Showing 2,341 - 2,360 results of 19,511 for search '"Algorithms"', query time: 0.11s Refine Results
  1. 2341
  2. 2342
  3. 2343

    Energy efficiency optimization algorithm for heterogeneous NOMA network based on imperfect CSI by Yongjun XU, Hao XIE, Qianbin CHEN, Jinzhao LIN, Qilie LIU

    Published 2020-07-01
    “…In order to improve the suppression capability of parametric perturbation and energy efficiency (EE) of heterogeneous networks (HetNets),a robust resource allocation algorithm was proposed to maximize system EE for reducing cross-tier interference power in non-orthogonal multiple access (NOMA) based HetNets.Firstly,the resource optimization problem was formulated as a mixed integer and nonlinear programming one under the constraints of the interference power of macrocell users,maximum transmit power of small cell base station (BS),resource block assignment and the quality of service (QoS) requirement of each small cell user.Then,based on ellipsoid bounded channel uncertainty models,the original problem was converted into the equivalent convex optimization problem by using the convex relaxation method,Dinkelbach method and the successive convex approximation (SCA) method.The analytical solutions were obtained by using the Lagrangian dual approach.Simulation results verifiy that the proposed algorithm had better EE and robustness by comparing it with the existing algorithm under perfect channel state information.…”
    Get full text
    Article
  4. 2344

    A Particle Swarm Optimization Algorithm for Deployment of Sensor Nodes in WSN Network by Jie Liang, Lu Wang, Qingchang Ji

    Published 2022-01-01
    “…After many simulation experiments, both algorithms can see the positioning result curve of the positioning program affected by the anchor node part.…”
    Get full text
    Article
  5. 2345

    Coverage compensation algorithm based on vector algebra in hybrid wireless sensor networks by Ning-ning QIN, Li-xia GUO, Bao-guo XU

    Published 2014-09-01
    “…Aiming at the phenomenon that coverage holes caused by energy depletion coexisted with remaining energy of dormant redundant nodes in hybrid wireless sensor networks(WSN),a coverage compensation algorithm based on vector algebra to repair coverage hole with redundant nodes was presented.This algorithm included both the respective dis-placement amount calculation method of all the redundant nodes which may be involved in compensation and policies of the choice of the best redundant nodes that were selected by hole boundary node on the basis of balancing the remaining energy of nodes.The result shows that this algorithm makes full of energy resources in the premise of complete coverage to repair coverage hole,and has a better performance in both movement distance and movement cost compared with ex-isting COA algorithm.…”
    Get full text
    Article
  6. 2346

    Research on inverse solution of shotcrete manipulators based on an improved bee colony algorithm by CHEN Hetian, CHENG Wenming, DU Run, ZHANG Zhipeng

    Published 2025-01-01
    “…The step length of the onlookers was adjusted adaptively, and the population diversity and the algorithm convergence speed were improved. Finally, the Matlab programming was used for simulation verification.ResultsThe results show that the convergence speed and the accuracy of the proposed algorithm are better than the traditional bee colony algorithms, the chaotic bee colony algorithm and the particle swarm algorithm, which proves the feasibility of the proposed algorithm, and has provided a new way to solve the inverse kinematics of the wet spray manipulator.…”
    Get full text
    Article
  7. 2347

    Res-DNN based signal detection algorithm for end-to-end MIMO systems by Guoquan LI, Yonghai XU, Jinzhao LIN, Zhengwen HUANG

    Published 2022-03-01
    “…Deep learning can improve the effect of signal detection by extracting the inherent characteristics of wireless communication data.To solve the tradeoff between the performance and complexity of MIMO system signal detection, an end-to-end MIMO system signal detection scheme based on deep learning was proposed.The encoder and the decoder based on residual deep neural network replace the transmitter and the receiver of the wireless communication system respectively, and they were trained in an end-to-end manner as a whole.Firstly, the features of the input data were extracted by encoder, then the communication model was established and was sent to the zero forcing detector for preliminary detection.Finally, the detection signal was reconstructed through the decoder.Simulation results show that the proposed detection scheme is superior to the same type of algorithm, and the detection performance is significantly better than that of the MMSE detection algorithm at the expense of a certain time complexity.…”
    Get full text
    Article
  8. 2348

