-
13861
Study on LTE-Advanced MIMO Enhancement
Published 2014-03-01“…Based on the technique theory, algorithm implement and test trail of transmission mode 9 were well disscussed. …”
Get full text
Article -
13862
Code design with high rates based on quasi-orthogonal space-time block code
Published 2011-01-01“…In order to meet the needs of high-speed and large-capacity in communication system,the novel non-orthogonal space-time block code with code rates 2 and 1.5 were proposed,respectively.The simplified conditional maximum-likelihood algorithm is adopted to reduce the decoding complexity.The simulation results show that the channel capacities of proposed code are very close to the actual value,and the BER performance is better than that of the orthogonal and quasi-orthogonal codes.…”
Get full text
Article -
13863
Bilevel programs with extremal value function: global optimality
Published 2005-01-01“…Finally, this case is completed by an algorithm.…”
Get full text
Article -
13864
Simulation of Hardening and Cooling Processes for Moving Melts in Special Casting Technologies
Published 2008-08-01“…A mathematical model and an algorithm for numerical solution of conjugate problem concerning hydrodynamics and heat transfer of hardening and cooling processes with liquid metal flow is given in the paper.Quantitative relationships between heating and hydrodynamic parameters of moving melts in the channels of metallic molds of special casting technologies have been determined in the paper. …”
Get full text
Article -
13865
Spatiotemporal Pattern Networks of Heavy Rain among Automatic Weather Stations and Very-Short-Term Heavy-Rain Prediction
Published 2016-01-01“…Spatiotemporal pattern networks of heavy rain among automatic weather stations, which reflect the mobility of heavy rain, were constructed and analyzed based on the hourly precipitation data over the last ten years (from 2003 to 2012) in South Korea. Moreover, a new algorithm applying the constructed heavy-rain pattern networks to very-short-term heavy-rain prediction was developed, and significant prediction results could be obtained.…”
Get full text
Article -
13866
Guaranteeing service availability in cloud computing
Published 2014-02-01“…A sliding window based resource reservation (SWRR) algorithm was proposed, in which a window is defined as the proportion of the reserved resources among all. …”
Get full text
Article -
13867
Robust Distributed H∞ Filtering for Nonlinear Systems with Sensor Saturations and Fractional Uncertainties with Digital Simulation
Published 2015-01-01“…A sufficient condition is derived for the filtering error system to reach the required H∞ performance in terms of recursive linear matrix inequality method. An iterative algorithm is then proposed to obtain the filter parameters recursively by solving the corresponding linear matrix inequality. …”
Get full text
Article -
13868
Solving change of basis from Bernstein to Chebyshev polynomials
Published 2025-06-01“…We provide two closed-form solutions to the change of basis from Bernstein polynomials to shifted Chebyshev polynomials of the fourth kind and show them to be equivalent by applying Zeilberger’s algorithm. The first solution uses orthogonality properties of the Chebyshev polynomials. …”
Get full text
Article -
13869
Prolonged QT Syndrome in a 27-Year-Old Female Presenting as a Cardiac Arrest after Elective Surgery
Published 2014-01-01“…Cardiac arrest is a true medical emergency and clinicians should base the management on American Heart Association advanced cardiac life support algorithm. The potential triggers of cardiac arrest should be sought. …”
Get full text
Article -
13870
APPLICATION ANALYTICAL INFORMATION SYSTEMS BASED ON OLAP TECHNOLOGY
Published 2016-11-01“…It has been shown the structural elements of the IAS and OLAP model. The algorithm elaborated can recognize painful human condition, depending on the set of detectible symptoms and syndromes. …”
Get full text
Article -
13871
Research and Implementation of Network Topology Visualization Based on H3
Published 2014-05-01“…A network topology discovery algorithm was given which had the characteristic of rapid and less extra traffic. …”
Get full text
Article -
13872
Subarrayed Antenna Array Synthesis Using Ternary Adjusting Method
Published 2014-01-01“…Ternary adjusting method is proposed and combined with particle swarm optimization (PSO) algorithm for subarrayed antenna array synthesis. Ternary variables are introduced to represent element adjustments between adjacent subarrays. …”
Get full text
Article -
13873
Robust beamforming based on the worst-case performance optimization with positive semi-definite constraints
Published 2013-03-01“…For the robust adaptive beamforming problem of the gen l signal models, a robust beamforming algorithm based on the worst-case performance optimization with positive semi-definite constraints was proposed. …”
Get full text
Article -
13874
TEC Data Forecasting Using a Novel Nonlinear Model
Published 2015-01-01“…A novel nonlinear TEC forecasting model is proposed in the paper; the main produces of the model are as follows: first the EOF decomposition of TEC data is made, then the genetic algorithm is used to establish the nonlinear time field model, and finally the decomposed space field and the predicted time field are reconstructed to achieve the purpose of forecasting the TEC data. …”
Get full text
Article -
13875
Fast crosstalk precoder based on structured matrix splitting for downstream transmission
Published 2009-01-01“…Based on special line position,a novel precoder of cancellation crosstalk for downstream transmission was proposed.As the new method needs only two order matrix inversion,the precoder had a much lower computational com-plexity and was easy for implementation.In addition,the performance of the precoder was superior to that of the first or-der algorithm,almost the same tri-diagonal precoder.Computer simulation results based on real measured data verify the efficiency of the proposed precoder.…”
Get full text
Article -
13876
A network security situation prediction method based on hidden Markov model
Published 2015-12-01“…Aiming at the dynamic and real-time characteristics of network security situation prediction,a network security situation prediction model based on hidden Markov model(HMM)was designed.According to the HMM,the situation in t+1 from t time can be calculated.Meanwhile,the maximum entropy algorithm was combinated with HMM to improve the accuracy rate.The analysis and simulation experiments show that the method has the characteristics of autonomous learning and active defense,and it also balance the speed and accuracy.…”
Get full text
Article -
13877
HIGH-PERFORMANCE EMBEDDING IN DUAL IMAGES BASED ON PIXEL VALUE ORDERING METHOD
Published 2024-12-01“…This paper improves the Pixel Value Ordering (PVO) algorithm to enhance embedding capacity in dual images. …”
Get full text
Article -
13878
WIND ENERGY POTENTIAL ASSESSMENT OF UKRAINE
Published 2014-12-01“…The methodology has considerable advantages: it contains a simple algorithm, minimum set of input data, at the same time it provides highly reliable results and allows adequately assess wind power potential of investigated area. …”
Get full text
Article -
13879
DEVELOPMENT THE MODEL OF IMPROVING THE QUALITY OF TRAINING
Published 2017-03-01“…In particular was proposed: the algorithm for comparative evaluation of specialists based proximity measure its actual set of competencies to the standard of PPS, the mathematical model to describe the growth of competences.…”
Get full text
Article -
13880
Jaringan Komunitas Berbasis Similaritas Topik Bahasan dan Emosi untuk Mengidentifikasi Perilaku Pengguna Twitter
Published 2023-02-01“…Then, the behavioral network was modeled by the DeepWalk Network Embeddings algorithm to map the behavioral closeness relationship between users and the Density Peak Clustering Algorithm to group user communities with strong behavioral similarities. …”
Get full text
Article