-
1421
An Algorithm of Faulty Antenna Location Based on Interval Analysis of Horizontal Beam-Width
Published 2013-10-01“…The problems such as decrease of antenna gain,the leakage of side-lobe signal,and the degradation of front-to-back ratio,were mainly discussed,and an algorithm of faulty antenna location based on interval analysis of horizontal beam-width was proposed,by dividing the horizontal beam-width with different radiation angle:±[0,15°],[16°,30°],[31°,60°],[61°,90°],[91°,120°],[121°,150°],[151°,180°].At last,through relational analysis of Rxqual,Rxlev,over-coverage index,and communication distance in different radiation angle interval,the location of faulty antenna was realized.…”
Get full text
Article -
1422
An Algorithm of Faulty Antenna Location Based on Interval Analysis of Horizontal Beam-Width
Published 2013-10-01“…The problems such as decrease of antenna gain,the leakage of side-lobe signal,and the degradation of front-to-back ratio,were mainly discussed,and an algorithm of faulty antenna location based on interval analysis of horizontal beam-width was proposed,by dividing the horizontal beam-width with different radiation angle:±[0,15°],[16°,30°],[31°,60°],[61°,90°],[91°,120°],[121°,150°],[151°,180°].At last,through relational analysis of Rxqual,Rxlev,over-coverage index,and communication distance in different radiation angle interval,the location of faulty antenna was realized.…”
Get full text
Article -
1423
Migration and commuting interactions fields: a new geography with community detection algorithm?
Published 2017-09-01“…The objective is to refresh the geography of Belgium using interactions between places by means of a community detection algorithm (Louvain Method) inspired by Complex theory and Data Sciences. …”
Get full text
Article -
1424
An Energy-Efficient Distributed Algorithm for Virtual Backbone Construction with Cellular Structure in WSN
Published 2012-12-01“…The construction of virtual backbone within wireless sensor network (WSN) is an important means to reduce the redundant transmission and conserve limited energy resources. …”
Get full text
Article -
1425
-
1426
An Intelligent Gestational Diabetes Mellitus Recognition System Using Machine Learning Algorithms
Published 2023-02-01“…In the recommended model, the amount of data is reduce by using the K-means clustering method. Predictions are made using a number of classification methods, such as decision tree, random forests, SVM, KNN, logistic regression, and naive bayes. …”
Get full text
Article -
1427
Application of Quasi Proportional Resonance Control Algorithm in Three-phase Inverter Power
Published 2020-03-01“…In order to reduce the harmonic content of the inverter output voltage, a harmonic suppression method based on the quasi-proportional resonance control algorithm was proposed. The proposed method mainly suppresses the 5th and 7th harmonics of the inverter output voltage. …”
Get full text
Article -
1428
Research of Online Error Prediction and Parallel Algorithm for Voltage Transformer in Smart Grid
Published 2024-12-01“…Online voltage transformer error prediction is an important research direction in the field of smart grids. This article mainly focuses on the online error prediction and the parallelization method of voltage transformers. …”
Get full text
Article -
1429
Iterative algorithm for locating nodes in WSN based on modifying average hopping distances
Published 2009-01-01“…Three approaches were put forward to improve the poor locating performance of DV-Hop algorithm which is one of the range-free algorithms in wireless sensor network (WSN) with a dynamic topology. …”
Get full text
Article -
1430
Application of Intelligent Fuzzy Decision Tree Algorithm in English Teaching Model Improvement
Published 2021-01-01“…In this paper, we propose a way to obtain the centroids of continuous attribute clustering by K-means algorithm and combine the triangular fuzzy number to fuzzy the continuous data. …”
Get full text
Article -
1431
Two-dimensional multi-scale permutation entropy algorithm based on uniform quantization
Published 2024-10-01“…Consequently, the MUPE<sub>2D</sub> algorithm provides an effective means for evaluating images.…”
Get full text
Article -
1432
Light Source Detection Algorithm in Real-time Scene Based on Single Tag
Published 2018-12-01“…The illumination coherence in augmented reality is an important means that makes virtual objects get realistic. It can make the computergenerated virtual objects blend into the real scene In order to archieve the illumination coherence of augmented reality, this paper modifies the present algorithm and proposes a algorithm based on single tag This new method collects the brightness of the identification marking in any direction to make sure which direction the light source might be; it compares the brightness of the identification marking with the brightness of the virtual objects to ensure the brightness of the light source; it determines the color of the light source by getting the color of the marker portion of no inkjet Experiments show that in meet the realtime and stability at the same time,the average angle between the virtual light source which is estimated by using the algorithm in this paper and the true source is 43 degrees,and the virtual objects can correctly cast shadows…”
Get full text
Article -
1433
Identifying vital nodes algorithm in social networks fusing higher-order information
Published 2019-10-01“…Identifying vital nodes is a basic problem in complex network research.The existing theoretical framework,mainly considered from the lower-order structure of node-based and edge-based relations often ignores important factors such as interactivity and transitivity between multiple nodes.To identify vital nodes more accurately,the motif,the high-er-order structure of the network,was studied as the basic unit.Firstly,a notion of higher-order degree of nodes in a com-plex network was proposed.Then,the higher-order structure and lower-order structure of nodes were fused into evidence theory.A semi-local identifying vital nodes algorithm fusing higher-order information of nodes was designed.The results of experiments on three real social networks show that the proposed algorithm can identify vital nodes more accurately in the network than the existing methods which only focus on the low-order structure.…”
Get full text
Article -
1434
Recurrent neural network based turbo decoding algorithms for different code rates
Published 2022-06-01“…Turbo decoders are constructed by two means; as neural Turbo decoder and deep learning Turbo decoder. …”
Get full text
Article -
1435
Critical Algorithmic Mediation: Rethinking Cultural Transmission and Education in the Age of Artificial Intelligence
Published 2025-07-01“…It argues that algorithms operate as cultural agents, acquiring a form of operative agency that enables them to intervene in the production, circulation, and legitimation of meaning. …”
Get full text
Article -
1436
Algorithms Facilitating the Observation of Urban Residential Vacancy Rates: Technologies, Challenges and Breakthroughs
Published 2025-03-01“…By comparing these algorithms, we can clarify the advantages and adaptability of different algorithms in different scenarios. …”
Get full text
Article -
1437
KAB: A new k-anonymity approach based on black hole algorithm
Published 2022-07-01“…We propose, in this paper, a novel algorithm based on a simple nature-inspired metaheuristic called Black Hole Algorithm (BHA), to address such limitations. …”
Get full text
Article -
1438
Detection of Victimization Patterns and Risk of Gender Violence Through Machine Learning Algorithms
Published 2025-02-01“…Models were developed to classify women according to their vulnerability and risk of suffering various forms of violence, which were integrated into a decision-making tool for local authorities. The algorithms employed include K-means for clustering, artificial neural networks, random forests, decision trees, and multiclass classification algorithms combined with fuzzy classification techniques to handle the incomplete data. …”
Get full text
Article -
1439
Research on Network Intrusion Detection Based on Weighted Histogram Algorithm for In-Vehicle Ethernet
Published 2025-06-01“…This study focuses on network intrusion and security issues in In-Vehicle Ethernet, by analyzing the data characteristics of Audio Video Transport Protocol and potential network attack means. We innovatively propose a network intrusion detection method based on a weighted histogram algorithm. …”
Get full text
Article -
1440
Dance video action recognition algorithm based on improved hypergraph convolutional networks
Published 2025-12-01Get full text
Article