-
2801
Improved Fractional Order VSS Inc-Cond MPPT Algorithm for Photovoltaic Scheme
Published 2014-01-01“…Maximum power point tracking (MPPT) algorithm is acting as a significant part in solar power generating system because it varies in the output power from a PV generating set for various climatic conditions. …”
Get full text
Article -
2802
Automatic Optimization of Guidance Guardrail Layout Based on Multi-Objective Evolutionary Algorithm
Published 2024-12-01Subjects: “…multi-objective evolutionary algorithm…”
Get full text
Article -
2803
Multi-level feedback based time synchronization algorithm for wireless sensor networks
Published 2009-01-01“…Aiming at the fast and efficient time synchronization protocol for the wireless sensor networks under resource constraints, a novel feedback-based full-scale time synchronization(FTS) algorithm was proposed.The basic idea of FTS is to execute iteratively time synchronization downlink operations on all the nodes of the wireless sensor network and collect the two-way path delay information from only a part of nodes to calculate the average delay adjustment per hop.The stochastically feedback scheme is adopted to reduce the uplink packets.The FTS algorithm also consists of the mechanisms of synchronization error monitoring and clock skew correction.The FTS was implemented on the popular TelosB sensor nodes from UC Berkeley.The experiments show that FTS is a fast, resource-efficient algorithm with ra-tional synchronization precision.…”
Get full text
Article -
2804
Towards a throughput-optimal routing algorithm for data collection on satellite networks
Published 2016-07-01“…For delay performance, we embed a distance factor into the objective of the framework and derive a geographic-location-aware backpressure algorithm. Further, we exploit transmission opportunities missed by backpressure-type algorithms to accelerate data transfer. …”
Get full text
Article -
2805
Multi-power level mobile beacon assisted distributed node localization algorithm
Published 2009-01-01“…In the scheme, a mobile beacon broadcasts packets with multi-power level on its trajectory, and then unknown nodes that receive packets will derive a set of quadratic inequality constraints and run a convex position estimation algorithm. Simulation results show that the proposed method can perform well without range.…”
Get full text
Article -
2806
Android malware detection method based on permission sequential pattern mining algorithm
Published 2013-08-01“…In order to detect unknown Android malwares, an Android malware detection method based on per-mission sequential pattern mining algorithm was proposed. The proposed method design a permission sequential pattern mining algorithm PApriori to dig out permissions association. …”
Get full text
Article -
2807
Research on Word Vector Training Method Based on Improved Skip-Gram Algorithm
Published 2022-01-01“…In view of the shortcomings of the traditional skip-gram model in coding and modeling the processing of context words, this study proposes an improved word vector-training method based on skip-gram algorithm. Based on the analysis of the existing skip-gram model, the concept of distribution hypothesis is introduced. …”
Get full text
Article -
2808
Single anchor node real-time positioning algorithm based on the antenna array
Published 2017-05-01“…Finally, the algorithm is evaluated by experiments in real environments. …”
Get full text
Article -
2809
Analysis and verification on space probe performance of 2-D spectrum estimation algorithm
Published 2016-05-01“…According to the analysis requirement of the space probe performance of 2-D spectrum estimation algorithm,a brief introduction of the 2-D spectrum estimation algorithms was given in the view of calculating speed,calculating volume,stability,accuracy and practical application.These algorithms were the spectrum estimation algorithms of the 2-D MUSIC,the 2-D interference and the 2-D MEMP with the L-shaped array.The estimation performance of the algorithms were analyzed by simulations,the angle root mean square error of three algorithms were compared and analyzed.Simulation results show that the performance of the 2-D MEMP is the best,the performance of the 2-D interference algorithm is the worst,and the performance of the 2-D MUSIC is moderate.Meanwhile,the experimental scene was constructed,and the space probe performance of the 2-D spectrum estimation algorithm was analyzed by real data.The experimental results were consistent with the simulation results.Based on this,the 2-D MEMP algorithm may be further applied in the radar and TT&C system.…”
Get full text
Article -
2810
