-
3041
Study on the Noise Reduction of Vehicle Exhaust NOX Spectra Based on Adaptive EEMD Algorithm
Published 2017-01-01“…The parameter settings of the algorithms above are not transcendental, so with them, it is difficult to achieve the best noise reduction effect for the vehicle exhaust spectra which are sharp and drastic in the waveform. …”
Get full text
Article -
3042
Research of the Pose Forward Solution Algorithm of Stewart Platform based on BP Neural Network
Published 2015-01-01“…Aiming at the problem of low speed of using numerical methods to solve the Stewart platform position and attitude forward solution and the initial value of improper selection may not obtain the forward solution,the BP neural networks algorithm is used for solving those problems.The experiment and simulation results show that this method is fast and effective.…”
Get full text
Article -
3043
Decision Tree Algorithm for Visual Art Design in a Psychotherapy System for College Students
Published 2022-01-01“…Based on the above association pattern mining results, a series of preprocessing operations were performed on the data, and then, the Apriori algorithm was applied to discover the potential association relationships among 9 psychological dimension factors of college students, and then, the ID3 decision tree algorithm was used to construct a decision tree and pruning process, from which the classification rules of students’ psychological problems were analyzed and discovered. …”
Get full text
Article -
3044
Resource allocation algorithm for multi-beam LEO satellite based on decision performance evaluation
Published 2024-07-01“…Simulation results show that the proposed algorithm outperforms traditional resource allocation algorithms in terms of throughput and fairness.…”
Get full text
Article -
3045
An improved gray wolf optimization algorithm solving to functional optimization and engineering design problems
Published 2024-06-01Subjects: “…Grey wolf algorithm…”
Get full text
Article -
3046
Research of the Robot Arm Gravity Compensation based on the Genetic Algorithm for Optimization of Neural Network
Published 2017-01-01Subjects: Get full text
Article -
3047
A Hybrid Seed Node Selection and No-Retracing Random Walk in Page Rank Algorithm
Published 2022-01-01Subjects: Get full text
Article -
3048
Application of Improved Naive Bayesian-CNN Classification Algorithm in Sandstorm Prediction in Inner Mongolia
Published 2019-01-01“…This paper used two algorithms, naive Bayesian algorithm and CNN algorithm, to identify and diagnose the strength of sandstorm in Inner Mongolia and found that combining the two algorithms, INB-CNN classification algorithm had the greatest success in predicting the occurrence of sandstorms.…”
Get full text
Article -
3049
Low Complexity Two-Dimensional Channel Estimation Algorithm for Broadband SC-FDE System
Published 2014-08-01“…The simulation results show that the proposed algorithm has better performance than the conventional LS algorithm and MMSE algorithm. …”
Get full text
Article -
3050
A randomized block policy gradient algorithm with differential privacy in Content Centric Networks
Published 2021-12-01“…Current policy gradient algorithms impose high computational cost in processing high-dimensional data. …”
Get full text
Article -
3051
Prediction of Dissolved Oxygen Concentration in Sewage Treatment Process Based on Data Recognition Algorithm
Published 2022-01-01“…In the improved algorithm, in order to improve the quality of the initial members of the basic fireworks algorithm, the chaos algorithm is integrated. …”
Get full text
Article -
3052
Key node identification algorithm for complex network based on improved grey wolf optimization
Published 2021-06-01“…In recent years, how to select the most influential key node for identification has become the most cutting-edge hot direction in network science.Formulating the problem of maximizing the influence of complex network nodes as an optimization problem whose cost function was expressed as the influence of nodes and the distance between them, measures user influence using Shannon entropy, and solved this problem using an improved gray wolf optimization algorithm.Finally, numerical examples were performed with real complex network datasets.The experimental results show that the proposed algorithm is more accurate and computationally efficient than the existing method.…”
Get full text
Article -
3053
Modified SLM algorithm based on cyclic shift and signal combination in MIMO-OFDM system
