-
2461
RSS Localization Algorithm Based on Nonline of Sight Identification for Wireless Sensor Network
Published 2014-07-01“…In this paper, we propose an RSS based localization algorithm in NLOS environment. A NLOS identification algorithm is firstly proposed. …”
Get full text
Article -
2462
IMPLEMENTATION OF MESSAGE EMBEDDING INTO VIDEO USING RSA AND LSB2BIT ALGORITHMS
Published 2024-12-01“…The embedding process utilizes the Least Significant Bit (LSB) algorithm, while encryption and decryption are performed using the RSA algorithm. …”
Get full text
Article -
2463
Sixth-Second Order Normalized Cumulant Blind Equalization Algorithm Based on Oversampling
Published 2014-08-01“…Most existing blind equalization algorithms rely on partial or complete channel identification, but the channel order estimation is always a difficult task. …”
Get full text
Article -
2464
Resource allocation algorithm based on the multi-relay decoding-and-forwarding in OFDM system
Published 2016-04-01“…For the rate maximization problem in OFDM decode-and-forward relay system,a resource allocation algorithm based on the multi-relay forwarding was proposed. …”
Get full text
Article -
2465
Fractional-Order Total Variation Image Restoration Based on Primal-Dual Algorithm
Published 2013-01-01“…This paper proposes a fractional-order total variation image denoising algorithm based on the primal-dual method, which provides a much more elegant and effective way of treating problems of the algorithm implementation, ill-posed inverse, convergence rate, and blocky effect. …”
Get full text
Article -
2466
Improved Fractional Order VSS Inc-Cond MPPT Algorithm for Photovoltaic Scheme
Published 2014-01-01“…Maximum power point tracking (MPPT) algorithm is acting as a significant part in solar power generating system because it varies in the output power from a PV generating set for various climatic conditions. …”
Get full text
Article -
2467
Automatic Optimization of Guidance Guardrail Layout Based on Multi-Objective Evolutionary Algorithm
Published 2024-12-01Subjects: “…multi-objective evolutionary algorithm…”
Get full text
Article -
2468
Evaluating and refining undersea cable path planning algorithms: A comparative study.
Published 2024-01-01“…This paper compares three automated path-planning algorithms based on publicly available data. The algorithms include a Dijkstra-based algorithm (DBA) that improves on the straightforward application of Dijkstra's algorithm, which restricts the path only to the grid edges. …”
Get full text
Article -
2469
Multi-level feedback based time synchronization algorithm for wireless sensor networks
Published 2009-01-01“…Aiming at the fast and efficient time synchronization protocol for the wireless sensor networks under resource constraints, a novel feedback-based full-scale time synchronization(FTS) algorithm was proposed.The basic idea of FTS is to execute iteratively time synchronization downlink operations on all the nodes of the wireless sensor network and collect the two-way path delay information from only a part of nodes to calculate the average delay adjustment per hop.The stochastically feedback scheme is adopted to reduce the uplink packets.The FTS algorithm also consists of the mechanisms of synchronization error monitoring and clock skew correction.The FTS was implemented on the popular TelosB sensor nodes from UC Berkeley.The experiments show that FTS is a fast, resource-efficient algorithm with ra-tional synchronization precision.…”
Get full text
Article -
2470
Towards a throughput-optimal routing algorithm for data collection on satellite networks
Published 2016-07-01“…For delay performance, we embed a distance factor into the objective of the framework and derive a geographic-location-aware backpressure algorithm. Further, we exploit transmission opportunities missed by backpressure-type algorithms to accelerate data transfer. …”
Get full text
Article -
2471
Multi-power level mobile beacon assisted distributed node localization algorithm
Published 2009-01-01“…In the scheme, a mobile beacon broadcasts packets with multi-power level on its trajectory, and then unknown nodes that receive packets will derive a set of quadratic inequality constraints and run a convex position estimation algorithm. Simulation results show that the proposed method can perform well without range.…”
Get full text
Article -
2472
Android malware detection method based on permission sequential pattern mining algorithm
Published 2013-08-01“…In order to detect unknown Android malwares, an Android malware detection method based on per-mission sequential pattern mining algorithm was proposed. The proposed method design a permission sequential pattern mining algorithm PApriori to dig out permissions association. …”
Get full text
Article -
2473
Research on Word Vector Training Method Based on Improved Skip-Gram Algorithm
Published 2022-01-01“…In view of the shortcomings of the traditional skip-gram model in coding and modeling the processing of context words, this study proposes an improved word vector-training method based on skip-gram algorithm. Based on the analysis of the existing skip-gram model, the concept of distribution hypothesis is introduced. …”
Get full text
Article -
2474
Single anchor node real-time positioning algorithm based on the antenna array
Published 2017-05-01“…Finally, the algorithm is evaluated by experiments in real environments. …”
Get full text
Article -
2475
Analysis and verification on space probe performance of 2-D spectrum estimation algorithm
Published 2016-05-01“…According to the analysis requirement of the space probe performance of 2-D spectrum estimation algorithm,a brief introduction of the 2-D spectrum estimation algorithms was given in the view of calculating speed,calculating volume,stability,accuracy and practical application.These algorithms were the spectrum estimation algorithms of the 2-D MUSIC,the 2-D interference and the 2-D MEMP with the L-shaped array.The estimation performance of the algorithms were analyzed by simulations,the angle root mean square error of three algorithms were compared and analyzed.Simulation results show that the performance of the 2-D MEMP is the best,the performance of the 2-D interference algorithm is the worst,and the performance of the 2-D MUSIC is moderate.Meanwhile,the experimental scene was constructed,and the space probe performance of the 2-D spectrum estimation algorithm was analyzed by real data.The experimental results were consistent with the simulation results.Based on this,the 2-D MEMP algorithm may be further applied in the radar and TT&C system.…”
Get full text
Article -
2476
Design Optimization for Vibration Reduction of Viscoelastic Damped Structures Using Genetic Algorithms
Published 2009-01-01“…Due to the large number of design variables that can be present in complex systems incorporating visco-elastic damping, this work examines the application of genetic algorithms in optimizing the response of these structures. …”
Get full text
Article -
2477
Solving degree-constrained multicast routing problem by a heuristic genetic algorithm
Published 2007-01-01Subjects: Get full text
Article -
2478
A tensor compression algorithm using Tucker decomposition and dictionary dimensionality reduction
Published 2020-04-01“…Tensor compression algorithms play an important role in the processing of multidimensional signals. …”
Get full text
Article -
2479
Research on the Adaptive Fusion Timing Algorithm for BeiDou and LORAN Based on the EKF
Published 2025-01-01Subjects: Get full text
Article -
2480
Parameter Optimization and Experimental Verification of V-belt CVT based on Genetic Algorithm
Published 2020-02-01“…A V-belt CVT mechanical model is established, and the CVT speed regulation characteristics are analyzed and simulated in Matlab. The genetic algorithm is used to optimize the key parameters of CVT with the aim of improving the power. …”
Get full text
Article