-
10981
Interval Continuous Plant Identification from Value Sets
Published 2012-01-01“…Moreover, it is proven that given a value set, all the assigned polynomials of the vertices can be determined if and only if there is a complete edge or a complete arc lying on a quadrant. This algorithm is nonconservative in the sense that if the value-set boundary of an interval plant is exactly known, and particularly its vertices, then the Kharitonov rectangles are exactly those used to obtain these value sets.…”
Get full text
Article -
10982
Reconfigurable Antenna Arrays with Multiple Requirements: A Versatile 3D Approach
Published 2017-01-01“…This paper proposes a deterministic method for the 3D synthesis of antenna arrays that jointly accounts for far-field pattern reconfigurability, polarization setting, dynamic range ratio reduction, and near-field control. The conceived algorithm, which generalizes some existing solutions, relies on a weighted cost function, whose iterative minimization is accomplished by properly derived closed-form expressions. …”
Get full text
Article -
10983
Yosida Complementarity Problem with Yosida Variational Inequality Problem and Yosida Proximal Operator Equation Involving XOR-Operation
Published 2021-01-01“…For this purpose, we establish an algorithm based on fixed point formulation. Our approach is based on a proximal operator technique involving a subdifferential operator. …”
Get full text
Article -
10984
Design of low power and high speed FFT/IFFT processor for UWB system
Published 2008-01-01“…A new 128/64-point FFT/IFFT processor used in Ultra-Wide-Band(UWB) system was presented.The proces-sor,which is based on 8×8×2 mixed radix algorithm,can deal with multiple inputs more efficiently for MIMO applica-tions.A new eight-path-feedback structure,which can provide a higher throughput and lower power dissipation,was proposed.The test chip has been fabricated using SMIC 0.13μm single-poly and eight-metal CMOS process with a core area of 1.44mm2.The throughput of this chip is up to 1Gsample/s,and the power dissipation is 39.6mW when it works at the throughput of 500Msample/s which meets the UWB standard.This chip reduces 40% of core area and saves 45% of power dissipation compared with those existing 128-point FFT processors.…”
Get full text
Article -
10985
Monitoring the efficiency of organisation’s internal control and economic security system
Published 2022-03-01“…As a result, the authors proposed a monitoring algorithm that ensures the internal control system and economic security effectiveness.…”
Get full text
Article -
10986
Deep and robust resource allocation for random access network based with imperfect CSI
Published 2020-07-01“…A deep and robust resource allocation framework was proposed for the random access based wireless networks,where both the communication channel state information (C-CSI) and the interference channel state information (I-CSI) were uncertain.The proposed resource allocation framework considered the optimization objective of wireless networks as a learning problem and employs deep neural network (DNN) to approximate optimal resource allocation policy through unsupervised manner.By modeling the uncertainties of CSI as ellipsoid sets,two concatenated DNN units were proposed,where the first was uncertain CSI processing unit and the second was the power control unit.Then,an alternating iterative training algorithm was developed to jointly train the two concatenated DNN units.Finally,the simulations verify the effectiveness of the proposed robust leaning approach over the nonrobust one.…”
Get full text
Article -
10987
Existence, Uniqueness and Convergence Solution of Nonlinear Caputo-Fabrizio Fractional Biological Population Model
Published 2024-07-01“…Furthermore, we propose a new numerical algorithm called $\mathbb{J}$-decomposition method ($\mathbb{J}$-DM) which is a combined form of the $\mathbb{J}$-transform method and a new decomposition method to solve the proposed model. …”
Get full text
Article -
10988
Research of the Transfer Method of Four-dimensional Coordinate to Three-dimensional Coordinate
Published 2016-01-01“…The coordinate measure machine(CMM) with rotary table is often use in the field of precision measurement.Because of the error evaluation requires that all measured point must be expressed in the same coordinate system,but the workpiece coordinate system is changed in the process of measuring because of rotation of rotary table,so it is difficult to evaluate errors.Therefore,a model for coordinate transfer from four-dimensional coordinate system to three- dimensional coordinate system is created.Through the transfer algorithm of coordinate system,the four- dimensional coordinate with rotary table can be transferred to a three dimension Cartesian coordinate by utilizing rotary table coordinate system to act as medial coordinate system,then,it can be transferred to workpiece coordinate system or machine coordinate system,sequentially,the error evaluation is realized.The experimental results show that the mathematical model is right,and it can meet the requirement of precise measurement.…”
Get full text
Article -
10989
Wu’s Characteristic Set Method for SystemVerilog Assertions Verification
Published 2013-01-01“…We define a suitable subset of SVAs so that an efficient polynomial modeling mechanism for both circuit descriptions and assertions can be applied. We present an algorithm framework based on the algebraic representations using characteristic set of polynomial system. …”
Get full text
Article -
10990
Evaluation of the Safety of High-Salt Wastewater Treatment in Coal Chemical Industry Based on the AHP Fuzzy Method
Published 2021-01-01“…An AHR fuzzy mathematics evaluation algorithm is used to compare experimental values with simulated numerical values in brine. …”
Get full text
Article -
10991
Geostatistical Analysis Methods for Estimation of Environmental Data Homogeneity
Published 2018-01-01“…As a result, the greatest environmental stress zones were isolated and correct zoning using geostatistical analysis techniques was proved. Mathematical algorithm computing system was implemented in an object-oriented programming C #. …”
Get full text
Article -
10992
Optimization method for attribute-based cryptographic access control in mobile cloud computing
Published 2018-07-01“…For the problem of secure data sharing and access control in mobile cloud,the drawback of traditional cryptographic access control schemes was deeply analyzed.Considering the truth that mobile devices were usually equipped with limited resources,an optimized attribute-based cryptographic access control scheme was proposed in this study.In the proposed scheme,a third party proxy was introduced into the system model,and the two-layer encryption method was applied.Combining traditional attribute-based encryption (ABE) algorithm with multi-secret sharing and split measurement of ABE encryption,the scheme could greatly reduce the cost of mobile users in terms of data publish and access management.Theoretical and experimental analysis shows that the contribution can well meet the requirements of mobile cloud in terms of security,computational complexity and communication cost,which means that it is promising for future applications.…”
