-
2881
An Analysis of the Quality of Repeated Plate Load Tests Using the Harmony Search Algorithm
Published 2014-01-01“…To identify outlier data points, well-tested data were used to develop a characteristic function model using a harmony search algorithm error minimization technique. This measure was applied to determine the reliability of RSPLT data.…”
Get full text
Article -
2882
Hierarchical RIME algorithm with multiple search preferences for extreme learning machine training
Published 2025-01-01Subjects: “…Metaheuristic algorithm (MA)…”
Get full text
Article -
2883
A scalable multi-modal learning fruit detection algorithm for dynamic environments
Published 2025-02-01Get full text
Article -
2884
A Distance-Aware Safety-Related Message Broadcasting Algorithm for Vehicular Networks
Published 2014-02-01“…A new distance-aware broadcasting algorithm was proposed to enhance the propagation distance in the latency time of safety-related message broadcasting. …”
Get full text
Article -
2885
Application of Artificial Bee Colony Algorithm to Portfolio Adjustment Problem with Transaction Costs
Published 2014-01-01“…To solve the proposed model, a modified artificial bee colony (ABC) algorithm is developed for calculating the optimal portfolio adjusting strategy. …”
Get full text
Article -
2886
Novel cooperative global spectrum sensing algorithm based on variational Bayesian inference
Published 2016-02-01“…Furthermore, it is proved that the proposed algorithm has better MSE performance than another algorithm since the sparsity of model coefficient vector is util zed.…”
Get full text
Article -
2887
Research on vehicle feature recognition algorithm based on optimized convolutional neural network
Published 2023-10-01“…To address the issue of weak identification and low accuracy in recognizing features of target vehicles at different distances in road scene images, a vehicle feature recognition algorithm based on optimized convolutional neural network (CNN) was proposed.Firstly, a multi-scale input based on the PAN model was employed to capture target vehicle features at varying distances.Subsequently, improvements were made to the network model by incorporating multi-pool, batch normalization (BN) layers, and Leaky ReLU activation functions within the CNN architecture.Furthermore, the generalization ability of the network model was enhanced by introducing a hybrid attention mechanism that focuses on important features and regions in the vehicle image.Lastly, a multi-level CNN structure was constructed to achieve feature recognition for vehicles.Simulation experiment results conducted on the BIT-Vehicle database within a single scene show the proposed algorithm’s significant enhancements in single-object and multi-object recognition rates compared to CNN, R-CNN, ABC-CNN, Faster R-CNN, AlexNet, VGG16, and YOLOV8.Specifically, improvements of 16.75%, 10.9%, 4%, 3.7%, 2.46%, 1.3%, and 1% in single-object recognition, as well as 17.8%, 10.5%, 2.5%, 3.8%, 2.7%, 1.1%, and 1.3% in multi-object recognition, have been demonstrated by the proposed algorithm, respectively.Over the more complex UA-DETRAC datasets, more precise results have been also achieved by the proposed algorithm in recognizing target vehicles at various distances compared to other algorithms.…”
Get full text
Article -
2888
Real-Time Localization Algorithm for Maritime Search and Rescue Wireless Sensor Network
Published 2013-03-01“…To make WSN localization suitable for the MSR, an improved microelectromechanical systems MEMS aided algorithm on the basis of triangle and centroid algorithm is proposed to locate and track the search targets in real time and more precisely. …”
Get full text
Article -
2889
Thermal Structure Strength Analysis of Nozzle of Solid Rocket Motor with the Coupled Algorithm
Published 2021-01-01“…The numerical simulation process and finite element model of the coupled algorithm and engineering algorithm were obtained, while the physical model was simplified appropriately. …”
Get full text
Article -
2890
Model and Algorithm for Human Resource-Constrained R&D Program Scheduling Optimization
Published 2019-01-01“…To solve the model, according to the assumptions and constraints of the model, the initial network diagram of multiple projects is determined, the enumeration algorithm satisfying constraint conditions provides the feasible solution sets, and the algorithm based on dynamic programming is designed for phased optimization. …”
