Showing 17,441 - 17,460 results of 19,511 for search '"algorithm"', query time: 0.09s Refine Results
  1. 17441

    Runoff Prediction Based on VMD-LSTM-ARMA Model by LUO Cankun, LIU Hao, HUANG Xin, SHAO Zhuang

    Published 2023-01-01
    “…To increase the accuracy of runoff prediction,a combined prediction model is proposed to solve the problems of runoff prediction.This model consists of the variational mode decomposition (VMD),long and short-term memory (LSTM) network,and autoregressive moving average (ARMA).To reduce the complexity of the incoming traffic,the runoff data is decomposed into three modal components with different frequencies by VMD.The low-frequency modal component inherits the temporal properties of the data and can be processed by constructing the LSTM prediction model,while the two high-frequency sequences are stationary time series and can be processed by constructing the ARMA prediction model.The prediction results of the three subsequences are superimposed to predict the runoff.Finally,the hourly flow data of Dongjiang Hydrometric Station of Xiangjiang river tributary in 2020 are used to forecast the inflow flow,and the results of comparative experiments with other algorithms show that the constructed model can effectively improve the accuracy of the hydrological forecast.…”
    Get full text
    Article
  2. 17442

    Gearbox Fault Diagnosis based on GAF-inceptionResNet by Changwen Li, Peng Li, Hua Ding

    Published 2022-05-01
    “…In order to improve the accuracy of gearbox fault diagnosis and accurately express the health status of the gearbox, combined with deep learning algorithms, a GAF-inceptionResNet model for gear fault diagnosis is proposed. …”
    Get full text
    Article
  3. 17443

    Artificial intelligence in healthcare: A focus on the best practices by Haddiya Intissar, Ramdani Sara

    Published 2024-01-01
    “…However, alongside this potential, challenges and ethical considerations remain. Data privacy, algorithmic bias, transparency of AI decision-making, and responsible use are crucial areas that require careful attention. …”
    Get full text
    Article
  4. 17444

    A bidirectional authentication protocol for RFID based on Syn by Shanhua ZHAN, Shaorong HUANG

    Published 2018-12-01
    “…The RFID system is made up of three parts:tags,readers and databases.The information between tags and readers are transmitted through wireless channel,which is easy to be intercepted by attackers.A two-way authentication protocol based on word Synthesis operation was proposed.The two remainder theorem was used to encrypt communication messages by the proposed protocol,the difficulty of cracking was increased; In the process of each round of communication encryption,a random number was added to make the communication messages inconsistent,so that the tracking attacks could not be initiated by attackers.In the communication message encryption,the word synthesis algorithms was adopted at the same time,the total calculation of the system could be effectively reduced.A random checking mechanism was introduced at the database,enabling a synchronous attack and other attacks to be effectively resisted by the system.Security analysis shows that the protocol has high security,and performance analysis shows that the protocol has the standard of lightweight computation.…”
    Get full text
    Article
  5. 17445

    Fairy-tale therapy as a way to combat phobias by T. S. Gordon

    Published 2020-12-01
    “…The article considers the fairy tale as a tool that presents algorithms for solving specific problems or conflict situations, the consequences of circumstances with a concentrated component of low-frequency emotions, as well as a way to give strength to further fight against fears or even annihilating them. …”
    Get full text
    Article
  6. 17446

    Dynamic Resource Management in 802.11 Wireless Mesh Networks by George Athanasiou

    Published 2012-01-01
    “…The iterative heuristic algorithms that we propose controls the communication load of each mesh AP in a distributed manner. …”
    Get full text
    Article
  7. 17447

    Research on P2P streaming media identification based on UDP by Shi DONG, Gang WANG

