Showing 1,981 - 2,000 results of 19,511 for search '"Algorithms"', query time: 0.08s Refine Results
  1. 1981
  2. 1982
  3. 1983

    The Sparsity Adaptive Reconstruction Algorithm Based on Simulated Annealing for Compressed Sensing by Yangyang Li, Jianping Zhang, Guiling Sun, Dongxue Lu

    Published 2019-01-01
    “…This paper proposes a novel sparsity adaptive simulated annealing algorithm to solve the issue of sparse recovery. This algorithm combines the advantage of the sparsity adaptive matching pursuit (SAMP) algorithm and the simulated annealing method in global searching for the recovery of the sparse signal. …”
    Get full text
    Article
  4. 1984

    Optimization of Transformer Windings Based on FEA-XGBoost and NSGA-III Algorithm by Shi Bai-di, Jiang Yong-feng, Shang Jing-yu, Bao Ye-feng, Chen Bing-yan, Yang Ke

    Published 2024-01-01
    “…Subsequently, the presented multiobjective model is optimized using multiobjective algorithms and the NSGA-III shows the best performance among the NSGA-II, MOPSO, and MODE. …”
    Get full text
    Article
  5. 1985
  6. 1986

    Optimization of Video Heart Rate Detection Based on Improved SSA Algorithm by Chengcheng Duan, Xiangyang Liang, Fei Dai

    Published 2025-01-01
    “…Secondly, the singular spectrum analysis algorithm (SSA) is enhanced to further improve the accuracy of heart rate detection. …”
    Get full text
    Article
  7. 1987

    Packet-based routing algorithm in DTN based on the intimacy between nodes by En WANG, Yong-jian YANG, Wei-dan ZHAO, Lin-lu LIU

    Published 2014-12-01
    “…Through analyzing the moving law of nodes,the topology is defined based on intimacy between nodes by using the thoughts of reducing redundant copies through clustering in MANET and mining social community in social network for reference.Take topological trim according to the weight of edges and dig out groups of nodes which have higher inti-macy degree.And also improve the spray and wait routing protocol according to the group of source and destination nodes.Then put forward a packet-based routing algorithm in DTN based on the intimacy between nodes.Simulation result shows that this routing algorithm could effectively increase the delivery ratio and reduce delay.…”
    Get full text
    Article
  8. 1988

    Fault Detection of Aircraft System with Random Forest Algorithm and Similarity Measure by Sanghyuk Lee, Wookje Park, Sikhang Jung

    Published 2014-01-01
    “…Research on fault detection algorithm was developed with the similarity measure and random forest algorithm. …”
    Get full text
    Article
  9. 1989
  10. 1990

    THE ALGORITHM OF DETERMINATION OF EYE FUNDUS VESSELS BLOOD FLOW CHARACTERISTICS ON VIDEOSEQUENCE by O. V. Nedzvedz, S. V. Ablameyko, A. M. Nedzved, A. V. Glinsky, G. M. Karapetyan, A. A. Anisimov, I. B. Gurevich, V. V. Yashina

    Published 2018-03-01
    “…Such characteristics allow to determine blood flow changes in the microvasculature affecting the blood flow in the brain, kidneys and coronary vessels. Developed algorithm includes four stages: the video sequence stabilization, the vessels segmentation with the help of a neural network, the determination of the instantaneous velocity in the vessels based on the optical flow and the analysis of the results.…”
    Get full text
    Article
  11. 1991

    Identification of Flight Area Identification Plate Based on an Improved MSER Algorithm by Hao Liu, Daiwu Zhu, Yuran Zhu, Xiaofan Xie, Haodi Zhao

    Published 2022-01-01
    “…Secondly, the threshold of repeated recognition content was eliminated using the NMS algorithm to handle the repeated recognition caused by the MSER algorithm. …”
    Get full text
    Article
  12. 1992

    A Local Stability Supported Parallel Distributed Constraint Optimization Algorithm by Duan Peibo, Zhang Changsheng, Zhang Bin

    Published 2014-01-01
    “…This paper presents a new distributed constraint optimization algorithm called LSPA, which can be used to solve large scale distributed constraint optimization problem (DCOP). …”
    Get full text
    Article
  13. 1993

    RESEARCH ON GEAR BOX FAULT DIAGNOSIS BASED ON DCNN AND XGBOOST ALGORITHM by ZHANG RongTao, CHEN ZhiGao, LI BinBin, JIAO Bin

