Showing 11,201 - 11,220 results of 19,511 for search '"algorithm"', query time: 0.09s Refine Results
  1. 11201

    CRASHWORTHINESS DESIGN AND OPTIMIZATION FOR COLLISION POST OF TRAIN by SHI YueQing, QIN RuiXian, CHEN BingZhi

    Published 2022-01-01
    “…Based on the optimal Latin hypercube experimental design method, a polynomial response surface surrogate model of the specific energy absorption and the peak crush force with respect to the wall thickness of the novel multi-cell collision post was established, the multi-objective optimization problem was conducted using the Non-dominated Sorting Genetic Algorithm-Ⅱ and the Pareto front was obtained. The optimization results show that the total energy and specific energy absorption of the novel multi-cell collision post are improved significantly while meeting the structural lightweight requirements compared with the conventional single-cell structure.…”
    Get full text
    Article
  2. 11202

    Model of valorization of soils under viewpoint of their potential resistance against some selected contaminants: (based on the author’s PhD thesis) by Jan Sandner

    Published 2004-12-01
    “…To determine the balance of this environment, it is necessary to study the impact of these pollutants and to determine the so-called This paper tries to solve the problems of impact assessment by creating the so-called environmental algorithm, in which all the basic components of the soil environment are taken into account, for the simulation of pollutant emissions. …”
    Get full text
    Article
  3. 11203

    Seismic Response of Torsionally Coupled System with Magnetorheological Dampers by Snehal V. Mevada, R. S. Jangid

    Published 2012-01-01
    “…The seismic response of linearly elastic, idealized single-storey, one-way asymmetric building with semiactive magnetorheological (MR) dampers with clipped-optimal algorithm is investigated. The response is obtained by numerically solving the governing equations of motion. …”
    Get full text
    Article
  4. 11204

    Self-Organizing Energy-Saving Management Mechanism Based on Pilot Power Adjustment in Cellular Networks by Yu Peng, Li Wenjing, Qiu Xuesong

    Published 2012-10-01
    “…Next, it adopts intelligent coverage compensation algorithm to adjust pilot power of compensated BSs, so as to avoid coverage hole and ensure enough capacity. …”
    Get full text
    Article
  5. 11205

    Learning of the user behavior structure based on the time granularity analysis model by Lin Guo, Xiaoying Liu

    Published 2025-01-01
    “…This method of data collection has high cost, low data coverage, and lagging survey results. The algorithm proposed in this article analyzes purchasing data from e-commerce platforms and extracts short- and long-term consumption matrices of consumers. …”
    Get full text
    Article
  6. 11206

    Research on 4G/5G voice quality optimization based on data mining and geographic visualization by Jian HU, Lei SUN, Yiyan YIN, Xiaokang YANG, Jingui BAI, Yejiang ZHANG

    Published 2022-10-01
    “…Traditional voice quality optimization relies on field test, case accumulation and expert experience.It is costly and inefficient to analyze problems by manual test.Through the application of data mining, decision tree machine learning algorithm, geographic visualization and other technologies, a voice experience optimization visualization platform based on big data analysis was developed, which could effectively identify the laws in voice big data, and realize the functions of correlation analysis between user voice experience index and wireless network performance index, intelligent recognition of degradation threshold and image analysis of poor quality areas.It is conducive to reduce the skill threshold of network engineers, improve the work efficiency of network optimization, save network operation and maintenance costs, and provide accurate and effective voice experience improvement solutions for the industry.…”
    Get full text
    Article
  7. 11207

    Transmission scheduling scheme based on deep Q learning in wireless network by Jiang ZHU, Tingting WANG, Yonghui SONG, Yali LIU

    Published 2018-04-01
    “…To cope with the problem of data transmission in wireless networks,a deep Q learning based transmission scheduling scheme was proposed.The Markov decision process system model was formulated to describe the state transition of the system.The Q learning algorithm was adopted to learn and explore the system states transition information in the case of unknown system states transition probability to obtain the approximate optimal strategy of the schedule node.In addition,when the system state scale was big,the deep learning method was employed to map the relation between state and behavior to solve the problem of the large amount of computation and storage space in Q learning process.The simulation results show that the proposed scheme can approach the optimal strategy based on strategy iteration in terms of power consumption,throughput,packets loss rate.And the proposed scheme has a lower complexity,which can solve the problem of the curse of dimensionality.…”
    Get full text
    Article
  8. 11208

