Showing 1,701 - 1,720 results of 19,511 for search '"algorithm"', query time: 0.08s Refine Results
  1. 1701

    Efficient Discrete Interpolation Algorithm and Module Development of Cycloid Gear Profile by Yao Yuchao, Wang Qiliang, Chang Anquan, Jiang Zhongqiu

    Published 2017-01-01
    “…Meanwhile,the results of equal-pitch algorithm,equal-step algorithm,equal-error algorithm and this efficient discrete interpolation algorithm are compared which verified the feasibility and effectiveness of the method. …”
    Get full text
    Article
  2. 1702

    Virtual backbone formation algorithm based on GBG for wireless sensor networks by SUN Yan-jing, QIAN Jian-sheng

    Published 2008-01-01
    “…An approximation algorithm of virtual backbone formation (VBF) based on a more generalized and realistic wireless network communication model of bounded growth graph (GBG) was proposed. …”
    Get full text
    Article
  3. 1703

    Quantum secure communication algorithm based on cyclic code and information compression by Hongyang MA, Xin ZHANG, Peng’ao XU, Fen LIU, Xingkui FAN

    Published 2020-03-01
    “…For the problem that the classical secure communication was challenging to transmit information,a quantum secure communication algorithm based on cyclic code and information compression was proposed.First,the data was encoded into two sets of data with different lengths by the sender,one set of data was used for cycling coding and the other one was used to compress coding.Second,single-photon sequence was transmitted to the receiver on the quantum channel by the sender.The error number was used as the basis of channel security detection.If the channel was secure,quantum states were encoded for the data,and segment transmitted by quantum stabilizer codes.The error caused by the environment can be overcome according to characteristic of the stable code.Finally,the information was decoded after receiving the quantum information,then recirculated and decompressed to obtain data.The security analysis shows that the quantum secure communication algorithm can resist the attack of jamming and spoofing attacked.The simulation results show that good results can be obtained to 5 segments for data compression.…”
    Get full text
    Article
  4. 1704
  5. 1705

    A Fast Algorithm for Computing Binomial Coefficients Modulo Powers of Two by Mugurel Ionut Andreica

    Published 2013-01-01
    “…I present a new algorithm for computing binomial coefficients modulo . …”
    Get full text
    Article
  6. 1706

    Switching Algorithm with Prediction Strategy for Maximizing Lifetime in Wireless Sensor Network by Chuan-Jun Yi, Geng Yang, Hua Dai, Liang Liu, Ning Li

    Published 2015-11-01
    “…Furthermore, a prediction strategy which ensures that the highest load in the network decreases in each switching is developed to guarantee high efficiency and fast convergence of the algorithm. A distributed version of our algorithm, called DSAPS, is also designed. …”
    Get full text
    Article
  7. 1707

    Proved wireless sensor networks time synchronization algorithm based on RBS by LI Wen-feng 1, WANG Ru-chuan1, SUN Li-juan1

    Published 2008-01-01
    “…IRBS algorithm was proposed on RBS.According to receiver node time,IRBS estimate its real time.During its calculation of two nodes time difference,it realizea time synchronization by the estimating time.Simulation result shows IRBS algorithm can reduce time error and improve time synchronization precision.…”
    Get full text
    Article
  8. 1708

    Neural network and Markov based combination prediction algorithm of video popularity by Xuesen MA, Shuyou CHEN, Xiangdong XU, Zhaokun CHU

    Published 2021-08-01
    “…Caching popular video into user-side in advance improves the user experience and reduces operator costs, which is a common practice in the industry.How to effectively predict the popularity of videos has become a hot issue in the industry.On account of the shortcomings of traditional prediction algorithms such as poor nonlinear mapping ability, low prediction accuracy and weak adaptability, a video popularity prediction algorithm based on a neural network and Markov combined model (Mar-BiLSTM) was proposed.Information dependencies were preserved by constructing bidirectional memory network model (bi-directional long short-term memory, BiLSTM), the prediction accuracy of the model was further improved by using Markov properties while avoiding the increase of the complexity of the model caused by the introduction of external variables.Experimental results show that compared with traditional time series and classic neural network algorithms, the proposed algorithm improves predicting accuracy, effectiveness and reduces the amount of calculation.…”
    Get full text
    Article
  9. 1709

    Roles query algorithm in cloud computing environment based on user require by YANG Liu, TANG Zhuo, LI Ren-fa, ZHANG Zong-li

    Published 2011-01-01
    “…Roles based access control model CARBAC for cloud computing environment was proposed.Roles in the model include user roles and resources owner roles,the latter were called administrator roles.For the resources owner roles assigning the roles to the users,roles query algorithm in the hybrid hierarchies based on users’ access require was proposed.Through this algorithm,for the certain privileges set,this model could choose the least roles set to be assigned to the users.The simulation experiment indicates that for the mass user access,this algorithm can reduce the roles quan-tity,shorten the authorization procedure,and advance the system efficiency.…”
    Get full text
    Article
  10. 1710

    Face recognition algorithm based on attractive local second gradient contours by Xueyi YE, Dingwei QIAN, Na YING, Tao WANG

