-
781
Optimization of Aircraft Flight Trajectory Combined with Thinking Navigation Algorithm
Published 2022-01-01“…In order to improve the optimization effect of the flight trajectory of the aircraft, this paper combines the thinking navigation algorithm to optimize the flight trajectory of the aircraft and analyzes the flight trajectory of the aircraft through the intelligent model. …”
Get full text
Article -
782
ESTIMATION METHOD OF LOAD SPECTRUM DISTRIBUTION BASED ON EM ALGORITHM
Published 2020-01-01“…Take RF-half shaft torque as the research object,the mixture Gaussian fitting method based on EM was suggested. n Code software was used for rain flow counting and the load cycle was described with the vector S.The cluster number and cluster center loading were got from the clustering of the loading cycle by the SPSS software,and using EM algorithm to resolve the mean and covariance matrix of Gaussian component. …”
Get full text
Article -
783
An Image Encryption Algorithm Based on the Improved Sine-Tent Map
Published 2021-01-01“…In this algorithm, the image parameters are connected with the algorithm to generate the key. …”
Get full text
Article -
784
Successive Matrix Squaring Algorithm for Computing the Generalized Inverse AT,S(2)
Published 2012-01-01“…We investigate successive matrix squaring (SMS) algorithms for computing the generalized inverse AT,S(2) of a given matrix A∈Cm×n.…”
Get full text
Article -
785
Mathematical Model and Algorithm for the Reefer Mechanic Scheduling Problem at Seaports
Published 2017-01-01“…The proposed algorithm is tested and validated through numerical experiments. …”
Get full text
Article -
786
Crocodile optimization algorithm for solving real-world optimization problems
Published 2024-12-01Subjects: “…Crocodile optimization algorithm (COA)…”
Get full text
Article -
787
Riemannian Gradient Algorithm for the Numerical Solution of Linear Matrix Equations
Published 2014-01-01“…A Riemannian gradient algorithm based on geometric structures of a manifold consisting of all positive definite matrices is proposed to calculate the numerical solution of the linear matrix equation Q=X+∑i=1mAiTXAi. …”
Get full text
Article -
788
Efficient broadcast transmission algorithms based on opportunistic network coding
Published 2012-01-01“…Opportunistic network coding (ONC) based broadcast transmission algorithms were proposed to improve the transmission efficiency for wireless single-hop networks.Based on the traditional wireless broadcast transmission model,ONC based solo combination packet broadcast transmission (ONCSB) algorithm and ONC based multiple combination packets broadcast transmission (ONCMB) algorithm were osed respectively.By employing the method of combination different lost packets with different strategies,the ONCSB and ONCMB can improve the throughput with recovering lost packets via a combination packet efficiently.The simulation results show that either ONCSB or ONCMB can lead to better transmission bandwidth performance compared with other algorithms under different wireless channel conditions.…”
Get full text
Article -
789
Improved DFA algorithm based on multi-dimensional finite automata
Published 2015-05-01“…Compiling multiple regular expression signatures into a combined DFA can blowup in state and storage space.Explanations from the prospective of information theory and multi-dimensional mathematical model were proposed fo-cusing on the most serious state explosion.Redundancy states were divided into zero-dimensional ones and one-dimensional ones.The former were compressed by dimension,and the later were dynamically built.The space com-plexity of the model came to the theoretical lower bound by the above methods.Then the multi-dimensional finite auto-mata (MFA) was proposed with the model.Experiments show that,the construction time taken by MFA is slightly less than XFA and is 2~3 orders of magnitude lower than DFA,STT redundancy compression algorithms and Hybrid-FA; the memory space of MFA is slightly higher than XFA,but is 1~2 orders of magnitude lower than DFA,STT redundancy compression algorithms,mDFA and Hybrid-FA; in the aspect of matching time,MFA ranks after DFA and Hybrid-FA,but ranks before XFA,and it achieves 1~2 orders of magnitude lower than that of STT redundancy compression algo-rithms and mDFA.…”
Get full text
Article -
790
Performance Evaluation of Some Distributed Averaging Algorithms for Sensor Networks
Published 2011-10-01“…This is required, for example, when the network can make autonomous decisions. Several algorithms exist for solving the averaging problem in a distributed manner. …”
Get full text
