Showing 12,581 - 12,600 results of 19,511 for search '"algorithm"', query time: 0.10s Refine Results
  1. 12581

    An Optimal Design of Multiple Antenna Positions on Mobile Devices Based on Mutual Coupling Analysis by Peerapong Uthansakul, Danai Assanuk, Monthippa Uthansakul

    Published 2011-01-01
    “…In this paper, genetic algorithm (GA) is used to find the optimal antenna positions on a mobile device. …”
    Get full text
    Article
  2. 12582

    Performance and Implementation Evaluation of TR PAPR Reduction Methods for DVB-T2 by Mohamad Mroué, Amor Nafkha, Jacques Palicot, Benjamin Gavalda, Nelly Dagorne

    Published 2010-01-01
    “…Finally, we describe the implementation of a PAPR reduction algorithm in the DVB-T2 modulator.…”
    Get full text
    Article
  3. 12583

    A video steganalysis method based on coding cost variation by Jianyi Liu, Cong Zhang, Ru Zhang, Yi Li, Jie Cheng

    Published 2021-02-01
    “…Aiming at the problems existing in existing steganalysis algorithms, this article proposes Motion Vector Coding Cost Change video steganalysis features based on Improved Motion Vector Reversion-Based features and Subtractive Probability of Coding Cost Optimal Matching features based on Subtractive Probability of Optimal Matching features from the perspective of the change of coding cost. …”
    Get full text
    Article
  4. 12584

    HRM: An Intelligent Helmet Recognition Model in Complex Scenes by Panbo He, Chunxue Wu, Rami Yared, Yuanhao Ma

    Published 2022-01-01
    “…Compared with SSD, YOLOv3, and YOLOv5, the average accuracy of this algorithm is improved by 6.89%, 8.28%, and 2.44% and has strong generalization ability in dense scenes and small target scenes, which meets the accuracy requirements of helmet wearing detection in engineering applications.…”
    Get full text
    Article
  5. 12585

    Multiple Attribute Trigonometric Decision-Making and Its Application to the Selection of Engineers by M. Palanikumar, K. Arulmozhi, Omaima Al-Shanqiti, Chiranjibe Jana, Madhumangal Pal

    Published 2023-01-01
    “…In addition, we acquired a flowchart and an algorithm that interact with MADM and are called ST-PyNSNIVWA, ST-PyNSNIVWG, ST-GPyNSNIVWA, and ST-GPyNSNIVWG, respectively. …”
    Get full text
    Article
  6. 12586

    Graph-to-sequence deep reinforcement learning based complex task deployment strategy in MEC by Zhuo CHEN, Mintao CAO, Zhiyuan ZHOU, Xin HUANG, Yan LI

    Published 2024-03-01
    “…With the help of mobile edge computing (MEC) and network virtualization technology, the mobile terminals can offload the computing, storage, transmission and other resource required for executing various complex applications to the edge service nodes nearby, so as to obtain more efficient service experience.For edge service providers, the optimal energy consumption decision-making problem when deploying complex tasks was comprehensively investigated.Firstly, the problem of deploying complex tasks to multiple edge service nodes was modeled as a mixed integer programming (MIP) model, and then a deep reinforcement learning (DRL) solution strategy that integrated graph to sequence was proposed.Potential dependencies between multiple subtasks through a graph-based encoder design were extracted and learned, thereby automatically discovering common patterns of task deployment based on the available resource status and utilization rate of edge service nodes, and ultimately quickly obtaining the deployment strategy with the optimal energy consumption.Compared with representative benchmark strategies in different network scales, the experimental results show that the proposed strategy is significantly superior to the benchmark strategies in terms of task deployment error ratio, total power consumption of MEC system, and algorithm solving efficiency.…”
    Get full text
    Article
  7. 12587

    Modelling and Assertion-Based Verification of Run-Time Reconfigurable Designs Using Functional Programming Abstractions by Bahram N. Uchevler, Kjetil Svarstad

    Published 2018-01-01
    “…Assertions can be used to verify specifications of designs in different verification methods such as simulation-based and formal verification. A partitioning algorithm is proposed for clustering the assertion-checker circuits to implement the verification circuits in a limited reconfigurable area in the target FPGA. …”
    Get full text
    Article
  8. 12588

    Exploring Coevolution of Emotional Contagion and Behavior for Microblog Sentiment Analysis: A Deep Learning Architecture by Qi Zhang, Zufan Zhang, Maobin Yang, Lianxiang Zhu

    Published 2021-01-01
    “…Secondly, in the weighted network, the Deepwalk algorithm is used to build the sequence representation of microblogs which are similar to the target microblog. …”
    Get full text
    Article
  9. 12589

    Discrete Particle Swarm Optimization with Scout Particles for Library Materials Acquisition by Yi-Ling Wu, Tsu-Feng Ho, Shyong Jian Shyu, Bertrand M. T. Lin

    Published 2013-01-01
    “…To tackle the constrained problem, we propose a discrete particle swarm optimization (DPSO) with scout particles, where each particle, represented as a binary matrix, corresponds to a candidate solution to the problem. An initialization algorithm and a penalty function are designed to cope with the constraints, and the scout particles are employed to enhance the exploration within the solution space. …”
    Get full text
    Article
  10. 12590

    A MultiModal Detection Method for UHV Substation Faults Based on Robot Inspection and Deep Learning by Rong Meng, Zhao-lei Wang, Zhi-long Zhao, Jian-peng Li, Wei-ping Fu

