-
12701
Applications of Generalized Cascade Scattering Matrix on the Microwave Circuits and Antenna Arrays
Published 2015-01-01“…By inserting the ILSRNs, the complex interconnections can be converted into the standard one-by-one case without changing the characteristics of the previous microwave networks. Based on the algorithm of the generalized cascade scattering matrix, a useful derivation on the excitation coefficients of antenna arrays is firstly proposed with consideration of the coupling effects. …”
Get full text
Article -
12702
Prototype System for Supporting Medical Diagnosis Based on Voice Interviewing
Published 2025-01-01“…An analysis of data mining and selected machine learning methods was carried out to develop an effective diagnosis algorithm. The system is designed to optimise patient care by automating the initial phase of the medical interview, which can lead to a reduction in errors due to subjective assessments and reduce the workload on doctors. …”
Get full text
Article -
12703
Multiframe maximum a posteriori estimators for single‐microphone speech enhancement
Published 2021-09-01“…In a noise‐reduction algorithm, all available information of recorded signals should be optimally utilized in the estimation process. …”
Get full text
Article -
12704
Multi-frame blind deconvolution using X-ray microscope images of an in-plane rotating sample
Published 2024-11-01“…Untrained neural networks are employed as the reconstruction algorithm to enable robust reconstruction against stage motion errors caused by the in-plane rotation of samples. …”
Get full text
Article -
12705
Persevering Routing Technique Based on Event Occurrence Patterns for Wireless Sensor Networks
Published 2012-05-01“…This paper proposes a new routing algorithm schema based on event occurrence history to secure K-Coverage of event paths and maintain the maximum degree of coverage. …”
Get full text
Article -
12706
Achieving Fair Spectrum Allocation and Reduced Spectrum Handoff in Wireless Sensor Networks: Modeling via Biobjective Optimization
Published 2014-01-01“…The results obtained from the numerical experiments show that, by adjusting the weight on each objective function, the proposed algorithm allocates spectrum bands fairly with well observing each sensor’s priority and reduced spectrum handoffs.…”
Get full text
Article -
12707
Acoustic analysis using symmetrised implicit midpoint rule
Published 2022-07-01“…Thus, this paper aims to analyse the dissipation, dispersion, accuracy, and stability of the Runge�Kutta method and derive a new scheme and algorithm that preserves the symmetry property. The symmetrised method is introduced in the time-of-finite-difference method for solving problems in aeroacoustics. …”
Get full text
Article -
12708
Honeypot contract detection method for Ethereum based on source code structure and graph attention network
Published 2023-09-01“…To address the problems of low accuracy and poor generalization of current honeypot contract detection methods, a honeypot contract detection method for Ethereum based on source code structure and graph attention network was proposed.Firstly, in order to extract the structural information of the Solidity source code of the smart contract, the source code was parsed and converted into an XML parsing tree.Then, a set of feature words that could express the structural and content characteristics of the contract was selected, and the contract source code structure graph was constructed.Finally, in order to avoid the impact of dataset imbalance, the concepts of teacher model and student model were introduced based on the ensemble learning theory.Moreover, the graph attention network model was trained from the global and local perspectives, respectively, and the outputs of all models were fused to obtain the final contract detection result.The experiments demonstrate that CSGDetector has higher honeypot detection capability than the existing method KOLSTM, with increments of 1.27% and 7.21% on F<sub>1</sub> measurement in two-class classification and multi-class classification experiments, respectively.When comparing with the existing method XGB, the average recall rate of CSGDetector in the masked honeypot detection experiments for different types of honeypot contracts is improved by 7.57%, which verifies the effectiveness of the method in improving the generalization performance of the algorithm.…”
Get full text
Article -
12709
Blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid
