Showing 621 - 640 results of 19,511 for search '"Algorithm"', query time: 0.08s Refine Results
  1. 621
  2. 622
  3. 623

    An improved coarse alignment algorithm for SINS based on rotation modulation by Yong Yang, Donglin Li, Lingbing Kong, Kaijun Xu, Honghui Xiang

    Published 2025-01-01
    “…This paper proposes an improved coarse alignment algorithm by introducing single-axis continuous rotation modulation to compensate for the errors in gyroscopes and accelerometers, thus improving accuracy. …”
    Get full text
    Article
  4. 624

    Research and Implementation of Fast-LPRNet Algorithm for License Plate Recognition by Zhichao Wang, Yu Jiang, Jiaxin Liu, Siyu Gong, Jian Yao, Feng Jiang

    Published 2021-01-01
    “…Aiming at the problems of traditional license plate recognition algorithms such as the low accuracy, slow speed, and the recognition rate being easily affected by the environment, a Convolutional Neural Network- (CNN-) based license plate recognition algorithm-Fast-LPRNet is proposed. …”
    Get full text
    Article
  5. 625

    Human activity recognition algorithm based on the spatial feature for WBAN by Chi JIN, Zhijun LI, Dayang SUN, Fengye HU

    Published 2019-09-01
    “…Traditional image-based activity recognition algorithms have some problems,such as high computational cost,numerous blind spots and easy privacy leakage.To solve the problem above,the CCLA (convolution-convolutional long short-term memory-attention) activity recognition algorithm based on the acceleration and gyroscope data was proposed.The convolutional neural network was used to extract spatial features of activity data and got the hidden time series information from the convolutional long short-term memory network.Simulating human brain selecting attention mechanism,attention-encoder was constructed to extract the spatial and temporal features at a higher level.The CCLA algorithm was tested on UCI-HAPT (university of California Irvine-smartphone-based recognition of human activities and postural transitions) public data set,and realized the classification of 12 types of activity with the accuracy of 93.27%.…”
    Get full text
    Article
  6. 626

    Perceptual Mapping-Based Image Tamper Detection and Recovery Algorithm by Taha Basheer Taha, Ruzelita Ngadiran, Dujan B. Taha

    Published 2022-01-01
    “…In this paper, a new algorithm is proposed to authenticate images by hiding a copy of the approximation band in the original image. …”
    Get full text
    Article
  7. 627
  8. 628
  9. 629

    Uncertain data analysis algorithm based on fast Gaussian transform by Rong-hua CHI, Yuan CHENG, Su-xia ZHU, Shao-bin HUANG, De-yun CHEN

    Published 2017-03-01
    “…The effect of the uncertainties needs to be taken full advantage during uncertain data clustering.An uncertain data clustering algorithm based on fast Gaussian transform was proposed,to solve the problems about the impact on the accuracy of clustering results and the clustering efficiency caused by the uncertainties,during the construction of uncertain data models and the distance measurement,which existed in the current researches.First,the data model according to the characteristic of the uncertainty distribution was constructed,without the premise of assuming the data distribution.And the similarity between uncertain data objects was measured by combining the two important features of uncertain objects,attribute features and the probability density function representing the characteristic of uncertainty distribution.And then the uncertain data clustering algorithm was proposed.Finally,the experiment results on UCI and real datasets indicate the better efficiency and accuracy of proposed algorithm.…”
    Get full text
    Article
  10. 630
  11. 631
  12. 632

    Twice Deployment Node Balance Algorithm for Road Network Surveillance by Liangyin Chen, Yecheng Li, Zhanghua Li, Wenke Li, Panlan Su, Hua Cheng, Qian Luo, Feng Yin, Yushi Jiang

    Published 2014-05-01
    “…This paper proposes a twice deployment node balance algorithm (TDNB) which guarantees successful detection of the moving target on road networks. …”
    Get full text
    Article
  13. 633

    Smart contract-based secure cooperative spectrum sensing algorithm by Chu Ji, Qi Zhu

    Published 2021-12-01
    “…In this article, we apply blockchain technology in spectrum sensing process and propose a related algorithm based on reputation. The algorithm builds a system model based on smart contract in blockchain and applies blockchain asymmetric encryption algorithm and digital signature technology in the process of secondary users’ transmitting local judgments to the secondary user base station. …”
    Get full text
    Article
  14. 634

    Abnormal link detection algorithm based on semi-local structure by Haoran SHI, Lixin JI, Shuxin LIU, Gengrun WANG

    Published 2022-02-01
    “…With the research in network science, real networks involved are becoming more and more extensive.Redundant error relationships in complex systems, or behaviors that occur deliberately for unusual purposes, such as wrong clicks on webpages, telecommunication network spying calls, have a significant impact on the analysis work based on network structure.As an important branch of graph anomaly detection, anomalous edge recognition in complex networks aims to identify abnormal edges in network structures caused by human fabrication or data collection errors.Existing methods mainly start from the perspective of structural similarity, and use the connected structure between nodes to evaluate the abnormal degree of edge connection, which easily leads to the decomposition of the network structure, and the detection accuracy is greatly affected by the network type.In response to this problem, a CNSCL algorithm was proposed, which calculated the node importance at the semi-local structure scale, analyzed different types of local structures, and quantified the contribution of edges to the overall network connectivity according to the semi-local centrality in different structures, and quantified the reliability of the edge connection by combining with the difference of node structure similarity.Since the connected edges need to be removed in the calculation process to measure the impact on the overall connectivity of the network, there was a problem that the importance of nodes needed to be repeatedly calculated.Therefore, in the calculation process, the proposed algorithm also designs a dynamic update method to reduce the computational complexity of the algorithm, so that it could be applied to large-scale networks.Compared with the existing methods on 7 real networks with different structural tightness, the experimental results show that the method has higher detection accuracy than the benchmark method under the AUC measure, and under the condition of network sparse or missing, It can still maintain a relatively stable recognition accuracy.…”
    Get full text
    Article
  15. 635
  16. 636

    An Elite Decision Making Harmony Search Algorithm for Optimization Problem by Lipu Zhang, Yinghong Xu, Yousong Liu

    Published 2012-01-01
    “…This paper describes a new variant of harmony search algorithm which is inspired by a well-known item “elite decision making.” …”
    Get full text
    Article
  17. 637

    Realization of a cascade treatment algorithm for glaucoma in St. Petersburg by A.V. Antonova, V.P. Nikolaenko, V.V. Brzheskiy

    Published 2021-09-01
    “…Realization of a cascade treatment algorithm for glaucoma in St. Petersburg. Russian Journal of Clinical Ophthalmology. 2021;21(3):123–128</i><i> (in Russ.)…”
    Get full text
    Article
  18. 638
  19. 639

    Wireless sensor network redundancy node sleep scheduling algorithm by Tao WEN, Dong-qing ZHANG, Quan GUO, Xiao-ying SONG

    Published 2014-10-01
    “…A scheduling algorithm for redundant nodes is proposed to effectively prolong the lifetime of WSN.The algorithm focuses on two problems.One is to prevent a large number of nodes shifting at the same time from working state into sleeping state to avoid the appearance of blind areas,the other is to employ different scheduling strategies on border nodes and internal nodes to avoid contraction of the network boundary by judging whether a node is on the network boundary according to the number of working nodes in its neighbor table.The simulation results show that the algorithm can effectively prolong the lifetime of WSN.…”
    Get full text
    Article
  20. 640