Showing 4,041 - 4,060 results of 12,962 for search 'while algorithm', query time: 0.13s Refine Results
  1. 4041

    An Improved Pose Estimation Method Based on Projection Vector With Noise Error Uncertainty by Jiashan Cui, Changwan Min, Xiangyun Bai, Jiarui Cui

    Published 2019-01-01
    “…Finally, we use global convergence theorem to prove the global convergence of the proposed algorithm. The results show that the proposed method has good robustness and convergence while adapting to different degrees of error uncertainty, which can meet practical engineering applications.…”
    Get full text
    Article
  2. 4042

    Robust sparse smooth principal component analysis for face reconstruction and recognition. by Jing Wang, Xiao Xie, Li Zhang, Jian Li, Hao Cai, Yan Feng

    Published 2025-01-01
    “…Consequently, the proposed RSSPCA algorithm generally outperforms existing algorithms in face reconstruction and recognition. …”
    Get full text
    Article
  3. 4043

    Performance analysis and optimization of cooperative spectrum sensing for maximizing secondary throughput by LI Mei-ling1, YUAN Chao-wei1, LI Lin1, YANG Rui-zhe3

    Published 2011-01-01
    “…The relationship among SU,detection threshold,bandwidth,spectrum utilization and secondary throughput in cognitive radio networks was analyzed,which indicates the lower false alarm probability,higher spectrum utilization and larger secondary throughput with less SU in C-CSS(censoring based cooperative spectrum sensing),besides,the required detection threshold for maximizing the secondary throughput different with the traditional CSS under given SU number and the objective demand.Based on the NP criticism,an optimal cooperative spectrum sensing algorithm for maximizing the secondary throughput was proposed by solving the mathematic model to obtain the optimal party of SU and detection threshold.Theoretical analysis and simulation results show that the maximized secondary throughput achieved by the proposed optimal algorithm,while maintaining the given detection probability.…”
    Get full text
    Article
  4. 4044

    A Quantum Implementation Model for Artificial Neural Networks by Ammar Daskin

    Published 2018-02-01
    “…In quantum computing, the phase estimation algorithm is known to provide speedups over the conventional algorithms for the eigenvalue-related problems. …”
    Get full text
    Article
  5. 4045

    URALP: Unreachable Region Aware Location Privacy against Maximum Movement Boundary Attack by Nha Nguyen, Seungchul Han, Minho Shin

    Published 2015-08-01
    “…In this paper, we present an anonymization algorithm that effectively counters such attacks while achieving k -anonymity requirements as well as minimum acceptable cloaked region size. …”
    Get full text
    Article
  6. 4046

    Crowd abnormal behavior detection based on motion similar entropy by Fei LI, Ken CHEN, Meng LI, Chunmei GUO

    Published 2017-05-01
    “…It is an important research content of graphic processing in the field of intelligent video surveillance to detect abnormal events.An algorithm based on entropy of motion similarity (EMS) to detect abnormal behavior was proposed.Based on the optical flow algorithm,taking the bottom flow block as the basic unit to get the scene motion information,according to the concept of social network model,the construction scene of the motion network model (MNM) was proposed,the division of the scene particles motion similarity was completed,and the distribution EMS of MNM was calculated in the time domain.Finally,the obtained image entropy was compared with the reasonable threshold,to determine whether abnormal behavior occured.Experimental results indicate that the proposed algo-rithm can detect abnormal behavior effectively and show promising performance while comparing with the state of the art methods.…”
    Get full text
    Article
  7. 4047

    DiffPRFs:random forest under differential privacy by Hai-rong MU, Li-ping DING, Yu-ning SONG, Guo-qing LU

    Published 2016-09-01
    “…A differential privacy algorithm DiffPRFs based on random forests was proposed.Exponential mechanism was used to select split point and split attribute in each decision tree building process,and noise was added according to Laplace mechanism.Differential privacy protection requirement was satisfied through overall process.Compared to existed algorithms,the proposed method does not require pre-discretization of continuous attributes which significantly reduces the performance cost of preprocessing in large multi-dimensional dataset.Classification is achieved conveniently and efficiently while maintains the high accuracy.Experimental results demonstrate the effectiveness and superiority of the algorithm compared to other classification algorithms.…”
    Get full text
    Article
  8. 4048

    Call Admission Control Based on Resource Sharing in LTE-Advanced Relay System by Jihong Zhao, Haifang Han, Hua Qu

    Published 2014-02-01
    “…A call admission control based on resource sharing in LTE-Advanced relay system was proposed.If the shared resources of the target site for new users and handover users are used up,handover users can use the reserved r esources of the target site for handover users to access system,while new users can access system by resource sharing between the sites in the cell which the target site inside.Simulation results show that compared the proposed algorithm with LTE-Advanced system on fixed bandwidth reservation scheme and LTE-Advanced relay system on fixed bandwidth reservation scheme,the proposed algorithm can effectively reduce the blocking probability of new users and dropping probability of handover users in the cell,and can improve the system resource utilization.…”
    Get full text
    Article
  9. 4049

