-
1861
Beamforming algorithm for cognitive satellite and terrestrial network based on UAV relay
Published 2021-08-01“…Two beamforming (BF) schemes to achieve spectrum sharing by suppressing inter-system interferences in cognitive satellite and terrestrial networks were proposed, where the satellite and UAV cooperative network was used as the secondary network, while the terrestrial network was used as the primary network.Specifically, considering that only the statistical channel state information was available, a constrained optimization problem was formulated to maximize the signal-to- interference-plus-noise ratio of the secondary user under the constraints of the maximum transmit power at the UAV and the interference power of the primary user.Then, an iteration-based BF scheme was proposed to solve the constrained optimization problem.To reduce the computational complexity of the iterative algorithm, a zero-forcing based BF scheme was further proposed.Finally, computer simulations verify the correctness and effectiveness of the proposed BF schemes.…”
Get full text
Article -
1862
Adaptive Strategies Based on Differential Evolutionary Algorithm for Many-Objective Optimization
Published 2021-01-01“…The decomposition-based algorithm, for example, multiobjective evolutionary algorithm based on decomposition (MOEA/D), has been proved effective and useful in a variety of multiobjective optimization problems (MOPs). …”
Get full text
Article -
1863
A Numerical Algorithm for a Kirchhoff-Type Nonlinear Static Beam
Published 2009-01-01“…An approximate solution is found using the Galerkin method and the Jacobi nonlinear iteration process. A theorem on the algorithm error is proved.…”
Get full text
Article -
1864
Multiobjective Optimization Method Based on Adaptive Parameter Harmony Search Algorithm
Published 2015-01-01“…The results reveal that the proposed approach is performing better than other algorithms.…”
Get full text
Article -
1865
Improved Genetic Algorithm to Solve the Scheduling Problem of College English Courses
Published 2021-01-01“…In this paper, an improved genetic algorithm is designed to solve the above multiobjective optimization problem for the scheduling problem of college English courses. …”
Get full text
Article -
1866
Traffic measurement algorithm based on least recent used and Bloom filter
Published 2013-01-01“…Aiming at the naïve algorithm’s deficiency of high false negative probability,a novel scheme called LRU-BF(least recent used &Bloom filter) was presented.In order to achieve high accuracy,the algorithm adopted mechanisms of LRU eliminating and Bloom filter representation to separate the process of heavy-hitter fliteration from the heavy-hitter recognition.Based on statistical theory,analytical expressions about upper-bound error probability were deduced.Simulated results indicate that LRU-BF can achieve space saving and lower error probabilit compared with Naïve-LRU algorithm.Meanwhile,it can also support the 10Gbit/s line-speed processing.…”
Get full text
Article -
1867
Multipurpose zero watermarking algorithm for medical image based on SVD and SAE
Published 2017-11-01“…A multipurpose zero watermarking algorithm was proposed according to the copyright protection and tamper location of medical image.The two information matrices were executed the XOR operation with the original robust watermarking image and the original semi-fragile watermarking image separately to generate zero robust watermarking image and zero semi-fragile watermarking image.The experimental results show that effects of extracted zero watermarking image are terrific,and the algorithm can resist the common attacks,particularly its resistance is effect ive for strong attacks.…”
Get full text
Article -
1868
Self-embedding robust digital watermarking algorithm with perfectly blind detection
Published 2012-10-01“…Those existing robust watermarking algorithms couldn’t achieve perfectly blind detection.A robust watermarking algorithm with perfectly blind detection was proposed by introducing the self-embedding idea into robust watermarking literature.At first,the original image was split into non-overlapping blocks,and each block was transformed by DCT.The feature watermark was derived from judging the numerical relationship between each block’s DC coefficient and average of DC coefficients form all blocks.After encrypted by Logistic chaos sequence,the feature watermark was self-embedded into each block by adjusting two middle or low frequency DCT coefficients.Finally,the watermarked image was obtained after IDCT.The proposed algorithm achieved perfectly blind detection by combining self-embedding the encrypted feature watermark and blindly extracting authentication watermark.Experimental results show that the proposed algorithm has strong robustness to resist various attacks such as smoothing,adding noise,JPEG compression,resampling,cropping and geometric attacks like random row removal,downward shifting and right shifting.…”
Get full text
Article -
1869
A hybrid swarm intelligent optimization algorithm for antenna design problems
Published 2025-02-01“…Abstract Meta-heuristic optimization algorithms have seen significant advancements due to their diverse applications in solving complex problems. …”
Get full text
Article -
1870
A quantum entanglement-based algorithm for discriminating non-orthogonal qubits
Published 2025-01-01Subjects: Get full text
Article -
1871
Integrated algorithm based on vectors in node localization for wireless sensor networks
Published 2008-01-01“…An integrated algorithm based on DV-hop was designed and applied to mobile nodes. …”
Get full text
Article -
1872
Optimal planning of optical transmission network using improved genetic algorithm
Published 2016-01-01Subjects: Get full text
Article -
1873
Key Technology of Internet of Things Middleware and Computer Event Matching Algorithm
Published 2022-01-01“…In order to solve the problem of complex event pattern in big data and strengthen research on key technologies of the Internet of Things and computer time matching algorithms, this paper studies the problem based on Hadoop clustering algorithm. …”
Get full text
Article -
1874
Absolute finite differences based variable forgetting factor RLS algorithm
Published 2022-02-01“…Most of the known non‐stationarity detection algorithms are based on residual statistics. The study proposes a novel non‐stationarity detection algorithm based on finite differences analysis of the processed signal. …”
Get full text
Article -
1875
An Improved DR Algorithm Based on Target Extrapolating in ROIA Cloud Platform
Published 2013-12-01“…This paper proposes an improved DR algorithm based on target-extrapolating in a cloud platform for ROIA, elaborates the basic idea of the improved algorithm and the computational model formula, and then carries out a simulation experiment. …”
Get full text
Article -
1876
Algorithm of video object segmentation based on region Gibbs potential function
Published 2005-01-01“…A novel video motion object segmentation algorithm was proposed under spatial-temporal framework. …”
Get full text
Article -
1877
Malicious attack-resistant secure localization algorithm for wireless sensor network
Published 2016-12-01“…A robust semidefinite relaxation secure localiza-tion algorithm RSRSL was proposed to improve the location accuracy against malicious attacks. …”
Get full text
Article -
1878
Detecting DDoS attack based on compensation non-parameter CUSUM algorithm
Published 2008-01-01Subjects: Get full text
Article -
1879
An Improved Genetic-Shuffled Frog-Leaping Algorithm for Permutation Flowshop Scheduling
Published 2020-01-01“…This paper proposes an improved genetic-shuffled frog-leaping algorithm (IGSFLA) to solve the permutation flowshop scheduling problem. …”
Get full text
Article -
1880
Multi-hop wireless network oriented multiple jammers localization algorithm
Published 2016-12-01“…A multiple jammer localization algorithm in multi-hop wireless networks was proposed. …”
Get full text
Article