Showing 11,381 - 11,400 results of 19,511 for search '"algorithm"', query time: 0.08s Refine Results
  1. 11381

    Mobile operation and maintenance system of electric power communication access network based on IoT technology by Haiming JIANG, Danni XIA, Yuan LIU, Shiwen ZHAO, Lin FEI, Jingyu REN

    Published 2018-10-01
    “…The mobile operation and maintenance system of electric power communication access network was designed.In this developed system,the technology with intelligent identification of internet of things and data real-time transmission was introduced to the on-site operation and maintenance standardization management of the power communication network.First of all,the mobile operation and maintenance system architecture was built to realize the informatization of on-site operation and maintenance.And then,the TOPSIS algorithm was utilized to allocate the worksheet automatically,which improved the efficiency of fault processing.Besides,by real-time monitoring the site through the system,the intelligent management of the power communication access network was realized.The test results show that the operational management system is able to realize resources unified management,fault intelligent analysis,informatization support of on-site operations management,and also greatly enhance the intelligent operation and management level of power communication access network.…”
    Get full text
    Article
  2. 11382

    Optimization Research of the Hinge Position and Output Speed of Electromechanical Erection Device by Wei Cai, Shangjun Ma, Jianxin Zhang, Yong Zhou, Xiang Chen, Geng Liu

    Published 2021-08-01
    “…The relation between output speed and output power, the relation between output speed and output force, the relation between hinge position and output power, the relation between hinge position and output force are explored. The Genetic Algorithm is taken to optimize the output speed and the hinge position. …”
    Get full text
    Article
  3. 11383

    An UAV-Assisted Edge Computing Resource Allocation Strategy for 5G Communication in IoT Environment by Hao Liu

    Published 2022-01-01
    “…Based on the optimization of the UAV trajectory, communication scheduling, and the energy consumption model of the UAV, the problem of the total computational cost minimization is formulated. Then, the genetic algorithm is improved by introducing a penalty function to solve this problem, in which selection, crossover, and mutation operations are iterated to obtain the optimal allocation strategy for computational resources. …”
    Get full text
    Article
  4. 11384

    Research on fusion model based on deep learning for text content security enhancement by Shaomin WANG, Zheng WANG, Hua REN

    Published 2020-05-01
    “…The rapid expansion of information content on the internet and the mobile internet has resulted in violations of laws and regulations and bad information,which affects the content security of the internet space.Traditional text content security recognition methods based on matching of sensitive words ignore context semantics,resulting in high false positive rate and low accuracy.Based on the analysis of traditional text content security recognition methods,a fusion recognition model using deep learning and a model fusion algorithm process were proposed.Text content security recognition system based on the fusion recognition model using deep learning and experimental verification was introducted deeply.Results show that the proposed model can effectively solve the problem of high false positive rate caused by the lack of semantic understanding of traditional recognition methods,and improve the accuracy of the bad information detection.…”
    Get full text
    Article
  5. 11385

    Massive unsourced multiple access scheme based on block sequence codebook and compressed sensing by Jing ZHANG, Lin MA, Chulong LIANG, Hongxu GAO

    Published 2023-12-01
    “…A massive unsourced multiple access scheme based on block sequence codebook and compressed sensing was proposed for sporadic burst scenario in massive machine type communication (mMTC).Firstly, a large-capacity spreading codebook generation scheme was designed according to a specific shift pattern, thus the codebook space was expanded.Secondly, the sparse structure of uplink signal was combined with multi-carrier technology to support overlapping transmission of multi-user data on some subcarriers, thus the spectral efficiency was improved.Finally, a multi-carrier CS-MUD model was established, and a group orthogonal matching pursuit algorithm based on codebook sequence blocks was designed to achieve the joint detection of active users and their uplink data.Simulation results show that the proposed scheme can effectively reduce the bit error rate of massive random access.…”
    Get full text
    Article
  6. 11386

    Underwater acoustic OFDM channel equalization based on virtual time reversal mirror by Yan-ling YIN, Gang QIAO, Song-zuo LIU

    Published 2015-01-01
    “…To solve the problem of the severe inter-symbol interference of orthogonal frequency division multiplexing (OFDM) communication caused by underwater acoustic multipath channel,a virtual time reversal channel equalization scheme was proposed.VTRM was able to shorten the channel impulse response and alleviate the phase distortion caused by the acoustic channel for its characteristic of the temporal compression and phase conjugation in frequency domain.The matching pursuit (MP) algorithm was applied to estimate the channel impulse response which could estimate the channel amplitude,time delay and phase accurately.It provided the channel information for the VTRM channel equalization.It also improved a lot compared to the traditional matching correlation channel estimation method which couldn't estimate the channel phase and the estimation precision was low.The simulation,pool trail and Songhua lake experiment show that the performance of VTRM channel equalization is better than that of the PTRM and LS channel equalization in the OFDM underwater acoustic communication.…”
    Get full text
    Article
  7. 11387

