Search alternatives:
sift » soft (Expand Search)
Showing 581 - 600 results of 1,551 for search '(sift OR shift) algorithm', query time: 0.12s Refine Results
  1. 581

    Secure beamforming design for IRS-assisted SWIPT Internet of things system by Zhengyu ZHU, Jinlei XU, Gangcan SUN, Ning WANG, Wanming HAO

    Published 2021-04-01
    “…In order to meet the new requirements of intelligent signal processing deployment and physical layer security for green interconnection of things, a design method of secure beamforming was proposed to solve the problem of the shortage of sustainable energy supply in the information and energy transmission at the same time Internet of things (IoT) system assisted by intelligent reflecting surface (IRS).Considering the constraints of secrecy rate, transmit power and IRS reflection phase shift, the optimization problem was modeled as a non-convex quadratic programming problem with quadratic constraints, aiming at maximizing the acquisition power of energy collector, and jointly optimizing the base station transmit beamforming matrix, jammer covariance matrix and IRS phase shift.The non-convex quadratic problem was transformed into an equivalent convex problem by using the relaxation variable, semidefinite relaxation method, auxiliary variable and sequence parameter convex approximation method, and an alternative iterative optimization algorithm was proposed to obtain the feasible solution of the original problem.Simulation results show that the proposed algorithm can converge quickly and improve performance effectively compared with the benchmark scheme.…”
    Get full text
    Article
  2. 582

    Imposing Star-Shaped Hard Constraints on the Neural Network Output by Andrei Konstantinov, Lev Utkin, Vladimir Muliukha

    Published 2024-11-01
    “…The largest admissible shift is determined by the differentiable Ray marching algorithm. …”
    Get full text
    Article
  3. 583

    SECTOR LOCALIZATION, PARAMETERIZATION AND IDENTIFICATION OF REFERENCE POINTS BASED ON CORNER COEFFICIENTS FOR ALIGNING THE OVERLAPPING IMAGES by O. J. Al-Furaiji, V. K. Kanapelka, V. YU. Tsviatkou

    Published 2019-06-01
    “…It is shown that these algorithms compared to the methods of SIFT and SURF provide a reduction in the computational complexity of localization and parameterization of reference points and increase the stability of their descriptors at parallax.…”
    Get full text
    Article
  4. 584

    A Model for Bus Crew Scheduling Problem with Multiple Duty Types by Mingming Chen, Huimin Niu

    Published 2012-01-01
    “…Correspondingly, a heuristic algorithm utilizing the tabu search algorithm has been proposed to solve the model. …”
    Get full text
    Article
  5. 585

    Multiplierless discrete Fourier transform based on moments by LIU Zhen-bing, LIU Jian-guo, WANG Guo-you

    Published 2009-01-01
    “…A novel algorithm to perform Discrete Fourier Transform(DFT) multiplierlessly was proposed.First, by modular mapping and truncating Taylor series expansion, the DFT was expressed in the form of the product of the constants and discrete moments.Second, by performing appropriate bit operations and shift operations in binary system, the product could be transformed to some additions of integers.The proposed algorithm only involved integer additions and shifts because the discrete moments could be computed only by integer additions.The systolic VLSI was designed to perform the new algorithm, followed by complexity analysis.Compared with the state-of-the-art systolic structure, the proposed design was multiplierless and easier to implement with less hardware and time.The approach was also applicable to other discrete transforms.…”
    Get full text
    Article
  6. 586

    Invariant Feature Matching in Spacecraft Rendezvous and Docking Optical Imaging Based on Deep Learning by Dongwen Guo, Shuang Wu, Desheng Weng, Chenzhong Gao, Wei Li

    Published 2024-12-01
    “…Focusing on exploring a new approach as assistance, this study marks the first application of deep learning-based image feature matching in spacecraft docking tasks, introducing the Class-Tuned Invariant Feature Transformer (CtIFT) algorithm. CtIFT incorporates an improved cross-attention mechanism and a custom-designed feature classification module. …”
    Get full text
    Article
  7. 587

