Showing 10,841 - 10,860 results of 19,511 for search '"algorithm"', query time: 0.10s Refine Results
  1. 10841

    Research on Green Transport Mode of Chinese Bulk Cargo Based on Fourth-Party Logistics by Jixiao Wu, Yinghui Wang, Wenlu Li, Haixia Wu

    Published 2021-01-01
    “…This paper improves the particle swarm optimization algorithm to compare the integrated cost and carbon emissions of different bulk fourth-party transport networks to verify the benefits of the fourth-party logistics on bulk cargo transport networks’ cost reduction and emission reduction. …”
    Get full text
    Article
  2. 10842

    Single-Machine Scheduling to Minimize Total Completion Time and Tardiness with Two Competing Agents by Wen-Chiung Lee, Yau-Ren Shiau, Yu-Hsiang Chung, Lawson Ding

    Published 2014-01-01
    “…We consider a single-machine two-agent problem where the objective is to minimize a weighted combination of the total completion time and the total tardiness of jobs from the first agent given that no tardy jobs are allowed for the second agent. A branch-and-bound algorithm is developed to derive the optimal sequence and two simulated annealing heuristic algorithms are proposed to search for the near-optimal solutions. …”
    Get full text
    Article
  3. 10843

    Improved method of Tor network flow watermarks based on IPD interval by Jie DU, Yongzhong HE, Ye DU

    Published 2019-08-01
    “…Tor is an anonymous network mechanism that provides services for hiding traffic sources,but it has the problem that the entry traffic flows of Tor are clearly identifiable.Bridge protocols such as obfs4 come into being to solve this problem,which brings new challenges that have not yet been overcome.An IPD interval scheme is proposed,which uses the clustering characteristics of k-means to improve the original scheme,so that the added flow watermark can be detected efficiently in the three modes of obfs4 bridges.The results of experiments show that the improved algorithm has higher detection rate and recognition rate,and has good adaptability to variable netflow traffic,which is conducive to the construction of a nice secure network environment.…”
    Get full text
    Article
  4. 10844

    Research on deep differential fault analysis against MIBS by ZHAO Xin-jie1, WANG Tao 1, WANG Su-zhen2, WU Yang1

    Published 2010-01-01
    “…The MIBS algorithm and its differential fault analysis principle were presented,then three differential fault analysis methods against MIBS were proposed based on different depth of fault model and verified through experiments.Experiment results demonstrate that due to its Feistel structure and S-box differential feature,MIBS is vulnerable to deep differential fault attack.The best result is that after injecting one 4-bit fault into the 30th round left register,both the fault location and fault differential are unknown,the 64-bit MIBS master key searching space can be reduced to 224 and be re-covered after one minute brute-force-search.Moreover,the fault analysis method can provide some ideas on differential fault analysis against other block ciphers using S-box.…”
    Get full text
    Article
  5. 10845

    Location Strategy for Traffic Emission Remote Sensing Monitors to Capture the Violated Emissions by Mahmoud Owais

    Published 2019-01-01
    “…The problem is formulated into a graph theory problem, and then a novel adapted metaheuristic algorithm is used to solve the problem. The methodology, using a benchmark problem, has managed to solve the problem to the optimality. …”
    Get full text
    Article
  6. 10846

    Face recognition under unconstrained based on LBP and deep learning by Shu-fen LIANG, Yin-hua LIU, Li-chen LI

    Published 2014-06-01
    “…The results of experiments on LFW(labeled faces in the wild) show that the algorithm can obtain higher recognition rate than traditional algorithms(such as PCA, SVM, LBP).Otherwise, the recognition rate on Yale and Yale-B are also very high, the experi-mental results show that deep learning net with LBP texture as its input can classify face images correctly.…”
    Get full text
    Article
  7. 10847

    Efficient traceable identity-based signature scheme by DU Hong-zhen1, WEN Qiao-yan2

    Published 2009-01-01
    “…Compared with the existing schemes without suffering from key escrow, the scheme is the most efficient scheme and the signing algorithm needs only one scalar multiplication in the additive group while the reverse operation requires only three scalar multiplications.…”
    Get full text
    Article
  8. 10848

    MND for Helping People with Different Disabilities by Wael Hosny Fouad Aly

    Published 2014-07-01
    “…Smart phones are used to communicate with the sensor nodes to take instructions to navigate through the appropriate path. Dijkstra's algorithm is used for navigation. MND WSN also monitors the disabled person while navigating. …”
    Get full text
    Article
  9. 10849

    Control Allocation Design of Reaction Control System for Reusable Launch Vehicle by Rongjun Mu, Xin Zhang

    Published 2014-01-01
    “…In this paper, an indexed control method was proposed for RCS preallocation, a 0-1 integer programming algorithm was designed for RCS allocation controller, and then this RCS scheme’s effect was analyzed. …”
    Get full text
    Article
  10. 10850

    Two accelerated gradient-based iteration methods for solving the Sylvester matrix equation AX + XB = C by Huiling Wang, Nian-Ci Wu, Yufeng Nie

    Published 2024-12-01
    “…In this paper, combining the precondition technique and momentum item with the gradient-based iteration algorithm, two accelerated iteration algorithms are presented for solving the Sylvester matrix equation $ AX+XB = C $. …”
    Get full text
    Article
  11. 10851

