-
2481
Formation of Scattering Characteristics for Acoustical Ray Tracing Simulation
Published 2018-07-01“…The paper introduces modelling of scattering which is interesting when the whole impulse response of a room is not a goal but contribution of certain surface. The main goal of the project is to shape directivity characteristics of scattered reflection. …”
Get full text
Article -
2482
An improved observer design approach for autonomous vehicles using error-based ultra-local model
Published 2025-07-01“…The efficiency and the operation of the observer algorithm are presented through simulations in CarMaker and using real test measurements from ZalaZone proving ground.…”
Get full text
Article -
2483
Privacy-preserving indoor localization scheme based on Wi-Fi fingerprint with outsourced computing
Published 2024-02-01“…To solve the privacy-preserving problem of both the user and the server in indoor positioning, outsourcing part of the calculation to cloud server in the process of using Paillier encryption was considered.The scheme not only protected the privacy of the user and the positioning server, but also avoided excessive computing and communication overhead.The main idea of the scheme was that the fingerprint database in the offline stage was established by the server firstly.The k-anonymity algorithm was combined with Paillier encryption in the online stage by the user, and the encrypted Wi-Fi fingerprints were sent to the positioning server.An aggregation of the received Wi-Fi fingerprints and database fingerprints were performed by the server.Then they were outsourced to the cloud server for decryption and distance calculation by the positioning server.Finally, the positioning result was obtained.Theoretical analysis and experimental results show that the proposed scheme is safe, effective and practical.…”
Get full text
Article -
2484
Determining Functional Safety Indices of CWR Track Subject to Action of Thermal Compression Forces
Published 2015-10-01“…Two main railway track design versions may be observed on the JSC RZD network. …”
Get full text
Article -
2485
Structural design of memory system for Ternary Optical Computer.
Published 2025-01-01“…Ternary Optical Computer (TOC) is unique in the development of optical computers, in terms of principle, experiment, algorithm and application. After 20 years of development, six generations of prototypes have been developed. …”
Get full text
Article -
2486
Communication Network Design of the Control System for Central Distributed PV System Based on CAN Bus
Published 2020-01-01“…In order to improve communication real-time performance and configuration flexibility of control system of D&C(central distributed) PV system, this paper adopted CAN bus with multi-master communication mode to replace RS485 bus with master-slave communication mode, and proposed a method of setting initial priority by memory balance based on CAN dynamic priority assignment algorithm. Main contents of the network protocol, including definition of frame identifier content and composition of frame data segments are presented. …”
Get full text
Article -
2487
Machine Learning Model for Processing Aerospace Images of the Earthʼs Surface
Published 2024-03-01Get full text
Article -
2488
Faculty Publication Activity and Resources for Its Increase
Published 2019-03-01“…The author has developed a project of standard organizational structure of management for this Center, as well as an algorithm of its work and the main functions of its divisions.…”
Get full text
Article -
2489
Prediction of Changes in the Tax Burden of Land Plots with the Use of Multivariate Statistical Analysis Methods
Published 2019-01-01“…In order to verify this statement, with the use of the Szczecin Algorithm of Real Estates Mass Appraisal, the land plots were appraised and the ad valorem tax was calculated. …”
Get full text
Article -
2490
Research and implementation on acquisition scheme of telecom big data based on Hadoop
Published 2017-01-01“…ETL is a very important step in the implementation process of data warehouse.A good ETL flow is important,which can effectively process the telecom big data and improve the acquisition efficiency of the operation platform.Firstly,the main data content of the big data platform was expounded.Secondly,in order to improve the efficiency of massive data collection,Hadoop and Oracle mashup solution was suggested.Subsequently,a dynamic triggered ETL scheduling flow and algorithm was proposed.Compared with timer start ETL scheduling method,it could effectively shorten waiting time and avoid the phenomenon of resources to seize and congestion.Finally,according to the running log of Hadoop platform and Oracle database,the relationship between acquisition efficiency and data quantity was analyzed comparatively.Furthermore,practice result shows that the hybrid data structure of the big data platform complement each other and can effectively enhance the timeliness of data collection and access better application effect.…”
Get full text
Article -
2491
Identifying the Effective Factors on Neuropathic Diseases in Patients with Chronic pain Using Deep Neural Networks
Published 2020-09-01“…The main purpose of this research is finding major characteristics of clinical signs in the diagnosis of neuropathic disease in patients with chronic long-term pain. …”
Get full text
Article -
2492
Multifactor Stock Selection Strategy Based on Machine Learning: Evidence from China
Published 2022-01-01“…Finally, this paper draws conclusion. The main findings are as follows: the support vector regression has the most stable successful rate for predicting, while ridge regression and linear regression have the most unstable successful rate with more extreme cases; algorithm of support vector regression fitting higher-degree polynomials in Chinese A-share market is optimized, compared with the traditional linear regression both in terms of stock return and retracement control; the results of support vector regression significantly outperforming the CSI 500 index prove further.…”
