Showing 2,701 - 2,720 results of 19,511 for search '"Algorithms"', query time: 0.11s Refine Results
  1. 2701

    A Clustering Algorithm Based on Mobility Properties in Mobile Ad Hoc Networks by Young-jun Oh, Kang-whan Lee

    Published 2015-06-01
    “…We propose a context-awareness routing algorithm—the DDV- (Dynamic Direction Vector-) hop algorithm—in mobile ad hoc networks. …”
    Get full text
    Article
  2. 2702
  3. 2703

    Next-Generation energy Management: Particle Density algorithm for residential microgrid optimization by Liang Wang, Nan Sun

    Published 2025-03-01
    Subjects: “…Improved Particle Swarm Optimization Algorithm…”
    Get full text
    Article
  4. 2704
  5. 2705

    DESIGN OF PARAMETERS OPTIMIZATION FOR AUTOMOBILE SUSPENSION BASED ON ARTIFICIAL BEE COLONY ALGORITHM by ZHANG HaiTao, WANG AiGuo

    Published 2018-01-01
    Subjects: “…Artificial bee colony algorithm(ABC)…”
    Get full text
    Article
  6. 2706

    Intelligent transmit power control algorithm for the multi-user interference of wireless network by Xianchao ZHANG, Yao ZHAO, Haijun YE, Rui FAN

    Published 2022-02-01
    “…To deal with the inter-user interference problem in wireless networks, an intelligent transmit power control scheme was proposed to manage the inter-user interference and guarantee multiple users' quality of service.Firstly, considering the complex dynamic wireless channel environment, a transmit power control model that aims to maximize the weighted sum-rate of the wireless communication system was established.Then, an intelligent power control algorithm based on the actor-critic framework in deep reinforcement learning was designed to shorten the power control decision time.Simulation results show that the proposed algorithm converges quickly, and when there are 10 pairs transceivers, the computation time consumed by the intelligent power control method is only a quarter of the time consumed by the traditional optimal algorithm.…”
    Get full text
    Article
  7. 2707

    A fruit fly optimization algorithm with a traction mechanism and its applications by Xing Guo, Jian Zhang, Wei Li, Yiwen Zhang

    Published 2017-11-01
    “…To address this problem, in this article, we propose a new fruit fly optimization algorithm, named as the traction fruit fly optimization algorithm, which is mainly based on the combination of “traction population” and dynamic search radius. …”
    Get full text
    Article
  8. 2708

    Hurst and priority adaptive RED combined with dynamic scheduling algorithm based on AOS by Yu-xia BIE, Cheng-sheng PAN, Hai-yan LIU, Yan-chun WANG

    Published 2012-10-01
    “…In order to efficiently transmit different types of high-capacity and burst data,based on virtual channel multiplexing technology on advanced orbiting systems(AOS),a Hurst and priority adaptive random early detection(RED) combined with dynamic scheduling algorithm named HPRED-DS was proposed.In queue management state,the algorithm designed an adaptive two-level packet dropping strategy based on Hurst parameter and priority.In virtual channel scheduling state,a VIP,synchronous and asynchronous mixed virtual channels scheduling mode was designed.Meanwhile,the algorithm efficiently combined queue management and virtual channel scheduling.Experimental results show that on the basis of maintaining high treatment efficiency and throughput,the algorithm stabilizes queue length,reduces delay and delay jitter,can meet various services’transmitting requirement.…”
    Get full text
    Article
  9. 2709

    A Laplace decomposition algorithm applied to a class of nonlinear differential equations by Suheil A. Khuri

    Published 2001-01-01
    “…In this paper, a numerical Laplace transform algorithm which is based on the decomposition method is introduced for the approximate solution of a class of nonlinear differential equations. …”
    Get full text
    Article
  10. 2710
  11. 2711

    Virtual network mapping algorithm with node reliability awareness and shared-path protection by Guang-yuan LIU, NXiu-fang A, Sen SU

    Published 2016-08-01
    “…Network virtualization has been proposed as a promising way for expanding the network architecture.However,how to provide reliable VN against substrate infrastructure failures has become an increasingly important issue.Meanwhile the substrate network resource cost should be minimized under VN reliability guarantees to maximize the revenue for the in-frastructure providers (InP).A novel heuristic VN mapping algorithm was presented.Simulation results show that proposed algorithm can gain near optimal network bandwidth usage compared to the previous algorithms.…”
    Get full text
    Article
  12. 2712

