Showing 11,101 - 11,120 results of 19,511 for search '"algorithm"', query time: 0.10s Refine Results
  1. 11101

    Mechanism of eliminating UDP redundancy control packets in OpenFlow network by Hui HU, Ming CHEN, Bo LIU, Bo XU, Chang-you XING, Chao HU

    Published 2017-09-01
    “…Large numbers of redundant control packets produced by connectionless UDP flows may engender serious influence over the performance of the SDN controllers and networks.The endangerment of the redundant control packets for the performance of SDN controllers by testing and modeling was firstly analyzed,and then a basic solution to solve the problem was formed.Therefore,a preinstalling flow-tables & filtering redundant packets (PFFR) mechanism was proposed.By preinstalling flow tables,PFFR limited the initial rate of control packets in UDP flows,and through installing flow tables according to paths and utilizing the redundant packets filtering algorithm,PFFR eliminated redundant packets rapidly.A prototype system based on PFFR was implemented and tested.The experimental results prove that the PFFR mechanism can effectively improve the performance of the controller.…”
    Get full text
    Article
  2. 11102

    Exact Asymptotic Stability Analysis and Region-of-Attraction Estimation for Nonlinear Systems by Min Wu, Zhengfeng Yang, Wang Lin

    Published 2013-01-01
    “…Experiments on some benchmarks are given to illustrate the efficiency of our algorithm.…”
    Get full text
    Article
  3. 11103

    Flow-of-traffic prediction program based mobile edge computing for Internet of vehicles using double auction by Yan LIN, Shuai YAN, Yijin ZHANG, Chunguo LI, Feng SHU

    Published 2020-12-01
    “…With an aim of maximizing the efficiency of edge offloading and the resource utilization of edge computing server simultaneously, a new flow-of-traffic prediction based edge computing offloading solution was proposed for Internet of vehicles (IoV).Firstly, both the efficiency utility function of vehicle and the resource utilization of mobile edge computing (MEC) server were established by considering task priority.Next, the formulated dual-objective optimization problem was transformed into a double auction problem between vehicles and MEC servers.Finally, based on the designed flow-of-traffic based pricing function of vehicle and MEC server, a McAfee auction algorithm was adopted to complete the edge computing process.Simulation results show that benefiting from the flow-of-traffic prediction information, the proposed solution can significantly improve both the efficiency of computation offloading and the utilization of computation resource.…”
    Get full text
    Article
  4. 11104

    A cooperative multicast efficient resource allocation scheme based on limited feedback by Lei CHEN

    Published 2017-10-01
    “…A joint subcarrier and power allocation scheme based on limited feedback for cooperative multicast network was proposed to minimize the consumed power under constrain of QoS requirement.The new scheme worked in two steps.Firstly,subcarriers were distributed to different multicast groups with equal rate assumption according to limited feedback information,where fair subcarrier allocation scheme was used to achieve a tradeoff between power and fairness.Then,a cooperative power iterative scheme was adopted to allocate power effectively,where target rate on each subcarrier was computed by water-filling algorithm in the first place and then a power iterate process was implemented to optimize power allocation.Simulation and comparison results show that the new scheme significantly reduces uplink feedback overhear and the required power and the multicast service outage of cooperative scheme is much less than those of the direct scheme.Besides,cooperative power iterative scheme has lower computational complexity and therefore is suitable for practical system.…”
    Get full text
    Article
  5. 11105

    DAGUARD: distributed backdoor attack defense scheme under federated learning by Shengxing YU, Zekai CHEN, Zhong CHEN, Ximeng LIU

    Published 2023-05-01
    “…In order to solve the problems of distributed backdoor attack under federated learning, a distributed backdoor attack defense scheme (DAGUARD) under federated learning was proposed based on the assumption that the server selected no more than half of malicious clients for global aggregation.The partial update strategy of the triple gradient optimization algorithm (TernGrad) was designed to solve the backdoor attack and inference attack, an adaptive density clustering defense scheme was designed to solve the backdoor attacks with relatively large angle deflection, the adaptive clipping scheme was designed to limit the enhancement backdoor attack that amplify the gradients and the adaptive noise-enhancing scheme was designed to weaken distributed backdoor attacks.The experimental results show that in the federated learning scenario, the proposed scheme has better defense performance and defense stability than existing defense strategies.…”
    Get full text
    Article
  6. 11106

