نتایج جستجو برای: twostep algorithm

تعداد نتایج: 754198  

Journal: :Computers & OR 2017
Liang Liu Maged Dessouky

We study the joint problem of scheduling passenger and freight trains for complex railway networks, where the objective is to minimize the tardiness of passenger trains at station stops and the delay of freight trains. We model the problem as a mixed integer program and propose a twostep decomposition heuristic to solve the problem. The heuristic first vertically decomposes the train schedules ...

2002
J. B. Bell

In this paper we study turbulent premixed methane flames with swirl using three-dimensional numerical simulation. The simulations are performed using an adaptive time-dependent low Mach number combustion algorithm based on a second-order projection formulation that conserves both species mass and total enthalpy. The species and enthalpy equations are treated using an operator-split approach tha...

2014
Mohsen Abbasi-Jannatabad Hossein Khoshbin

In this paper, a new algorithm is proposed for cooperative beamforming, power allocation and relay selection in the multiple input multiple output (MIMO) Orthogonal Frequency Division Multiple Access (OFDMA) CR systems where a pair of SU communicates with each other assisted by some single antenna relay nodes. The objective is to maximize signal to interference plus noise ratio (SINR) of SU sub...

2006
Mohamed Sahmoudi Hichem Snoussi Moeness G. Amin

In this contribution, we address the issue of Blind Source Separation (BSS) in non-Gaussian noise. We propose a twostep approach by combining the fractional lower order statistics (FLOS) for the mixing matrix estimation and minimum entropy criterion for noise-free source components estimation with the gradient-based BSS algorithms in an elegant way. First, we extend the existing gradient algori...

2013
Colin Vaz Vikram Ramanarayanan Shrikanth S. Narayanan

We present a method for speech enhancement of data collected in extremely noisy environments, such as those found during magnetic resonance imaging (MRI) scans. We propose a twostep algorithm to perform this noise suppression. First, we use probabilistic latent component analysis to learn dictionaries of the noise and speech+noise portions of the data and use these to factor the noisy spectrum ...

Journal: :CoRR 2012
Xiaochen Xia Kui Xu Youyun Xu

In two-way OFDM relay, carrier frequency offsets (CFOs) between relay and terminal nodes introduce severe intercarrier interference (ICI) which degrades the performance of traditional physical-layer network coding (PLNC). Moreover, traditional algorithm to compute the posteriori probability in the presence of ICI would incur prohibitive computational complexity at the relay node. In this paper,...

2006
Mohamed Sahmoudi Hichem Snoussi Moeness G. Amin

In this contribution, we address the issue of Blind Source Separation (BSS) in non-Gaussian noise. We propose a twostep approach by combining the fractional lower order statistics (FLOS) for the mixing matrix estimation and minimum entropy criterion for noise-free source components estimation with the gradient-based BSS algorithms in an elegant way. First, we extend the existing gradient algori...

Journal: :Communications in Mathematics 2023

We classify the left-invariant sub-Riemannian structures on unique five-dimensional simply connected two-step nilpotent Lie group with two-dimensional commutator subgroup; this 5D is first twostep beyond three-and Heisenberg groups. Alongside, we also present a classification, up to automorphism, of subspaces associated algebra (together complete set invariants).

Journal: :eLife 2021

Here, we develop a simple molecular test for SARS-CoV-2 in saliva based on reverse transcription loop-mediated isothermal amplification. The has two steps: (1) heat with stabilization solution and (2) detect virus by incubating primer/enzyme mix. After incubation, samples containing the genome turn bright yellow. Because this is pH dependent, it can react falsely to some naturally acidic sample...

2009
Paul C. van Oorschot Tao Wan

Text-based passwords alone are subject to dictionary attacks as users tend to choose weak passwords in favor of memorability, as well as phishing attacks. Many recognition-based graphical password schemes alone, in order to offer sufficient security, require a number of rounds of verification, introducing usability issues. We suggest a hybrid user authentication approach combining text password...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید