Showing 11,021 - 11,040 results of 19,511 for search '"algorithm"', query time: 0.10s Refine Results
  1. 11021

    ANALYSIS OF THE REASONS OF BREAKAGES OF RETAYNER OF THE CAMP OF PQF AND SOLUTION OF PROBLEMS by A. V. Chubenko

    Published 2015-11-01
    “…The solution assumes change of algorithm of work in the operating programmable logical Simatic S7–400 controler of the rolling mill PQF. …”
    Get full text
    Article
  2. 11022

    Method for determining of statistical characteristics of evaluated distance obtained from measurements of Doppler frequency offsets by V. V. Legkostup

    Published 2022-06-01
    “…Despite the fact that the object guidance loop is closed according to the time difference of arrival information, it is necessary to enter the distance between the object and the center of the navigation system into the algorithm for generating control commands in order to stabilize the frequency response of the control loop and eliminate dynamic errors. …”
    Get full text
    Article
  3. 11023

    Technical Review on Endoscopic Treatment Devices for Management of Upper Gastrointestinal Postsurgical Leaks by Renato Medas, Eduardo Rodrigues-Pinto

    Published 2023-01-01
    “…Our discussion specifically focuses on principles and mechanism of action, advantages and disadvantages of each technique, indications, clinical success, and adverse events. An algorithm for endoscopic approach is proposed.…”
    Get full text
    Article
  4. 11024

    Solution to the Problem of a Mass Traveling on a Taut String via Integral Equation by M. Ferretti, A. Luongo

    Published 2019-01-01
    “…Numerical results throw light on the physics of the phenomenon and confirm the effectiveness of the algorithm.…”
    Get full text
    Article
  5. 11025

    Scalable Clustering of High-Dimensional Data Technique Using SPCM with Ant Colony Optimization Intelligence by Thenmozhi Srinivasan, Balasubramanie Palanisamy

    Published 2015-01-01
    “…Though this is efficient clustering, it is checked for optimization using ant colony algorithm with swarm intelligence. Thus the scalable clustering technique is obtained and the evaluation results are checked with synthetic datasets.…”
    Get full text
    Article
  6. 11026

    Grading Prediction of Enterprise Financial Crisis Based on Nonlinear Programming Evaluation: A Case Study of Chinese Transportation Industry by Zhi-yuan Li

    Published 2014-01-01
    “…Therefore, a new evaluation model based on nonlinear programming is established, the nature of the model is proved, the detailed solution steps of the model are given, and the significance and algorithm of the model are thoroughly discussed in this study. …”
    Get full text
    Article
  7. 11027

    A Vector Bond Graph Method of Dynamics Modeling for Planar Multi-body Systems with Grooved Sheave by Wang Zhongshuang, Zhao Yanwei, Xu Changshun

    Published 2017-01-01
    “…By using the corresponding algorithm,the computer automatic modeling and dynamics analysis of the planar multi-body system containing grooved sheave on a computer is realized,its validity is illustrated.…”
    Get full text
    Article
  8. 11028

    Solutions of the Force-Free Duffing-van der Pol Oscillator Equation by Najeeb Alam Khan, Muhammad Jamil, Syed Anwar Ali, Nadeem Alam Khan

    Published 2011-01-01
    “…The proposed method introduces an alternative framework designed to overcome the difficulty of capturing the behavior of the solution and give a good approximation to the solution for a large time. The Runge-Kutta algorithm was used to solve the governing equation via numerical solution. …”
    Get full text
    Article
  9. 11029

    Optimum Intervention in Transportation Networks Using Multimodal System under Fuzzy Stochastic Environment by Gurupada Maity, Vincent F. Yu, Sankar Kumar Roy

    Published 2022-01-01
    “…This research designs a new method for solving the Transportation Problem (TP) by introducing multimodal transport systems under fuzzy-stochastic environment, which we refer to as Fuzzy-Stochastic Multimodal Transportation Problem (FSMMTP). An algorithm is developed to reduce FSMMTP to a deterministic TP, which is mainly based on α-cut of fuzzy numbers, and uses a signed distance function based on the mean expectation of the fuzzy-stochastic cost parameters. …”
    Get full text
    Article
  10. 11030

