Showing 1,641 - 1,660 results of 3,044 for search '"ITER"', query time: 0.11s Refine Results
  1. 1641

    Image Fusing by Block Compressed Sensing in Contourlet Domain by Aiping Tang, Hui Cao

    Published 2015-12-01
    “…Finally, the high quality image can be reconstructed by smooth projection Landweber iteration method under the compressed sensing framework. …”
    Get full text
    Article
  2. 1642

    AdaBoost algorithm based on target perturbation by Shufen ZHANG, Yanling DONG, Jingcheng XU, Haoshi WANG

    Published 2023-02-01
    “…Aiming at the problem that the multi-round iteration process in the AdaBoost algorithm will amplify the noise added to achieve differential privacy protection, which leads to slow model convergence and greatly reduced data availability, an AdaBoost algorithm based on target perturbation—DPAda was proposed.Target perturbation was used to add noise to sample weights, accurately calculated their sensitivity, and a dynamic privacy budget was given.In order to solve the problem of excessive noise superposition, three noise injection algorithms based on swing sequence, random response and improved random response were proposed.The experimental results show that compared with DPAda_Random and DPAda_Swing, DPAda_Improved achieves the privacy protection of data, has higher classification accuracy, as well as better than other differential privacy AdaBoost algorithm, and can also solve the problem of excessive noise caused by continuous noise addition.…”
    Get full text
    Article
  3. 1643

    Antecedents of Instapoetry: Considering the Commercial Short Form Aphorism Before and Beyond the Social Media Sphere by James Mackay, Polina Mackay

    Published 2023-07-01
    “…We suggest that broader consideration should be given to previous iterations of commercial short-form aphorisms, such as those found in postcards, greetings cards and novelty items like motivational posters, to better understand the cultural significance of Instapoetry.…”
    Get full text
    Article
  4. 1644

    Human action recognition method based on multi-view semi-supervised ensemble learning by Shengnan CHEN, Xinmin FAN

    Published 2021-06-01
    “…Mass labeled data are hard to get in mobile devices.Inadequate training leads to bad performance of classifiers in human action recognition.To tackle this problem, a multi-view semi-supervised ensemble learning method was proposed.First, data of two different inertial sensors was used to construct two feature views.Two feature views and two base classifiers were combined to construct co-training framework.Then, the confidence degree was redefined in multi-class task and was combined with active learning method to control predict pseudo-label result in each iteration.Finally, extended training data was used as input to train LightGBM.Experiments show that the method has good performance in precision rate, recall rate and F1 value, which can effectively detect different human action.…”
    Get full text
    Article
  5. 1645

    New techniques of intra-satellite communication and ranging/time synchronization for autonomous formation flyer by LI Xue, ZHANG Qi-shan, XU Yong, WANG Ce

    Published 2008-01-01
    “…The principle of two-way noncoherent ranging mode about direct sequence spread spectrum(DSSS) was presented for intersatallite ranging/time synchronization in AFF FDMA/ CDMA networks,concerned equations were constructed and two iteration compupting algorithms were derived. Then,the ground experimenting systems for studying and testing the performance of intra-satallite communication and two-way noncoherent ranging/time synchronization were presented with many experiment results and analyzing. …”
    Get full text
    Article
  6. 1646

    La configuration culturelle territoriale d’une ville moyenne : trajectoires et tensions. Le cas d’Albi by Mariette Sibertin-Blanc, Stéphanie Lima

    Published 2016-12-01
    “…The dimension of the analysis is an iterative process over long time (40 years), revealing the territorial logics and the actors involved.Thus, cultural vitality in Albi results from a combination of experiences, conflicts and local or national policies. …”
    Get full text
    Article
  7. 1647

    Research on the Method of Ground Stress Balance under Complex Conditions Based on Geometric Tracing by Ge Wang

    Published 2022-01-01
    “…To deal with such problems, this paper proposes a general ground stress balance method based on geometric tracing by iteratively superimposing the static displacement field of the numerical model with the initial node coordinates of the numerical model. …”
    Get full text
    Article
  8. 1648

    Structure Preprocessing Method for the System of Unclosed Linear Algebraic Equations by Ling Li, Yongxian Li

    Published 2022-01-01
    “…The complexity of open linear algebraic equations makes it difficult to obtain analytical solutions, and preprocessing techniques can be applied to coefficient matrices, which has become an effective method to accelerate the convergence of iterative methods. Therefore, it is important to preprocess the structure of open linear algebraic equations to reduce their complexity. …”
    Get full text
    Article
  9. 1649

