8 results
Search Results
2. Correction of failure in linear antenna arrays with greedy sparseness constrained optimization technique.
- Author
-
Khan, Shafqat Ullah, Rahim, M. K. A., Aminu-Baba, Murtala, and Murad, N. A.
- Subjects
- *
LINEAR antenna arrays , *CORRECTION factors , *CONSTRAINED optimization , *ORTHOGONAL matching pursuit , *COMPUTER simulation - Abstract
This paper proposes the correction of faulty sensors using a synthesis of the greedy sparse constrained optimization GSCO) technique. The failure of sensors can damage the radiation power pattern in terms of sidelobes and nulls. The synthesis problem can recover the wanted power pattern with reduced number of sensors into the background of greedy algorithm and solved with orthogonal matching pursuit (OMP) technique. Numerical simulation examples of linear arrays are offered to demonstrate the effectiveness of getting the wanted power pattern with a reduced number of antenna sensors which is compared with the available techniques in terms of sidelobes level and number of nulls. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
3. A novel Gravity-FREAK feature extraction and Gravity-KLT tracking registration algorithm based on iPhone MEMS mobile sensor in mobile environment.
- Author
-
Hong, Zhiling, Lin, Fan, and Xiao, Bin
- Subjects
- *
FEATURE extraction , *IPHONE (Smartphone) , *COMPUTER algorithms , *ELECTRONIC information resources , *MICROELECTROMECHANICAL systems , *COMPUTER simulation - Abstract
Based on the traditional Fast Retina Keypoint (FREAK) feature description algorithm, this paper proposed a Gravity-FREAK feature description algorithm based on Micro-electromechanical Systems (MEMS) sensor to overcome the limited computing performance and memory resources of mobile devices and further improve the reality interaction experience of clients through digital information added to the real world by augmented reality technology. The algorithm takes the gravity projection vector corresponding to the feature point as its feature orientation, which saved the time of calculating the neighborhood gray gradient of each feature point, reduced the cost of calculation and improved the accuracy of feature extraction. In the case of registration method of matching and tracking natural features, the adaptive and generic corner detection based on the Gravity-FREAK matching purification algorithm was used to eliminate abnormal matches, and Gravity Kaneda-Lucas Tracking (KLT) algorithm based on MEMS sensor can be used for the tracking registration of the targets and robustness improvement of tracking registration algorithm under mobile environment. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
4. A multi-domain trust management model for supporting RFID applications of IoT.
- Author
-
Wu, Xu and Li, Feng
- Subjects
- *
RADIO frequency identification systems , *INTERNET of things , *COMPUTER simulation , *MATHEMATICAL models , *HIERARCHICAL clustering (Cluster analysis) - Abstract
The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system, in which trust establishment among entities from heterogeneous domains without past interaction or prior agreed policy, is a challenge. The current trust management mechanisms in the literature do not meet the specific requirements in multi-domain RFID systems. Therefore, this paper analyzes the special challenges on trust management in multi-domain RFID systems, and identifies the implications and the requirements of the challenges on the solutions to the trust management of multi-domain RFID systems. A multi-domain trust management model is proposed, which provides a hierarchical trust management framework include a diversity of trust evaluation and establishment approaches. The simulation results and analysis show that the proposed method has excellent ability to deal with the trust relationships, better security, and higher accuracy rate. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
5. Comparison of two SVD-based color image compression schemes.
- Author
-
Li, Ying, Wei, Musheng, Zhang, Fengxia, and Zhao, Jianli
- Subjects
- *
COLOR image processing , *IMAGE compression , *COMPARATIVE studies , *QUATERNIONS , *IMAGE quality analysis , *COMPUTER simulation - Abstract
Color image compression is a commonly used process to represent image data as few bits as possible, which removes redundancy in the data while maintaining an appropriate level of quality for the user. Color image compression algorithms based on quaternion are very common in recent years. In this paper, we propose a color image compression scheme, based on the real SVD, named real compression scheme. First, we form a new real rectangular matrix C according to the red, green and blue components of the original color image and perform the real SVD for C. Then we select several largest singular values and the corresponding vectors in the left and right unitary matrices to compress the color image. We compare the real compression scheme with quaternion compression scheme by performing quaternion SVD using the real structure-preserving algorithm. We compare the two schemes in terms of operation amount, assignment number, operation speed, PSNR and CR. The experimental results show that with the same numbers of selected singular values, the real compression scheme offers higher CR, much less operation time, but a little bit smaller PSNR than the quaternion compression scheme. When these two schemes have the same CR, the real compression scheme shows more prominent advantages both on the operation time and PSNR. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
