-
1101
High-precision symbol timing algorithm for specific emitter identification
Published 2018-08-01“…The existing symbol timing algorithms have the problems that the method of delay estimation is improper and the calculation precision of the interpolation is insufficient for the pretreatment of specific emitter identification.A high-precision symbol timing algorithm was proposed to solve these problems.Aiming at the former problem,a two-step estimation method was adopted,rough estimation of delay was firstly obtained by the forward algorithm,and then the accurate value was acquired through local search with the demodulated symbols.For the latter problem,a window-based approach was used to design an interpolating filter which could optimize the anti-aliasing characteristics and improve the calculation accuracy.Simulation results show that the proposed algorithm can effectively solve the above problems and achieve better recognition results in the radiation source recognition compared with the conventional symbol timing algorithm.…”
Get full text
Article -
1102
A Cooperative Coevolutionary Cuckoo Search Algorithm for Optimization Problem
Published 2013-01-01“…Taking inspiration from an organizational evolutionary algorithm for numerical optimization, this paper designs a kind of dynamic population and combining evolutionary operators to form a novel algorithm, a cooperative coevolutionary cuckoo search algorithm (CCCS), for solving both unconstrained, constrained optimization and engineering problems. …”
Get full text
Article -
1103
Multi-level local differential privacy algorithm recommendation framework
Published 2022-08-01“…Local differential privacy (LDP) algorithm usually assigned the same protection mechanism and parameters to different users.However, it ignored the differences among the device resources and the privacy requirements of different users.For this reason, a multi-level LDP algorithm recommendation framework was proposed.The server and the users’ requirements were considered in the framework, and the multi-users’ differential privacy protections were realized by the server and the users’ multi-level management.The framework was applied to the frequency statistics scenario to form an LDP algorithm recommendation scheme.LDP algorithm was improved to ensure the availability of statistical results, and a collaborative mechanism was designed to protect users’ privacy preferences.The experimental results demonstrate the availability of the proposed scheme.…”
Get full text
Article -
1104
Cognitive radio auto-adaptive sensing algorithm based on POMDP
Published 2013-06-01“…In order to design an appropriate spectrum sensing mechanism in millisecond spectrum hole environment,the optimal data transmission time of secondary users was derived to maximize the data throughput.Furthermore,in order to exploit the millisecond spectrum holes,an auto-adaptive spectrum sensing algorithm based on POMDP (partially observ-able Markov decision process) was proposed.This algorithm executes spectrum sensing or data transmission action in the current decision epoch based on the belief vector and the observation result in the last decision epoch.Simulation results show that the proposed algorithm can constrain the collision probability between primary users and secondary users,and improve systemic spectrum utilization at the same time.…”
Get full text
Article -
1105
An Algorithm for Discretization of Real Value Attributes Based on Interval Similarity
Published 2013-01-01“…The algorithms related to Chi2 algorithm (includes modified Chi2 algorithm and extended Chi2 algorithm) are famous discretization algorithm exploiting the technique of probability and statistics. …”
Get full text
Article -
1106
An Improved Clustering Algorithm of Tunnel Monitoring Data for Cloud Computing
Published 2014-01-01“…To solve this problem, an improved parallel clustering algorithm based on k-means has been proposed. It is a clustering algorithm using the MapReduce within cloud computing that deals with data. …”
Get full text
Article -
1107
Minimum connected dominating set algorithm based on directed diffusion
Published 2008-01-01“…A new minimum connected dominating set algorithm based on directed diffusion MCDSDD was proposed, which attempted to improve the existed area coverage algorithms through introducing node’s gradient in wireless sensor networks. …”
Get full text
Article -
1108
Simple variable tap‐length algorithm for high‐noise environment
Published 2017-03-01Subjects: “…simple variable tap‐length algorithm…”
Get full text
Article -
1109
Indoor positioning algorithm research based on the typicality judgment of RSS
Published 2014-11-01“…In the process of indoor location based on RSS fingerprint,the quality of the obtained similar point set is a key factor for a successful position.And the locating point’s RSS is an important reason which affects the quality of the similar point set.By analyzing the distribution of D-RSS,the concept of RSS’s typicality was proposed firstly,and an indoor localization algorithm based on typicality judgment of RSS was also presented.According to the principle that the RSS values and the effective similar sample points,a typicality discrimination method for RSS values and a self-adapting K value were presented.Confirmed by the experiments,the algorithm not only can find the effective similarity sample points completely,but also can eliminate the non-substantive similarities points,and then can adapt to the different scenes,then have the higher positioning accuracy.…”
Get full text
Article -
1110
Adaptive spectrum sensing algorithm based on cyclostationary spectrum energy
