Showing 3,061 - 3,080 results of 19,511 for search '"Algorithms"', query time: 0.09s Refine Results
  1. 3061

    Algorithm for determining the operating parameters of an electrical network in the problem of optimal reconfiguration in real time by Vladislav A. Rokhlov, Rustam N. Khamitov, Sergey N. Zherebtsov, Anastasia A. Latyntseva

    Published 2025-01-01
    “…The authors have developed an algorithm for determining the parameters of the electric network operating mode when determining its optimal configuration. …”
    Get full text
    Article
  2. 3062

    Interference detection and diversity suppression algorithm of OFDM system under partial-band jamming by Guo LI, Ni WEN, Fengkui GONG, Jian ZHANG, Sihan ZHANG

    Published 2021-09-01
    “…For the currently widely-used OFDM system, which greatly improved the communication performance under the condition of partial-band jamming, an interference detection algorithm based on FCVE and an interference suppression algorithm based on frequency diversity were proposed.The threshold factor formula of FCVE algorithm was derived theoretically, and the interference detection threshold was calculated by using the threshold factor and the variance of the received signal, so as to achieve the interference detection with high accuracy.The simulation results show that the proposed FCVE algorithm significantly improves the interference detection probability of the classical FCME algorithm under the condition of high signal to interference ratio (SIR).Further, the interference can be greatly suppressed based on the idea of frequency diversity with the result of interference detection.The simulation results show that the bit error rate of the system can be reduced by two orders of magnitude under the same SIR.…”
    Get full text
    Article
  3. 3063
  4. 3064

    An Approximate Cone Beam Reconstruction Algorithm for Gantry-Tilted CT Using Tangential Filtering by Ming Yan, Cishen Zhang, Hongzhu Liang

    Published 2006-01-01
    “…FDK algorithm is a well-known 3D (three-dimensional) approximate algorithm for CT (computed tomography) image reconstruction and is also known to suffer from considerable artifacts when the scanning cone angle is large. …”
    Get full text
    Article
  5. 3065
  6. 3066

    Improving Diabetic Patients Monitoring System Using (NCA-CNN) Algorithm based on loT by Ayas Talib Mohammad, Jaber Parchami

    Published 2024-06-01
    “…The Neighbourhood Component Analysis-Convolutional Neural Network (NCA-CNN) approach that we have presented involves two stages: the first stage involves picking the most important features from all of the data, and the second stage involves categorizing the chosen features. The NCA algorithm is a mathematical method that rates the characteristics based on the results of an analysis of the data and picks the most significant aspects. …”
    Get full text
    Article
  7. 3067

    Deep deterministic policy gradient-based energy efficiency optimization algorithm for CR-NOMA by ZHANG Yun

    Published 2024-05-01
    “…In addition, compared with other algorithms, the proposed algorithm improves energy efficiency.…”
    Get full text
    Article
  8. 3068

    Robust watermarking algorithm for medical images based on accelerated‐KAZE discrete cosine transform by Dekai Li, Yen‐wei Chen, Jingbing Li, Lei Cao, Uzair Aslam Bhatti, Pengju Zhang

    Published 2022-11-01
    “…A medical image watermarking algorithm based on an accelerated‐KAZE discrete cosine transform (AKAZE‐DCT) is proposed to address the poor robustness of medical image watermarking algorithms to geometric attacks, which leads to low security of the information contained in medical images. …”
    Get full text
    Article
  9. 3069

    Research on Quantitative Remote Sensing Monitoring Algorithm of Air Pollution Based on Artificial Intelligence by Yun Liu, Yuqin Jing, Yinan Lu

    Published 2020-01-01
    “…When the current algorithm is used for quantitative remote sensing monitoring of air pollution, it takes a long time to monitor the air pollution data, and the obtained range coefficient is small. …”
    Get full text
    Article
  10. 3070

    Comprehensive influence evaluation algorithm of complex network nodes based on global-local attributes by Weijin JIANG, Ying YANG, Tiantian LUO, Wenying ZHOU, En LI, Xiaowei ZHANG

    Published 2022-09-01
    “…Mining key nodes in the network plays a great role in the evolution of information dissemination, virus marketing, and public opinion control, etc.The identification of key nodes can effectively help to control network attacks, detect financial risks, suppress the spread of viruses diseases and rumors, and prevent terrorist attacks.In order to break through the limitations of existing node influence assessment methods with high algorithmic complexity and low accuracy, as well as one-sided perspective of assessing the intrinsic action mechanism of evaluation metrics, a comprehensive influence (CI) assessment algorithm for identifying critical nodes was proposed, which simultaneously processes the local and global topology of the network to perform node importance.The global attributes in the algorithm consider the information entropy of neighboring nodes and the shortest distance nodes between nodes to represent the local attributes of nodes, and the weight ratio of global and local attributes was adjusted by a parameter.By using the SIR (susceptible infected recovered) model and Kendall correlation coefficient as evaluation criteria, experimental analysis on real-world networks of different scales shows that the proposed method is superior to some well-known heuristic algorithms such as betweenness centrality (BC), closeness centrality (CC), gravity index centrality(GIC), and global structure model (GSM), and has better ranking monotonicity, more stable metric results, more adaptable to network topologies, and is applicable to most of the real networks with different structure of real networks.…”
    Get full text
    Article
  11. 3071

    Research on elastic handover algorithm of 6G network based on fine-grained slicing by Xiaorong ZHU, Kang CHEN