6. Evolutionary Algorithm for RNA Secondary Structure Prediction Based on Simulated SHAPE Data.
- Author
-
Montaseri, Soheila, Ganjtabesh, Mohammad, and Zare-Mirakabad, Fatemeh
- Subjects
- *
MOLECULAR structure of RNA , *BIOLOGICAL evolution , *GENETICS , *NON-coding RNA , *GENETIC algorithms , *THERMODYNAMICS , *COMPUTER simulation - Abstract
Background: Non-coding RNAs perform a wide range of functions inside the living cells that are related to their structures. Several algorithms have been proposed to predict RNA secondary structure based on minimum free energy. Low prediction accuracy of these algorithms indicates that free energy alone is not sufficient to predict the functional secondary structure. Recently, the obtained information from the SHAPE experiment greatly improves the accuracy of RNA secondary structure prediction by adding this information to the thermodynamic free energy as pseudo-free energy. Method: In this paper, a new method is proposed to predict RNA secondary structure based on both free energy and SHAPE pseudo-free energy. For each RNA sequence, a population of secondary structures is constructed and their SHAPE data are simulated. Then, an evolutionary algorithm is used to improve each structure based on both free and pseudo-free energies. Finally, a structure with minimum summation of free and pseudo-free energies is considered as the predicted RNA secondary structure. Results and Conclusions: Computationally simulating the SHAPE data for a given RNA sequence requires its secondary structure. Here, we overcome this limitation by employing a population of secondary structures. This helps us to simulate the SHAPE data for any RNA sequence and consequently improves the accuracy of RNA secondary structure prediction as it is confirmed by our experiments. The source code and web server of our proposed method are freely available at . [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
7. Enhancing the Flexibility of TCP in Heterogeneous Network.
- Author
-
Hui, Wang, Peiyu, Li, Zhihui, Fan, Zheqing, Li, and Xuhui, Wei
- Subjects
- *
TCP/IP , *CHAOS theory , *INITIAL value problems , *CONVERGENCE (Telecommunication) , *COMPUTER simulation - Abstract
Due to a set of constant initial values, the performance of conventional TCP drops significantly encountering heterogeneous network, showing low throughput and unfairness. This paper firstly demonstrates the chaotic character of TCP congestion control in heterogeneous network, especially the sensitivity to initial value. Inspired by merit of nature-inspired algorithm, a novel structure of TCP congestion control (IPPM, Internet Prey-Predator Model) is proposed. Parameters such as available link capacity(C), congestion window (W) and queue length (Q) are collected by IPPM, which calculates the max value of C according to the interacting relationship existing in C, W and Q, and IPPM initiates the TCP ssthresh with the calculated value. Plenty of simulation results show that the modified TCP can effectively avoid network congestion and packet loss. Besides, it holds high resource utilization, convergence speeds, fairness and stability. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
8. Spectral X-Ray CT Image Reconstruction with a Combination of Energy-Integrating and Photon-Counting Detectors.
- Author
-
Yang, Qingsong, Cong, Wenxiang, Xi, Yan, and Wang, Ge
- Subjects
- *
COMPUTED tomography , *IMAGE reconstruction , *PHOTON counting , *COMPUTER simulation , *ALGORITHMS , *FEATURE extraction - Abstract
The purpose of this paper is to develop an algorithm for hybrid spectral computed tomography (CT) which combines energy-integrating and photon-counting detectors. While the energy-integrating scan is global, the photon-counting scan can have a local field of view (FOV). The algorithm synthesizes both spectral data and energy-integrating data. Low rank and sparsity prior is used for spectral CT reconstruction. An initial estimation is obtained from the projection data based on physical principles of x-ray interaction with the matter, which provides a more accurate Taylor expansion than previous work and can guarantee the convergence of the algorithm. Numerical simulation with clinical CT images are performed. The proposed algorithm produces very good spectral features outside the FOV when no K-edge material exists. Exterior reconstruction of K-edge material can be partially achieved. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.