-
1821
Inverse Kinematics Solution for Manipulators Based on the Artificial Evolved Hummingbird Algorithm
Published 2024-12-01Subjects: “…Artificial evolved hummingbird algorithm…”
Get full text
Article -
1822
Performance analysis and testing of personal influence algorithm in online social networks
Published 2018-10-01“…Social influence is the key factor to drive information propagation in online social networks and can be modeled and analyzed with social networking data.As a kind of classical personal influence algorithm,two parallel implementation versions of a PageRank based method were introduced.Furthermore,extensive experiments were conducted on a large-scale real dataset to test the performance of these parallel methods in a distributed environment.The results demonstrate that the computational efficiency of the personal influence algorithm can be improved significantly in massive data sets by virtue of existing big data processing framework,and provide an empirical reference for the future research and optimization of the algorithm as well.…”
Get full text
Article -
1823
Image and video resizing algorithm based on importance diffusion and adaptive scaling
Published 2011-01-01“…An image and video resizing algorithm was proposed based on importance map diffusion and adaptive scaling.It compromised between the protections of image content and important regions.To avoid the image distortion by exces-sive deletion of un-important regions,the importance of current row and column was spread to their neighboring pixels.To protect importance regions,different weighting coefficients were allocated to every row and column in terms of their importance by adaptive scaling function.Moreover,it was also effective for video resizing by incorporating the constraint of temporal coherency.Experimental results show that compared with other techniques such as cropping and seam carv-ing,satisfactory results were achieved by the proposed approach.…”
Get full text
Article -
1824
IMPROVED TIME DOMAIN BLIND DECONVOLUTION ALGORITHM IN BEARING FAULT DIAGNOSIS
Published 2016-01-01“…An improved blind deconvolution algorithm which based on generalized morphological filtering and improved KL distance clustering methods was proposed to deal with industrial field noise,multi interference sources and disadvantage of blind extraction algorithm. …”
Get full text
Article -
1825
False Financial Statement Identification Based on Fuzzy C-Means Algorithm
Published 2021-01-01“…In this paper, the fuzzy C-means (FCM) clustering method is used to amplify these differences and thus identify false financial statements. In the proposed algorithm, firstly, the normalization constraint of the FCM clustering algorithm on the sum of affiliation of individual samples is relaxed to the constraint on the sum of affiliation of all samples, thus reducing the sensitivity of the algorithm to noise and isolated points; secondly, a new affiliation correction method is proposed to address the problem that the difference in affiliation is too large after the relaxation of the constraint. …”
Get full text
Article -
1826
Wireless Channel Model Based on Ray Tracing Algorithm in the Sea Environment
Published 2024-01-01“…Moreover, the reverse RT algorithm has the advantages of fast calculation speed and high efficiency. …”
Get full text
Article -
1827
M-APSK phase detection algorithm and parallel carrier synchronization method
Published 2024-03-01“…In order to realize the precise phase correction of high order modulation in M-APSK modem, the Q-power non-data aided phase detection method recommended by DVB-S2 standard for 16APSK and 32APSK was extended to 64APSK, 128APSK and 256APSK.An improved algorithm was proposed to solve the problem of unstable loop operation when the proportion of constellation points used for phase detection in high-order modulation was low.By using threshold judgment on the amplitude of the received symbol after power normalization, phase detection was performed only when the amplitude was higher than the threshold, and the filter state and phase compensation value were not changed when the amplitude was lower than the threshold, so as to improve the phase detection effectiveness and reliability of constellation points and reduce the lock threshold.Aiming at the problem that the symbol rate of high-speed data transmission was very high but the working clock frequency of the processor was relatively low, a parallel carrier synchronization method for M-APSK was proposed, which could meet the needs of the receiver’s working clock.Compared with the traditional constant coding and modulation (CCM) carrier synchronization loop, the parallel method could also be applied to the frequency tracking of variable coding and modulation (VCM) system.…”
Get full text
Article -
1828
A Variable Neighborhood Walksat-Based Algorithm for MAX-SAT Problems
Published 2014-01-01“…This paper introduces a variable neighborhood walksat-based algorithm. The neighborhood structure can be combined easily using any local search algorithm. …”
Get full text
Article -
1829
Green virtual topology design algorithm based on constraint-based routing
Published 2014-04-01“…To reduce the energy consumption of Internet core network, a formulation model for green virtual topology design (GVTD) problem was developed, which employs the following measures: traffic aggregation, network resources allocation on demand, virtual topology design dynamically and multi-granularity sleeping. A heuristic algorithm base on constraint-based routing, namely CBR-GVTD, was proposed, which combines the single-hop and multi-hop routing to establish virtual topology, and makes trade-offs between the network power consumption and routing performance via the constraint-based routing mechanism. …”
Get full text
Article -
1830
RESEARCH ON THE EXPLICIT ALGORITHM OF THE ROLL FLATTENING RADIUS IN HOT CONTINUOUS ROLLING
Published 2015-01-01Subjects: Get full text
Article -
1831
Efficient PAPR reduction algorithm in OFDM based on nonlinear piecewise companding
