Showing 41 - 60 results of 104 for search '"second base"', query time: 0.07s Refine Results
  1. 41

    HEVC perceptual intra-frame rate control inspired by video subjective observation experiment by Yanchao GONG, Ling WANG, Ying LIU, Kaifang YANG, Qingfan LIN, Fuping WANG

    Published 2021-08-01
    “…In view of the low perceptual rate-distortion performance of the rate control method used in high efficiency video coding (HEVC), an intra-frame rate control algorithm to effectively improve the perceptual rate-distortion performance of video was proposed.First, the spatiotemporal complexity of videos was measured, and the video subjective observation experiment was designed combined with the spatiotemporal complexity.Secondly, based on the experimental results of video subjective observation, combined with the relevant human vision system perception characteristics, the spatiotemporal perceptual sensitivity factors of video content which could effectively measure the perception difference of human eyes for different regions of video were constructed.Finally, the spatiotemporal perceptual sensitivity factors were applied to the target bit allocation of the largest coding unit layer in the intra-frame image, then the perceptual intra-frame rate control was realized.Experimental results show that the proposed algorithm is superior to the rate control algorithm adopted by HEVC in terms of the bit estimation accuracy and the perceptual rate-distortion performance.…”
    Get full text
    Article
  2. 42

    The Regulation Impact of Foreign Ownership on the Cooperation Projects Air Transportation by I Dewa Gede Palguna, Anak Agung Gede Duwira Hadi Santosa, Made Cinthya Puspita Shara, Alia Yofira Karunian

    Published 2024-07-01
    “…The changes abolished the maximum percentage limit of foreign investment regulated in the previous provisions so that currently, foreign investment may carry out Government Cooperation with Business Entities on air transportation infrastructure projects without a percentage limit. Second, based on the Indonesian Constitution, ownership of air transportation should be under the state's authority, learning from China, which excessively applies foreign investors in the air transportation sector, causing consumer welfare to be affected by very high airplane ticket prices.…”
    Get full text
    Article
  3. 43

    Modeling Analysis and Simulation Verification for Drive Tooth Stress of Rubber Track Wheel by Zihan Zhao, Xihui Mu, Fengpo Du, Jianhua Guo

    Published 2019-06-01
    “…The optimization results show that the accuracy of the mapping tooth profile obtained by this method is 0.12%,which effectively improves the mapping accuracy. Secondly,based on the complex function method, the mathematical model for stress and deformation is established,and the stress distribution laws under different meshing positions are analyzed. …”
    Get full text
    Article
  4. 44

    Reconstruction of sparse check matrix for LDPC at high bit error rate by Zhaojun WU, Limin ZHANG, Zhaogen ZHONG, Renxin LIU

    Published 2021-03-01
    “…In order to reconstruct the sparse check matrix of LDPC, a new algorithm which could directly reconstruct the LDPC was proposed.Firstly, according to the principle of the traditional reconstruction algorithm, the defects of the traditional algorithm and the reasons for the defects were analyzed in detail.Secondly, based on the characteristics of sparse matrix, some bit sequences in code words were randomly extracted for Gaussian elimination.At the same time, in order to reliably realize that the extracted bits sequence could contain parity check nodes, the multiple random variables were determined based on the probability of containing check nodes in one extraction.Finally, the statistical characteristics of LDPC under the suspected check vector was analyzed.Based on the minimum error decision rule, the sparse check vector was determined.The simulation results show that the rate of reconstruction of most LDPC in IEEE 802.11 protocol can reach more than 95% at BER of 0.001, and the noise robustness of the proposed method is better than that of the traditional algorithm.At the same time, the new algorithm not only does not need sparseness of parity check matrix, but also has the good performance for both diagonal and non-diagonal check matrix.…”
    Get full text
    Article
  5. 45

    Type Synthesis of Mobile Mechanisms with Multiple Modes based on Single-loop Kinematic Chains by Zhang Chunyan, Liu Xiangyu, Ni Cong, Lu Chenhui

