Results 11 to 20 of about 151,397 (266)

Survey of 8 UAV Set-Covering Algorithms for Terrain Photogrammetry

open access: yesRemote Sensing, 2020
Remote sensing with unmanned aerial vehicles (UAVs) facilitates photogrammetry for environmental and infrastructural monitoring. Models are created with less computational cost by reducing the number of photos required.
Joshua E. Hammond   +8 more
doaj   +1 more source

Info-Greedy sequential adaptive compressed sensing [PDF]

open access: yes, 2015
We present an information-theoretic framework for sequential adaptive compressed sensing, Info-Greedy Sensing, where measurements are chosen to maximize the extracted information conditioned on the previous measurements.
Braun, Gabor   +2 more
core   +1 more source

Improved Performance of Mean Greedy Algorithm for Chunk Allocation in SC-FDMA Uplink Systems using Joint-User and Chunk-Based Allocation

open access: yesJournal of ICT Research and Applications, 2014
In this paper, the problem of subcarrier allocation on chunk-by-chunk basis in SC-FDMA uplink systems is investigated. Improved mean enhanced greedy algorithms are proposed for performing joint-user and chunk-based allocation at each transmission time ...
Arfianto Fahmi   +2 more
doaj   +1 more source

A Hybrid Virtual Network Function Placement Strategy for Maximizing the Profit of Network Service Deployment Over Time-Varying Workloads

open access: yesIEEE Access, 2021
The emergence of network function virtualization (NFV) has revolutionized the infrastructure and service management of network architecture. It allows network operators to reduce costs and improve the agility of network service deployment.
Chi-Chen Yang   +2 more
doaj   +1 more source

Sharp sufficient condition for the convergence of greedy expansions with errors in coefficient computation

open access: yesDemonstratio Mathematica, 2022
Generalized approximate weak greedy algorithms (gAWGAs) were introduced by Galatenko and Livshits as a generalization of approximate weak greedy algorithms, which, in turn, generalize weak greedy algorithm and thus pure greedy algorithm.
Valiullin Artur R.   +2 more
doaj   +1 more source

Synchronized sweep algorithms for scalable scheduling constraints [PDF]

open access: yes, 2013
This report introduces a family of synchronized sweep based filtering algorithms for handling scheduling problems involving resource and precedence constraints. The key idea is to filter all constraints of a scheduling problem in a synchronized way in
Beldiceanu, Nicolas   +2 more
core   +4 more sources

The Feature Compression Algorithms for Identifying Cytokines Based on CNT Features

open access: yesIEEE Access, 2020
As the signaling proteins, cytokines regulate a wide range of biological functions. It is important to distinguish the cytokines from other kinds of proteins.
Guilin Li, Xing Gao
doaj   +1 more source

Applications of Depth Minimization of Decision Trees Containing Hypotheses for Multiple-Value Decision Tables

open access: yesEntropy, 2023
In this research, we consider decision trees that incorporate standard queries with one feature per query as well as hypotheses consisting of all features’ values.
Mohammad Azad, Mikhail Moshkov
doaj   +1 more source

Greedy algorithms for high-dimensional eigenvalue problems [PDF]

open access: yes, 2013
In this article, we present two new greedy algorithms for the computation of the lowest eigenvalue (and an associated eigenvector) of a high-dimensional eigenvalue problem, and prove some convergence results for these algorithms and their orthogonalized ...
Cancès, Eric   +2 more
core   +4 more sources

Low-Complexity Multi-User Detection Based on Gradient Information for Uplink Grant-Free NOMA

open access: yesIEEE Access, 2020
Massive machine type communication (mMTC) serves an irreplaceable role in the development process of the Internet of Things (IoT). Because of its characteristics of massive connection and sporadic transmission, compressed sensing (CS) has been applied in
Fang Jiang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy