-
3841
The Development of a Hybrid EnKF-3DVAR Algorithm for Storm-Scale Data Assimilation
Published 2013-01-01“…A hybrid 3DVAR-EnKF data assimilation algorithm is developed based on 3DVAR and ensemble Kalman filter (EnKF) programs within the Advanced Regional Prediction System (ARPS). …”
Get full text
Article -
3842
Sandpiper Optimization Algorithm With Region Growing Based Robust Retinal Blood Vessel Segmentation Approach
Published 2024-01-01“…In this aspect, this study concentrates on the design of a sandpiper optimization algorithm with region growing based robust retinal blood vessel segmentation (SPORG-RBVS) approach. …”
Get full text
Article -
3843
Power Efficient Load Balancing Algorithm in LTE-A Heterogenous Network Based on Assignment Model
Published 2015-02-01“…User power model was built towards assignment model, based on which the augmented assign algorithm was proposed to minimize power of HetNet on condition of limited user data load. …”
Get full text
Article -
3844
Public key cryptographic algorithm SM2 optimized implementation on low power embedded platform
Published 2022-12-01“…With the development of wireless communication technology and the popularization of intelligent terminals, more and more cryptographic algorithms are applied to IoT devices to ensure the security of communication and data.Among them, the SM2 elliptic curve public key cryptography proposed by the State Cryptography Administration is an elliptic curve public key cryptography algorithm developed domestically, which has the advantages of high security and short key.SM2 has been widely deployed in various communication systems and is used in essential parts such as identity authentication and key negotiation.However, since SM2 involves large integer operations on finite fields, the computational cost is high, and its execution on a low-power embedded platform seriously affects the user experience.Therefore, an efficient implementation scheme of SM2 algorithm for low-power embedded platform was proposed for ARM-m series processors.Specifically, Thumb-2 instruction set was adopted to handle carry and save addressing cycles, basic operations such as modulo addition and sub-traction of large integers were optimized, and the number of available registers on the platform was combined to build efficient basic operations.Besides, based on the short multiplication and accumulation instruction cycle of ARM-m series processors, the implementation of Montgomery multiplication was optimized, and an efficient modular multiplication scheme was designed in combination with the CIOS algorithm.The scheme was no longer limited to Mersenne primes, and greatly improved the speed and flexibility of modular multiplication.Based on the theoretical analysis and experimental test, the window length selection method of the multiple point-scalar multiplication wNAF sliding window method on the embedded platform was given.The experimental test results show that the proposed scheme can effectively improve the computational efficiency of the SM2 algorithm on the resource-constrained low-power embedded platform.Without pre-calculation, the test signature speed can reach 0.204s/time, the signature verification speed is 0.388s/time, the encryption speed is 0.415s/time, and the decryption speed is 0.197s/time.…”
Get full text
Article -
3845
Near-field localization algorithm of multiple sound sources based on approximated kernel density estimator
Published 2017-01-01“…For near-field localization of multiple sound sources in reverberant environments,a algorithm model based on approximated kernel density estimator (KDE) was proposed.Multi-stage (MS) of sub-band processing was introduced to effectively solve the spatial aliasing by wide spacing.Spatial likelihood function (SLF) was built for multi-dimensional fusion by using two operators,sum (S) and prod (P).Then four algorithms,S-KDE,P-KDE,S-KDEMS,P-KDEMS,were derived.By the comprehensive comparison of the two statistical indicators root mean square error (RMSE) and percentage of SLF (PSLF) which denoted the recognition,P-KDEMS is confirmed as a near-field localization algorithm of multiple sound sources with high robustness and recognition.…”
Get full text
Article -
3846
Coupled Control Algorithm for Rotation and Revolution of Omni-directional Automated Guided Vehicle based on Mecanum
Published 2018-01-01Subjects: Get full text
Article -
3847
A PMBGA to Optimize the Selection of Rules for Job Shop Scheduling Based on the Giffler-Thompson Algorithm
Published 2012-01-01“…Under such circumstances, a probabilistic model-building genetic algorithm (PMBGA) is proposed to optimize the sequence of selected rules. …”
Get full text
Article -
3848
Image encryption algorithm based on multi-direction pixel continuous folding mechanism and Radon transform
Published 2017-09-01“…The image encryption algorithm based on multi-direction pixel continuous folding mechanism and Radon transform was proposed.Firstly,the initial plaintext was equally segmented to get left and right sub-blocks.Then the Radon transform was used to obtain the radon projection spectrum image by processing the left and right blocks at 0~180 degrees.And Radon projection spectrum image of left block was permutated by Arnold map,while the Radon projection spectrum image of right block was permutated based on gravity model to get two su-scrambling ciphers,then the entire scrambled image is formed by combining them.To diffuse pixels from multiple directions in space,four direction continuous folding mechanism was designed to change the pixel values by using the diffusion function corresponding to four different directions for realizing image encryption.The experimental results show that this algorithm has higher security and attack resistance with more uniform of pixel distribution in output cipher compared with the current image encryption technology.…”
