-
11501
Sum-rate maximization in MIMO NOMA system with imperfect CSI
Published 2019-11-01“…In order to solve the problem of maximizing the sum rate under the constraints of transmission power limitation and users’ rates requirements,precoder and receiver were devised by combining multiple-input multiple-output (MIMO) and non-orthogonal multiple access (NOMA) based on imperfect channel state information (CSI).To take advantage of successive interference cancellation (SIC) techniques to eliminate interference from weak user’s signal,each data stream of the strong user needed to decode the corresponding weak user’s signal.Since the problem formed was non-convex,it was converted into the problem with the difference of two convex functions (D.C.) by using semi-positive definite programming and first-order Taylor expansion,and a penalty function was used to solve the constraint of the rank of the precoding covariance matrix.The simulation results show that compared with the orthogonal multiple access technology,the proposed D.C.algorithm can improve system sum rate.…”
Get full text
Article -
11502
Seamless Integration of RESTful Services into the Web of Data
Published 2012-01-01“…It also shows how these descriptions along with an algorithm to translate SPARQL queries to HTTP requests can be used to integrate RESTful services into a global read-write Web of Data.…”
Get full text
Article -
11503
A Decoupling Control Method for Shunt Hybrid Active Power Filter Based on Generalized Inverse System
Published 2017-01-01“…Based on the analysis of operation principle, the mathematical model of SHAPF is firstly built, which is verified to be invertible using interactor algorithm; then the generalized inverse system of SHAPF is obtained to connect in series with the original system so that the composite system is decoupled under the generalized inverse system theory. …”
Get full text
Article -
11504
TECHNIQUES FOR FORMATION OF FERROELECTRIC PHOTONIC AND PHONONIC CRYSTALS
Published 2017-04-01“…Results of the works executed in Moscow Technological University are briefly described. The algorithm for calculating the technological parameters of domain structure formation by the acoustic-interference method is developed. …”
Get full text
Article -
11505
Spam Email Detection using Naïve Bayes classifier
Published 2025-01-01“…Spam email detection is still a considerable and ongoing challenge in today’s online environment, as the number of unsolicited emails keeps growing exponentially. Various algorithms such as the tree-based model, support vector machine Algorithm, and Convolutional Neural Network have been explored in prior research to tackle this challenge. …”
Get full text
Article -
11506
k-error linear complexity of q-ary sequence of period p<sup>2</sup>
Published 2019-12-01“…Based on element statistics in a matrix,a new efficient computing method for computing the k-error linear complexity of q-ary sequence of period p<sup>2</sup>was proposed,where p,q were odd primes and q modulo p<sup>2</sup>was primitive.A general result and a concrete proof were showed.To verify the correctness of the result,two kinds of q-ary sequence of period p<sup>2</sup>were illustrated.Because the new method does not need iterative calculation and when it is implemented by program and compared with existing algorithms,the results show that the proposed new algorithm is significantly more efficient in calculating k-error linear complexity of q-ary sequence of period p<sup>2</sup>.…”
Get full text
Article -
11507
An Evolutionary Video Assignment Optimization Technique for VOD System in Heterogeneous Environment
Published 2010-01-01“…In order to find a near-optimal solution for such a complex video assignment problem, an evolutionary approach based on genetic algorithm (GA) is proposed. From the results, it is shown that the system performance can be significantly enhanced by efficiently coupling the various techniques.…”
Get full text
Article -
11508
Single Feature Extraction Method of Bearing Fault Signals Based on Slope Entropy
Published 2022-01-01“…Then, some relevant data are computed, and the identification ratios are calculated by the K-nearest neighbor (KNN) algorithm. The experimental result indicated that the identification ratio of SloE is the highest at 97.71% by comparing with the identification ratios of the other five kinds of entropy, which is higher by at least 13.54% than the others and 27.5% higher than the lowest one.…”
Get full text
Article -
11509
Target Tracking with NLOS Detection and Mitigation in Wireless Sensor Networks
Published 2013-11-01“…Combining the movement equation with observation position, the position of mobile target node can be tracked precisely with Kalman filter algorithm. Using the estimated NLOS range errors, we correct the localization result and modify Kalman filter to mitigate the NLOS propagations. …”
Get full text
Article -
11510
On the Computation of the Efficient Frontier of the Portfolio Selection Problem
Published 2012-01-01“…Computational results are provided to test the efficiency of the algorithm and to illustrate its applications. The procedure has been implemented in Mathematica.…”
Get full text
Article -
11511
An Integrated Problem of p-Hub Location and Revenue Management with Multiple Capacity Levels under Disruptions
Published 2019-01-01“…Furthermore, a sample average approximation approach is used for solving the stochastic programming formulation and a genetic algorithm approach is applied for both formulations. …”
