-
4601
Gene-boosted assembly of a novel bacterial genome from very short reads.
Published 2008-09-01“…Our method includes a novel gene-boosting algorithm that uses amino acid sequences from predicted proteins to build a better assembly. …”
Get full text
Article -
4602
Optimal policy for composite sensing with crowdsourcing
Published 2020-05-01“…In the applications, the smartphone and its user act as a whole, which called as the composite node in this article. …”
Get full text
Article -
4603
Energy efficient control of indoor environments under time-varying multi-parameter uncertainty
Published 2024-12-01“…Experiments show that the proposed DDPG-PER algorithm can control the indoor environment within the required range by combining multiple time-varying parameters under different outdoor air quality conditions in winter and summer seasons. …”
Get full text
Article -
4604
About a Routing Problem of the Tool Motion on Sheet Cutting
Published 2015-04-01“…An optimal procedure based on the dynamic programming and an effective heuristic algorithm realized on a multicore computer are proposed. …”
Get full text
Article -
4605
Fragmentation-Avoiding Spectrum Assignment Strategy Based on Spectrum Partition for Elastic Optical Networks
Published 2017-01-01“…For alleviating spectrum fragmentation, a spectrum partition policy, splitting the whole optical spectrum into several dedicated partitions, is presented. …”
Get full text
Article -
4606
A deep reinforcement learning solution to help reduce the cost in waiting time of securing a traffic light for cyclists
Published 2024-12-01“…Vehicle counter data are used to compare the DRL approach with the actuated traffic light control algorithm over whole days. Results show that DRL achieves better minimization of vehicle waiting time at every hours. …”
Get full text
Article -
4607
Unmanned aerial vehicle field sampling and antenna pattern reconstruction using Bayesian compressed sensing
Published 2019-06-01“…Performing onsite measurements by scanning the whole 4π [sr] solid angle around the antenna under test (AUT) is more complicated. …”
Get full text
Article -
4608
Disturbance Signal Generation Method of AC Impedance Test Based on Boost Circuit
Published 2022-02-01“…Based on the input constant current PID control algorithm of the existing DC/DC loop, a corresponding digital controller is constructed, and the physical prototype is tested and analyzed for the generated signal. …”
Get full text
Article -
4609
ACTIVE DISTURBANCE REJECTION CONTROL FOR STRUCTURE VIBRATION WITH ELECTROMAGNETIC INERTIAL ACTUATOR (MT)
Published 2023-01-01“…Then, the three-order linear extended state observer was used to estimate the uncertainties and state variables for the whole vibration control system. Additionally, the influence of each parameter of ADRC on the vibration control was also theoretically analyzed to achieve the excellent vibration suppression performance. …”
Get full text
Article -
4610
CytoPy: An autonomous cytometry analysis framework.
Published 2021-06-01“…We demonstrate the ability of CytoPy to phenotype T cell subsets in whole blood samples even in the presence of significant batch effects due to technical and user variation. …”
Get full text
Article -
4611
A Novel Way to Relate Ontology Classes
Published 2015-01-01“…We compare the results of our algorithms with those of a candidate reasoner, namely, the pellet reasoner. …”
Get full text
Article -
4612
Monitoring the reliability of integrated circuits protection against Trojans: encoding and decoding of combinational structures
Published 2021-09-01“…An algorithm for cracking the code of combinational circuits is proposed, based on the description of encoded structure by the resolution function and reducing the problem to SAT CNF. …”
Get full text
Article -
4613
Sound Transmission Through a Thin Plate with Shaped Frequency Response
Published 2019-11-01“…Thin plates, in the form of individual panels or whole device casings, often separate the noise source from its recipients. …”
Get full text
Article -
4614
Continued Fraction Interpolation of Preserving Horizontal Asymptote
Published 2022-01-01“…By means of the relationship between the leading coefficients of the numerator and the denominator and the reciprocal differences of the continued fraction interpolation, a novel algorithm for the continued fraction interpolation is constructed in an effort to preserve the horizontal asymptote while approximating the given function with a horizontal asymptote. …”
Get full text
Article -
4615
Optimization of Processor Clock Frequency for Sensor Network Nodes Based on Energy Use and Timing Constraints
Published 2014-06-01“…We analyze the extended model and verify that our algorithm calculates the clock frequency that optimizes energy savings while satisfying the timing constraints.…”
Get full text
Article -
4616
Research on large-scale identity authentication architecture based on combined symmetric key
Published 2009-01-01“…A large-scale real-name authentication architecture and key management protocol based on combined symmet-ric key algorithm were proposed.With the CSK algorithm and smart card technology, the authentication process can be finished in the chips, and the management of large-scale keys can be simplified to the management of small-scale key seeds.The security of the proposed architecture is analyzed and the experimental results are shown.It is obvious that the abilities of large-scale identity authentication and management are improved while the building cost is reduced evidently with the application of the proposed architecture.It is an applicable solution for real-name authentication network.…”
Get full text
Article -
4617
Research on range matching for wire-speed hardware NIDS
Published 2006-01-01“…To solve the rule matching problem of hardware NIDS,a range matching algorithm LRC-RM was proposed,with more efficient memory utilization.The approach mapped the port range into a compressed bit vector and organized the bit vectors as an extended balanced binary tree.Experiments were employed to show that NIDS using this approach can perform wire-speed range matching for OC-192 links,while saving 99% memory resource comparing to the existing methods.The algorithm is easy to be implemented within a chip without additional RAM.…”
Get full text
Article -
4618
Deadline-Aware Energy-Efficient Query Scheduling in Wireless Sensor Networks with Mobile Sink
Published 2013-01-01“…Thus, the proposed scheduling algorithm aims to minimize the number of missed deadlines while keeping the level of energy consumption at the minimum.…”
Get full text
Article -
4619
Reconstruction of linear block code parity-check matrix based on fault-tolerant Gaussian elimination
Published 2025-04-01“…For the LDPC(648,324) code under the IEEE802.11n protocol, the existing algorithms fail when the bit error rate reaches 0.005 5, while the reconstruction rate of the proposed algorithm for the parity-check matrix still reaches over 98% when the bit error rate is 0.008.…”
Get full text
Article -
4620
Optimal fusion β-quaternion filtering from delayed observations and packet losses with compensation strategy under properness
Published 2025-12-01“…Under first-order properness conditions, a recursive algorithm is developed to compute the optimal filter. …”
Get full text
Article