    An Enhanced Slime Mould Algorithm and Its Application for Digital IIR Filter Design by Xiaodan Liang, Dong Wu, Yang Liu, Maowei He, Liling Sun

    Published 2021-01-01
    “…In recent years, a large number of new MA have been proposed. Slime mould algorithm (SMA) is a novel swarm-based intelligence optimization algorithm. …”
    Get full text
    Article
  9. 2349

    Relevant SMS Spam Feature Selection Using Wrapper Approach and XGBoost Algorithm by Diyari Jalal Mussa, Noor Ghazi M. Jameel

    Published 2019-11-01
    “…According to this paper, XGBoost algorithm used for handling SMS spam detection problem. …”
    Get full text
    Article
  10. 2350

    Cascaded algorithm for background modeling using pixel-based and block-based methods by Wen-hua XIE, Ben-shun YI, Jin-sheng XIAO, Liang-cai GAN

    Published 2013-04-01
    “…Block-based background modeling couldn't obtain the exact shape of foreground,while pixel-based approaches couldn't handle non-stationary backgrounds effectively.To solve the problem,a hierarchical scheme for background modeling was presented.The hierarchical model used block-based method proposed to obtain coarse background and foreground regions firstly,and then the operations of pixel-level foreground refining and model updating based on Gaussian mixture model were performed on special regions of the input image.These two algorithms in different levels were combined by adopting an asymmetric feed-forward strategy.Experimental results show that the hierarchical method proposed can obtain the exact shape of foreground and process non-stationary scenes well,in addition,it is insensitive to illumination change and can provide better results than any single approach in it,meanwhile,the integrated computation time is shorter than the sum of those of running the block and pixel-level methods,and satisfies real-time processing.…”
    Get full text
    Article
  11. 2351

    Study on self-similar call admission control algorithm in WiM AX by Yong-dong HU, Guo-xin WU, Ning QIAN, San-feng ZHANG

    Published 2012-09-01
    “…As to the self-similarity of WiMAX network traffic,M/Pareto model was proposed to model network traf-fic.Through the statistical nature between the M/Pareto model and FBM traffic model,the parameters of the M/Pareto were mapped to the ones of FBM traffic model.The effective bandwidth formula was derived for M/Pareto model para-meters.Whereby,a self-similar call admission control algorithm(SS-CAC)was designed.It avoided getting the parame-ter values of FBM traffic flow model with the measurem method and adapted to the self-similarity of WiMAX traffic.Since the calculation of the effective bandwidth was accurate and convenient,simulation results show that SS-CAC greatly reduces the call blocking rate and improves the bandwidth utilization.…”
    Get full text
    Article
  12. 2352

    Research on intrusion detection algorithm in wireless network based on Bayes game model by CHEN Hang1, TAO Jun1

    Published 2010-01-01
    “…Bayes game theory was used to research parameter adjustment problems in wireless network intrusion detec-tion.Intrusion detection game model was designed,time interval adjust algorithm TSMA-BG and parameter correction algorithm DPMA were also designed according to the perfect equilibrium in game modeling.Simulation results show that intrusion detection systems can effectively use these algorithms to detect intrusion behavior that have been changed.…”
    Get full text
    Article
  13. 2353

    Joint trade-off optimization algorithm based on cooperative spectrum sensing throughput by Guo-qing JI, Gang WANG, Hong-bo ZHU

    Published 2011-11-01
    “…The achievable data throughput of the cognitive network was modeled to optimize the overhead and performance of the cooperative system thoroughly.Considering the soft data combination decision,the joint trade-off optimization of the local sampling number and cooperative user number was modeled based on the achievable data throughput.The global optimal solution was achieved with inexact line search algorithm,which is based on Armijo rule and lopsided search step technique.Consequently,the validity of the optimization model was verified both by the numerical computation and by Monte-Carlo simulation tests.The joint trade-off optimization of the sampling number and cooperative user number was achieved in cooperative sensing based on the throughput maximizing criterion.…”
    Get full text
    Article
  14. 2354

