-
14461
Blind frequency tracking based on time-domain spreading for MB-OFDM-UWB systems
Published 2013-04-01“…A blind carrier frequency offset (CFO) tracking algorithm based on time-domain spreading (TDS) was proposed for multiband orthogonal frequency division multiplexing ultra wide band systems.The scheme uses data symbols and the mapped TDS ones to develop time and frequency-domain estimators and tracking loops respectively.Simulation results indicate that the proposed scheme has a better performance in tracking accuracy than pilots-aided ones.Under the SNR of 10dB,the mean square root errors of the residual CFO reach 2 10<sup>-4</sup>,and the bit error rate of the system is 10<sup>-6</sup>× of magnitude.…”
Get full text
Article -
14462
Critical bifurcation surfaces of 3D discrete dynamics
Published 2000-01-01“…The procedure of bifurcation analysis proposed in this paper represents the 3D elaboration and specification of the general algorithm of the n-dimensional linear bifurcation analysis proposed by the author earlier. …”
Get full text
Article -
14463
OPTIMIZATION DESIGN OF SEALED-MODULE STRUCTURE BASED ON ISIGHT PLATFORM
Published 2016-01-01“…Based on i SIGHT multidisciplinary optimization platform integrated finite element analysis software ABAQUS,the sub-model technology,global optimization strategy,hybrid iterative optimization algorithm and parametric modeling method of spline curve were used in optimization design of sealed-module structures,which greatly reduced the single-solving time and improved the efficiency of entire optimization process. …”
Get full text
Article -
14464
A Novel Feature Extraction Technique Using Binarization of Bit Planes for Content Based Image Classification
Published 2014-01-01“…The technique has binarized the significant bit planes of an image by selecting local thresholds. The proposed algorithm has been tested on a public dataset and has been compared with existing widely used techniques using binarization for extraction of features. …”
Get full text
Article -
14465
Intersection of Ideals in a Polynomial Ring over a Dual Valuation Domain
Published 2018-01-01“…We propose a method for computing a strong Gröbner basis in R=A[x1,…,xn]; given polynomials f1,…,fs∈R, a method for computing a generating set for Syz(f1,…,fs)={(h1,…,hs)∈Rs∣h1f1+⋯+hsfs=0} is given; and, finally, given two ideals I=〈f1,…,fs〉 and J=〈g1,…,gr〉 of R, we propose an algorithm for computing a generating set for I∩J.…”
Get full text
Article -
14466
CURRICULUM DEVELOPMENT PECULIARITIES FOR HIGHLY QUALIFIED PERSONNEL TRAINING
Published 2016-12-01“…The authors suggest a generalized algorithm for postgraduate curriculum development within competency format and give recommendations on how to form the list of professional competencies. …”
Get full text
Article -
14467
Robust Adaptive Reactive Power Control for Doubly Fed Induction Generator
Published 2014-01-01“…To accommodate the modelling nonlinearities and inherent uncertainties, a novel robust adaptive control algorithm for MSI is proposed by utilizing Lyapunov theory that ensures asymptotic stability of the system under unpredictable external disturbances and significant parametric uncertainties. …”
Get full text
Article -
14468
A Gain-Scheduling PI Control Based on Neural Networks
Published 2017-01-01“…As a result, a PI controller action is obtained, where the gain depends on the state of the system and is adapted instantaneously on-line. The algorithm is tested on a nonisothermal continuous stirred tank reactor (CSTR), considering both single-input single-output (SISO) and multi-input multi-output (MIMO) control problems. …”
Get full text
Article -
14469
Fault Diagnosis and Fault-Tolerant Control for Leader-Follower Multi-Agent Systems with Time Delay
Published 2022-01-01“…Finally, the proposed algorithm is verified by an example and satisfactory results are obtained.…”
Get full text
Article -
14470
Effective Throughput of Cognitive Multiple Access Channel Under Collision Constraints and Imperfect Sensing
Published 2015-12-01“…Moreover, the validity of proposed access strategy was verified by comparing it with other algorithm.…”
Get full text
Article -
