-
17801
ICA based blind detection scheme in space-time block coding communications
Published 2007-01-01“…Space-time block coding(STBC) schemes are capable of improving system performance by using transmit diversity strategy and specific coding schemes.Nevertheless,they need precise channel state information(CSI) at the receiver end in order to achieve good detection performance,which is difficult to be guaranteed in some specific scenarios because of complicated communication conditions.Independent component analysis(ICA) technique is to separate a complex data set into a couple of independent sub-sets,which belongs to the family of blind source separation(BSS) technique.ICA techniques were exploited into the STBC communication systems,and they were used to detect the transmitted signals blindly,which need not the channel estimation.After analyzing the essential structure of STBC system,the specific model suitable to ICA is established,and several typical ICA algorithms are adopted to make a comparison.The robustness against channel estimation errors can be acquired by using the ICA based schemes.Simulation results demonstrate the validity of proposed approaches,and after the comparison among different ICA based detection schemes,the optimal one is found and the discussions are also given.…”
Get full text
Article -
17802
Clinical Rehabilitation Nursing of Patients with Chronic Obstructive Pulmonary Disease Based on Intelligent Medicine
Published 2022-01-01“…This paper first introduced the intelligent medical system, analyzed the clinical rehabilitation nursing of COPD patients, established the SCNet model suitable for this paper, and then used statistical algorithms to carry out the meta dynamic analysis of the clinical rehabilitation nursing for COPD patients. …”
Get full text
Article -
17803
Telemedicine in Diabetic Retinal Screening: Pre- and Post-COVID-19 Challenges a New Perspective
Published 2024-12-01“…The image analysis by AI and deep-learning algorithms offers insight into the future of screening in diabetes. …”
Get full text
Article -
17804
Perfect secrecy cryptosystem with nonuniform distribution of keys
Published 2018-11-01“…More strictly mathematical concepts of infinite perfect secrecy and random “one-time pad” cryptosystem in theory were presented,and the whole secure communication system was divided into two stages:design of a basic cryptosystem and one of its applications.How to design a basic cryptosystem by using a group of orthogonal Latin squares was first studied and an example to illustrate how to design nonlinear encryption transformations for a basic cryptosystem was given.Then,how to design the sequence of keys by using random method with nonuniform distribution was discussed,and it was strictly proven in theory that the infinite random “one-time pad” cryptosystem based on the designed basic cryptosystem was of perfect secrecy.Since the obtained result generalizes the existing one for random “one-time pad” cryptosystem to be perfect by using a basic cryptosystem with modulo addition,it may be used as a wider ideal simulated prototype to design stream cipher algorithms.Since the number of basic cryptosystems that can be designed is much more than one of the common basic cryptosystems with modulo addition,the obtained result is effective supplement and perfection to mainstream design method for the current stream cryptosystems.…”
Get full text
Article -
17805
A New Chaotic System with Only Nonhyperbolic Equilibrium Points: Dynamics and Its Engineering Application
Published 2022-01-01“…Finally, chaos-based encoding/decoding algorithms for secure data transmission are developed by designing a state chain diagram, which indicates the applicability of the new chaotic system.…”
Get full text
Article -
17806
Optimization of the UWB Feed Antenna Position in Reflector Applications
Published 2014-01-01“…An automatic and fast design procedure, based on Genetic Algorithms, is described. The proposed methodology has been numerically and experimentally assessed. …”
Get full text
Article -
17807
MEVDT: Multi-modal event-based vehicle detection and tracking datasetDeep Blue Data
Published 2025-02-01“…Designed to advance the research in the domain of event-based vision, MEVDT aims to address the critical need for high-quality, real-world annotated datasets that enable the development and evaluation of object detection and tracking algorithms in automotive environments.…”
Get full text
Article -
17808
DeepBase: A Deep Learning-based Daily Baseflow Dataset across the United States
Published 2025-01-01“…This study focuses on estimating baseflow using deep learning algorithms that enhance the estimation capabilities in both gauged and ungauged basins. …”
Get full text
Article -
17809
Suboptimal Greedy Power Allocation Schemes for Discrete Bit Loading
Published 2013-01-01“…Two of the proposed algorithms can achieve near optimal performance including a transfer of residual power between subsets at the expense of a very small extra cost. …”
Get full text
Article -
17810
Envisioning Archival Images with Artificial Intelligence
Published 2024-11-01“…The review highlights the potential of AI, particularly computer vision (CV), to address the challenges associated with processing large volumes of digital images. CV algorithms, such as object detection and image classification, can automate tasks like image metadata generation, offering archivists new tools for organizing collections more efficiently. …”