    Attractive Visuality Generation Within the 360˚-VR Video Format as a Technological Trend in Modern Film Production by Ігор Печеранський

    Published 2023-09-01
    “…It is proved that the 360˚-VR video format is a unique audiovisual form that requires a special grammatical, technical and technological base (professional or amateur 360˚ camera, effective tools for creating and editing 360˚video content for the different platforms, Kolor Autopano Video Pro, SIFT algorithm, etc.) thus, brings the use of the immersion principle to a qualitatively new level. …”
    Get full text
    Article
  8. 588

    A UAV Image Stitching Method for Complex Urban Environments by W. Niu, D. Qiu, R. Wu, R. Wu, Z. Wang, Y. Shi

    Published 2025-07-01
    “…Experimental results show that the proposed method achieves high processing speed on low-performance hardware platforms, improves feature point distribution uniformity to 0.89, and achieves stitching accuracy (RMSE) of 3.5 pixels, significantly outperforming ORB and SIFT algorithms, while remaining robust in dynamic occlusion and lighting variation scenarios. …”
    Get full text
    Article
  9. 589

    A Multitask Network for the Diagnosis of Autoimmune Gastritis by Yuqi Cao, Yining Zhao, Xinao Jin, Jiayuan Zhang, Gangzhi Zhang, Pingjie Huang, Guangxin Zhang, Yuehua Han

    Published 2025-05-01
    “…First, we employ the Scale-Invariant Feature Transform (SIFT) algorithm for image registration, generating an image similarity matrix. …”
    Get full text
    Article
  10. 590

    Novel estrogen-related gene variants identified by whole-exome sequencing in pregnancy-associated intrahepatic cholestasis by Hua Lai, Siming Xin, Jinliang Zhang, Yang Hu, Wenjuan Fan, Hong Wan, Bowen Chen, Yang Zou, Xiaoming Zeng, Xianxian Liu

    Published 2025-08-01
    “…These variants exhibited the following characteristics: (1) complete absence in 1,237 controls and all public genomic databases (1000 Genomes, ExAC, and dbSNP); (2) evolutionary conservation of the affected residues, with unanimous pathogenic predictions from all algorithms (PolyPhen-2: damaging; SIFT: deleterious; MutationTaster: disease-causing); (3) molecular modeling demonstrating structural perturbations in critical functional domains, including steroid-binding and redox partner interaction sites. …”
    Get full text
    Article
  11. 591

    A Student Information Management System Based on Fingerprint Identification and Data Security Transmission by Pengtao Yang, Guiling Sun, Jingfei He, Peiyao Zhou, Jiangjiang Liu

    Published 2017-01-01
    “…In order to ensure the security of data transmission, this paper proposes a data encryption method based on an improved AES algorithm. A new S-box is cleverly designed, which can significantly reduce the encryption time by improving ByteSub, ShiftRow, and MixColumn in the round transformation of the traditional AES algorithm with the process of look-up table. …”
    Get full text
    Article
  12. 592

    基于BP神经网络的汽车变速箱试验台开发与试验研究 by 杨正才, 黄兵锋

    Published 2014-01-01
    “…A universal online detection test-bed of transmission is developed,the automatic shift of transmission is realized by the test-bed using the industry control computer control mechanical arm.Data analysis model is established based on neural network algorithm,and neural network training is completed by the gradient descent method.The network can discriminate transmission quality successfully.The establishment of expert system is good to solve nonlinear problems of shift strategy and determine the gear parameters accurately.The fatigue test,transmission efficiency test and other test items can be completed by the test-bed.The system has good reliability,high intelligence and has the good application value in the aspect of automatic detection and fault diagnosis of gearbox.…”
    Get full text
    Article
  13. 593

    Performance optimization of physical layer security in STAR-RIS aided NOMA system by LI Meiling, WANG Yumin, WANG Sijing, ZHANG Haijun

