Showing 1,061 - 1,080 results of 19,511 for search '"Algorithms"', query time: 0.08s Refine Results
  1. 1061

    MOANA: Multi-objective ant nesting algorithm for optimization problems by Noor A. Rashed, Yossra H. Ali, Tarik A. Rashid, Seyedali Mirjalili

    Published 2025-01-01
    “…This paper presents the Multi-Objective Ant Nesting Algorithm (MOANA), a novel extension of the Ant Nesting Algorithm (ANA), specifically designed to address multi-objective optimization problems (MOPs). …”
    Get full text
    Article
  2. 1062

    Joint resource allocation algorithm for clustering cognitive Internet of things by Xin LIU

    Published 2019-03-01
    “…Cognitive Internet of things (CIoT) can improve spectrum utilization effectively through spectrum sensing and sharing,but spectrum sensing may generate overhead.Clustering CIoT was proposed to decrease sensing overhead,whose transmission rate could be improved through joint resource allocation.The network model and frame structure of the CIoT were proposed firstly,and the average transmission rate and interference power of the CIoT were deduced.Then,an optimization model was built to maximize the transmission rate through jointly optimizing the sensing time,sensing cluster head and transmission power,and a joint optimization algorithm was given to solve the optimization problem.Finally,the node clustering and cluster head selection algorithm of the CIoT was presented.The simulations show that the maximal transmission rate through joint resource allocation can be achieved and the transmission performance compared with the traditional schemes can be improved by the proposed scheme.…”
    Get full text
    Article
  3. 1063

    Multi-view graph neural network for fraud detection algorithm by Zhuo CHEN, Miao ZHU, Junwei DU

    Published 2022-11-01
    “…Aiming at the problem that in the field of fraud detection, imbalance labels and lack of necessary connections between fraud nodes, resulting in fraud detection tasks not conforming to the hypothesis of homogeneity of graph neural networks, multi-view graph neural network for fraud detection (MGFD) algorithm was proposed.First, A structure-independent encoder was used to encode the attributes of nodes in the network to learn the difference between the fraud node and the normal node.The hierarchical attention mechanism was designed to integrate the multi-view information in the network, and made full use of the interaction information between different perspectives in the network to model the nodes on the basis of learning differences.Then, based on the data imbalance ratio sampled subgraph, the sample was constructed according to the connection characteristics of fraud nodes for classification, which solved the problem of imbalance sample labels.Finally, the prediction label was used to identify whether a node is fraudulent.Experiments on real-world datasets have shown that the MGFD algorithm outperforms the comparison method in the field of graph-based fraud detection.…”
    Get full text
    Article
  4. 1064

    Design of DBA algorithm in EPON upstream channel in support of SLA by WANG Dong, QIU Kun, WANG Li-cun

    Published 2005-01-01
    “…Based on the SLA (service level agreement) in access network, the inherent deficiencies of two classical DBA algorithms: IPACT and Cyclic DBA in EPON to support multi-user types were analyzed. …”
    Get full text
    Article
  5. 1065

    Bearing Defect Classification Algorithm Based on Autoencoder Neural Network by Manhuai Lu, Yuanxiang Mou

    Published 2020-01-01
    “…Comparative experiments show that the neural network can effectively complete feature selection and substantially improve classification accuracy while avoiding the laborious algorithm of the conventional method.…”
    Get full text
    Article
  6. 1066
  7. 1067

    WLAN indoor positioning algorithm based on skewness-kurtosis testing by Zhen-long SONG, Gang-yi JIANG, Chao HUANG, Mei YU, Jia-le ZHANG

    Published 2012-05-01
    “…Focused on the issues that large positioning errors produced by the inconsistency of received signal strength (RSS)sample population distributions under indoor wireless local area network (WLAN),an indoor positioning algorithm based on skewness-kurtosis testing was proposed.By using the testing method of skewness and kurtosis,whether the RSS samples come from the normal population or not was checked.The distribution functions of the samples accepting null hypothesis were approximated with normal distribution,and the probability density functions of the samples refusing null hypothesis were estimated by kernel function.Experimental results show that the proposed algorithm leads to a 15 percent improvement over the previous methods.Moreover,the proposed algorithm can significantly reduce the workload of the off-line phase at the same positioning accuracy.…”
    Get full text
    Article
  8. 1068

    Key distribution and recovery algorithm based on Shamir's secret sharing by Hui-gui RONG, Jin-xia MO, Bing-guo CHANG, Guang SUN, Fei LONG