Get full text
Article -
17811
Scheduling on a Single Machine and Parallel Machines with Batch Deliveries and Potential Disruption
Published 2020-01-01“…For the corresponding single-machine and parallel-machine scheduling problems, pseudo-polynomial-time algorithms and fully polynomial-time approximation schemes (FPTASs) are presented in this paper, respectively.…”
Get full text
Article -
17812
Presentation of Machine Learning Approaches for Predicting the Severity of Accidents to Propose the Safety Solutions on Rural Roads
Published 2022-01-01“…In this regard, using accident data from 2017 to 2020, the machine learning algorithms, including multiple logistic regression, multilayer perceptron neural network (MLPNN), and radial basis function neural network (RBFNN) models, as well as statistical methods, including Kolmogorov–Smirnov test, Friedman test, and factor analysis, were implemented to determine the contributory factors in the severity of accidents. …”
Get full text
Article -
17813
Global decline in net primary production underestimated by climate models
Published 2025-02-01“…Here we use contemporary remote sensing net primary production trends (1998–2023) from six remote sensing algorithms to discriminate amongst fifteen divergent model projections. …”
Get full text
Article -
17814
A Comparative Study on Stabilized Finite Element Methods for the Convection-Diffusion-Reaction Problems
Published 2018-01-01“…The disproportionality in the problem parameters of the convection-diffusion-reaction equation may lead to the formation of layer structures in some parts of the problem domain which are difficult to resolve by the standard numerical algorithms. Therefore the use of a stabilized numerical method is inevitable. …”
Get full text
Article -
17815
Supporting Image Search with Tag Clouds: A Preliminary Approach
Published 2015-01-01“…Algorithms and techniques for searching in collections of data address a challenging task, since they have to bridge the gap between the ways in which users express their interests, through natural language expressions or keywords, and the ways in which data is represented and indexed. …”
Get full text
Article -
17816
CS-communication integration method in IoT monitoring multiple phenomena
Published 2021-03-01“…The large-scale Internet of things with multi observation phenomenon uses orthogonal multiple access (OMA) mechanism to transmit the observation data of distributed nodes, which will cause great transmission delay and lead to the loss of timeliness of data.To cope with the heavy latency of observations due to OMA, an efficient scheme integrating compressed sensing (CS) technique with communication was proposed for large-scale Internet of things to monitor multiple phenomena.In this proposed scheme, the nodes monitoring different phenomena were assigned to different time durations for transmission.During the assigned time duration, all nodes concurrently transmitted observations to the fusion center (FC)for CS measurement, and the FC recovered observation by CS algorithms.To evaluate the performance of the proposed scheme, the achievable rate of the observed phenomena was derived, which was closely related to the time allocation of clusters.To further improve the performance, the optimization problems of time allocation were studied under the two objectives of maximizing the total rate and ensuring the fairness of observation.Finally, the performance was verified and analyzed by numerical simulation.The simulation results show that the achievable rate of observations for different phenomena is improved the proposed scheme significantly compared with OMA schemes.…”
Get full text
Article -
17817
An efficient construction of key-dependent substitution box based on chaotic sine map
Published 2019-12-01“…A substitution box is a core component of the popular symmetric-key algorithms. However, the major problem of the conventional substitution boxes is the statistic behavior, which is employed as a fixed-size lookup table. …”
Get full text
Article -
17818
Markov Switching Model Analysis of Implied Volatility for Market Indexes with Applications to S&P 500 and DAX
Published 2014-01-01“…Computations are given for a four-state switching model and obtained numerical results are put beside by explanatory graphs which report the outcomes obtained exploiting both smoothing and filtering algorithms used in the estimation/calibration procedures we proposed to infer on the switching model parameters.…”
Get full text
Article -
17819
Optimal Design of Double-stage Wheel Hub Reducer System based on Fuzzy Theory
Published 2017-01-01“…Based on the characteristic of genetic algorithms,improving the weight coefficients of the search methods and increasing the optimization searching space,compared with other optimization methods,the result is improved. …”
Get full text
Article -
17820
Automated Generation Control of Multiple-Area Electrical System with an Availability-Based Tariff Pricing Scheme Regulated by Whale Optimized Fuzzy PID Controller
Published 2021-01-01“…., whale-optimized fuzzy PID controller, are investigated against already presented methods such as particle swarm optimization and genetic algorithms.…”
Get full text
Article