Get full text
Article -
11512
Novel node upgradation strategy for migration to elastic optical networks
Published 2018-09-01“…For migration from dense wavelength division multiplexing (DWDM) networks to elastic optical networks (EON),it is required to upgrade the traditional reconfigurable optical add-drop multiplexer (ROADM) to the new-generation ROADM that supports flexible grids.However,for a large-scale optical network,it is generally impossible to upgrade the ROADM nodes all in once; rather,they would be upgraded gradually.For this,it is critical to study different strategies for selecting the ROADM nodes to be upgraded.Also,for the interconnection between different generations of ROADM,the sub-band virtual concatenation (VCAT) technique was employed to enable an optical channel to be established via traversing different types of nodes.An integer liner programming (ILP) model and an efficient heuristic algorithm were developed to jointly select the ROADM nodes to upgraded and assign spectrum resources.Simulation studies show that the proposed strategy for the upgraded node selection is efficient to perform close to the ILP model in terms of the maximum number of FS used in the whole network.…”
Get full text
Article -
11513
The Application of Speech Synthesis Technology Based on Deep Neural Network in Intelligent Broadcasting
Published 2022-01-01“…Further, the scheme for transforming the parameters obtained from the temporary decomposition (TD) algorithm, DNN trains the event vectors obtained from TD decomposition, establishes the transformation model, and recombines with the untransformed event function. …”
Get full text
Article -
11514
Error Analysis and Compensation of a Three-degree-of-freedom Cervical Traction Rehabilitation Mechanisms
Published 2022-07-01“…Firstly, the error modeling is based on the closed vector method, and 11 important errors are identified according to the global error sensitivity; then, based on the given error range, global pose errors and local errors of the moving platform when <italic>z</italic>=600 mm and <italic>z</italic>=650 mm are analyzed; finally, based on the particle swarm algorithm, the optimal solutions for the four sets of error compensation are derived, and the joint experimental simulation analysis is carried out by Matlab and Adams software. …”
Get full text
Article -
11515
Bit-Table Based Biclustering and Frequent Closed Itemset Mining in High-Dimensional Binary Data
Published 2014-01-01“…During the last decade various algorithms have been developed and proposed for discovering overlapping clusters in high-dimensional data. …”
Get full text
Article -
11516
Instantaneous Power Theory with Fourier and Optimal Predictive Controller Design for Shunt Active Power Filter
Published 2014-01-01“…This paper presents a novel harmonic identification algorithm of shunt active power filter for balanced and unbalanced three-phase systems based on the instantaneous power theory called instantaneous power theory with Fourier. …”
Get full text
Article -
11517
STRENGTH SIMULATION OF PLASTIC HELICAL GEARS IN NEW CAR DOOR LOCK BASED ON FINITE ELEMENT ANALYSIS
Published 2017-01-01“…To study the stress of plastic helical gears in the new type car door lock under the working condition,establish the finite element model of helical gear mesh through ABAQUS,the contact process of plastic helical gears is simulated and analyzed based on nonlinear contact algorithm,and obtain the contact stress and bending stress of plastic helical gears. …”
Get full text
Article -
11518
Ternary polynomial based key management scheme for wireless sensor network
Published 2013-12-01“…A ternary polynomial based key management (KMTP) scheme was proposed,which is effective in cluster based wireless sensor networks.Firstly,the base station will give each node one unique identi ier to ensure the validity of the node.Then,algorithm of the inner-cluster and inter-cluster key pre-distribution based on the ternary polynomial of the same order was stated,which can ensure the value of the cracking threshold is bigger than the number of nodes of a clus-ter and all clusters separately,which means it's very hard to be cracked even all nodes of a cluster or all clusters are com-promised.To assure the communication security,inter-cluster multi-hop routing mechanism was designed based on con-structing secure conjunct neighbor table.Finally,the updating parameter and the updating authentication number were in-troduced in rekeying phase.The analysis shows that the proposed scheme can meet the security requirement of key man-agement,and it also has less computation cost and storage cost than the existing schemes.…”
Get full text
Article -
11519
A Clustering Protocol for Wireless Sensor Networks Based on Energy Potential Field
Published 2013-01-01“…The purpose of this paper is to illustrate a clustering protocol LEACH-PF, which is a multihop routing algorithm with energy potential field of divided clusters. …”
Get full text
Article -
11520
Coupled Finite Volume Methods and Extended Finite Element Methods for the Dynamic Crack Propagation Modelling with the Pressurized Crack Surfaces
Published 2017-01-01“…Having constructed the approximation of dynamic extended finite element methods, the derivation of governing equation for dynamic extended finite element methods is presented. The implicit time algorithm is elaborated for the time descritisation of dominant equation. …”
Get full text
Article