    A Modal-Based Kalman Filter Approach and OSP Method for Structural Response Reconstruction by Zhenrui Peng, Kangli Dong, Hong Yin

    Published 2019-01-01
    “…Thirdly, the backward sequential algorithm is given to obtain the optimal sensor locations. …”
    Get full text
    Article
  7. 11107

    Inverse Fuzzy-Directed Graph With an Application in Traffic Flow Problem by R. Keerthana, S. Venkatesh, R. U. Gobithaasan, Jamal Salah

    Published 2024-01-01
    “…The concluding segment demonstrates the practicality of employing the IFDG algorithm to identify the most congested traffic flows in Kumbakonam, Tamil Nadu, India.…”
    Get full text
    Article
  8. 11108

    A Method Combining Fractal Analysis and Single Channel ICA for Vibration Noise Reduction by Quanbo Lu, Mei Li

    Published 2021-01-01
    “…First, phase space reconstruction is performed on the vibration signal to make the proper input for ICA algorithm. The original is then decomposed into several component signals. …”
    Get full text
    Article
  9. 11109

    Kineto-static Analysis of Planetary Gear Train based on Vector Bond Graph Method by Wang Zhongshuang, Jing Weike

    Published 2016-01-01
    “…By the corresponding algorithm,the computer aided modeling and dynamic analysis of planetary gear train system with double planetary gear is realized,the validity of the procedure proposed is illustrated.…”
    Get full text
    Article
  10. 11110

    Analysis of customers' electricity consumption behavior for peak load shifting by Bingxin WANG, Yan HOU, Hongwang FANG, Yuze CHEN, Jian LIU

    Published 2017-05-01
    “…In order to implement well-directed peak load shifting for massive customers,a method for analyzing massive customers' electricity consumption behavior for peak load shifting was proposed.Firstly,clustering algorithm was used to cluster daily load curves of the main power grid in the previous year and get load characteristics in different dates.Then the load curves of all customers under every date cluster were clustered,the peak load shifting method was derived by comparing the load characteristics of the main power grid and customers.Finally,the peak load shifting method in a future day was given by date matching between the future day with a historical day using dynamic time warping (DTW).Empirical study shows that the method is conductive to peak-valley electricity pricing and orderly electricity consump-tion and can further achieve peak load shifting and stable operation of the main power grid.…”
    Get full text
    Article
  11. 11111

    Active Mode Switching Control Strategy of Hybrid Electric Vehicle based on Identification of Road Gradient by Ming Ye, Xiangyu Gongye, Zhihong Zhu, Wenlei Wei

    Published 2019-09-01
    “…On the basis of determining the working mode first,taking the minimum fuel consumption as the objective function,the optimal torque allocation is carried out in real time with dynamic programming algorithm. On the premise of economy,the hybrid power system can achieve the shift gear at the uphill moment to meet the needs of driver's power performance and drivability.…”
    Get full text
    Article
  12. 11112

    Research of a Novel Ship-loading Energy Circulatory System under Multi-process State by Jiang Hui

    Published 2015-01-01
    “…For the problems of high energy consumption,low utilization in ship sailing process,a new type of ship-loading energy circulatory system is presented,the system with the process of the flow field around the sports field of the ships as a power source kinetic energy is transformed into electrical energy.In the model,according to the changing of the sailing process state,the DMC-PID mixed prediction control algorithm is introduced to adjust the transmission ratio of belt drive in the system.Finally,the variable law of the belt drive parameters characteristic and performance indicators of the ship-loading energy circulatory system under the condition of transmission ratio under control are studied.The results show that the designed novel ship-loading energy circulatory system is feasible through analysis of performance indicators,since the introduction of variable transmission ratio belt drive system and DMC-PID control system in the energy circulatory system,the performance of the system is improved.…”
    Get full text
    Article
  13. 11113

    Using Trapezoidal Intuitionistic Fuzzy Number to Find Optimized Path in a Network by P. Jayagowri, G. Geetha Ramani