    Design of key technologies for intranet dynamic gateway based on DPDK by Fucai CHEN, Weizhen HE, Guozhen CHENG, Shumin HUO, Dacheng ZHOU

    Published 2020-06-01
    “…Aiming at the problems of high packet processing delay and high overhead caused by IP hopping,active defense gateway system with multi-layer network deployment structure was designed and implemented based on the data plane development kit (DPDK).Firstly,based on the DPDK fast forwarding framework,forwarding and processing performance of the system were optimized.Secondly,for the dynamic random mapping gateway with three different types of IP addresses,an efficient IP address allocation algorithm and an unpredictable IP address conversion algorithm were designed.The experimental results show that the designed system can effectively reduce the rate of information acquisition of sniffing attack,while greatly improving the processing delay caused by dynamic hopping.…”
    Get full text
    Article
  10. 4050

    Simulations of the sterile neutrino oscillations with a crossing-width term by Qiankang Wang, DaYun Qiu, Yi-Lei Tang

    Published 2025-05-01
    “…We prove the validity of our algorithm, and adopt some tricks for practical calculations. …”
    Get full text
    Article
  11. 4051

    GENERATING OF OPTIMAL QUANTIZATION LEVELS OF CONTROL CURRENTS FOR LINEAR STEPPING DRIVES OF PRECISION MOTION SYSTEMS by I. V. Dainiak, V. P. Oger, D. S. Tsitko, D. G. Begun

    Published 2014-06-01
    “…The paper proposes a method of taking into account accumulated and temperature errors while forming coordinate discrete grid of a linear stepping drive. …”
    Get full text
    Article
  12. 4052

    HITS: Hyperplanes intersection tabu search for maximum score estimation by Kostas Florios, Alexandros Louka, Yannis Bilias

    Published 2025-05-01
    “…This is a deterministic algorithm rather than a stochastic one. The tabu search is much faster than the Simulated Annealing, while providing solutions of about the same quality. …”
    Get full text
    Article
  13. 4053

    Tau identification in CMS during LHC run 2 by Mohammad Hassan Hassanshahi

    Published 2025-07-01
    “…Low transverse momentum topologies were addressed separately with a dedicated identification algorithm, while machine learning techniques were implemented to improve the identification of the tau hadronic decay channels. …”
    Get full text
    Article
  14. 4054

    A method for estimating the certified value uncertainty of a multicomponent reference material by P. V. Migal, S. V. Medvedevskikh, V. A. Firsanov

    Published 2019-07-01
    “…The results calculated according to the preparation procedure using the proposed algorithm were confirmed by the Monte Carlo method, while the elemental content in the mixture was confirmed via inductively coupled plasma optical emission spectroscopy. …”
    Get full text
    Article
  15. 4055

    Coordinated beamforming for cognitive multi-cell networks with wiretap channels by Dong-hua CHEN, Xiu-xiu ZHANG, Wei-bo XIE

    Published 2014-11-01
    “…Owing to the coupling among the vectors to be optimized,the problem becomes non-convex and non-linear.Accordingly,a centralized coordinated beamforming design method was proposed by constraining the leakage interference and using the semi-definite relaxation,and on the base of it,a decentralized algorithm was also proposed by decomposing the centralized design problem into a group of sub-problems on each cell’s base by using dual decomposition.Simulation results show that the proposed schemes make effective reduction in power consumption while guarantee the legal users’ secrecy rate requirement and the cognitive interference constraint.Moreover,the proposed decentralized method not only reduces the computational complexity,but also has the same performance as the centralized algorithm.…”
    Get full text
    Article
  16. 4056

    Analysis of Two-Grid Characteristic Finite Element Methods for Convection-Diffusion Equations by Keyan Wang, Boxia Hu

    Published 2023-01-01
    “…In this paper, two efficient two-grid algorithms for the convection-diffusion problem with a modified characteristic finite element method are studied. …”
    Get full text
    Article
  17. 4057
  18. 4058
  19. 4059

    Research on Lightweighting Methods for 3D Building Models Based on Semantic Constraints by J. Wu, T. Shen, L. Huo

    Published 2025-08-01
    “…In the transition from LOD2 to LOD1, a concave-convex face movement and merging algorithm is utilized to reduce redundant data while maintaining geometric similarity and optimizing the model's topological structure, ultimately producing a lightweight LOD1 model. …”
    Get full text
    Article
  20. 4060

    Research on the Stability of UAV Attitude Under Hybrid Control Integrating Active Disturbance Rejection Control and Super-Twisting Sliding Mode Control by Baoju Wu, Yunqian Guo, Jiaxiang Zheng, Zhongsheng Li, Jinyu Gong, Nanmu Hui, Xiaowei Han

    Published 2025-05-01
    “…Under random airflow disturbances, the designed fusion algorithm leverages the dynamic compensation characteristics of ADRC to stabilize external perturbations, while the robustness of ST-SMC suppresses the effects of system nonlinearities and uncertainties on control accuracy. …”
    Get full text
    Article