-
1981
Optimization Design of Transmission System of Pulping Machine based on Genetic Algorithm
Published 2016-01-01Subjects: Get full text
Article -
1982
An optimal energy-efficient resource allocation algorithm in ultra-dense network
Published 2017-10-01Subjects: “…distributed EE maximization algorithm…”
Get full text
Article -
1983
The Sparsity Adaptive Reconstruction Algorithm Based on Simulated Annealing for Compressed Sensing
Published 2019-01-01“…This paper proposes a novel sparsity adaptive simulated annealing algorithm to solve the issue of sparse recovery. This algorithm combines the advantage of the sparsity adaptive matching pursuit (SAMP) algorithm and the simulated annealing method in global searching for the recovery of the sparse signal. …”
Get full text
Article -
1984
Optimization of Transformer Windings Based on FEA-XGBoost and NSGA-III Algorithm
Published 2024-01-01“…Subsequently, the presented multiobjective model is optimized using multiobjective algorithms and the NSGA-III shows the best performance among the NSGA-II, MOPSO, and MODE. …”
Get full text
Article -
1985
Channel state information acquisition algorithm based on deep learning for IoT
Published 2019-03-01Get full text
Article -
1986
Optimization of Video Heart Rate Detection Based on Improved SSA Algorithm
Published 2025-01-01“…Secondly, the singular spectrum analysis algorithm (SSA) is enhanced to further improve the accuracy of heart rate detection. …”
Get full text
Article -
1987
Packet-based routing algorithm in DTN based on the intimacy between nodes
Published 2014-12-01“…Through analyzing the moving law of nodes,the topology is defined based on intimacy between nodes by using the thoughts of reducing redundant copies through clustering in MANET and mining social community in social network for reference.Take topological trim according to the weight of edges and dig out groups of nodes which have higher inti-macy degree.And also improve the spray and wait routing protocol according to the group of source and destination nodes.Then put forward a packet-based routing algorithm in DTN based on the intimacy between nodes.Simulation result shows that this routing algorithm could effectively increase the delivery ratio and reduce delay.…”
Get full text
Article -
1988
Fault Detection of Aircraft System with Random Forest Algorithm and Similarity Measure
Published 2014-01-01“…Research on fault detection algorithm was developed with the similarity measure and random forest algorithm. …”
Get full text
Article -
1989
Query Processing Algorithm Based on Neighbor Information in Delay Tolerant Network
Published 2014-04-01Get full text
Article -
1990
THE ALGORITHM OF DETERMINATION OF EYE FUNDUS VESSELS BLOOD FLOW CHARACTERISTICS ON VIDEOSEQUENCE
Published 2018-03-01“…Such characteristics allow to determine blood flow changes in the microvasculature affecting the blood flow in the brain, kidneys and coronary vessels. Developed algorithm includes four stages: the video sequence stabilization, the vessels segmentation with the help of a neural network, the determination of the instantaneous velocity in the vessels based on the optical flow and the analysis of the results.…”
Get full text
Article -
1991
Identification of Flight Area Identification Plate Based on an Improved MSER Algorithm
Published 2022-01-01“…Secondly, the threshold of repeated recognition content was eliminated using the NMS algorithm to handle the repeated recognition caused by the MSER algorithm. …”
Get full text
Article -
1992
A Local Stability Supported Parallel Distributed Constraint Optimization Algorithm
Published 2014-01-01“…This paper presents a new distributed constraint optimization algorithm called LSPA, which can be used to solve large scale distributed constraint optimization problem (DCOP). …”
Get full text
Article -
1993
RESEARCH ON GEAR BOX FAULT DIAGNOSIS BASED ON DCNN AND XGBOOST ALGORITHM
Published 2020-01-01“…Secondly,the feature matrix was used as input data,and the parameters of XGBoost algorithm were adjusted by lattice parameter method,then the XGBoost model was obtained. …”
Get full text
Article -
1994
PKI cross-domain authentication scheme based on advanced PBFT algorithm
Published 2020-08-01Subjects: “…Byzantine fault tolerant algorithm…”
Get full text
Article -
1995
Adaptive bandwidth allocation algorithm based on the multi-threshold reservation mechanism