    Cloud native intelligent operation and maintenance technology by Long XUE, Gang LU, Qi ZHOU, Huiyan ZHANG, Tingjun WAN

    Published 2020-12-01
    “…Relying on the advantages of simple and fast applications,easy deployment of applications,and on-demand scaling of running applications,cloud native technology has been rapidly promoted.However,with the application of cloud native,the system architecture has become more complex and the scale of resources has become larger,and there is an urgent need for more intelligent operation and maintenance.Using intelligent operation and maintenance can better assist cloud-native application development,reduce operation and maintenance costs,and improve service quality.The application scenarios,key points,classic practices and existing problems of intelligent operation and maintenance were analyzed,and a cloud-native intelligent operation and maintenance architecture were proposed,and the main principles of the three scenarios:the trend prediction,data anomaly detection and fault location diagnosing in the core service algorithm platform were introduced in detail,and finally the future of intelligent operation and maintenance were looked forward.…”
    Get full text
    Article
  8. 11388

    Kinematics Analysis of a Parallel Mixing Machine and Its Scale Optimal Design by Chen Jing, Guo Qian, Zhu Wei

    Published 2024-10-01
    “…Taking the variation change of the attitude angles of the moving platform as the objective function, the differential evolution algorithm was used to optimize the scale parameters of the mechanism, and the obtained mechanism has better mixing motion performance than that before the optimization.…”
    Get full text
    Article
  9. 11389

    Refining instantaneous frequency estimation: Tackling abrupt transitions in aliased non-stationary signals by Sadiq Ali, Nabeel Ali Khan

    Published 2025-03-01
    “…The proposed Instantaneous Frequency estimation algorithm is further extended by adding a refinement mechanism where the crude estimates of Instantaneous Frequencies are further improved through the re-estimation stage. …”
    Get full text
    Article
  10. 11390

    Diagrammatic Analysis of Nonhomogeneous Diffusion by Julio A. Hernández

    Published 2014-01-01
    “…This study introduces a diagrammatic algorithm, inspired in previous ones employed to analyze multicyclic chemical systems, to derive expressions for nonhomogeneous diffusion coefficients and to study the effects of volume exclusion. …”
    Get full text
    Article
  11. 11391

    Markov Regime Switching of Stochastic Volatility Lévy Model on Approximation Mode by Arthit Intarasit

    Published 2013-01-01
    “…Regime switching of stochastic volatility Lévy process is employed in an approximation mode for model calibration and the calibration of parameters model done based on EM algorithm. Finally, some empirical results are illustrated via applications to the Bangkok Stock Exchange of Thailand index.…”
    Get full text
    Article
  12. 11392

    The Hermitian -Conjugate Generalized Procrustes Problem by Hai-Xia Chang, Xue-Feng Duan, Qing-Wen Wang

    Published 2013-01-01
    “…The representation of the corresponding optimal approximation problem is presented. Finally, an algorithm for solving two problems above is proposed, and the numerical examples show its feasibility.…”
    Get full text
    Article
  13. 11393

    Simultaneous Resource Accumulation and Payoff Allocation: A Cooperative Fuzzy Game Approach by Surajit Borkotokey, Rupok Neog, Qiang Zhang

    Published 2018-01-01
    “…We develop a simultaneous resource accumulation and payoff allocation algorithm under the framework of a cooperative fuzzy game that builds on our earlier work on the role of satisfaction in resource accumulation and payoff allocation. …”
    Get full text
    Article
  14. 11394

    Method of short text strategy mining based on sub-semantic space by Yang SUN, Li SU, Xing ZHANG, Fengsheng WANG, Haitao DU

    Published 2020-03-01
    “…To solve the problem of identifying short text data accurately,a method of short text strategy mining based on sub-semantic space was proposed.Firstly,semantic space technology was used to solve the problem of “vocabularygap” and “data sparseness” in short text analysis.Then,based on clustering algorithm,the semantic space was divided into several sub-semantic spaces,and association rules were mined in the sub-semantic space,which improved the efficiency and quality of strategy generation.Finally,binary tree was used to merge strategies and generate the simplest strategy set.Experiments show that compared with the traditional classification model,the accuracy rate of the strategy set generated by the proposed scheme can achieve 85% when the false positive rate is 6.5%.In the processing of illegal short messages,using this technology to mine potential policy sets has strong coverage ability,high accuracy and strong practicability.…”
    Get full text
    Article
  15. 11395

