-
14421
Application of bilateral fusion model based on CNN in hyperspectral image classification
Published 2020-11-01“…Aiming at the issues of decreasing spatial resolution and feature loss caused by pooling operation in depth CNN-based hyperspectral image classification algorithm,a bilateral fusion block network (DFBN)composed of bilateral fusion blocks was designed.The upper structure of bilateral fusion block was constituted by 1×1 convolution and hyperlink,which was used to transfer local spatial characteristics.The lower structure was constituted by pooling layer,convolutional layer,deconvolution layer and upsampling to enhance the characteristics of efficient discrimination.Experimental results on three benchmark hyperspectral image data sets illustrate that the model is superior to other similar classification models.…”
Get full text
Article -
14422
Effects of Wind on Virtual Plants in Animation
Published 2013-01-01“…The Growth-Flow method incorporates all these effects on growth and motion due to wind in one algorithm.…”
Get full text
Article -
14423
Multiple-Model Cardinality Balanced Multitarget Multi-Bernoulli Filter for Tracking Maneuvering Targets
Published 2013-01-01“…By integrating the cardinality balanced multitarget multi-Bernoulli (CBMeMBer) filter with the interacting multiple models (IMM) algorithm, an MM-CBMeMBer filter is proposed in this paper for tracking multiple maneuvering targets in clutter. …”
Get full text
Article -
14424
Evidence-Based Multidisciplinary Design Optimization with the Active Global Kriging Model
Published 2019-01-01“…The numerical results show that the proposed algorithm is effective and valuable, which is valuable in engineering application.…”
Get full text
Article -
14425
How FPGAs Can Help Create Self-Recoverable Antenna Arrays
Published 2012-01-01“…The challenges of the SRA concept and embodiment of the recovery algorithm(s) are discussed. The results of the radiation recovery are presented on a few array cases, followed by a discussion on the advantages and possible limitations of the FPGA-based array control.…”
Get full text
Article -
14426
Optimization of operational plans based on BWM-QFD method
Published 2025-02-01“…Secondly, this method uses BWM to calculate the weight of plan satisfaction requirement, builds the optimization framework of operational plans, and proposes the evaluation algorithm of plan satisfaction requirement. At last, through the case of optimization of operational plans, the effectiveness and the implementability of this method is numerically verified.…”
Get full text
Article -
14427
Deep learning for compressed sensing based sparse channel estimation in FDD massive MIMO systems
Published 2021-08-01“…For FDD massive multi-input multi-output (MIMO) downlink system, a novel deep learning method for compressed sensing based sparse channel estimation was proposed, which was called convolutional compressed sensing network (ConCSNet).In the ConCSNet, the convolutional neural network was utilized to solve the inverse transformation process from measurement vector y to signal h and solve the underdetermined optimization problem through data-driven method without sparsity.Simulation results show that the algorithm can recover the channel state information in massive MIMO Systems with unknown sparsity more quickly and accurately.…”
Get full text
Article -
14428
Collection policy refining method for threat monitoring in complex network environment
Published 2019-04-01“…Personalized collect policy is one of the necessary conditions for effectively monitoring threats in the complex network environment.However,differences in security requirements and threat types make it difficult to effectively generate personalized collect policy.To address the above problem,a collection policy automatic refinement method was designed.Firstly,a hierarchical model of collection policy was proposed.Then,by transforming the policy refinement into a nonlinear optimization problem,a genetic algorithm was designed to balance between collection revenue and collection cost.Finally,simulation experiments verify that according to the requirements of high-level monitoring,the acquisition scheme can be automatically generated.…”
Get full text
Article -
14429
Reliable multicast in wireless mesh networks based on routing quality
Published 2011-01-01“…A reliable model of multicast network was proposed and the reliability of the wireless links and nodes on the multicast routing was discussed.First,a reliable model about the relevance of wireless links and the reliability of multicast paths was established,and reliability criterion of multicast transmission was proposed.A reliable multicast network based on the combination of primary tree and multi-path tree algorithm was designed.Reliable multicast networks have multi-parallel multicast paths,so it satisfies the reliability requirement of multicast links and nodes between multicast source node and destination nodes,and provides the load sharing and hot standby functions,accordingly satisfies the multicast traffic reliability.…”
Get full text
Article -
14430
Improvement of RBVT-R Routing Protocol in VANET