    Published 2020-01-01
    “…Secondly,the feature matrix was used as input data,and the parameters of XGBoost algorithm were adjusted by lattice parameter method,then the XGBoost model was obtained. …”
    Get full text
    Article
  14. 1994

    PKI cross-domain authentication scheme based on advanced PBFT algorithm by Sijie QIAN, Liquan CHEN, Shihui WANG

    Published 2020-08-01
    Subjects: “…Byzantine fault tolerant algorithm…”
    Get full text
    Article
  15. 1995

    Adaptive bandwidth allocation algorithm based on the multi-threshold reservation mechanism by Geng CHEN, Wei-wei XIA, Lian-feng SHEN

    Published 2014-12-01
    “…An adaptive bandwidth allocation algorithm based on multi-threshold reservation mechanism is proposed to guarantee the quality of service (QoS) of multi-services in heterogeneous wireless networks.With the bandwidth reserva-tion mechanism by setting multi-threshold in each network for every traffic,the adaptive bandwidth allocation scheme according to the transmission rate levels requirements for traffic k and the network status can be formulated as an optimal problem with the constraints of the bandwidth allocation matrix for each traffic and all users based on the multi-homing technology.A procedure of the iterative method is presented to solve the optimal problem of the formulated adaptive bandwidth allocation scheme.The optimized bandwidth allocation matrixes for traffics and for all users are obtained for the real-time network throughput maximization under bandwidth reserving thresholds and network capacity constrains and the bandwidth resource utilization efficiency of heterogeneous wireless network can be increased.Numerical simula-tion results show that the proposed algorithm can support QoS requiring transmission rate grades,decrease the new call blocking probability,increase the average user access rate and improve the network throughput of the heterogeneous wireless network by 40% to the largest extent.…”
    Get full text
    Article
  16. 1996

    Backtracking Search Optimization Algorithm for Synthesis of Concentric Circular Antenna Arrays by K. Guney, A. Durmus, S. Basbug

    Published 2014-01-01
    “…A backtracking search optimization algorithm (BSA) is proposed for the synthesis of concentric circular antenna arrays (CCAAs) with the low sidelobe levels at a fixed beamwidth. …”
    Get full text
    Article
  17. 1997

    Adaptive selection method of desensitization algorithm based on privacy risk assessment by Lijun ZU, Yalin CAO, Xiaohua MEN, Zhihui LYU, Jiawei YE, Hongyi LI, Liang ZHANG

    Published 2023-06-01
    “…The financial industry deals with a vast amount of sensitive data in its business operations.However, the conventional approach of binding financial data for desensitization and using desensitization algorithms is becoming inefficient due to the fast-paced growth of financial businesses and the proliferation of data types.Additionally, manual verification and assessment of desensitized data by security experts are time-consuming and may carry potential privacy risks due to the improper selection of desensitization algorithms.While prior research has emphasized desensitization methods and privacy-preserving technologies, limited work has been conducted on desensitization algorithms from the perspective of automation.To address this issue, an adaptive recommendation framework was propose for selecting desensitization strategies that consider various factors, such as existing privacy protection technologies, data quality requirements of business scenarios, security risk requirements of financial institutions, and data attributes.Specifically, a dual-objective evaluation function was established for privacy risk and data quality to optimize the selection of desensitization algorithm parameters for different algorithms.Furthermore, the desensitization algorithm and parameters were adaptively selected by considering the data attributes through a multi-decision factor system and desensitization effect evaluation system.Compared to traditional approaches, the proposed framework effectively tackle issues of reduced data usability and inadequate personal data privacy protection that derive from manual intervention.Testing on a dataset with multiple financial institution types, the experiments show that the proposed method achieves a recommendation accuracy exceeding 95%, while the desensitized privacy risk level differed by less than 10% from the expected level.Additionally, the recommendation efficiency is 100 times faster than expert manual processing.…”
    Get full text
    Article
  18. 1998
  19. 1999

    Chain Routing Algorithm of Wireless Sensor Networks for Streetlight Monitoring System by Tiaojuan Ren, Yourong Chen, Zhangquan Wang

    Published 2013-01-01
    “…Under certain conditions, CRASMS algorithm outperforms LEACH and PEGASIS algorithms.…”
    Get full text
    Article
  20. 2000

    A Graph Convolutional Network-Based Sensitive Information Detection Algorithm by Ying Liu, Chao-Yu Yang, Jie Yang

    Published 2021-01-01
    “…For improvement purposes, this paper proposes a novel self-attention-based detection algorithm using the implementation of graph convolutional network (GCN). …”
    Get full text
    Article