed for RCS allocation controller, and then this RCS scheme’s effect was analyzed. …”
Get full text
Article -
10850
Two accelerated gradient-based iteration methods for solving the Sylvester matrix equation AX + XB = C
Published 2024-12-01“…In this paper, combining the precondition technique and momentum item with the gradient-based iteration algorithm, two accelerated iteration algorithms are presented for solving the Sylvester matrix equation $ AX+XB = C $. …”
Get full text
Article -
10851
Control of Hopf Bifurcation and Chaos in a Delayed Lotka-Volterra Predator-Prey System with Time-Delayed Feedbacks
Published 2014-01-01“…By choosing appropriate control parameter, we investigate the existence of Hopf bifurcation. An explicit algorithm is given to determine the directions and stabilities of the bifurcating periodic solutions. …”
Get full text
Article -
10852
Fault diagnosis of nonlinear analog circuits using generalized frequency response function and LSSVM.
Published 2024-01-01“…In order to improve the training speed and reduces storage, a simplified LSSVM model is used to construct the classifier, and the conjugate gradient algorithm is used for training. The fault diagnosis simulation experiment is conducted on a biquad filter circuit to verify the proposed method. …”
Get full text
Article -
10853
Research of Real Time Optimization of Gear for DCT Vehicle Under the Ramp
Published 2018-01-01“…The value of slope is identified based on the EKF algorithm and the dynamics model of ramp. On the basis of ramp identification model and traditional shift schedule,a real time online optimization of dual clutch transmission( DCT) gear is presented based on fuzzy control method. …”
Get full text
Article -
10854
Robust H∞ Control of DC Motor in the Presence of Input Delay and Disturbance by the Predictor-Based Method
Published 2022-01-01“…The first-order model of a DC motor has been studied previously using PID and STA (super twisting algorithm) methods. However, in this paper, the delay-dependent robust H∞ controller is used on both the first and second orders of the DC motor. …”
Get full text
Article -
10855
Optimization of [C]Raclopride Positron Emission Tomographic Rat Studies: Comparison of Methods for Image Quantification
Published 2013-06-01“…In addition, filtered backprojection is recommended as a reconstruction algorithm, although iterative methods may be more sensitive to detect within-group differences.…”
Get full text
Article -
10856
Application Research and Implementation of Load Balance Technology in General Collection Platform
Published 2013-12-01“…Through the interpretation of dynamic load balancing principles, the research for task scheduling algorithm, the expound to build the cloud resource pool hardware solution, the implementation for different scenarios designed mechanism and the configuration instructions and load monitoring for flexible weighting factors, that has the dynamic load balance techniques applied successfully in general collection platform for x86-based private cloud resource pool. …”
Get full text
Article -
10857
Buffer-aided cooperative NOMA with power transfer
Published 2023-06-01“…To improve the throughput of multiuser simultaneous wireless information and power transfer systems, a buffer-aided cooperative non-orthogonal multiple access scheme with power transfer was designed to maximize the average throughput under the constraints of average/peak power, user’s rate, and the buffer stability.To reduce the optimization complexity, the Lyapunov’s method was introduced to convert the long-term average optimization problem into a series of time-discrete subproblems, and an adaptive transmission and resource allocation optimization algorithm was proposed, where the working mode, the user scheduling and the power allocation were dynamically optimized according to the time-varying channel/buffer state.Simulation results demonstrate that compared with the existing schemes, the proposed scheme can significantly enhance the average throughput whilst achieving the tradeoff between the delay and throughput.…”
Get full text
Article -
10858
An Intelligent Traffic Flow Control System Based on Radio Frequency Identification and Wireless Sensor Networks
Published 2014-05-01“…At the same time, the sensor analyzes and judges the information using an extension algorithm designed to achieve the objective of controlling the flow of traffic. …”
Get full text
Article -
10859
PROFILING OF THE HOB TOOL FOR WORM SHAFTS DEFORMATION
Published 2023-02-01“… The paper presents an algorithm for profiling the hob tool designed to generate by plastic deformation the worm shafts from the composition of worm-wheel gear type, used in the seat adjustment mechanisms of some Audi and Mercedes cars. …”
Get full text
Article -
10860
Analysis of the Fractional-Order Delay Differential Equations by the Numerical Method
Published 2022-01-01“…The obtained results have confirmed the greater accuracy than the modified Laguerre wavelet method, the Chebyshev wavelet method, and the modified wavelet-based algorithm. Moreover, based on the novelty and scientific importance, the present method can be extended to solve other nonlinear fractional-order delay differential equations.…”
Get full text
Article