    Published 2021-07-01
    “…In order to solve the problem that traditional LDP algorithms is difficult to balance the effectiveness of feature extraction and the stability of feature encoding, an attractive local second gradient contours (ALSGC) face feature extraction algorithm was proposed.Firstly, the Kirsch operator was used to calculate the neighborhood edge response image of the face image.Secondly, an attraction descriptor was introduced and the local average gray value and global average gray value of the edge response image and the neighborhood center gray value was combined to complete the local attraction pattern encoding.The entire image was traversed to get the ALSGC face feature map, the ALSGC feature map was divided to blocks and the statistical histograms of different patterns for each block was obtained by calculation.Finally, the statistical histograms of all the blocks were cascaded to generate the corresponding feature vector and support vector machine was used to complete classification and recognition.The proposed algorithm not only overcame the insufficient effectiveness of LBP, LDP, LDN and other algorithms who extract first-gradient features, but also reduced the sensitivity to changes in expression, posture, occlusion, lighting and random noise of methods such as DLDP, CSLDP, GCSLDP who extracting second-gradient features.It better achieved the balance between the effectiveness of feature extraction and the stability of feature encoding, and took into account the recognition rate and robustness.…”
    Get full text
    Article
  11. 1711

    A Precoding Algorithm Based on Max-SNR in Massive MIMO System by Yuhua Wu

    Published 2015-10-01
    “…In order to obtain higher data transmission speed and greater array gain,a precoding algorithm based on max-SNR in massive MIMO system was proposed.The basic method of this algorithm was following.Firstly,the base station obtained MMSE channel estimation by received uplink pilot sequences,then the base station transmited downlink data to users after precoding.Terminal users derived the optimal precoding matrix by resolving a Rayleigh entropy optimization problem based on the received SNR.Simulation results show that the performance of the proposed algorithm is better than SVD algorithm,especially when the number of transmit antennas is large,the proposed algorithm is valuable in massive MIMO systems in the future.…”
    Get full text
    Article
  12. 1712

    Hybrid CoMP Mode Selection Algorithm Based on Pure User by Jihong Zhao, Xiaoting Ding, Wei Wang, Hua Qu

    Published 2015-03-01
    “…The algorithm selects the optimal transmission mode for individual user. …”
    Get full text
    Article
  13. 1713

    Hot-cell clusters deriving algorithm for slow dynamic channel allocation by SHI Wen-xiao, JIN Tao, CHI Xue-fen, FAN Shao-shuai

    Published 2009-01-01
    “…Aiming at overcoming the shortages of the current slow dynamic channel allocation algorithm in TD-SCDMA system,hot cell clusters deriving algorithm was proposed.The algorithm constituted a multi-cell system model through the way that the hot cells were continuously derived to resolve the identification and expansion problem of the hot cell clusters.As the result,system capacity is increased.The simulation results show that,the hot cell clusters deriving algorithm can adapt to different service distribution models well.Compared to the hot cell algorithm,the system resource utilization is increased by 3.8 percent.…”
    Get full text
    Article
  14. 1714

    Inexact Exponential Penalty Function with the Augmented Lagrangian for Multiobjective Optimization Algorithms by Appolinaire Tougma, Kounhinir Some

    Published 2024-01-01
    “…This paper uses an augmented Lagrangian method based on an inexact exponential penalty function to solve constrained multiobjective optimization problems. Two algorithms have been proposed in this study. The first algorithm uses a projected gradient, while the second uses the steepest descent method. …”
    Get full text
    Article
  15. 1715

    Low-complexity signal detection algorithm for the power splitting receiver scheme by WANG Yanyan, LI Qidi, TANG Xiaohu

    Published 2024-04-01
    “…Then, by characterizing the joint probability density function of the two-dimensional received signal in the transformed coordinate system, a low complexity signal detection algorithm based on the minimum distance was achieved. …”
    Get full text
    Article
  16. 1716

    Application of Computer Simulation Optimization Algorithm in Waste Treatment of Drilling Engineering by Chang Shu, JiChuan Zhang

    Published 2021-01-01
    “…The existing computer technology is used to conduct an in-depth study and analysis of drilling waste treatment, and the results are analyzed by computer simulation optimization algorithms. Based on the system theory, we define the research system, combine the unique characteristics of the technological innovation mechanism of drilling waste treatment, and use the internal and external factors affecting the technological innovation dynamics of drilling waste treatment, such as drilling waste treatment capacity, from the current actual situation. …”
    Get full text
    Article
  17. 1717

    An Efficient Clustering Algorithm in Wireless Sensor Networks Using Cooperative Communication by Shukui Zhang, Jianxi Fan, Juncheng Jia, Jin Wang

    Published 2012-06-01
    “…The second phase of the algorithm is to choose the nodes (called connectors) to make the WCDS connected. …”
    Get full text
    Article
  18. 1718
  19. 1719

    A Complication of Negative Resistance Circuits Generated by Two Novel Algorithms by Umesh Kumar

    Published 2002-01-01
    “…There are two algorithms to generate a negative-resistance device which exhibits either a type-N shaped V-1 characteristic similar to a tunnel diode, or a type-S shaped V-1 characteristic similar to a four layered pnpn diode. …”
    Get full text
    Article
  20. 1720