Showing 11,121 - 11,140 results of 19,511 for search '"algorithm"', query time: 0.14s Refine Results
  1. 11121

    Developing a recommender system for the health tourism industry using data mining methods by reza molaee fard

    Published 2023-03-01
    “…According to the research, data clustering using DBSCAN algorithm obtained 99% efficiency score, which is the highest efficiency score among the existing algorithms. …”
    Get full text
    Article
  2. 11122

    Complement Diagnostics: Concepts, Indications, and Practical Guidelines by Bo Nilsson, Kristina Nilsson Ekdahl

    Published 2012-01-01
    “…Here, we summarize indications, techniques, and interpretations for basic complement analyses and present an algorithm, which we follow in our routine laboratory.…”
    Get full text
    Article
  3. 11123

    VIBRATION MODAL ANALYSIS AND RESEARCH OF CANTILEVER BEAM BASED ON POLY IIR METHOD by ZHANG Min, ZHANG Yi, HOU YaoHua, MA GuangXuan

    Published 2019-01-01
    “…In the end,the experimental modal algorithm based on Poly IIR is applied to identify the modal parameters of simply supported beam. …”
    Get full text
    Article
  4. 11124

    Nanosecond level time synchronization in datacenter network based on Telemetry architecture by Qianli ZHANG, Chaofan ZHANG, Jilong WANG, Xiangyu TANG, Zhengchen SHEN, Hui WANG

    Published 2021-10-01
    “…To solve the problems of the traditional local time synchronization architecture being disconnected from centralized management, requiring extra interaction overhead, meanwhile with less time data susceptible to outliers, the nanosecond level time synchronization system was proposed based on Telemetry for the high-precision time synchronization requirements of data center networks.Combined with the outlier factor detection algorithm, timestamp information within the background traffic of the data center was collected, the large amount of time information reported was processed and analyzed, and a centralized automatic synchronization with nanosecond level precision was eventually achieved, which was convenient for subsequent global network scheduling.The proposed system was implemented and evaluated on the programmable switch.Experimental results show that between multiple hops and at different link rates, the nodes can achieve high-precision time synchronization at the nanosecond level.…”
    Get full text
    Article
  5. 11125

    Global Hopf Bifurcation Analysis for an Avian Influenza Virus Propagation Model with Nonlinear Incidence Rate and Delay by Yanhui Zhai, Ying Xiong, Xiaona Ma, Haiyun Bai

    Published 2014-01-01
    “…At first, local asymptotical stability and existence of Hopf bifurcation are studied; Hopf bifurcation occurs when time delay passes through a sequence of critical values. An explicit algorithm for determining the direction of the Hopf bifurcations and stability of the bifurcation periodic solutions is derived by applying the normal form theory and center manifold theorem. …”
    Get full text
    Article
  6. 11126

    Multi-channel based edge-learning graph convolutional network by Shuai YANG, Ruiqin WANG, Hui MA

    Published 2022-09-01
    “…Usually the edges of the graph contain important information of the graph.However, most of deep learning models for graph learning, such as graph convolutional network (GCN) and graph attention network (GAT), do not fully utilize the characteristics of multi-dimensional edge features.Another problem is that there may be noise in the graph that affects the performance of graph learning.Multilayer perceptron (MLP) was used to denoise and optimize the graph data, and a multi-channel learning edge feature method was introduced on the basis of GCN.The multi-dimensional edge attributes of the graph were encoded, and the attributes contained in the original graph were modeled as multi-channel.Each channel corresponds to an edge feature attribute to constrain the training of graph nodes, which allows the algorithm to learn multi-dimensional edge features in the graph more reasonably.Experiments based on Cora, Tox21, Freesolv and other datasets had proved the effectiveness of denoising methods and multi-channel methods.…”
    Get full text
    Article
  7. 11127

    Hexapeptide dalargin in clinical gastroenterology: 30 years' of clinical application of the drug by S. A. Bulgakov

    Published 2016-08-01
    “…Article presents results of use of hexapeptide, algorithm and guideline on its application are analyzed, possible mechanisms of action are discussed. …”
    Get full text
    Article
  8. 11128

