Showing 14,421 - 14,440 results of 19,511 for search '"algorithms"', query time: 0.15s Refine Results
  1. 14421

    Application of bilateral fusion model based on CNN in hyperspectral image classification by Hongmin GAO, Xueying CAO, Yao YANG, Zaijun HUA, Chenming LI

    Published 2020-11-01
    “…Aiming at the issues of decreasing spatial resolution and feature loss caused by pooling operation in depth CNN-based hyperspectral image classification algorithm,a bilateral fusion block network (DFBN)composed of bilateral fusion blocks was designed.The upper structure of bilateral fusion block was constituted by 1×1 convolution and hyperlink,which was used to transfer local spatial characteristics.The lower structure was constituted by pooling layer,convolutional layer,deconvolution layer and upsampling to enhance the characteristics of efficient discrimination.Experimental results on three benchmark hyperspectral image data sets illustrate that the model is superior to other similar classification models.…”
    Get full text
    Article
  2. 14422

    Effects of Wind on Virtual Plants in Animation by Tina L. M. Derzaph, Howard J. Hamilton

    Published 2013-01-01
    “…The Growth-Flow method incorporates all these effects on growth and motion due to wind in one algorithm.…”
    Get full text
    Article
  3. 14423

    Multiple-Model Cardinality Balanced Multitarget Multi-Bernoulli Filter for Tracking Maneuvering Targets by Xianghui Yuan, Feng Lian, Chongzhao Han

    Published 2013-01-01
    “…By integrating the cardinality balanced multitarget multi-Bernoulli (CBMeMBer) filter with the interacting multiple models (IMM) algorithm, an MM-CBMeMBer filter is proposed in this paper for tracking multiple maneuvering targets in clutter. …”
    Get full text
    Article
  4. 14424

    Evidence-Based Multidisciplinary Design Optimization with the Active Global Kriging Model by Fan Yang, Ming Liu, Lei Li, Hu Ren, Jianbo Wu

    Published 2019-01-01
    “…The numerical results show that the proposed algorithm is effective and valuable, which is valuable in engineering application.…”
    Get full text
    Article
  5. 14425

    How FPGAs Can Help Create Self-Recoverable Antenna Arrays by Miroslav Joler

    Published 2012-01-01
    “…The challenges of the SRA concept and embodiment of the recovery algorithm(s) are discussed. The results of the radiation recovery are presented on a few array cases, followed by a discussion on the advantages and possible limitations of the FPGA-based array control.…”
    Get full text
    Article
  6. 14426

    Optimization of operational plans based on BWM-QFD method by YIN Xing, PENG Shaohui, FANG Bing

    Published 2025-02-01
    “…Secondly, this method uses BWM to calculate the weight of plan satisfaction requirement, builds the optimization framework of operational plans, and proposes the evaluation algorithm of plan satisfaction requirement. At last, through the case of optimization of operational plans, the effectiveness and the implementability of this method is numerically verified.…”
    Get full text
    Article
  7. 14427

    Deep learning for compressed sensing based sparse channel estimation in FDD massive MIMO systems by Yuan HUANG, Yigang HE, Yuting WU, Tongtong CHENG, Yongbo SUI, Shuguang NING

    Published 2021-08-01
    “…For FDD massive multi-input multi-output (MIMO) downlink system, a novel deep learning method for compressed sensing based sparse channel estimation was proposed, which was called convolutional compressed sensing network (ConCSNet).In the ConCSNet, the convolutional neural network was utilized to solve the inverse transformation process from measurement vector y to signal h and solve the underdetermined optimization problem through data-driven method without sparsity.Simulation results show that the algorithm can recover the channel state information in massive MIMO Systems with unknown sparsity more quickly and accurately.…”
    Get full text
    Article
  8. 14428

    Collection policy refining method for threat monitoring in complex network environment by Fenghua LI, Zifu LI, Ling LI, Ming ZHANG, Kui GENG, Yunchuan GUO

    Published 2019-04-01
    “…Personalized collect policy is one of the necessary conditions for effectively monitoring threats in the complex network environment.However,differences in security requirements and threat types make it difficult to effectively generate personalized collect policy.To address the above problem,a collection policy automatic refinement method was designed.Firstly,a hierarchical model of collection policy was proposed.Then,by transforming the policy refinement into a nonlinear optimization problem,a genetic algorithm was designed to balance between collection revenue and collection cost.Finally,simulation experiments verify that according to the requirements of high-level monitoring,the acquisition scheme can be automatically generated.…”
    Get full text
    Article
  9. 14429

    Reliable multicast in wireless mesh networks based on routing quality by HU Zhi-yuan1, WANG Xiao-xiang1, ZHANG Xian2

    Published 2011-01-01
    “…A reliable model of multicast network was proposed and the reliability of the wireless links and nodes on the multicast routing was discussed.First,a reliable model about the relevance of wireless links and the reliability of multicast paths was established,and reliability criterion of multicast transmission was proposed.A reliable multicast network based on the combination of primary tree and multi-path tree algorithm was designed.Reliable multicast networks have multi-parallel multicast paths,so it satisfies the reliability requirement of multicast links and nodes between multicast source node and destination nodes,and provides the load sharing and hot standby functions,accordingly satisfies the multicast traffic reliability.…”
    Get full text
    Article
  10. 14430

    Improvement of RBVT-R Routing Protocol in VANET by Yuanlong Chen, Jianfei Ge, Nanjie Liu, Haitao Zhao