    Investigation of fractional-order pantograph delay differential equations using Sumudu decomposition method by Asrar Saleh Alsulami, Mariam Al-Mazmumy, Maryam Ahmed Alyami, Mona Alsulami

    Published 2024-12-01
    “…The findings underscore both the efficiency and accuracy of the proposed algorithm.…”
    Get full text
    Article
  9. 11209

    Failure Probability Modeling of Miniature DC Motors and Its Application in Fault Diagnosis by Zhiping Xie, Rongchen Zhao, Jiming Zheng, Yancheng Lang

    Published 2021-01-01
    “…The fault diagnosis algorithm is synthesized to obtain the threshold ranges of fault multiple features according to different confidence levels. …”
    Get full text
    Article
  10. 11210

    Forest based data collection in MR-MC wireless sensor networks by Wei-ping ZHANG, Ya-hong GUO, Meng WANG, Lin-yu NI, Jin-bao LI

    Published 2016-03-01
    “…The limit of node itself and deployment environment of WSN result in the node was prone to failure and diffi-cult to maintain.In the tree-based data collection process,the node failure or lin congestion could result in higher com-munication delay,or even data loss.To solve this problem,a strategy for data collection was proposed which used forest as the routing structure.Firstly,an algorithm for the construction of forest was proposed,and then collect data through trees in the forest.Theoretical analysis and simulation results show that,the method could reduce the loss of data in the data collection process effectively,in the case of 25 fault nodes,the amount of data collected by forest routing structure of 3 trees compared to the amount of data collected from the connected dominating set is more than 55%,and reduce the la-tency of data collection.…”
    Get full text
    Article
  11. 11211

    Energy-efficient load balancing in wireless sensor network: An application of multinomial regression analysis by Ruwaida M Zuhairy, Mohammed GH Al Zamil

    Published 2018-03-01
    “…The contribution of this research is to propose an energy-efficient load balancing strategy based on the proposed prediction model for the purpose of enhancing the lifetime of wireless infrastructure. Our proposed algorithm grows linearly in terms of time complexity. …”
    Get full text
    Article
  12. 11212

    Identification of the boundary regime in the process of water-oil displacement from the reservoir by Gamzaev Khanlar

    Published 2024-12-01
    “…Based on the proposed computational algorithm, numerical experiments were carried out for the model oil reservoir.…”
    Get full text
    Article
  13. 11213

    Development Path Planning of Sports and Wellness Town under the Background of Computer Virtual Reality Technology by Lichun Chen, Bingxu Lu

    Published 2022-01-01
    “…In addition, this article uses the single-network ADP algorithm to solve the event-triggered HJB equation and adopts a new weight update law. …”
    Get full text
    Article
  14. 11214

    Multi-objective Optimization Design of RV Reducer Considering the Cycloid Gear Profile Modification by Wang Quan, Zeng Lilei, Qin Zhengzheng

    Published 2020-04-01
    “…In view of the fact that the influence of cycloid gear profile modification on contact force is not taken into account in the structural design of RV reducer,a multi-objective optimization design method for the structure of RV reducer considering cycloid gear profile modification is proposed.Combining the theory of tooth profile modification with the calculation of contact stress of cycloidal gear,considering the factors of volume,efficiency and contact stress,an optimization mathematical model with small volume,high efficiency and low contact stress of cycloidal gear as multi-objective function is established.The solution is carried out by using NSGA-II algorithm,and compared with single-objective optimization method.The results show that compared with the original design,the volume of RV reducer decreases by 21.24%,the efficiency increases by 2.03%,and the contact stress of cycloid wheel decreases by 20.26%.Meanwhile,the multi-objective optimization method has higher comprehensive performance than the single-objective optimization method.…”
    Get full text
    Article
  15. 11215

    Full-diversity design criterion for multi-user STBC based on integer-forcing detection by Guoquan LI, Xiangyun ZHOU, Jinzhao LIN, Yongjun XU, Yu PANG, Jiacheng WANG

    Published 2019-03-01
    “…Multi-user space time block code systems have the problem of high decoding complexity.To ensure good system performance with low decoding complexity at the same time,low complexity integer-forcing (IF) detection algorithm was applied to multi-user space time block code.Then the upper bound of error probability for IF detection was derived by minimizing the equivalent noise power.To obtain good multi-user space time block code when decoded with IF detection,a full-diversity design criterion was proposed.It was proved that full diversity could be achieved if every user’s space time block code had property of non-vanishing singular value.Simulation result shows that the code gain is found related to the minimum singular value.…”
    Get full text
    Article
  16. 11216