Solving degree-constrained multicast routing problem by a heuristic genetic algorithm
Published 2007-01-01Subjects: Get full text
Article -
2811
A tensor compression algorithm using Tucker decomposition and dictionary dimensionality reduction
Published 2020-04-01“…Tensor compression algorithms play an important role in the processing of multidimensional signals. …”
Get full text
Article -
2812
Research on the Adaptive Fusion Timing Algorithm for BeiDou and LORAN Based on the EKF
Published 2025-01-01Subjects: Get full text
Article -
2813
Parameter Optimization and Experimental Verification of V-belt CVT based on Genetic Algorithm
Published 2020-02-01“…A V-belt CVT mechanical model is established, and the CVT speed regulation characteristics are analyzed and simulated in Matlab. The genetic algorithm is used to optimize the key parameters of CVT with the aim of improving the power. …”
Get full text
Article -
2814
Instruction flow mining algorithm based on the temporal sequence of node communication actions
Published 2019-09-01“…With the situation that the content of the communication between the nodes in the network is unknown,an instruction flow mining algorithm based on the communication sequence was proposed.Firstly,by modelling the relativity of the communication actions and proposing the node communication actions model,the background communication and instruction communication actions was modelled.Moreover,FlowMine algorithm was proposed to solve such models and the convergence of the algorithm was analyzed.The algorithm estimated parameters by sampling and iteration which obtained a near optimal solution.Finally,the validity of the approach was verified by synthetic data and empirical data analysis.Experiment results show the convergence and reliable performance of FlowMine algorithm.…”
Get full text
Article -
2815
Multi-target localization algorithm based on adaptive grid in wireless sensor network
Published 2019-07-01“…The RSS-based multi-target localization has the natural property of the sparsity in wireless sensor networks.A multi-target localization algorithm based on adaptive grid in wireless sensor networks was proposed,which divided the multi-target localization problem into two phases:large-scale grid-based localization and adaptive grid-based localization.In the large-scale grid-based localization phase,the optimal number of measurements was determined due to the sequential compressed sensing theory,and then the locations of the initial candidate grids were reconstructed by applying l<sub>p</sub> (0&lt; p&lt;1) optimization.In the adaptive grid-based localization phase,the initial candidate grids were adaptively partitioned according to the compressed sensing theory,and then the locations of the targets were precisely estimated by applying l<sub>p</sub>optimization once again.Compared with the traditional multi-target localization algorithm based on compressed sensing,the simulation results show that the proposed algorithm has higher localization accuracy and lower localization delay without foreknowing the number of targets.Therefore,it is more appropriate for the multi-target localization problem in the large-scale wireless sensor networks.…”
Get full text
Article -
2816
Microblog burst topic diffusion prediction algorithm based on the users and node scale
Published 2013-08-01“…Based on the scale of the user, topic diffusion prediction algorithms were proposed based on user and node scale respectively. …”
Get full text
Article -
2817
Research on heterogeneous radio access and resource allocation algorithm in vehicular fog computing
Published 2019-06-01Subjects: Get full text
Article -
2818
A-RPL: Routing Algorithm with the Ability to Support Mobility in Internet of Things Networks
Published 2024-02-01“…Our algorithm works better than some superior algorithms were proposed in recent years, because they still suffer from various disadvantages, especially for mobile networks…”
Get full text
Article -
2819
Energy-Aware Distributed Intelligent Data Gathering Algorithm in Wireless Sensor Networks
Published 2011-05-01“…To plan the data collecting path for the mobile collector in wireless sensor network (WSN), an efficient energy-aware distributed intelligent data gathering algorithm (DIDGA) is proposed, which includes cluster formation and path formation phases. …”
Get full text
Article -
2820
Fast Block Partitioning Algorithm for HEVC Based on Spatial Correlation and Image Texture
Published 2015-01-01“…In order to reduce the intra coding complexity of HEVC, a fast block partitioning algorithm based on spatial correlation and image texture was proposed. …”
Get full text
Article