Published 2021-12-01“…Focusing on the high peak-to-average power ratio (PAPR) problem in orthogonal frequency division multiplexing (OFDM) systems, a generalized hybrid of rayleigh and sine distribution based nonlinear companding algorithm for PAPR reduction in OFDM systems was provided.For the proposed algorithm, signal samples with small amplitudes remain unchanged.For the signal samples with large amplitudes, their probability density function were changed from rayleigh distribution to sine-based distribution.The proposed algorithm can effectively reduce the PAPR, and at the same time, maintain the bit error rate performance and power spectral density performance.Simulation results indicate that with the same PAPR performance, compared with referred companding schemes, the proposed algorithm has lower bit error rate and out of band radiation.…”
Get full text
Article -
1832
Research on a cooperative spectrum sensing algorithm based on energy-constraint
Published 2012-11-01Get full text
Article -
1833
A novel algorithm for crack path identification based on infrared images
Published 2019-02-01“…We first test some commonly available infrared image filtering techniques, and then we introduce a new robust algorithm to identify the position of the dynamic crack. …”
Get full text
Article -
1834
Cartoon Image Encryption Algorithm by a Fractional-Order Memristive Hyperchaos
Published 2019-01-01“…Finally, an image encryption algorithm is proposed based on the fractional-order memristive hyperchaos. …”
Get full text
Article -
1835
Discriminative zero-watermarking algorithm based on region XOR and ternary quantization
Published 2022-02-01“…Aiming at the problem that the current zero-watermark algorithm is insufficient in distinguishing the zero-watermark generated by the attacked image and the false-alarm image, a high-resolution zero-watermarking algorithm based on regional XOR and ternary quantization was proposed.In the process of zero watermark generation, the spatial and frequency domain features of the image were first extracted, the carrier feature and copyright watermark were redundantly constructed, and the frequency domain feature was used as an index to divide the redundant watermark into two regions, which were respectively related to the spatial domain features and the copyright watermark.The chaotic matrix was XOR, and the two regions after XOR were combined to obtain zero watermark.In the copyright authentication process, the airspace and frequency domain features were extracted from the attacked image, and the frequency domain feature was used as an index to divide the zero watermark into two regions, which were XOR with the airspace feature and the chaotic matrix respectively, and the redundantly constructed watermark was extracted.The image, after de-redundancy operation, was quantized into a matrix with only three values as the result of copyright authentication.The experimental results show that the proposed algorithm can effectively solve the false alarm problem of image zero watermark, and at the same time has high robustness under various attacks, the feature extraction algorithm can be arbitrarily replaced, and has high scalability.…”
Get full text
Article -
1836
An ACOA-AFSA Fusion Routing Algorithm for Underwater Wireless Sensor Network
Published 2012-05-01“…Basic ant colony optimization algorithm (ACOA) is an intelligent heuristic algorithm which has good robustness, distributed computing and combines with other algorithms easily. …”
Get full text
Article -
1837
New design method of space-frequency coding and fast detection algorithm
Published 2009-01-01“…To analyze the performance of space-frequency codes,the Chernoff bound was used in the existing literatures,but it was too loose to conclude the diversity order and coding gain simultaneously.Therefore,a new view of the transmission of space-frequency codes was addressed,which transformed the transmission in frequency selective channels into flat fading channels.Based on this transformation,the performance analysis of space-time coding in flat fading channels was used to present an asymptotic analysis for the performance of space-frequency coding.Then,the design criterion of the full diver-sity-achieving space-frequency code was concluded and the coding gain was also optimized.The analysis was more univer-sal and owned an intelligible comprehension.It integrated the existing analysis of the space-frequency codes.A fast detection algorithm for the code was also proposed.It exploited the trellis decoding method and had a reduced complexity compared with the ML detection.The simulation results confirm the validity of the design criterion.…”
Get full text
Article -
1838
Efficent-cutting packet classification algorithm based on the statistical decision tree
Published 2014-10-01“…Packet classification algorithms based on decision tree are easy to implement and widely employed in high-speed packet classification.The primary objective of constructing a decision tree is minimal storage and searching time complexity.An improved decision-tree algorithm is proposed based on statistics and evaluation on filter sets.HyperEC algorithm is a multiple dimensional packet classification algorithm.The proposed algorithm allows the tradeoff between storage and throughput during constructing decision tree.For it is not sensitive to IP address length,it is suitable for IPv6 packet classification as well as IPv4.The algorithm applies a natural and performance-guided decision-making process.The storage budget is preseted and then the best throughput is achieved.The results show that the HyperEC algorithm outperforms the HiCuts and HyperCuts algorithm,improving the storage and throughput performance and scalable to large filter sets.…”
Get full text
Article -
1839
Genomic and algorithm-based predictive risk assessment models for benzene exposure
Published 2025-01-01“…Subsequent steps included the application of three machine learning algorithms for key gene identification, and the validation of these genes within both a cohort exposed to benzene and a benzene-exposed mice model. …”
Get full text
Article -
1840
Adaptive digital watermarking algorithm under image quad-tree partition
Published 2017-12-01“…An adaptive digital watermarking algorithm based on image quad-tree partition was proposed.The original image was approximated by various least square polynomial patches at multiple scales and was organized by a quad-tree structure.At the same time,this representation also reflected the texture information of image.By calculating the watermark embedding intensity in different regions,an adaptive digital watermarking scheme based on the number of the refined meshes in each region was realized.The experiment results show that this algorithm has the good imperceptibility and robustness.…”
Get full text
Article