    Published 2013-09-01
    “…Aiming at the defects of RBVT-R routing protocol during the process of routing establishment and packet forwarding, an improved algorithm of RBVT-R was proposed. This method has improved the flooding mechanism by attaining road traffic density independently during the process of routing establishment. …”
    Get full text
    Article
  11. 14431

    Bounded Model Checking of ETL Cooperating with Finite and Looping Automata Connectives by Rui Wang, Wanwei Liu, Tun Li, Xiaoguang Mao, Ji Wang

    Published 2013-01-01
    “…Since such kind of temporal logic involves both finite and looping automata as connectives, all regular properties can be succinctly specified with it. The presented algorithm is integrated into the model checker ENuSMV, and the approach is evaluated via conducting a series of imperial experiments.…”
    Get full text
    Article
  12. 14432

    Anonymity handover authentication protocol based on group signature for wireless Mesh network by Bin-ting SU, Li XU, Feng WANG, NZhi-xing LI

    Published 2016-10-01
    “…In order to ensure that the Mesh network mobile client video,voice and other real-time strong applications without interruption,a secure and efficient handover authentication was very important.To protect the privacy of mobile nodes,an anonymity handover authentication protocol was proposed based on group signature for wireless mesh network.Compared with other handover authentication protocols based on group signature,the proposed scheme did not involve the group signature correlation operation,and the group signature algorithm was only carried out on the router.The pro-posed protocol not only enhances the security but also performs well in authentication efficiency and privacy-preserving.…”
    Get full text
    Article
  13. 14433

    An Approach to Self-Assembling Swarm Robots Using Multitree Genetic Programming by Jong-Hyun Lee, Chang Wook Ahn, Jinung An

    Published 2013-01-01
    “…The main objective of this study is to develop a novel self-assembling swarm robot algorithm that overcomes the limitations of existing approaches. …”
    Get full text
    Article
  14. 14434

    Degree distribution optimization for LT codes and its application in link maintenance of cognitive radio by Benshun YI, Weiqing YAO

    Published 2018-04-01
    “…The degree distribution has a great influence on the performance of Luby transform (LT) codes.Based on the link maintain model of cognitive radio system,the novel degree distribution of LT codes was obtained by using the THOA (two-layer hierarchical optimization algorithm) to combine the IPD (improved poisson distribution) which achieved high decoding success rate with low overhead and the robust soliton distribution (RSD) which achieved high decoding success rate with high overhead.Simulation results show that the proposed method with application to link maintenance in cognitive radio system can improve the reliability and efficiency of secondary communication.…”
    Get full text
    Article
  15. 14435

    On the Estimation of k-Regimes Switching of Mixture Autoregressive Model via Weibull Distributional Random Noise by Rasaki, Olawale Olanrewaju, Anthony, Gichuhi Waititu, Nafiu, Lukman Abiodun

    Published 2021
    “…We developed and established a Weibull Mixture Autoregressive model of k-regimes via WMAR(k; p1, p2, , pk ) with Expectation-Maximization (EM) algorithm adopted as parameter estimation technique. …”
    Get full text
    Article
  16. 14436

    Research on end hopping for active network confrontation by SHI Le-yi1, 2, JIA Chun-fu2

    Published 2008-01-01
    “…Motivated by frequency hopping for military communication, end hopping tactic was proposed which can mitigate those threats such as DoS and eavesdrop greatly by changing the end information of port, address, timeslot, cryptographic algorithm or even protocol pseudo-randomly during end to end transmission. …”
    Get full text
    Article
  17. 14437

    Diagnosis and Management of Pulmonary Embolism in Pregnancy by Sarah Broder, Peter Paré

    Published 1996-01-01
    “…A complete assessment for suspected pulmonary embolus can be performed without putting the fetus at significant risk from radiation exposure. An algorithm is provided for the workup of pulmonary embolus during pregnancy. …”
    Get full text
    Article
  18. 14438

    Environment Parameters Control Based on Wireless Sensor Network in Livestock Buildings by Yu Zhang, Qiyu Chen, Guanting Liu, Weizheng Shen, Guanlin Wang

    Published 2016-05-01
    “…The above six parameters will be adjusted and controlled through WLS algorithm and the minimizing deviation criteria. Compared with the traditional method, the high labor cost will be saved and energy consumption will be decreased. …”
    Get full text
    Article
  19. 14439

    Locality-guided based optimization method for bounded model checker by Shun WANG, Ye DU, Zhen HAN, Jiqiang LIU

    Published 2018-03-01
    “…For software model checking,approaches that combine with different kind of verification methods are now under research.The key to improve scale and complexity of verifiable software is handling the method for abstraction widening and strengthening wisely and precisely.To archive that,using extra knowledge that extracted from programming pattern or learned through verifying procedure to help eliminate the redundant state has been proved effective.Definition of program locality was given.It took the important role in accelerating software verification,then the strategy was raised and an algorithm was implemented to take advantage of program locality.This method exploits the features of modern BMC (bounded model checker) and scales up the capability of its power in large scale and comprehensive software modules.…”
    Get full text
    Article
  20. 14440

    Intelligent Transportation Design Based on Iterative Learning by Yinpu Ma, Kai Liu

    Published 2022-01-01
    “…The simulation results show that the algorithm can achieve better control effect and can solve the problem of urban traffic congestion more effectively than traditional traffic control methods.…”
    Get full text
    Article