Showing 15,381 - 15,400 results of 19,511 for search '"algorithms"', query time: 0.10s Refine Results
  1. 15381

    C3S:research of CI-based concurrent transmission strategy for intelligent sensing system by Yanyan MAO, Dapeng CHENG, Yanli FENG, Quansheng DOU, Dashe LI

    Published 2019-01-01
    “…Concurrent transmission technology has important sense for Intelligent Sensing System (ISS).The C3S strategy based with constructive interference (CI) was proposed.C3S was composed of intelligent clock synchronization layer,intelligent energy consumption allocation layer and intelligent parallel pipeline layer.The intelligent clock synchronization layer designed ICCA,a CI-based intelligent clock calibration algorithm.The intelligent energy allocation layer designed CIES,a energy adaptive scheduling scheme for CI,Moreover,a CI-based parallel pipeline CI2P was implemented in the intelligent parallel pipeline layer.The experimental results show that the C3S strategy can effectively improve the packet receiving rate of the concurrent transmission in ISS.It can also reduce the energy consumption of ISS and improve the channel utilization rate of ISS.…”
    Get full text
    Article
  2. 15382

    Novel DOA estimation method for coherent wideband LFM signals by Peng,LIUKai-hua LUO, Jie-xiao YU, Yong-tao MA

    Published 2012-03-01
    “…A novel direction of arrival (DOA) estimation method for coherent wideband linear frequency modulation (LFM) signals was proposed.Based on the dechirping property of LFM signal in fractional Fourier domain,a new array data model was constructed,then the matrix reconstruction and MUSIC algorithm were used to estimate the DOA of coherent LFM signals.If there were multiple groups of coherent LFM signals incident,separated them in different energy-concentrated domains first,then carried the DOA estimation on each of the groups.Owing to fully excavating the time-frequency information included in observed signals,this method has good resolution ability and anti-noise performance,and the number of DOA that can be resolved is also increased.In addition,this method has no array redundancy and aperture loss,and can be applied to arbitrary array manifold.Simulation results show that this method can obtain nearly 8dB signal-to-noise ratio gain compared with the conventional method.…”
    Get full text
    Article
  3. 15383

    EFFECT OF RANDOM FIBER DISTRIBUTION ON LONGITUDINAL COMPRESSIVE BEHAVIOR OF COMPOSITE MATERIALS by ZHANG Li, XU Dong, ZHANG ShuFeng, JIANG YuanXiang

    Published 2018-01-01
    “…Random fiber distribution may lead to randomness of longitudinal compressive behavior of fiber reinforced plastics(FRP).To mimic random fiber distribution over the cross-section,a new algorithm named Latin Hypercube Sampling based on Random Sequential Expansion(LHS-RSE) is proposed,which can simulate the random fiber distribution of FRP with fiber volume ratio as high as 70%.Then,3 D FE model with random fiber distribution of unidirectional fiber reinforced plastic T300/914 is developed in Abaqus/Standard to investigate the influence of random fiber distribution on the compressive behavior.It is shown that random fiber distribution over cross section greatly compromises the longitudinal compressive strength of FRP.Random distribution of longitudinal compressive strength resulted by random fiber distribution tends to follow normal or lognormal distribution.…”
    Get full text
    Article
  4. 15384

    Coordinated Control of Slip Ratio for Wheeled Mobile Robots Climbing Loose Sloped Terrain by Zhengcai Li, Yang Wang

    Published 2014-01-01
    “…First, a slope-based wheel-soil interaction terramechanics model is built, and an online slip coordinated algorithm is designed based on the goal of optimal drive efficiency. …”
    Get full text
    Article
  5. 15385

    Retracted: Content-Based E-Commerce Image Classification Research by Xiaoli Zhang

    Published 2020-01-01
    “…Aiming at the problems of insufficient classification accuracy and long classification training time in e-commerce image classification, an adaptive momentum learning rate based LBP-DBN training algorithm–AML-LBP-DBN and commodity image classification method based on image local feature multi-level clustering and image-class nearest neighbor classifier are proposed. …”
    Get full text
    Article
  6. 15386

    Research and prospect of standard for biometric multi-modal fusion used with mobile devices by Guanchen LIN, Zhifei WANG

    Published 2021-01-01
    “…Aiming at the problem of inconsistent biometric multi-modal fusion technology framework for mobile devices and lack of standards, a unified technical framework of multi-modal fusion standards was proposed.Firstly, the current status of standardization related to biometric used with mobile device was analyzed.Secondly, the local recognition and remote recognition application modes of mobile device biometrics standards were studied, and then four sub-multimodal fusion classification methods of multi-feature, multi-algorithm, multi-instance, and multi-sensor were analyzed and proposed.Then, four levels of multi-modal fusion were researched and proposed: sample-level fusion, feature-level fusion, score-level fusion, and decision-level fusion, and a standard technical framework for biometric multi-modal fusion for mobile devices was proposed.Finally, prospects for the application of biometric multi-modal fusion technology were given.…”
    Get full text
    Article
  7. 15387

