-
3061
Algorithm for determining the operating parameters of an electrical network in the problem of optimal reconfiguration in real time
Published 2025-01-01“…The authors have developed an algorithm for determining the parameters of the electric network operating mode when determining its optimal configuration. …”
Get full text
Article -
3062
Interference detection and diversity suppression algorithm of OFDM system under partial-band jamming
Published 2021-09-01“…For the currently widely-used OFDM system, which greatly improved the communication performance under the condition of partial-band jamming, an interference detection algorithm based on FCVE and an interference suppression algorithm based on frequency diversity were proposed.The threshold factor formula of FCVE algorithm was derived theoretically, and the interference detection threshold was calculated by using the threshold factor and the variance of the received signal, so as to achieve the interference detection with high accuracy.The simulation results show that the proposed FCVE algorithm significantly improves the interference detection probability of the classical FCME algorithm under the condition of high signal to interference ratio (SIR).Further, the interference can be greatly suppressed based on the idea of frequency diversity with the result of interference detection.The simulation results show that the bit error rate of the system can be reduced by two orders of magnitude under the same SIR.…”
Get full text
Article -
3063
Effective Feature Selection on Transfer Deep Learning Algorithm for Thyroid Nodules Ultrasound Detection
Published 2024-12-01Get full text
Article -
3064
An Approximate Cone Beam Reconstruction Algorithm for Gantry-Tilted CT Using Tangential Filtering
Published 2006-01-01“…FDK algorithm is a well-known 3D (three-dimensional) approximate algorithm for CT (computed tomography) image reconstruction and is also known to suffer from considerable artifacts when the scanning cone angle is large. …”
Get full text
Article -
3065
Investigating AI systems: examining data and algorithmic bias through hermeneutic reverse engineering
Published 2025-01-01Subjects: Get full text
Article -
3066
Improving Diabetic Patients Monitoring System Using (NCA-CNN) Algorithm based on loT
Published 2024-06-01“…The Neighbourhood Component Analysis-Convolutional Neural Network (NCA-CNN) approach that we have presented involves two stages: the first stage involves picking the most important features from all of the data, and the second stage involves categorizing the chosen features. The NCA algorithm is a mathematical method that rates the characteristics based on the results of an analysis of the data and picks the most significant aspects. …”
Get full text
Article -
3067
Deep deterministic policy gradient-based energy efficiency optimization algorithm for CR-NOMA
Published 2024-05-01“…In addition, compared with other algorithms, the proposed algorithm improves energy efficiency.…”
Get full text
Article -
3068
Robust watermarking algorithm for medical images based on accelerated‐KAZE discrete cosine transform
Published 2022-11-01“…A medical image watermarking algorithm based on an accelerated‐KAZE discrete cosine transform (AKAZE‐DCT) is proposed to address the poor robustness of medical image watermarking algorithms to geometric attacks, which leads to low security of the information contained in medical images. …”
Get full text
Article -
3069
Research on Quantitative Remote Sensing Monitoring Algorithm of Air Pollution Based on Artificial Intelligence
Published 2020-01-01“…When the current algorithm is used for quantitative remote sensing monitoring of air pollution, it takes a long time to monitor the air pollution data, and the obtained range coefficient is small. …”
Get full text
Article -
3070
Comprehensive influence evaluation algorithm of complex network nodes based on global-local attributes
Published 2022-09-01“…Mining key nodes in the network plays a great role in the evolution of information dissemination, virus marketing, and public opinion control, etc.The identification of key nodes can effectively help to control network attacks, detect financial risks, suppress the spread of viruses diseases and rumors, and prevent terrorist attacks.In order to break through the limitations of existing node influence assessment methods with high algorithmic complexity and low accuracy, as well as one-sided perspective of assessing the intrinsic action mechanism of evaluation metrics, a comprehensive influence (CI) assessment algorithm for identifying critical nodes was proposed, which simultaneously processes the local and global topology of the network to perform node importance.The global attributes in the algorithm consider the information entropy of neighboring nodes and the shortest distance nodes between nodes to represent the local attributes of nodes, and the weight ratio of global and local attributes was adjusted by a parameter.By using the SIR (susceptible infected recovered) model and Kendall correlation coefficient as evaluation criteria, experimental analysis on real-world networks of different scales shows that the proposed method is superior to some well-known heuristic algorithms such as betweenness centrality (BC), closeness centrality (CC), gravity index centrality(GIC), and global structure model (GSM), and has better ranking monotonicity, more stable metric results, more adaptable to network topologies, and is applicable to most of the real networks with different structure of real networks.…”
Get full text
Article -
3071
Research on elastic handover algorithm of 6G network based on fine-grained slicing