Get full text
Article -
10993
Tension Distribution and Dynamics Analysis of a Cable-driven Humanoid Wrist
Published 2020-06-01“…At the same time, taking into account the redundant actuation and single-direction force for the cables, the cable tension distribution optimization model is established, and the cable tension distribution is obtained by genetic algorithm. Secondly, aiming at the influence of the cable mass, a more accurate dynamics model is established by considering catenary. …”
Get full text
Article -
10994
Rough decision rules extraction and reduction based on granular computing
Published 2016-10-01“…Rule mining was an important research content of data mining,and it was also a hot research topic in the fields of decision support system,artificial intelligence,recommendation system,etc,where attribute reduction and minimal rule set extraction were the key links.Most importantly,the efficiency of extraction was determined by its application.The rough set model and granular computing theory were applied to the decision rule reduction.The decision table was granulated by granulation function,the grain of membership and the concept granular set construction algorithm gener-ated the initial concept granular set.Therefore,attribute reduction could be realized by the distinguish operator of concept granule,and decision rules extraction could be achieved by visualization of concept granule lattice.Experimental result shows that the method is easier to be applied to computer programming and it is more efficient and practical than the existing methods.…”
Get full text
Article -
10995
Successive relaying secure transmission scheme based on inter-relay interference cancellation
Published 2017-09-01“…A secure scheme based on inter-relay interference cancellation was proposed to solve untrusted relay eavesdropping problem in successive relaying systems.First inter-relay interference between trusted relay and untrusted relay was exploited as artificial noise to degrade untrusted relay’s eavesdropping condition,then interference iterative cancellation was adapted to improve signal quality at legitimate user by making use of correlation between signals in time domain.Based on this,a quick power allocation algorithm aiming to minimize untrusted relay’s sum rate was proposed.Analysis and simulation results show that the proposed scheme suppress untrusted relay’s eavesdropping without loss of communication efficiency,a promotion of at least 2 bit·s<sup>-1</sup>·Hz<sup>-1</sup>in secrecy rate can be observed.…”
Get full text
Article -
10996
The Split Common Fixed Point Problem for Total Asymptotically Strictly Pseudocontractive Mappings
Published 2012-01-01“…The purpose of this paper is to propose an algorithm for solving the split common fixed point problems for total asymptotically strictly pseudocontractive mappings in infinite-dimensional Hilbert spaces. …”
Get full text
Article -
10997
Energy-efficient cooperative sensing and transmission in relay-assisted cognitive radio network
Published 2017-05-01“…An innovative EE-oriented cooperative sensing and transmission scheme in relay-assisted cognitive radio networks,called energy-efficient best-relay cooperative transmission (BCT) was proposed.Based on the BCT scheme,mean energy efficiency (MEE) maximization problem with sensing duration and transmitting power as optimization variables was modeled for fading channels under constraint of minimal secondary outage probability.By virtue of Jensen’s inequality,the original optimization problem was decomposed into two relatively independent subproblems which solved sensing duration and power allocation respectively.And for the two subproblems,an efficient cross iteration based algorithm was proposed to obtain the suboptimal solutions.Both analytical and simulation results demonstrate that the proposals can achieve significantly higher EE while enhancing reliability of secondary transmission remarkably compared to non-cooperation single cognitive transmission schemesin high QoS requirement.…”
Get full text
Article -
10998
On the Hermitian R-Conjugate Solution of a System of Matrix Equations
Published 2012-01-01“…The representation of such solution is also derived. Finally, an algorithm and numerical examples are given.…”
Get full text
Article -
10999
Session topic mining for interactive text based on conversational content
Published 2016-09-01“…Traditional theme mining model generally digs out the document theme from the interactive text only.In order to explore the session topic and improve the universality of mining model,a kind of interactive text session topic generation model based on the content of the dialogue was put forward.Firstly,by analyzing the characteristics of interactive text and based on the concept of topic tree,a dialog spanning tree was defined with a five-layer structure.Based on this and LDA,the model of session topic generation(ST-LDA)was built.At last,Gibbs sampling method was adopted to deduce the ST-LDA and obtaining session topic and its distribution probability.The results show that the ST-LDA model can dig out a session topic effectively from the interactive text.Besides,the results can reduce the complexity of the classification algorithm and can be back to the theme—participants association.It also has a good universality.…”
Get full text
Article -
11000
Principal component analysis of time delay in large IP network
Published 2021-04-01“…Network time delay is one of the key indexes to evaluate network performance.Principal component analysis (PCA) is a kind of multivariable analysis and declination algorithm commonly used in the field of data mining.Based on PCA analysis of time delay in large IP networks, aiming to find out the deep reason of time delay and the interdependencies among nodes of the network, a scientific and reasonable network time delay evaluation system was built, and effective suggestions for IP network construction and optimization were finally got.The off-line analysis of the historical network delay is only a preliminary application of the PCA.In the future, PCA can be applied to the real-time on-line monitoring and analysis of the network performance, such as network traffic, network delay, network packet loss, etc., in combination with the network topology, current network traffic direction, routing, distance and other related factors, thus the efficiency and quality of network operations can be further improved.…”
Get full text
Article