    YOLOV9-CBM: An Improved Fire Detection Algorithm Based on YOLOV9 by Xin Geng, Xiao Han, Xianghong Cao, Yixuan Su, Dongxue Shu

    Published 2025-01-01
    “…Regarding the current problems of false alarms and missed detections in fire detection, we propose a high-precision fire detection algorithm, YOLOV9-CBM (C3-SE, BiFPN, MPDIoU), by optimizing YOLOV9. …”
    Get full text
    Article
  13. 2713

    Two-dimensional multi-scale permutation entropy algorithm based on uniform quantization by WANG Daming, SHI Pengfei, LEI Yihang, BIAN Haoran, LIANG Min, CHANG Liwei

    Published 2024-10-01
    “…In order to solve the problem that equal values in the subsequence lead to an increase in the probability of certain ordinal patterns when extending the permutation entropy algorithm to two-dimensional domain, a two-dimensional multi-scale permutation entropy based on uniform quantization (MUPE<sub>2D</sub>) algorithm based on uniform quantization was proposed. …”
    Get full text
    Article
  14. 2714

    Improved large data spectral clustering algorithm based on sampling subspace constraint by Ru NIE

    Published 2018-11-01
    Subjects: “…weighted kernel k-means algorithm…”
    Get full text
    Article
  15. 2715

    New image encryption algorithm based on double chaotic system and compressive sensing by Yuguang YANG, Guodong CAO

    Published 2022-10-01
    “…Image encryption technology plays an important role in today’s multimedia applications and Internet information security transmission.However, most image encryption algorithms still have problems, for example, cipher images occupied high bandwidth during transmission, image encryption speed is slow, image encryption algorithms are not associated with plain image, and there is no complete ciphertext feedback mechanism.These problems all affect the security and easy use of image encryption algorithms.In order to solve the above problems, the compressive sensing technology and chaotic system were studied, and a new image encryption algorithm based on double chaotic system and compressive sensing with plaintext association was proposed.The plaintext image association key was used to associate the plain image hash value with the Logistic chaotic system parameters.Discrete wavelet transform, was used to sparse the plain image.Then the random measurement matrix was generated by the Logistic chaos system, and the image was encrypted once by combining the compressive sensing technique and the random measurement matrix to obtain the intermediate image.The intermediate image was hashed again, and the Rucklidge chaos system initial value was associated with the plain image hash value together.The Rucklidge chaotic system and encryption algorithm were used to control the intermediate image for secondary encryption and accordingly obtain the cipher image.The encryption algorithm was a new plaintext correlation encryption algorithm, which used the image’s own pixel value to control the scrambling of the intermediate image.It also enhanced the plaintext association and established a ciphertext feedback mechanism.Simulation results and performance analysis show that the algorithm has good encryption performance.The encrypted image can be compressed according to the compression ratio, effectively reducing the size of the cipher image.Moreover, it is resistant to common attacks such as known plaintext attack, selective plaintext attack and differential attack, which is better than other common image encryption algorithms.…”
    Get full text
    Article
  16. 2716
  17. 2717

    Discussion on Redundant Processing Algorithm of Association Rules Based on Hypergraph in Data Mining by Jintan Zhu

    Published 2022-01-01
    “…This paper uses two datasets of different sizes to conduct rule prediction accuracy experiments on the Markov logic network framework model algorithm of association rules and the traditional association rule algorithm. …”
    Get full text
    Article
  18. 2718
  19. 2719

    A Fast-Convergent Hyperbolic Tangent PSO Algorithm for UAVs Path Planning by Muhammad Haris, Dost Muhammad Saqib Bhatti, Haewoon Nam

    Published 2024-01-01
    “…Besides that, the proposed algorithm is also applied to different UAV path planning scenarios, underscoring its real-world relevance. …”
    Get full text
    Article
  20. 2720

    A Node Similarity and Community Link Strength-Based Community Discovery Algorithm by Haijuan Yang, Jianjun Cheng, Zeyi Yang, Handong Zhang, Wenbo Zhang, Ke Yang, Xiaoyun Chen

    Published 2021-01-01
    “…We evaluate NSCLS on both some synthetic networks and some real-world networks and show that it can detect high-quality community structures from various networks, and its results are much better than the counterparts of comparison algorithms.…”
    Get full text
    Article