    Published 2012-12-01
    “…Several popular P2P networks TV were studied,and their differences in port usage and packet size distribution were analyzed thoroughly.By observing the above characteristics,the conclusions that network TV application employs only one port to generate most of UDP traffic in one communicat period were summarized,and the UDP packet sizes in various network TV differ significantly.Thus,a method that can identify P2P application’s UDP traffic accurately and effectively was proposed based on extended flow records.Through identifying and verifying the five P2P streaming application traffic which was called Trace data collected from the backbone channel of CERNET (China education and research network) border in Jiangsu Province,and traffic identification results compared with machine learning algorithms show that the proposed method has a high precision rate and recall rate,high time efficient,and not susceptible to the impact of the proportion of the sample.…”
    Get full text
    Article
  8. 17448

    A METHOD OF GENERATING CUSTOMER REQUESTS IN A CAR RENTAL SIMULATION MODEL by Tomasz MATYJA, Zbigniew STANIK, Krzysztof WŁODKOWSKI

    Published 2024-06-01
    “…Testing new optimization algorithms is best done with simulation methods. A comprehensive rental simulation model can be built, for example, using the SimEvents library of the Matlab/Simulink environment. …”
    Get full text
    Article
  9. 17449

    Prosodic organization of English folk riddles and the mechanism of their decoding by Larysa Taranenko

    Published 2016-12-01
    “…Within the process of cognitive model formation the author performs a conceptual analysis of the riddle compositional structure, presented as a systemic algorithmic scheme. It is confirmed that a characteristic feature of a folk riddle is its division into two elements: the first one is the description of an object, further differentiated into “topic” and “commentary”, while the second one is the riddle answer, or solution, generated directly in the recipient’s mind as a result of his/her mental activities. …”
    Get full text
    Article
  10. 17450

    MAXIMUM POWEWR POINT TRACKING SYSTEM FOR PHOTOVOLTAIC STATION: A REVIEW by I. Elzein

    Published 2015-11-01
    “…The location of the MPP is not known in advance, but can be located, either through calculation models or by search algorithms. Therefore MPPT techniques are important to maintain the PV array’s high efficiency. …”
    Get full text
    Article
  11. 17451

    Image classification with rotation-invariant variational quantum circuits by Paul San Sebastian Sein, Mikel Cañizo, Román Orús

    Published 2025-01-01
    “…Variational quantum algorithms are gaining attention as an early application of noisy intermediate-scale quantum (NISQ) devices. …”
    Get full text
    Article
  12. 17452

    Dark Signals in the Choroidal Vasculature on Optical Coherence Tomography Angiography: An Artefact or Not? by Rui Hua, Hailin Wang

    Published 2017-01-01
    “…Optical phenomena and image processing algorithms may create imaging artefacts. Therefore, OCTA images require careful interpretation. …”
    Get full text
    Article
  13. 17453

    Optimization strategy on coverage control in wireless sensor network based on Voronoi by Chun-jiang ZHAO, Hua-rui WU, Qiang LIU, Li ZHU

    Published 2013-09-01
    “…Coverage holes directly reduce network performance and become a key problem of wireless sensor network.A detect-repair scheme for area coverage in wireless sensor network with Voronoi was proposed.The strategy achieves the network coverage rate optimization balance with a prerequisite of an acceptable coverage quality of network area.It uses the geometry theories and vector algebra to analyse the sensing range of nodes and the position feature of Voronoi polygon.It can calculate the accurate area of holes and ensure the connectivity of networks with the least number of odes.Simulation results show that the strategy can effectively reduce number of the nodes and the overlapped sensing regions and control redundant nodes.Meanwhile,the strategy has fast convergence speed.It not only realizes the control and optimization of the network coverage,but also outperforms existing algorithms with respect to the coverage of the target region.…”
    Get full text
    Article
  14. 17454

    New techniques of intra-satellite communication and ranging/time synchronization for autonomous formation flyer by LI Xue, ZHANG Qi-shan, XU Yong, WANG Ce