    Published 2014-01-01
    “…This paper proposes an optimized path for use in networks, using trapezoidal intuitionistic fuzzy numbers, assigned to each arc length in a fuzzy environment. It proposes a new algorithm to find the optimized path and implied distance from source node to destination node.…”
    Get full text
    Article
  14. 11114

    Gated Channel Attention Mechanism YOLOv3 Network for Small Target Detection by Xi Yang, Jin Shi, Juan Zhang

    Published 2022-01-01
    “…In order to solve the problem of low recognition rate and high missed rate in current target detection task, this paper proposes an improved YOLOv3 algorithm based on a gated channel attention mechanism (GCAM) and adaptive up-sampling module. …”
    Get full text
    Article
  15. 11115

    Power allocation satisfying user fairness for integrated sensing and communication system based on orthogonal time frequency space modulation by Ke XU, Luping XIANG, Jie HU, Kun YANG

    Published 2022-09-01
    “…By sharing resources for radar sensing and communications, integrated sensing and communication (ISAC) has promising applications in diverse scenarios, such as human-machine interface, vehicle-to-everything (V2X), remote sensing, and environment surveillance.In order to resolve the frequency resource conflict in high-speed V2X networks, based on the modulation orthogonal time frequency (OTFS), the OTFS-ISAC system was proposed, where the base station receives reflected echoes to obtain sensing parameters of vehicle motion and then establish the vehicle’s mobile topology.Additionally, in terms of the multi-vehicle network, the design of OTFS-ISAC with NOMAsatisfying the fairness and the algorithm of power allocation were proposed.Simulations show that compared with the NOMA without radar sensing system, the proposed design improves the system data rate by 25%.…”
    Get full text
    Article
  16. 11116

    LIGHTWEIGHT DESIGN OF A SMALL FAMILY CAR DISC BRAKE BASED ON ANSYS (MT) by WANG SuoGuo, SHEN JingHu, SHI Le

    Published 2023-01-01
    “…NSGA-II hybrid variant algorithm based on the control elite strategy in Ansys was used to optimize the brake disc. …”
    Get full text
    Article
  17. 11117

    CNID: Research of Network Intrusion Detection Based on Convolutional Neural Network by Guojie Liu, Jianbiao Zhang

    Published 2020-01-01
    “…In this paper, a multiclassification network intrusion detection model based on convolutional neural network is proposed, and the algorithm is optimized. First, the data is preprocessed, the original one-dimensional network intrusion data is converted into two-dimensional data, and then the effective features are learned using optimized convolutional neural networks, and, finally, the final test results are produced in conjunction with the Softmax classifier. …”
    Get full text
    Article
  18. 11118

    Forward Kinematics Analysis of 2RUS/RRS Parallel Mechanism by Geng Mingchao, Bian Hui, Zhang Canguo, Li Xin

    Published 2018-01-01
    “…The FK problem of 2 RUS/2 RRS are numerically verified by inverse Broyden algorithm in Quasi-Newton method.…”
    Get full text
    Article
  19. 11119

    Two Improved Cancellation Techniques for Direct-Conversion Receivers by Xueyuan Hao, Xiaohong Yan

    Published 2016-01-01
    “…It can improve the integrity of the baseband signal and reduces the complexity of the subsequent software algorithm. Experimental results show that two kinds of improved technology can improve the performance of DCR and expand its scope of application.…”
    Get full text
    Article
  20. 11120

    Application of Big Data Analysis in Cost Control of Marine Fishery Breeding by Yunsong Gu

    Published 2022-01-01
    “…In order to improve the stability of the cost control of marine fishery culture, a method of controlling the cost of marine fishery culture based on big data analysis algorithm was proposed. We establish the cost analysis model of marine fishery, use the big data correlation analysis method to conduct distributed mining on the cost characteristics of marine fishery, deeply grasp the relevance of data characteristics, use the information fusion method to build the constraint parameter analysis model of aquaculture cost operation, limit the amount of calculation, and use the adaptive neural network weighted training method to adaptively optimize the cost control to avoid falling into local optimization. …”
    Get full text
    Article