Published 2024-01-01“…Aiming at the problem that how to support lightweight multi-dimensional data aggregation, achieve double-end integrity verification of multi-dimensional data in the overall process of the system, and deal with the centralization of cloud servers, a blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid was proposed.Firstly, in order to meet the demand for fine-grained analysis of power data in smart grid, privacy-preserving multidimensional data aggregation was achieved by using masked values and Horner’s rule.On this basis, for the data integrity verification problem of the existing data aggregation scheme in the sharing of cloud storage data with the third party, a new signature algorithm was designed by borrowing the RSA-based multiplicative homomorphic commitment scheme and homomorphic hash function homomorphism, which enabled the cloud server to verify the integrity of aggregated data and be used for integrity verification in the data sharing phase, i.e., it achieved double-end verifiability of cloud storage data and was resistant to internal attacks.Meanwhile, an aggregated data sharing architecture based on federated chain multichain was proposed to effectively avoid centralisation problems such as single-machine processing bottleneck and vulnerability to attacks.The theoretical analysis proves the security of the scheme.Performance experiments show that the proposed scheme has lower computation and communication costs compared with existing schemes.…”
Get full text
Article -
12710
The intelligent selenium-enriched tea withering control system
Published 2025-01-01“…Application results show that the system operates stably, accurately measures temperature and humidity in the withering environment, and achieves a control precision of $$\pm 1$$ % through a fuzzy control algorithm. It effectively meets the needs of tea processing in Enshi Prefecture. …”
Get full text
Article -
12711
A Timetable Optimization Model for Urban Rail Transit with Express/Local Mode
Published 2021-01-01“…In this study, a timetable optimization model is proposed by minimizing the total passenger waiting time at platforms. Further, a genetic algorithm is used to solve the minimization problems in the model. …”
Get full text
Article -
12712
LIGHTWEIGHT OF THE VEHICLE B PILLAR BASED ON SIX SIGMA ROBUST DESIGN UNDER SIDE IMPACT
Published 2016-01-01“…In this paper,by considering uncertainty factors,taking side impact of a car as an example,first of all,an accurate finite element model is established and verified according to relevant crash regulations,then,after building an approximate model and a deterministic optimization model,the optimal solution is obtained by sequential quadratic programming algorithm and the reliability analysis is used,finally the original vehicle B pillar is accomplished lightweight research and improvement by using six sigma robust design method. …”
Get full text
Article -
12713
A Study on Zone-Based Secure Multicast Protocol Technique to Improve Security Performance and Stability in Mobile Ad-Hoc Network
Published 2025-01-01“…In this paper, we propose a zone-based secure routing algorithm to improve the performance of routing protocols. …”
Get full text
Article -
12714
Theory and Application of Interval-Valued Neutrosophic Line Graphs
Published 2024-01-01“…Finally, an overview of the algorithm used to solve the problems and the practical application of the introduced graphs were provided.…”
Get full text
Article -
12715
Congestion avoidance in 6G networks with V Gradient Geocast Routing Protocol
Published 2025-01-01“…This will be realized using highly technical approaches such as the mini-batch gradient descent optimization algorithm for network optimization and the V Gradient Geocast Routing Protocol for effective routing. …”
Get full text
Article -
12716
Detection of Degradation Effects in Field-Aged c-Si Solar Cells through IR Thermography and Digital Image Processing
Published 2012-01-01“…I-V curve analysis results showed an agreement between the source of electrical performance degradation and the degradation effects in the defected cell identified by the IR thermography. Finally, an algorithm was developed to automatically detect EVA discoloration in PV cells through processing of the digital image alone in a way closely imitating human perception of color. …”
Get full text
Article -
12717
Virtual Scoping: lightweight and scalable TSN time synchronization accuracy measurement method
Published 2024-09-01“…As an example of accuracy optimization, a frequency offset compensation algorithm based on V-Scope is designed and implemented, which improves the synchronization accuracy of the prototype system by 32.3%.…”
Get full text
Article -
12718
Research on the Combination Optimization Method of Aircraft Climb Parameters Considering the Influence of Pollution Emissions
Published 2022-01-01“…Next, we establish a combined optimization model of indicated airspeed and thrust using the genetic algorithm. The model simulation and result analysis are carried out using a wide-body aircraft. …”
Get full text
Article -
12719
Bearing Feature Extraction Method Based on the Time Subsequence
Published 2023-11-01“…Then, the random forest algorithm is used to count the class votes of all subsequences in each time series, and a dictionary is constructed based on the class votes. …”
Get full text
Article -
12720
Application Research of Intelligent Classification Technology in Enterprise Data Classification and Gradation System
Published 2020-01-01“…At the same time, the differences, advantages, and disadvantages of K-NN (K-Nearest Neighbors), DT (Decision Tree), and LinearSVC algorithms are compared. The experimental data shows that LinearSVC algorithm is applicable to high-dimensional data, with discrete, sparse data features and large number of features, which is more suitable for classification of sensitive data of enterprises.…”
Get full text
Article