    Published 2008-01-01
    “…The principle of two-way noncoherent ranging mode about direct sequence spread spectrum(DSSS) was presented for intersatallite ranging/time synchronization in AFF FDMA/ CDMA networks,concerned equations were constructed and two iteration compupting algorithms were derived. Then,the ground experimenting systems for studying and testing the performance of intra-satallite communication and two-way noncoherent ranging/time synchronization were presented with many experiment results and analyzing. …”
    Get full text
    Article
  15. 17455

    TOPOLOGY OF ENTREPRENEURIAL UNIVERSITY: STATIC DESCRIPTIVE MODEL by R. A. Zayakina

    Published 2017-09-01
    “…The author reveals theoretical and methodological fundamentals of the procedures for establishing real network design, which is considered one of the algorithms of social topology application in the framework of network approach. …”
    Get full text
    Article
  16. 17456

    Task scheduling scheme based on improved particle swarm optimization with biological symbiosis mechanism in cloud computing by Linjie WANG

    Published 2016-09-01
    “…For the issues that the existing task scheduling scheme based on intelligent algorithms can’t obtain the optimal solution in cloud computing and inspired by nature symbiosis,a new task scheduling scheme based on improved particle swarm optimization(PSO)with biological symbiosis mechanism(SM)was proposed.Firstly,the particles in PSO were divided into two populations,and the optimization process were performed alone.Then,after each execution of the k iteration of PSO,the individual in the two populations performed the mutualism and parasitism operation.The search process was optimized by mutualism operation to through the optimal solution region,which could enhance the search ability.The parasitism operation was used to avoid premature convergence by eliminating the poor and introducing the optimal solution.Finally,the optimal solution of the task scheduling was obtained.Simulation results show that the optimal scheduling scheme can obtain the minimum task completion time and response time.…”
    Get full text
    Article
  17. 17457

    Resource allocation mechanism in the TWDM-PON and C-RAN joint architecture with hybrid energy supply by Ruyan WANG, Ningning XU

    Published 2018-09-01
    “…Aiming at the problems of low resource utilization rate,high energy consumption and poor user service quality in the existing virtualized Cloud Radio Access Network,an energy-aware virtualized resource allocation mechanism with hybrid energy supply was proposed.According to the energy sources and energy consumption of different network devices,energy arrival and energy consumption models were established.Furthermore,under the premise of guaranteeing the quality of user services,considering proportional fairness and energy consumption optimization,distributed algorithms based on asynchronous update were used to allocate resources and harvested energy for different types of virtual cloud radio access networks and user virtual base stations to effectively improve the energy efficiency of network.The simulation results show that the proposed resource allocation mechanism can reduce energy consumption while effectively reducing the latency and improving the throughput.…”
    Get full text
    Article
  18. 17458

    A hash-neighborhood-search-network-coding based opportunistic relay retransmission approach by Pengfei SHAO, Yanwei ZHAO, Zhaoxi FANG

    Published 2016-04-01
    “…Simulation results show that this novel approach can effectively reduce the number of retransmissions to improve the transmission efficiency with respect to the existing algorithms,especially when one or more of the receiving nodes are interfered and the quality of the channel between receiving nodes and source node continues to decline,this approach can achieve a high retransmission gain.…”
    Get full text
    Article
  19. 17459

    Bregman divergences for physically informed discrepancy measures for learning and computation in thermomechanics by Andrieux, Stéphane

    Published 2023-02-01
    “…This study is motivated by the need of “discrepancy measures” between physically constrained fields that are used both in traditional algorithms, analysis methods and data driven modelling or applications as well.We give also a characterization of symmetrical Bregman divergences through their generating functions which can only be quadratic forms. …”
    Get full text
    Article
  20. 17460

    Simulating Chemistry with Fermionic Optical Superlattices by Fotios Gkritsis, Daniel Dux, Jin Zhang, Naman Jain, Christian Gogolin, Philipp M. Preiss

    Published 2025-01-01
    “…Our work enables the application of recent quantum algorithmic techniques, such as double factorization and quantum tailored coupled cluster, to present-day fermionic optical lattice systems with significant improvements in the required number of experimental repetitions. …”
    Get full text
    Article