-
1701
Efficient Discrete Interpolation Algorithm and Module Development of Cycloid Gear Profile
Published 2017-01-01“…Meanwhile,the results of equal-pitch algorithm,equal-step algorithm,equal-error algorithm and this efficient discrete interpolation algorithm are compared which verified the feasibility and effectiveness of the method. …”
Get full text
Article -
1702
Virtual backbone formation algorithm based on GBG for wireless sensor networks
Published 2008-01-01“…An approximation algorithm of virtual backbone formation (VBF) based on a more generalized and realistic wireless network communication model of bounded growth graph (GBG) was proposed. …”
Get full text
Article -
1703
Quantum secure communication algorithm based on cyclic code and information compression
Published 2020-03-01“…For the problem that the classical secure communication was challenging to transmit information,a quantum secure communication algorithm based on cyclic code and information compression was proposed.First,the data was encoded into two sets of data with different lengths by the sender,one set of data was used for cycling coding and the other one was used to compress coding.Second,single-photon sequence was transmitted to the receiver on the quantum channel by the sender.The error number was used as the basis of channel security detection.If the channel was secure,quantum states were encoded for the data,and segment transmitted by quantum stabilizer codes.The error caused by the environment can be overcome according to characteristic of the stable code.Finally,the information was decoded after receiving the quantum information,then recirculated and decompressed to obtain data.The security analysis shows that the quantum secure communication algorithm can resist the attack of jamming and spoofing attacked.The simulation results show that good results can be obtained to 5 segments for data compression.…”
Get full text
Article -
1704
Differentially Private Clustered Federated Load Prediction Based on the Louvain Algorithm
Published 2025-01-01Subjects: Get full text
Article -
1705
A Fast Algorithm for Computing Binomial Coefficients Modulo Powers of Two
Published 2013-01-01“…I present a new algorithm for computing binomial coefficients modulo . …”
Get full text
Article -
1706
Switching Algorithm with Prediction Strategy for Maximizing Lifetime in Wireless Sensor Network
Published 2015-11-01“…Furthermore, a prediction strategy which ensures that the highest load in the network decreases in each switching is developed to guarantee high efficiency and fast convergence of the algorithm. A distributed version of our algorithm, called DSAPS, is also designed. …”
Get full text
Article -
1707
Proved wireless sensor networks time synchronization algorithm based on RBS
Published 2008-01-01“…IRBS algorithm was proposed on RBS.According to receiver node time,IRBS estimate its real time.During its calculation of two nodes time difference,it realizea time synchronization by the estimating time.Simulation result shows IRBS algorithm can reduce time error and improve time synchronization precision.…”
Get full text
Article -
1708
Neural network and Markov based combination prediction algorithm of video popularity
Published 2021-08-01“…Caching popular video into user-side in advance improves the user experience and reduces operator costs, which is a common practice in the industry.How to effectively predict the popularity of videos has become a hot issue in the industry.On account of the shortcomings of traditional prediction algorithms such as poor nonlinear mapping ability, low prediction accuracy and weak adaptability, a video popularity prediction algorithm based on a neural network and Markov combined model (Mar-BiLSTM) was proposed.Information dependencies were preserved by constructing bidirectional memory network model (bi-directional long short-term memory, BiLSTM), the prediction accuracy of the model was further improved by using Markov properties while avoiding the increase of the complexity of the model caused by the introduction of external variables.Experimental results show that compared with traditional time series and classic neural network algorithms, the proposed algorithm improves predicting accuracy, effectiveness and reduces the amount of calculation.…”
Get full text
Article -
1709
Roles query algorithm in cloud computing environment based on user require
Published 2011-01-01“…Roles based access control model CARBAC for cloud computing environment was proposed.Roles in the model include user roles and resources owner roles,the latter were called administrator roles.For the resources owner roles assigning the roles to the users,roles query algorithm in the hybrid hierarchies based on users’ access require was proposed.Through this algorithm,for the certain privileges set,this model could choose the least roles set to be assigned to the users.The simulation experiment indicates that for the mass user access,this algorithm can reduce the roles quan-tity,shorten the authorization procedure,and advance the system efficiency.…”
Get full text
Article -
1710
Face recognition algorithm based on attractive local second gradient contours
