-
2341
Efficient implementation for BFV fully homomorphic encryption algorithm based on Zynq platform
Published 2024-09-01Subjects: Get full text
Article -
2342
Iterative algorithm for locating nodes in WSN based on modifying average hopping distances
Published 2009-01-01Subjects: Get full text
Article -
2343
Energy efficiency optimization algorithm for heterogeneous NOMA network based on imperfect CSI
Published 2020-07-01“…In order to improve the suppression capability of parametric perturbation and energy efficiency (EE) of heterogeneous networks (HetNets),a robust resource allocation algorithm was proposed to maximize system EE for reducing cross-tier interference power in non-orthogonal multiple access (NOMA) based HetNets.Firstly,the resource optimization problem was formulated as a mixed integer and nonlinear programming one under the constraints of the interference power of macrocell users,maximum transmit power of small cell base station (BS),resource block assignment and the quality of service (QoS) requirement of each small cell user.Then,based on ellipsoid bounded channel uncertainty models,the original problem was converted into the equivalent convex optimization problem by using the convex relaxation method,Dinkelbach method and the successive convex approximation (SCA) method.The analytical solutions were obtained by using the Lagrangian dual approach.Simulation results verifiy that the proposed algorithm had better EE and robustness by comparing it with the existing algorithm under perfect channel state information.…”
Get full text
Article -
2344
A Particle Swarm Optimization Algorithm for Deployment of Sensor Nodes in WSN Network
Published 2022-01-01“…After many simulation experiments, both algorithms can see the positioning result curve of the positioning program affected by the anchor node part.…”
Get full text
Article -
2345
Coverage compensation algorithm based on vector algebra in hybrid wireless sensor networks
Published 2014-09-01“…Aiming at the phenomenon that coverage holes caused by energy depletion coexisted with remaining energy of dormant redundant nodes in hybrid wireless sensor networks(WSN),a coverage compensation algorithm based on vector algebra to repair coverage hole with redundant nodes was presented.This algorithm included both the respective dis-placement amount calculation method of all the redundant nodes which may be involved in compensation and policies of the choice of the best redundant nodes that were selected by hole boundary node on the basis of balancing the remaining energy of nodes.The result shows that this algorithm makes full of energy resources in the premise of complete coverage to repair coverage hole,and has a better performance in both movement distance and movement cost compared with ex-isting COA algorithm.…”
Get full text
Article -
2346
Research on inverse solution of shotcrete manipulators based on an improved bee colony algorithm
Published 2025-01-01“…The step length of the onlookers was adjusted adaptively, and the population diversity and the algorithm convergence speed were improved. Finally, the Matlab programming was used for simulation verification.ResultsThe results show that the convergence speed and the accuracy of the proposed algorithm are better than the traditional bee colony algorithms, the chaotic bee colony algorithm and the particle swarm algorithm, which proves the feasibility of the proposed algorithm, and has provided a new way to solve the inverse kinematics of the wet spray manipulator.…”
Get full text
Article -
2347
Res-DNN based signal detection algorithm for end-to-end MIMO systems
Published 2022-03-01“…Deep learning can improve the effect of signal detection by extracting the inherent characteristics of wireless communication data.To solve the tradeoff between the performance and complexity of MIMO system signal detection, an end-to-end MIMO system signal detection scheme based on deep learning was proposed.The encoder and the decoder based on residual deep neural network replace the transmitter and the receiver of the wireless communication system respectively, and they were trained in an end-to-end manner as a whole.Firstly, the features of the input data were extracted by encoder, then the communication model was established and was sent to the zero forcing detector for preliminary detection.Finally, the detection signal was reconstructed through the decoder.Simulation results show that the proposed detection scheme is superior to the same type of algorithm, and the detection performance is significantly better than that of the MMSE detection algorithm at the expense of a certain time complexity.…”
Get full text
Article -
2348
An Enhanced Slime Mould Algorithm and Its Application for Digital IIR Filter Design
Published 2021-01-01“…In recent years, a large number of new MA have been proposed. Slime mould algorithm (SMA) is a novel swarm-based intelligence optimization algorithm. …”
Get full text
Article -
2349
Relevant SMS Spam Feature Selection Using Wrapper Approach and XGBoost Algorithm
Published 2019-11-01“…According to this paper, XGBoost algorithm used for handling SMS spam detection problem. …”
Get full text
Article -
2350
Cascaded algorithm for background modeling using pixel-based and block-based methods
Published 2013-04-01“…Block-based background modeling couldn't obtain the exact shape of foreground,while pixel-based approaches couldn't handle non-stationary backgrounds effectively.To solve the problem,a hierarchical scheme for background modeling was presented.The hierarchical model used block-based method proposed to obtain coarse background and foreground regions firstly,and then the operations of pixel-level foreground refining and model updating based on Gaussian mixture model were performed on special regions of the input image.These two algorithms in different levels were combined by adopting an asymmetric feed-forward strategy.Experimental results show that the hierarchical method proposed can obtain the exact shape of foreground and process non-stationary scenes well,in addition,it is insensitive to illumination change and can provide better results than any single approach in it,meanwhile,the integrated computation time is shorter than the sum of those of running the block and pixel-level methods,and satisfies real-time processing.…”
Get full text
Article -
2351
Study on self-similar call admission control algorithm in WiM AX
