-
2361
Study on a multi-satellite constrained space-time anti-jam algorithm
Published 2012-06-01“…A multi-satellite constrained space-time anti-jam algorithm was proposed for global navigation satellite system(GNSS)receivers.Firstly the equivalent GSC structure of multi-satellite constrained LCMV principle was considered and its forward decomposition process was simplified and improved,so the computation complexity was reduced to approach single-satellite constrained problem.Then the Householder multi-stage Wiener filtering(MWF)algorithm was proposed to solve the classical Wiener filtering problem in the GSC structure,and an efficient order-recursive implementation structure was obtained by improving the backward recursive process using the decomposition property of MWF,so the real-time performance was greatly promoted and the reduced rank could be adaptively estimated from the output of MSE.The complete procedure of the proposed algorithm is summed up and its validation is verified by simulations.…”
Get full text
Article -
2362
Anomaly detection algorithm based on Gaussian mixture variational auto encoder network
Published 2021-04-01“…Anomalous data, which deviates from a large number of normal data, has a negative impact and contains a risk on various systems.Anomaly detection can detect anomalies in the data and provide important support for the normal operation of various systems, which has important practical significance.An anomaly detection algorithm based on Gaussian mixture variational auto encoder network was proposed, in which a variational autoencoder was built to extract the features of the input data based on Gaussian mixture distribution, and using this variational autoencoder to construct a deep support vector network to compress the feature space and find the minimum hyper sphere to separate the normal data and the abnormal data.Anomalies can be detected by the score from the Euclidean distance from the feature of data to the center of the hypersphere.The proposed algorithm was evaluated on the benchmark datasets MNIST and Fashion-MNIST, and the corresponding average AUC are 0.954 and 0.937 respectively.The experimental results show that the proposed algorithm achieves preferable effects.…”
Get full text
Article -
2363
Optimization of the Driving Mode Transformation of Hybrid Electric Bus based on Genetic Algorithm
Published 2015-01-01“…The hybrid electrical city bus has two power sources to drive vehicle,so the control of vehicle driving mode transformation is become the core of the vehicle control strategy.It not only influences the vehicle fuel economy and emissions,but also influences the driving comfort of the vehicle.An HEV simulation model is built for performance analysis by interlinking of advanced software AVL CRUISE and Matlab/Simulink.By adjusting threshold of the driving mode transformation,the mode can be transformed smoothly.For achieving minimum equivalent fuel consumption,the genetic algorithm(GA)optimization method is applied to get the optima of control parameters which affect the vehicle driving mode transformation in different city bus cycles including Europe and China.The vehicle fuel economy is further improved.…”
Get full text
Article -
2364
Machine learning and genetic algorithm-guided directed evolution for the development of antimicrobial peptides
Published 2025-02-01Subjects: Get full text
Article -
2365
Two-level cache based streaming media scheduling algorithm for mobile network
Published 2007-01-01Subjects: Get full text
Article -
2366
Anomaly detection model based on multi-grained cascade isolation forest algorithm
Published 2019-08-01Get full text
Article -
2367
An Algorithm of Faulty Antenna Location Based on Interval Analysis of Horizontal Beam-Width
Published 2013-10-01“…The problems such as decrease of antenna gain,the leakage of side-lobe signal,and the degradation of front-to-back ratio,were mainly discussed,and an algorithm of faulty antenna location based on interval analysis of horizontal beam-width was proposed,by dividing the horizontal beam-width with different radiation angle:±[0,15°],[16°,30°],[31°,60°],[61°,90°],[91°,120°],[121°,150°],[151°,180°].At last,through relational analysis of Rxqual,Rxlev,over-coverage index,and communication distance in different radiation angle interval,the location of faulty antenna was realized.…”
Get full text
Article -
2368
Optimal power flow using recent red-tailed hawk optimization algorithm
Published 2025-03-01“…In addition, the results obtained from the suggested approach have been compared to those achieved by other modern and competitive metaheuristic optimization algorithms, such as particle swarm optimization (PSO), Coot bird's algorithm (COOT), salp swarm algorithm (SSA), Marin predator algorithm (MPA), and the jellyfish search optimizer (JSO). …”
Get full text
Article -
2369
Predicting and Investigating the Permeability Coefficient of Soil with Aided Single Machine Learning Algorithm
Published 2022-01-01“…To acquire this purpose, five single ML algorithms including K-nearest neighbors (KNN), support vector machine (SVM), light gradient boosting machine (LightGBM), random forest (RF), and gradient boosting (GB) are used to build ML models for predicting the permeability coefficient of soils. …”
Get full text
Article -
2370
Intelligent Identifi cation and Classifi cation Algorithm and Simulation of Satellite Internet Business
Published 2022-06-01“…With the continuous growth of task requirements and the increasing types of access services, new challenges are raised to the multi-service collaborative transmission capability and the global scheduling capability of network resources of satellite Internet.It is necessary to diff erentiate the services carried by it to optimize resource allocation to meet the service quality assurance requirements of satellite internet multi-service.A business intelligence identifi cation and classifi cation algorithm for satellite dynamic network was proposed.By analyzed the connectivity between satellites, a spatio-temporal steady state diagram was established, the dynamic satellite network topology was determined, and a satellite simulation network was constructed.Sampling to form a training data set, a business intelligence recognition method based on grayscale image was proposed, and the captured data packet was converted into a grayscale image as the input of the algorithm for training and identifi cation under the satellite dynamic scene.The results showed that with the increase of the number of iterations, the recognition accuracy increases, and the recognition accuracy was 97% or more, which verifi ed the eff ectiveness of the proposed algorithm and provided technical support for the development of satellite internet space payloads.…”
