Showing 321 - 340 results of 13,618 for search 'also algorithm', query time: 0.15s Refine Results
  1. 321

    New SNR estimation algorithm based on relevance vector machine by Bo HAN, Jie WU, Hua XU, Hai-ou SHEN, Peng LI

    Published 2013-04-01
    “…A new SNR estimation algorithm based on relevance vector machine (RVM) was proposed,it can not only be used under the flat fading channel,but also meet the request of larger estimation range and higher estimation accuracy of PSK.The estimation model was created by using RVM,based on the relation between the SNR and the two-order moments and four-order moments,and the reliable weights of the model can be figured out by straining and studying.Simulation results show that this algorithm has lots of advantages,for example,it uses less data and has larger estimation range than general algorithm,in addition,its estimation accuracy becomes higher in the effective estimation rang,and it is applicable to more modulation signals.…”
    Get full text
    Article
  2. 322

    Study on security routing algorithm based on dynamic adjacent trust by Ting HAN, Shou-shan LUO, Yang XIN, Yi-xian YANG, Gong CHENG, Xiao WU

    Published 2013-06-01
    “…By studying the related issues of the router node trust,a dynamic adjacent credibility-trust model which inte-grates factors of state and behavior of the router node was proposed.On the basis of dynamic adjacent credibility-trust model,a security routing algorithm based on dynamic adjacent trust entropy was also proposed,which was validated in the OSPF protocol.The simulation results show that dynamic adjacent credibility-trust model can accurately reflect the state altering and malicious attack of the router node and has better dynamic response ability.In addition,the security routing algorithm can effectively guarantee the behavior and state trust of the router node with highly attack resistant properties.…”
    Get full text
    Article
  3. 323

    Clinical Decision Support Systems for Comorbidity: Architecture, Algorithms, and Applications by Aihua Fan, Di Lin, Yu Tang

    Published 2017-01-01
    “…Specifically, we address the architecture of a CDSS by characterizing it from three layers and discuss the algorithms in each layer. Also we address the applications of CDSSs in a few real scenarios and analyze the accuracy of a CDSS in consideration of the potential conflicts when using multiple clinical practice guidelines concurrently. …”
    Get full text
    Article
  4. 324

    Enhanced zebra optimization algorithm and applications of power allocation in SDWN by LI Jiajia, DONG Ligang, JIANG Xian

    Published 2025-01-01
    “…By introducing exploration factors and perturbation parameters into the zebra optimization algorithm, EZOA enhanced global search and local exploitation capabilities, while also improving the foraging strategy to increase algorithm diversity. …”
    Get full text
    Article
  5. 325

    SDN hypervisor oriented vSDN controller placement algorithm by Xiaodong DONG, Zhiqiang GUO, Sheng CHEN, Xiaobo ZHOU, Heng QI, Keqiu LI

    Published 2017-04-01
    “…With the development of the future internet technology,the future network architecture which utilizes network virtualization as a tool to solve the rigidity of traditional network becomes the main stream.As a new network architecture,software defined networking provides an effective network virtualization solution.Firstly,related technology of network virtualization in SDN was concluded,distinguished differences between deploying virtual network in SDN and traditional network was compared,and aiming at the virtual network mapping problem in SDN virtualization platform,a latency sensitive SDN virtualization controller placement algorithm.At last,experiment results show that the algorithm not only can assure the delay between SDN controllers and switches in an acceptable range,but also improve the utilization efficiency of network resources.…”
    Get full text
    Article
  6. 326

    Information Encryption Algorithm Using a Discrete Quantum Map by A. V. Sidorenko, E. A. Vysotskaya

    Published 2025-07-01
    “…A comparative analysis of the obtained images with the original ones showed the efficiency of the information encryption algorithm using a discrete quantum map. This algorithm can also be used to perform additional operations related to including information inside the encrypted image, which will provide an additional level of protection when transmitting information.…”
    Get full text
    Article
  7. 327

    Graph partition based mapping algorithm on multiprocessors for streaming applications by Qi TANG, Shang-feng WU, Jun-wu SHI, Ji-bo WEI

    Published 2016-06-01
    “…To take advantage of multiprocessor platform,it is a necessity to map tasks of the application properly onto different processors to exploit the concurrency in the application and thus meet the stringent timing requirements.Parallelism graph was proposed to quantify and model the concurrency among tasks of the application.An algorithm was also proposed to construct the parallelism graph based on the self-timed schedule and transform the mapping problem to a graph partitioning problem.The graph partitioning problem as a pure 0-1 integer linear programming model was further formulated and the ILP solver to find the optimal result.A lot of randomly generated synchronous dataflow graphs and a set of practical applications were used to evaluate the performance of the proposed method.The experimental results demonstrate that the proposed method outperforms available algorithms.…”
    Get full text
    Article
  8. 328

