Showing 1,601 - 1,620 results of 19,511 for search '"Algorithms"', query time: 0.10s Refine Results
  1. 1601

    Monte Carlo Alpha Iteration Algorithm for a Subcritical System Analysis by Hyung Jin Shim, Sang Hoon Jang, Soo Min Kang

    Published 2015-01-01
    “…The effectiveness of the α iteration algorithm is demonstrated for two-group homogeneous problems with varying the subcriticality by comparisons with analytic solutions. …”
    Get full text
    Article
  2. 1602

    Improved Harmony Search Algorithm to Compute the Underfrequency Load Shedding Parameters by Jose Miguel Riquelme-Dominguez, Martha N. Acosta, Francisco Gonzalez-Longatt, Manuel A. Andrade, Ernesto Vazquez, José Luis Rueda

    Published 2022-01-01
    “…This paper introduces a novel method to compute an optimally parametrized conventional UFLS scheme in specific given operating conditions by formulating it as a constrained problem and using the Improved Harmony Search (IHS) algorithm to solve it. Since there is no previous knowledge of using IHS to solve the UFLS scheme, a numerical parameter sensitivity analysis (PSA) is developed to tune the parameter of the IHS algorithm. …”
    Get full text
    Article
  3. 1603

    THE ALGORITHM OF THE CASE FORMATION DURING THE DEVELOPMENT OF CLINICAL DISCIPLINES IN MEDICAL SCHOOL by Andrey A. Garanin, Reseda M. Garanina

    Published 2016-04-01
    “…The aim of the study is to develop the algorithm of formation of the case on discipline «Clinical Medicine». …”
    Get full text
    Article
  4. 1604
  5. 1605

    A Novel Image Encryption Algorithm Based on DNA Subsequence Operation by Qiang Zhang, Xianglian Xue, Xiaopeng Wei

    Published 2012-01-01
    “…We present a novel image encryption algorithm based on DNA subsequence operation. Different from the traditional DNA encryption methods, our algorithm does not use complex biological operation but just uses the idea of DNA subsequence operations (such as elongation operation, truncation operation, deletion operation, etc.) combining with the logistic chaotic map to scramble the location and the value of pixel points from the image. …”
    Get full text
    Article
  6. 1606
  7. 1607
  8. 1608

    Distributed energy efficient beamforming algorithm for multicell multiuser downlink system by Wen-yang CHEN, Shi-wen HE, Yong-ming HUANG, Lv-xi YANG

    Published 2015-10-01
    “…A distributed energy efficient beamforming algorithm was studied for multicell multiuser downlink communication system.Firstly,the energy efficient optimization problem was first considered as the maximization of the ratio between the system sum rate and the system power consumption.The fractional programming optimization target was then transformed into a subtractive form via using the fractional programming theorem.Secondly,the problem was decomposed into some subproblems that can be solved respectively by introducing the concept of the interference temperature in cognitive radio networks.Finally,an effective distributed energy efficient beamforming algorithm was proposed by exploiting the Lagrangian duality theorem and optimization theorem.Compared to the classical energy efficient optimization algorithm,the proposed algorithm can achieve an obvious energy efficiency performance gain.…”
    Get full text
    Article
  9. 1609
  10. 1610
  11. 1611

    Community detection algorithm based on local affinity propagation and user profile by Kun GUO, Wen-zhong GUO, Qi-rong QIU, Qi-shan ZHANG

    Published 2015-02-01
    “…An algorithm based on local affinity propagation and a new similarity measure concerning user profile is proposed.On one hand,by loosening the exemplar constraint and requiring the messages propagate around a node's neighbors,the algorithm achieves lower time and space complexity without too much lost in clustering accuracy,which makes it adaptable to the mining of large-scale social networks.On the other hand,by designing a hybrid similarity measure based on the topological similarity and the profile similarity of the nodes,the algorithm can effectively tackle the situation of the social networks data without complete user relation information.The experimental results on the artificial datasets and the real-world datasets demonstrate that the algorithm not only has near-linear time complexity and linear space complexity,but also retains high detecting accuracy when handling incomplete networks.…”
    Get full text
    Article
  12. 1612

    ACS based differentiated service routing algorithm in wireless sensor network by Hong ZHAO, Zhi HU, Ying-you WEN

    Published 2013-10-01
    “…Aiming at the different requirements of data transmission in wireless sensor networks,QoS was divided into three services.By using game theory,the relationship among the delay,reliability and energy consumption during the process of data transmission was analyzed.Based on ACS (ant colony system),ACS based differentiated service and game-theory routing (ADSGR)was proposed.In accordance with the diverse QoS requirements,the ADSGR chooses the suitable paths,and improves network performance and resource utility.Experimental results show the ADSGR has better performance than some other routing algorithms in terms of the delay,reliability and energy consumption.…”
    Get full text
    Article
  13. 1613

    Algorithm for intelligent collaborative target search and trajectory planning of MAV/UAV by Zhuo LU, Qihui WU, Fuhui ZHOU

    Published 2024-01-01
    “…Based on the manned aerial vehicle (MAV) / unmanned aerial vehicle (UAV) intelligent cooperation platform, the search of multiple interfered signal sources with unknown locations and trajectory planning were studied.Considering the real-time and dynamic nature of the search process, a MAV/UAV intelligent collaborative target search and trajectory planning (MUICTSTP) algorithm based on multi-agent deep reinforcement learning (MADRL) was proposed.Each UAV made online decision on trajectory planning by sensing the received interference signal strength (RISS) values, and then transmitted the sensing information and decision-making actions to the MAV to obtain the global evaluation.The simulation results show that the proposed algorithm exhibits better performance in long-term RISS, collision, and other aspects compared to other algorithms, and the learning strategy is better.…”
    Get full text
    Article
  14. 1614

    Data update algorithm based on secure network coding in cloud environment by Hao WU, Cheng-zhe LAI, Jiu-lun FAN, Jian-hua LIU

    Published 2017-05-01
    “…In the cloud environment for data storage,the use of secure network coding technology can be a good solution to the data privacy and reliability issues.However,each coding block usually has a high correlation after network coding,very few updates to the file need to be re-encoded which is extremely easy to cause information leakage and serious consumption of system resources.To solve this problem,a network coding cloud storage data updating algorithm was proposed.Just by sending files change difference matrix,the storage node could update parts of the coding block accordingly which could complete the entire update files.Experimental results show that compared with RS coding and Tornado coding,the algorithm can not only ensure data security,but also greatly improve the efficiency of data update and data reconstruction.…”
    Get full text
    Article
  15. 1615

    Target Tracking Algorithm in Football Match Video Based on Deep Learning by Wei Zhao

    Published 2022-01-01
    “…Scale space discriminant tracking algorithm and Markov Monte Carlo algorithm are used to track single target or multi-target, respectively. …”
    Get full text
    Article
  16. 1616
  17. 1617
  18. 1618
  19. 1619
  20. 1620

    Band Selection Algorithm Based on Multi-Feature and Affinity Propagation Clustering by Junbin Zhuang, Wenying Chen, Xunan Huang, Yunyi Yan

    Published 2025-01-01
    “…A similarity matrix is then constructed by integrating multi-feature information. The AP algorithm clusters the bands of the hyperspectral images to achieve effective band dimensionality reduction. …”
    Get full text
    Article