    Indoor Wi-Fi fingerprint localization method based on CSI tensor decomposition by Mu ZHOU, Yuexin LONG, Qiaolin PU, Yong WANG, Wei HE

    Published 2021-11-01
    “…Aiming at the problem that as the scale of the fingerprint database increases, the training cost and processing complexity of CSI fingerprints will also greatly increase, an indoor Wi-Fi fingerprint localization method based on CSI tensor decomposition was proposed.Firstly, the tensor decomposition algorithm based on the PARAFAC (parallel factor) analysis model and the ALS (alternate least squares) iterative algorithm were combined to reduce the interference of the environment.Then, the tensor wavelet decomposition algorithm was used to extract the feature and obtain the CSI fingerprint.Finally, a localization model was established based on the PLSR (partial least squares regression) algorithm to realize the location estimation.Experimental results show that the confidence probability of the proposed method is 94.88% within 4 m localization error, which verifies that the proposed method has good localization performance while fitting the relationship between CSI location fingerprints and location coordinates.…”
    Get full text
    Article
  10. 1650

    Study on the Position Solution and Workspace of 3-RRS Spherical Parallel Mechanism by Li Dahai, Li Ruiqin, Song Shengtao, Zhang Mengmeng, Zhao Jianwen

    Published 2016-01-01
    “…The forward kinematics of 3- RRS spherical parallel mechanism is solved by using Newton iterative method. The inverse kinematics model of 3- RRS spherical parallel mechanism is established by using closed loop vector method. …”
    Get full text
    Article
  11. 1651

    Double reputation and multi-angle weight-based cooperative spectrum sensing method against SSDF attacks by Zhiguo SUN, Zhao WANG, Zengmao CHEN, Rongchen SUN

    Published 2023-12-01
    “…In order to improve the ability of cooperative spectrum sensing to withstand spectrum sensing data falsification (SSDF) attacks, a double reputation and multi-angle weight-based cooperative spectrum sensing (DRMW-CSS) method was proposed.Firstly, a scoring reputation was obtained by multiple iterations of historical local decision results, and an accuracy reputation was calculated on this basis.Secondly, secondary users (SU) were screened by double reputation and multiple reputation thresholds.Then, the impact of SSDF attacks on the screening method was judged and divided into three situations.Finally, the final global decision was made using the corresponding multi-angle weight data fusion decision method according to different situations.Simulation results show that the proposed method has good sensing accuracy when facing SSDF attacks with different attack strategies and probabilities, and has better anti-attack capability compared to traditional methods.…”
    Get full text
    Article
  12. 1652

    Robust interference alignment algorithm for cognitive MIMO interference network by Shi-lei ZHU, You ZHOU, Xiu-kun REN, Han-ying HU

    Published 2016-03-01
    “…A robust interference alignment algorithm was proposed for underlay cognitive MIMO interference network with imperfect channel-state information (CSI).Firstly,imperfect CSI was characterized by Euclidean ball-shaped uncer-tainty,based on which the optimization model of transmitting precoding and receiving interference subspace matrix was constructed with aimed of minimizing interference leak Then,primary users' interference temperature constraint un-der the worst-case condition was derived according to the matrix norm inequality.Finally,alternate iteration expressions of transceiver matrixes were obtained exploiting Lagrange partial dual-decomposition theory and sub-gradient update method.Moreover,the proposed algorithm's application condition and degrees of freedom range were theoretically ana-lyzed.Simulation results show that the proposed algor m is robust and its secondary users' network performance out-performs existing algorithms'.…”
    Get full text
    Article
  13. 1653

    Task scheduling scheme based on improved particle swarm optimization with biological symbiosis mechanism in cloud computing by Linjie WANG

    Published 2016-09-01
    “…For the issues that the existing task scheduling scheme based on intelligent algorithms can’t obtain the optimal solution in cloud computing and inspired by nature symbiosis,a new task scheduling scheme based on improved particle swarm optimization(PSO)with biological symbiosis mechanism(SM)was proposed.Firstly,the particles in PSO were divided into two populations,and the optimization process were performed alone.Then,after each execution of the k iteration of PSO,the individual in the two populations performed the mutualism and parasitism operation.The search process was optimized by mutualism operation to through the optimal solution region,which could enhance the search ability.The parasitism operation was used to avoid premature convergence by eliminating the poor and introducing the optimal solution.Finally,the optimal solution of the task scheduling was obtained.Simulation results show that the optimal scheduling scheme can obtain the minimum task completion time and response time.…”
    Get full text
    Article
  14. 1654