    La chasse aux fantômes sur YouTube. Approche ethnographique et quali-quantitative des commentaires des vidéos by Fanny Georges

    Published 2019-12-01
    “…Drawing on public data from four YouTube channels featuring paranormal investigations in haunted places, the analysis highlights the social and technical injunctions (social expectations, algorithm), the common contributors to several chains, and the social function of the comments. …”
    Get full text
    Article
  8. 15388

    Understanding the Person through Narrative by Joanne M. Hall, Jill Powell

    Published 2011-01-01
    “…A narrative approach stands in contrast to a yes/no algorithmic process in conversing with clients. Eliciting stories illustrates the social context of events, and implicitly provides answers to questions of feeling and meaning. …”
    Get full text
    Article
  9. 15389

    Optimal approach of suppressing WSN malware propagation based on cloud computing and dynamic Bayesian game by Shigen SHEN, Sheng FENG, Haiping ZHOU, Longjun HUANG, Keli HU, Qiying CAO

    Published 2018-09-01
    “…To apply intrusion detection system (IDS) efficiently so as to suppress WSN malware propagation,a cloud-based network infrastructure for realizing functions of WSN IDS was presented,considering the real basis that the resources of WSN nodes were limited whilst the resources of cloud computing platform were almost unlimited.Based on the analysis of the game process between a sensor node and the corresponding WSN IDS agent,a WSN-malware-propagation-suppression game model was constructed by employing the dynamic Bayesian game,and the requirements of energy consumption in sending monitored data and privacy protection for sensor nodes were satisfied.According to the proposed game type and refined Bayesian equilibrium,the optimal strategie for suppressing WSN malware was proposed as well the algorithm for actual application was given.The factors that influence WSN IDS agents to select their optimal strategies were analyzed,and the experimental foundation was provided for the application of the proposed approach.…”
    Get full text
    Article
  10. 15390

    Designing a Fresh Food Supply Chain Network: An Application of Nonlinear Programming by Yu-Chung Tsao

    Published 2013-01-01
    “…This paper develops an algorithm to solve the nonlinear problem, provides numerical analysis to illustrate the proposed solution procedure, and discusses the effects of various system parameters on the decisions and total profits. …”
    Get full text
    Article
  11. 15391

    Spatiotemporal Correlation Representation based Precise Resource Management in Space-Air-Ground Integrated Network by Tianle MAI, Haipeng YAO, Xiangjun XIN, Jingkai YANG, Chenlang JIN

    Published 2024-06-01
    “…In the space-air-ground integrated network, resources are unevenly distributed and dynamically change over time.Traditional optimization scheduling methods based on static resource representation only optimize scheduling within a single time slot, leading to low resource utilization.Moreover, frequent strategy adjustments are required when the network changes, resulting in significant migration costs.To address this issue, this paper proposed a method for spatiotemporal correlation representation of resources in the space-air-ground integrated network.This method computed node attention representations in both structural neighborhoods and chronological neighborhoods, enabled precise modeling of spatiotemporal resource correlations in the space-air-ground integrated network.Based on this, this paper proposed a resource precise embedding method based on spatiotemporal correlation representation, and introduced the trust region policy optimization method to adaptively learn and optimize algorithm parameters.…”
    Get full text
    Article
  12. 15392

    Two-step ranging based on energy detection for IR-UWB sensor networks by ZHANG Ting-ting1, ZHANG Qin-yu2, ZHANG Nai-tong1

    Published 2009-01-01
    “…In order to design a low computational and cost ranging method for the IR-UWB (impulse radio ultra wideband) wireless sensor network, a two-step DP (direct path) component TOA (time of arrival) estimation algorithm based on energy detection was proposed. The first step was to determine DP energy block in which located by GLRT (generalized likelihood ratio test). …”
    Get full text
    Article
  13. 15393

    Heterogeneous multi-layer mobile edge computing for 6G by Pengfei WANG, Boya DI, Lingyang SONG, Zhu HAN

    Published 2020-03-01
    “…With the development of the Internet of things,multiple real-time applications will emerge in future 6G communication network.Driven by demands on low-latency services of multiple real-time applications,mobile edge computing (MEC) will become an important technology to improve the user experience and reduce the network cost.However,the computing capacity of a single MEC server is limited,which induces that it is difficult to meet the low-latency requirement of data processing for the computation-intensive applications.A heterogeneous multi-layer mobile edge computing (HetMEC) network architecture was proposed to jointly utilize the computing and transmission resources of both the cloud computing center and multi-layer MEC servers.By reasonably dividing and offloading computing tasks,reliable and efficient computing services were provided for edge applications.Simulation results show that the proposed algorithm could effectively reduce the processing latency,improve the network processing rate and robustness.…”
    Get full text
    Article
  14. 15394