    Interactive Multimodal Television Media Adaptive Visual Communication Based on Clustering Algorithm by Huayuan Yang, Xin Zhang

    Published 2020-01-01
    “…The method divides the similarity calculation in the clustering algorithm to improve the clustering efficiency of the algorithm. …”
    Get full text
    Article
  15. 2355

    Community detection algorithm of hybrid node analysis and edge analysis in complex networks by Kun DENG, Qingfeng JIANG, Xingyan LIU

    Published 2023-04-01
    “…The community detection of hybrid node analysis and edge analysis in complex networks (CDHNE), a novel community detection algorithm, was proposed aiming at the problem that both edge community detection and node-based community detection algorithms had corresponding shortcomings in the process of detecting communities, which affected the quality of complex network community detection.The relatively stable characteristics of the edge in the networks were firstly used by the algorithm to construct a more accurate community structure through edge community detection at the early stage of algorithm execution.Then, after the formation of the edge communities, the flexible characteristics of the node were used to accurately detect the boundary of edge communities, so as to more accurately detect the community structure in the complex networks.In the computer-generated network experiments, when the community structure of the network gradually became fuzzy, the number of overlapping nodes and the number of communities to which the overlapping nodes belonged kept increasing.Compared to traditional algorithms, the accuracy of community detection and overlapping nodes detection were improved by an average of 10% and 15%, respectively, by the CDHNE algorithm.In the real network experiments, the tightness of the community structure detected by the CDHNE algorithm was better.Especially when facing large-scale networks with more than 100 000 nodes, the detection task was completed by the CDHNE algorithm with high quality, and the EQ value reached 0.412 1.The experimental results show that the CDHNE algorithm has advantages in operational stability and handling large-scale networks.…”
    Get full text
    Article
  16. 2356

    An Inertial Accelerated Algorithm for Solving Split Feasibility Problem with Multiple Output Sets by Huijuan Jia, Shufen Liu, Yazheng Dang

    Published 2021-01-01
    “…The paper proposes an inertial accelerated algorithm for solving split feasibility problem with multiple output sets. …”
    Get full text
    Article
  17. 2357

    Scheduling algorithm for stochastic job stream cipher service based on load balancing by Li LI, Guozhen SHI, Kui GENG, Xiuze DONG, Fenghua LI

    Published 2018-06-01
    “…Business stream parallel processing system face the situation of the diversity of cipher service requests,the cross of serial mode and parallel mode,the intercross of different business data flow,and the demand of high speed and high reliability in security field.In order to improve the parallel processing efficiency of multi-cryptographic algorithm,load balancing was used as scheduling objective.Based on hierarchical hardware scheduling method (HHS-ACDID),considering the processing node’s storage capacity and processing speed,a load balancing scheduling algorithm was approved to support non related tasks and related tasks at the same time,which achieves the high speed cipher processing throughput.Simulation results show that the algorithm can complete dynamic scheduling of data stream system and get better load balancing effect.Compared with HHS-ACDID,the efficiency of the algorithm is improved by about 12%.…”
    Get full text
    Article
  18. 2358

    Algorithm for Cloud Particle Phase Identification Based on Bayesian Random Forest Method by Fu Tao, Yang Zhipeng, Tao Fa, Hu Shuzhen, Lu Yuxiang, Fu Changqing

    Published 2025-01-01
    “…Statistical analysis shows that Bayesian Random Forest Method achieves a cloud particle phase state recognition accuracy of 96% under both rainy and non-rainy weather conditions. This algorithm can be applied to decision-making services for weather processes such as snowfall, enabling minute-level monitoring of precipitation types, phase transition timings, and evolution processes, thereby addressing the issue of automatic precipitation identification in operational settings.…”
    Get full text
    Article
  19. 2359

    Improving the segmentation of the vertebrae using a multi-stage machine learning algorithm by Vladyslav Koniukhov

    Published 2024-11-01
    “…The subjects of this article are algorithms for the segmentation of X-ray images of various qualities. …”
    Get full text
    Article
  20. 2360