-
1261
Multimodal Adaptive Identity-Recognition Algorithm Fused with Gait Perception
Published 2021-12-01“…Experimental results show that the proposed algorithms perform well in recognition accuracy, the confusion matrix, and the kappa statistic, and they have better recognition scores and robustness than the compared algorithms; thus, the proposed algorithm has prominent promise in practice.…”
Get full text
Article -
1262
Distance-based target tracking algorithm in binary sensor network
Published 2010-01-01“…A distance-based target tracking algorithm for binary sensor network was proposed.This algorithm can decide the output bit information and compute the weighting simultaneously.The simulation is used to validate the effectiveness of distance-based weighting scheme.This algorithm has good performance,when the target moves linearly,curvilinear,or randomly through the sensing field,and the error distribution of single target position is in .…”
Get full text
Article -
1263
Routing framework and creation algorithm in Ad Hoc based SDN
Published 2019-09-01“…Node energy-limited and mobility,indeed,requirement of customized service,made Ad Hoc press for customization Routing.Based on the core principle of software defined networking (SDN),the control framework and the design of routing creation bran-new approach about Ad Hoc based SDN was analyzed firstly.Secondly,the hierarchical routing model was established,and the problem of routing key nodes and key link centralized selection based on service path was proposed and its algorithm was designed,which could embed customize service into physical networks via nodes mapping based network performance maximization.Finally,it corroborate the advantage of routing implement via SDN in function,performance and the whole networks utilization.Experiments show that the energy consumption of network nodes is more balanced and the overall utilization of the network is nearly 14% higher than the traditional method.…”
Get full text
Article -
1264
M-elite coevolutionary kinetic-molecular theory optimization algorithm
Published 2015-07-01Subjects: “…optimization algorithm…”
Get full text
Article -
1265
Sensitivity analysis of the channel estimation deviation to the MAP decoding algorithm
Published 2006-01-01“…As a necessary input parameter for MAP decoding algorithm,SNR was normally obtained from the channel estimation unit.Corresponding research indicated that SNR estimation deviation degraded significantly the performance of Turbo decoding.MAP decoding algorithm with SNR estimation deviation was investigated in details,and the degradation mechanism of Turbo decoding was explained analytically.The theoretical analysis and computer simulation have disclosed the specific reasons for the performance degradation when SNR estimation is less than the actual value,and for the higher sensitivity of SNR estimation to long frame Turbo codes.…”
Get full text
Article -
1266
Neural network recognition algorithm of breath sounds based on SVM
Published 2014-10-01“…A SVM neural network (support vector machines) for breath sounds recognition algorithm was advanced,breath sounds feature obtained through wavelet analysis were input into neural networks and carried on the training to the training samples as a feature of SVM method input in order to classify the test samples.Three States (normal,mild and severe lesions) of breath sounds were recognized,and K nearest neighbor (KNN) methods are compared .The results show that SVM method has a higher recognition accuracy and can be used to recognize different breath sounds,which settled the local extremum problem that cannot be avoided in the neural network method and provide an effective algorithm for information processing in body area network technology.…”
Get full text
Article -
1267
Trust chain generating and updating algorithm for dual redundancy system
Published 2017-01-01“…In trusted computing field,the traditional construction mode of trust chain is only applicable to a single system.For the dual redundancy system,it causes break of transitive trust.A trust model suitable for dual redundancy system was proposed.Through double trust chain design and IMC/IMV interaction mechanism,the trust chain extension of trust from a computing unit to another unit was realized.On this basis,a trust chain generating and update algorithm for dual redundancy system was proposed.Finally,the validity of the proposed model was proved based on the trusting theory.…”
Get full text
Article -
1268
High resolution ISAR imaging algorithm based on compressive sensing
Published 2013-09-01“…According to the problem that conventional imaging algorithms have some unavoidable shortcomings such as low resolution of image and being fragile to the noise with short coherent processing interval (CPI),an improved ISAR imaging algorithm via CS method,namely,PH-SL0 algorithm,was proposed.In the proposed algorithm,as a kind of measure matrix,partial randomizer Hadamard matrix (PH) has many advantages such as high reconstruction precision and low dimension of measure matrix.Meanwhile,as a reconstruction algorithm,SL0 has many advantages such as demanding fewer measurements than existing methods,having higher reconstructed accuracy and better robust.Therefore,making use of the advantages of PH and SL0,and extending them to the field of radar,the azimuth imaging with short imaging data could be implemented.Finally,simulation results and experimental results of real data show that the algorithm has higher imaging resolution and better robust to noise.…”
Get full text
Article -
1269
An Entropy Optimizing RAS-Equivalent Algorithm for Iterative Matrix Balancing
Published 2023-05-01“…We have developed a new simple iterative algorithm to determine entries of a normalized matrix given its marginal probabilities. …”
Get full text
Article -
1270
CMDC:an iterative algorithm for complementary multi-view document clustering
