-
12261
Advanced Techniques and Antenna Design for Pulse Shaping in UWB Cognitive Radio
Published 2012-01-01“…The Parks-McClellan algorithm is employed, a neural network is trained, and a reconfigurable band stop filter is designed to generate an adaptive waveform with nulls at specific frequencies. …”
Get full text
Article -
12262
Least-Norm of the General Solution to Some System of Quaternion Matrix Equations and Its Determinantal Representations
Published 2019-01-01“…Finally, we give determinantal representations (analogs of Cramer’s rule) of the least norm solution to the system using row-column noncommutative determinants. An algorithm and numerical examples are given to elaborate our results.…”
Get full text
Article -
12263
Flight Path Reconstruction and Parameter Estimation Using Output-Error Method
Published 2006-01-01“…This work describes the application of the output-error method using the Levenberg-Marquardt optimization algorithm to the Flight Path Reconstruction (FPR) problem, which constitutes an important preliminary step towards the aircraft parameter identification. …”
Get full text
Article -
12264
LDPC-coded unitary space-time modulation with low-complexity iterative demodulate-decoding scheme
Published 2014-02-01“…At the receiver, the maximum a posteriori probability (MAP) de-modulating algorithm of the SC-USTM was first designed; for reducing the complexity of MAP demodulator, the dual demodulator was then conceived; for improving the performance, the iterative feedback between the belief propagation (BP) decoder and the MPA demodulator was finally introduced. …”
Get full text
Article -
12265
MM-LoRa-Mod: A non-coherent LoRa modulation scheme for underwater acoustic communications
Published 2024-09-01“…Additionally, for underwater acoustic communication scenarios, a low-complexity non-coherent detection algorithm for MM-LoRa-Mod was introduced. Through the evaluation of MM-LoRa-Mod’s bit error rate performance in multipath channels, Watermark underwater acoustic channels, and shallow water acoustic channels, excellent anti-multipath fading and anti-Doppler frequency shift capabilities were demonstrated, indicating the high reliability of MM-LoRa-Mod in underwater acoustic communication scenarios.…”
Get full text
Article -
12266
Passive forensic based on spatio-temporal localization of video object removal tampering
Published 2020-07-01“…To address the problem of identification of authenticity and integrity of video content and the location of video tampering area,a deep learning detection algorithm based on video noise flow was proposed.Firstly,based on SRM (spatial rich model) and C3D (3D convolution) neural network,a feature extractor,a frame discriminator and a RPN (region proposal network) based spatial locator were constructed.Secondly,the feature extractor was combined with the frame discriminator and the spatial locator respectively,and then two neural networks were built.Finally,two kinds of deep learning models were trained by the enhanced data,which were used to locate the tampered area in temporal domain and spatial domain respectively.The test results show that the accuracy of temporal-domain location is increased to 98.5%,and the average intersection over union of spatial localization and tamper area labeling is 49%,which can effectively locate the tamper area in temporal domain and spatial domain.…”
Get full text
Article -
12267
Coupled Hydrologic-Mechanical-Damage Analysis and Its Application to Diversion Tunnels of Hydropower Station
Published 2021-01-01“…An inverse analysis program is compiled based on the differential evolution algorithm, and the surrounding rock damage parameters are inverted. …”
Get full text
Article -
12268
Control of Temperature and Aluminum Fluoride Concentration Based on Model Prediction in Aluminum Electrolysis
Published 2014-01-01“…This paper developed a new kind of algorithm to control the temperature and AlF3 concentration of electrolyte for 300 kA prebake aluminum production cells by altering the setting cell voltage and the AlF3 adding rate. …”
Get full text
Article -
12269
SDFMUCR: Software-defined and fuzzy-based multi-hop unequal cluster routing
Published 2020-10-01“…Researchers give more and more attention to the design of the routing algorithm. Cluster routing is the most popular routing protocol in wireless sensor networks. …”
Get full text
Article -
12270
FAULT DIAGNOSIS OF GEARBOX BASED ON ADAPTIVE EEMD AND FAST KURTOGRAM
Published 2022-01-01“…To solve the problem that the amplitude of the added white noise and the number of ensemble trials to the ensemble empirical mode decomposition algorithm depend too much on subjective experience or multiple attempts, which is more subjective and blind, a fault diagnosis method based on adaptive EEMD and Fast Kurtogram is proposed. …”
Get full text
Article -
12271
NEW NUMBER NUSSELT CORRELATION FOR THE ANNULAR SPACE OF THE TUBE IN TUBE HEAT EXCHANGER
