The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The experimental data is soybean gene variation information file. The individual biological information is extracted from the soybean gene file and the value of the relationship between populations is computed. Then the degree of differentiation of the two populations of wild soybean and cultivated soybean is obtained. Firstly, the easy parallel serial algorithm is designed. Then according to the...
The extraction of multi-view matching points is one of the key elements in 3D reconstruction of multi-view image scene, because the extraction results will directly affect the accuracy of 3D reconstruction. With the conversion from the extraction of multi-view matching points to dynamic connectivity, a solution based on the Union Find algorithm was designed. The efficient tree structure with parent-link...
In order to improve the efficiency of soybean genetic variation information, robust relationship inference in GWAS parallel algorithm is raised in this paper. This algorithm is adopted serial and parallel hybrid structure. Each row of data is parallel processed by OpenMP technique. The I/O processing and the accumulate processing are treated as a serial. Finally, the serial and parallel algorithms...
In this paper, we introduce a novel algorithm aiming at maximizing the transmission capacity in wireless sensor networks (WSNs). Based on the Dijkstra algorithm and the max-flow theorem, the proposed algorithm solves the contradiction between the path length and forwarding capacity of various nodes, and thus scales up the relay capacity in terms of the number of transmitted packets from the source...
In this paper, a novel joint recursive least square (RLS) and least mean square (LMS) adaptive equalization algorithm for indoor, short range wireless communications under staircase environment is proposed. In this algorithm, the RLS is initially used to realize the fast convergence. Then, the LMS is adapted to rapidly optimize the receiving signals. Once the imbalance of the equalizer or severe channel...
A wave-channel balanced dynamic RWA algorithm presented in this paper based on the business for electric power optical transport network. This algorithm is designed to solve the routing and wavelength assignment problems of multibusiness request in the complex power optical transport network. This algorithm made the classification of business requests and set the priority of each request according...
The purpose of developing the helmet-mounted color image sonar is to solve the shortcomings of the imaging sonar on the market, which is large, complex structure, complex operation, handle operation, and difficult remove. The helmet-mounted color image sonar has characteristics of a small size, simple operation, and worn directly, easily remove. With the characteristics above, the imaging algorithms...
Stereo matching is a research hotspot in binocular vision. Speed and accuracy are key problem. “Stripes” phenomenon often appears in disparity map generated by using traditional stereo matching algorithm based on dynamic programming. In order to solve this problem, the absolute difference combining Census transformation similarity measure strategy is constructed, the reliability of the initial matching...
Combinatorial encryption algorithm is advanced. Combinatorial encryption method makes use of the variety of ordinal in universal combination code. Firstly, the theory of universal combinatorial coding is expatiated. Secondly, researches are done in combinatorial encryption characteristic, key generating method, encryption and decryption algorithms. At last, key space is analyzed. Combinatorial encryption...
Based on the theory of sparse representation, a novel method for handwritten characters recognition is presented. The proposed approach directly constructs an overcomplete dictionary with the training samples, and achieves the sparse representation of each testing sample over the dictionary by optimizing an objective function which includes the reconstruction error and another ℓ1-norm regularized...
In this paper we present a load matching task scheduling algorithm for energy harvesting real-time embedded systems using a realistic model for the battery charging and discharging processes. The proposed approach addresses two important issues that have not been considered by previous work: load matching and battery charge/discharge overhead. The new algorithm increases available energy by managing...
The consistent proof of operation in finite field is presented by studying mathematical operations in Galois Field(28) and comparing Rijndael algorithm with Reed-Solomon algorithm in this paper. The explanation for various operations is given from the perspective of polynomial multiply, especially paying more attention to multiplication operation. Through analysis of mathematical operations, author...
Aiming at multi-focus image fusion, a new image fusion algorithm based on matching pursuit is proposed. Through matching pursuit signal decomposition algorithm, distinctive atoms with higher energy are selected from each input registered image to construct fused image. Some problems in traditional image fusion methods, such as ringing effect or blocking artifacts, can be avoided effectively. The last...
This paper proposed an improved ant algorithm with feedback function extension and dynamic pheromone design (dynamicAnt) for the network traffic management issue. The scheme first mapped the network traffic path delay and bandwidth metrics into the parameters of the basic ant algorithm. And then extended the network feedback function to the basic ant algorithm by simulated it as the food smell. By...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.