-
17281
Mixed quasi invex equilibrium problems
Published 2004-01-01“…As special cases, we also obtained the correct forms of the algorithms for solving variational-like inequalities, which have been considered in the setting of convexity. …”
Get full text
Article -
17282
Effective Fuzzy Soft Set Theory and Its Applications
Published 2022-01-01“…Many fuzzy decision making algorithms based on fuzzy soft sets were given. However, these do not consider the external effective on the decision it depends on the parameters without considering any external effective. …”
Get full text
Article -
17283
An Intelligent Maximum Power Point Using a Fuzzy Log Controller under Severe Weather Conditions
Published 2018-01-01“…MATLAB/Simulink is used to investigate the response of both algorithms. Several weather conditions are simulated: (i) uniform irradiation, (ii) sudden changing, and (iii) partial shading. …”
Get full text
Article -
17284
Verifiable outsourced attribute-based encryption with access update
Published 2019-02-01“…In order to meet the secure and reliable access requirements for the encrypted data stored in the public cloud,a verifiable outsourced attribute-based encryption scheme with access update was proposed.Based on a standard KP-ABE scheme,verifiable outsourced decryption and verifiable access update for a ciphertext through novel constructions for the scheme were obtained.The verifiability of the outsourced computation ensures that the third-party service may perform algorithms honestly.The scheme has selective IND-CPA security for the original and updated ciphertexts,weak master private key security,and verification soundness in the standard model were proved,respectively.Compared with similar schemes from literatures,the proposed scheme can achieve tradeoff in the optimization of functionality,security and efficiency.…”
Get full text
Article -
17285
Application of big data method in forecasting potential sensitive customers of electric power
Published 2019-11-01“…With the continuous development and extension of 95598 business,the intensity of manual telephone traffic increases.In order to further deepen the consciousness and understanding of the hidden features and the demands of the customers,improve the customer service level of 95598,the typical application scenarios in the customer service such as the tendency of the complaint were refined.Based on the data of power service orders,the key index of modeling was selected.Through entropy weight method,principal component analysis and decision tree and other data mining algorithms,potential complaint propensity customers and planned blackout sensitive customers in order to carry out targeted service resource scheduling were identified,fully do a good job of response measures,effectively reduce complaint pressure and improve service accuracy.…”
Get full text
Article -
17286
An Improved Retransmission Approacb Based on Opportunistic Network Coding in Multicast Networks
Published 2015-04-01“…A novel opportunistic-network-coding-based retransmission approach was proposed.According to the feedback on packet loss from the receiving nodes,this novel approach can not only efficiently select a combination of lost packets through Hash lookup for packet retransmission,but also can ensure priority retransmission making up to a single combination retransmission packet which can maximize the number of receiving nodes for recovering their lost packets.Furthermore,the proposed approach fully exploits the coding opportunity based on neighborhood association,and allows the receiving nodes to recover their lost packets from multiple retransmission packets.The simulation results show that this novel approach can effectively reduce the number of retransmissions to improve the transmission efficiency with respect to the existing algorithms.…”
Get full text
Article -
17287
The Connotation and Construction Path of the Principle of Good Faith from the Perspective of Civil and Commercial Law
Published 2022-01-01“…In order to explore the connotation and construction path of the principle of good faith from the perspective of civil and commercial law, this paper combines intelligent algorithms to analyze the connotation and construction path of the principle of good faith from the perspective of civil and commercial law. …”
Get full text
Article -
17288
Variational Retinex model based on an extension of TV regularization with relative gradient and its application
Published 2017-11-01“…In view of the shortcomings of the total variational Retinex model which use the total variation (TV) of the reflection as the regularization.An extension of TV regularization with the concept of relative gradient was introduced and finally a new variational Retinex model was proposed.Compared with variational Retinex and total variational Retinex model,the proposed model can preserve the estimated reflectance with more details as well as the more smoothed illumination.Further,a new integrated image enhancement model considering both the illumination and the reflectance was proposed.By adjusting the model parameters,the proposed model can be effectively applied to high dynamic range image tone mapping and non-uniform illumination enhancement.Compared with other algorithms,the proposed model can better handle the above image enhancement problems.…”
Get full text
Article -
17289
Didactic analysis of the results of solving tasks of school-scale mathematical competitions for fourth formers