    Published 2022-09-01
    “…With the emergence of high-bandwidth services such as holographic communication and augmented reality in the future, high-bandwidth services will be divided into finer-grained service slices according to the rates to meet diverse requirements of users.For the problem of how to complete network switching in a fine-grained slicing of large bandwidth services, an elastic handover algorithm of 6G network based on bipartite graph stable matching was proposed.By optimizing “user-network slice-base station” association, the total rate of users was maximized, and the access problem was modeled as a hierarchical bipartite graph stable matching problem.Then by using the two matching ideas of “slice base station” integration and “slice first and then base station”, the adaptive handoff of the network was realized by using Gale-Shapley algorithm.Simulation results show that the access success rates of the proposed integrated and two-stage matching algorithms are 15% and 10% higher respectively than that of the traditional method, and the total rate of users is also significantly improved.…”
    Get full text
    Article
  12. 3072

    A Bi-Level Probabilistic Path Planning Algorithm for Multiple Robots with Motion Uncertainty by Jingchuan Wang, Ruochen Tai, Jingwen Xu

    Published 2020-01-01
    “…For improving the system efficiency when there are motion uncertainties among robots in the warehouse environment, this paper proposes a bi-level probabilistic path planning algorithm. In the proposed algorithm, the map is partitioned into multiple interconnected districts and the architecture of proposed algorithm is composed of topology level and route level generating from above map: in the topology level, the order of passing districts is planned combined with the district crowdedness to achieve the district equilibrium and reduce the influence of robots under motion uncertainty. …”
    Get full text
    Article
  13. 3073

    Multiobjective Lightning Flash Algorithm Design and Its Convergence Analysis via Martingale Theory by Jiandong Duan, Jing Wang, Xinghua Liu, Gaoxi Xiao

    Published 2020-01-01
    “…In this paper, a novel multiobjective lightning flash algorithm (MOLFA) is proposed to solve the multiobjective optimization problem. …”
    Get full text
    Article
  14. 3074

    A Novel Algorithm of Quantum Random Walk in Server Traffic Control and Task Scheduling by Dong Yumin, Xiao Shufen

    Published 2014-01-01
    “…A quantum random walk optimization model and algorithm in network cluster server traffic control and task scheduling is proposed. …”
    Get full text
    Article
  15. 3075

    Improvement of CRF-Based Saliency Detection Algorithm Using Matrix Decomposition Based Features by Mohammad Shouryabi, Mohammad Javad Fadaeieslam

    Published 2020-09-01
    “…The proposed method outperforms other methods in terms of algorithm implementation accuracy and speed.…”
    Get full text
    Article
  16. 3076

    Copyright protection algorithm based on differential privacy deep fake fingerprint detection model by Chengsheng YUAN, Qiang GUO, Zhangjie FU

    Published 2022-09-01
    “…A copyright protection algorithm based on differential privacy for deep fake fingerprint detection model (DFFDM) was proposed, realizing active copyright protection and passive copyright verification of DFFDM without weakening the performance of the original task.In the original task training, noise was added to introduce randomness, and the expected stability of the differential privacy algorithm was used to make classification decisions to reduce the sensitivity to noise.In passive verification, FGSM was used to generate adversarial samples, the decision boundary was fine-adjusted to establish a backdoor, and the mapping was used as an implanted watermark to realize passive verification.To solve the copyright confusion caused by multiple backdoors, a watermark verification framework was designed, which stamped the trigger backdoors and identified the copyright with the help of time order.In active protection, to provide users with hierarchical services, the key neurons in the task were frozen by probabilistic selection strategy, and the access rights were designed to realize the thawing of neurons, so as to obtain the right to use the original task.Experimental results show that the backdoor verification is still effective under different model performance, and the embedded backdoor shows a certain robustness to the model modification.Also, the proposed algorithm can resist not only the collusion attack by the attacker to recruit legitimate users, but also the fine-tuning and compression attacks caused by the model modification.…”
    Get full text
    Article
  17. 3077
  18. 3078

    Dynamic deployment algorithm for multi-controllers based on bidirectional matching in software defined networking by Tao HU, Jianhui ZHANG, Weigong KONG, Sen YANG, Lujia CAO

    Published 2018-01-01
    “…Aiming at the controller load imbalance problem in distributed SDN,a multi-controller dynamic deployment algorithm based on bidirectional matching was proposed.Through collecting hop counts,delay and flow information in the network periodically,match lists of switch and controller was built respectively.According to the principle of optimal queuing,switches and controllers were selected from two match lists for implementing bidirectional matching,and the relationship of matching with the help of simulated annealing algorithm was optimized,which achieved dynamic deployment for multi-controller in distributed network.Results show that,compared with the existing approaches,this algorithm can match the connections between switches and controllers reasonably,and reduce the queue delay of flow request effectively.Moreover,and the controller load balancing rate has increased by 17.9% at least.…”
    Get full text
    Article
  19. 3079

    The PARAFAC-MUSIC Algorithm for DOA Estimation with Doppler Frequency in a MIMO Radar System by Nan Wang, Wenguang Wang, Fan Zhang, Yunneng Yuan

    Published 2014-01-01
    “…Simulation results show that the proposed PARAFAC-MUSIC algorithm has a higher accuracy than the PARAFAC algorithm and the MUSIC algorithm in DOA estimation.…”
    Get full text
    Article
  20. 3080

    Industrial Printing Image Defect Detection Using Multi-Edge Feature Fusion Algorithm by Bangchao Liu, Youping Chen, Jingming Xie, Bing Chen

    Published 2021-01-01
    “…In this paper, we propose a new multi-edge feature fusion algorithm which is effective in solving this problem. …”
    Get full text
    Article