Showing 1,461 - 1,480 results of 19,511 for search '"algorithm"', query time: 0.15s Refine Results
  1. 1461

    Wireless Channel Model Based on Ray Tracing Algorithm in the Sea Environment by Zhongyu Liu, Qi Yao, Quanqing Li, Lixin Guo, Shuo Hu

    Published 2024-01-01
    “…Moreover, the reverse RT algorithm has the advantages of fast calculation speed and high efficiency. …”
    Get full text
    Article
  2. 1462

    M-APSK phase detection algorithm and parallel carrier synchronization method by Hao HUAN, Kexue REN

    Published 2024-03-01
    “…In order to realize the precise phase correction of high order modulation in M-APSK modem, the Q-power non-data aided phase detection method recommended by DVB-S2 standard for 16APSK and 32APSK was extended to 64APSK, 128APSK and 256APSK.An improved algorithm was proposed to solve the problem of unstable loop operation when the proportion of constellation points used for phase detection in high-order modulation was low.By using threshold judgment on the amplitude of the received symbol after power normalization, phase detection was performed only when the amplitude was higher than the threshold, and the filter state and phase compensation value were not changed when the amplitude was lower than the threshold, so as to improve the phase detection effectiveness and reliability of constellation points and reduce the lock threshold.Aiming at the problem that the symbol rate of high-speed data transmission was very high but the working clock frequency of the processor was relatively low, a parallel carrier synchronization method for M-APSK was proposed, which could meet the needs of the receiver’s working clock.Compared with the traditional constant coding and modulation (CCM) carrier synchronization loop, the parallel method could also be applied to the frequency tracking of variable coding and modulation (VCM) system.…”
    Get full text
    Article
  3. 1463

    A Variable Neighborhood Walksat-Based Algorithm for MAX-SAT Problems by Noureddine Bouhmala

    Published 2014-01-01
    “…This paper introduces a variable neighborhood walksat-based algorithm. The neighborhood structure can be combined easily using any local search algorithm. …”
    Get full text
    Article
  4. 1464

    Green virtual topology design algorithm based on constraint-based routing by Yuan-sheng WU, Bing GUO, Yan SHEN, Ji-he WANG, Xiao-bin LIU

    Published 2014-04-01
    “…To reduce the energy consumption of Internet core network, a formulation model for green virtual topology design (GVTD) problem was developed, which employs the following measures: traffic aggregation, network resources allocation on demand, virtual topology design dynamically and multi-granularity sleeping. A heuristic algorithm base on constraint-based routing, namely CBR-GVTD, was proposed, which combines the single-hop and multi-hop routing to establish virtual topology, and makes trade-offs between the network power consumption and routing performance via the constraint-based routing mechanism. …”
    Get full text
    Article
  5. 1465

    Efficient PAPR reduction algorithm in OFDM based on nonlinear piecewise companding by Zhitong XING, Yun LI, Deyi PENG, Bensi ZHANG, Kaiming LIU, Yuan’an LIU

    Published 2021-12-01
    “…Focusing on the high peak-to-average power ratio (PAPR) problem in orthogonal frequency division multiplexing (OFDM) systems, a generalized hybrid of rayleigh and sine distribution based nonlinear companding algorithm for PAPR reduction in OFDM systems was provided.For the proposed algorithm, signal samples with small amplitudes remain unchanged.For the signal samples with large amplitudes, their probability density function were changed from rayleigh distribution to sine-based distribution.The proposed algorithm can effectively reduce the PAPR, and at the same time, maintain the bit error rate performance and power spectral density performance.Simulation results indicate that with the same PAPR performance, compared with referred companding schemes, the proposed algorithm has lower bit error rate and out of band radiation.…”
    Get full text
    Article
  6. 1466
  7. 1467
  8. 1468

    A novel algorithm for crack path identification based on infrared images by Luca Romanin, Alexei Vinogradov, Filippo Berto, Paolo Ferro

    Published 2019-02-01
    “…We first test some commonly available infrared image filtering techniques, and then we introduce a new robust algorithm to identify the position of the dynamic crack.  …”
    Get full text
    Article
  9. 1469

    Cartoon Image Encryption Algorithm by a Fractional-Order Memristive Hyperchaos by Shu-ying Wang, Jian-feng Zhao, Xiao-yan Wang, Li-tao Zhang

    Published 2019-01-01
    “…Finally, an image encryption algorithm is proposed based on the fractional-order memristive hyperchaos. …”
    Get full text
    Article
  10. 1470

    Discriminative zero-watermarking algorithm based on region XOR and ternary quantization by Deyang WU, Sen HU, Miaomiao WANG, Haibo JIN, Changbo QU, Yong TANG

    Published 2022-02-01
    “…Aiming at the problem that the current zero-watermark algorithm is insufficient in distinguishing the zero-watermark generated by the attacked image and the false-alarm image, a high-resolution zero-watermarking algorithm based on regional XOR and ternary quantization was proposed.In the process of zero watermark generation, the spatial and frequency domain features of the image were first extracted, the carrier feature and copyright watermark were redundantly constructed, and the frequency domain feature was used as an index to divide the redundant watermark into two regions, which were respectively related to the spatial domain features and the copyright watermark.The chaotic matrix was XOR, and the two regions after XOR were combined to obtain zero watermark.In the copyright authentication process, the airspace and frequency domain features were extracted from the attacked image, and the frequency domain feature was used as an index to divide the zero watermark into two regions, which were XOR with the airspace feature and the chaotic matrix respectively, and the redundantly constructed watermark was extracted.The image, after de-redundancy operation, was quantized into a matrix with only three values as the result of copyright authentication.The experimental results show that the proposed algorithm can effectively solve the false alarm problem of image zero watermark, and at the same time has high robustness under various attacks, the feature extraction algorithm can be arbitrarily replaced, and has high scalability.…”
    Get full text
    Article
  11. 1471

