-
561
Power control for successive interference cancellation algorithm based on game theory
Published 2015-09-01“…It was proved that implementation of successive interference cancellation could improve network throughput in wireless networks,while in order to maximize network throughput,it was a NP-Hard problem that how to control transmission power when successive interference cancellation was used in wireless networks.A non-cooperative game theory is proposed to solve power control between wireless nodes for successive interference cancellation,in which non-cooperative game theory model is proposed and Nash equilibrium is analyzed,and also the proposed algorithm can ob-tain good network throughput than others,simulations validate the results and demonstrate the superiority of the algorithm.…”
Get full text
Article -
562
FDR coding and decoding algorithm for reliable transmission in underwater acoustic network
Published 2020-04-01“…By analyzing the shortcomings of RLT coding and decoding algorithm,a filtering dimension reduction (FDR) algorithm was proposed,which eliminated the waiting time of the traditional decoding algorithm and achieves fast decoding.In addition,XOR operation between encoded packages effectively increased the number of one-degree encoded packages,and improved decoding probability while reducing transmission delay.An optimized degree distribution function for FDR decoding algorithm was proposed,which increased the proportion of two-degree,three-degree and four-degree encoded packages,further increased the probability of one-degree packet,so that speeded up the decoding progress.Simulation results with NS3 show that the decoding success probability of FDR algorithms higher than RLT algorithm.…”
Get full text
Article -
563
A Novel Resource Allocation Algorithm for OFDMA System with Proportional Fairness
Published 2014-06-01“…Existing algorithms couldn't balance system capacity and high fairness well,so a multi-user rate adaptive allocation algorithm was proposed to maximize the capacity of OFDMA system under proportional fairness.Improved maximize the minimum(max-min)user rate model was proposed,the current user was allocated the highest efficiency subcarrier according to the channel efficiency control parameter.If some allocated subcarrier's channel gain was lower than the threshold value,which would be reallocated to another user whose channel gain was highest.Power allocation model was converted into expression of water-filling line; every user's power allocation was resolved according to the resolved water-filling line.Simulation results and analysis show that the proposed scheme can achieve higher capacity and perfect fairness in a variety of SNR cases,while requiring slightly less computation.…”
Get full text
Article -
564
Research on performance optimizations for TCM-KNN network anomaly detection algorithm
Published 2009-01-01“…Based on TCM-KNN(transductive confidence machine for K-nearest neighbors) algorithm,the filter-based feature selection and cluster-based instance selection methods were used towards optimizing it as a lightweight network anomaly detection scheme,which not only reduced its complex feature space,but also acquired high quality instances for training.A series of experimental results demonstrate the two methods for optimizations are actually effective in greatly reducing the computational costs while ensuring high detection performances for TCM-KNN algorithm.Therefore,the two methods make TCM-KNN be a good scheme for a lightweight network anomaly detection in practice.…”
Get full text
Article -
565
Multi-scale Logo detection algorithm based on convolutional neural network
Published 2020-04-01“…Aiming at the requirements for multi-scale Logo detection in natural scene images,a multi-scale Logo detection algorithm based on convolutional neural network was proposed.The algorithm was based on the realization of two-stage object detection.By constructing feature pyramids and adopting layer-by-layer prediction,multi-scale region proposals were generated.The multi-layer feature maps in convolutional neural networks were fused to enhance the feature representation.The experimental results on the FlickrLogos-32 dataset show that compared with the baseline,the proposed algorithm can improve the recall rate of region proposals,and can improve the performance of small Logo detection while ensuring the accuracy of large and middle Logo,proving the superiority of the proposed algorithm.…”
Get full text
Article -
566
Beamforming algorithm for cognitive satellite and terrestrial network based on UAV relay
Published 2021-08-01“…Two beamforming (BF) schemes to achieve spectrum sharing by suppressing inter-system interferences in cognitive satellite and terrestrial networks were proposed, where the satellite and UAV cooperative network was used as the secondary network, while the terrestrial network was used as the primary network.Specifically, considering that only the statistical channel state information was available, a constrained optimization problem was formulated to maximize the signal-to- interference-plus-noise ratio of the secondary user under the constraints of the maximum transmit power at the UAV and the interference power of the primary user.Then, an iteration-based BF scheme was proposed to solve the constrained optimization problem.To reduce the computational complexity of the iterative algorithm, a zero-forcing based BF scheme was further proposed.Finally, computer simulations verify the correctness and effectiveness of the proposed BF schemes.…”