Published 2004-12-01“…The relation between pupils' mathematical achievements in schools and their competition results partially proves the hypothesis that well-studying pupils refer to the rules, strict algorithms, in turn, they trust in their capacities, and thus pay less attention to the tasks, the relations of which require involvement of creativity, as they consider them to be easy. …”
Get full text
Article -
17290
Development and Validation of a Complete GATE Model of the Siemens Inveon Trimodal Imaging Platform
Published 2013-10-01“…Fully incorporating the positron emission tomography (PET), single-photon emission computed tomography (SPECT), and computed tomography (CT) data acquisition subsystems, this model enables feasibility studies of new imaging applications, the development of reconstruction and correction algorithms, and the creation of a baseline against which experimental results for real data can be compared. …”
Get full text
Article -
17291
Dynamic hierarchy resource management for heterogeneous cognitive network
Published 2012-01-01“…A dynamic hierarchy resource management approach-DHRM based on intelligent prediction was proposed for heterogeneous cognitive network.In DHRM,according to different time scale,the method of wavelet neural network,wiener prediction and reinforcement learning were brought to get the variation of traffic d ion,the resource requirement of the handover calls,and the information of users’preferences,and available hierarchical resources of all networks were allocated flexibly.Multi-attribute decision making method,based on network status and user preference was used to make decision to dynamically assign network traffic flow to the most appropriate network.Simulation results show that,the system capacity is improved about 20% by DHRM compared with the other joint radio resource management algorithms.…”
Get full text
Article -
17292
Steganalysis of LSB matching based on regional correlation
Published 2010-01-01“…Compared with the existing algorithms, the advantages of the proposed method include simplicity, computa- tional efficiency and low false positive rate. …”
Get full text
Article -
17293
E-commerce Service Chatbot Application Design using KNN and Random Forest Methods
Published 2025-01-01“…In response to this need, the researcher has developed a chatbot application aimed at improving customer service, employing machine learning techniques with the KNN and Random Forest algorithms. To assess the application's viability, the chatbot's results undergo an accuracy test, revealing a satisfactory accuracy value of 71.4%, thereby affirming its feasibility. …”
Get full text
Article -
17294
Handy formulas for binomial moments
Published 2024-07-01“…In addition, the paper presents algorithms to derive these formulas along with working implementation in Python’s symbolic algebra package. …”
Get full text
Article -
17295
Cache replacement strategy based on content value
Published 2018-11-01“…The cache replacement mechanism is one of the important research issues of the content center network.Considering the limited cache space,the reasonable replacement of the cache content becomes a key factor affecting the overall performance of the network.Therefore,a cache replacement scheme based on content value was designed.Considering the dynamic popularity of content,the cost of caching,and the time of the most recently requested,a more realistic content value function was built,and an effective content storage and replacement scheme was designed based on the content value function.Specifically,when the cache space was insufficient,the existing cache contents were replaced according to the value from small to large.Simulation results show that compared with the traditional replacement algorithms LRU,LFU and FIFO,the proposed scheme effectively improves the content cache hit rate of network nodes and reduces the average hops of users’ content acquisition.…”
Get full text
Article -
17296
On Disturbance Rejection for a Class of Nonlinear Systems
Published 2018-01-01“…For advanced system requirements, sophisticated control algorithms are necessary for the nonlinear systems with uncertainties and disturbances. …”
Get full text
Article -
17297
Recent Developments in Maximum Power Point Tracking Technologies for Photovoltaic Systems
Published 2010-01-01“…In this study, the various aspects of these algorithms have been analyzed in detail. Classifications, definitions, and basic equations of the most widely used MPPT technologies are given. …”
Get full text
Article -
17298
Distributed Energy-Efficient Approaches for Connected Dominating Set Construction in Wireless Sensor Networks
Published 2014-06-01“…This approximation outperforms the existing distributed CDS construction algorithms.…”
Get full text
Article -
17299
Multi-Agent Maritime Traffic Simulator
Published 2024-10-01“…This simulator is designed to support research on centralised game-theoretical algorithms for maritime traffic management. It supports an arbitrary number of vessels and land masses import. …”
Get full text
Article -
17300
Adaptive Control Allocation in the Presence of Actuator Failures
Published 2012-01-01“…Two adaptive control allocation algorithms, guaranteeing closed-loop stability and asymptotic state tracking when partial and total loss of control effectiveness occur, are developed. …”
Get full text
Article