-
1681
Research on language recognition algorithm based on improved CFCC feature extraction
Published 2022-12-01“…Aiming at the problem of low language recognition rate under low signal-to-noise ratio, a language recognition method based on fractional wavelet transform was proposed.Firstly, the adaptive filtering algorithm was used to filter the noise of the noisy signal, so as to reduce the influence of noise on the feature extraction and improve the processing ability of the system for non-stationary signals.Secondly, the motion of the signal on the basilar membrane of the cochlea was simulated, and then the signal was compressed by a nonlinear power function.Finally, the improved CFCC were extracted by simulating the human hearing process.Experiments show that compared with the traditional CFCC, the language recognition rate is significantly improved, and the language recognition rate is increased by 11.1% on average under the 0 dB signal-to-noise ratio, which verifies the effectiveness and robustness of the proposed algorithm.…”
Get full text
Article -
1682
An Extreme Learning Machine-Based Community Detection Algorithm in Complex Networks
Published 2018-01-01“…Furthermore, results of extensive experiments undertaken on computer-generated networks and real-world datasets illustrate acceptable performances of the introduced algorithm in comparison with other typical community detection algorithms.…”
Get full text
Article -
1683
Robust medical zero‐watermarking algorithm based on Residual‐DenseNet
Published 2022-11-01“…Abstract To solve the problem of poor robustness of existing traditional DCT‐based medical image watermarking algorithms under geometric attacks, a novel deep learning‐based robust zero‐watermarking algorithm for medical images is proposed. …”
Get full text
Article -
1684
Proxy caching algorithm based on segment popularity for mobile streaming media
Published 2007-01-01Subjects: Get full text
Article -
1685
Optimal Scheduling for Retrieval Jobs in Double-Deep AS/RS by Evolutionary Algorithms
Published 2013-01-01“…Three types of evolutionary algorithms, the Genetic Algorithm (GA), the Immune Genetic Algorithm (IGA), and the Particle Swarm Optimization (PSO) algorithm, are implemented to obtain the optimal assignments. …”
Get full text
Article -
1686
Fast algorithm to search for the minimum number of active S-boxes of block cipher
Published 2023-01-01“…To solve the problem of fast calculation of the minimum number of active S-boxes in cryptographic design, the difference and mask propagation of the diffusion layer were investigated, and a method was proposed to compute the difference (resp.mask) pattern distribution table of MDS (maximum distance separable) matrices and binary matrices.A lower bound on the computation complexity of the proposed method was also given.Based on the difference (resp.mask) pattern distribution table of diffusion matrix, a fast algorithm to search for the minimum number of active S-boxes of block cipher was proposed.The proposed algorithm is applied to some SPN (substitution permutation network) block ciphers, and finds the minimum number of active S-boxes for the full round of LED, SKINNY, CRAFT and FIDES.…”
Get full text
Article -
1687
Control of the Elastic Torsion System based on Dynamic Matrix Control Algorithm
Published 2015-01-01“…The multi-mass elastic torsional system has the feature of large speed fluctuation and long vibration time.The system state space model is built based on the system analysis,and the parameters of this model are estimated by using Simulink Parameter Estimation Toolbox.The system speed is controlled by using dynamic matrix control(DMC)algorithm.The DMC controller is converted into embedded C code which is executable for PLC by using Simulink Coder toolbox in Matlab.After being compiled by Automation Studio,it will be downloaded to X20 PLC to control the real system.Both the simulation and practical system test shows that the model is accurate and DMC algorithm is better than cascade PID algorithm in dynamic performance.…”
Get full text
Article -
1688
Least-Squares-Based Iterative Identification Algorithm for Wiener Nonlinear Systems
Published 2013-01-01“…The simulation results indicate that the proposed algorithm is effective.…”
Get full text
Article -
1689
You Only Attack Once: Single-Step DeepFool Algorithm
Published 2024-12-01“…This technique is referred to as the “You Only Attack Once” (YOAO) algorithm. Compared to the DeepFool algorithm, this method requires only a single iteration to achieve effective attack results. …”
Get full text
Article -
1690
Study on the Intelligent Fault Recognition Algorithm for Wind Power Unit Drivetrain
Published 2018-01-01Subjects: Get full text
Article -
1691
Distributed data trading algorithm based on multi-objective utility optimization
Published 2021-02-01“…The traditional centralized data trading models are not well applicable to the current intelligent era where everything is interconnected and real-time data is generated, and in order to maximize the use of collected data, it is essential to design an effective data trading framework.Therefore, a distributed data trading framework based on consortium blockchain was proposed, which realized P2P data trading without relying on a third party.Aiming at the problem that existing data trading models only consider the factors of the data itself and ignore the factors related to user tasks, a bi-level multi-objective optimization model was constructed based on multi-dimensional factors, such as data quality, data attributes, attribute relevance and consumer competition, to optimize the utilities of data provider (DP) and data consumer (DC).To solve the above model, an improved multi-objective genetic algorithm-collaborative NSGAII was proposed, calculated by the cooperation of DP, DC and data aggregator (AG).The simulation results show that the collaborative NSGAII achieves better performance in terms of the utilities of DP and DC, thus realizing more effective data trading.…”
Get full text
Article -
1692
English Audio Language Retrieval Based on Adaptive Speech-Adjusting Algorithm
Published 2021-01-01“…Experiments on number string and large vocabulary continuous speech recognition show that the algorithm is effective.…”
Get full text
Article -
1693
Use of Genetic Algorithm for Cohesive Summary Extraction to Assist Reading Difficulties
Published 2013-01-01“…The objective of this work is to extract the optimal combination of sentences that increase readability through sentence cohesion using genetic algorithm. The results show that the summary extraction using our proposed approach performs better in -measure, readability, and cohesion than the baseline approach (lead) and the corpus-based approach. …”
Get full text
Article -
1694
A Modified Dijkstra Algorithm for ROS Based Autonomous Mobile Robots
Published 2023-03-01Subjects: Get full text
Article -
1695
Genetic Searching Algorithm for Optimal Runlength-Limited Codes with Error Control
Published 1997-01-01Get full text
Article -
1696
Detection Algorithm of Alarm Messages Based on Linear Cooperative Strategy in VAENT
Published 2014-05-01“…An alarm message detection algorithm for the traffic accident based on linear cooperative strategy in vehicular Ad Hoc network was proposed, and it was composed of two parts: local detection and global detection. …”
Get full text
Article -
1697
Complex network clustering algorithm based on Jordan-form of Laplace-matrix
Published 2014-03-01Subjects: Get full text
Article -
1698
A Modified Bat Algorithm with Conjugate Gradient Method for Global Optimization
Published 2020-01-01“…Metaheuristic algorithms are used to solve many optimization problems. …”
Get full text
Article -
1699
A Novel Artificial Bee Colony Algorithm for Structural Damage Detection
Published 2020-01-01“…A novel artificial bee colony (ABC) algorithm to detect structural damage via modal and frequency analyses is proposed (named as TCABC algorithm). …”
Get full text
Article -
1700
Efficient Algorithms for Optimal 4-Bit Reversible Logic System Synthesis
Published 2013-01-01“…We mainly absorb the ideas of our 3-bit synthesis algorithms based on hash table and present the efficient algorithms which can construct almost all optimal 4-bit reversible logic circuits with many types of gates and at mini-length cost based on constructing the shortest coding and the specific topological compression; thus, the lossless compression ratio of the space of n-bit circuits reaches near 2×n!. …”
Get full text
Article