    Privacy-preserving trajectory similarity computation method by Haining YU, Hongli ZHANG, Xiangzhan YU, Jiaxing QU, Mengmeng GE

    Published 2022-11-01
    “…To tackle privacy concerns on user information leakage in trajectory outsourcing services, a privacy-preserving trajectory similarity computation (pTSC) method was proposed.A trajectory outsourcing service provider was enabled to store encrypted trajectories from owners, wait for encrypted interested trajectories from requesters, and compute trajectory similarity between an interested trajectory and stored trajectories in ciphertext domain without learning anything about users’ trajectories.To compute a trajectory similarity over encrypted trajectories efficiently, a secure trajectory similarity computation protocol with longest common subsequence was proposed, which used somewhat homomorphic encryption and secure comparison protocol to compute the length of longest common subsequence over two encrypted trajectories.Furthermore, a ciphertext compression algorithm was designed to improve efficiency.Theoretical analysis and experimental evaluations show that pTSC method is secure and efficient.…”
    Get full text
    Article
  11. 11031

    A study of value iteration and policy iteration for Markov decision processes in Deterministic systems by Haifeng Zheng, Dan Wang

    Published 2024-11-01
    “…In the context of deterministic discrete-time control systems, we examined the implementation of value iteration (VI) and policy (PI) algorithms in Markov decision processes (MDPs) situated within Borel spaces. …”
    Get full text
    Article
  12. 11032

    Pilot Position Optimization Design of WLAN System Based on Experiment by Jue Lan, Yunzhou Li, Xin Su, Shidong Zhou

    Published 2015-08-01
    “…Considering the frame structure of IEEE 802.11ac with “leading preamble plus comb-like pilot”,the performance evaluation formula of the correction scheme based on maximum likelihood estimation was derived,according to which the effect of pilot location,channel fading and subcarrier correlation was studied.Furthermore,a signalling exchange method was proposed,which ensured pilot position synchronization on both end,and a low complexity algorithm of pilot optimization according to the frequency channel amplitude information.In this way,the pilot overhead can be reduced without loss of correction performance.The experiment and simulation result shows that for ideal Rayleigh channel data,correction performance improves by 1.85 dB and 7.15 dB for unknown channel amplitude information in frequency domain and known cases respectively.For field experiment channel data,correction performance improves by 1.67 dB and 2.68 dB respectively.…”
    Get full text
    Article
  13. 11033

    Cooperative spectrum sensing method and performance analysis based on similarity between evidences by Zhiguo SUN, Xinyue REN, Zengmao CHEN, Ming DIAO

    Published 2020-12-01
    “…The Dempster-Shafer(DS) evidence theory was applied to cooperative spectrum sensing and address the paradox of evidence in classical DS evidence theory, a new weighted distance measure based algorithm was proposed.Firstly, the evidences were extracted for each sensing user.Then, the weighted distance measure of extracted basic probability assignment data was adopted as the similarity between evidences of sensing users.Finally, the similarity of evidences was transformed into credibility, which was utilized as the weight to obtain the weighted average of basic probability assignment.In order to reduce the amount of data reported to the fusion center, the projection approximation method was employed to adjust the basic probability assignment.Both theoretical analysis and simulation results show that the proposed method can improve the detection performance of spectrum sensing while the paradox of evidence exists.Compared with traditional methods the cooperation overhead is reduced.…”
    Get full text
    Article
  14. 11034

    Integrated Project Scheduling and Staff Assignment with Controllable Processing Times by Victor Fernandez-Viagas, Jose M. Framinan

    Published 2014-01-01
    “…Due to the complexity of the integrated model, a simple GRASP algorithm is implemented in order to obtain good, approximate solutions in short computation times.…”
    Get full text
    Article
  15. 11035

    Vertical handover policy for cyber-physical systems aided by SAGIN based on deep reinforcement learning by WU Yan, PAN Guangchuan, YAO Mingwu, YANG Qinghai, LEUNG Victor C.M.

