-
1661
An Alternate Iterative Differential Evolution Algorithm for Parameter Identification of Chaotic Systems
Published 2015-01-01“…Then through integrating two differential mutation strategies, an improved greedy selection mechanism and a population diversity balance scheme, an alternate iterative differential algorithm, called AIDE, is presented to solve the problem in this paper. …”
Get full text
Article -
1662
Characterizing Grover search algorithm on large-scale superconducting quantum computers
Published 2025-01-01Subjects: Get full text
Article -
1663
Coverage optimization algorithm based on VF-CS in mobile sensor network
Published 2018-03-01“…A random placement of large-scale sensor network in the outdoor environment often causes low coverage.An area coverage optimization algorithm of mobile sensor network (MSN) based on virtual force perturbation and Cuckoo search (VF-CS) was proposed.Firstly,the virtual force of the sensor nodes within the Thiessen polygon was analyzed based on the partitioning of Voronoi diagram of the monitoring area.Secondly,the force of polygon vertices and neighbor nodes was taken as the perturbation factor for updating the node’s location of the Cuckoo search (CS).Finally,the VF-CS guided the node to move so as to achieve the optimal coverage.The simulation results demonstrate that the proposed algorithm has higher coverage and shorter average moving distance of nodes than the Voronoi diagram based algorithms in literatures.…”
Get full text
Article -
1664
Antenna Array Synthesis and Failure Correction Using Differential Search Algorithm
Published 2014-01-01“…Differential search (DS) optimization algorithm is proposed for the synthesis of three different types of linear antenna array design examples. …”
Get full text
Article -
1665
Application of Particle Swarm Optimization Algorithm in the Heating System Planning Problem
Published 2013-01-01“…The results show that the improved particle swarm optimization (IPSO) algorithm can more preferably solve the HSP problem than PSO algorithm. …”
Get full text
Article -
1666
The High Security Mechanisms Algorithm of Similarity Metrics for Wireless and Mobile Networking
Published 2017-01-01“…To solve the security mechanisms problem and improve the efficiency, this paper proposes a new algorithm. The new algorithm scans the database only one time and the scale of data to deal with is getting smaller and smaller with the algorithm running. …”
Get full text
Article -
1667
RSS-TOA based localization algorithm in non-line-of-sight environment
Published 2019-09-01“…The existence of non-line-of-sight (NLOS) error can degrade the positioning performance in wireless sensor network localization system,especially in indoor localization.To overcome the localization error caused by NLOS propagation,a localization algorithm was proposed based on received signal strength (RSS) and time-of-arrival (TOA).Firstly,a non-convex optimization problem was established based on RSS and TOA.Then,the original non-convex optimization problem was transformed into a convex optimization problem through the second-order cone relaxation technique,therefore a sub-optimal solution to the original problem could be obtained efficiently.Finally,computer simulation results show that the proposed method can provide higher estimation accuracy and better performance.…”
Get full text
Article -
1668
A Topology Control Algorithm for Sensor Networks Based on Robust Optimization
Published 2015-01-01“…Considering the uncertainty of distance between nodes, a distributed topology control algorithm named as LRMST, which is based on the local minimum spanning tree (LMST) algorithm, is proposed by applying the 0-1 robust discrete optimization theory. …”
Get full text
Article -
1669
Distributed locating algorithm for wireless sensor networks-MDS-MAP(D)
Published 2008-01-01“…A new distributed locating algorithm MDS-MAP(D) was proposed,which attempted to improve the perform-ance of node localization in wireless sensor networks.The process of the computation about node relative coordinates and the aggregation from local network to global network are introduced explicitly.Further,the analyses to computational complexity and the simulations of the algorithm are also present.MDS-MAP(D),which is based on node clustering mechanism and uses connectivity of nodes to estimate the coordinates of nodes,reduces the complexity and energy con-sumption of node localization on the absence of distance measurement with high precision.The simulation and analysis results indicate that the complexity of node localization algorithm falls to O(Nm 2),m < N from O(N 3) and the accu-racy is improved 1%~3%.…”
Get full text
Article -
1670
Present a new method for increasing the intelligence and speed of the Firefly algorithm
Published 2022-03-01“…One of the propagation intelligence algorithms is firefly algorithm, which is bace on the exposure of luminous worms and their absorption into more light. …”
Get full text
Article -
1671
Assessment Method of Multipath Mitigation Performance for GNSS Antenna with Receiver Algorithms
Published 2017-01-01“…The model analyzes effects caused by inclined reflective surfaces and multipath mitigating algorithms in receivers. A method to assess multipath mitigation performance is put forward by analyzing pseudorange code phase errors caused by multipath signals after signal processing. …”
Get full text
