Showing 14,401 - 14,420 results of 19,511 for search '"algorithms"', query time: 0.11s Refine Results
  1. 14401

    Backward Surface Wave Propagation and Radiation along a One-Dimensional Folded Cylindrical Helix Array by Bin Xu, Yang Li

    Published 2015-01-01
    “…Both the propagation constant and the mode distribution of the dominant wave mechanism are extracted by ESPRIT algorithm, which indicates that a backward propagating surface wave is supported by the array structure. …”
    Get full text
    Article
  2. 14402

    Polarization demultiplexing by ICA in a polarization multiplexing system with both PMD and PDL by Ling ZHAO, Gui-jun HU, Jin-hua LV, Gong-yu LI, Li LI

    Published 2013-10-01
    “…Due to polarization mode dispersion(PMD)and polarizat dependent loss(PDL)in a system,the coherent detection scheme was chosen at the receiver side of the system and T-CMN algorithm was used to separate the polariza-tion multiplexed signals.Simulation results show that after demultiplexed by independent component analysis(ICA),the transmission quality of polarization signals is obviously improved,and when the optical signal to noise ratio of the sys-tem is greater than 20.86 dB,the bit error rate can be kept lower than10<sup>- 9</sup>,which meets the requirement of a communica-tion system.…”
    Get full text
    Article
  3. 14403

    Static-analysis-based event input generation approach for Android application by Yi-lin YE, Zhen-ji ZHOU, Zheng HONG, Hui-ying YAN, Li-fa WU

    Published 2017-06-01
    “…A static-analysis-based event input generation approach for Android applications was proposed.Based on the inter-component call graph and the system dependence graph of single component,the event inputs that security-related callbacks depend on were extracted.Furthermore,an event input algorithm was designed to automatically generate event inputs according to Android application runtime.The experimental results show that the proposed method can achieve higher coverage of permission methods and basic components,which can cover more security-related execution paths and help to collect more security-related runtime behaviors during the process of dynamic analysis.…”
    Get full text
    Article
  4. 14404

    Novel robust content-based watermarking for image by YANG Shi-yong1, WU Xiao-li2, YUE An-jun2, GE Jian-hua2

    Published 2005-01-01
    “…To lay the watermarking information in the notable areas of the features, an algorithm of fuzzy entropy estimation was proposed. …”
    Get full text
    Article
  5. 14405

    Centralized scheduling contention resolution for wireless metropolitan area networks by LU Wen-yan1, JIA Wei-jia1, WANG Guo-jun1, DU Wen-feng1

    Published 2006-01-01
    “…In comparison with the contention resolution based on truncated binary exponential backoff (BEB) algorithm given by IEEE 802.16, the CSCR resolution is not only easy to be implemented and more efficient in utilizing the transmission opportunities, but also can reduce the delay of admission. …”
    Get full text
    Article
  6. 14406

    Carrier frequency estimation method of time-frequency overlapped signals based on cyclic correntropy spectrum by Tianshuang QIU, Xing CHEN, Jitong MA, Jingchun LI, Rong LI

    Published 2018-06-01
    “…According to the performance degradation problem of the carrier frequency estimation method of time-frequency overlapped BPSK signals in Alpha-stable distribution noise,a novel carrier frequency estimation algorithm of the time-frequency overlapped BPSK signals based on the cyclic correntropy spectrum was proposed.The relationship between cyclic frequency and carrier frequency on the zero frequency section of the cyclic correntropy spectrum was deduced,which could be utilized for carrier frequency estimation.The proposed method can suppress the impulse noise and has better estimation performance than that of the contrastive methods.Simulation results are presented to demonstrate the effectiveness and robustness of the proposed method.…”
    Get full text
    Article
  7. 14407

    A Scatter Search Approach for Multiobjective Selective Disassembly Sequence Problem by Xiwang Guo, Shixin Liu

    Published 2014-01-01
    “…The validity of ISS is verified by comparing the optimization effects of ISS and nondominated sorting genetic algorithm (NSGA-II).…”
    Get full text
    Article
  8. 14408

    Service selection approach for enhancing trustworthiness of Web service by ZHAO Sheng-hui1, WU Guo-xin1, CHEN Gui-lin3, CHEN Hai-bao3

    Published 2011-01-01
    “…Making use of the game theory,a model of service selection based on Nash bargaining solution was build,and an approach for enhancing Web service trustworthiness was proposed.A bargaining algorithm is designed between ser-vice sides of both complete rationality,through adjusting service price,to achieve maximum utility for both service re-questor and provider,and increase the success rate of transactions and service trustworthiness.Results of experiments show that,on the basis of the game that according to quality of service,reputation and security between service provider and requestor,the service selection can promote the establishment of trustable service computing environment and en-hance credibility of the service.…”
    Get full text
    Article
  9. 14409

    South African Rheumatism and Arthritis Association 2024 guidelines for the management of axial spondyloarthritis by A B Maharaj, R Benitha, K Makan, R du Toit, D Haasbroek, C Balton, P Govender, M van Dam, F Paruk, B Hodkinson

    Published 2024-10-01
    “…The ankylosing spondylitis disease activity score is recommended as a measure of disease activity, and a stepwise algorithm for therapy is provided. Screening for comorbidities and vaccination is advised. …”
    Get full text
    Article
  10. 14410

    The Networked Author: Looking at Contemporary Authorship Through Postdigital Comics by Giorgio Busi Rizzi