Published 2015-04-01“…In order to reduce the computational complexity of conventional selective mapping (SLM) algorithm in multiple input multiple output orthogonal frequency division multiplexing (MIMO-OFDM) system,more candidate sequence sets will be produced.With different peak to average power ratio (PAPR) by time domain cyclic shift and signal combination between the antennas.The receiving part can restore the rotation signals by using the sequence selection order of the transmitting part and also the original signals by comparing the inversed rotation sequence with its nearest constellation points.The simulation results show that the proposed method can effectively reduce the PAPR of OFDM signals.In addition,compared with the conventional SLM algorithm,the proposed method can reduce the algorithm computation complexity significantly and obtain similar bit error rate (BER) performance.…”
Get full text
Article -
3054
Parameter Identification of the 2-Chlorophenol Oxidation Model Using Improved Differential Search Algorithm
Published 2015-01-01“…Then, to address the nonlinearity of the model, two improved differential search (DS) algorithms were proposed to carry out the parameter identification of the model. …”
Get full text
Article -
3055
Optimization of Rendering Parameters of Cesium 3DTiles Model Based on Differential Evolution Algorithm
Published 2025-01-01Subjects: “…differential evolutionary algorithms…”
Get full text
Article -
3056
Topology control algorithm backing for network coding in cognitive wireless ad hoc networks
Published 2013-05-01“…In order to study the limited bandwidth resource in cognitive wireless ad hoc network,a topology control algo-rithm backing for network coding was proposed.The algorithm was mainly composed of three phases.In the stage of ini-tial topology construction,the algorithm used the shortest path algorithm to construct topology for unicast services,used the shortest path algorithm based on network coding to construct topology for multicast services.In the stage of topology optimization,the algorithm deleted links which met certain conditions one by one to optimize the topology.In the stage of topology recovery,the algorithm used the least cost links which were not in the path cluster including failed links to recover network connectivity.Simulation results show that the proposed algorithm can improve the spatial reuse of radio resource and enhance network invulnerability.…”
Get full text
Article -
3057
Application of Low-Frequency Processing Method Based on VMD Algorithm in Blasting Signal Processing
Published 2022-01-01“…In this paper, the parameter selection of VMD algorithm to identify low-frequency noise of blasting signal is optimized by simulation experiment. …”
Get full text
Article -
3058
PFM:a SMS4 algorithm against high-order power analysis attacks
Published 2010-01-01“…A fixed-value mask algorithm for SMS4 was proposed in order to resist power analysis attack based SMS4.Firstly,an atomic mask algorithm of SMS4 was designed to resist against high-order power analysis attack based on the study of the structure of SMS4 algorithm,the intermediate variables were masked in the method.Secondly,pseudo-random fixed-value mask method(PFM) was proposed based on the above method,when its hardware implementation aiming at low power and less areas was considered about.Moreover,PFM has the ability to resist against high-order power analysis attacks when applied to the sensor node of special environment of communication.Finally,the experimental results show that the proposed algorithm has the ability to effectively resist second high-order differential power analysis attack without increasing much power and hardware resources.…”
Get full text
Article -
3059
Study on mobile target real-time image registration based on improved SURF algorithm
Published 2017-01-01“…For the unstability of the real-time visual image characteristic point extraction and matching for the mobile target,an improved registration method of the multiple algorithm-fusion was introduced.Firstly,the method of bilateral filtering,Canny edge detection and morphological processing,was adopted to get the more robust image's edge map.And the founded points were limited in this edge map,then the Hessian matrix of SURF based on the discrete Gaussian-Hermite moment was modified.The character description vector was redefined in the algorithm.Following the above analysis,the Kendall coefficient constraint was discussed in image matching characteristic points.Secondly,the spectral radiant color invariant model and the I_SURF algorithm were used to match the real-time color image.Finally,the improved algorithm was combined with the update algorithm of adaptive target to match the mobile target in indoor environment.The experimental results show that the static image registration accuracy of the improved algorithm is higher than that of the SURF algorithm,and also the stability of the mobile image feature points extraction and the registration number have achieved over 97% under different rotating scales.…”
Get full text
Article -
3060
Generalizing the Brady-Yong Algorithm: Efficient Fast Hough Transform for Arbitrary Image Sizes
Published 2025-01-01Subjects: “…Brady-Yong algorithm…”
Get full text
Article