-
1341
Phase Demodulation of Rotor Torsional Vibration Measurement under Time-Varying Speed
Published 2022-01-01“…To verify the proposed DSLR algorithm, torsional vibration simulations and experiments are conducted under a time-varying rotation speed. …”
Get full text
Article -
1342
Discovering hierarchical process models: an approach based on events partitioning
Published 2024-09-01“…However, a discovered process model may be too detailed, sophisticated, and difficult for experts to understand. …”
Get full text
Article -
1343
Comparison of Turkey’s Geographical Regions in terms of Stand-Alone PV System Design and Cost Parameters
Published 2017-01-01“…The averages of the centers for each region are taken as output. A calculation algorithm based on MsExcel has been established for these operations. …”
Get full text
Article -
1344
Decomposition-Based Multiobjective Evolutionary Optimization with Adaptive Multiple Gaussian Process Models
Published 2020-01-01“…In recent years, a number of recombination operators have been proposed for multiobjective evolutionary algorithms (MOEAs). One kind of recombination operators is designed based on the Gaussian process model. …”
Get full text
Article -
1345
Harnessing Vehicle-to-Vehicle Communications for 3G Downloads on the Move
Published 2014-11-01“…We have evaluated our algorithm with simulations with real vehicular traces and the results show that our algorithms reduce the 3G cost and achieve good performance of data downloads.…”
Get full text
Article -
1346
Tracking and Repairing Damaged Healthcare Databases Using the Matrix
Published 2015-11-01“…The results of this work prove that our algorithm performs better than the other algorithms in both the damage assessment and the recovery stages.…”
Get full text
Article -
1347
Optimal State Estimation in Underwater Vehicle Discrete-Continuous Measurements via Augmented Hybrid Kalman Filter
Published 2025-05-01“…The paper focuses on the optimal state-estimation algorithm for discrete-continuous systems. The research aim is to create an effective strategy for combining data from continuous and discrete information sources to improve the state estimation accuracy and reliability of complex dynamic systems. …”
Get full text
Article -
1348
An Impulse-C Hardware Accelerator for Packet Classification Based on Fine/Coarse Grain Optimization
Published 2013-01-01“…The Packet Classification with Incremental Update (PCIU) algorithm, Ahmed et al. (2010), is a novel and efficient packet classification algorithm with a unique incremental update capability that demonstrated excellent results and was shown to be scalable for many different tasks and clients. …”
Get full text
Article -
1349
SOFT CONTROL OF A NON-LINEAR ECONOMIC SYSTEM
Published 2025-05-01“…Certain advantages of the proposed fuzzy control algorithm for a nonlinear model based on expert knowledge are highlighted, which can be useful in developing control systems of higher dimension, where the use of classical methods may not be sufficiently justified or appropriate. …”
Article -
1350
Multiobjective Optimization for Topology and Coverage Control in Wireless Sensor Networks
Published 2015-02-01“…Simulation results demonstrate that the proposed algorithm can improve the network lifetime and coverage while maintaining the network connectivity.…”
Get full text
Article -
1351
Circadian phase resetting via single and multiple control targets.
Published 2008-07-01“…In particular, maintaining proper circadian regulation may significantly decrease the chance of acquiring chronic illness.…”
Get full text
Article -
1352
Security control scheme for cloud data copy based on differential privacy model
Published 2017-05-01“…In cloud computing environment,adversary may use data deduplication as a side channel to eavesdrop users’ privacy.In order to tackle this serious issue,a secure copy number control scheme was proposed.The highlights of the proposed scheme lie in constructing a hybrid cloud framework.Then file was encrypted for second times by using the privacy protection parameters of differential privacy as well as the key of the file computed by convergent encryption algorithm.After the file is uploaded,each file has only one copy in the server.Meanwhile,compared with the scheme that use setting threshold value to control the number of copies,the proposed scheme can resist against the side channel attack,related files attack,and the specific attack of encryption algorithm and save the network bandwidth and disk storage space.…”
Get full text
Article -
1353
Network Coding-Based Real-Time Retransmission Scheme in Wireless Sensor Networks
Published 2015-06-01“…In wireless sensor networks (WSNs), wireless links are unreliable and sensor nodes may be in sleep mode. Thus, many applications which require reliable broadcast cannot work properly if they lost some packets. …”
Get full text
Article -
1354
A Real-Time Image Encryption Method of Networked Inverted Pendulum Visual Servo Control System
Published 2020-01-01“…Generally, the inverted pendulum images are directly transmitted via the network, while these images are not secure because they may be attacked by the hacker. To solve the problem, a fast image encryption method by combining image scaling and improved self-diffusion image encryption (ISDIE) algorithm is firstly proposed, which is employed to encrypt the captured images after they are scaled. …”
Get full text
Article -
1355
Novel Hardware Implementation of the Cipher Message Authentication Code
Published 2008-01-01“…The proposed security scheme incorporates an FIPS approved and secure block cipher algorithm and was standardized by NIST in May, 2005. …”
Get full text
Article -
1356
Big Data Analytics: A Tutorial of Some Clustering Techniques
Published 2021-09-01“…Other algorithms use overlapping techniques where an object may belong to one or more clusters. …”
Get full text
Article -
1357
RESTORATION OF ELEMENTS IN THE FACADE DECOR OF MONUMENTS IN ARCHITECTURE
Published 2023-05-01“…The restoration process may involve cleaning, repair, reconstruction, or replacement of the damaged elements. …”
Get full text
Article -
1358
An Alternative Fuel Refueling Station Location Model considering Detour Traffic Flows on a Highway Road System
Published 2020-01-01“…To this end, we first propose an algorithm to generate alternative paths that may provide the multiple AF refueling stops between all origin/destination (OD) vertices. …”
Get full text
Article -
1359
Automated Syndesmotic Distance, Area, and Volume Measurements Using 3D Segmentations of Weightbearing Computed Tomography Scans
Published 2024-12-01“…Category: Ankle; Sports Introduction/Purpose: Syndesmotic injuries may be associated with subsequent instability, even following operative fixation of etiologic fractures. …”
Get full text
Article -
1360
Structural knowledge-driven meta-learning for task offloading in vehicular networks with integrated communications, sensing and computing
Published 2024-07-01“…To tackle this challenge, we propose a creative structural knowledge-driven meta-learning (SKDML) method, involving both the model-based AM algorithm and neural networks. Specifically, borrowing the iterative structure of the AM algorithm, also referred to as structural knowledge, the proposed SKDML adopts long short-term memory (LSTM) network-based meta-learning to learn an adaptive optimizer for updating variables in each sub-problem, instead of the handcrafted counterpart in the AM algorithm. …”
Get full text
Article