    Reconfigurable intelligent surface assist wireless channel estimation algorithm in Internet of vehicles environment by Rong ZENG, Xiao HANG

    Published 2022-08-01
    “…Aiming at the problem that multi-user channel estimation assisted by reconfigurable intelligent surface (RIS) in the uplink Internet of vehicles environment, a location assisted compressive sensing channel estimation algorithm was proposed.Based on the location information of the communication equipment, a single RIS-assisted single-user communication model was built, and the optimal phase shift matrix was derived according to the logical relationship between the beam angle of departure (AOD) and the angle of arrival (AOA).The perception matrix was constructed and channel estimation was performed, and finally it was extended to multi-user scenarios and solved iteratively.The optimal RIS phase shift matrix was solved based on the position information obtained by the Internet of vehicles technology, which reduced the additional training overhead of the channel and further reduces the complexity of the channel estimation.Simulation results show that the proposed algorithm based on location information has high channel estimation performance.…”
    Get full text
    Article
  15. 1655

    Dynamics of the rational difference equations by Burak Oğul

    Published 2024-12-01
    “…We study the periodicity, boundedness, oscillation, stability, and certain exact solutions of nonlinear difference equations of generalized order in this paper. Using the standard iteration method, exact solutions are obtained. Some well-known theorems are used to test the stability of the equilibrium points. …”
    Get full text
    Article
  16. 1656

    Step-by-Step Multi-Ship Collision Avoidance Navigation Path Planning Based on Particle Swarm Optimization by Canglong Zhao

    Published 2022-01-01
    “…The experimental results show that the particle swarm optimization algorithm finds an optimal path in about 35 iterations, and the shortest path is 38.4 n miles. Conclusion. …”
    Get full text
    Article
  17. 1657

    (Re)producing orientalism by Yizhou Xu

    Published 2024-12-01
    “…Through the case study of the mobile title Game of Sultans, this article examines the proliferation of iterative and copycat games through the practice of reskins in the mobile game industry. …”
    Get full text
    Article
  18. 1658

    La transdisciplinarité à l’épreuve de l’engagement, réflexions à partir de l’application de la méthode photovoice by Anastasia-Alithia Seferiadis

    Published 2023-04-01
    “…Transdisciplinarity thus appears as a transformative epistemology, producing knowledge that can cause transformations at the level of socio-ecosystems, but also as an epistemological transformation, it is indeed co-constructed knowledge that mobilizes holistic, iterative, and relational modes of reasoning. The vision of transdisciplinarity developed in this article places it within an engaged perspective of deconstructing the power relations inherent in knowledge co-construction processes.…”
    Get full text
    Article
  19. 1659

    Federated learning optimization algorithm based on incentive mechanism by Youliang TIAN, Shihong WU, Ta LI, Lindong WANG, Hua ZHOU

    Published 2023-05-01
    “…Federated learning optimization algorithm based on incentive mechanism was proposed to address the issues of multiple iterations, long training time and low efficiency in the training process of federated learning.Firstly, the reputation value related to time and model loss was designed.Based on the reputation value, an incentive mechanism was designed to encourage clients with high-quality data to join the training.Secondly, the auction mechanism was designed based on the auction theory.By auctioning local training tasks to the fog node, the client entrusted the high-performance fog node to train local data, so as to improve the efficiency of local training and solve the problem of performance imbalance between clients.Finally, the global gradient aggregation strategy was designed to increase the weight of high-precision local gradient in the global gradient and eliminate malicious clients, so as to reduce the number of model training.…”
    Get full text
    Article
  20. 1660

    Research on distributed network intrusion detection system for IoT based on honeyfarm by Hao WU, Jiajia HAO, Yunlong LU

    Published 2024-01-01
    “…To solve the problems that the network intrusion detection system in the Internet of things couldn’t identify new attacks and has limited flexibility, a network intrusion detection system based on honeyfarm was proposed, which could effectively identify abnormal traffic and have continuous learning ability.Firstly, considering the characteristics of the convolutional block attention module, an abnormal traffic detection model was developed, focusing on both channel and spatial dimensions, to enhance the model’s recognition abilities.Secondly, a model training scheme utilizing federated learning was employed to enhance the model’s generalization capabilities.Finally, the abnormal traffic detection model at the edge nodes was continuously updated and iterated based on the honeyfarm, so as to improve the system’s accuracy in recognizing new attack traffic.The experimental results demonstrate that the proposed system not only effectively detects abnormal behavior in network traffic, but also continually enhances performance in detecting abnormal traffic.…”
    Get full text
    Article