Published 2024-11-01“…This paper presents the algorithm for establishing a new Nusselt number correlation for the annular space of a tube-in-tube heat exchanger with warm water flowing inside in counterflow with cold water in the annular space. …”
Get full text
Article -
12272
Exponential Fields Formulation for WMR Navigation
Published 2012-01-01“…In this manuscript, an autonomous navigation algorithm for wheeled mobile robots (WMR) operating in dynamic environments (indoors or structured outdoors) is formulated. …”
Get full text
Article -
12273
Topology aggregation model based on focus folding for network simulation
Published 2012-07-01“…High resource consumption is the main problem of large-scale network simulation,to solve this problem,the topology aggregation model based on focus folding for network simulation was put forward.According to the abstract coefficients,the terminal node abstract,tree shrinking,and cut-edge abstract algorithm was adopt to abstract the topology.The test results show that,this technology can reduce the router node about 30 percent,the link between routers about 13.74 percent,total node about 98.48 percent,and total link about 96.1 percent.Simulating DDoS on the topology with 2.5 million nodes only need 400s time and 2 710MB memory.Take Shandong topology as an example to simulate DDoS,after abstracted,simulation memory and time have been reduced about 75.34 percent and 91.76 percent respectively.Take Beijing topology as an example to simulate worm,after abstracted,simulation memory and time have been reduced about 68.84 percent and 38.64 percent respectively,which prove that this mode can improve the simulation scale and efficiency and decrease the resource consumption and running time of simulation.…”
Get full text
Article -
12274
MapFuse: Complete and Realistic 3D Modelling
Published 2018-01-01“…The system combines the result of a SLAM algorithm and secondly a simple initial model of the same environment in a probabilistic way. …”
Get full text
Article -
12275
Optimal Solutions for Constrained Bimatrix Games with Payoffs Represented by Single-Valued Trapezoidal Neutrosophic Numbers
Published 2021-01-01“…Moreover, an application example is examined to verify the effectiveness and superiority of the developed algorithm. Finally, a comparison analysis between the proposed and the existing approaches is conducted to expose the advantages of our work.…”
Get full text
Article -
12276
Research on Taxi Pricing Model and Optimization for Carpooling Detour Problem
Published 2019-01-01“…This paper builds a multiobjective optimization model for solving the taxi carpooling with detour problem and designs a genetic algorithm to determine a fair pricing scheme for riders and drivers. …”
Get full text
Article -
12277
Sliding Mode Output Feedback Control of a Flexible Rotor Supported by Magnetic Bearings
Published 2001-01-01“…A new sliding mode feedback algorithm is applied to control the vibration of a flexible rotor supported by magnetic bearings. …”
Get full text
Article -
12278
Presenting a one-objective optimization model to determine the reliability of the components of a coherent system
Published 2023-11-01“…Purpose: In this paper, the amount required to increase the reliability of the components of a coherent system is determined so that the cost of this increase is minimized and the reliability of the whole system is not less than the predetermined value.Methodology: In this research, after introducing the objective and constraint functions in the optimization problem, the Lagrange method is used and then the problem is solved by presenting an algorithm. In this article, several cost functions are considered, and then the results are presented in the general case for a coherent system and then for two special cases, series-parallel and parallel-series systems.Findings: In this article, two numerical examples are presented and solved. …”
Get full text
Article -
12279
Computationally Effective Modeling of Cold Rolling: Application to Al Alloys
Published 2024-12-01“…An accurate and numerically efficient description of the rolling process is a challenging task since the degree of computational accuracy is directly related to the complexity of the algorithm employed. In the most general case, finite element models (FEM) are used for the simulation of deformation processes; however, these techniques require significant computational time. …”
Get full text
Article -
12280
Alignment Detection Technology of Chang’e-6 Primary Package Container
Published 2024-12-01“…To address challenges such as complex backgrounds, uneven lighting, and reflective surfaces, this paper introduces an alignment detection method that integrates YOLO object recognition, Devernay subpixel edge detection, and the RANSAC fitting algorithm. By employing both linear and elliptical fitting techniques, the method accurately determines the median line of the primary packaging container, ensuring precise alignment detection. …”
Get full text
Article