Showing 1,861 - 1,880 results of 19,511 for search '"algorithm"', query time: 0.07s Refine Results
  1. 1861

    Beamforming algorithm for cognitive satellite and terrestrial network based on UAV relay by Yanli LI, Zhi LIN, Zining WANG, Ba XU, Ming CHENG, Jian OUYANG

    Published 2021-08-01
    “…Two beamforming (BF) schemes to achieve spectrum sharing by suppressing inter-system interferences in cognitive satellite and terrestrial networks were proposed, where the satellite and UAV cooperative network was used as the secondary network, while the terrestrial network was used as the primary network.Specifically, considering that only the statistical channel state information was available, a constrained optimization problem was formulated to maximize the signal-to- interference-plus-noise ratio of the secondary user under the constraints of the maximum transmit power at the UAV and the interference power of the primary user.Then, an iteration-based BF scheme was proposed to solve the constrained optimization problem.To reduce the computational complexity of the iterative algorithm, a zero-forcing based BF scheme was further proposed.Finally, computer simulations verify the correctness and effectiveness of the proposed BF schemes.…”
    Get full text
    Article
  2. 1862

    Adaptive Strategies Based on Differential Evolutionary Algorithm for Many-Objective Optimization by Yifei Sun, Kun Bian, Zhuo Liu, Xin Sun, Ruoxia Yao

    Published 2021-01-01
    “…The decomposition-based algorithm, for example, multiobjective evolutionary algorithm based on decomposition (MOEA/D), has been proved effective and useful in a variety of multiobjective optimization problems (MOPs). …”
    Get full text
    Article
  3. 1863

    A Numerical Algorithm for a Kirchhoff-Type Nonlinear Static Beam by Jemal Peradze

    Published 2009-01-01
    “…An approximate solution is found using the Galerkin method and the Jacobi nonlinear iteration process. A theorem on the algorithm error is proved.…”
    Get full text
    Article
  4. 1864

    Multiobjective Optimization Method Based on Adaptive Parameter Harmony Search Algorithm by P. Sabarinath, M. R. Thansekhar, R. Saravanan

    Published 2015-01-01
    “…The results reveal that the proposed approach is performing better than other algorithms.…”
    Get full text
    Article
  5. 1865

    Improved Genetic Algorithm to Solve the Scheduling Problem of College English Courses by Jing Xu

    Published 2021-01-01
    “…In this paper, an improved genetic algorithm is designed to solve the above multiobjective optimization problem for the scheduling problem of college English courses. …”
    Get full text
    Article
  6. 1866

    Traffic measurement algorithm based on least recent used and Bloom filter by Zhen ZHANG, Bin-qiang WANG, Feng-yu ZHANG, Ning-ning LIANG

    Published 2013-01-01
    “…Aiming at the naïve algorithm’s deficiency of high false negative probability,a novel scheme called LRU-BF(least recent used &Bloom filter) was presented.In order to achieve high accuracy,the algorithm adopted mechanisms of LRU eliminating and Bloom filter representation to separate the process of heavy-hitter fliteration from the heavy-hitter recognition.Based on statistical theory,analytical expressions about upper-bound error probability were deduced.Simulated results indicate that LRU-BF can achieve space saving and lower error probabilit compared with Naïve-LRU algorithm.Meanwhile,it can also support the 10Gbit/s line-speed processing.…”
    Get full text
    Article
  7. 1867

    Multipurpose zero watermarking algorithm for medical image based on SVD and SAE by Jieli SUN, Yanxia ZHAO, Zenghui ZHOU, Sheng XING

    Published 2017-11-01
    “…A multipurpose zero watermarking algorithm was proposed according to the copyright protection and tamper location of medical image.The two information matrices were executed the XOR operation with the original robust watermarking image and the original semi-fragile watermarking image separately to generate zero robust watermarking image and zero semi-fragile watermarking image.The experimental results show that effects of extracted zero watermarking image are terrific,and the algorithm can resist the common attacks,particularly its resistance is effect ive for strong attacks.…”
    Get full text
    Article
  8. 1868

    Self-embedding robust digital watermarking algorithm with perfectly blind detection by Tian-yu YE