Get full text
Article -
567
Dynamic FastMap: An Efficient Algorithm for Spatiotemporal Embedding of Dynamic Graphs
Published 2023-05-01“…FastMap is a near-linear-time graph embedding algorithm that has already found many real-world applications. …”
Get full text
Article -
568
ON CONSTRUCTION OF A RELIABLE GROUND TRUTH FOR EVALUATION OF VISUAL SLAM ALGORITHMS
Published 2016-11-01“…Such a ground truth is usually hard to obtain, while it requires an expensive external localization system. …”
Get full text
Article -
569
An Improved Algorithm of Wireless Sensor Networks Routing Protocol Based on LEACH
Published 2013-04-01“…One of the most popular research focuses of wireless sensor network is postponing the life cycle of sensor network as well as reducing energy consumption.An efficient clustering routing algorithm based on LEACH(low energy adaptive clustering hierarch)was presented,which is the representative of hierarchy based protocol in wireless sensor network.The residual energy,average energy and maximum energy are considered in this algorithm while electing the cluster header.It can also limit the number of members of each cluster.At the same time,it can produce the first cluster header among the cluster heads which will use the multi-hop mode to balance the load of network.The simulation results show that this improved algorithm can reduce the energy consumption,extend the network life cycle and ensure the load balance of the system.…”
Get full text
Article -
570
Video inter-frame tampering detection algorithm fusing multiple features
Published 2020-02-01“…Traditional passive forensics of video inter-frame tampering often relies on single feature.Each of these features is usually suitable for certain types of videos,while has low detection accuracy for other videos.To combine the advantages of these features,a video inter-frame tampering detection algorithm that could fuse multi-features was proposed.The algorithm firstly classified the input video into one group based on its space information and time information values.Then it calculated the VQA features that represented the video inter-frame continuity.These features were sorted by the SVM-RFE feature recursive elimination algorithm.Finally,the sorted features were filtered and fused by the sequential forward selection algorithm and Adaboost binary classifier.Experimental results show that the proposed algorithm could achieve higher tampering detection accuracy.…”
Get full text
Article -
571
Case Study of Genetic Algorithms in Metrology: Assessment of Inter-laboratory Comparisons
Published 2025-01-01“…The Genetic Algorithm (GA), a novel optimization-based approach, demonstrates exceptional resilience to outliers. …”
Get full text
Article -
572
Resource optimization algorithm of combination of NFV and SDN for application of multiple services
Published 2018-11-01“…Various services of internet of things (IoT) require flexible network deployment to guarantee different quality of service (QoS).Aiming at the problem of IoT service function chain deployment,network function virtualization (NFV) and software defined networking (SDN) were combined to optimize resources.Considering forwarding cost and traffic load balance,a joint optimization model of virtual network function placement and service function chain routing was given and was proved to be NP-Hard.In order to solve this model,two heuristic algorithms were proposed.One was the service chain deployment algorithm of first routing then placing (FRTP) and the other was the placing followed by routing (PFBR) based on node priority.Simulation results demonstrate that FRTP and PFBR algorithm can significantly balance network traffic load while alleviating congestion and improving the acceptance ratio of the chain requests compared with other algorithms.…”
Get full text
Article -
573
MIMO System Reduction Using Modified Pole Clustering and Genetic Algorithm
Published 2009-01-01“…In this method, the common denominator polynomial of the reduced-order transfer function matrix is synthesized by using modified pole clustering while the coefficients of the numerator elements are computed by minimizing the integral square error between the time responses of the original and reduced system element using Genetic Algorithm. …”
Get full text
Article -
574
A Novel Resource Allocation Algorithm for OFDMA System with Proportional Fairness
Published 2014-06-01“…Existing algorithms couldn't balance system capacity and high fairness well,so a multi-user rate adaptive allocation algorithm was proposed to maximize the capacity of OFDMA system under proportional fairness.Improved maximize the minimum(max-min)user rate model was proposed,the current user was allocated the highest efficiency subcarrier according to the channel efficiency control parameter.If some allocated subcarrier's channel gain was lower than the threshold value,which would be reallocated to another user whose channel gain was highest.Power allocation model was converted into expression of water-filling line; every user's power allocation was resolved according to the resolved water-filling line.Simulation results and analysis show that the proposed scheme can achieve higher capacity and perfect fairness in a variety of SNR cases,while requiring slightly less computation.…”