    Published 2020-04-01
    “…Aiming at the functional requirements of mobile mechanisms with multiple modes,a design scheme based on single-loop kinematic chains is proposed.Firstly,according to the single-loop freedom formula,the conditions satisfying the single-loop and can be active are determined,and the combination relationships among the order of the constrained screw system,the number of bars,the number of kinematic pairs and the degree of freedom of the single-loop kinematic chains are obtained.Secondly,based on the screw theory,the geometric conditions of the axis of kinematic pairs under different constrained screw orders are obtained by using the virtual work principle.Taking the R and P pairs as the design units,all the possible combinations of the single-loop kinematic chains under different degrees of freedom are enumerated,and then the constructed single-loop kinematic chains are used as the body or branch to construct a kind of mobile mechanisms with multiple modes.Finally,the steps of type synthesis of mobile mechanisms with multiple modes and some design cases are given,which verifies the feasibility and practicability of the proposed design theory and design method.…”
    Get full text
    Article
  6. 46

    Study on multi-satellite cooperative spectrum cognitive method integrating Stackelberg game and federated learning by Xiaojin DING, Yehui XU, Wen BAO, Gengxin ZHANG

    Published 2024-02-01
    “…To solve the problem of the weak spectrum-cognitive ability caused by monitoring angle, direction resolution, limited processing ability and peak power for a low-earth-orbit (LEO) satellite, a multi-satellite cooperative spectrum cognitive method integrating Stackelberg game and federated learning was proposed.Firstly, considering the available computing resource, cognitive performance, processing and transmission delay of each spectrum cognitive satellite, a cooperative-satellite selection and computing-resource allocation algorithm was built for multiple spectrum-cognitive tasks.Secondly, based on the selected satellites and the allocated computing resources, a low-complexity multi-satellite cooperative spectrum cognitive strategy was further designed, which could automatically sense the spectrum holes, and detect interference as well as identify the modulation mode.Simulation results demonstrate that compared to the single-node cognitive method, the designed multi-satellite cooperative spectrum cognitive strategy can obtain a better cognitive performance.Moreover, comparing with the existing model, the model utilized in the designed strategy can effectively achieve 96.69% and 93.32% lower number of parameters and required floating point operations per second, whilst maintaining the performance.…”
    Get full text
    Article
  7. 47

    Credit Index Screening Model of Family Farms and Family Ranches Based on Fuzzy Bayesian Theory of Depth Weighting by Zhanjiang Li, Qinjin Zhang

    Published 2022-01-01
    “…In this paper, the characteristics of the first one is based on fuzzy set theory, the definition of fuzzy linguistic assessment of different default set, family ranches characteristic is converted to the corresponding index of pasting with triangular fuzzy mathematical model, and then through the inner method converting triangular fuzzy number into accurate output data to deal with the blur and uncertainty about the state of the fuzzy default transformation is realized. Second, based on the insensitive characteristic of ROC curve to skewness samples, the depth weighting of characteristic indexes in nondefault, low default and high-default states was completed by constructing multiclassification ROC curve, which solved the practical problem of sample imbalance in different default states of family farms and ranches, and selected the index system with significant discrimination ability for default states by integrating default identification ability.…”
    Get full text
    Article
  8. 48

    The Impact of Noise Models on Capacity Performance of Distribution Broadband over Power Lines Networks by Athanasios G. Lazaropoulos

    Published 2016-01-01
    “…With reference to this set, the broadband performance of a great number of distribution BPL topologies either Overhead (OV) or Underground (UN), either Medium-Voltage (MV) or Low-Voltage (LV), is investigated in terms of suitable capacity metrics. Second, based on the proposed capacity metrics, a comparative capacity analysis is performed among various well-validated noise models. …”
    Get full text
    Article
  9. 49

    Data augmentation scheme for federated learning with non-IID data by Lingtao TANG, Di WANG, Shengyun LIU

    Published 2023-01-01
    “…To solve the problem that the model accuracy remains low when the data are not independent and identically distributed (non-IID) across different clients in federated learning, a privacy-preserving data augmentation scheme was proposed.Firstly, a data augmentation framework for federated learning scenarios was designed.All clients generated synthetic samples locally and shared them with each other, which eased the problem of client drift caused by the difference of clients’ data distributions.Secondly, based on generative adversarial network and differential privacy, a private sample generation algorithm was proposed.It helped clients to generate informative samples while preserving the privacy of clients’ local data.Finally, a differentially private label selection algorithm was proposed to ensure the labels of synthetic samples will not leak information.Simulation results demonstrate that under multiple non-IID data partition strategies, the proposed scheme can consistently improve the model accuracy and make the model converge faster.Compared with the benchmark approaches, the proposed scheme can achieve at least 25% accuracy improvement when each client has only one class of samples.…”
    Get full text
    Article
  10. 50