    Published 2022-01-01
    “…The average detection accuracy under multiple intersection ratio thresholds is also the highest, and the performance is better than the other three comparison algorithms.…”
    Get full text
    Article
  11. 12591

    On novel security systems based on the 2-cyclic refined integers and the foundations of 2-cyclic refined number theory by Mohammad Abobala, Hasan Sankari, Mohamed Zeina

    Published 2024-03-01
    “…Integers play a basic role in the structures of asymmetric crypto-algorithms. Many famous public key crypto-schemes use the basics of number theory to share keys and decrypt and encrypt messages and multimedia. …”
    Get full text
    Article
  12. 12592

    Allocation Optimization of Multi-Axis Suspension Dynamic Parameter for Tracked Vehicle by Qihui Ling, Juchuan Dai, Xingyun He, Shengzhao Chen, Zhewu Chen

    Published 2021-01-01
    “…Then, the evaluation index and its quantitative algorithm, which reflect the multi-aspect performance of the suspension system, are proposed. …”
    Get full text
    Article
  13. 12593

    RESEARCH CONCAVE CIRCULAR HOLE TEMPLATE LINEAR VARIABLE THICKNESS STIFFNESS AND STRENGTH THEORIES by LI ShaoJie

    Published 2015-01-01
    “…This paper studies linear variable thickness circular aperture concave template theory of stiffness and strength calculation.First,set up mechanical model:Template for circular concave,outside the perimeter fixed; center has a round hole,inside the perimeter free,outside under uniformly distributed vertical load.Secondly,the establishment of mathematical model:Derivation of concave template in the axisymmetric condition,ordinary differential equation with variable coefficients of elastic curved surface,and gives the mathematical expressions of boundary conditions.Again,in view of the differential equation boundary value problem,the displacement method and the Matlab algorithm,it is concluded that the deflection of concave template function,and establish the stiffness calculation condition of concave template.Then,determine the concave template on the bending moment and the maximum bending moment and stress,so as to establish a concave template strength calculation conditions.Finally,numerical examples.This paper presents the function solutions,to change law of control concave template section variable parameters.In this way,not only highlight the interdependent relationship between the quantity of each,and optimization,and discussion and application.The result is suitable for uniform,continuous,isotropic material artifacts.Because in the process of calculation and data processing with error,so the formula is similar.…”
    Get full text
    Article
  14. 12594

    METHODOLOGY TO IMPROVE THE ACCURACY OF DETERMINING THE POSITION OF UAVS EQUIPPED WITH SINGLE-FREQUENCY RECEIVERS FOR THE PURPOSES OF GATHERING DATA ON AVIATION OBSTACLES by Marta LALAK, Kamil KRASUSKI, Damian WIERZBICKI

    Published 2023-06-01
    “…The paper presents a research experiment aimed at improving the accuracy of the determination of the coordinates of UAV for the SPP method, in real time. The algorithm of the SPP method was improved with the use of IGS products.…”
    Get full text
    Article
  15. 12595

    Petrochemical Equipment Detection by Improved Yolov5 with Multiscale Deep Feature Fusion and Attention Mechanism by Zhenqiang Wei, Shaohua Dong, Xuchu Wang

    Published 2022-01-01
    “…Moreover, an adaptive anchor generation algorithm is proposed to handle objects with extreme sizes in a complex background. …”
    Get full text
    Article
  16. 12596

    Testing Homogeneity in a Semiparametric Two-Sample Problem by Yukun Liu, Pengfei Li, Yuejiao Fu

    Published 2012-01-01
    “…Under the semiparametric assumption g(x)=f(x)eα+βx, a penalized empirical likelihood ratio test could be constructed, but its implementation is hindered by the fact that there is neither feasible algorithm for computing the test statistic nor available research results on its theoretical properties. …”
    Get full text
    Article
  17. 12597

    Digitally twin driven ship cooling pump fault monitoring system and application case by Shaojuan Su, Zhe Miao, Yong Zhao, Nanzhe Song

    Published 2024-01-01
    “…Using the random forest algorithm for data training and testing, the results showed that the root mean square error for the training set was 0.0037873, and for the test set, it was 0.008929, indicating high accuracy in predicting the status of cooling pumps. …”
    Get full text
    Article
  18. 12598

    Adaptive and Resilient Flight Control System for a Small Unmanned Aerial System by Gonzalo Garcia, Shahriar Keshmiri

    Published 2013-01-01
    “…The real-time artificial neural network parameter identification is done using the sliding mode learning concept and a modified version of the self-adaptive Levenberg algorithm. Numerically estimated stability and control derivatives are obtained by delta-based methods. …”
    Get full text
    Article
  19. 12599

    Automatic detection of fake reviews at marketplaces using expert-based features and consumers’ reactions by A. N. Borodulina, E. V. Mikhalkova

    Published 2024-10-01
    “…The best result is demonstrated by the support vector machine algorithm in binary classification into reviews with a low and high ratings (without neutral ones). …”
    Get full text
    Article
  20. 12600

    Personal Authentication Using Multifeatures Multispectral Palm Print Traits by Gayathri Rajagopal, Senthil Kumar Manoharan

    Published 2015-01-01
    “…Finally, the images are classified using Local Mean K-Nearest Centroid Neighbor algorithm. The proposed method efficiently accommodates the rotational, potential deformations and translational changes by encoding the orientation conserving features. …”
    Get full text
    Article