    Published 2024-05-01
    “…To address this issue, a mixed algorithm based on penalty dual decomposition (PDD) and block coordinate descent (BCD) was proposed for optimizing the beamforming vectors at the base station and the phase-shift coefficients of the STAR-RIS jointly, aiming to maximize the minimum secure transmission rate of the system. …”
    Get full text
    Article
  14. 594

    An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme by Rachid RIMANI, Naima HADJ SAID, Adda ALI PACHA, Juan Antonio López RAMOS

    Published 2021-09-01
    “…We use thereafter the AES encryption algorithm in our cryptosystem by replacing the linear permutation of ShiftRows with round key permutation technique; this changing makes the encryption scheme depend on encryption key. …”
    Get full text
    Article
  15. 595

    LCDDN-YOLO: Lightweight Cotton Disease Detection in Natural Environment, Based on Improved YOLOv8 by Haoran Feng, Xiqu Chen, Zhaoyan Duan

    Published 2025-02-01
    “…To address the challenges of detecting cotton pests and diseases in natural environments, as well as the similarities in the features exhibited by cotton pests and diseases, a Lightweight Cotton Disease Detection in Natural Environment (LCDDN-YOLO) algorithm is proposed. The LCDDN-YOLO algorithm is based on YOLOv8n, and replaces part of the convolutional layers in the backbone network with Distributed Shift Convolution (DSConv). …”
    Get full text
    Article
  16. 596

    An OPMA for Robust Mutual Coupling Coefficients Estimation of URA with Single Snapshot in MIMO HF Sky-Wave Radar by Yuguan Hou, Qingguo Jin, Shaochuan Wu, Zhuoming Li

    Published 2016-01-01
    “…Then, based on the idea of the particle filter, the online particles with a moderate computational complexity are used to generate some different estimation results. Finally, the mean-shift algorithm is applied to get a more robust estimate of the equivalent mutual coupling coefficients matrix. …”
    Get full text
    Article
  17. 597

    The threshold of the residual pitch in three-component inharmonic stimuli by Adam Mielczarek

    Published 2014-01-01
    “…The subjects listened to three components, the harmonics of 200 Hz, which were equally shifted in the frequency domain. A 30 Hz shift was applied. …”
    Get full text
    Article
  18. 598

    An Automated Feature-Based Image Registration Strategy for Tool Condition Monitoring in CNC Machine Applications by Eden Lazar, Kristin S. Bennett, Andres Hurtado Carreon, Stephen C. Veldhuis

    Published 2024-11-01
    “…A comparison of feature detector-descriptor algorithms found SIFT, KAZE, and ORB to be the most suitable for MV-TCM registration, with KAZE presenting the highest accuracy and ORB being the most computationally efficient. …”
    Get full text
    Article
  19. 599

    Method of anti-confusion texture feature descriptor for malware images by Yashu LIU, Zhihai WANG, Hanbing YAN, Yueran HOU, Yukun LAI

    Published 2018-11-01
    “…It is a new method that uses image processing and machine learning algorithms to classify malware samples in malware visualization field.The texture feature description method has great influence on the result.To solve this problem,a new method was presented that joints global feature of GIST with local features of LBP or dense SIFT in order to construct combinative descriptors of malware gray-scale images.Using those descriptors,the malware classification performance was greatly improved in contrast to traditional method,especially for those samples have higher similarity in the different families,or those have lower similarity in the same family.A lot of experiments show that new method is much more effective and general than traditional method.On the confusing dataset,the accuracy rate of classification has been greatly improved.…”
    Get full text
    Article
  20. 600

    EVALUATION OF MEASURES TO DETECT MISAPPROPRIATION OF RESOURCES by Anastasiya V. Vasileva

    Published 2016-08-01
    “…The focus is on the algorithm steps to prepare information and conduct calculations to identify the misuse of resources. …”
    Get full text
    Article