Get full text
Article -
2891
Design of the Engine Timing Silent Chain System Based on the Pitch-variation Algorithm
Published 2024-12-01Subjects: Get full text
Article -
2892
Study on Missing Data Filling Algorithm of Nuclear Power Plant Operation Parameters
Published 2022-01-01“…Finally, the operation data is taken to build the experiment data set for the algorithm verification. The results shows that the designed algorithm performs much better than the mean interpolation method and LSTM.…”
Get full text
Article -
2893
A Stackelberg-Game-Based Power Control Algorithm for Wireless Mesh Networks
Published 2013-01-01“…We then present an equilibrium solution for the noncooperative game using Stackelberg model, and we propose an iterative, distributed power control algorithm for WMNs. Also, we conduct numeric experiments to evaluate the system performance, our results show that the proposed algorithm can balance nodes to share the limited network resources and maximize total utility, and thus it is efficient and effective for solving the power control problem in WMNs.…”
Get full text
Article -
2894
Historical Feature Pattern Extraction Based Network Attack Situation Sensing Algorithm
Published 2014-01-01“…This algorithm can continuously promote the adaptability of HFPE through gradual fine-tuning. …”
Get full text
Article -
2895
Cyber attacks and privacy protection distributed consensus algorithm for multi-agent systems
Published 2023-03-01“…To solve the consensus problem of multi-agent systems in the environment of cyber attacks and information eavesdropping, an average consensus algorithm that can effectively resist network denial of service (DoS) attacks and protect nodes’ state privacy was proposed.Firstly, combined with the characteristics of DoS attacks in networked control systems, a periodic DoS attack model related to time was constructed.Then a distributed network node information processing mechanism based on differential privacy was proposed by using the information interaction between neighbor nodes, and then it was introduced into the average consensus algorithm.Furthermore, combined with the event-triggered mechanism, a consensus algorithm method suitable for undirected communication networks under DoS attacks was proposed, and its convergence and privacy protection performance were analyzed strictly mathematically.Finally, the effectiveness of the proposed algorithm was verified by a numerical simulation experiment and hardware experiment.…”
Get full text
Article -
2896
Semi-fragile watermark algorithm based on Walsh-Hadamard transformand and convolution coding
Published 2009-01-01“…A semi-fragile watermark algorithm based on the Walsh-Hadamard transform and convolution coding was proposed. …”
Get full text
Article -
2897
Research on the Edge Resource Allocation and Load Balancing Algorithm Based on Vehicle Trajectory
Published 2022-01-01“…Therefore, in this article, based on the vehicle trajectories, the edge resource allocation algorithm and load balancing algorithm are used to obtain the load prediction value of the edge server and then calculate the optimal edge resource quantity in order to reduce the resource idleness as much as possible. …”
Get full text
Article -
2898
FUZZY ALGORITHM TO CONTROL REACTIVE POWER FLOW IN ELECTRIC NETWORK WITH NONLINEAR LOADS
Published 2016-08-01“…This could considerably change the magnitude and direction of reactive power flow in a grid and impair the existing processes of reactive power control. The scheme and the algorithm of control of capacitor banks in networks with non-linear load that are based on the use of fuzzy logic software are presented in the article. …”
Get full text
Article -
2899
INVESTIGATION OF BLOCKING ALGORITHM FOR TRANSFORMER CURRENT PROTECTIONS IN MAGNETIZING INRUSH CURRENT MODES
Published 2014-04-01“…Presents investigations on blocking algorithm for transformer current protections during magnetizing inrush current. …”
Get full text
Article -
2900
A robust power allocation algorithm for underwater acoustic cooperative communication network
Published 2019-01-01“…The simulation results show that the proposed algorithm not only extends the survival time of node, but also improves the performance of system.…”
Get full text
Article