Showing 3,861 - 3,880 results of 13,618 for search 'also algorithm', query time: 0.13s Refine Results
  1. 3861

    ACCURACY ANALYSIS OF UAV COORDINATES USING EGNOS AND SDCM AUGMENTATION SYSTEMS by Kamil KRASUSKI, Damian WIERZBICKI, Małgorzata KIRSCHENSTEIN, Marta ŻUKOWSKA, Paweł GOŁDA

    Published 2024-06-01
    “…The study also presents the effectiveness of the proposed algorithm in terms of calculating the accuracy of EGNOS+SDCM positioning for the weighted average model. …”
    Get full text
    Article
  2. 3862

    Exploring Monte Carlo Negotiation Search with Nontrivial Agreements by Elijah Alden Malaby, John Licato

    Published 2021-04-01
    “…We also present the results of a preliminary experiment in which we use our algorithm to search for an optimal agreement for the iterated prisoners dilemma. …”
    Get full text
    Article
  3. 3863

    A New Guess-and-Determine Method for Cryptanalysis of the GSM Encryption by Ashish Jain, Inderjeet Kaur, Akhilesh Kumar Sharma, Nirmal Kumar Gupta, Partha Chakraborty

    Published 2023-01-01
    “…A5/1 is a well-known encryption algorithm which is inbuilt in mobile phone for securing GSM communication, and therefore, cryptanalysis of this algorithm is also important. …”
    Get full text
    Article
  4. 3864

    Strong -Barrier Coverage for One-Way Intruders Detection in Wireless Sensor Networks by Junhai Luo, Shihua Zou

    Published 2016-06-01
    “…Since k -barrier coverage is widely used in detecting intruders, a barrier construction algorithm is needed, which can not only detect an intruder but also judge an illegal intruder. …”
    Get full text
    Article
  5. 3865

    Design of English Intelligent Simulated Paper Marking System by Lina Yang, Wei Liu

    Published 2021-01-01
    “…This paper proposes a correlation analysis-based quantification of N-element sense values and a rationality enhancement-based scoring fitting algorithm for English essays. This paper also extracts word features, sentence features, and chapter structure features in essays to fit English composition scores. …”
    Get full text
    Article
  6. 3866

    Design of Active Boundary Control to Suppress Vibrations in String by Soo-Min Kim, Moon K. Kwak

    Published 2025-06-01
    “…And the stability of the proposed algorithm was verified theoretically using this model. …”
    Get full text
    Article
  7. 3867

    Optimization of Intelligent English Pronunciation Training System Based on Android Platform by Qianyu Cao, Hanmei Hao

    Published 2021-01-01
    “…Oral English, as a language tool, is not only an important part of English learning but also an essential part. For nonnative English learners, effective and meaningful voice feedback is very important. …”
    Get full text
    Article
  8. 3868

    Blockchain-based high transparent PKI authentication protocol by Liquan CHEN, Xiao LI, Zheyi YANG, Sijie QIAN

    Published 2022-08-01
    “…The public key infrastructure (PKI), as an significant component of the current Internet security infrastructure, guarantees the information transmission with the necessary authenticity, integrity, confidentiality and non-repudiation.However, the existing PKI also has shortcomings of excessive power of certification authority and difficulties in revoking and querying.Blockchain can be used to solve those problems by leveraging its advantages, such as decentralization, high transparency and flat structure.Furthermore, the ability and efficiency of the entire Internet to establish trust relationships may be improved.The transparent public key infrastructure (PKI) certification protocol based on the blockchain was proposed.The TS-PBFT algorithm was designed in the proposed protocol by adopting the threshold signature technology to the Practical Byzantine fault tolerance (PBFT) algorithm.The TS-PBFT algorithm reduced the communication overhead via reducing the communication complexity, strengthened the supervision via introducing external monitoring mechanism in the master node election of the view change protocol, and also improved the performance of the consensus mechanism via adding a batch processing mechanism.Moreover, a transparent blockchain-based PKI certification protocol was designed.The proposed protocol increased the security of certificate revocation and query, it also improved the efficiency of the certificate query by the introduction of counting bloom filters.Besides, the proposed protocol added audit function into the certificate lifecycle management.Accordingly, it can supervise the behavior of the certificate authority (CA), prompt it to improve security standards, and then achieve the purpose of limiting its authority.According to the security analysis and efficiency experiments, the proposed protocol was equipped with security properties, such as the resistance to spoofing certificate application attacks, and it achieved the best performance on TLS/SSL handshake time compared with existing PKI protocols.…”
    Get full text
    Article
  9. 3869

