Showing 1,661 - 1,680 results of 19,511 for search '"Algorithm"', query time: 0.14s Refine Results
  1. 1661

    An Alternate Iterative Differential Evolution Algorithm for Parameter Identification of Chaotic Systems by Wanli Xiang, Xuelei Meng, Meiqing An

    Published 2015-01-01
    “…Then through integrating two differential mutation strategies, an improved greedy selection mechanism and a population diversity balance scheme, an alternate iterative differential algorithm, called AIDE, is presented to solve the problem in this paper. …”
    Get full text
    Article
  2. 1662
  3. 1663

    Coverage optimization algorithm based on VF-CS in mobile sensor network by Guanghui LI, Shihong HU

    Published 2018-03-01
    “…A random placement of large-scale sensor network in the outdoor environment often causes low coverage.An area coverage optimization algorithm of mobile sensor network (MSN) based on virtual force perturbation and Cuckoo search (VF-CS) was proposed.Firstly,the virtual force of the sensor nodes within the Thiessen polygon was analyzed based on the partitioning of Voronoi diagram of the monitoring area.Secondly,the force of polygon vertices and neighbor nodes was taken as the perturbation factor for updating the node’s location of the Cuckoo search (CS).Finally,the VF-CS guided the node to move so as to achieve the optimal coverage.The simulation results demonstrate that the proposed algorithm has higher coverage and shorter average moving distance of nodes than the Voronoi diagram based algorithms in literatures.…”
    Get full text
    Article
  4. 1664

    Antenna Array Synthesis and Failure Correction Using Differential Search Algorithm by Kerim Guney, Ali Durmus, Suad Basbug

    Published 2014-01-01
    “…Differential search (DS) optimization algorithm is proposed for the synthesis of three different types of linear antenna array design examples. …”
    Get full text
    Article
  5. 1665

    Application of Particle Swarm Optimization Algorithm in the Heating System Planning Problem by Rong-Jiang Ma, Nan-Yang Yu, Jun-Yi Hu

    Published 2013-01-01
    “…The results show that the improved particle swarm optimization (IPSO) algorithm can more preferably solve the HSP problem than PSO algorithm. …”
    Get full text
    Article
  6. 1666

    The High Security Mechanisms Algorithm of Similarity Metrics for Wireless and Mobile Networking by Xingwang Wang

    Published 2017-01-01
    “…To solve the security mechanisms problem and improve the efficiency, this paper proposes a new algorithm. The new algorithm scans the database only one time and the scale of data to deal with is getting smaller and smaller with the algorithm running. …”
    Get full text
    Article
  7. 1667

    RSS-TOA based localization algorithm in non-line-of-sight environment by Zhigang LU, ·ouming LI, Xianghong JIA, Shengming CHANG, Xiaoli WANG

    Published 2019-09-01
    “…The existence of non-line-of-sight (NLOS) error can degrade the positioning performance in wireless sensor network localization system,especially in indoor localization.To overcome the localization error caused by NLOS propagation,a localization algorithm was proposed based on received signal strength (RSS) and time-of-arrival (TOA).Firstly,a non-convex optimization problem was established based on RSS and TOA.Then,the original non-convex optimization problem was transformed into a convex optimization problem through the second-order cone relaxation technique,therefore a sub-optimal solution to the original problem could be obtained efficiently.Finally,computer simulation results show that the proposed method can provide higher estimation accuracy and better performance.…”
    Get full text
    Article
  8. 1668

    A Topology Control Algorithm for Sensor Networks Based on Robust Optimization by Junfeng Qiao, Sanyang Liu, Wei Duan

    Published 2015-01-01
    “…Considering the uncertainty of distance between nodes, a distributed topology control algorithm named as LRMST, which is based on the local minimum spanning tree (LMST) algorithm, is proposed by applying the 0-1 robust discrete optimization theory. …”
    Get full text
    Article
  9. 1669

    Distributed locating algorithm for wireless sensor networks-MDS-MAP(D) by MA Zhen, LIU Yun, SHEN Bo

    Published 2008-01-01
    “…A new distributed locating algorithm MDS-MAP(D) was proposed,which attempted to improve the perform-ance of node localization in wireless sensor networks.The process of the computation about node relative coordinates and the aggregation from local network to global network are introduced explicitly.Further,the analyses to computational complexity and the simulations of the algorithm are also present.MDS-MAP(D),which is based on node clustering mechanism and uses connectivity of nodes to estimate the coordinates of nodes,reduces the complexity and energy con-sumption of node localization on the absence of distance measurement with high precision.The simulation and analysis results indicate that the complexity of node localization algorithm falls to O(Nm 2),m < N from O(N 3) and the accu-racy is improved 1%~3%.…”
    Get full text
    Article
  10. 1670

    Present a new method for increasing the intelligence and speed of the Firefly algorithm by Fariba Solaymani, Narges Salehpour, Mohammad Nazari Farokhi

    Published 2022-03-01
    “…One of the propagation intelligence algorithms is firefly algorithm, which is bace on the exposure of luminous worms and their absorption into more light. …”
    Get full text
    Article
  11. 1671

    Assessment Method of Multipath Mitigation Performance for GNSS Antenna with Receiver Algorithms by Muzi Yuan, Du Li, Baiyu Li, Huaming Chen, Gang Ou