    Published 2024-10-01
    “…In a conceptual reframing of this landscape, the article divides the former into ‘collaborative’ or ‘participatory’ authorship, and the latter into ‘algorithmic’ and ‘rhizomatic’ authorship, surveying and discussing their configurations.…”
    Get full text
    Article
  11. 14411

    Simple and Efficient Preconditioner for Surface Integral Solution of Scattering from Multilayer Dielectric Bodies by B. B. Kong, X. Q. Sheng

    Published 2016-01-01
    “…Furthermore, the multilevel fast multipole algorithm (MLFMA) is employed to improve the capability of the solutions. …”
    Get full text
    Article
  12. 14412

    Shining Lights on Limits: Optimizing Luminescent Solar Concentrators for Solar Windows by Thomas A. de Bruin, Wilfried G. J. H. M. van Sark

    Published 2025-01-01
    “…To optimize this trade‐off, a numerical algorithm is used to find the power conversion efficiency of 92 luminophores, ensuring an average visible transmission >55% and a color rendering index >70. …”
    Get full text
    Article
  13. 14413

    A Novel Virtual Voltage Comparison Compensation for Dynamic Voltage Restorer by Jie Xu, Pengcheng Niu

    Published 2022-01-01
    “…This paper proposes a new virtual voltage comparison compensation dynamic voltage recovery method. The algorithm that uses the invariant constant signal as the input quantity, and the real-side input load side signal reduces the influence of the input quantity uncertainty change on the generated compensation signal and improves the simplicity of the system operation control and the system stability. …”
    Get full text
    Article
  14. 14414

    Improved Optimization Study of Integration Strategies in Solar Aided Coal-Fired Power Generation System by Rongrong Zhai, Miaomiao Zhao, Chao Li, Pan Peng, Yongping Yang

    Published 2015-01-01
    “…This study mainly improves the solar thermal storage system. Genetic algorithm is used to optimize the SACFPGS. The best integration approach of the system, the collector area, and the corresponding thermal storage capacity to replace each high-pressure extraction are obtained when the amount of coal saving in unit solar investment per hour is at its largest. …”
    Get full text
    Article
  15. 14415

    THE TECHNIQUES SEPARATING THREE OVERLAP PEAKS IN GAMMA SPECTRUM by Trịnh Ngọc Pháp, Mai Xuân Trung

    Published 2017-09-01
    “…The calculation procedure was performed by the Levenberg-Marquardt algorithm with linear and nonlinear background. Based on separating the two overlap peaks method has been implemented in our previous article, the separating three overlap peaks was successfully implemented in this paper, in which the calculations were tested with gamma-ray spectra by using a Semiconductor detector and a Scintillator detector.…”
    Get full text
    Article
  16. 14416

    Efficient Midfrequency Analysis of Built-Up Structure Systems with Interval Parameters by Hui Yin, Dejie Yu, Shengwen Yin, Baizhan Xia

    Published 2015-01-01
    “…Extreme values of the expanded variables are searched by using efficient search algorithm. For large parameter intervals, the subinterval perturbation method is introduced. …”
    Get full text
    Article
  17. 14417

    Using random subcarrier weighting for multi-carrier systems physical layer security by Zhou ZHONG, Liang JIN, Kai-zhi HUANG

    Published 2012-10-01
    “…An OFDM security model and a physical layer security transmission scheme were proposed for multi-carrier systems to achieve low probability of interception.In contrast to the resource allocation algorithm which would be disabled at the low SNR,this method designed the subcarrier transmission weighting vectors to randomize the eavesdropper’s signals but not the authorized receiver’s signals.The channel state information was the only character to distinguish authorized receivers and eavesdroppers,which was conducted to guide the weighting vectors design.Simulation results show that the proposed method guarantees that authorized receiver performs transmitted reference demodulation successfully,while the eavesdroppers can not detect the transmitted symbols.…”
    Get full text
    Article
  18. 14418

    Design and implementation of a video recommendation system in campus network by Xin DING, Yan MA, Jun WU

    Published 2013-09-01
    “…According to the feature of video-sharing with P2P in campus network,a video recommendation system in campus network called FP-CNVR system was designed and implemented; a novel data cleaning method based on customer segmentation was proposed; the structure of FP-tree in the process of frequent pattern mining with FP-growth algorithm was improved.Experimental results show that the novel recommendation system can provide more reliable recommended results,and also the novel data cleaning method can improve the accuracy of the recommendation results.The research may have some inspiration to related subjects in campus network.…”
    Get full text
    Article
  19. 14419

    A New Iterative Scheme for Generalized Mixed Equilibrium, Variational Inequality Problems, and a Zero Point of Maximal Monotone Operators by Kriengsak Wattanawitoon, Poom Kumam

    Published 2012-01-01
    “…Moreover, the strong convergence theorems of this method are established under the suitable conditions of the parameter imposed on the algorithm. Finally, we apply our results to finding a zero point of inverse-strongly monotone operators and complementarity problems. …”
    Get full text
    Article
  20. 14420

    Pythagorean Fuzzy (R,S)-Norm Information Measure for Multicriteria Decision-Making Problem by Abhishek Guleria, Rakesh Kumar Bajaj

    Published 2018-01-01
    “…The monotonic behavior and maximality feature of the proposed information measure have been studied and presented. Further, an algorithm for solving the multicriteria decision-making problem with the help of the proposed information measure has been provided keeping in view of the different cases for weight criteria, when weights are unknown and other when weights are partially known. …”
    Get full text
    Article