    A Water Body Boundary Search Method Combining Chemotaxis Mechanism and High-Resolution Grid Based on Unmanned Surface Vehicles by Jiao Deng, Yang Long, Jiming Zhang, Hang Gao, Song Liu

    Published 2025-05-01
    “…These findings suggest that the CST algorithm not only enhances the accuracy and efficiency of water body boundary measurement but also offers a cost-effective and practical solution for measuring water body areas.…”
    Get full text
    Article
  10. 3870

    Game-Theoretic Cooperative Task Allocation for Multiple-Mobile-Robot Systems by Lixiang Liu, Peng Li

    Published 2025-04-01
    “…Another six algorithms are used for comparative studies. When the problem scale is small, the proposed algorithm can achieve solution quality comparable to that of the benchmark algorithms. …”
    Get full text
    Article
  11. 3871

    Cooperative Group Localization Based on Factor Graph for Next-Generation Networks by Xuefei Zhang, Qimei Cui, Yulong Shi, Xiaofeng Tao

    Published 2012-10-01
    “…Theoretical analysis and numerical results indicate that the proposed algorithms not only perform better in relaxing CGL topology requirement, but also enjoy high localization accuracy under low complexity in comparison with the existing CGL algorithm.…”
    Get full text
    Article
  12. 3872

    Controlling Initial and Final Radii to Achieve a Low-Complexity Sphere Decoding Technique in MIMO Channels by Fatemeh Eshagh Hosseini, Shahriar Shirvani Moghaddam

    Published 2012-01-01
    “…To achieve this goal, this paper provides some useful insights into the effect of initial and the final sphere radii and estimating them effortlessly. It also discusses practical ways of initiating the algorithm properly and terminating it before the normal end of the process as well as the cost of these methods. …”
    Get full text
    Article
  13. 3873

    Stability and Convergence Analysis for Set-Valued Extended Generalized Nonlinear Mixed Variational Inequality Problems and Generalized Resolvent Dynamical Systems by Iqbal Ahmad, Zahoor Ahmad Rather, Rais Ahmad, Ching-Feng Wen

    Published 2021-01-01
    “…For illustration, a comparison of our three-step iterative algorithm with Ishikawa-type algorithm and Mann-type algorithm is shown.…”
    Get full text
    Article
  14. 3874

    Research on selective trust-path search and aggregation in distributed environment by Yan-lin QIN, Xiao-ping WU, Jian-xin GAO

    Published 2012-09-01
    “…Current trust models based on reputation had some disadvantages in characterizing recommendation credibility and dealing with Trust-Path Search and aggregation.To solve these problems,an updating algorithm for recommendation credibility was proposed considering factors of time decay,recommendation inosculation and success transaction rate.Furthermore,a selective search-algorithm for trust-path in distributed environment was presented.The algorithm uses recommendation credibility,evaluation similarity and trust-path length as its control parameters and can evade malicious nodes directly in the process of searching.It can also stop the search for unnecessary trust-paths and execute the search for paths containing valuable recommendation.Lastly,trust aggregation method was given by using an advanced combining algorithm in D-S theory of evidence.Simulation results show that compared with existing trust models,the proposed model is more robust on defending attacks of various malicious nodes.…”
    Get full text
    Article
  15. 3875