Published 2022-09-01“…With the emergence of high-bandwidth services such as holographic communication and augmented reality in the future, high-bandwidth services will be divided into finer-grained service slices according to the rates to meet diverse requirements of users.For the problem of how to complete network switching in a fine-grained slicing of large bandwidth services, an elastic handover algorithm of 6G network based on bipartite graph stable matching was proposed.By optimizing “user-network slice-base station” association, the total rate of users was maximized, and the access problem was modeled as a hierarchical bipartite graph stable matching problem.Then by using the two matching ideas of “slice base station” integration and “slice first and then base station”, the adaptive handoff of the network was realized by using Gale-Shapley algorithm.Simulation results show that the access success rates of the proposed integrated and two-stage matching algorithms are 15% and 10% higher respectively than that of the traditional method, and the total rate of users is also significantly improved.…”
Get full text
Article -
3072
A Bi-Level Probabilistic Path Planning Algorithm for Multiple Robots with Motion Uncertainty
Published 2020-01-01“…For improving the system efficiency when there are motion uncertainties among robots in the warehouse environment, this paper proposes a bi-level probabilistic path planning algorithm. In the proposed algorithm, the map is partitioned into multiple interconnected districts and the architecture of proposed algorithm is composed of topology level and route level generating from above map: in the topology level, the order of passing districts is planned combined with the district crowdedness to achieve the district equilibrium and reduce the influence of robots under motion uncertainty. …”
Get full text
Article -
3073
Multiobjective Lightning Flash Algorithm Design and Its Convergence Analysis via Martingale Theory
Published 2020-01-01“…In this paper, a novel multiobjective lightning flash algorithm (MOLFA) is proposed to solve the multiobjective optimization problem. …”
Get full text
Article -
3074
A Novel Algorithm of Quantum Random Walk in Server Traffic Control and Task Scheduling
Published 2014-01-01“…A quantum random walk optimization model and algorithm in network cluster server traffic control and task scheduling is proposed. …”
Get full text
Article -
3075
Improvement of CRF-Based Saliency Detection Algorithm Using Matrix Decomposition Based Features
Published 2020-09-01“…The proposed method outperforms other methods in terms of algorithm implementation accuracy and speed.…”
Get full text
Article -
3076
Copyright protection algorithm based on differential privacy deep fake fingerprint detection model
Published 2022-09-01“…A copyright protection algorithm based on differential privacy for deep fake fingerprint detection model (DFFDM) was proposed, realizing active copyright protection and passive copyright verification of DFFDM without weakening the performance of the original task.In the original task training, noise was added to introduce randomness, and the expected stability of the differential privacy algorithm was used to make classification decisions to reduce the sensitivity to noise.In passive verification, FGSM was used to generate adversarial samples, the decision boundary was fine-adjusted to establish a backdoor, and the mapping was used as an implanted watermark to realize passive verification.To solve the copyright confusion caused by multiple backdoors, a watermark verification framework was designed, which stamped the trigger backdoors and identified the copyright with the help of time order.In active protection, to provide users with hierarchical services, the key neurons in the task were frozen by probabilistic selection strategy, and the access rights were designed to realize the thawing of neurons, so as to obtain the right to use the original task.Experimental results show that the backdoor verification is still effective under different model performance, and the embedded backdoor shows a certain robustness to the model modification.Also, the proposed algorithm can resist not only the collusion attack by the attacker to recruit legitimate users, but also the fine-tuning and compression attacks caused by the model modification.…”
Get full text
Article -
3077
Resource scheduling algorithm of satellite communication system for future multi-beam dense networking
Published 2021-04-01Subjects: “…improved ant colony op-timization algorithm…”
Get full text
Article -
3078
Dynamic deployment algorithm for multi-controllers based on bidirectional matching in software defined networking
Published 2018-01-01“…Aiming at the controller load imbalance problem in distributed SDN,a multi-controller dynamic deployment algorithm based on bidirectional matching was proposed.Through collecting hop counts,delay and flow information in the network periodically,match lists of switch and controller was built respectively.According to the principle of optimal queuing,switches and controllers were selected from two match lists for implementing bidirectional matching,and the relationship of matching with the help of simulated annealing algorithm was optimized,which achieved dynamic deployment for multi-controller in distributed network.Results show that,compared with the existing approaches,this algorithm can match the connections between switches and controllers reasonably,and reduce the queue delay of flow request effectively.Moreover,and the controller load balancing rate has increased by 17.9% at least.…”
Get full text
Article -
3079
The PARAFAC-MUSIC Algorithm for DOA Estimation with Doppler Frequency in a MIMO Radar System
Published 2014-01-01“…Simulation results show that the proposed PARAFAC-MUSIC algorithm has a higher accuracy than the PARAFAC algorithm and the MUSIC algorithm in DOA estimation.…”
Get full text
Article -
3080
Industrial Printing Image Defect Detection Using Multi-Edge Feature Fusion Algorithm
Published 2021-01-01“…In this paper, we propose a new multi-edge feature fusion algorithm which is effective in solving this problem. …”
Get full text
Article