-
581
Secure beamforming design for IRS-assisted SWIPT Internet of things system
Published 2021-04-01“…In order to meet the new requirements of intelligent signal processing deployment and physical layer security for green interconnection of things, a design method of secure beamforming was proposed to solve the problem of the shortage of sustainable energy supply in the information and energy transmission at the same time Internet of things (IoT) system assisted by intelligent reflecting surface (IRS).Considering the constraints of secrecy rate, transmit power and IRS reflection phase shift, the optimization problem was modeled as a non-convex quadratic programming problem with quadratic constraints, aiming at maximizing the acquisition power of energy collector, and jointly optimizing the base station transmit beamforming matrix, jammer covariance matrix and IRS phase shift.The non-convex quadratic problem was transformed into an equivalent convex problem by using the relaxation variable, semidefinite relaxation method, auxiliary variable and sequence parameter convex approximation method, and an alternative iterative optimization algorithm was proposed to obtain the feasible solution of the original problem.Simulation results show that the proposed algorithm can converge quickly and improve performance effectively compared with the benchmark scheme.…”
Get full text
Article -
582
Imposing Star-Shaped Hard Constraints on the Neural Network Output
Published 2024-11-01“…The largest admissible shift is determined by the differentiable Ray marching algorithm. …”
Get full text
Article -
583
SECTOR LOCALIZATION, PARAMETERIZATION AND IDENTIFICATION OF REFERENCE POINTS BASED ON CORNER COEFFICIENTS FOR ALIGNING THE OVERLAPPING IMAGES
Published 2019-06-01“…It is shown that these algorithms compared to the methods of SIFT and SURF provide a reduction in the computational complexity of localization and parameterization of reference points and increase the stability of their descriptors at parallax.…”
Get full text
Article -
584
A Model for Bus Crew Scheduling Problem with Multiple Duty Types
Published 2012-01-01“…Correspondingly, a heuristic algorithm utilizing the tabu search algorithm has been proposed to solve the model. …”
Get full text
Article -
585
Multiplierless discrete Fourier transform based on moments
Published 2009-01-01“…A novel algorithm to perform Discrete Fourier Transform(DFT) multiplierlessly was proposed.First, by modular mapping and truncating Taylor series expansion, the DFT was expressed in the form of the product of the constants and discrete moments.Second, by performing appropriate bit operations and shift operations in binary system, the product could be transformed to some additions of integers.The proposed algorithm only involved integer additions and shifts because the discrete moments could be computed only by integer additions.The systolic VLSI was designed to perform the new algorithm, followed by complexity analysis.Compared with the state-of-the-art systolic structure, the proposed design was multiplierless and easier to implement with less hardware and time.The approach was also applicable to other discrete transforms.…”
Get full text
Article -
586
Invariant Feature Matching in Spacecraft Rendezvous and Docking Optical Imaging Based on Deep Learning
Published 2024-12-01“…Focusing on exploring a new approach as assistance, this study marks the first application of deep learning-based image feature matching in spacecraft docking tasks, introducing the Class-Tuned Invariant Feature Transformer (CtIFT) algorithm. CtIFT incorporates an improved cross-attention mechanism and a custom-designed feature classification module. …”
Get full text
Article -
587
Attractive Visuality Generation Within the 360˚-VR Video Format as a Technological Trend in Modern Film Production
Published 2023-09-01“…It is proved that the 360˚-VR video format is a unique audiovisual form that requires a special grammatical, technical and technological base (professional or amateur 360˚ camera, effective tools for creating and editing 360˚video content for the different platforms, Kolor Autopano Video Pro, SIFT algorithm, etc.) thus, brings the use of the immersion principle to a qualitatively new level. …”
Get full text
Article -
588
A UAV Image Stitching Method for Complex Urban Environments
Published 2025-07-01“…Experimental results show that the proposed method achieves high processing speed on low-performance hardware platforms, improves feature point distribution uniformity to 0.89, and achieves stitching accuracy (RMSE) of 3.5 pixels, significantly outperforming ORB and SIFT algorithms, while remaining robust in dynamic occlusion and lighting variation scenarios. …”
Get full text
Article -
589
A Multitask Network for the Diagnosis of Autoimmune Gastritis
Published 2025-05-01“…First, we employ the Scale-Invariant Feature Transform (SIFT) algorithm for image registration, generating an image similarity matrix. …”
Get full text
Article -
590
Novel estrogen-related gene variants identified by whole-exome sequencing in pregnancy-associated intrahepatic cholestasis