    Dynamic spectrum access mechanism based on graphical evolutionary game in radio networks by Fang-wei LI, Ying-hui YUAN, Jiang ZHU

    Published 2015-07-01
    “…In order to realize efficient data transmission for users in radio networks,a dynamic spectrum access mechanism based on graphical evolutionary game was proposed for the bounded rationality characteristic of users,while graphical game can better reflect the actual game relationship among users.Meanwhile,a dynamic spectrum access algorithm and corresponding dynamic equation were designed for the mechanism to reduce the complexity of the game,and could converge to Nash equilibrium with faster speed and obtain higher system throughput and utility.Theoretical analysis showed that the dynamic equation was globally asymptotically stable,which illustrated that when user deviated because of bounded rationality and it was still able to guarantee faster converge and fewer performance deviation.Simulation comparison verifies the superiority above.…”
    Get full text
    Article
  16. 11396

    Machine Learning Applications based on SVM Classification A Review by Dakhaz Mustafa Abdullah, Adnan Mohsin Abdulazeez

    Published 2021-04-01
    “…This paper, therefore, attempts to deal with data processing, using a support vector machine (SVM) algorithm in different fields since it is a reliable, efficient classification method in the area of machine learning. …”
    Get full text
    Article
  17. 11397

    Submassive Pulmonary Thromboembolism in a Patient with Thrombocytopenia: Therapeutic Challenge by Ronni Andrea Muñoz Tovar, Luis Carlos Alvarez Perdomo, Sandra Milena Rojas Molina, Silvana Jimenez Salazar

    Published 2019-01-01
    “…The case establishes a therapeutic challenge for the treating group, leading us to carry out an extensive search of the literature and propose a management algorithm in this complex situation.…”
    Get full text
    Article
  18. 11398

    Research on Avoidance of Energy Hole Scheme in the Wireless Mesh Network by Chunlong Lu, Yuchun Cao, Guangxue Yue

    Published 2013-11-01
    “…In order to avoid the energy hole problem in wireless mesh network, the non-uniform distribution strategy about the cluster nodes was put forward, the energy efficiency optimization equilibrium routing algorithm was designed. When the distribution of cluster nodes in the wireless mesh network met the certain relations, the network could optimize the energy consumption efficiency equilibrium. …”
    Get full text
    Article
  19. 11399

    Feature selection method for software defect number prediction based on maximum information coefficient by Guoqing LIU, Xingqi WANG, Dan WEI, Jinglong FANG, Yanli SHAO

    Published 2021-05-01
    “…The traditional feature selection method only considers the linear correlation between variables and ignores the nonlinear correlation, so it is difficult to select effective feature subsets to build the effective model to predict the number of faults in software modules.Considering the linear and nonlinear relationship, a feature selection method based on maximum information coefficient (MIC) was proposed.The proposed method separated the redundancy analysis and correlation analysis into two phases.In the previous phase, the cluster algorithm, which was based on the correlation between features, was used to divide the redundant features into the same cluster.In the later phase, the features in each cluster were sorted in descending order according to the correlation between features and the number of software defects, and then the top features were selected to form the feature subset.The experimental results show that the proposed method can improve the prediction performance of software defect number prediction model by effectively removing redundant and irrelevant features.…”
    Get full text
    Article
  20. 11400

    Research on content distribution mechanism of MP2P networks by Guo-yin ZHANG, Lu LI, Jian-guo SUN, Xiang-hui WANG

    Published 2013-05-01
    “…In consideration of the current MP2P network disturbance from frequent location changes of the mobile nodes,the limited computing power and storage capacity,a flexible strategy of partition management by assigning different functions to nodes according to some standards,regarding a subnet as a unit and using super-nodes to manage subnets were proposed.In order to speed up the data transmission and replacement efficiency,data was processed with partial network coding technology.Additionally,a trans-subnet query algorithm was proposed to link subnets,conduct informa-tion exchange between subnets and resource location.Results of the experiment manifested that this strategy can effi-ciently increase the resource download success rate and hit rate,reduce the average delay,improve the content distribu-tion efficiency of MP2P networks,and simultaneously enhance system robustness.…”
    Get full text
    Article