    SDN hypervisor oriented vSDN controller placement algorithm by Xiaodong DONG, Zhiqiang GUO, Sheng CHEN, Xiaobo ZHOU, Heng QI, Keqiu LI

    Published 2017-04-01
    “…With the development of the future internet technology,the future network architecture which utilizes network virtualization as a tool to solve the rigidity of traditional network becomes the main stream.As a new network architecture,software defined networking provides an effective network virtualization solution.Firstly,related technology of network virtualization in SDN was concluded,distinguished differences between deploying virtual network in SDN and traditional network was compared,and aiming at the virtual network mapping problem in SDN virtualization platform,a latency sensitive SDN virtualization controller placement algorithm.At last,experiment results show that the algorithm not only can assure the delay between SDN controllers and switches in an acceptable range,but also improve the utilization efficiency of network resources.…”
    Get full text
    Article
  9. 329

    Coordinated beamforming algorithm assisted by receive beamforming vector estimation by Ying HUANG, Gang-ming LV, Shi-hua ZHU

    Published 2014-02-01
    “…In addition, a simplified scheme was also proposed which further reduces the system overhead.…”
    Get full text
    Article
  10. 330

    Laryngeal cancer diagnosis based on improved YOLOv8 algorithm by Xin Nie, Xueyan Zhang, Di Wang, Yuankun Liu, Lumin Xing, Wenjian Liu

    Published 2025-01-01
    “…Laryngeal cancer is the most common malignant tumor in the head and neck region. The larynx, also known as the voice box, plays a crucial role in voice production and ventilation. …”
    Get full text
    Article
  11. 331
  12. 332
  13. 333

    Algorithms for Finding Specific Elements in Algebraic‎ ‎Hyperstructures‎ ‎with‎ ‎One Hyperoperation by Aboutorab Pourhaghani, Seid Mohammad Anvariyeh, Bijan Davvaz

    Published 2025-03-01
    “…These specific elements are‎: ‎scalars‎, ‎scalar identities‎, ‎identities‎, ‎inverses‎, ‎zero elements‎, ‎right simplifiable elements‎, ‎left simplifiable elements‎, ‎left absorbing-like elements and right absorbing-like elements‎. ‎We also introduce some algorithms in algebraic hyperstructures to check properties or calculate specific members‎. ‎…”
    Get full text
    Article
  14. 334
  15. 335

    Existence and algorithm of solutions for generalized nonlinear variational-like inequalities by Zeqing Liu, Juhe Sun, Soo Hak Shim, Shin Min Kang

    Published 2005-01-01
    “…Under suitable conditions, we prove the existence of solutions for the class of generalized nonlinear variational-like inequalities. A new iterative algorithm for finding the approximate solutions of the generalized nonlinear variational-like inequality is given and the convergence of the algorithm is also proved. …”
    Get full text
    Article
  16. 336

    Action of G and Q(√ m) and algorithmic implementation for group actions by F. Afza, I. Shaban Bhatti, M. Aslam Malik

    Published 2012-06-01
    “…This will help us in discovering various G and M-Subsets of Q(√m). We have also generated an algorithm by using Visual Basic for calculating the congruence classes of different Moduli and manipulating the group actions.…”
    Get full text
    Article
  17. 337

    A Microwave Imaging Matrix Algorithm Based on Contrast Source by Meng Wang, Guizhen Lu, Junwen Chen

    Published 2022-01-01
    “…In addition, the limitation of the proposed algorithm when inversing data with noise is also analyzed.…”
    Get full text
    Article
  18. 338

    LRST: searching tree anti-collision algorithm with low-redundancy by Qiong HUANG, Jiang-tao LING, Min ZHANG, Xiao-long YANG

    Published 2014-06-01
    “…To resolve this problem, a searching tree anti-collision algorithm with low-redundancy on the basis of regressive-style dynamic searching tree algorithm was proposed. …”
    Get full text
    Article
  19. 339

    The CORDIC algorithm for high-speed image rotation on FPGA platform by Gao Yujie, Li Wusen, Qi Yunfei, Chen Wenjian

    Published 2024-03-01
    “…The experimental results show that compared with the traditional CORDIC algorithm and the VIVADO CORDIC IP core, the optimization here significantly reduced the iteration times, consumed less resources, and the calculation accuracy also be improved.…”
    Get full text
    Article
  20. 340

    A NEW ROOT–FINDING ALGORITHM USING EXPONENTIAL SERIES by Srinivasarao Thota

    Published 2019-07-01
    “…The implementation of the proposed algorithm in Matlab and Maple also presented. Certain numerical examples are presented to validate the efficiency of the proposed algorithm. …”
    Get full text
    Article