Published 2025-08-01“…These variants exhibited the following characteristics: (1) complete absence in 1,237 controls and all public genomic databases (1000 Genomes, ExAC, and dbSNP); (2) evolutionary conservation of the affected residues, with unanimous pathogenic predictions from all algorithms (PolyPhen-2: damaging; SIFT: deleterious; MutationTaster: disease-causing); (3) molecular modeling demonstrating structural perturbations in critical functional domains, including steroid-binding and redox partner interaction sites. …”
Get full text
Article -
591
A Student Information Management System Based on Fingerprint Identification and Data Security Transmission
Published 2017-01-01“…In order to ensure the security of data transmission, this paper proposes a data encryption method based on an improved AES algorithm. A new S-box is cleverly designed, which can significantly reduce the encryption time by improving ByteSub, ShiftRow, and MixColumn in the round transformation of the traditional AES algorithm with the process of look-up table. …”
Get full text
Article -
592
基于BP神经网络的汽车变速箱试验台开发与试验研究
Published 2014-01-01“…A universal online detection test-bed of transmission is developed,the automatic shift of transmission is realized by the test-bed using the industry control computer control mechanical arm.Data analysis model is established based on neural network algorithm,and neural network training is completed by the gradient descent method.The network can discriminate transmission quality successfully.The establishment of expert system is good to solve nonlinear problems of shift strategy and determine the gear parameters accurately.The fatigue test,transmission efficiency test and other test items can be completed by the test-bed.The system has good reliability,high intelligence and has the good application value in the aspect of automatic detection and fault diagnosis of gearbox.…”
Get full text
Article -
593
Performance optimization of physical layer security in STAR-RIS aided NOMA system
Published 2024-05-01“…To address this issue, a mixed algorithm based on penalty dual decomposition (PDD) and block coordinate descent (BCD) was proposed for optimizing the beamforming vectors at the base station and the phase-shift coefficients of the STAR-RIS jointly, aiming to maximize the minimum secure transmission rate of the system. …”
Get full text
Article -
594
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
Published 2021-09-01“…We use thereafter the AES encryption algorithm in our cryptosystem by replacing the linear permutation of ShiftRows with round key permutation technique; this changing makes the encryption scheme depend on encryption key. …”
Get full text
Article -
595
LCDDN-YOLO: Lightweight Cotton Disease Detection in Natural Environment, Based on Improved YOLOv8
Published 2025-02-01“…To address the challenges of detecting cotton pests and diseases in natural environments, as well as the similarities in the features exhibited by cotton pests and diseases, a Lightweight Cotton Disease Detection in Natural Environment (LCDDN-YOLO) algorithm is proposed. The LCDDN-YOLO algorithm is based on YOLOv8n, and replaces part of the convolutional layers in the backbone network with Distributed Shift Convolution (DSConv). …”
Get full text
Article -
596
An OPMA for Robust Mutual Coupling Coefficients Estimation of URA with Single Snapshot in MIMO HF Sky-Wave Radar
Published 2016-01-01“…Then, based on the idea of the particle filter, the online particles with a moderate computational complexity are used to generate some different estimation results. Finally, the mean-shift algorithm is applied to get a more robust estimate of the equivalent mutual coupling coefficients matrix. …”
Get full text
Article -
597
The threshold of the residual pitch in three-component inharmonic stimuli
Published 2014-01-01“…The subjects listened to three components, the harmonics of 200 Hz, which were equally shifted in the frequency domain. A 30 Hz shift was applied. …”
Get full text
Article -
598
An Automated Feature-Based Image Registration Strategy for Tool Condition Monitoring in CNC Machine Applications
Published 2024-11-01“…A comparison of feature detector-descriptor algorithms found SIFT, KAZE, and ORB to be the most suitable for MV-TCM registration, with KAZE presenting the highest accuracy and ORB being the most computationally efficient. …”
Get full text
Article -
599
Method of anti-confusion texture feature descriptor for malware images
Published 2018-11-01“…It is a new method that uses image processing and machine learning algorithms to classify malware samples in malware visualization field.The texture feature description method has great influence on the result.To solve this problem,a new method was presented that joints global feature of GIST with local features of LBP or dense SIFT in order to construct combinative descriptors of malware gray-scale images.Using those descriptors,the malware classification performance was greatly improved in contrast to traditional method,especially for those samples have higher similarity in the different families,or those have lower similarity in the same family.A lot of experiments show that new method is much more effective and general than traditional method.On the confusing dataset,the accuracy rate of classification has been greatly improved.…”
Get full text
Article -
600
EVALUATION OF MEASURES TO DETECT MISAPPROPRIATION OF RESOURCES
Published 2016-08-01“…The focus is on the algorithm steps to prepare information and conduct calculations to identify the misuse of resources. …”
Get full text
Article