-
1641
Sorting algorithm acceleration based on CPU-FPGA heterogeneous system
Published 2022-01-01Get full text
Article -
1642
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
Published 2023-04-01Get full text
Article -
1643
Improved SOR signal detection algorithm in massive MIMO-TRDMA systems
Published 2021-10-01Get full text
Article -
1644
Robust interference alignment algorithm for cognitive MIMO interference network
Published 2016-03-01“…A robust interference alignment algorithm was proposed for underlay cognitive MIMO interference network with imperfect channel-state information (CSI).Firstly,imperfect CSI was characterized by Euclidean ball-shaped uncer-tainty,based on which the optimization model of transmitting precoding and receiving interference subspace matrix was constructed with aimed of minimizing interference leak Then,primary users' interference temperature constraint un-der the worst-case condition was derived according to the matrix norm inequality.Finally,alternate iteration expressions of transceiver matrixes were obtained exploiting Lagrange partial dual-decomposition theory and sub-gradient update method.Moreover,the proposed algorithm's application condition and degrees of freedom range were theoretically ana-lyzed.Simulation results show that the proposed algor m is robust and its secondary users' network performance out-performs existing algorithms'.…”
Get full text
Article -
1645
Congestion control algorithms in wireless sensor networks: Trends and opportunities
Published 2017-07-01Get full text
Article -
1646
A Fast Map Merging Algorithm in the Field of Multirobot SLAM
Published 2013-01-01“…In this paper, a map merging algorithm based on virtual robot motion is proposed for multi-robot SLAM. …”
Get full text
Article -
1647
Research on Small Target Detection Algorithm for Autonomous Vehicle Scenarios
Published 2025-01-01“…Nonetheless, existing algorithms offer room for improvement, particularly when detecting distant or inherently small targets, such as vehicles and pedestrians, from camera perspectives. …”
Get full text
Article -
1648
Mobility Load Balancing in Cellular System with Multicriteria Handoff Algorithm
Published 2017-01-01“…Efficient traffic load balancing algorithm is very important to serve more mobile users in the cellular networks. …”
Get full text
Article -
1649
Identification of nonlinear structural parameters based on particle filtering algorithm
Published 2025-09-01Get full text
Article -
1650
Supporting the editing of dot maps using the spectral clustering algorithm
Published 2025-01-01“…In the study, equal-size spectral clustering algorithm was used, which was modified with a function equalizing the number of points in clusters. …”
Get full text
Article -
1651
MGL-YOLO: A Lightweight Barcode Target Detection Algorithm
Published 2024-11-01“…Experimental results show that the proposed algorithm increases MAP50 and MAP50.95 by 2.57% and 2.31%, respectively, compared to YOLOv8, while reducing parameter size and computational cost by 36.21% and 34.15%, respectively. …”
Get full text
Article -
1652
An efficient algorithmic framework to minimize the summand matrix in binary multiplication
Published 2025-10-01“…Binary multiplication is a key operation in digital systems, often limited by the complexity of generating and summing numerous partial products. Traditional methods, like Booth’s algorithm, produce a summand matrix proportional to the operand bit-length, increasing computational load, hardware usage and latency. …”
Get full text
Article -
1653
Underwater Object Detection Algorithm Based on an Improved YOLOv8
Published 2024-11-01“…Due to the complexity and diversity of underwater environments, traditional object detection algorithms face challenges in maintaining robustness and detection accuracy when applied underwater. …”
Get full text
Article -
1654
Non-Profiled Partial Nibble Recovery on Power Attack Resilient Adiabatic PRESENT Block Cipher Through AI Vulnerability Assessment
Published 2025-01-01“…Artificial Intelligence (AI) techniques, by eliminating the need for prior knowledge of cryptographic algorithms, have emerged as powerful tools for executing effective SCAs on secure implementations. …”
Get full text
Article -
1655
-
1656
-
1657
A Modified Algorithm for Processing Shadowgraph, Obtained with the Coded Aperture
Published 2012-01-01Get full text
Article -
1658
-
1659
RETRACTED: Development of methods and algorithms for calculating ventilation and perfusion in the EIT
Published 2024-01-01Get full text
Article -
1660
RETRACTED: Algorithm, mathematical models and analysis of axle counting systems
Published 2023-01-01Get full text
Article