Published 2020-08-01“…In response to the problems traditional multi-view document clustering methods separate the multi-view document representation from the clustering process and ignore the complementary characteristics of multi-view document clustering,an iterative algorithm for complementary multi-view document clustering——CMDC was proposed,in which the multi-view document clustering process and the multi-view feature adjustment were conducted in a mutually unified manner.In CMDC algorithm,complementary text documents were selected from the clustering results to aid adjusting the contribution of view features via learning a local measurement metric of each document view.The complementary text document of the results among the dimensionality clusters was selected by CMDC,and used to promote the feature tuning of the clusters.The partition consistency of the multi-dimensional document clustering was solved by the measure consistency of the dimensions.Experimental results show that CMDC effectively improves multi-dimensional clustering performance.…”
Get full text
Article -
1271
Actor-critic algorithm with incremental dual natural policy gradient
Published 2017-04-01“…The existed algorithms for continuous action space failed to consider the way of selecting optimal action and utilizing the knowledge of the action space,so an efficient actor-critic algorithm was proposed by improving the natural gradient.The objective of the proposed algorithm was to maximize the expected return.Upper and the lower bounds of the action range were weighted to obtain the optimal action.The two bounds were approximated by linear function.Afterward,the problem of obtaining the optimal action was transferred to the learning of double policy parameter vectors.To speed the learning,the incremental Fisher information matrix and the eligibilities of both bounds were designed.At three reinforcement learning problems,compared with other representative methods with continuous action space,the simulation results show that the proposed algorithm has the advantages of rapid convergence rate and high convergence stability.…”
Get full text
Article -
1272
Algorithm of Adaptive Bit Allocation Wavelet Transform Audio Coding
Published 1998-01-01Get full text
Article -
1273
Improved sphere decoding algorithm based on ±1 quadratic programming
Published 2007-01-01“…With the ±1 quadratic programming of the MIMO detection,the necessary conditions for MIMO detection op-timal solution were derived.An improved sphere decoding algorithm based on these necessary conditions was proposed.The algorithm prunes redundant nodes by necessary conditions based on the origin sphere decoding.With this pruning strategy,the complexity of algorithm is reduced significantly,while holding the bit error rate performance.…”
Get full text
Article -
1274
SDN hypervisor oriented vSDN controller placement algorithm
Published 2017-04-01“…With the development of the future internet technology,the future network architecture which utilizes network virtualization as a tool to solve the rigidity of traditional network becomes the main stream.As a new network architecture,software defined networking provides an effective network virtualization solution.Firstly,related technology of network virtualization in SDN was concluded,distinguished differences between deploying virtual network in SDN and traditional network was compared,and aiming at the virtual network mapping problem in SDN virtualization platform,a latency sensitive SDN virtualization controller placement algorithm.At last,experiment results show that the algorithm not only can assure the delay between SDN controllers and switches in an acceptable range,but also improve the utilization efficiency of network resources.…”
Get full text
Article -
1275
Peningkatan Kinerja Jaringan Dengan Menggunakan Multi-Rule Algorithm
Published 2021-02-01“…To overcome this problem a combination of Multi-Rule Algorithm cache replacement algorithms is performed, in the form of a double combination algorithm FIFO-LRU and triple FIFO-LRU-LFU. …”
Get full text
Article -
1276
Inversion of Bubble Size Distribution Based on Whale Optimization Algorithm
Published 2024-01-01Subjects: “…Whale optimization algorithm…”
Get full text
Article -
1277
Image Blocking Encryption Algorithm Based on Laser Chaos Synchronization
Published 2016-01-01“…The experimental results show that the encryption algorithm image has high security and good antijamming performance.…”
Get full text
Article -
1278
Timeout threshold estimation algorithm in mimic multiple executors architecture
Published 2018-10-01“…Aiming at the problem that the current timeout strategy algorithm is difficult to cope with the violent situation of task volume,a timeout threshold prediction algorithm based on equivalent proportional execution time applied to the mimetic defense architecture system is proposed.The algorithm utilizes the principle that the execution time of multiple functional equivalent executable tasks in the mimetic defense architecture is positively related,predicts the task execution time and sets a reasonable timeout threshold.The simulation results show that the proposed algorithm can dynamically predict and set the timeout threshold for different task situations,which effectively improves the timeout judgment efficiency,especially for scenarios with dramatic changes in workload.…”
Get full text
Article -
1279
RANSAC based robust localization algorithm for visual sensor network
Published 2013-08-01“…Due to node failures or environmental changes,observed data on the target will be error in visual sensor network,so the least squares based multi-vision localization algorithm won’t be accurate.A centralized RANSAC based robust localization method was proposed,which can remove the error data and improve the positioning accuracy.Furthermore,to address this issue,energy imbalance of network nodes in centralized RANSAC where all computing load is executed in one single node,a robust localization algorithm based on distributed RANSAC was also proposed,which can distribute a large number of iterative calculations into each node averagely to ensure the network balance on calculation and energy without affecting the robustness.Finally,through comparing experiments on no-RANSAC,cen-RANSAC and dis-RANSAC,it’s verified that this algorithm can obtain robust and good positioning results in a predetermined probability,and the time complexity was analyzed via experiment.…”
Get full text
Article -
1280
Research on PCB defect detection algorithm based on LPCB-YOLO
Published 2025-01-01Get full text
Article