Showing 3,841 - 3,860 results of 19,511 for search '"Algorithms"', query time: 0.10s Refine Results
  1. 3841

    The Development of a Hybrid EnKF-3DVAR Algorithm for Storm-Scale Data Assimilation by Jidong Gao, Ming Xue, David J. Stensrud

    Published 2013-01-01
    “…A hybrid 3DVAR-EnKF data assimilation algorithm is developed based on 3DVAR and ensemble Kalman filter (EnKF) programs within the Advanced Regional Prediction System (ARPS). …”
    Get full text
    Article
  2. 3842

    Sandpiper Optimization Algorithm With Region Growing Based Robust Retinal Blood Vessel Segmentation Approach by Ibrahim AlMohimeed, Mohamed Yacin Sikkandar, A. Mohanarathinam, Velmurugan Subbiah Parvathy, Mohamad Khairi Ishak, Faten Khalid Karim, Samih M. Mostafa

    Published 2024-01-01
    “…In this aspect, this study concentrates on the design of a sandpiper optimization algorithm with region growing based robust retinal blood vessel segmentation (SPORG-RBVS) approach. …”
    Get full text
    Article
  3. 3843

    Power Efficient Load Balancing Algorithm in LTE-A Heterogenous Network Based on Assignment Model by Kai Liu, Jianye Zhao, Zhimin Liu

    Published 2015-02-01
    “…User power model was built towards assignment model, based on which the augmented assign algorithm was proposed to minimize power of HetNet on condition of limited user data load. …”
    Get full text
    Article
  4. 3844

    Public key cryptographic algorithm SM2 optimized implementation on low power embedded platform by Ganqin LIU, Hui LI, Hui ZHU, Yukun HUANG, Xingdong LIU

    Published 2022-12-01
    “…With the development of wireless communication technology and the popularization of intelligent terminals, more and more cryptographic algorithms are applied to IoT devices to ensure the security of communication and data.Among them, the SM2 elliptic curve public key cryptography proposed by the State Cryptography Administration is an elliptic curve public key cryptography algorithm developed domestically, which has the advantages of high security and short key.SM2 has been widely deployed in various communication systems and is used in essential parts such as identity authentication and key negotiation.However, since SM2 involves large integer operations on finite fields, the computational cost is high, and its execution on a low-power embedded platform seriously affects the user experience.Therefore, an efficient implementation scheme of SM2 algorithm for low-power embedded platform was proposed for ARM-m series processors.Specifically, Thumb-2 instruction set was adopted to handle carry and save addressing cycles, basic operations such as modulo addition and sub-traction of large integers were optimized, and the number of available registers on the platform was combined to build efficient basic operations.Besides, based on the short multiplication and accumulation instruction cycle of ARM-m series processors, the implementation of Montgomery multiplication was optimized, and an efficient modular multiplication scheme was designed in combination with the CIOS algorithm.The scheme was no longer limited to Mersenne primes, and greatly improved the speed and flexibility of modular multiplication.Based on the theoretical analysis and experimental test, the window length selection method of the multiple point-scalar multiplication wNAF sliding window method on the embedded platform was given.The experimental test results show that the proposed scheme can effectively improve the computational efficiency of the SM2 algorithm on the resource-constrained low-power embedded platform.Without pre-calculation, the test signature speed can reach 0.204s/time, the signature verification speed is 0.388s/time, the encryption speed is 0.415s/time, and the decryption speed is 0.197s/time.…”
    Get full text
    Article
  5. 3845

    Near-field localization algorithm of multiple sound sources based on approximated kernel density estimator by Yu-zhuo FANG, Zhi-yong XU, Zhao ZHAO

    Published 2017-01-01
    “…For near-field localization of multiple sound sources in reverberant environments,a algorithm model based on approximated kernel density estimator (KDE) was proposed.Multi-stage (MS) of sub-band processing was introduced to effectively solve the spatial aliasing by wide spacing.Spatial likelihood function (SLF) was built for multi-dimensional fusion by using two operators,sum (S) and prod (P).Then four algorithms,S-KDE,P-KDE,S-KDEMS,P-KDEMS,were derived.By the comprehensive comparison of the two statistical indicators root mean square error (RMSE) and percentage of SLF (PSLF) which denoted the recognition,P-KDEMS is confirmed as a near-field localization algorithm of multiple sound sources with high robustness and recognition.…”
    Get full text
    Article
  6. 3846
  7. 3847

    A PMBGA to Optimize the Selection of Rules for Job Shop Scheduling Based on the Giffler-Thompson Algorithm by Rui Zhang, Cheng Wu

    Published 2012-01-01
    “…Under such circumstances, a probabilistic model-building genetic algorithm (PMBGA) is proposed to optimize the sequence of selected rules. …”
    Get full text
    Article
  8. 3848

    Image encryption algorithm based on multi-direction pixel continuous folding mechanism and Radon transform by Li SUN, Zhengqian HUANG, Zhenmao XIANG

    Published 2017-09-01
    “…The image encryption algorithm based on multi-direction pixel continuous folding mechanism and Radon transform was proposed.Firstly,the initial plaintext was equally segmented to get left and right sub-blocks.Then the Radon transform was used to obtain the radon projection spectrum image by processing the left and right blocks at 0~180 degrees.And Radon projection spectrum image of left block was permutated by Arnold map,while the Radon projection spectrum image of right block was permutated based on gravity model to get two su-scrambling ciphers,then the entire scrambled image is formed by combining them.To diffuse pixels from multiple directions in space,four direction continuous folding mechanism was designed to change the pixel values by using the diffusion function corresponding to four different directions for realizing image encryption.The experimental results show that this algorithm has higher security and attack resistance with more uniform of pixel distribution in output cipher compared with the current image encryption technology.…”
    Get full text
    Article
  9. 3849

