-
2681
Polynomial time algorithm for solving k-coverage problem in wireless sensor networks
Published 2017-12-01“…How to solve the k-coverage problem,which was divided into worst-case and best-case,inside the two-dimensional target area in wireless sensor networks was explored,and a polynomial time algorithm for solving this problem was put forward.In this algorithm,a series of definitions and theorems were proposed based on the geometric graph of growing disks,and the k-coverage problem was transformed into one of finding a series of adjacent borders.The simulation results show that the algorithm could compute the optimal k-breach path and k-support path in polynomial time,so as to avoid or select the network coverage reasonably.…”
Get full text
Article -
2682
HRDA-Net: image multiple manipulation detection and location algorithm in real scene
Published 2022-01-01Get full text
Article -
2683
Bit arbitration query tree anti-collision algorithm based on grouping mechanism
Published 2016-01-01“…A bit arbitration query tree anti-collision algorithm based on grouping mechanism was proposed. …”
Get full text
Article -
2684
Energy and Wake effects Optimization of Offshore Wind Farm using PSO algorithm
Published 2025-01-01“…To accomplish the twin goals of reducing wake impacts and maximizing energy production, this research tackles a novel method to investigate trade-offs between competing goals using multi-objective optimization algorithms. We introduce this problem with a sophisticated wake named the Bastankhah-Porté-Agel (BPA) model. …”
Get full text
Article -
2685
Advanced Real-Time Indoor Tracking Based on the Viterbi Algorithm and Semantic Data
Published 2015-10-01“…A real-time indoor tracking system based on the Viterbi algorithm is developed. This Viterbi principle is used in combination with semantic data to improve the accuracy, that is, the environment of the object that is being tracked and a motion model. …”
Get full text
Article -
2686
An Improved ARIMA-Based Traffic Anomaly Detection Algorithm for Wireless Sensor Networks
Published 2016-01-01“…Simulation results and comparative analyses demonstrate that our proposed WSN traffic anomaly detection scheme has better anomaly detection accuracy than traditional traffic anomaly detection algorithms.…”
Get full text
Article -
2687
Multi-robot Collaborative Planning based on Optimized Artificial Bee Colony Algorithm
Published 2017-01-01Subjects: “…Optimized artificial bee colony algorithm…”
Get full text
Article -
2688
A Fast Algorithm for Electromagnetic Scattering from One-Dimensional Rough Surface
Published 2019-01-01Get full text
Article -
2689
Accounting Data Quality Evaluation Method Based on Improved Particle Swarm Algorithm
Published 2022-01-01“…In order to improve the effect of accounting quantity and quality evaluation, this article improves the particle swarm optimization algorithm. It improves the particle swarm optimization algorithm from the three aspects—extreme value selection, particle diversity, and inertia weight, and establishes an optimization algorithm suitable for solving the accounting data audit optimization problem. …”
Get full text
Article -
2690
Optimization of the Naive Bayes Algorithm with SMOTETomek Combination for Imbalance Class Fraud Detection
Published 2024-11-01“…Meanwhile, from the problems above, the results of the performance of Naïve Bayes, which experienced issues with data imbalance in this study, a resampling method was proposed in the hope of improving the performance of the Naïve Bayes algorithm and in the results of the AUC ROC curve, the SMOTETomek method could improve the performance of the Naïve Bayes algorithm. …”
Get full text
Article -
2691
-
2692
Energy efficient optimal sink position selection algorithm for wireless sensor networks
Published 2010-01-01“…The selection of sink position and the routing optimization for energy efficiency were combined,and the shortest path tree(SPT) tessellation was defined.The structure of the SPT tessellation cells in 2-dimension space was analyzed,and a method to search neighboring cells was presented.Three heuristic algorithms were also designed.Simu-lation experiments are conducted to analyze and compare the performance of the proposed algorithms,and the results show that the performance of the algorithms is close to or able to converge to the global optimality.…”
Get full text
Article -
2693
A Missing Sensor Data Estimation Algorithm Based on Temporal and Spatial Correlation
Published 2015-10-01“…To address this problem, Temporal and Spatial Correlation Algorithm (TSCA) is proposed to estimate missing data as accurately as possible in this paper. …”
Get full text
Article -
2694
Cement Transport Vehicle Routing with a Hybrid Sine Cosine Optimization Algorithm
