-
1
Distributionally Robust Variational Quantum Algorithms With Shifted Noise
Published 2024-01-01Subjects: Get full text
Article -
2
Reversible data hiding algorithm based on asymmetric histogram shifting
Published 2019-10-01“…The shifting of two asymmetric histograms in opposite directions in data embedding respectively had produced the pixel compensation and restore effect,a better reversible data hiding algorithm based on pixel prediction was proposed,two asymmetric histograms of prediction error were generated on the more right and the more left side of zero value,when they were shifed in the second data embedding stage,more pixels would be restored to the original image pixel value to reduce image distortion and improve the image quality.Compared with the traditional algorithm,it reduces the amount of pixels involved in the histogram shifting and protects the quality of secret image.…”
Get full text
Article -
3
Time shift TDT timing acquisition algorithm for PPM-UWB
Published 2005-01-01“…It was proved that the TDT (timing with a dirty template) blind timing algorithm was only suitable for PAM-UWB systems rather than PPM-UWB systems.Furthermore,a TS-TDT (time-shift-TDT) blind timing synchronization algorithm was presented for PPM-UWB,which got synchronizing information from calculating the delay cross-correlation values by means of two correlation branches.Theoretical analysis and simulation results demonstrate that the implementation of the algorithm is of low complexity and flexible in precision control.…”
Get full text
Article -
4
High-Stability Algorithm in White-Light Phase-Shifting Interferometry for Disturbance Suppression
Published 2018-01-01“…For white-light phase-shifting interferometry (WLPSI), this novel algorithm provides suitable performance in suppressing noise caused by external conditions, such as mechanical vibrations, low-reflectivity surfaces, and poor-contrast interferograms. …”
Get full text
Article -
5
The shift-based scaling and recursing algorithm for evaluating the action of the matrix $ \varphi $-functions
Published 2025-02-01“…Numerical comparisons with existing algorithms demonstrate that the proposed algorithm performs well in terms of both accuracy and efficiency.…”
Get full text
Article -
6
Phase Extraction Algorithm Based on the Spatial Carrier-Frequency Phase-Shifting Gradient
Published 2019-01-01“…For improving the accuracy and processing speed of phase extraction, a new phase extraction algorithm based on the spatial carrier-frequency phase-shifting gradient (SCFPS-G) is proposed. …”
Get full text
Article -
7
An Improved Genetic Algorithm for Solving the Semi-Soft Clustered Vehicle Routing Problem
Published 2025-04-01Subjects: Get full text
Article -
8
Improved Stochastic Gradient Matching Pursuit Algorithm Based on the Soft-Thresholds Selection
Published 2018-01-01“…The preliminary atom set exits redundant atoms in the stochastic gradient matching pursuit algorithm, which affects the accuracy of the signal reconstruction and increases the computational complexity. …”
Get full text
Article -
9
Predicting Soft Soil Settlement with a FAGSO-BP Neural Network Model
Published 2025-04-01Subjects: Get full text
Article -
10
Numerical Simulation of Double-Layer Nanoplates Based on Fractional Model and Shifted Legendre Algorithm
Published 2025-07-01“…This study focuses on the numerical solution and dynamics analysis of fractional governing equations related to double-layer nanoplates based on the shifted Legendre polynomials algorithm. Firstly, the fractional governing equations of the complicated mechanical behavior for bilayer nanoplates are constructed by combining the Fractional Kelvin–Voigt (FKV) model with the Caputo fractional derivative and the theory of nonlocal elasticity. …”
Get full text
Article -
11
An Iterative Shifting Disaggregation Algorithm for Multi-Source, Irregularly Sampled, and Overlapped Time Series
Published 2025-02-01“…This paper introduces the Iterative Shifting Disaggregation (ISD) algorithm, designed to process and disaggregate time series derived from sensor-sourced low-frequency measurements, transforming multiple, nonuniformly sampled sensor data streams into a single, coherent high-frequency signal. …”
Get full text
Article -
12
Modified SLM algorithm based on cyclic shift and signal combination in MIMO-OFDM system
