نتایج جستجو برای: huang algorithm

تعداد نتایج: 761631  

Journal: :JCP 2011
Wei Liu Yuhua Yan Rulin Wang

In order to detect coal gangue interface on fully mechanized mining face, a new method of vibration signal analysis of coal and gangue based on Hilbert-Huang transform is presented in this paper. At first Empirical mode decomposition algorithm was used to decompose the original vibration signal of coal and gangue into intrinsic modes for further extract meaningful information contained in respo...

Journal: :Signal Processing 2011
Julien Fleureau Amar Kachenoura Laurent Albera Jean Claude Nunes Lotfi Senhadji

Empirical Mode Decomposition (EMD) is an emerging topic in signal processing research, applied in various practical fields due in particular to its data-driven filter bank properties. In this paper, a novel EMD approach called X-EMD (eXtended-EMD) is proposed, which allows for a straightforward decomposition of monoand multivariate signals without any change in the core of the algorithm. Qualit...

2014
Bouabida Zohra Hadj Slimane Zinne Eddine Fethi Bereksi-Reguig

The acquisition and the analysis of electrophysiological signals are often followed by the detection of parameters of clinical importance. In the case of fetal electrocardiogram signal, the presence of QRS complex is the best indicator of the fetal heart rate, as it is directly correlated with the fetal cardiac activity. However, to detect this complex, it is necessary to separate the signal fr...

Journal: :IEICE Transactions 2010
Masahiro Kimoto Tatsuhiro Tsuchiya Tohru Kikuno

The idea of self-stabilization was introduced by Edsger W. Dijkstra in 1974 [1]. Self-stabilizing algorithms enable systems to be started in an arbitrary state and still converge to a desired behavior. In this letter, we discuss the time complexity of the self-stabilizing algorithm proposed by Hsu and Huang in [2], which finds a maximal matching in a network. This algorithm is the first self-st...

Journal: :Neurocomputing 2008
Guang-Bin Huang Lei Chen

Recently an incremental algorithm referred to as incremental extreme learning machine (I-ELM) was proposed by Huang et al. [G.-B. Huang, L. Chen, C.-K. Siew, Universal approximation using incremental constructive feedforward networks with random hidden nodes, IEEE Trans. Neural Networks 17(4) (2006) 879–892], which randomly generates hidden nodes and then analytically determines the output weig...

2011
M. A. Fariborzi Araghi M. M. Hosseinzadeh

The main aim of this paper intends to discuss the solution of general dual fuzzy linear system (GDFLS) C BX F AX + = + where A , B are real n m× matrix , F and C are fuzzy vectors, and the unknown vector X is a vector consisting of n fuzzy numbers, by a special algorithm based on a class of ABS algorithms called Huang algorithm. In special case, we apply the proposed algorithm for the solution ...

Journal: :MONET 2013
Xue Han Lin Han Yiqing Zhou Liang Huang Manli Qian Jinlong Hu Jinglin Shi

Traffic offloading is a promising technique to alleviate the traffic load in LTE core networks. Based on 3GPP “SIPTO” (Selected IP Traffic Offload) architecture, this paper proposes dynamic SIPTO mechanism (D-SIPTO) for traffic offloading in LTE HeNB networks, which combines fast fourier transform (FFT) based IP traffic classification scheme (FFTTCS) with the dynamic traffic offload path select...

2009
G. Schlotthauer M. E. Torres H. L. Rufiner

A new algorithm for pitch extraction based on the Ensemble Empirical Mode Decomposition (EEMD) is presented. Applications to normal and pathological voices are considered. EEMD is a completely data-driven method for signal decomposition into a sum of AM FM components, called Intrinsic Mode Functions (IMFs) or modes, which can be written as ( ) cos( ( )) A t t φ . The voice fundamental frequency...

1989
Bart Preneel Antoon Bosselaers René Govaerts Joos Vandewalle

A critical analysis of the modified cryptographic checksum algorithm of Cohen and Huang points out some weaknesses in the scheme. We show how to exploit these weaknesses with a chosen text attack to derive the first bits of the key. This information suffices to manipulate blocks with a negligible chance of detection.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید