Showing 12,821 - 12,840 results of 19,511 for search '"algorithms"', query time: 0.09s Refine Results
  1. 12821

    A peak-to-average power ratio reduction method for mixed-numerology multi-carrier systems by Nan SHI, Xiaoran LIU, Jun XIONG, Xiaoying ZHANG, Jibo WEI

    Published 2023-10-01
    “…In order to support diverse service demands of communication scenarios, 5G adopts the mixed-numerology system based on orthogonal frequency division multiplexing (OFDM).The mixed-numerology systems still have the problem of high peak-to-average power ratio (PAPR).Furthermore, its design structure makes it difficult to apply traditional PAPR suppression methods straight forwardly, in which mixed signals are generated by superimposing multiple sub-signals with different parameters.An optimization model for minimizing PAPR in mixed-numerology systems was established based on tone reservation method.Utilizing the characteristic of single-peak of time-domain kernel, the multiple copies were generated in different numerologies based on the peak position of the mixed signal.The mixed time-domain kernel was then superimposed to reduce the peaks of the mixed signal.Since the proposed algorithm didn’t require inverse fast Fourier transform (IFFT)/ fast Fourier transform (FFT) operations during iteration, it had relatively low computational complexity.Simulation results show that the proposed algorithm effectively reduces the PAPR of mixed signals.…”
    Get full text
    Article
  2. 12822

    Lightweight detection system of shared spam attacks by Shao-qing LV, Dan FAN, Yu-qing ZHANG

    Published 2015-07-01
    “…Spam is one of the most serious attacks against online social networks (OSN).Recently a new type of spam attack occurs,which named shared spam attack.The shared spam attack can separate the storage and dissemination of spam content,making the existing detection systems no longer effective.To address this problem,an empirical analysis of the process and properties of this new spam attack is performed.A novel lightweight iterative detection algorithm (LIDA) is proposed to detect spam accounts in OSN with these properties.LIDA contains two steps:target filter and content detection.It also noteworthy that LIDA is a lightweight algorithm to infer more spam accounts by exploiting spam accounts’ sharing instead of scanning or analyzing all accounts.Experimental results in RenRen,which has successfully detected 9 568 spam accounts,30 732 spam albums and 2 626 780 spam URL in four round iterations,indicate that LIDA is effective and efficiency in detecting shared spam accounts.…”
    Get full text
    Article
  3. 12823

    Incremental Gene Expression Programming Classifier with Metagenes and Data Reduction by Joanna Jedrzejowicz, Piotr Jedrzejowicz

    Published 2018-01-01
    “…A detailed description of the algorithm is followed by the extensive computational experiment. …”
    Get full text
    Article
  4. 12824

    Steel Plate Defect Recognition of Deep Neural Network Recognition Based on Space-Time Constraints by Chi Zhang, Zhiguang Wang, Baiting Liu, Wang Xiaolei

    Published 2022-01-01
    “…In order to improve the effect of real-time defect recognition in steel plate online production, this paper studies the method of steel plate defect recognition based on the deep neural network algorithm based on space-time constraints. Moreover, this paper improves the space-time constraint algorithm, optimizes the encryption structure of the traditional ABE scheme, and obtains a neural network feature recognition method based on space-time constraints. …”
    Get full text
    Article
  5. 12825

    Dynamic Response of Crossanisotropic Layered Media with Imperfect Interface under Axisymmetric Loads by Zejun Han, Chengchao Guo, Linqing Yang, Jin Zhang, Kai Sun

    Published 2022-01-01
    “…The algorithm used two equivalent contact parameters to simulate the relationship between the discontinuity of the displacement and stress. …”
    Get full text
    Article
  6. 12826

    Efficient and safe auditable mixed-coin service scheme based on blind signature by Kang QIAO, Hongbo TANG, Wei YOU, Haitao LI

    Published 2020-08-01
    “…The mixed-coin service can provide solutions for the privacy problem of blockchain,but it still faces efficiency bottlenecks and security risks.To further improve the efficiency and security protection of the mixed-coin service,an efficient and safe auditable mixed-coin service scheme based on blind signature was proposed.Firstly,this scheme added audit measures.It added an audit blockchain to the traditional mix-coin model to record the behavior of users and mixers,achieving traceability and accountability.Then,this method used elliptic curves algorithm to construct blind signatures instead of blind signature schemes based on bilinear pairs or RSA.Finally,this scheme proposed an auditable blind mix-coin service agreement based on the auditable mix-coin model and the blind signature algorithm based on elliptic curve.Simulation analysis shows that the proposed scheme has six security features,such as auditability and anti-theft attack,while providing privacy protection.Under the same security intensity,the proposed scheme can effectively reduce the computational overhead and storage overhead.…”
    Get full text
    Article
  7. 12827

    Multi-values discrete particle swarm optimization for cross layer resource allocation in cooperative OFDMA systems by Wei LI, Chun-lin XIONG, De-gang WANG, Xiao-ying ZHANG, Ji-bo WEI

    Published 2014-04-01
    “…Unlike the traditional discrete particle swarm optimization (DPSO) algorithm, the proposed one denotes the parti-cle position by discrete multi-value variable. …”
    Get full text
    Article
  8. 12828

    Belong and Nonbelong Relations on Double-Framed Soft Sets and Their Applications by Tareq M. Al-shami, Abdelwaheb Mhemdi

    Published 2021-01-01
    “…Second, we give an educational application of optimal choices using the idea of double-framed soft sets. We provide an algorithm of this application with an example to show how this algorithm is carried out.…”
    Get full text
    Article
  9. 12829

    A Cutting Plane and Level Stabilization Bundle Method with Inexact Data for Minimizing Nonsmooth Nonconvex Functions by Jie Shen, Dan Li, Li-Ping Pang

    Published 2014-01-01
    “…Another merit is that our algorithm makes a distinction between affine pieces that exhibit a convex or a concave behavior relative to the current iterate. …”
    Get full text
    Article
  10. 12830

    Research and realization of the Trojan detection engine based on Android by Bin XIA, Feng QIU

    Published 2016-10-01
    “…A feature code detection algorithm called FCPA got the sourceDir of the known malicious APK files through calling system API. …”
    Get full text
    Article
  11. 12831

    Intelligent CSI feedback method for fast time-varying FDD massive MIMO system by Yong LIAO, Shuai WANG, Ning SUN

    Published 2021-07-01
    “…In the frequency division duplexing (FDD) massive multiple-input multiple-output (MIMO) system, the channel state information (CSI) matrix existed noise caused by the wireless channel interference and the time correlation caused by Doppler shift.Because of these effects, the communication system couldn’t guarantee the requirements of reliability and low delay.An intelligent CSI feedback method was adopted.The convolutional neural network (CNN) and batch normalization (BN) network was used to extract the noise in the CSI matrix and learned the spatial structure of the channel.The time correlation between the CSI matrices through the attention mechanism was extracted to improve the accuracy of CSI reconstruction.The data was generated by the standard fast time-varying channel model simulation to train the network offline.System simulation and analysis show that the proposed method can effectively suppress the influence of noise and extract the time correlation caused by Doppler.Compared with the traditional CSI compression feedback algorithm and CsiNet algorithm, the proposed method has better NMSE and cosine similarity performance.…”
    Get full text
    Article
  12. 12832

    Fast loop-free path migration strategy in software defined network by Binghao YAN, Qinrang LIU, Jianliang SHEN, Xiantuo TANG, Dong LIANG

    Published 2022-05-01
    “…Aiming at the problems of slow and faulty path migration caused by distributed deployment and asynchronous operation of data plane forwarding devices in software defined network, a fast loop-free path migration strategy was proposed.First, a fast loop detection algorithm based on node ranking was proposed.By comparing the position differences of adjacent nodes on the old and new paths of the flow, whether there was a forwarding loop in the path migration process and the location detection where the loop occurs could be quickly determined.Then, a greedy update mechanism based on node relaxation dependency was proposed.The fast loop detection algorithm was used to uncover the relaxation dependency between the common switches on the old and new paths, and the number of switches updated in each round of the migration process was ensured to be maximized.Simulation results show that the proposed strategy can effectively avoid migration loops and obtain the optimal update time overhead under different network states compared with existing migration schemes.…”
    Get full text
    Article
  13. 12833

    Research of LBS privacy preserving based on sensitive location diversity by Chang-li ZHOU, Chun-guang MA, Song-tao YANG

    Published 2015-04-01
    “…Before getting location-based query service,constructing a cloaking region or picking an anchor which is still in a sensitive area is vulnerable to lead location privacy exposure.An algorithm of selecting anchor is proposed based on sensitive location diversity.By defining sensitive locations and filtering different ones according to users’ visiting number and peak time,locations with similar features are chosen to construct a diversity zone,and the centroid of the zone is chosen as an anchor that raises location diversity.Referring to SpaceTwist,a query algorithm (HINN) is proposed to get places of interest (PoI),and query results can be inferred without providing any user’s actual location.The defect in SpaceTwist that PoIs are found around the anchor is modified,which improves querying accuracy.The experiments show that users’ location privacy is protected well when the user is staying at a sensitive place,and the method has good working performances.…”
    Get full text
    Article
  14. 12834