Article -
791
Task distribution algorithm based on community in mobile crowd sensing
Published 2019-10-01“…A community-based task distribution algorithm was proposed to solve the problem of the validity of mobile crowd sensing (MCS) task distribution.By calculating the minimum spanning tree (MST),the connection parameter (CP) and the community convergence degree (CI) between the mobile nodes,the behavior patterns of the users were abstracted and identified to rationally divide the nodes into different communities.Then,the eigenvalue matching degree of the community behavior patterns with the sensing task was calculated.According to the matching degree,the distribution of the corresponding tasks was completed by the central node of the community.The simulation results show that the proposed method can effectively improve the accuracy of the task distribution and the task completion rate,and save the time cost of the task completion.…”
Get full text
Article -
792
Adaptor signature scheme based on ISRSAC digital signature algorithm
Published 2023-03-01“…The adapter signature scheme can provide good properties of atomic exchange in the block chain, and has been widely used in practice.A new adapter signature scheme was constructed based on a digital signature algorithm for improved security of RSA cryptosystem (ISRSAC).After proving that the proposed scheme satisfied the correctness of the pre-signature, unforgeability, adaptability of the pre-signature, extractability of the evidence and the security of the signature scheme, it was compared with the adapter signature scheme based on the SM2 digital signature algorithm, the Schnorr-based adapter signature scheme and the ECDSA-based adapter signature scheme.And these schemes were analyzed in terms of time overhead and main calculation amount.The analysis results show that the proposed scheme is similar to other schemes in terms of time overhead, but the proposed scheme expands the application scenarios of ISRSAC algorithm in the current environment, and through the combination of ISRSAC algorithm and adapter signature technology, the selection of adapter signature is more flexible and can have a wider range of applications.…”
Get full text
Article -
793
A Brand-New Algorithm for Mapping Algal Biomass in Lakes
Published 2025-01-01“…Column-integrated algal biomass has been recognized as a more logical proxy for the evaluation of lake eutrophication. Here, an algorithm with a 3-step framework is put forward for algal biomass mapping in 3 lakes of China (Lake Hongze, Lake Taihu, and Lake Chaohu). …”
Get full text
Article -
794
Combination Forecast of Economic Chaos Based on Improved Genetic Algorithm
Published 2021-01-01“…Finally, the decision tree model and the BP neural network model optimized by the improved genetic algorithm are combined, and the combined model is optimized by the improved GA. …”
Get full text
Article -
795
Power Control Algorithm Based on Normalized Utility Function Research
Published 2014-12-01“…Simulation results show that the algorithm is not restricted by system modulation mode, and reduces the computational complexity, and has faster convergence speed. …”
Get full text
Article -
796
On Two Projection Algorithms for the Multiple-Sets Split Feasibility Problem
Published 2013-01-01“…We present a projection algorithm which modifies the method proposed by Censor and Elfving (1994) and also introduce a self-adaptive algorithm for the multiple-sets split feasibility problem (MSFP). …”
Get full text
Article -
797
PARALLEL ALGORITHMS OF RANDOM FORESTS FOR CLASSIFYING VERY LARGE DATASETS
Published 2013-06-01“…The random forests algorithm proposed by Breiman is an ensemble-based approach with very high accuracy. …”
Get full text
Article -
798
Virtual network embedding algorithm based on negotiation in distributed environment
Published 2014-12-01Subjects: “…distributed embedding algorithm…”
Get full text
Article -
799
Cov-trans: an efficient algorithm for discontinuous transcript assembly in coronaviruses
Published 2024-12-01“…There is an urgent need to develop a highly accurate viral transcript assembly algorithm. Results In this work, we propose Cov-trans, a reference-based transcript assembler specifically tailored for the discontinuous transcription of coronaviruses. …”
Get full text
Article -
800
Pedestrian Reidentification Algorithm Based on Local Feature Fusion Mechanism
Published 2022-01-01“…Experimental results show that the accuracy of the proposed algorithm is superior to that of other comparison algorithms on the datasets of Market1501, Duke, and CUHK03. …”
Get full text
Article