Published 2021-07-01“…In order to solve the problem that traditional LDP algorithms is difficult to balance the effectiveness of feature extraction and the stability of feature encoding, an attractive local second gradient contours (ALSGC) face feature extraction algorithm was proposed.Firstly, the Kirsch operator was used to calculate the neighborhood edge response image of the face image.Secondly, an attraction descriptor was introduced and the local average gray value and global average gray value of the edge response image and the neighborhood center gray value was combined to complete the local attraction pattern encoding.The entire image was traversed to get the ALSGC face feature map, the ALSGC feature map was divided to blocks and the statistical histograms of different patterns for each block was obtained by calculation.Finally, the statistical histograms of all the blocks were cascaded to generate the corresponding feature vector and support vector machine was used to complete classification and recognition.The proposed algorithm not only overcame the insufficient effectiveness of LBP, LDP, LDN and other algorithms who extract first-gradient features, but also reduced the sensitivity to changes in expression, posture, occlusion, lighting and random noise of methods such as DLDP, CSLDP, GCSLDP who extracting second-gradient features.It better achieved the balance between the effectiveness of feature extraction and the stability of feature encoding, and took into account the recognition rate and robustness.…”
Get full text
Article -
1711
A Precoding Algorithm Based on Max-SNR in Massive MIMO System
Published 2015-10-01“…In order to obtain higher data transmission speed and greater array gain,a precoding algorithm based on max-SNR in massive MIMO system was proposed.The basic method of this algorithm was following.Firstly,the base station obtained MMSE channel estimation by received uplink pilot sequences,then the base station transmited downlink data to users after precoding.Terminal users derived the optimal precoding matrix by resolving a Rayleigh entropy optimization problem based on the received SNR.Simulation results show that the performance of the proposed algorithm is better than SVD algorithm,especially when the number of transmit antennas is large,the proposed algorithm is valuable in massive MIMO systems in the future.…”
Get full text
Article -
1712
Hybrid CoMP Mode Selection Algorithm Based on Pure User
Published 2015-03-01“…The algorithm selects the optimal transmission mode for individual user. …”
Get full text
Article -
1713
Hot-cell clusters deriving algorithm for slow dynamic channel allocation
Published 2009-01-01“…Aiming at overcoming the shortages of the current slow dynamic channel allocation algorithm in TD-SCDMA system,hot cell clusters deriving algorithm was proposed.The algorithm constituted a multi-cell system model through the way that the hot cells were continuously derived to resolve the identification and expansion problem of the hot cell clusters.As the result,system capacity is increased.The simulation results show that,the hot cell clusters deriving algorithm can adapt to different service distribution models well.Compared to the hot cell algorithm,the system resource utilization is increased by 3.8 percent.…”
Get full text
Article -
1714
Inexact Exponential Penalty Function with the Augmented Lagrangian for Multiobjective Optimization Algorithms
Published 2024-01-01“…This paper uses an augmented Lagrangian method based on an inexact exponential penalty function to solve constrained multiobjective optimization problems. Two algorithms have been proposed in this study. The first algorithm uses a projected gradient, while the second uses the steepest descent method. …”
Get full text
Article -
1715
Low-complexity signal detection algorithm for the power splitting receiver scheme
Published 2024-04-01“…Then, by characterizing the joint probability density function of the two-dimensional received signal in the transformed coordinate system, a low complexity signal detection algorithm based on the minimum distance was achieved. …”
Get full text
Article -
1716
Application of Computer Simulation Optimization Algorithm in Waste Treatment of Drilling Engineering
Published 2021-01-01“…The existing computer technology is used to conduct an in-depth study and analysis of drilling waste treatment, and the results are analyzed by computer simulation optimization algorithms. Based on the system theory, we define the research system, combine the unique characteristics of the technological innovation mechanism of drilling waste treatment, and use the internal and external factors affecting the technological innovation dynamics of drilling waste treatment, such as drilling waste treatment capacity, from the current actual situation. …”
Get full text
Article -
1717
An Efficient Clustering Algorithm in Wireless Sensor Networks Using Cooperative Communication
Published 2012-06-01“…The second phase of the algorithm is to choose the nodes (called connectors) to make the WCDS connected. …”
Get full text
Article -
1718
Greedy Algorithm for Deriving Decision Rules from Decision Tree Ensembles
Published 2025-01-01Subjects: Get full text
Article -
1719
A Complication of Negative Resistance Circuits Generated by Two Novel Algorithms
Published 2002-01-01“…There are two algorithms to generate a negative-resistance device which exhibits either a type-N shaped V-1 characteristic similar to a tunnel diode, or a type-S shaped V-1 characteristic similar to a four layered pnpn diode. …”
Get full text
Article -
1720