    Published 2017-01-01
    “…The model analyzes effects caused by inclined reflective surfaces and multipath mitigating algorithms in receivers. A method to assess multipath mitigation performance is put forward by analyzing pseudorange code phase errors caused by multipath signals after signal processing. …”
    Get full text
    Article
  12. 1672

    Digital watermarking algorithm in SWT domain based on robust local feature by Panpan NIU, Siyu YANG, Li WANG, Hongying YANG, Li LI, Xiangyang WANG

    Published 2019-11-01
    “…Aiming at the challenging work to design a robust digital audio watermarking algorithm against desynchronization attacks,a new second generation digital audio watermarking in stationary wavelet transform (SWT) domain based on robust local audio feature was proposed.First,the first-order smooth gradient response of the low-pass sub-band coefficient was calculated using Gaussian filter.Then,the short-term energy was utilized to adaptively determine local feature audio segments for embedding.Finally,the watermark information was embedded into local feature audio segments with spread transform dither modulation.The experimental results show that the proposed approach has not only good transparency,but also has strong robustness against common audio processing such as MP3 compression and good robustness against the desynchronization attacks such as pitch-scale modification et al.A SWT domain audio feature point extraction method based on smooth gradient is proposed,which effectively solves the drawbacks of poor stability and uneven distribution of audio feature points,and improves the resistance of digital audio watermarks to amplitude-scale modification,pitch-scale modification,random cropping,and jittering attacks.…”
    Get full text
    Article
  13. 1673

    Research on algorithms of data encryption scheme that supports homomorphic arithmetical operations by ANGPan Y, UIXiao-lin G, AOJing Y, INJian-cai L, IANFeng T, HANGXue-jun Z

    Published 2015-01-01
    “…An efficient homomorphic encryption scheme called CESIL was proposed to meet the requirements of operating on encrypted data when protecting users' privacy in computing services.CESIL included key generation algorithm,encryption algorithm,decryption algorithm and calculation algorithm.In CESIL,a polynomial coefficient vector ring was established by defining addition and multiplication using polynomial ring; by using ideal lattice,the vector ring was partitioned into many residue classes to produce a quotient ring and its representative set; the plaintext was encrypted by mapping it to a representative and replacing the representative with another element in the same residue class.The features of operations in quotient ring ensured CESIL operate on encrypted data.Furthermore,the fast Fourier transform (FFT) algorithm was used to increase the efficiency and decrease the length of key.Theoretical analysis and experimental results show that CESIL is semantically secure,and can do addition and multiplication operations on encrypted data homomorphically in a specific scope.Comparing to some existing homomorphic encryption schemes,the CESIL runs efficiently,and has shorter length in key and ciphertext.Thus,the CESIL fits the practical applications better.…”
    Get full text
    Article
  14. 1674

    Biobjective Optimization Algorithms Using Neumann Series Expansion for Engineering Design by Huan Guo, Yoshino Tatsuo, Lulu Fan, Ao Ding, Tianshuang Xu, Genyuan Xing

    Published 2018-01-01
    “…In this paper, two novel algorithms are designed for solving biobjective optimization engineering problems. …”
    Get full text
    Article
  15. 1675

    Multi-scale Logo detection algorithm based on convolutional neural network by Yuchao JIANG, Lixin JI, Chao GAO, Shaomei LI

    Published 2020-04-01
    “…Aiming at the requirements for multi-scale Logo detection in natural scene images,a multi-scale Logo detection algorithm based on convolutional neural network was proposed.The algorithm was based on the realization of two-stage object detection.By constructing feature pyramids and adopting layer-by-layer prediction,multi-scale region proposals were generated.The multi-layer feature maps in convolutional neural networks were fused to enhance the feature representation.The experimental results on the FlickrLogos-32 dataset show that compared with the baseline,the proposed algorithm can improve the recall rate of region proposals,and can improve the performance of small Logo detection while ensuring the accuracy of large and middle Logo,proving the superiority of the proposed algorithm.…”
    Get full text
    Article
  16. 1676

    Artificial Bee Colony Algorithm for Solving Optimal Power Flow Problem by Luong Le Dinh, Dieu Vo Ngoc, Pandian Vasant

    Published 2013-01-01
    “…This paper proposes an artificial bee colony (ABC) algorithm for solving optimal power flow (OPF) problem. …”
    Get full text
    Article
  17. 1677
  18. 1678

    Energy Efficient Tree-Based Routing Algorithm for Wireless Sensor Networks by Ni Chen, Rong Wen

    Published 2025-01-01
    “…To address the issue of uneven sensor node distribution and unbalanced energy consumption leading to premature node death in wireless sensor networks, an energy efficient tree-based routing algorithm is proposed. The algorithm calculates the optimal number of branches that minimize network energy consumption by constructing a tree-based energy model. …”
    Get full text
    Article
  19. 1679
  20. 1680

    An Improved Hierarchical Genetic Algorithm for Sheet Cutting Scheduling with Process Constraints by Yunqing Rao, Dezhong Qi, Jinling Li

    Published 2013-01-01
    “…A mathematical model for this problem is presented, an improved hierarchical genetic algorithm (ant colony—hierarchical genetic algorithm) is developed for better solution, and a hierarchical coding method is used based on the characteristics of the problem. …”
    Get full text
    Article