Showing 61 - 80 results of 96 for search 'Problemista~', query time: 4.85s Refine Results
  1. 61
  2. 62

    Research of the Pose Forward Solution Algorithm of Stewart Platform based on BP Neural Network by Zhang Zongzhi, Qin Junqi, Chen Hailong, Liu Pingsong

    Published 2015-01-01
    “…Aiming at the problem of low speed of using numerical methods to solve the Stewart platform position and attitude forward solution and the initial value of improper selection may not obtain the forward solution,the BP neural networks algorithm is used for solving those problems.The experiment and simulation results show that this method is fast and effective.…”
    Get full text
    Article
  3. 63

    Hierarchical AAA in mobile IPv6 networks by XIAO Wen-shu 1, ZHANG Yu-jun 1, LI Zhong-cheng 1

    Published 2006-01-01
    “…There are many problems of integrating AAA with mobile IPv6 in the next generation Internet.A new hierarchical AAA architecture was proposed to handle these problems.The combined authentication-registration procedure,and the local security association(SA) negotiation were performed to enhance the performance of AAA combined mobility.The proposal is proved to be no less secure and more efficient than the scheme proposed by IETF.…”
    Get full text
    Article
  4. 64

    Performance Analysis of Simplification of Hyperplane Support Vector Machine by Hui Cheng, Jinglong Fang, Daquan Wang, Xingqi Wang

    Published 2015-08-01
    “…Comparing with traditional support vector machine,hyperplane support vector machine (HPSVM)and hyperplane support vector machine for regression(HPSVMR)not only reduce the number of support vectors and calculation time but also have comparable accuracy.However,they have different simplification effect on different problems.The reasons for this phenomenon were analyzed,the conclusion that the lower the percentage of non-bound support vectors is,the more obvious the effect of simplification was pointed out.…”
    Get full text
    Article
  5. 65

    ENVIRONMENTAL MONITORING OF THE UNIVERSITY AS ONEOF THE COMPONENTS OF THE INTERNAL QUALITY ASSESSMENT SYSTEM by Natalia G. Bazhenova, Ekaterina L. Lutsenko

    Published 2016-12-01
    “…Monitoring can be considered as one of the mechanisms for assessment the quality of the educational environment at the university, which allows to react promptly and to correct the arising problems.The paper presents the experience in conducting environmental monitoring research studies at the university, views the basic research areas according to the processes oforganizational life cycle, gives some data on certain issues.…”
    Get full text
    Article
  6. 66
  7. 67

    Mobility management of the 6G satellite IoT:challenges and key techniques by Weigang BAI, Min SHENG, Panpan DU

    Published 2020-03-01
    “…The satellite Internet of things (SIoT) is regarded as a feasible scheme to realize the vision of the “ubiquitous connection” in 6G.The relatively high-speed movement between the mobile satellite and the terminal causes service continuity problems.The mobility management technology of the SIoT was expounded.New challenges to the mobility management of the SIoT caused by the dual-mobility,wide-area coverage and non-uniform demand were analyzed.Key techniques of the mobility management of the SIoT in 6G from aspects of the mobility management architecture,prediction and enhancement were discussed.…”
    Get full text
    Article
  8. 68

    Intelligent optimization algorithm based on benchmarking by Anshi XIE

    Published 2018-07-01
    “…Many of the issues in scientific research,engineeringand management can be transformed into optimization problems.The various methods applied to these problems were a variety of models.Designing different methods was designing different models.The theme was to model the benchmarking philosophy in business management as a meta-heuristic search method for single objective bound-constrained real-parameter optimization problems.According to the principle of Occam’s Razor,many complicated operators and their probability tuning rules were abandoned and a simple framework was used to organize the core operators to achieve the effect of many composition algorithms.…”
    Get full text
    Article
  9. 69
  10. 70
  11. 71

    Application of intelligent sorting of customer service work orders with multiple factors vectorization by Hua REN, Zheng WANG, Shaomin WANG

    Published 2018-12-01
    “…As the most important contact point for customers in the internet industry,customer service orders have become the main issues that need to be addressed and urgently solved in various industries.The intelligent sequencing of work orders provides a feasible application for solving this problem.The rapid development of artificial intelligence technology and big data technology has given new directions and opportunities to solve such problems.The background of the intelligent sequencing of customer service orders was analyzed firstly.On the basis of this,the main methods and implementations of intelligent sequencing of customer service orderswere analyzed,and the application of intelligent sequencing of customer service orders based on multi-factor vectorization was expounded.…”
    Get full text
    Article
  12. 72

    Mastering the Concept, Content and Technologies of the Competence Approach to Education by Academic Staff by S. L. Fomenko

    Published 2015-02-01
    “…Each stage is characterized by the degree of academic staff readiness for solving new educational problems.The research findings can provide the management of educational establishments with the necessary assistance in identifying the levels of academic staff readiness for fulfilling the competence model of education.…”
    Get full text
    Article
  13. 73

