Showing 2,481 - 2,500 results of 6,037 for search 'main algorithm', query time: 0.12s Refine Results
  1. 2481

    Formation of Scattering Characteristics for Acoustical Ray Tracing Simulation by Srđan BOJIČIĆ, Dragana ŠUMARAC-PAVLOVIĆ, Miomir MIJIĆ

    Published 2018-07-01
    “…The paper introduces modelling of scattering which is interesting when the whole impulse response of a room is not a goal but contribution of certain surface. The main goal of the project is to shape directivity characteristics of scattered reflection. …”
    Get full text
    Article
  2. 2482

    An improved observer design approach for autonomous vehicles using error-based ultra-local model by Daniel Fenyes, Tamas Hegedus, Balazs Nemeth, Peter Gaspar

    Published 2025-07-01
    “…The efficiency and the operation of the observer algorithm are presented through simulations in CarMaker and using real test measurements from ZalaZone proving ground.…”
    Get full text
    Article
  3. 2483

    Privacy-preserving indoor localization scheme based on Wi-Fi fingerprint with outsourced computing by Yinghui ZHANG, Sirui ZHANG, Qiuxia ZHAO, Xiaokun ZHENG, Jin CAO

    Published 2024-02-01
    “…To solve the privacy-preserving problem of both the user and the server in indoor positioning, outsourcing part of the calculation to cloud server in the process of using Paillier encryption was considered.The scheme not only protected the privacy of the user and the positioning server, but also avoided excessive computing and communication overhead.The main idea of the scheme was that the fingerprint database in the offline stage was established by the server firstly.The k-anonymity algorithm was combined with Paillier encryption in the online stage by the user, and the encrypted Wi-Fi fingerprints were sent to the positioning server.An aggregation of the received Wi-Fi fingerprints and database fingerprints were performed by the server.Then they were outsourced to the cloud server for decryption and distance calculation by the positioning server.Finally, the positioning result was obtained.Theoretical analysis and experimental results show that the proposed scheme is safe, effective and practical.…”
    Get full text
    Article
  4. 2484

    Determining Functional Safety Indices of CWR Track Subject to Action of Thermal Compression Forces by O. A. Suslov

    Published 2015-10-01
    “…Two main railway track design versions may be observed on the JSC RZD network. …”
    Get full text
    Article
  5. 2485

    Structural design of memory system for Ternary Optical Computer. by Honghong Zhang, Yi Jin, Hongjian Wang, Xunlei Chen, Zhehe Wang, Shan Ouyang, Shuang Li

    Published 2025-01-01
    “…Ternary Optical Computer (TOC) is unique in the development of optical computers, in terms of principle, experiment, algorithm and application. After 20 years of development, six generations of prototypes have been developed. …”
    Get full text
    Article
  6. 2486

    Communication Network Design of the Control System for Central Distributed PV System Based on CAN Bus by REN Yi, WANG Nan, CHEN Yifeng, ZHU Qiliang

    Published 2020-01-01
    “…In order to improve communication real-time performance and configuration flexibility of control system of D&C(central distributed) PV system, this paper adopted CAN bus with multi-master communication mode to replace RS485 bus with master-slave communication mode, and proposed a method of setting initial priority by memory balance based on CAN dynamic priority assignment algorithm. Main contents of the network protocol, including definition of frame identifier content and composition of frame data segments are presented. …”
    Get full text
    Article
  7. 2487
  8. 2488

    Faculty Publication Activity and Resources for Its Increase by Ashot R. Alaverdov

    Published 2019-03-01
    “…The author has developed a project of standard organizational structure of management for this Center, as well as an algorithm of its work and the main functions of its divisions.…”
    Get full text
    Article
  9. 2489

    Prediction of Changes in the Tax Burden of Land Plots with the Use of Multivariate Statistical Analysis Methods by Krzysztof Dmytrów, Sebastian Gnat

    Published 2019-01-01
    “…In order to verify this statement, with the use of the Szczecin Algorithm of Real Estates Mass Appraisal, the land plots were appraised and the ad valorem tax was calculated. …”
    Get full text
    Article
  10. 2490

    Research and implementation on acquisition scheme of telecom big data based on Hadoop by Baoyou WANG, Jing QIAN, Shijin YUAN

    Published 2017-01-01
    “…ETL is a very important step in the implementation process of data warehouse.A good ETL flow is important,which can effectively process the telecom big data and improve the acquisition efficiency of the operation platform.Firstly,the main data content of the big data platform was expounded.Secondly,in order to improve the efficiency of massive data collection,Hadoop and Oracle mashup solution was suggested.Subsequently,a dynamic triggered ETL scheduling flow and algorithm was proposed.Compared with timer start ETL scheduling method,it could effectively shorten waiting time and avoid the phenomenon of resources to seize and congestion.Finally,according to the running log of Hadoop platform and Oracle database,the relationship between acquisition efficiency and data quantity was analyzed comparatively.Furthermore,practice result shows that the hybrid data structure of the big data platform complement each other and can effectively enhance the timeliness of data collection and access better application effect.…”
    Get full text
    Article
  11. 2491

    Identifying the Effective Factors on Neuropathic Diseases in Patients with Chronic pain Using Deep Neural Networks by Mobin Shaterian, Mohammad Teshnehlab

    Published 2020-09-01
    “…The main purpose of this research is finding major characteristics of clinical signs in the diagnosis of neuropathic disease in patients with chronic long-term pain. …”
    Get full text
    Article
  12. 2492

    Multifactor Stock Selection Strategy Based on Machine Learning: Evidence from China by Jieying Gao, Huan Guo, Xin Xu