14471
On Mixed Equilibrium Problems in Hadamard Spaces
Published 2019-01-01“…We then prove a strong convergence of the resolvent and a Δ-convergence of the proximal point algorithm to a solution of the mixed equilibrium problem under some suitable conditions. …”
Get full text
Article -
14472
About probability of error detection of unauthorized impacts on pipeline with active vibroacoustic method of control
Published 2019-11-01“…The conclusion is made about the consistency of the proposed algorithm for identifying the type of unauthorized exposure.…”
Get full text
Article -
14473
Existence, Uniqueness and Convergence Solution of Nonlinear Caputo-Fabrizio Fractional Biological Population Model
Published 2024-07-01“…Furthermore, we propose a new numerical algorithm called $\mathbb{J}$-decomposition method ($\mathbb{J}$-DM) which is a combined form of the $\mathbb{J}$-transform method and a new decomposition method to solve the proposed model. …”
Get full text
Article -
14474
A Clustering Protocol for Wireless Sensor Networks Based on Energy Potential Field
Published 2013-01-01“…The purpose of this paper is to illustrate a clustering protocol LEACH-PF, which is a multihop routing algorithm with energy potential field of divided clusters. …”
Get full text
Article -
14475
Analyse de la production de voyelles anglaises par des apprenants francophones, l’acquisition du contraste /ɪ/–/iː/ à la lumière des k-NN
Published 2019-11-01“…This article addresses the issue of assessing the realizations of /ɪ/ and /iː/ by French learners of English in spontaneous conversations by considering it as a classification problem, which the resort to the k-nearest neighbours algorithm (k-NN) can solve. From a longitudinal corpus of 12 speakers recorded at the university of Paris Diderot over two years, it is shown that in spite of gaps in the numbers of occurrences of tokens for each category, and in spite of the impossibility to use cross-validation, the k-NN method is a reliable means to account for the quality of learners’ vocalic realizations.…”
Get full text
Article -
14476
Selective Extraction of Entangled Textures via Adaptive PDE Transform
Published 2012-01-01“…The present work introduces adaptive PDE transform algorithm to appropriately threshold the statistical variance of the local variation of functional modes. …”
Get full text
Article -
14477
3D Simulation of Self-Compacting Concrete Flow Based on MRT-LBM
Published 2018-01-01“…In the present study, the SCC is assumed as a non-Newtonian fluid, and a modified Herschel–Bulkley model is used as constitutive mode. The mass tracking algorithm was used for modeling the liquid-gas interface. …”
Get full text
Article -
14478
Solution to the Problem of a Mass Traveling on a Taut String via Integral Equation
Published 2019-01-01“…Numerical results throw light on the physics of the phenomenon and confirm the effectiveness of the algorithm.…”
Get full text
Article -
14479
Sparse expression and sensing of fast fading channel for OFDM systems with imperfect carrier synchronization
Published 2013-09-01“…A sparse expression of fast fading channel and its sensing method were proposed for orthogonal frequency-division multiplexing (OFDM) system of sparse pilot under the condition of imperfect carrier synchronization.First,a sparsified core vector based sparse expression of the generalized channel impulse response (G-CIR) was proposed by deriving compressed sensing model of the sparse pilot system.Then,both the sparsified core vector and G-CIR were reconstructed by orthogonal matching pursuit(OMP).Simulation results demonstrate that the proposed algorithm can effectively reduce the bit error rate (BER) of the OFDM system with imper ect carrier synchronization.…”
Get full text
Article -
14480
Distributed Continuous-Time Containment Control of Heterogeneous Multiagent Systems with Nonconvex Control Input Constraints
Published 2022-01-01“…A nonlinear projection algorithm is proposed to address the problem. We discuss the stability and containment control of the system with switching topologies and nonconvex control input constraints under three different conditions. …”
Get full text
Article