    Published 2012-10-01
    “…Those existing robust watermarking algorithms couldn’t achieve perfectly blind detection.A robust watermarking algorithm with perfectly blind detection was proposed by introducing the self-embedding idea into robust watermarking literature.At first,the original image was split into non-overlapping blocks,and each block was transformed by DCT.The feature watermark was derived from judging the numerical relationship between each block’s DC coefficient and average of DC coefficients form all blocks.After encrypted by Logistic chaos sequence,the feature watermark was self-embedded into each block by adjusting two middle or low frequency DCT coefficients.Finally,the watermarked image was obtained after IDCT.The proposed algorithm achieved perfectly blind detection by combining self-embedding the encrypted feature watermark and blindly extracting authentication watermark.Experimental results show that the proposed algorithm has strong robustness to resist various attacks such as smoothing,adding noise,JPEG compression,resampling,cropping and geometric attacks like random row removal,downward shifting and right shifting.…”
    Get full text
    Article
  9. 1869

    A hybrid swarm intelligent optimization algorithm for antenna design problems by Supreet Singh, Harbinder Singh, Nitin Mittal, Gurpreet Kaur Punj, Lalit Kumar, Kinde Anlay Fante

    Published 2025-02-01
    “…Abstract Meta-heuristic optimization algorithms have seen significant advancements due to their diverse applications in solving complex problems. …”
    Get full text
    Article
  10. 1870
  11. 1871

    Integrated algorithm based on vectors in node localization for wireless sensor networks by WANG Yu-feng, WANG Yan

    Published 2008-01-01
    “…An integrated algorithm based on DV-hop was designed and applied to mobile nodes. …”
    Get full text
    Article
  12. 1872
  13. 1873

    Key Technology of Internet of Things Middleware and Computer Event Matching Algorithm by Laicun Li, Rulin Bai

    Published 2022-01-01
    “…In order to solve the problem of complex event pattern in big data and strengthen research on key technologies of the Internet of Things and computer time matching algorithms, this paper studies the problem based on Hadoop clustering algorithm. …”
    Get full text
    Article
  14. 1874

    Absolute finite differences based variable forgetting factor RLS algorithm by Slobodan Drašković, Željko Đurović, Vera Petrović

    Published 2022-02-01
    “…Most of the known non‐stationarity detection algorithms are based on residual statistics. The study proposes a novel non‐stationarity detection algorithm based on finite differences analysis of the processed signal. …”
    Get full text
    Article
  15. 1875

    An Improved DR Algorithm Based on Target Extrapolating in ROIA Cloud Platform by Dong Liu

    Published 2013-12-01
    “…This paper proposes an improved DR algorithm based on target-extrapolating in a cloud platform for ROIA, elaborates the basic idea of the improved algorithm and the computational model formula, and then carries out a simulation experiment. …”
    Get full text
    Article
  16. 1876

    Algorithm of video object segmentation based on region Gibbs potential function by BAO Hong-qiang, ZHANG Zhao-yang

    Published 2005-01-01
    “…A novel video motion object segmentation algorithm was proposed under spatial-temporal framework. …”
    Get full text
    Article
  17. 1877

    Malicious attack-resistant secure localization algorithm for wireless sensor network by Kun XU, Hong-li LIU, Jie ZHAN, Zi-ji MA

    Published 2016-12-01
    “…A robust semidefinite relaxation secure localiza-tion algorithm RSRSL was proposed to improve the location accuracy against malicious attacks. …”
    Get full text
    Article
  18. 1878
  19. 1879

    An Improved Genetic-Shuffled Frog-Leaping Algorithm for Permutation Flowshop Scheduling by Peiliang Wu, Qingyu Yang, Wenbai Chen, Bingyi Mao, Hongnian Yu

    Published 2020-01-01
    “…This paper proposes an improved genetic-shuffled frog-leaping algorithm (IGSFLA) to solve the permutation flowshop scheduling problem. …”
    Get full text
    Article
  20. 1880

    Multi-hop wireless network oriented multiple jammers localization algorithm by Qi-ping WANG, Xiang-lin WEI, Jian-hua FAN, Tong-xiang WANG, Fei HU

    Published 2016-12-01
    “…A multiple jammer localization algorithm in multi-hop wireless networks was proposed. …”
    Get full text
    Article