Get full text
Article -
575
Algorithm based on randomly assigning filters to reduce PAPR in GFDM system
Published 2016-09-01“…As an alternative of the fifth generation mobile communication system waveforms,generalized frequency division multiplexing(GFDM)which has more advantages over OFDM has been trusted into the limelight.Nevertheless,GFDM still suffers from a high peak to average power ratio(PAPR).Considering that different filters have their own phase-frequency characteristics,a new algorithm based on randomly assigning filters to reduce PAPR in GFDM(RAF-GFDM)was proposed.According to the feature of GFDM system that the filter structure could be selected flexibly,different filters were assigned to subcarriers randomly to adjust the phase congruency due to signals superimposition.Additionally,this method can suppress PAPR effectively without causing signal distortion.Theoretical analysis and simulation results demonstrate that the proposed algorithm does not bring additional calculation costs while reducing PAPR and almost has no effect on the bit error rate(BER),and it may provide a higher application value.…”
Get full text
Article -
576
Algorithm of grey correlation analysis for radar target recognition based on similarity
Published 2017-05-01“…According to the algorithm can't better identify complex radar targets and improve the accuracy while facing parameters overlapping,an algorithm of similarity-grey relational analysis based on similarity was proposed.Firstly,the similarity matrix between the parameters was extracted by the algorithm.And then the grey correlation analysis was used to get the corresponding grey correlation coefficient.At the same time,the weight value was determined according to the matching degree of each parameter,the grey correlation degree of the signal was identified and the library signal was obtained by combining with the grey correlation coefficient,and the target recognition was completed according to the grey correlation degree.Finally,having the grey correlation between the signal and the grey correlation coefficient,which can realize the identification of the complex radar target.The simulation results show that the impact of parame-ters overlapping with high recognition accuracy was reduced,the recognition accuracy was improved,and the identifica-tion of complex system radar targets were quickly realized by the proposed algorithm.…”
Get full text
Article -
577
Scalable PBFT-like algorithm for trust management of degree/graduation certificates
Published 2024-09-01“…Analysis and simulation experiments demonstrate that the proposed algorithm ensures security while achieving higher throughput and scalability in large-scale applications of degree/graduation certificate trust management.…”
Get full text
Article -
578
Model for virtual corporations partner selection based on adaptive genetic algorithm
Published 2009-01-01“…To enhance the efficiency of corporation partner selection and optimization process in virtual corporations, an partner selection process and optimizations model for virtual corporations based on adaptive genetic algorithm were pre-sented. In the model, the adaptive genetic algorithm was used to enhance the efficiency of corporation partner selection and optimization process. …”
Get full text
Article -
579
Neural network and Markov based combination prediction algorithm of video popularity
Published 2021-08-01“…Caching popular video into user-side in advance improves the user experience and reduces operator costs, which is a common practice in the industry.How to effectively predict the popularity of videos has become a hot issue in the industry.On account of the shortcomings of traditional prediction algorithms such as poor nonlinear mapping ability, low prediction accuracy and weak adaptability, a video popularity prediction algorithm based on a neural network and Markov combined model (Mar-BiLSTM) was proposed.Information dependencies were preserved by constructing bidirectional memory network model (bi-directional long short-term memory, BiLSTM), the prediction accuracy of the model was further improved by using Markov properties while avoiding the increase of the complexity of the model caused by the introduction of external variables.Experimental results show that compared with traditional time series and classic neural network algorithms, the proposed algorithm improves predicting accuracy, effectiveness and reduces the amount of calculation.…”
Get full text
Article -
580
An encryption by using DNA algorithm for hiding a compressed message in Image
Published 2022-02-01“… Cryptography is a main item to generate confidence and empower services in the digital technology, while Steganography has vastly expanded in digital medias. …”
Get full text
Article