    FORMING THE BACHELOR’S RESEARCH SKILLS IN THE COURSEWORK DEVELOPMENT by Svetlana G. Afanasyeva

    Published 2015-10-01
    “…The second phase is connected with the choice of a computing algorithm. The third phase is software development for the implementation of the model and algorithm with using the information and communication technologies.…”
    Get full text
    Article
  15. 12835

    Accurate 2-D AOA Estimation and Ambiguity Resolution for a Single Source under Fixed Uniform Circular Arrays by Le Zuo, Jin Pan

    Published 2017-01-01
    “…This paper presents an analytic algorithm for accurate two-dimensional (2-D) angle of arrival (AOA) estimation of a single source under fixed uniform circular arrays (UCAs). …”
    Get full text
    Article
  16. 12836

    Semantic Detection of Vehicle Violation Video Based on Computer 3D Vision by Yue Dai

    Published 2022-01-01
    “…The MOTA of the CEM algorithm is 78.4%, FP is 1.1%, and FN is 3.5%, and the MOTA of the 3-DCMK algorithm is 88.6%, FP is 0.9%, and FN is 1.9%. …”
    Get full text
    Article
  17. 12837

    Customer Churn Modeling via the Grey Wolf Optimizer and Ensemble Neural Networks by Maryam Rahmaty, Amir Daneshvar, Fariba Salahi, Maryam Ebrahimi, Adel Pourghader Chobar

    Published 2022-01-01
    “…This study proposes a hybrid system based on fuzzy entropy criterion selection algorithm with similar classifiers, grey wolf optimization algorithm, and artificial neural network to predict the customer churn of those companies that suffer losses from losing customers over time. …”
    Get full text
    Article
  18. 12838

    RESEARCH ON MAGNETIC INVERSION OF 304 STAINLESS STEEL ARTIFICIAL DEFECTS WEAK MAGNETIC SIGNAL BASED ON LIBSVM by GUO MengMeng, HU Bo, PENG XianHu, LIAO LianWen

    Published 2021-01-01
    “…Aiming at 304 austenitic stainless steel paramagnetic material,a multi-class classification support vector machine LIBSVM algorithm was carried out for the magnetic anomaly inversion of weak magnetic signals. …”
    Get full text
    Article
  19. 12839

    Cooperative modulation recognition based on one-dimensional convolutional neural network for MIMO-OSTBC signal by Zeliang AN, Tianqi ZHANG, Baoze MA, Pan DENG, Yuqing XU

    Published 2021-07-01
    “…To recognize the modulation style adopted in multiple-input-multiple-output orthogonal space-time block code (MIMO-OSTBC) systems, a cooperative modulation recognition algorithm based on the one-dimensional convolutional neural network (1D-CNN) was proposed.With the lossless I/Q signal selected as shallow features, the zero-forcing blind equalization was first leveraged to improve the discrimination of different modulation signals.Then the 1D-CNN recognition model was devised and trained to extract deep features from shallow ones.Later, two decision fusion strategies of voting-based and confidence-based were leveraged in the multiple-antenna receiver to improve recognition accuracy.Experimental results show that the proposed algorithm can effectively recognize five modulation types {BPSK, 4PSK,8PSK,16QAM,4PAM}, with a 100% recognition accuracy when the signal-to-noise is equal or greater than-2 dB.…”
    Get full text
    Article
  20. 12840

    Radar emitter identification based on unintentional phase modulation on pulse characteristic by Xin QIN, Jie HUANG, Jiantao WANG, Shiwen CHEN

    Published 2020-05-01
    “…Aiming at the problem of poor performance of the classification model in the case of unintentional phase modulation on pulse (UPMOP) to achieve radar specific emitter identification,a method for radar specific emitter identification with long and short-term memory and full convolutional networks (LSTM-FCN) was proposed.Firstly,a simplified observation model of the intrapulse signal phase considering the intentional modulation was presented,and the observation phase sequence was deramp to extract the noisy estimate of the UPMOP.Then Bezier curve was utilized to fit the UPMOP to reduce the influence of noise and obtain a more accurate description of UPMOP.Finally,the LSTM-FCN was used to extract the joint features of UPMOP sequence to realize the radar specific emitter automatic identification.Both the simulation experiments and the measured data experiments verify the feasibility and effectiveness of the proposed algorithm.Moreover,the proposed algorithm has high identification accuracy and short time consumption.…”
    Get full text
    Article