    Published 2022-01-01
    “…Finally, this paper draws conclusion. The main findings are as follows: the support vector regression has the most stable successful rate for predicting, while ridge regression and linear regression have the most unstable successful rate with more extreme cases; algorithm of support vector regression fitting higher-degree polynomials in Chinese A-share market is optimized, compared with the traditional linear regression both in terms of stock return and retracement control; the results of support vector regression significantly outperforming the CSI 500 index prove further.…”
    Get full text
    Article
  13. 2493

    LEO mega-constellation network:networking technologies and state of the art by Quan CHEN, Lei YANG, Jianming GUO, Xingchen LI, Yong ZHAO, Xiaoqian CHEN

    Published 2022-05-01
    “…The emerging low earth orbit (LEO) mega-constellation network (MCN) represented by Starlink and OneWeb were studied.The system architecture and basic working modes were introduced, and the main features of the emerging broadband MCN were summarized.Based on the system architecture of MCN, the methodology and research progress of five key technologies were investigated and summarized, including network topology dynamics management, space-ground handover scheme, high-efficiency routing algorithm design, gateway placement design, network simulation and performance evaluation.The focus was on recent mega-constellation-related studies.The challenges caused by the large scale and complexity of MCN and the applicability of existing techniques and solutions in MCN were analyzed.…”
    Get full text
    Article
  14. 2494

    Cloud native intelligent operation and maintenance technology by Long XUE, Gang LU, Qi ZHOU, Huiyan ZHANG, Tingjun WAN

    Published 2020-12-01
    “…Relying on the advantages of simple and fast applications,easy deployment of applications,and on-demand scaling of running applications,cloud native technology has been rapidly promoted.However,with the application of cloud native,the system architecture has become more complex and the scale of resources has become larger,and there is an urgent need for more intelligent operation and maintenance.Using intelligent operation and maintenance can better assist cloud-native application development,reduce operation and maintenance costs,and improve service quality.The application scenarios,key points,classic practices and existing problems of intelligent operation and maintenance were analyzed,and a cloud-native intelligent operation and maintenance architecture were proposed,and the main principles of the three scenarios:the trend prediction,data anomaly detection and fault location diagnosing in the core service algorithm platform were introduced in detail,and finally the future of intelligent operation and maintenance were looked forward.…”
    Get full text
    Article
  15. 2495

    On a strict mathematical definition of the brachistochrone’s shape taking into account the thermal effect in the contact zone by S.O. Gladkov, S.B. Bogdanova

    Published 2025-06-01
    “…Matherials and methods. The main method for solving the problem is the moving basis method, which has proven itself well in solving many problems related to the study of various properties of brachistochrones. …”
    Article
  16. 2496

    Privacy-preserving indoor localization scheme based on Wi-Fi fingerprint with outsourced computing by Yinghui ZHANG, Sirui ZHANG, Qiuxia ZHAO, Xiaokun ZHENG, Jin CAO

    Published 2024-02-01
    “…To solve the privacy-preserving problem of both the user and the server in indoor positioning, outsourcing part of the calculation to cloud server in the process of using Paillier encryption was considered.The scheme not only protected the privacy of the user and the positioning server, but also avoided excessive computing and communication overhead.The main idea of the scheme was that the fingerprint database in the offline stage was established by the server firstly.The k-anonymity algorithm was combined with Paillier encryption in the online stage by the user, and the encrypted Wi-Fi fingerprints were sent to the positioning server.An aggregation of the received Wi-Fi fingerprints and database fingerprints were performed by the server.Then they were outsourced to the cloud server for decryption and distance calculation by the positioning server.Finally, the positioning result was obtained.Theoretical analysis and experimental results show that the proposed scheme is safe, effective and practical.…”
    Get full text
    Article
  17. 2497

    Anomaly detection of large scale network based on data streams by ZHENG Jun, HU Ming-zeng, YUN Xiao-chun, ZHENG Zhong

    Published 2006-01-01
    “…The anomaly detection algorithms of the large scale network(LSN) were required to analysis the vast network traffic of G bit level in real-time and on-the-fly.A novel monitoring mechanism of LSN anomaly detection based on the data stream approach was proposed.The main contributions included: the sketch data structure and the frequent sketch algorithm of data streams were designed for anomaly detection of LSN.Optimized query methods were designed for customizing the security monitoring and detection policy with the correlations of multi data streams.The data reduction was proposed to make it possible that the whole network traffic character could be got using a few of special data streams.The experiments of the real networking environments validate the effectivity of LSN anomaly detection methods.…”
    Get full text
    Article
  18. 2498

    Spectral Analysis of Cough Sounds in Patients with Chronic Bronchitis by Andrey V. Budnevsky, Sergey N. Avdeev, Evgeniy S. Ovsyannikov, Anastasia V. Belyakova

    Published 2025-06-01
    “…Background: Cough is the main symptom of chronic bronchitis (CB). However, the literature does not provide information on the characteristics of the cough sound in CB patients. …”
    Get full text
    Article
  19. 2499

    Developing a Mathematical Model for Scheduling and Determining Success Probability of Research Projects Considering Complex-Fuzzy Networks by Gholamreza Norouzi, Mehdi Heydari, Siamak Noori, Morteza Bagherpour

    Published 2015-01-01
    “…Through the deliverables of this method, a proper estimation of project completion time (PCT) and success probability can be achieved. So algorithms were developed to cover all features of the problem based on three main parameters “duration, occurrence probability, and success probability.” …”
    Get full text
    Article
  20. 2500

    Research on nonlinear constraint assessment model of power grid based on generalized Benders decomposition by Bo Jia, Le Kang, Yide Xie, Yue Xu

    Published 2025-08-01
    “…The generalized Benders decomposition method is used to decompose the model into main problem and sub-problems, the main problem is solved iteratively by linear evaluation, and the sub-problems are solved iteratively by interior point method. …”
    Get full text
    Article