Showing 11,461 - 11,480 results of 19,511 for search '"algorithm"', query time: 0.10s Refine Results
  1. 11461

    Beamforming and resource optimization in UAV integrated sensing and communication network with edge computing by Bin LI, Sicong PENG, Zesong FEI

    Published 2023-09-01
    “…To address the dependence of traditional integrated sensing and communication network mode on ground infrastructure, the unmanned aerial vehicle (UAV) with edge computing server and radar transceiver was proposed to solve the problems of high-power consumption, signal blocking, and coverage blind spots in complex scenarios.Firstly, under the conditions of satisfying the user’s transmission power, radar estimation information rate and task offloading proportion limit, the system energy consumption was minimized by jointly optimizing UAV radar beamforming, computing resource allocation, task offloading, user transmission power, and UAV flight trajectory.Secondly, the non-convex optimization problem was reformulated as a Markov decision process, and the proximal policy optimization method based deep reinforcement learning was used to achieve the optimal solution.Simulation results show that the proposed algorithm has a faster training speed and can reduce the system energy consumption effectively while satisfying the sensing and computing delay requirements.…”
    Get full text
    Article
  2. 11462

    ANN Approach to Predict the Flow Stress of CMn (Nb-Ti-V) Micro Alloyed Steel by Allaoui Abdelhalim, Guedri Abdelmoumene, Darsouni Lamia, Darsouni Abderrazek

    Published 2019-07-01
    “…The ANN model was trained with Levenberg-Marquardt (LM) algorithm. The optimal LM neural network model with two hidden layer network with ten neurons in the ?…”
    Get full text
    Article
  3. 11463

    A Novel Feature Extraction Technique Using Binarization of Bit Planes for Content Based Image Classification by Sudeep Thepade, Rik Das, Saurav Ghosh

    Published 2014-01-01
    “…The technique has binarized the significant bit planes of an image by selecting local thresholds. The proposed algorithm has been tested on a public dataset and has been compared with existing widely used techniques using binarization for extraction of features. …”
    Get full text
    Article
  4. 11464

    Design of PI Controller for Voltage Controller of Four-Phase Interleaved Boost Converter Using Particle Swarm Optimization by Ittipon Laoprom, Satean Tunyasrirut

    Published 2020-01-01
    “…The metaheuristic optimizations, particle swarm optimization (PSO), genetic algorithm (GA), and Tabu search (TS) are applied to find the optimal gains for the proposed control system. …”
    Get full text
    Article
  5. 11465

    Gait Correlation Analysis Based Human Identification by Jinyan Chen

    Published 2014-01-01
    “…By background subtracting algorithm, the moving silhouette figure can be extracted from the walking images sequence. …”
    Get full text
    Article
  6. 11466

    INTER-LAYER BIT ALLOCATION FOR SCALABLE HIGH-EFFICIENCY VIDEO CODING by Võ Phương Bình

    Published 2016-06-01
    “…In this paper, an improved bit allocation algorithm is proposed at the frame level for the emerging Scalable High-efficiency Video Coding (SHVC) standard. …”
    Get full text
    Article
  7. 11467

    AXIAL TENSILE STRENGTH ANALYSIS OF UNBONDED FLEXIBLE PIPE CONTAINING COMPOSITE TENSILE ARMORS by MA JinSheng, DU FaXi, LUO Dan

    Published 2020-01-01
    “…As offshore oil industry moves into ultra-deep water,replacing the steel tensile armors of unbonded flexible pipe with composite is becoming a scheme that can effectively reduce weight and provide better mechanical properties.The anisotropic parameters of composite are obtained by meso-mechanical method,then a model of axisymmetric structure response for composite flexible pipe with composite armored layer is established,which is based on both thick-wall cylinder theory and the differential equation of curved beam,and also the algorithm of cyclic iterative is combined.Failure models of different type of flexible pipes are obtained,and iso-strength method is used for composite armored pipe.A case study shows that composite armors can effectively enhance the tensile strength of unbonded flexible pipe while effectively reduce the overall weight.Results state that volume fraction,elastic modulus and strength of fiber are the important parameters which affect the axial stiffness and tensile strength of unbonded flexible pipe.…”
    Get full text
    Article
  8. 11468

    Multi-objective optimization placement strategy for SDN security controller considering Byzantine attributes by Tao WANG, Hongchang CHEN

    Published 2021-06-01
    “…By giving the software defined network distributed control plane Byzantine attributes, its security can be effectively improved.In the process of realizing Byzantine attributes, the number and location of controllers, and the connection relationship between switches and controllers can directly affect the key network performance.Therefore, a controller multi-objective optimization placement strategy for SDN security controllers considering Byzantine attributes was proposed.Firstly, a Byzantine controller placement problem (MOSBCPP) model that comprehensively considered interaction delay, synchronization delay, load difference and the number of controllers was constructed.Then, a solution algorithm based on NASG-II was designed for this model, which included the initialization function, the mutation function, the fast non-dominated sorting function and the elite strategy selection function.Simulation results show that this strategy can effectively reduce interaction delay, synchronization delay, load difference and the number of controllers, while improving control plane security.…”
    Get full text
    Article
  9. 11469

    An Improved AAM Method for Extracting Human Facial Features by Tao Zhou, Xiao-Jun Wu, Tao Wu, Zhen-Hua Feng

    Published 2012-01-01
    “…Experimental results show that the improved algorithm can increase the accuracy of the AAM fitting and express more information for structures of edge and texture.…”
    Get full text
    Article
  10. 11470

    Leading causes of fever in patients with liver function disorders by V. T. Ivashkin, M. A. Morozova, M. V. Mayevskaya