    Profile Shaped-configuration of Convex Ellipse Rotor and Its Following High-shape Technology by Xiangjun Yang, Fuchun Sun

    Published 2020-01-01
    “…Firstly, from ellipse coordinate equation of rotor shaped-profile and conjugate principle of rotor pairs and critical conjugate conditions, the optimum axial length ratio of ellipse arc and the maximum shape coefficient of basic rotor are calculated. Secondly, based on the geometric relationship when the endpoint of valley working shaped-profile on driving rotor is just perfect to avoid the peak corner point on driven rotor, the maximum shape factor of raised rotor under a given addendum angle is determined. …”
    Get full text
    Article
  11. 51

    Structure optimization of jacquard lifting knife on NURBS curve by YANG ZhenNing, LI YuLiang

    Published 2024-06-01
    “…Firstly, the structure, load and movement of crank slider driving mechanism were analyzed. Secondly, based on the theory of variable cross-section beam and the method of structure optimization, non uniform rational B-splines (NURBS) method was used to express the side and cross-section shape of the lifting knife. …”
    Get full text
    Article
  12. 52

    Investigation on Two-Stop-Line Signalized Roundabout: Capacity and Optimal Cycle Length by Ze-hao Jiang, Tao Wang, Chao-yang Li, Fei Pan, Xiao-guang Yang

    Published 2019-01-01
    “…TSLSR is modeled as being equivalent to a four-phase intersection with left-turn protection phases, and the left-turn lane is further simplified as the “short-lane model”. Secondly, based on the above analysis, the capacity of TSLSR is modeled and additionally, the accuracy and sensitivity of the model are also analyzed. …”
    Get full text
    Article
  13. 53

    THERMAL CHARACTERISTIC ANALYSIS METHOD OF MOTORIZED SPINDLE BASED ON THERMAL LOAD OPTIMIZATION CORRECTION by MENG LingCong, LI ChenTao, YU Bing, LIU Teng, ZHANG JianJun

    Published 2020-01-01
    “…For the inaccuracy of empirical heat loads for spindle thermal simulations,a thermal simulation analysis method onto motorized spindle unit is proposed.Firstly,the fluid-solid-heat coupling simulation model of the motorized spindle unit is established by Ansys Workbench,with the coolant dynamic heat transfer and thermal resistances of bearing inner-spindle shaft and outer rings-bearing housing being considered.Secondly,based on the simulation model,genetic algorithm is used to optimize and correct the heat generation values of spindle motor/beairngs and ambient heat transfer coefficients.The corrected values above are used as thermal loads for thermal simulation modeling of motorized spindle unit.Based on the model,the dynamic relationship between the heat dissipation power of the coolants and the heat generation power of spindle motor/beairngs is studied.Finally,the model accuracy is verified by the spindle temperature testing experiment.The results show that the optimization correction model can effectively improve the temperature field simulation accuracy of the motorized spindle unit,and the spindle structure and the coolant reach the optimal heat-heating balance when the coolant supply temperature is about 2℃ lower than the ambient temperature.…”
    Get full text
    Article
  14. 54

    Selection of key urban defense areas based on regional comprehensive risk assessment by WEI Hua, WANG Xiaoxia, YANG Fengbao, JIA Qi

    Published 2025-02-01
    “…Firstly, a reasonable risk assessment index system is constructed from the perspective of the intruder and the defender. Secondly, based on the idea of equivalent energy, the weight product normalization method is proposed to determine the combined weight of the target risk index, and then calculate the target risk value. …”
    Get full text
    Article
  15. 55

    Optimal quinary cyclic codes with minimum distance four by Ye TIAN, Yu-qing ZHANG, Yu-pu HU