Get full text
Article -
3849
Study on the Rule-based Control Strategy for PHEV According to Two-state Dynamic Programming Algorithm
Published 2018-01-01“…A multi-objective optimization function with fuel consumption and SCR outlet’s NOxemission is developed by adopting two states dynamic programming algorithm to solve global optimization problem. Specifically,the battery SOC and SCR temperature is designated as two states respectively which reflect the powertrain system and aftertreatment system dynamics. …”
Get full text
Article -
3850
Resource allocation algorithm for secure communication in UAV-assisted D2D communication network
Published 2024-02-01“…To solve the problems of energy limitation, spectrum shortage, and serious co-frequency interference in the unmanned aerial vehicle (UAV)-assisted D2D (device-to-device) communication network under passive eavesdropping, the concept of the network secrecy energy efficiency was introduced by taking into account the secrecy rate and transmit power constraints of each user.Based on the physical layer secure transmission theory, the joint optimization problem of spectrum multiplexing and power control strategies was investigated to maximize the network secrecy energy efficiency.The problem was a nonlinear nonconvex problem, a resource allocation algorithm combining Dinkelbach’s algorithm and the convex approximation algorithm was proposed to transform the nonconvex optimization problem into a geometric planning problem through the convex approximation algorithm and ensure that the original problem converges to the global optimal solution by Dinkelbach’s algorithm.Simulation results show that the proposed algorithm can effectively mitigate the co-channel interference, improve the network secrecy energy efficiency, and balance the relationship between the secure communication performance and power consumption of the network.…”
Get full text
Article -
3851
Requirements-driven and multi-homed-based multipath TCP congestion control algorithm for vehicular network
Published 2016-07-01“…The algorithm of PTLIA, as proved in proposed simulations and experiments, has shortened the transmission of the high-priority data, under the premise of MPTCP transmission principles.…”
Get full text
Article -
3852
Firefly Algorithm for Cardinality Constrained Mean-Variance Portfolio Optimization Problem with Entropy Diversity Constraint
Published 2014-01-01“…This is especially true for swarm intelligence algorithms which represent the newer branch of nature-inspired algorithms. …”
Get full text
Article -
3853
Three Extensions of Tong and Richardson’s Algorithm for Finding the Optimal Path in Schedule-Based Railway Networks
Published 2017-01-01“…However, three aspects of this algorithm limit its application to high-speed railway networks. …”
Get full text
Article -
3854
Dual-feature speech emotion recognition fusion algorithm based on wavelet scattering transform and MFCC
Published 2024-05-01“…The algorithm was based on the integration of wavelet scattering transform and Mel-frequency cepstral coefficients (MFCC). …”
Get full text
Article -
3855
Queue stability distributed spectrum access algorithm based on Markov model for cognitive radio network
Published 2014-03-01“…The queue stability of the secondary users in cognitive network was considered.A Markov chain model for the state of users in the cognitive network was constructed and a distributed CSMA algorithm was proposed.The secondary users adjust the parameters of back-off time due to the arrival and service rate to ensure the queue stability.Upper bound of the capacity of secondary users under the collision constrainting to primary user was derived in closed form.If the arrival rate of secondary users is smaller than the upper bound of capacity,queue stability can be ensured by the proposed algorithm.Simulations verified the effectiveness of the algorithm.…”
Get full text
Article -
3856
A Relaxed Self-Adaptive Projection Algorithm for Solving the Multiple-Sets Split Equality Problem
Published 2020-01-01“…In this article, we introduce a relaxed self-adaptive projection algorithm for solving the multiple-sets split equality problem. …”
Get full text
Article -
3857
-
3858
MAC Layer Energy Consumption and Routing Protocol Optimization Algorithm for Mobile Ad Hoc Networks
Published 2021-01-01“…The MAC layer energy consumption and routing protocol optimization algorithm proposed in this paper can be applied well in various fields.…”
Get full text
Article -
3859
Adaptive genetic algorithm based deep feature selector for cancer detection in lung histopathological images
Published 2025-02-01“…In this study, we have used a channel attention-enabled deep learning model as a feature extractor followed by an adaptive Genetic Algorithm (GA) based feature selector. Here, we calculate the fitness score of each chromosome (i.e., a candidate solution) using a filter method, instead of a classifier. …”
Get full text
Article -
3860
Research on high-speed classification and location algorithm for logistics parcels based on a monocular camera
Published 2024-07-01Subjects: Get full text
Article