Published 2011-11-01“…Focused on the characteristic of cyclostationary spectrum of signal and the spectrum sensing in low signal-to-noise ratio,an adaptive decision threshold spectrum sensing algorithm was proposed,which combines cyclostationary spectrum sensing with energy detection.By weighting the sum of probabilities of detection and false alarm,estimating the eigenvalues of the cyclostationary spectrum,the algorithm provides an adaptive decision threshold which could differentiate the primary signal from the background noise.The simulation results show that the algorithm could perform well in low signal-to-noise ratio and remove the effect of noise uncertainty on the spectrum sensing.It outperforms maximum-minimum eigenvalue and blind detection with 4dB and 8dB respectively in signal-to-noise ratio,and has robustness to different modulated primary signal.…”
Get full text
Article -
1111
Low-complexity single carrier time domain equalization algorithm
Published 2024-09-01“…Simulation results show that compared with the traditional channel equalization algorithms, the proposed algorithm can achieve similar or better performance with lower complexity.…”
Get full text
Article -
1112
Study on security routing algorithm based on dynamic adjacent trust
Published 2013-06-01Subjects: Get full text
Article -
1113
Chaotic Fruit Fly Algorithm for Solving Engineering Design Problems
Published 2022-01-01“…The aim of this article is to present a chaotic fruit fly algorithm (CFFA) as an optimization approach for solving engineering design problems (EDPs). …”
Get full text
Article -
1114
An insulator target detection algorithm based on improved YOLOv5
Published 2025-01-01“…To address issues with traditional object detection algorithms, such as large parameter counts, low detection accuracy, and high miss rates, this paper proposes an insulator detection algorithm based on an improved YOLOv5 model. …”
Get full text
Article -
1115
Bit-allocation and rate-control algorithm for stereo video coding
Published 2007-01-01“…A new bit-allocation and rate-control algorithm for stereo video coding was proposed to improve its coding efficiency and stream reliability.The conventional quadric rate-distortion model was improved and a new one was introduced by incorporating the human visual system(HVS) characteristics.Experimental results show that the improved new rate-distortion model is more precise than the conventional one and the proposed new algorithm can efficiently implement bit allocation and rate control according to coding parameters.…”
Get full text
Article -
1116
Reversible data hiding algorithm based on asymmetric histogram shifting
Published 2019-10-01“…The shifting of two asymmetric histograms in opposite directions in data embedding respectively had produced the pixel compensation and restore effect,a better reversible data hiding algorithm based on pixel prediction was proposed,two asymmetric histograms of prediction error were generated on the more right and the more left side of zero value,when they were shifed in the second data embedding stage,more pixels would be restored to the original image pixel value to reduce image distortion and improve the image quality.Compared with the traditional algorithm,it reduces the amount of pixels involved in the histogram shifting and protects the quality of secret image.…”
Get full text
Article -
1117
Robust interference alignment algorithm for cognitive MIMO interference network
Published 2016-03-01“…A robust interference alignment algorithm was proposed for underlay cognitive MIMO interference network with imperfect channel-state information (CSI).Firstly,imperfect CSI was characterized by Euclidean ball-shaped uncer-tainty,based on which the optimization model of transmitting precoding and receiving interference subspace matrix was constructed with aimed of minimizing interference leak Then,primary users' interference temperature constraint un-der the worst-case condition was derived according to the matrix norm inequality.Finally,alternate iteration expressions of transceiver matrixes were obtained exploiting Lagrange partial dual-decomposition theory and sub-gradient update method.Moreover,the proposed algorithm's application condition and degrees of freedom range were theoretically ana-lyzed.Simulation results show that the proposed algor m is robust and its secondary users' network performance out-performs existing algorithms'.…”
Get full text
Article -
1118
No-feedback rate control algorithm for Wyner-Ziv video coding
Published 2011-01-01“…To avoid using feedback channel,an encoder rate control algorithm for Wyner-Ziv video coding was proposed.Firstly,using the target frame-rate and the target bit-rate,It could determine the bit allocation for each group-of-picture(GOP).According to the correlation between adjacent frames,the bit budget for a GOP were further allocated to key frame and Wyner-Ziv frames within the GOP by dynamically choosing quantization parameter and quantization matrices.Then,with refinement of correlation-noise model(CNM) parameter,different LDPC(low-density parity-check) check matrices might be chosen for each bitplane to control the encoding bitrate of Wyner-Ziv frame.Experimental results show that the difference between expected target bitrate and actual encoded bitrate is less than 0.57% using the proposed method,and compared with existing algorithm,average PSNR(peak signal-to-noise ratio) of decoded video quality can be increased by 1 dB.In addition,our algorithm slightly increases encoder complexity,and can be used in practice.…”
Get full text
Article -
1119
New signcryption algorithm for secure communication of ad hoc networks
Published 2010-01-01“…At first, a new identity based signcryption algorithm was proposed; its security and efficiency were analyzed. …”
Get full text
Article -
1120
Predicting the Optimal Treatment for Diseases Using Whale Optimization Algorithm
Published 2024-09-01“…The Whale Optimization Algorithm (WOA) will be used to improve predictions for effective disease treatments. …”
Get full text
Article