-
3821
English Phrase Speech Recognition Based on Continuous Speech Recognition Algorithm and Word Tree Constraints
Published 2021-01-01“…Through simulation experiments, the NWBP algorithm improves the degree of fitting and convergence speed in the training of complex convolutional neural networks compared with other algorithms, reduces the redundant computation, and shortens the training time to a certain extent, and the algorithm has the advantage of accelerating the convergence of the network compared with simple networks. …”
Get full text
Article -
3822
A Topology Visualization Early Warning Distribution Algorithm for Large-Scale Network Security Incidents
Published 2013-01-01“…The key visualization algorithm and technology of the system are mainly discussed. …”
Get full text
Article -
3823
Optimization of Covariance Matrices of Kalman Filter with Unknown Input Using Modified Directional Bat Algorithm
Published 2025-01-01Subjects: “…modified directed bat algorithm…”
Get full text
Article -
3824
-
3825
Vehicular delay tolerant network routing algorithm based on optimized multi-period Bayesian network
Published 2021-12-01Subjects: Get full text
Article -
3826
Load-aware user association algorithm based on potential game theory for UDN with CoMP
Published 2019-03-01“…A load-aware user association (LAUA) algorithm based on potential game theory for ultra dense network (UDN) with coordinated multi-point (CoMP) transmission technique was proposed.LAUA algorithm was capable to balance the load of base stations on the premise of satisfying users’ demand for quality of service,avoid over loading problem in heterogeneous UDN.This algorithm was applicable to the Internet of things application scenario that required uploading vedio data and other data transmission rates.The effectiveness of the proposed algorithm was proved by the simulation experiment.…”
Get full text
Article -
3827
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020-01-01“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Article -
3828
Hydraulic Simulation of Leakage in Post-Earthquake Water Supply Pipeline Network and Its Algorithm Improvement
Published 2022-01-01“…The linear search and backtracking algorithm was used to control the iterative step size of the nonlinear equations of the pipe network nodes, which ensures the global convergence of the low-pressure hydraulic analysis of the pipe network.…”
Get full text
Article -
3829
RSS localization algorithm based on second-order cone programming in non-line-of-sight environment
Published 2021-03-01“…Aiming at the problem that the accuracy of localization using received signal strength (RSS) in wireless sensor network is insufficient in non-line-of-sight (NLOS) environment, a new robust localization algorithm based on second-order cone programming (SOCP) was proposed.Based on the assumption of the upper bound of NLOS biases, a location equation with robustness to NLOS biases was constructed to suppress the interference of NLOS biases, then convex optimization was used to transform the robust localization problem into a second-order cone programming problem with the intention of accurate estimation, thereby improved the localization accuracy.In addition, the localization problem was extended to the case of unknown transmission power, and an iterative SOCP algorithm was proposed.Simulation results show that the proposed algorithm can effectively solve the problems existing in NLOS localization, and the localization accuracy is better than Newton iteration method, UT method and SOCP method.…”
Get full text
Article -
3830
Tactical Analysis of Table Tennis Video Skills Based on Image Fuzzy Edge Recognition Algorithm
Published 2024-01-01“…To improve the effect of table tennis tactical analysis, this study proposed a table tennis video tactical analysis method based on image fuzzy edge recognition algorithm. This algorithm can effectively recognize edges in images to improve recognition accuracy and reduce errors and rejection rates. …”
Get full text
Article -
3831
Combinatorial intrusion detection model based on deep recurrent neural network and improved SMOTE algorithm
Published 2018-07-01Subjects: Get full text
Article -
3832
Dynamic task scheduling algorithm with task synchronization and energy savings in hard real-time systems
Published 2009-01-01Subjects: Get full text
Article -
3833
Prediction of Compressive Strength of Geopolymer Concrete Based on Support Vector Machine and Modified Cuckoo Algorithm
Published 2021-01-01“…Then, the modified cuckoo algorithm is employed to optimize the parameters in the support vector machine model. …”
Get full text
Article -
3834
Distributed communication interference resource scheduling using the master-slave parallel scheduling genetic algorithm
Published 2025-01-01“…In addition, it can reduce the algorithm running time in the scenario with a high-speed countermeasure, the generation time of the jamming scheme, and the average power consumption by 4%, 84%, and 57%, respectively. …”
Get full text
Article -
3835
Energy-saving clustering routing algorithm based on semi-fixed cluster for wireless sensor networks
Published 2024-04-01“…The simulation results show that the proposed algorithm reduces the energy consumption of nodes and provides longer network lifetimes of WSN.…”
Get full text
Article -
3836
Fault tolerant GPS-AOA-SINS integrated navigation algorithm based on federated Kalman filter
Published 2022-08-01“…At present, global positioning system (GPS) was widely used in outdoor positioning.However, the continuous development of cities complicated the positioning environment, resulting in a sharp decline in positioning accuracy.Therefore, the integrated positioning scheme of GPS/5G base station angle of arrival positioning/strap-down inertial navigation system (GPS-AOA-SINS) was adopted, and a fault-tolerant integrated navigation algorithm based on federated Kalman filter was proposed.Based on the GPS-AOA-SINS integrated positioning scheme, the algorithm added fault detection between the federated Kalman sub filter and the main filter, and adaptively adjusted the filter gain matrix of the fault sub filter.Experiments show that the proposed algorithm can effectively detect system faults and deal with them in real time, so as to improve the reliability of the system.…”
Get full text
Article -
3837
Research on the Time-varying Meshing Stiffness Algorithm of Spur Gears with Large Tooth Number Cracks
Published 2023-06-01Get full text
Article -
3838
-
3839
New PSO-SVM Short-Term Wind Power Forecasting Algorithm Based on the CEEMDAN Model
Published 2022-01-01“…Analysis of test results and comparative studies show that the RMSE and MAPE of the new model are only one-third of that of the traditional SVM algorithm. The forecasting accuracy and speed meet the requirements for safe operation of wind farms.…”
Get full text
Article -
3840
Algorithm of Computer Model Realization of Ferroresonance Overvoltages and Their Suppression at Asymmetric Regimes of Power Transmission Lines
Published 2004-08-01“…Recommendations for realization of the proposed model have been formulated and expediency concerning combination of insulation protection of network equipment and overvoltage limiter against ferroresonance overvoltages in a single algorithm has been shown in the paper.…”
Get full text
Article