Published 2014-12-01“…An adaptive bandwidth allocation algorithm based on multi-threshold reservation mechanism is proposed to guarantee the quality of service (QoS) of multi-services in heterogeneous wireless networks.With the bandwidth reserva-tion mechanism by setting multi-threshold in each network for every traffic,the adaptive bandwidth allocation scheme according to the transmission rate levels requirements for traffic k and the network status can be formulated as an optimal problem with the constraints of the bandwidth allocation matrix for each traffic and all users based on the multi-homing technology.A procedure of the iterative method is presented to solve the optimal problem of the formulated adaptive bandwidth allocation scheme.The optimized bandwidth allocation matrixes for traffics and for all users are obtained for the real-time network throughput maximization under bandwidth reserving thresholds and network capacity constrains and the bandwidth resource utilization efficiency of heterogeneous wireless network can be increased.Numerical simula-tion results show that the proposed algorithm can support QoS requiring transmission rate grades,decrease the new call blocking probability,increase the average user access rate and improve the network throughput of the heterogeneous wireless network by 40% to the largest extent.…”
Get full text
Article -
1996
Backtracking Search Optimization Algorithm for Synthesis of Concentric Circular Antenna Arrays
Published 2014-01-01“…A backtracking search optimization algorithm (BSA) is proposed for the synthesis of concentric circular antenna arrays (CCAAs) with the low sidelobe levels at a fixed beamwidth. …”
Get full text
Article -
1997
Adaptive selection method of desensitization algorithm based on privacy risk assessment
Published 2023-06-01“…The financial industry deals with a vast amount of sensitive data in its business operations.However, the conventional approach of binding financial data for desensitization and using desensitization algorithms is becoming inefficient due to the fast-paced growth of financial businesses and the proliferation of data types.Additionally, manual verification and assessment of desensitized data by security experts are time-consuming and may carry potential privacy risks due to the improper selection of desensitization algorithms.While prior research has emphasized desensitization methods and privacy-preserving technologies, limited work has been conducted on desensitization algorithms from the perspective of automation.To address this issue, an adaptive recommendation framework was propose for selecting desensitization strategies that consider various factors, such as existing privacy protection technologies, data quality requirements of business scenarios, security risk requirements of financial institutions, and data attributes.Specifically, a dual-objective evaluation function was established for privacy risk and data quality to optimize the selection of desensitization algorithm parameters for different algorithms.Furthermore, the desensitization algorithm and parameters were adaptively selected by considering the data attributes through a multi-decision factor system and desensitization effect evaluation system.Compared to traditional approaches, the proposed framework effectively tackle issues of reduced data usability and inadequate personal data privacy protection that derive from manual intervention.Testing on a dataset with multiple financial institution types, the experiments show that the proposed method achieves a recommendation accuracy exceeding 95%, while the desensitized privacy risk level differed by less than 10% from the expected level.Additionally, the recommendation efficiency is 100 times faster than expert manual processing.…”
Get full text
Article -
1998
Agent-Based Adaptive Dynamic Round Robin (AADRR) Scheduling Algorithm
Published 2025-01-01Subjects: “…CPU scheduling algorithms…”
Get full text
Article -
1999
Chain Routing Algorithm of Wireless Sensor Networks for Streetlight Monitoring System
Published 2013-01-01“…Under certain conditions, CRASMS algorithm outperforms LEACH and PEGASIS algorithms.…”
Get full text
Article -
2000
A Graph Convolutional Network-Based Sensitive Information Detection Algorithm
Published 2021-01-01“…For improvement purposes, this paper proposes a novel self-attention-based detection algorithm using the implementation of graph convolutional network (GCN). …”
Get full text
Article