    Study on the Rule-based Control Strategy for PHEV According to Two-state Dynamic Programming Algorithm by Wei Hanbing, Zhu Ning

    Published 2018-01-01
    “…A multi-objective optimization function with fuel consumption and SCR outlet’s NOxemission is developed by adopting two states dynamic programming algorithm to solve global optimization problem. Specifically,the battery SOC and SCR temperature is designated as two states respectively which reflect the powertrain system and aftertreatment system dynamics. …”
    Get full text
    Article
  10. 3850

    Resource allocation algorithm for secure communication in UAV-assisted D2D communication network by Xiaowan ZENG, Haijun WANG, Lei HUANG, Dongtang MA

    Published 2024-02-01
    “…To solve the problems of energy limitation, spectrum shortage, and serious co-frequency interference in the unmanned aerial vehicle (UAV)-assisted D2D (device-to-device) communication network under passive eavesdropping, the concept of the network secrecy energy efficiency was introduced by taking into account the secrecy rate and transmit power constraints of each user.Based on the physical layer secure transmission theory, the joint optimization problem of spectrum multiplexing and power control strategies was investigated to maximize the network secrecy energy efficiency.The problem was a nonlinear nonconvex problem, a resource allocation algorithm combining Dinkelbach’s algorithm and the convex approximation algorithm was proposed to transform the nonconvex optimization problem into a geometric planning problem through the convex approximation algorithm and ensure that the original problem converges to the global optimal solution by Dinkelbach’s algorithm.Simulation results show that the proposed algorithm can effectively mitigate the co-channel interference, improve the network secrecy energy efficiency, and balance the relationship between the secure communication performance and power consumption of the network.…”
    Get full text
    Article
  11. 3851

    Requirements-driven and multi-homed-based multipath TCP congestion control algorithm for vehicular network by Nan DING, Tao LIN, Cai-xia SONG, Guo-zhen TAN

    Published 2016-07-01
    “…The algorithm of PTLIA, as proved in proposed simulations and experiments, has shortened the transmission of the high-priority data, under the premise of MPTCP transmission principles.…”
    Get full text
    Article
  12. 3852

    Firefly Algorithm for Cardinality Constrained Mean-Variance Portfolio Optimization Problem with Entropy Diversity Constraint by Nebojsa Bacanin, Milan Tuba

    Published 2014-01-01
    “…This is especially true for swarm intelligence algorithms which represent the newer branch of nature-inspired algorithms. …”
    Get full text
    Article
  13. 3853

    Three Extensions of Tong and Richardson’s Algorithm for Finding the Optimal Path in Schedule-Based Railway Networks by J. Xie, S. C. Wong, S. M. Lo

    Published 2017-01-01
    “…However, three aspects of this algorithm limit its application to high-speed railway networks. …”
    Get full text
    Article
  14. 3854

    Dual-feature speech emotion recognition fusion algorithm based on wavelet scattering transform and MFCC by YING Na, WU Shunpeng, YANG Meng, ZOU Yujian

    Published 2024-05-01
    “…The algorithm was based on the integration of wavelet scattering transform and Mel-frequency cepstral coefficients (MFCC). …”
    Get full text
    Article
  15. 3855

    Queue stability distributed spectrum access algorithm based on Markov model for cognitive radio network by Xiao-hui LI, Jin-zhao ZHANG, Yong-qiang HEI

    Published 2014-03-01
    “…The queue stability of the secondary users in cognitive network was considered.A Markov chain model for the state of users in the cognitive network was constructed and a distributed CSMA algorithm was proposed.The secondary users adjust the parameters of back-off time due to the arrival and service rate to ensure the queue stability.Upper bound of the capacity of secondary users under the collision constrainting to primary user was derived in closed form.If the arrival rate of secondary users is smaller than the upper bound of capacity,queue stability can be ensured by the proposed algorithm.Simulations verified the effectiveness of the algorithm.…”
    Get full text
    Article
  16. 3856

    A Relaxed Self-Adaptive Projection Algorithm for Solving the Multiple-Sets Split Equality Problem by Haitao Che, Haibin Chen

    Published 2020-01-01
    “…In this article, we introduce a relaxed self-adaptive projection algorithm for solving the multiple-sets split equality problem. …”
    Get full text
    Article
  17. 3857
  18. 3858

    MAC Layer Energy Consumption and Routing Protocol Optimization Algorithm for Mobile Ad Hoc Networks by Yaohua Chen, Waixi Liu

    Published 2021-01-01
    “…The MAC layer energy consumption and routing protocol optimization algorithm proposed in this paper can be applied well in various fields.…”
    Get full text
    Article
  19. 3859

    Adaptive genetic algorithm based deep feature selector for cancer detection in lung histopathological images by Avigyan Roy, Priyam Saha, Nandita Gautam, Friedhelm Schwenker, Ram Sarkar

    Published 2025-02-01
    “…In this study, we have used a channel attention-enabled deep learning model as a feature extractor followed by an adaptive Genetic Algorithm (GA) based feature selector. Here, we calculate the fitness score of each chromosome (i.e., a candidate solution) using a filter method, instead of a classifier. …”
    Get full text
    Article
  20. 3860