Published 2015-04-01“…In order to reduce the computational complexity of conventional selective mapping (SLM) algorithm in multiple input multiple output orthogonal frequency division multiplexing (MIMO-OFDM) system,more candidate sequence sets will be produced.With different peak to average power ratio (PAPR) by time domain cyclic shift and signal combination between the antennas.The receiving part can restore the rotation signals by using the sequence selection order of the transmitting part and also the original signals by comparing the inversed rotation sequence with its nearest constellation points.The simulation results show that the proposed method can effectively reduce the PAPR of OFDM signals.In addition,compared with the conventional SLM algorithm,the proposed method can reduce the algorithm computation complexity significantly and obtain similar bit error rate (BER) performance.…”
Get full text
Article -
13
Novel Quantum Encryption Algorithm Based on Multiqubit Quantum Shift Register and Hill Cipher
Published 2014-01-01“…Based on a quantum shift register, a novel quantum block cryptographic algorithm that can be used to encrypt classical messages is proposed. …”
Get full text
Article -
14
Soft value flipping decoding algorithm for LDPC codes based on adjoint vectors sum
Published 2009-01-01“…By analyzing the soft value distribution while belief propagation defeated, a soft value flipping decoding algo-rithm based on adjoint vectors sum was presented.With translating the error times of check equation which obtained by adjoint vectors sum into error bits distribution parameter and flipping some bit nodes soft value only once at certain itera-tion by a selection regulation, the frame error rate of the proposed algorithm for LDPC codes which have much more correlative rows can be reduced to a larger extent without complexity increase nearly(only O(N)).…”
Get full text
Article -
15
Soft value flipping decoding algorithm for LDPC codes based on adjoint vectors sum
Published 2009-01-01“…By analyzing the soft value distribution while belief propagation defeated, a soft value flipping decoding algo-rithm based on adjoint vectors sum was presented.With translating the error times of check equation which obtained by adjoint vectors sum into error bits distribution parameter and flipping some bit nodes soft value only once at certain itera-tion by a selection regulation, the frame error rate of the proposed algorithm for LDPC codes which have much more correlative rows can be reduced to a larger extent without complexity increase nearly(only O(N)).…”
Get full text
Article -
16
Soft detection model of corrosion leakage risk based on KNN and random forest algorithms
Published 2024-09-01“…These identified indicators were then employed to develop an intelligent soft detection model that integrates pipeline and environmental data, based on the K-Nearest Neighbor (KNN) and Random Forest algorithms. …”
Get full text
Article -
17
Nonlinear Structural Acoustic Control with Shunt Circuit Governed by a Soft-Computing Algorithm
Published 2018-07-01“…The proposed control algorithm is based on algorithms from a group of soft computing. …”
Get full text
Article -
18
Mean Shift Fusion Color Histogram Algorithm for Nonrigid Complex Target Tracking in Sports Video
Published 2021-01-01“…Our results of nonrigid complex target tracking by mean shift fusion color histogram algorithm for sports video improve the accuracy by about 8% compared to other studies. …”
Get full text
Article -
19
Improved information hiding algorithm based on twice positioning in coding channel
Published 2013-12-01“…Based on analysis of existing information hiding algorithms and capacities in coding channel,the defects of those existing algorithms were pointed out,and an improved information hiding algorithm with capacity upper limit analysis and based on twice positioning was proposed.the proposed algorithm,the information hiding capacity upper limit is firstly computed before embedding,and used for comparison with the size of hiding secret data.Then,twice posi-tioning scheme and cyclic shift mechanism for choosing the embedding position were used in the proposed algorithm.Simulation results show that,compared with those existing algorithms,the proposed algorithm is able to avoid the risk of exposure of the secret channel caused by capacity exceeding of hiding data.It can not only improve the randomness of the embedding position,but also avoid the risk of overlap among different secret data.The hiding performances of the coding channel information hiding system are improved.…”
Get full text
Article -
20
A backbone-based inverse kinematics and head traction path-following algorithm for soft manipulators
Published 2025-05-01“…Finally, the feasibility of both algorithms is validated through comprehensive simulations.…”
Get full text
Article