Published 2012-09-01“…As to the self-similarity of WiMAX network traffic,M/Pareto model was proposed to model network traf-fic.Through the statistical nature between the M/Pareto model and FBM traffic model,the parameters of the M/Pareto were mapped to the ones of FBM traffic model.The effective bandwidth formula was derived for M/Pareto model para-meters.Whereby,a self-similar call admission control algorithm(SS-CAC)was designed.It avoided getting the parame-ter values of FBM traffic flow model with the measurem method and adapted to the self-similarity of WiMAX traffic.Since the calculation of the effective bandwidth was accurate and convenient,simulation results show that SS-CAC greatly reduces the call blocking rate and improves the bandwidth utilization.…”
Get full text
Article -
2352
Research on intrusion detection algorithm in wireless network based on Bayes game model
Published 2010-01-01“…Bayes game theory was used to research parameter adjustment problems in wireless network intrusion detec-tion.Intrusion detection game model was designed,time interval adjust algorithm TSMA-BG and parameter correction algorithm DPMA were also designed according to the perfect equilibrium in game modeling.Simulation results show that intrusion detection systems can effectively use these algorithms to detect intrusion behavior that have been changed.…”
Get full text
Article -
2353
Joint trade-off optimization algorithm based on cooperative spectrum sensing throughput
Published 2011-11-01“…The achievable data throughput of the cognitive network was modeled to optimize the overhead and performance of the cooperative system thoroughly.Considering the soft data combination decision,the joint trade-off optimization of the local sampling number and cooperative user number was modeled based on the achievable data throughput.The global optimal solution was achieved with inexact line search algorithm,which is based on Armijo rule and lopsided search step technique.Consequently,the validity of the optimization model was verified both by the numerical computation and by Monte-Carlo simulation tests.The joint trade-off optimization of the sampling number and cooperative user number was achieved in cooperative sensing based on the throughput maximizing criterion.…”
Get full text
Article -
2354
Interactive Multimodal Television Media Adaptive Visual Communication Based on Clustering Algorithm
Published 2020-01-01“…The method divides the similarity calculation in the clustering algorithm to improve the clustering efficiency of the algorithm. …”
Get full text
Article -
2355
Community detection algorithm of hybrid node analysis and edge analysis in complex networks
Published 2023-04-01“…The community detection of hybrid node analysis and edge analysis in complex networks (CDHNE), a novel community detection algorithm, was proposed aiming at the problem that both edge community detection and node-based community detection algorithms had corresponding shortcomings in the process of detecting communities, which affected the quality of complex network community detection.The relatively stable characteristics of the edge in the networks were firstly used by the algorithm to construct a more accurate community structure through edge community detection at the early stage of algorithm execution.Then, after the formation of the edge communities, the flexible characteristics of the node were used to accurately detect the boundary of edge communities, so as to more accurately detect the community structure in the complex networks.In the computer-generated network experiments, when the community structure of the network gradually became fuzzy, the number of overlapping nodes and the number of communities to which the overlapping nodes belonged kept increasing.Compared to traditional algorithms, the accuracy of community detection and overlapping nodes detection were improved by an average of 10% and 15%, respectively, by the CDHNE algorithm.In the real network experiments, the tightness of the community structure detected by the CDHNE algorithm was better.Especially when facing large-scale networks with more than 100 000 nodes, the detection task was completed by the CDHNE algorithm with high quality, and the EQ value reached 0.412 1.The experimental results show that the CDHNE algorithm has advantages in operational stability and handling large-scale networks.…”
Get full text
Article -
2356
An Inertial Accelerated Algorithm for Solving Split Feasibility Problem with Multiple Output Sets
Published 2021-01-01“…The paper proposes an inertial accelerated algorithm for solving split feasibility problem with multiple output sets. …”
Get full text
Article -
2357
Scheduling algorithm for stochastic job stream cipher service based on load balancing
Published 2018-06-01“…Business stream parallel processing system face the situation of the diversity of cipher service requests,the cross of serial mode and parallel mode,the intercross of different business data flow,and the demand of high speed and high reliability in security field.In order to improve the parallel processing efficiency of multi-cryptographic algorithm,load balancing was used as scheduling objective.Based on hierarchical hardware scheduling method (HHS-ACDID),considering the processing node’s storage capacity and processing speed,a load balancing scheduling algorithm was approved to support non related tasks and related tasks at the same time,which achieves the high speed cipher processing throughput.Simulation results show that the algorithm can complete dynamic scheduling of data stream system and get better load balancing effect.Compared with HHS-ACDID,the efficiency of the algorithm is improved by about 12%.…”
Get full text
Article -
2358
Algorithm for Cloud Particle Phase Identification Based on Bayesian Random Forest Method
Published 2025-01-01“…Statistical analysis shows that Bayesian Random Forest Method achieves a cloud particle phase state recognition accuracy of 96% under both rainy and non-rainy weather conditions. This algorithm can be applied to decision-making services for weather processes such as snowfall, enabling minute-level monitoring of precipitation types, phase transition timings, and evolution processes, thereby addressing the issue of automatic precipitation identification in operational settings.…”
Get full text
Article -
2359
Improving the segmentation of the vertebrae using a multi-stage machine learning algorithm
Published 2024-11-01“…The subjects of this article are algorithms for the segmentation of X-ray images of various qualities. …”
Get full text
Article -
2360
Retracted: Digital Art Feature Association Mining Based on the Machine Learning Algorithm
Published 2024-01-01Get full text
Article