    RESEARCH ON BEARING FAILURES OF LARGE-SCALE WIND TURBINES WITH IMPROVED MULTI-SCALE MORPHOLOGY by CHEN Lu, GAO WenYing

    Published 2021-01-01
    “…Experimental and comparative results show that the algorithm proposed in this paper has a certain of advantages.…”
    Get full text
    Article
  9. 11129

    Robust Control of Wind Turbines by Using Singular Perturbation Method and Linear Parameter Varying Model by Yan Zhang, Zhengfan Liu, Zhong Yang, Haifei Si

    Published 2016-01-01
    “…Then stability and robust properties of the open-loop linear singularly perturbed system are analyzed using linear matrix inequalities (LMIs). An algorithm of designing a stabilizing state-feedback controller is proposed which can guarantee the robust property of the closed-loop system. …”
    Get full text
    Article
  10. 11130

    Precision Measurement of Spiral Bevel Gear based on Laser Displacement Sensor by Zhongwang Lu, Aiping Song, Zhanqun Song, Ning Mei, Chenwei Yu

    Published 2021-05-01
    “…Based on the analysis of the characteristics of the existing bevel gear measurement technology, a non-contact measurement method of the bevel gear is proposed based on the laser displacement sensor and the algorithm of the tooth distance deviation, the tooth phase deviation and the tooth ring pulsation deviation of the Gleason system spiral bevel gear. …”
    Get full text
    Article
  11. 11131

    The Optimal Supply Decision Based on Dynamic Multiobjective Optimization and Prediction by Kejia He, Hongyu Cheng, Yuchen Zhou, Cuihua Xie

    Published 2022-01-01
    “…The dynamic prediction protocol is obtained by considering the variation in production and material costs by an evolutionary algorithm. The model enables users to determine material supply protocol in continuous time and autonomously adapt to changes in the manufacturers’ production goals within a lower convergence time.…”
    Get full text
    Article
  12. 11132

    Optimization for Due-Date Assignment Single-Machine Scheduling under Group Technology by Li-Yan Wang, Mengqi Liu, Ji-Bo Wang, Yuan-Yuan Lu, Wei-Wei Liu

    Published 2021-01-01
    “…For the common (CON) due-date assignment, slack (SLK) due-date assignment, and different (DIF) due-date assignment, an On  log  n time algorithm is proposed, respectively, to solve the problem, where n is the number of jobs.…”
    Get full text
    Article
  13. 11133

    Trajectory privacy protection scheme based on differential privacy by Si CHEN, Anmin FU, Mang SU, Huaijiang SUN

    Published 2021-09-01
    “…To solve the problem that the current sampling mechanism and data obfuscation method may raise insufficient data availability and privacy protection, a trajectory privacy protection scheme based on differential privacy was proposed.A new efficient sampling model based on time generalization and spatial segmentation was presented, and a k-means clustering algorithm was designed to process sampling data.By employing the differential privacy mechanism, the trajectory data was disturbed to solve the user privacy leaking problem caused by the attacker with powerful background knowledge.Simultaneously, to respond to the error boundary of the query range of pandemic, an effective prediction mechanism was designed to ensure the availability of released public track data.Simulation results demonstrate that compared with the existing trajectory differential privacy protection methods, the proposed scheme has obvious advantages in terms of processing efficiency, privacy protection intensity, and data availability.…”
    Get full text
    Article
  14. 11134

    The Quick Measure of a Nurbs Surface Curvature for Accurate Triangular Meshing by Kniat Aleksander

    Published 2014-04-01
    “…Mathematical description of the problem and the algorithm to find its solution are also presented in the paper.…”
    Get full text
    Article
  15. 11135

    Research on the invulnerability of regional network based on topology analysis by Changqing AN, Yujia LIU, Hui WANG, Zhiyan ZHENG, Tao YU, Jilong WANG

    Published 2021-11-01
    “…To measure the overall impact of different attacks a network region may encounter, an evaluation algorithm can be used to capture the difference in invulnerability of regional network topologies.Specifically, the vulnerability of regional network and that of connection topology between regions both internally and externally was analyzed.To find predictions between regions as supplemental topology data and create the Internet topology, data would be measured in various ways and verified.Using stratified probability sampling, multiple damage simulations could predict the worst-case scenarios in real conditions.Damage was simulated multiple times based on stratified probability sampling to approximate the damage situation of the area under real conditions.A significance tester was realized to measure the impact of damage from the overall level and special weak points respectively, discover the difference of the damage between the areas, and calculate the regional invulnerability ranking.Finally, the ranking and clustering results of forty-eight regions were given.…”
    Get full text
    Article
  16. 11136