    Published 2010-02-01
    “…Article presents pathophysiological mechanisms of development of fever. The algorithm of assessment of patient with disorder of liver function and fever is submitted.Original positions. …”
    Get full text
    Article
  11. 11471

    Compressed sensing for electrocardiogram acquisition in wireless body sensor network: A comparative analysis by Junxin Chen, Jiazhu Xing, Leo Yu Zhang, Lin Qi

    Published 2019-07-01
    “…The performances of involved important factors, such as wavelet basis, overcomplete dictionaries, and the reconstruction algorithms, are comparatively illustrated, with the purpose to give data reference for practical applications. …”
    Get full text
    Article
  12. 11472

    FraudMiner: A Novel Credit Card Fraud Detection Model Based on Frequent Itemset Mining by K. R. Seeja, Masoumeh Zareapoor

    Published 2014-01-01
    “…The class imbalance problem is handled by finding legal as well as fraud transaction patterns for each customer by using frequent itemset mining. A matching algorithm is also proposed to find to which pattern (legal or fraud) the incoming transaction of a particular customer is closer and a decision is made accordingly. …”
    Get full text
    Article
  13. 11473

    Segment search for local extremums of images based on the analysis of brightness of adjacent homogeneous areas by V. Yu. Tsviatkou, Anh Tuan Nguyen

    Published 2019-09-01
    “…Well-known block-search algorithms provide high speed, but they extract only strict (single-pixel) extremes, skipping extreme areas formed by non-strict extremes. …”
    Get full text
    Article
  14. 11474

    Multilevel Thresholding for Image Segmentation Using Mean Gradient by Abubakar M. Ashir

    Published 2022-01-01
    “…These challenges present difficulties in the choice of the algorithm to use, and sometimes, it is practically impossible to implement these algorithms in a low-capacity hardware application where computational power and memory utilization are of great concern. …”
    Get full text
    Article
  15. 11475

    A Stochastic and Optimized Energy Efficient Clustering Protocol for Wireless Sensor Networks by Kyung Tae Kim, Hee Yong Youn

    Published 2014-03-01
    “…The performance of the proposed scheme is compared with the clustering-based routing protocols, Low-Energy Adaptive Clustering Hierarchy (LEACH), LEACH-Centralized (LEACH-C), and Adaptive and Energy Efficient Clustering (AEEC) algorithm. Simulation results show that it significantly reduces energy consumption and improves network lifetime. …”
    Get full text
    Article
  16. 11476

    Solution of Linear Radiative Transfer Equation in Hollow Sphere by Diamond Difference Discrete Ordinates and Decomposition Methods by Marcelo Schramm, Cibele Ladeia, Julio Cesar Fernandes

    Published 2024-12-01
    “…We use a decomposition method based on the Adomian formulations, together with a diamond difference scheme and a trapezoidal rule to approximate the integral part of the solution. The algorithm is simple, highly reproducible, and can be easily adapted to further problems or geometries. …”
    Get full text
    Article
  17. 11477

    Strength Analysis for Cage of Planetary Wheel Needle Roller Bearing by Yubo Wang, Haisheng Yang, Manjun Xu, Yongcun Cui, Sier Deng

    Published 2021-12-01
    “…Aiming to solving the problem of cage failure under revolution-rotation,based on the dynamics theory of rolling bearing,the dynamics differential equations of needle roller bearing coupled with revolution-rotation working condition are established,and GSTIFF variable step length integral algorithm is adopted to solve the bearing. Cage stress is used to evaluate cage strength,and the influence of bearing working conditions on cage stress is studied to guide cage material selection. …”
    Get full text
    Article
  18. 11478

    Communication-efficient federated learning method via redundant data elimination by Kaiju LI, Qiang XU, Hao WANG

    Published 2023-05-01
    “…To address the influence of limited network bandwidth of edge devices on the communication efficiency of federated learning, and efficiently transmit local model update to complete model aggregation, a communication-efficient federated learning method via redundant data elimination was proposed.The essential reasons for generation of redundant update parameters and according to non-IID properties and model distributed training features of FL were analyzed, a novel sensitivity and loss function tolerance definitions for coreset was given, and a novel federated coreset construction algorithm was proposed.Furthermore, to fit the extracted coreset, a novel distributed adaptive sparse network model evolution mechanism was designed to dynamically adjust the structure and the training model size before each global training iteration, which reduced the number of communication bits between edge devices and the server while also guarantees the training model accuracy.Experimental results show that the proposed method achieves 17% reduction in communication bits transmission while only 0.5% degradation in model accuracy compared with state-of-the-art method.…”
    Get full text
    Article
  19. 11479

    A Regularized Alternating Least-Squares Method for Minimizing a Sum of Squared Euclidean Norms with Rank Constraint by Pablo Soto-Quiros

    Published 2022-01-01
    “…Additionally, we present an algorithm based on the regularized alternating least-squares (RALS) method for solving the MSSEN-RC problem. …”
    Get full text
    Article
  20. 11480

    Energy Management Strategy Optimization of HEV based on Driving Pattern Recognition by Liu Yonggang, Xie Qingbo, Qin Datong, Lei Zhenzhen

    Published 2016-01-01
    “…The 23 typical driving cycles are chosen from ADVISOR software and five categories are divided by using clustering analysis method,the key parameters of each category are optimized by using particle swarm algorithm,with the goal of reducing fuel consumption,relevant optimized results are saved in database,an energy management strategy optimization method of HEV based on driving pattern recognition is proposed.Finally,the simulation analysis for the energy management is carried out under a comprehensive test cycle,simulation results show that vehicle fuel consumption is cut down 12. 77%,and the deviation of the battery SOC have greatly decrease compare with other energy management strategy which based on driving pattern recognition.…”
    Get full text
    Article