    Self-adaptive price adjustment strategy based on market mechanism in distributed environment by Chang-song DING, Zhi-ying WANG, Zhi-gang HU

    Published 2016-02-01
    “…The theoretical ana is proved the effectiveness of the pricing strategy, and the algorithm of the pricing strategy was designed. Resources information in the real distributed systems was used as the performance parameters of experimental node in the sim lation experiments, and the performance of the adaptive pricing strategy was tested in a large-scale grid mission. …”
    Get full text
    Article
  15. 15395

    Hiss noise reduction method used for audio signals based on AAC bit-stream by Feng DENG, Chang-chun BAO, Feng BAO

    Published 2013-05-01
    “…A hiss noise reduction method used for audio signals based on AAC bit-stream in compressed domain was proposed.The input was AAC bit-stream derived from noisy audio signals,and the output was the enhanced AAC bit-stream used for decoder.First,Hiss noise was estimated by modified median absolute deviation (MMAD).Second,the auditory masking threshold and the masking parameters were calculated by modified discrete Flourier transform (MDFT).Finally,the parametric soft-thresholding method was employed to obtain the enhanced AAC bit-stream which was used to get the enhanced audio signals at AAC decoder.The objective and subjective quality testing results indicate that the proposed algorithm can effectively remove the Hiss noise derived from AAC bit-stream of audio signals and ob-viously outperforms the existing hiss noise reduction methods.…”
    Get full text
    Article
  16. 15396

    Elementi di interfaccia per l’analisi di strutture murarie by Elio Sacco, Jessica Toti

    Published 2013-04-01
    “…Some numerical applications are performed in order to assess the performances of the proposed model and algorithm in reproducing the nonlinear response of masonry material due to damage localization. …”
    Get full text
    Article
  17. 15397

    Optimal Planning of Distributed Sensor Layouts for Collaborative Surveillance by Thomas A. Wettergren, Russell Costa

    Published 2013-04-01
    “…In particular, we develop a genetic algorithm solution to find spatial sensor density functions that maximize effectiveness against moving targets, where the surveillance performance of individual sensors is dependent on their absolute position in the region as well as their relative position to both the expected target(s) and any asset that is being protected. …”
    Get full text
    Article
  18. 15398

    Multidimensional detection and dynamic defense method for link flooding attack by Yang WANG, Guangming TANG, Cheng LEI, Dong HAN

    Published 2019-08-01
    “…Aiming at the shortcomings of the existing link flooding attack defense methods,a multi-dimensional index detection algorithm is proposed,which performs multi-dimensional detection on the abnormal forwarding links through the five-dimensional elements of connection length,low-speed ratio of data packets,uniformity of data packet distance,average low-speed ratio of data packets,and change rate of low-speed ratio of data packets,thus effectively solving the problem of high false alarm rate of the existing detection methods.Furthermore,a controller switch dynamic deployment method based on coloring theory is proposed,which solves the problem of difficult to be actually deployed in the actual environment with limited switch variant types existing in the existing defense mitigation mechanisms.Experimental analysis show the feasibility of the proposed method.…”
    Get full text
    Article
  19. 15399

    Person re-identification using mid-level features with vertical global appearance constraint by Yadong WANG, Rong ZHANG, Huihui JIANG, Lijun GUO

    Published 2017-04-01
    “…Mid-level features with the semantic information can provide stronger discrimination in the person re-identification than low-level features.But like the low-level features,the mid-level features also use local feature matching methods and easily leads mismatch problem when different pedestrians have similar appearance features in some local areas.Considering the same pedestrians are more similar than different pedestrians in the vertical direction since pedestrians are almost always in a standing position,global vertical appearance constraints was introduced.Furtherly,a method for person re-identification was proposed which fuses the low-level densely patch-matching and the mid-level features with the global vertical appearance constraints.Experimental results show that the proposed algorithm can achieve a higher hit rate than the existing methods on the most challenging public VIPeR database and CUHK01 database.…”
    Get full text
    Article
  20. 15400

    A flexible continuous-wave quantum cryptography scheme with zero-trust security for Internet of Things by Yong Shen, Xiaokang Tang, Xiang Zhang, Yongzhuang Zhou, Hongxin Zou

    Published 2022-11-01
    “…As quantum computing techniques develop rapidly, the security of classical communication, which is usually based on public key encryption algorithm, is under great threat. Therefore, a key establishment method with physics base is demanding, especially for Internet of Things devices, where energy and computational power is quite limited. …”
    Get full text
    Article