    Control of Hopf Bifurcation and Chaos in a Delayed Lotka-Volterra Predator-Prey System with Time-Delayed Feedbacks by Huitao Zhao, Yaowei Sun, Zhen Wang

    Published 2014-01-01
    “…By choosing appropriate control parameter, we investigate the existence of Hopf bifurcation. An explicit algorithm is given to determine the directions and stabilities of the bifurcating periodic solutions. …”
    Get full text
    Article
  12. 10852

    Fault diagnosis of nonlinear analog circuits using generalized frequency response function and LSSVM. by Jialiang Zhang, Yaowang Yang

    Published 2024-01-01
    “…In order to improve the training speed and reduces storage, a simplified LSSVM model is used to construct the classifier, and the conjugate gradient algorithm is used for training. The fault diagnosis simulation experiment is conducted on a biquad filter circuit to verify the proposed method. …”
    Get full text
    Article
  13. 10853

    Research of Real Time Optimization of Gear for DCT Vehicle Under the Ramp by Ding Hua, Xu Cong

    Published 2018-01-01
    “…The value of slope is identified based on the EKF algorithm and the dynamics model of ramp. On the basis of ramp identification model and traditional shift schedule,a real time online optimization of dual clutch transmission( DCT) gear is presented based on fuzzy control method. …”
    Get full text
    Article
  14. 10854

    Robust H∞ Control of DC Motor in the Presence of Input Delay and Disturbance by the Predictor-Based Method by Nima Maleki, Elahe Moradi

    Published 2022-01-01
    “…The first-order model of a DC motor has been studied previously using PID and STA (super twisting algorithm) methods. However, in this paper, the delay-dependent robust H∞  controller is used on both the first and second orders of the DC motor. …”
    Get full text
    Article
  15. 10855

    Optimization of [C]Raclopride Positron Emission Tomographic Rat Studies: Comparison of Methods for Image Quantification by Èlia Torrent, Magí Farré, Ibane Abasolo, Olga Millan, Jordi LLop, Juan Domingo Gispert, Alba Ruiz, Deborah Pareto

    Published 2013-06-01
    “…In addition, filtered backprojection is recommended as a reconstruction algorithm, although iterative methods may be more sensitive to detect within-group differences.…”
    Get full text
    Article
  16. 10856

    Application Research and Implementation of Load Balance Technology in General Collection Platform by Yuan Zhang, Taofeng Guo, Panxiang Zhang, Jianjun Gao, Jiayan Zang

    Published 2013-12-01
    “…Through the interpretation of dynamic load balancing principles, the research for task scheduling algorithm, the expound to build the cloud resource pool hardware solution, the implementation for different scenarios designed mechanism and the configuration instructions and load monitoring for flexible weighting factors, that has the dynamic load balance techniques applied successfully in general collection platform for x86-based private cloud resource pool. …”
    Get full text
    Article
  17. 10857

    Buffer-aided cooperative NOMA with power transfer by Long YANG, Li ZHAO, Yuchen ZHOU, Bingtao HE, Jian CHEN

    Published 2023-06-01
    “…To improve the throughput of multiuser simultaneous wireless information and power transfer systems, a buffer-aided cooperative non-orthogonal multiple access scheme with power transfer was designed to maximize the average throughput under the constraints of average/peak power, user’s rate, and the buffer stability.To reduce the optimization complexity, the Lyapunov’s method was introduced to convert the long-term average optimization problem into a series of time-discrete subproblems, and an adaptive transmission and resource allocation optimization algorithm was proposed, where the working mode, the user scheduling and the power allocation were dynamically optimized according to the time-varying channel/buffer state.Simulation results demonstrate that compared with the existing schemes, the proposed scheme can significantly enhance the average throughput whilst achieving the tradeoff between the delay and throughput.…”
    Get full text
    Article
  18. 10858

    An Intelligent Traffic Flow Control System Based on Radio Frequency Identification and Wireless Sensor Networks by Kuei-Hsiang Chao, Pi-Yun Chen

    Published 2014-05-01
    “…At the same time, the sensor analyzes and judges the information using an extension algorithm designed to achieve the objective of controlling the flow of traffic. …”
    Get full text
    Article
  19. 10859

    PROFILING OF THE HOB TOOL FOR WORM SHAFTS DEFORMATION by VIRGIL GABRIEL TEODOR, GEORGIANA-ALEXANDRA MOROSANU, NICUSOR BAROIU, RAZVAN SEBASTIAN CRACIUN, VIOREL PAUNOIU

    Published 2023-02-01
    “… The paper presents an algorithm for profiling the hob tool designed to generate by plastic deformation the worm shafts from the composition of worm-wheel gear type, used in the seat adjustment mechanisms of some Audi and Mercedes cars. …”
    Get full text
    Article
  20. 10860

    Analysis of the Fractional-Order Delay Differential Equations by the Numerical Method by Saadia Masood, Muhammad Naeem, Roman Ullah, Saima Mustafa, Abdul Bariq

    Published 2022-01-01
    “…The obtained results have confirmed the greater accuracy than the modified Laguerre wavelet method, the Chebyshev wavelet method, and the modified wavelet-based algorithm. Moreover, based on the novelty and scientific importance, the present method can be extended to solve other nonlinear fractional-order delay differential equations.…”
    Get full text
    Article