    Joint blinding estimation of the spread-spectrum sequence and information sequence for short-code DS-SS signal by Xiao-tian REN, Hui XU, Zhi-tao HUANG, Feng-hua WANG

    Published 2012-04-01
    “…The problem of joint blinding estimation of the spread-spectrum sequence and information sequence of DS-SS signals was studied.First,the received signal is divided into double-symbol-period-length temporal vectors,with one-symbol-period overlapping,accumulates of these vectors one by one to form the signal matrix.Then,an operation of singular value decomposition (SVD) may be applied to the matrix to estimate the spread-spectrum and information sequence jointly.The algorithm makes use of a single vector space to estimate the spread-spectrum sequence and information sequence blindly,without known the desynchronization time,even in low SNR.The algorithm is not only unaffected by the type of spreading spectrum sequence,but also avoids to solving the problem of the phase ambiguity when use two vectors to reconstruct spread-spectrum sequence,which based on EVD blinding estimate algorithm.So it heightens the validity of blinding estimation.At last,simulation results demonstrate the validity of the algorithm.…”
    Get full text
    Article
  16. 3876

    Finding the optimal probe state for multiparameter quantum metrology using conic programming by Masahito Hayashi, Yingkai Ouyang

    Published 2024-11-01
    “…Our algorithm outputs a probe state that is a simple function of the optimal variable. …”
    Get full text
    Article
  17. 3877

    SECOND ORDER BLIND IDENTIFICATION OF SINGLE-CHANNEL SIGNAL BASED ON KERNELS by 刘邦, 肖涵, 易灿灿

    Published 2018-01-01
    “…Then the K-SVD source number estimation algorithm was used to estimate the number of sources. …”
    Get full text
    Article
  18. 3878

    Indoor Wi-Fi fingerprint localization method based on CSI tensor decomposition by Mu ZHOU, Yuexin LONG, Qiaolin PU, Yong WANG, Wei HE

    Published 2021-11-01
    “…Aiming at the problem that as the scale of the fingerprint database increases, the training cost and processing complexity of CSI fingerprints will also greatly increase, an indoor Wi-Fi fingerprint localization method based on CSI tensor decomposition was proposed.Firstly, the tensor decomposition algorithm based on the PARAFAC (parallel factor) analysis model and the ALS (alternate least squares) iterative algorithm were combined to reduce the interference of the environment.Then, the tensor wavelet decomposition algorithm was used to extract the feature and obtain the CSI fingerprint.Finally, a localization model was established based on the PLSR (partial least squares regression) algorithm to realize the location estimation.Experimental results show that the confidence probability of the proposed method is 94.88% within 4 m localization error, which verifies that the proposed method has good localization performance while fitting the relationship between CSI location fingerprints and location coordinates.…”
    Get full text
    Article
  19. 3879

    Supervised Machine Learning for Classification of the Electrophysiological Effects of Chronotropic Drugs on Human Induced Pluripotent Stem Cell-Derived Cardiomyocytes. by Christopher Heylman, Rupsa Datta, Agua Sobrino, Steven George, Enrico Gratton

    Published 2015-01-01
    “…Probabilities and confidence in the accuracy of each classification may also be determined by the algorithm. In this study, the electrophysiological effects of β-adrenergic drugs, propranolol and isoproterenol, on cardiomyocytes derived from human induced pluripotent stem cells (hiPS-CM) were assessed. …”
    Get full text
    Article
  20. 3880

    Normalized Robust FOPID Controller Regulation Based on Small Gain Theorem by Shuo Zhang, Lu Liu

    Published 2018-01-01
    “…In this paper, a normalized robust FOPID controller regulation algorithm is proposed. Only one parameter k is necessary to be tuned in the controller regulation process, so the proposed control algorithm is convenient to be applied on both fractional-order systems and integer-order systems. …”
    Get full text
    Article