Get full text
Article -
2493
LEO mega-constellation network:networking technologies and state of the art
Published 2022-05-01“…The emerging low earth orbit (LEO) mega-constellation network (MCN) represented by Starlink and OneWeb were studied.The system architecture and basic working modes were introduced, and the main features of the emerging broadband MCN were summarized.Based on the system architecture of MCN, the methodology and research progress of five key technologies were investigated and summarized, including network topology dynamics management, space-ground handover scheme, high-efficiency routing algorithm design, gateway placement design, network simulation and performance evaluation.The focus was on recent mega-constellation-related studies.The challenges caused by the large scale and complexity of MCN and the applicability of existing techniques and solutions in MCN were analyzed.…”
Get full text
Article -
2494
Cloud native intelligent operation and maintenance technology
Published 2020-12-01“…Relying on the advantages of simple and fast applications,easy deployment of applications,and on-demand scaling of running applications,cloud native technology has been rapidly promoted.However,with the application of cloud native,the system architecture has become more complex and the scale of resources has become larger,and there is an urgent need for more intelligent operation and maintenance.Using intelligent operation and maintenance can better assist cloud-native application development,reduce operation and maintenance costs,and improve service quality.The application scenarios,key points,classic practices and existing problems of intelligent operation and maintenance were analyzed,and a cloud-native intelligent operation and maintenance architecture were proposed,and the main principles of the three scenarios:the trend prediction,data anomaly detection and fault location diagnosing in the core service algorithm platform were introduced in detail,and finally the future of intelligent operation and maintenance were looked forward.…”
Get full text
Article -
2495
On a strict mathematical definition of the brachistochrone’s shape taking into account the thermal effect in the contact zone
Published 2025-06-01“…Matherials and methods. The main method for solving the problem is the moving basis method, which has proven itself well in solving many problems related to the study of various properties of brachistochrones. …”
Article -
2496
Privacy-preserving indoor localization scheme based on Wi-Fi fingerprint with outsourced computing
Published 2024-02-01“…To solve the privacy-preserving problem of both the user and the server in indoor positioning, outsourcing part of the calculation to cloud server in the process of using Paillier encryption was considered.The scheme not only protected the privacy of the user and the positioning server, but also avoided excessive computing and communication overhead.The main idea of the scheme was that the fingerprint database in the offline stage was established by the server firstly.The k-anonymity algorithm was combined with Paillier encryption in the online stage by the user, and the encrypted Wi-Fi fingerprints were sent to the positioning server.An aggregation of the received Wi-Fi fingerprints and database fingerprints were performed by the server.Then they were outsourced to the cloud server for decryption and distance calculation by the positioning server.Finally, the positioning result was obtained.Theoretical analysis and experimental results show that the proposed scheme is safe, effective and practical.…”
Get full text
Article -
2497
Anomaly detection of large scale network based on data streams
Published 2006-01-01“…The anomaly detection algorithms of the large scale network(LSN) were required to analysis the vast network traffic of G bit level in real-time and on-the-fly.A novel monitoring mechanism of LSN anomaly detection based on the data stream approach was proposed.The main contributions included: the sketch data structure and the frequent sketch algorithm of data streams were designed for anomaly detection of LSN.Optimized query methods were designed for customizing the security monitoring and detection policy with the correlations of multi data streams.The data reduction was proposed to make it possible that the whole network traffic character could be got using a few of special data streams.The experiments of the real networking environments validate the effectivity of LSN anomaly detection methods.…”
Get full text
Article -
2498
Spectral Analysis of Cough Sounds in Patients with Chronic Bronchitis
Published 2025-06-01“…Background: Cough is the main symptom of chronic bronchitis (CB). However, the literature does not provide information on the characteristics of the cough sound in CB patients. …”
Get full text
Article -
2499
Developing a Mathematical Model for Scheduling and Determining Success Probability of Research Projects Considering Complex-Fuzzy Networks
Published 2015-01-01“…Through the deliverables of this method, a proper estimation of project completion time (PCT) and success probability can be achieved. So algorithms were developed to cover all features of the problem based on three main parameters “duration, occurrence probability, and success probability.” …”
Get full text
Article -
2500
Research on nonlinear constraint assessment model of power grid based on generalized Benders decomposition
Published 2025-08-01“…The generalized Benders decomposition method is used to decompose the model into main problem and sub-problems, the main problem is solved iteratively by linear evaluation, and the sub-problems are solved iteratively by interior point method. …”
Get full text
Article