Get full text
Article -
2371
An Adaptive View Selection Algorithm for Large-scale Cone-Beam CT Reconstruction
Published 2025-02-01“…In this paper, we propose an algorithm to optimize the scanning process by using geometric information about the object to be scanned. …”
Get full text
Article -
2372
Research on IoV resource allocation algorithm assisted by reconfigurable intelligent surface
Published 2023-09-01“…In order to meet the higher requirements of vehicle communication quality and spectral efficiency, a IoV resource allocation algorithm assisted by reconfigurable intelligent surface (RIS) was proposed.The RIS reflection coefficient matrix, power allocation, and spectrum sharing schemes were combined to solve the problem of maximizing the total capacity of V2I link under the condition of ensuring the reliability of V2V link.As this problem was a non-convex optimization problem with highly coupled variables, it was difficult to solve it directly.Therefore, after introducing an analytic expression to approximate the interrupt probability of V2V link, the problem was decomposed into three sub-problems by using the block coordinate descent (BCD) method, and the sub-problems were solved by introducing auxiliary variables, successive convex approximation (SCA), Hungarian algorithm, etc., and then the approximate suboptimal solution of the problem was obtained.Simulation results show that the proposed algorithm has good convergence performance and can effectively improve the total capacity of V2I link.…”
Get full text
Article -
2373
Energy-Efficient Virtual Machine Migration and Consolidation Algorithm in Cloud Data Center
Published 2015-01-01“…An energy-efficient virtual machine(VM)migration and consolidation algorithm with multi-resource was proposed. The algorithm was developed based on a multi-resource energy efficiency model. …”
Get full text
Article -
2374
A Method for Bio-Sequence Analysis Algorithm Development Based on the PAR Platform
Published 2023-03-01“…The problems of biological sequence analysis have great theoretical and practical value in modern bioinformatics. Numerous solving algorithms are used for these problems, and complex similarities and differences exist among these algorithms for the same problem, causing difficulty for researchers to select the appropriate one. …”
Get full text
Article -
2375
Multiobjective Memetic Estimation of Distribution Algorithm Based on an Incremental Tournament Local Searcher
Published 2014-01-01“…A novel hybrid multiobjective algorithm is presented in this paper, which combines a new multiobjective estimation of distribution algorithm, an efficient local searcher and ε-dominance. …”
Get full text
Article -
2376
Pattern Synthesis of Linear Antenna Arrays Using Enhanced Flower Pollination Algorithm
Published 2017-01-01“…In this paper, a new variant of flower pollination algorithm (FPA), namely, enhanced flower pollination algorithm (EFPA), has been proposed for the pattern synthesis of nonuniform linear antenna arrays (LAA). …”
Get full text
Article -
2377
Hardware Accelerators Targeting a Novel Group Based Packet Classification Algorithm
Published 2013-01-01“…In this paper, we propose a novel Group Based Search packet classification Algorithm (GBSA) that is scalable, fast, and efficient. …”
Get full text
Article -
2378
Multi-threshold algorithm about image segmentation based on polynomial uniform approximation
Published 2016-10-01“…Aiming at those shortcomings of previous multi-threshold image segmentation algorithm such as large complexity and instability caused by the image histogram glitch interference,a new multi-threshold image segmentation algorithm was proposed using Bernstein polynomial to uniformly approximate histogram curve.First,according to the approximation theory of Weierstrass to construct Bernstein polynomial for the histogram curve,then more difficult peak value calculating of the histogram was reduced to the Bernstein polynomial extremal generating,that was exported easily by the first and second derivative of Bernstein polynomial function,and finally obtain the actual peak value of the image histogram by picking up these extremes and polar values and filtering through classification algorithm,and finish multi-threshold image segmentation.Experimental results show that the algorithm is insensitive for histogram glitch interference,the overall is stable,the redundant computation and time complexity are smaller,with less time and high efficiency,the approximate performance and segmentation effect are better.…”
Get full text
Article -
2379
Low-complexity signal detection algorithm based on preconditioned conjugate gradient method
Published 2016-04-01“…So less-complexity signal detection algorithm using preconditioned conjugate gradient method was proposed,the algorithm reduced the condition number of matrix by pretreatment technology,thus speeding up the convergence rate of conjugate gradient signal detection algorithm. …”
Get full text
Article -
2380
A Computable Measure of Algorithmic Probability by Finite Approximations with an Application to Integer Sequences
Published 2017-01-01“…Given the widespread use of lossless compression algorithms to approximate algorithmic (Kolmogorov-Chaitin) complexity and that, usually, generic lossless compression algorithms fall short at characterizing features other than statistical ones not different from entropy evaluations, here we explore an alternative and complementary approach. …”
Get full text
Article