Published 2023-01-01“…To demonstrate the advantages of the developed hybrid sine cosine algorithm, this algorithm is evaluated and compared with modern algorithms such as sine cosine algorithm, dragonfly algorithm, grey wolf optimizer, ant lion optimizer, particle swarm optimization, modified hybrid particle swarm optimization, genetic algorithm, and the double-population genetic algorithm in case studies. …”
Get full text
Article -
2695
A Pipelined Hardware Design of FNTT and INTT of CRYSTALS-Kyber PQC Algorithm
Published 2024-12-01“…Lattice-based post-quantum cryptography (PQC) algorithms demand number theoretic transform (NTT)-based polynomial multiplications. …”
Get full text
Article -
2696
Resource allocation algorithm for the downlink of multi-carrier and multi-user NOMA systems
Published 2019-11-01“…Non-orthogonal multiple access (NOMA) technology had received considerable attention as a candidate technology for 5G cellular systems.The resource allocation problem in multi-carrier and multi-user downlink NOMA systems were studied with the goal of optimizing system throughput.In the solution of the problem,the linear water-filling power allocation was used between subcarriers as the fractional transmit power allocation algorithm was used between the superposed users,so that system throughput could be improved.Meanwhile,the concept of time slot was adopted in the design of NOMA transmission scheme,in order to be able to schedule more users in the scenario where the number of cellcenter users and celledge users were not equal.The whole time period was divided into two time slots.On the basis of ensuring the fairness of users,different user pairing groups were implemented in different time slots so as to fully utilizing the entire resource to improve system throughput.The simulation results show that this method can transmit more bits under the same transmit power comparing with traditional non-orthogonal multiple access(NOMA) and OFDMA.…”
Get full text
Article -
2697
Lossless image authentication algorithm based on adaptive combinations of image basic blocks
Published 2012-06-01“…As the existing block-wise lossless image authentication algorithms were inadequate in the division of image authentication blocks,a novel lossless image authentication algorithm based on adaptive combinations of image basic blocks was proposed.The image authentication block was composed of some basic image blocks by the source image characteristics and requirements of watermarking image fidelity,and the authentication code was generated by a digital signature algorithm and embedded into the authentication block via a lossless watermarking algorithm.Moreover,the robust transmission of the image ID was achieved via multi-embedding,and using the ID and authentication block ID the image authentication algorithm could prevent vector quantizationattack.Theoretical analyses and experimental results demonstrate that the algorithm not only improves the existing tamper localization accuracy but also has strong adaptability and can resist vector quantization attack.…”
Get full text
Article -
2698
Sparse channel fast reconstruction algorithm for OFDM system based on IOC-CSMP
Published 2023-02-01“…A fast reconstruction algorithm based on inner product optimization and sparsity updating constraint was proposed for OFDM system channel estimation when the number of channel paths was unknown.By constructing and updating the selection vector, the inner product operation was reduced by using the atoms corresponding to the non-zero index of the selection vector.The atoms were optimized based on compressed sampling and backtracking strategies, and the channel estimation was completed by matching pursuit.The sparsity update and the stop condition for the algorithm was achieved by the energy difference between the two adjacent channel estimation so as to ensure fast convergence of the algorithm.The simulation results show that the proposed algorithm has better channel estimation performance than the least square algorithm, minimum mean square error algorithm, sparsity adaptive matching pursuit algorithm and adaptive regularized compressed sampling matching pursuit algorithm, and consumes less channel estimation time than the two adaptive methods.…”
Get full text
Article -
2699
One-Year Results of an Algorithmic Approach to Managing Failed Back Surgery Syndrome
Published 2014-01-01Get full text
Article -
2700
Network Selection Algorithm Based on Weighted Bipartite Graph in Heterogeneous Network Environment
Published 2015-09-01“…Compared with other algorithms, the proposed algorithm can provide matching results that meet the requirements for different QoS. …”
Get full text
Article