Published 2013-09-01“…Aiming at the defects of RBVT-R routing protocol during the process of routing establishment and packet forwarding, an improved algorithm of RBVT-R was proposed. This method has improved the flooding mechanism by attaining road traffic density independently during the process of routing establishment. …”
Get full text
Article -
14431
Bounded Model Checking of ETL Cooperating with Finite and Looping Automata Connectives
Published 2013-01-01“…Since such kind of temporal logic involves both finite and looping automata as connectives, all regular properties can be succinctly specified with it. The presented algorithm is integrated into the model checker ENuSMV, and the approach is evaluated via conducting a series of imperial experiments.…”
Get full text
Article -
14432
Anonymity handover authentication protocol based on group signature for wireless Mesh network
Published 2016-10-01“…In order to ensure that the Mesh network mobile client video,voice and other real-time strong applications without interruption,a secure and efficient handover authentication was very important.To protect the privacy of mobile nodes,an anonymity handover authentication protocol was proposed based on group signature for wireless mesh network.Compared with other handover authentication protocols based on group signature,the proposed scheme did not involve the group signature correlation operation,and the group signature algorithm was only carried out on the router.The pro-posed protocol not only enhances the security but also performs well in authentication efficiency and privacy-preserving.…”
Get full text
Article -
14433
An Approach to Self-Assembling Swarm Robots Using Multitree Genetic Programming
Published 2013-01-01“…The main objective of this study is to develop a novel self-assembling swarm robot algorithm that overcomes the limitations of existing approaches. …”
Get full text
Article -
14434
Degree distribution optimization for LT codes and its application in link maintenance of cognitive radio
Published 2018-04-01“…The degree distribution has a great influence on the performance of Luby transform (LT) codes.Based on the link maintain model of cognitive radio system,the novel degree distribution of LT codes was obtained by using the THOA (two-layer hierarchical optimization algorithm) to combine the IPD (improved poisson distribution) which achieved high decoding success rate with low overhead and the robust soliton distribution (RSD) which achieved high decoding success rate with high overhead.Simulation results show that the proposed method with application to link maintenance in cognitive radio system can improve the reliability and efficiency of secondary communication.…”
Get full text
Article -
14435
On the Estimation of k-Regimes Switching of Mixture Autoregressive Model via Weibull Distributional Random Noise
Published 2021“…We developed and established a Weibull Mixture Autoregressive model of k-regimes via WMAR(k; p1, p2, , pk ) with Expectation-Maximization (EM) algorithm adopted as parameter estimation technique. …”
Get full text
Article -
14436
Research on end hopping for active network confrontation
Published 2008-01-01“…Motivated by frequency hopping for military communication, end hopping tactic was proposed which can mitigate those threats such as DoS and eavesdrop greatly by changing the end information of port, address, timeslot, cryptographic algorithm or even protocol pseudo-randomly during end to end transmission. …”
Get full text
Article -
14437
Diagnosis and Management of Pulmonary Embolism in Pregnancy
Published 1996-01-01“…A complete assessment for suspected pulmonary embolus can be performed without putting the fetus at significant risk from radiation exposure. An algorithm is provided for the workup of pulmonary embolus during pregnancy. …”
Get full text
Article -
14438
Environment Parameters Control Based on Wireless Sensor Network in Livestock Buildings
Published 2016-05-01“…The above six parameters will be adjusted and controlled through WLS algorithm and the minimizing deviation criteria. Compared with the traditional method, the high labor cost will be saved and energy consumption will be decreased. …”
Get full text
Article -
14439
Locality-guided based optimization method for bounded model checker
Published 2018-03-01“…For software model checking,approaches that combine with different kind of verification methods are now under research.The key to improve scale and complexity of verifiable software is handling the method for abstraction widening and strengthening wisely and precisely.To archive that,using extra knowledge that extracted from programming pattern or learned through verifying procedure to help eliminate the redundant state has been proved effective.Definition of program locality was given.It took the important role in accelerating software verification,then the strategy was raised and an algorithm was implemented to take advantage of program locality.This method exploits the features of modern BMC (bounded model checker) and scales up the capability of its power in large scale and comprehensive software modules.…”
Get full text
Article -
14440
Intelligent Transportation Design Based on Iterative Learning
Published 2022-01-01“…The simulation results show that the algorithm can achieve better control effect and can solve the problem of urban traffic congestion more effectively than traditional traffic control methods.…”
Get full text
Article