    Cross-layer multi-channel MAC protocol combined with QoS search for cognitive wireless multi-hop networks by Jie SUN, Wei GUO

    Published 2013-04-01
    “…In cognitive wireless multi-hop networks,the spectrum resources are highly variable and diverse.A cross-layer multi-channel MAC protocol combined with QoS search was proposed.The protocol combines the on-demand QoS search with dynamic spectrum allocation via cross-layer method,which only permits the transmission nodes to participate in the spectrum allocation and can guarantee the allocation results meet the QoS requirement.Besides,frequency division duplex transceivers are introduced to continuously listen to the common control channel,and an access algorithm is carefully designed to realize hybrid communication between nodes with erent number of transceivers.Extensive simulations show that our protocol can efficiently guarantees the QoS requirement for end-to-end transmission and significantly improves end-to-end throughput and delay.…”
    Get full text
    Article
  17. 11217

    Channel estimation method for MIMO-OFDM systems based on pilots and modified Kalman filter by SONG Tie-cheng, YOU Xiao-hu, SHEN Lian-feng, SONG Xiao-jin

    Published 2007-01-01
    “…A combined channel estimation method of time-frequency-selective fading channels in MIMO-OFDM systems was proposed.The time-varying channel was modeled as an autoregressive(AR) process and a low-dimensional Kalman filter based on pilots was used to estimate the AR parameters,and the LS(least square) algorithm was adopted to track the time-varying channel fading factors.The Kalman estimator explored the time-domain correlation of the channel,and a minimum mean square error(MMSE) combiner was used to modify the Kalman estimates.The proposed solution could reduce the complexity of the high-dimensional Kalman filter and track the channel both in frequency and time domains.The simulation results show that this method improves the LS estimates and has a comparable performance to the com-plex high-dimensional Kalman channel estimation method.…”
    Get full text
    Article
  18. 11218

    Cross-layer scheduling and dynamic resource allocation for MIMO-OFDMA/SDMA systems with multi-service by ZHONG Chong-xian1, LI Chun-guo1, YANG Lv-xi1

    Published 2010-01-01
    “…Cross-layer scheduling and dynamic resource allocation problems were investigated for downlink MIMO-OFDMA/SDMA systems with multi-service.Firstly,a mathematical formulation of the optimization problem was provided with the objective of maximizing the total system throughput under various constraints.Secondly,a user group-ing scheme was proposed utilizing clustering analysis method based on the type of services and the spatial compatibility of multiple users with multiple receive antennas.Thirdly,a new cross-layer scheduling and dynamic resource allocation algorithm was developed based on the proposed user grouping scheme combined with the priorities of different service,which maximizes the total system throughput by maximizing the throughput of each subcarrier.Simulation results show that compared with the existing schemes,the proposed algorithms obtain reasonable throughput performance while provide better QoS requirement for each user of different services.…”
    Get full text
    Article
  19. 11219

    Parabolic Equation Accumulated Split Error and Its Correction Method for Tropospheric Radio Propagation by Peipei Wei, Xiaoyan Du, Xinwei Hu, Changyin Jiang

    Published 2018-01-01
    “…An increasingly popular approach of modeling electromagnetic wave propagation in the troposphere is to use the slip-step Fourier transform (SSFT) numerical algorithm to solve a parabolic equation (PE). However, available SSFT does not provide perfect solutions by introducing accumulated split error (ASE) for its step-by-step iteration process with a fixed propagation range step. …”
    Get full text
    Article
  20. 11220

    Confirmation method for the detection of malicious encrypted traffic with data privacy protection by Gaofeng HE, Qianfeng WEI, Xiancai XIAO, Haiting ZHU, Bingfeng XU

    Published 2022-02-01
    “…In order to solve the problem that excessive false positives in the detection of encrypted malicious traffic based on machine learning, secure two-party computation was used to compare character segments between network traffic and intrusion detection rulers without revealing the data content.Based on the comparison results, an intrusion detection feature matching algorithm was designed to accurately match keywords.A random verification strategy for users’ input was also proposed to facilitate the method.As a result, malicious users couldn’t use arbitrary data to participate in secure two-party calculations and avoid confirmation.The security and resource consumption of the method were theoretically analyzed and verified by a combination of real deployment and simulation experiments.The experimental results show that the proposed method can significantly improve the detection performance with low system resources.…”
    Get full text
    Article