    An ACOA-AFSA Fusion Routing Algorithm for Underwater Wireless Sensor Network by Huafeng Wu, Xinqiang Chen, Chaojian Shi, Yingjie Xiao, Ming Xu

    Published 2012-05-01
    “…Basic ant colony optimization algorithm (ACOA) is an intelligent heuristic algorithm which has good robustness, distributed computing and combines with other algorithms easily. …”
    Get full text
    Article
  12. 1472

    PREDICTION OF TELECOM SERVICES CONSUMERS CHURN BY USING MACHINE LEARNING ALGORITHMS by Edin Osmanbegović, Anel Džinić, Mirza Suljić

    Published 2022-11-01
    “…Some of the most commonly used machine learning algorithms for this issue are Logistic Regression, Gaussian Naive Bayes, Bernoulli Naive Bayes, Decision Tree, and Random Forest. …”
    Get full text
    Article
  13. 1473

    New design method of space-frequency coding and fast detection algorithm by WANG Xin, WEI Ji-bo, LI Ying

    Published 2009-01-01
    “…To analyze the performance of space-frequency codes,the Chernoff bound was used in the existing literatures,but it was too loose to conclude the diversity order and coding gain simultaneously.Therefore,a new view of the transmission of space-frequency codes was addressed,which transformed the transmission in frequency selective channels into flat fading channels.Based on this transformation,the performance analysis of space-time coding in flat fading channels was used to present an asymptotic analysis for the performance of space-frequency coding.Then,the design criterion of the full diver-sity-achieving space-frequency code was concluded and the coding gain was also optimized.The analysis was more univer-sal and owned an intelligible comprehension.It integrated the existing analysis of the space-frequency codes.A fast detection algorithm for the code was also proposed.It exploited the trellis decoding method and had a reduced complexity compared with the ML detection.The simulation results confirm the validity of the design criterion.…”
    Get full text
    Article
  14. 1474

    Efficent-cutting packet classification algorithm based on the statistical decision tree by Li-nan CHEN, Yang LIU, Yan MA, Xiao-hong HUANG, Qing-cong ZHAO, Wei WEI

    Published 2014-10-01
    “…Packet classification algorithms based on decision tree are easy to implement and widely employed in high-speed packet classification.The primary objective of constructing a decision tree is minimal storage and searching time complexity.An improved decision-tree algorithm is proposed based on statistics and evaluation on filter sets.HyperEC algorithm is a multiple dimensional packet classification algorithm.The proposed algorithm allows the tradeoff between storage and throughput during constructing decision tree.For it is not sensitive to IP address length,it is suitable for IPv6 packet classification as well as IPv4.The algorithm applies a natural and performance-guided decision-making process.The storage budget is preseted and then the best throughput is achieved.The results show that the HyperEC algorithm outperforms the HiCuts and HyperCuts algorithm,improving the storage and throughput performance and scalable to large filter sets.…”
    Get full text
    Article
  15. 1475

    Genomic and algorithm-based predictive risk assessment models for benzene exposure by Minyun Jiang, Minyun Jiang, Na Cai, Na Cai, Juan Hu, Lei Han, Lei Han, Fanwei Xu, Baoli Zhu, Baoli Zhu, Baoli Zhu, Baoli Zhu, Boshen Wang

    Published 2025-01-01
    “…AimIn this research, we leveraged bioinformatics and machine learning to pinpoint key risk genes associated with occupational benzene exposure and to construct genomic and algorithm-based predictive risk assessment models.Subject and methodsWe sourced GSE9569 and GSE21862 microarray data from the Gene Expression Omnibus. …”
    Get full text
    Article
  16. 1476

    Adaptive digital watermarking algorithm under image quad-tree partition by Wen-xing LIU, Wei CHEN, Yuan LIU

    Published 2017-12-01
    “…An adaptive digital watermarking algorithm based on image quad-tree partition was proposed.The original image was approximated by various least square polynomial patches at multiple scales and was organized by a quad-tree structure.At the same time,this representation also reflected the texture information of image.By calculating the watermark embedding intensity in different regions,an adaptive digital watermarking scheme based on the number of the refined meshes in each region was realized.The experiment results show that this algorithm has the good imperceptibility and robustness.…”
    Get full text
    Article
  17. 1477
  18. 1478

    Adaptive Differential Evolution Algorithm for Forward Position Solution of Parallel Mechanism by Yi Jian

    Published 2016-01-01
    Subjects: “…Differential evolution algorithm…”
    Get full text
    Article
  19. 1479

    Otsu Based Optimal Multilevel Image Thresholding Using Firefly Algorithm by N. Sri Madhava Raja, V. Rajinikanth, K. Latha

    Published 2014-01-01
    “…The performances of the proposed algorithm are demonstrated by considering twelve benchmark images and are compared with the existing FA algorithms such as Lévy flight (LF) guided FA and random operator guided FA. …”
    Get full text
    Article
  20. 1480