    Modeling and performance analysis of train communication network based on switched ethernet by Yu-zhuo ZHANG, Yuan CAO, Ying-hong WEN

    Published 2015-09-01
    “…In order to meet the information transmission requirements of large capacity,high speed and hard real-time in the future,switched ethernet was introduced to the train communication network (TCN).Messages of different priorities was investigated,and established the TCN transmission process model with determined and stochastic Petri nets (DSPN) in accordance to its communication scheduling mechanism.The influences of different switch scheduling algorithms to the delay were compared,and the relationships between throughput and message number,throughout and generating cy-cle were respectively investigated.The experimental results show that the priority scheduling algorithm can reduce the delay of real-time data under the condition of sacrificing non real-time data's delay.It also verify the throughput of TCN based on switched ethernet is much higher than that of the existing TCN,which can provide theoretical basis for the de-sign and optimization in the future.…”
    Get full text
    Article
  17. 11137

    Segmentation of Activated Sludge Flocs in Microscopic Images for Monitoring Wastewater Treatment by Ahmed Elaraby, Walid Hamdy, Humaira Nisar, Monagi H. Alkinani

    Published 2022-01-01
    “…To address this challenge, we propose a novel framework involving a multiphase edge detection algorithm based on information theory. The proposed framework is evaluated and scrutinized critically considering the artifacts found in the photographs tested. …”
    Get full text
    Article
  18. 11138

    Iterative joint source channel decoding for WMSN by YANG Yang, CHEN Yong-rui, ZHAO Jun-lin, YI Wei-dong

    Published 2008-01-01
    “…An iterative joint source channel decoding (ISCD) scheme for WMSN is proposed, based on a soft-input-soft-output (SISO) a posteriori probability decoding algorithm for variable-length coded sources, which leads to not only maximum likelihood (ML) sequence estimation but also the computation of bit-based reliability values which are necessary for ISCD. …”
    Get full text
    Article
  19. 11139

    Quantitative method for network security situation based on attack prediction by Hao HU, Run-guo YE, Hong-qi ZHANG, Ying-jie YANG, Yu-ling LIU

    Published 2017-10-01
    “…To predict the attack behaviors accurately and comprehensively as well as to quantify the threat of attack,a quantitative method for network security situation based on attack prediction was proposed.By fusing the situation factors of attacker,defender and network environment,the capability of attacker and the exploitability rate of vulnerability were evaluated utilizing the real-time detected attack events,and the expected time-cost for attack-defense were further calculated.Then an attack prediction algorithm based on the dynamic Bayesian attack graph was designed to infer the follow-up attack actions.At last,the attack threat was quantified as the security risk situation from two levels of the hosts and the overall network.Experimental analysis indicates that the proposed method is suitable for the real adversarial network environment,and is able to predict the occurrence time of attack accurately and quantify the attack threat reasonably.…”
    Get full text
    Article
  20. 11140

    Structural Analysis of Huaguangtan Arch Dam Based on Data Assimilation Parametric Inversion by LIN Xianzhi, LUO Zenghong, XU Zheng, MIN Jiesheng, CAO Chuanbo, ZHAO Quan

    Published 2023-01-01
    “…Aiming at the difficulty of the accurate safety assessment of the overall structural state of Huaguangtan Arch Dam,a finite element model of the arch dam is established,and the data assimilation algorithm is used to invert the material parameters based on the results of the sensitivity analysis of the mechanical parameters of the arch dam concrete and bedrock.Finally,the material parameters of finite element calculation are calibrated by parameter inversion results.The results show that the residual between the finite element displacement simulation result and the monitoring data conforms to the Gaussian distribution,and its standard deviation after data assimilation parametric inversion is reduced by 81.2%,which improves the accuracy of finite element calculation.This method enables automated operation and provides a reasonable and reliable new idea for the structural safety assessment of arch dams.…”
    Get full text
    Article