Article -
1672
Digital watermarking algorithm in SWT domain based on robust local feature
Published 2019-11-01“…Aiming at the challenging work to design a robust digital audio watermarking algorithm against desynchronization attacks,a new second generation digital audio watermarking in stationary wavelet transform (SWT) domain based on robust local audio feature was proposed.First,the first-order smooth gradient response of the low-pass sub-band coefficient was calculated using Gaussian filter.Then,the short-term energy was utilized to adaptively determine local feature audio segments for embedding.Finally,the watermark information was embedded into local feature audio segments with spread transform dither modulation.The experimental results show that the proposed approach has not only good transparency,but also has strong robustness against common audio processing such as MP3 compression and good robustness against the desynchronization attacks such as pitch-scale modification et al.A SWT domain audio feature point extraction method based on smooth gradient is proposed,which effectively solves the drawbacks of poor stability and uneven distribution of audio feature points,and improves the resistance of digital audio watermarks to amplitude-scale modification,pitch-scale modification,random cropping,and jittering attacks.…”
Get full text
Article -
1673
Research on algorithms of data encryption scheme that supports homomorphic arithmetical operations
Published 2015-01-01“…An efficient homomorphic encryption scheme called CESIL was proposed to meet the requirements of operating on encrypted data when protecting users' privacy in computing services.CESIL included key generation algorithm,encryption algorithm,decryption algorithm and calculation algorithm.In CESIL,a polynomial coefficient vector ring was established by defining addition and multiplication using polynomial ring; by using ideal lattice,the vector ring was partitioned into many residue classes to produce a quotient ring and its representative set; the plaintext was encrypted by mapping it to a representative and replacing the representative with another element in the same residue class.The features of operations in quotient ring ensured CESIL operate on encrypted data.Furthermore,the fast Fourier transform (FFT) algorithm was used to increase the efficiency and decrease the length of key.Theoretical analysis and experimental results show that CESIL is semantically secure,and can do addition and multiplication operations on encrypted data homomorphically in a specific scope.Comparing to some existing homomorphic encryption schemes,the CESIL runs efficiently,and has shorter length in key and ciphertext.Thus,the CESIL fits the practical applications better.…”
Get full text
Article -
1674
Biobjective Optimization Algorithms Using Neumann Series Expansion for Engineering Design
Published 2018-01-01“…In this paper, two novel algorithms are designed for solving biobjective optimization engineering problems. …”
Get full text
Article -
1675
Multi-scale Logo detection algorithm based on convolutional neural network
Published 2020-04-01“…Aiming at the requirements for multi-scale Logo detection in natural scene images,a multi-scale Logo detection algorithm based on convolutional neural network was proposed.The algorithm was based on the realization of two-stage object detection.By constructing feature pyramids and adopting layer-by-layer prediction,multi-scale region proposals were generated.The multi-layer feature maps in convolutional neural networks were fused to enhance the feature representation.The experimental results on the FlickrLogos-32 dataset show that compared with the baseline,the proposed algorithm can improve the recall rate of region proposals,and can improve the performance of small Logo detection while ensuring the accuracy of large and middle Logo,proving the superiority of the proposed algorithm.…”
Get full text
Article -
1676
Artificial Bee Colony Algorithm for Solving Optimal Power Flow Problem
Published 2013-01-01“…This paper proposes an artificial bee colony (ABC) algorithm for solving optimal power flow (OPF) problem. …”
Get full text
Article -
1677
Energy balanced routing algorithm for opportunistic network based on message importance
Published 2018-12-01Subjects: Get full text
Article -
1678
Energy Efficient Tree-Based Routing Algorithm for Wireless Sensor Networks
Published 2025-01-01“…To address the issue of uneven sensor node distribution and unbalanced energy consumption leading to premature node death in wireless sensor networks, an energy efficient tree-based routing algorithm is proposed. The algorithm calculates the optimal number of branches that minimize network energy consumption by constructing a tree-based energy model. …”
Get full text
Article -
1679
Research on WSN lifetime optimization game algorithm combined power and channel
Published 2019-04-01Subjects: “…lifetime optimization game algorithm…”
Get full text
Article -
1680
An Improved Hierarchical Genetic Algorithm for Sheet Cutting Scheduling with Process Constraints
Published 2013-01-01“…A mathematical model for this problem is presented, an improved hierarchical genetic algorithm (ant colony—hierarchical genetic algorithm) is developed for better solution, and a hierarchical coding method is used based on the characteristics of the problem. …”
Get full text
Article