Showing 1,641 - 1,660 results of 64,514 for search '((articles OR article) OR partial) algorithm', query time: 0.38s Refine Results
  1. 1641
  2. 1642
  3. 1643
  4. 1644

    Robust interference alignment algorithm for cognitive MIMO interference network by Shi-lei ZHU, You ZHOU, Xiu-kun REN, Han-ying HU

    Published 2016-03-01
    “…A robust interference alignment algorithm was proposed for underlay cognitive MIMO interference network with imperfect channel-state information (CSI).Firstly,imperfect CSI was characterized by Euclidean ball-shaped uncer-tainty,based on which the optimization model of transmitting precoding and receiving interference subspace matrix was constructed with aimed of minimizing interference leak Then,primary users' interference temperature constraint un-der the worst-case condition was derived according to the matrix norm inequality.Finally,alternate iteration expressions of transceiver matrixes were obtained exploiting Lagrange partial dual-decomposition theory and sub-gradient update method.Moreover,the proposed algorithm's application condition and degrees of freedom range were theoretically ana-lyzed.Simulation results show that the proposed algor m is robust and its secondary users' network performance out-performs existing algorithms'.…”
    Get full text
    Article
  5. 1645
  6. 1646

    A Fast Map Merging Algorithm in the Field of Multirobot SLAM by Yanli Liu, Xiaoping Fan, Heng Zhang

    Published 2013-01-01
    “…In this paper, a map merging algorithm based on virtual robot motion is proposed for multi-robot SLAM. …”
    Get full text
    Article
  7. 1647

    Research on Small Target Detection Algorithm for Autonomous Vehicle Scenarios by Sheng Tian, Kailong Zhao, Lin Song

    Published 2025-01-01
    “…Nonetheless, existing algorithms offer room for improvement, particularly when detecting distant or inherently small targets, such as vehicles and pedestrians, from camera perspectives. …”
    Get full text
    Article
  8. 1648

    Mobility Load Balancing in Cellular System with Multicriteria Handoff Algorithm by Solomon T. Girma, Abinet G. Abebe

    Published 2017-01-01
    “…Efficient traffic load balancing algorithm is very important to serve more mobile users in the cellular networks. …”
    Get full text
    Article
  9. 1649
  10. 1650

    Supporting the editing of dot maps using the spectral clustering algorithm by Dziuba Natalia, Szombara Stanisław

    Published 2025-01-01
    “…In the study, equal-size spectral clustering algorithm was used, which was modified with a function equalizing the number of points in clusters. …”
    Get full text
    Article
  11. 1651

    MGL-YOLO: A Lightweight Barcode Target Detection Algorithm by Yuanhao Qu, Fengshou Zhang

    Published 2024-11-01
    “…Experimental results show that the proposed algorithm increases MAP50 and MAP50.95 by 2.57% and 2.31%, respectively, compared to YOLOv8, while reducing parameter size and computational cost by 36.21% and 34.15%, respectively. …”
    Get full text
    Article
  12. 1652

    An efficient algorithmic framework to minimize the summand matrix in binary multiplication by Amit Verma, Manish Prateek, Shiv Naresh Shivhare, Thipendra P. Singh, Anuj Kumar, Rakesh Ranjan, Rahul Priyadarshi

    Published 2025-10-01
    “…Binary multiplication is a key operation in digital systems, often limited by the complexity of generating and summing numerous partial products. Traditional methods, like Booth’s algorithm, produce a summand matrix proportional to the operand bit-length, increasing computational load, hardware usage and latency. …”
    Get full text
    Article
  13. 1653

    Underwater Object Detection Algorithm Based on an Improved YOLOv8 by Fubin Zhang, Weiye Cao, Jian Gao, Shubing Liu, Chenyang Li, Kun Song, Hongwei Wang

    Published 2024-11-01
    “…Due to the complexity and diversity of underwater environments, traditional object detection algorithms face challenges in maintaining robustness and detection accuracy when applied underwater. …”
    Get full text
    Article
  14. 1654

    Non-Profiled Partial Nibble Recovery on Power Attack Resilient Adiabatic PRESENT Block Cipher Through AI Vulnerability Assessment by Anjana Jyothi Banu, A. A.

    Published 2025-01-01
    “…Artificial Intelligence (AI) techniques, by eliminating the need for prior knowledge of cryptographic algorithms, have emerged as powerful tools for executing effective SCAs on secure implementations. …”
    Get full text
    Article
  15. 1655
  16. 1656
  17. 1657
  18. 1658
  19. 1659
  20. 1660