    Published 2017-02-01
    “…Cyclic codes are an extremely important subclass of linear codes.They are widely used in the communication systems and data storage systems because they have efficient encoding and decoding algorithm.Until now,how to construct the optimal ternary cyclic codes has received a lot of attention and much progress has been made.However,there is less research about the optimal quinary cyclic codes.Firstly,an efficient method to determine if cyclic codes C<sub>(1,e,t)</sub>were optimal codes was obtained.Secondly,based on the proposed method,when the equation e=5<sub>k</sub>+1 or e=5<sub>m</sub>−2hold,the theorem that the cyclic codes C<sub>(1,e,t)</sub>were optimal quinary cyclic codes was proved.In addition,perfect nonlinear monomials were used to construct optimal quinary cyclic codes with parameters[5<sub>m</sub>−1,5<sub>m</sub>−2m−2,4]optimal quinary cyclic codes over <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <msub> <mi>F</mi> <mrow> <msup> <mn>5</mn> <mi>m</mi> </msup> </mrow> </msub> </math></inline-formula>.…”
    Get full text
    Article
  16. 56

    A Roadway Safety Sustainable Approach: Modeling for Real-Time Traffic Crash with Limited Data and Its Reliability Verification by Zhenzhou Yuan, Kun He, Yang Yang

    Published 2022-01-01
    “…Firstly, Bayesian Logistic regression was used to identify and predict the risk of three data sets. Secondly, based on the Bayesian updating method, the migration test towards high and low precision data sets was established. …”
    Get full text
    Article
  17. 57

    Relay selection algorithm based on selfish behavior analysis in ultra-dense D2D by Yijun WANG, Youxu ZHANG, Dakun LIU, Guifen CHEN

    Published 2021-04-01
    “…In ultra-dense D2D communication, the current relay selection schemes mainly assume that the relay device has the initiative to participate in data forwarding, but some rational relay devices may delay or refuse to forward due to their own considerations, thus affecting the user experience.From the perspective of selfish behavior of relay devices, a method to identify selfish relay devices in D2D communication was proposed, and then an ultra-dense D2D relay selection algorithm based on selfish behavior analysis was proposed.Firstly, three relay identification attribute factors, namely joint interest degree (JID), forwarding history ratio (FHR) and relay physical state (RPS) were defined, and their weights were calculated by triangular fuzzy function to identify relay devices with selfish behavior.Secondly, based on the TOPSIS (technique for order of preference by similarity to ideal solution) method, the final relay equipment selection scheme relay was realized.Simulation results show that the proposed algorithm can identify selfish relay devices more effectively in D2D communication.Compared with other relay selection algorithms, the proposed algorithm has made significant progress in the aspects of D2D communication forwarding success rate, system average throughput and average time delay.…”
    Get full text
    Article
  18. 58

    DER BEITRAG VON VERNETZTEN STUDIENINHALTEN ZU EINER GANZHEITLICHEN THEOLOGISCHEN AUSBILDUNG by B. Stengel

    Published 2021-06-01
    “…He does this in the following way: To begin with, the author presents how, in the current theological as well as didactic-pedagogical debate, a holistic approach of networking subject areas and course contents is considered to be important for theological education. Secondly, based on the findings of the author´s research it is attempted to show, outlining a variety of reasons, that as far as the practice of theological education is concerned there is substantial resistance to the idea of networking subject areas. …”
    Get full text
    Article
  19. 59

    Unified Calculation Model and Its Verification of Gear Cross-section Area for Arbitrary Tooth Profile by Yulong Li, Jun Fan, Xiurong Li, Yong Zang

    Published 2020-11-01
    “…Firstly, based on the external conjugate relation between two identical gear, it is analyzed that cross-section area of gear is composed of pitch circle area, plus conjugated area, and minus minimum top gap area. Secondly, based on the geometric relationship of conjugate profile, the simplest calculation formula without error of the conjugated area and simplified calculating method of minimum top gap area adopts partial hob are given. …”
    Get full text
    Article
  20. 60

    General Six-Step Discrete-Time Zhang Neural Network for Time-Varying Tensor Absolute Value Equations by Min Sun, Jing Liu

    Published 2019-01-01
    “…Based on the bilinear transform and the Routh–Hurwitz stability criterion, the effective domain of the two free parameters is analyzed, which can ensure the convergence of the general ZeaD formula. Secondly, based on the general ZeaD formula, we design a general six-step discrete-time ZNN (DTZNN) for time-varying tensor absolute value equations (TVTAVEs), whose steady-state residual error changes in a higher order manner than those presented in the literature. …”
    Get full text
    Article