    Issues and challenges of Internet DNS security by Ning HU, Wen-ping DENG, Su YAO

    Published 2017-03-01
    “…The domain name system is a critical component of the Internet infrastructure,which maps host names to IP ad-dresses and is involved in most Internet transactions.DNS security has a profound effect on the overall security of Internet and it is also a vital research content of Internet security.In order to improve the security capability of DNS,many enhanced protocols,monitoring mechanisms and best practices were proposed.But recent DNS attack events indicate there are still many recent major research challenges of DNS security problems.The existing achievements and challenges were summarized and discussed,which included security enhanced,behavior monitoring and privacy protection.…”
    Get full text
    Article
  14. 74
  15. 75
  16. 76

    Overview of the data security and privacy-preserving of mobile cloud services by Rui-xuan LI, Xin-hua DONG, Xi-wu GU, Wan-wan ZHOU, Cong WANG

    Published 2013-12-01
    “…Compared with the traditional cloud services,the mobi cloud services have the characteristics of the mobile interconnected,flexible end-user applications and convenient data access.However,the rich applications of mobile cloud services bring more security and privacy-leaking problems.The basic concepts,applications and security issues of mobile cloud services were shaded light on,and then describes the architecture of security and privacy-preserving was described,some key technologies were studied in this domain,mainly focusing on the research progress of the security protocols and authentication,access control,integrity verification,mobile trusted computing and the privacy-preserving based on encryption,anonymous and confusion,and the advantages and disadvantages were pointed out respectively.Finally,some future research direction were given at the end.…”
    Get full text
    Article
  17. 77

    Improved ant colony optimization algorithm for solving constraint satisfaction problem by HANGYong-gang Z, HANGSi-bo Z, UEQiu-shi X

    Published 2015-05-01
    “…The traditional backtracking algorithm was less efficient on solving large-scale constraint satisfaction problem,and more difficult to be solved within a reasonable time.In order to overcome this problem,many incompleteness algo-rithms based on heuristic search have been proposed.Two improvements based on ant colony optimization meta-heuristic constraint solving algorithm were presented:First,arc consistency checks was done to preprocess before exploring the search space,Second,a new parameter setting scheme was proposed for ant colony optimization to improve the effi-ciency of the search.Finally,the improved algorithm is applied to solve random problems and combinatorial optimization problems.The results of the experiment have showed its superiority.…”
    Get full text
    Article
  18. 78

    Self-learning differential evolution algorithm for dynamic polycentric problems by Xing-bao LIU, Jian-ping YIN, Chun-hua HU, Rong-yuan CHEN

    Published 2015-07-01
    “…A novel self-learning differential evolution algorithm is proposed to solve dynamical multi-center optimization problems.The approach of re-evaluating some specific individuals is used to monitor environmental changes.The proposed self-learning operator guides the evolutionary group to a new environment,meanwhile maintains the stable topology structure of group to maintain the current evolutionary trend.A neighborhood search mechanism and a random immigrant mechanism are adapted to make a tradeoff between algorithmic convergence and population diversity.The experiment studies on a periodic dynamic function set suits are done,and the comparisons with peer algorithms show that the self-learning differential algorithm outperforms other algorithms in term of convergence and adaptability under dynamical environment.…”
    Get full text
    Article
  19. 79

    Design of dynamic output feedback controller for lurie networked control systems with multiple delays by Gang CHEN, Hong-qiu ZHU, Chun-hua YANG, Chun-hua HU

    Published 2012-12-01
    “…For a class of network control system based on dynamic output feedback controller with non-ideal network conditions,such as time-varying network-induced delay,data packet loss and out-of-order problems.The Lurie networked control system was modeled as a multiple delay Lurie system.By employing a Lyapunov-Krasovskii functional, some useful terms have been retained,which were used to be discarded in the derivative of Lyapunov-Krasovskii functional,an improved delay-dependent stability conditions for Lurie NCS was proposed.Furthermore,by adding an equation constraint,it was transformed into a solvability problem described by linear matrix inequality;the resulting condition was extended to design a dynamic output feedback control .Numerical examples are provided to show the results are less conservative.…”
    Get full text
    Article
  20. 80

    Survey on the visualization technologies of threatening security data in cyber space by Fan ZHANG, Fan XIE, Jie JIANG

    Published 2018-02-01
    “…With the rapid development of the cyber threatening methods,the requirements of network security data analysis become more and more imperative.Data visualization has already evolved as a requisite tool among all kinds of data analysis theory framework and applications,especially in the fields of scientific computation,business intelligence and cyber security.Threatening security data visualization provides various effective interaction means which improve the perception ability for the cyber security specialists to get a distinctive insight into the large amount of complicated cyber security problems.The state-of-art cyber security data visualization technologies were introduced.Some existing problems that were still challenging research topics were investigated.Some directions for future studies were outlined.…”
    Get full text
    Article