    Published 2024-08-01
    “…By jointly taking the system stability, handover cost and network-using cost into account, the vertical handover policy problem was modeled as a constraint Markov decision process (CMDP), and a sufficient condition to ensure the existence of a feasible solution was derived.Furthermore, a constraint-proximal policy optimization (CPPO) algorithm was proposed to solve the CMDP, and also the distributed learning scheme at base station sides was introduced to accelerate the speed of converging. …”
    Get full text
    Article
  16. 11036

    Topology Optimization Design of the Planar 3-RPR Fully Compliant Parallel Mechanism by Sha Sai, Zhang Rongxing, Zhou Lei, An Ziming

    Published 2016-01-01
    “…Based on the differential kinematics of parallel mechanism displacement vector differential mapping relation between input and output,through establishing a planar 3-RPR topology optimization model of fully compliant parallel mechanism( SIMP interpolation model),the solution is optimized by using the optimization criterion method( OC) algorithm,and by using the Heaviside filtering technology,the checkerboard phenomenon is restrained and processed. …”
    Get full text
    Article
  17. 11037

    STRUCTURE OPTIMIZATION DESIGN FOR THE ROTARY WORKTABLE OF GANTRY MACHINING CENTER BASED ON RESPONSE SURFACE METHODOLOGY by ZHENG Bin, ZHANG JingDong

    Published 2018-01-01
    “…Then,the multi-objective optimization algorithm is adopted to optimize the response surface model and combined with the production technique to determine the best optimization scheme. …”
    Get full text
    Article
  18. 11038

    Optimized BM3D for mmWave massive MIMO channel estimation by Jiafeng QIU

    Published 2020-09-01
    “…Focused on the issue in which beamspace channel estimation is challenging for mmWave massive MIMO system when the number of RF chains is limited,a channel estimation scheme based on optimized BM3D was proposed.The MIMO channel matrix based on 3D lens-based can be regarded as a 2D natural image,and the image reconstruction technology was integrated into the channel estimation.BM3D was considered as one of the most accurate algorithms for image denoising ,while the grouping was realized by block-matching and collaborative filtering was accomplished by shrinkage in a 3D transform domain.Utilizing the sparsity feature of the channel and the clustering feature of the paths,the BM3D algorithm was optimized in order to improve the performance.Simulations are provided to show that proposed optimized BM3D scheme can achieve satisfactory accuracy in all considered SNR regions.…”
    Get full text
    Article
  19. 11039

    Blind audio watermarking mechanism based on variational Bayesian learning by Xin TANG, Zhao-feng MA, Xin-xin NIU, Yi-xian YANG

    Published 2015-01-01
    “…In order to improve the performance of audio watermarking detection,a blind audio watermarking mechanism using the statistical characteristics based on MFCC features of audio frames was proposed.The spread spectrum watermarking was embedded in the DCT coefficients of audio frames.MFCC features extracted from watermarked audio frames as well as un-watermarked ones were trained to establish their Gaussian mixture models and to estimate the parameters by vatiational Bayesian learning method respectively.The watermarking was detected according to the maximum likelihood principle.The experimental results show that our method can lower the false detection rate compared with the method using EM algorithm when the audio signal was under noise and malicious attacks.Also,the experiments show that the proposed method achieves better performance in handling insufficient training data as well as getting rid of over-fitting problem.…”
    Get full text
    Article
  20. 11040

    Application and Legal Governance of Computational Technologies in Credit Investigation: An Interdisciplinary Perspective by Ying Zhang, Zhen Xie, Xiuwei Qu

    Published 2022-01-01
    “…By analyzing the computational technologies and algorithms most commonly used in credit data collection and data storage, data transmission and data access, data analysis and processing, data calculation, result output and effect evaluation, this paper summarizes and proposes a unified general process of modern credit investigation, pointing out that in this general process, low data quality, privacy violation, algorithmic bias are the main challenges in the big data era, and countermeasures like data quality control, privacy protection, and algorithm governance need to be to be taken seriously into account in order to further explore the great potential of the credit investigation under the legal framework.…”
    Get full text
    Article