    Published 2015-03-01
    “…The case of secret sharing problem was discussed based on Shamir's secret sharing scheme and reconstructs the secret by introducing a linear combination of shadows—Lagrange factor. Then, the improved algorithm of key distribu-tion and recovery was proposed and extended to a multi-secret sharing scheme. …”
    Get full text
    Article
  9. 1069

    An Enhanced -Means Clustering Algorithm for Pattern Discovery in Healthcare Data by Ramzi A. Haraty, Mohamad Dimishkieh, Mehedi Masud

    Published 2015-06-01
    “…Mainly, we study k -means clustering algorithms on large datasets and present an enhancement to k -means clustering, which requires k or a lesser number of passes to a dataset. …”
    Get full text
    Article
  10. 1070
  11. 1071
  12. 1072

    Reconstruction algorithm for block compressed sensing based on variation model by Jian CHEN, xiong SUKai, zhi YANGXiu, kui ZHENGMing, qun LINLi

    Published 2016-01-01
    “…The algorithms for block compressed sensing based on total variation and mixed variation (abbreviated as BCS-TV and BCS-MV) models were proposed to improve the performance of current reconstruction algorithms for the block-based compressed sensing. …”
    Get full text
    Article
  13. 1073

    Determination of the FIFO-stack size for the algorithm of the image region growing by V. Yu. Tsviatkou

    Published 2019-12-01
    “…The aim of the work is to derive an expression that allows determining the size of the FIFO-stack for storing the coordinates of adjacent pixels depending on the image size for the segmentation algorithm based on region growing. The FIFO stack, organized on the principle of a ring multi-bit shift register, is considered. …”
    Get full text
    Article
  14. 1074
  15. 1075

    A Virtual Network Mapping Algorithm Based on Approaching Principle by Sheng Huang, Chuanchuan Wu, Xiaofei Yang, Hui Wang, Wei Zhang

    Published 2013-12-01
    “…On the basis of two stages virtual network mapping algorithm, pointing at the defects of the blind node mapping of existing greedy strategy, a virtual network mapping algorithm based on approaching principle was proposed. …”
    Get full text
    Article
  16. 1076

    An Improved 3D Localization Algorithm for the Wireless Sensor Network by Yan Xu, Yi Zhuang, Jing-jing Gu

    Published 2015-06-01
    “…Aiming at the existing problems of the current 3D localization algorithms, an improved 3D localization algorithm based on Degree of Coplanarity (3D-IDCP) is proposed. …”
    Get full text
    Article
  17. 1077

    Path Planning of Manipulators with the Improved RRT Algorithm in Complex Environment by Zhou Qinyuan, Zhang Lei, Deng Yueping, Zhang Chen, Lu Rirong, Hu Xianzhe

    Published 2024-09-01
    “…Aiming at the problems of the standard rapidly exploring random tree (RRT) algorithm in a complex environment, such as blind expansion, falling into local search, easy planning failure, low sampling success rate, and long paths, an adaptive goal-oriented strategy combined with an alternative strategy for regional sampling and an improved RRT algorithm of the greedy pruning strategy was proposed. …”
    Get full text
    Article
  18. 1078

    Low-complexity ATPM-VSIMM algorithm with adaptive model parameters by Hao ZENG, Wangqiang MU, Yang JIANG, Shunping YANG

    Published 2023-09-01
    “…Aiming at the problem that for maneuvering target tracking, the accuracy of tracking degraded in interacting multiple model algorithms due to the fixed model sets and the fixed transition probability matrix, a low-complexity ATPM-VSIMM algorithm was proposed, which could update the model parameters adaptively.The maneuvering situation of the target was judged according to the innovation changes of the system, and the state noise of the model sets was adjusted to realize the adaptive update of the model sets.Then, the more accurate transition probability matrix was computed through the change of the model posterior probability and the inter-model switching relationship.Therefore, the matching degree between the system motion model and the target motion trajectory was improved.Finally, the high filtering accuracy and the fast response speed of the tracking system were guaranteed.The effectiveness of the proposed algorithm was verified through three aspects that are the initial value of the model posterior probability, the initial value of the transition probability matrix, and the state noise.Simulation results demonstrate that the filtering accuracy of the ATPM-VSIMM algorithm is improved about 8% compared with the existing algorithms.…”
    Get full text
    Article
  19. 1079
  20. 1080

    A Trust Value-Based Spectrum Allocation Algorithm in CWSNs by Qing-Qi Pei, Zi Li, Li-Chuan Ma

    Published 2013-05-01
    “…This algorithm uses “the last diminisher” algorithm, which appears in fair division models. …”
    Get full text
    Article