Showing 2,601 - 2,620 results of 19,511 for search '"algorithm"', query time: 0.09s Refine Results
  1. 2601
  2. 2602
  3. 2603

    Research on dynamic alliance of task allocation and its algorithm in wireless sensor network by CHEN Guo-long, GUO Wen-zhong, CHEN Yu-zhong

    Published 2009-01-01
    “…In order to prolong the lifetime,reduce the energy consumption,and balance the network load effectively,a dynamic alliance model and its corresponding algorithm of task allocation in wireless sensor network(WSN) were proposed.This method described a cost function according to the execution time,energy consumption and load balance.Particle swarm optimization was used to optimize task allocation.Meanwhile,a mutation operator that could effectively improve the algorithm’s ability on global search and maintained population diversity was also introduced.Simulation results show that the proposed algorithm provides a good balance of local solutions and global exploration,which results in a great decrease of execution time and a steady balance of network load.…”
    Get full text
    Article
  4. 2604

    MgdFlow: multi-granularity data flow management algorithm in microgrid scenario by Youbo JING, Qingyue CAO, Rui ZHU

    Published 2023-10-01
    “…Aiming at the problem of frequent entry space occupation and resource scheduling caused by passive response insertion of flow entries by software defined network (SDN) devices, a operational function-based multi-granularity data flow management algorithm (MgdFlow) was proposed.Through delayed sorting and multiple aggregation and splitting, the number of flow entry insertions and scheduling instructions were reduced.Experimental data shows that the load balancing performance is 18% higher than the adaptive two-stage flow, and the average entry occupation is 9% lower than the traditional OpenFlow scheme.There are also 24% and 12% improvements in the defined controller scheduling resource ratio ImproveQoS compared to other schemes.…”
    Get full text
    Article
  5. 2605

    Iterative Algorithms for Variational Inequalities Governed by Boundedly Lipschitzian and Strongly Monotone Operators by Caiping Yang, Songnian He

    Published 2015-01-01
    “…In this paper, relaxed and self-adaptive iterative algorithms are proposed for computing this unique solution. …”
    Get full text
    Article
  6. 2606
  7. 2607

    CFD algorithm for moving boundary problems of isothermal drying and shrinkage: Case of prunes by Lentzou Diamanto, Templalexis Charalampos, Boudouvis Andreas G., Karathanos Vaios, Xanthopoulos Georgios

    Published 2025-01-01
    “…Water diffusivity and peel resistance were estimated using the Levenberg-Marquardt (L-M) optimisation algorithm based on the experimental drying data. The surface resistance is accounted as the sum of the peel and the diffusive boundary layer resistances, the latter being negligible compared to the former. …”
    Get full text
    Article
  8. 2608
  9. 2609

    A Satellite Observation Data Transmission Scheduling Algorithm Oriented to Data Topics by Hao Chen, Baorong Zhai, Jiangjiang Wu, Chun Du, Jun Li

    Published 2020-01-01
    “…In order to further enhance the performance and speed up the convergence process of our algorithm, a domain-knowledge-based mutation operator is designed. …”
    Get full text
    Article
  10. 2610

    Image Reconstruction Algorithm Based on Tree Sparsity Model for Visual Sensor Network by Min Hu, Xuwei Huang, Dan Long, Cailiang Shen

    Published 2013-02-01
    “…A tree sparsity mode1 based image compressed sensing(CS)algorithm was proposed to efficiently explore the correlation in visua1 sensor networks(VSN)data. …”
    Get full text
    Article
  11. 2611

    Improved YOLOv5s Algorithm for Small Target Detection in UAV Aerial Photography by Shixin Li, Chen Liu, Kaiwen Tang, Fanrun Meng, Zhiren Zhu, Liming Zhou, Fankai Chen

    Published 2024-01-01
    “…Applying existing object detection algorithms to such images is often inaccurate and prone to misdetection and omission. …”
    Get full text
    Article
  12. 2612

    Research on 2D/3D multimodal medical image registration algorithm by XU Mi, ZHUGE Bin, YUAN Feiniu, YIN Zhenghu, DONG Ligang, JIANG Xian, SUN Yingqi, SONG Jiaqi, SHI Xiaotong, SU Lei, ZHOU Yibo, LIN Shifan

    Published 2024-03-01
    “…A 2D/3D multimodal medical image alignment algorithm was proposed, which firstly utilized the excellent feature extraction capability of Swin Transformer to construct an initial pose estimation model to realize the fast prediction of pose parameters. …”
    Get full text
    Article
  13. 2613

    Investigations of MWISP Filaments. I. Filament Identification and Analysis Algorithms, and Source Catalog by Yu Jiang, Xuepeng Chen, Sheng Zheng, Zhibo Jiang, Zhiwei Chen, Yao Huang, Yang Su, Li Sun, Jian-Cheng Feng, Haoran Feng, Ji Yang

    Published 2025-01-01
    “…To facilitate the identification and analysis of filaments, we introduce Directional and Positional Consistency between Clumps and Filaments (DPConCFil), a suite of algorithms comprising one identification method and two analysis methods. …”
    Get full text
    Article
  14. 2614

    K-nearest neighbor algorithm for imputing missing longitudinal prenatal alcohol data by Ayesha Sania, Ayesha Sania, Nicolò Pini, Nicolò Pini, Morgan E. Nelson, Michael M. Myers, Michael M. Myers, Lauren C. Shuffrey, Maristella Lucchini, Maristella Lucchini, Amy J. Elliott, Amy J. Elliott, Hein J. Odendaal, William P. Fifer, William P. Fifer

    Published 2025-01-01
    “…AimsThe objective of this study is to illustrate the application of a machine learning algorithm, K Nearest Neighbor (k-NN) to impute missing alcohol data in a prospective study among pregnant women.MethodsWe used data from the Safe Passage study (n = 11,083). …”
    Get full text
    Article
  15. 2615

    Auto forensic detecting algorithms of malicious code fragment based on TensorFlow by Binglong LI, Jinlong TONG, Yu ZHANG, Yifeng SUN, Qingxian WANG, Chaowen CHANG

    Published 2021-08-01
    “…In order to auto detect the underlying malicious code fragments in complex,heterogeneous and massive evidence data about digital forensic investigation, a framework for malicious code fragment detecting algorithm based on TensorFlow was proposed by analyzing TensorFlow model and its characteristics.Back-propagation training algorithm was designed through the training progress of deep learning.The underlying binary feature pre-processing algorithm of malicious code fragment was discussed and proposed to address the problem about different devices and heterogeneous evidence sources from storage media and such as AFF forensic containers.An algorithm which used to generate data set about code fragments was designed and implemented.The experimental results show that the comprehensive evaluation index F<sub>1</sub>of the method can reach 0.922, and compared with CloudStrike, Comodo, FireEye antivirus engines, the algorithm has obvious advantage in dealing with the underlying code fragment data from heterogeneous storage media.…”
    Get full text
    Article
  16. 2616

    Lightweight face image restoration algorithm based on multi-scale feature fusion by ZHAO Xiao, ZHAO Ziyi, YANG Chen

    Published 2024-08-01
    “…Finally, a positional attention module was introduced to enhance the salient information of the face image, and improve the model’s effective extraction ability of facial positional pixel information of the model. The algorithm was trained, validated and tested on the occluded face dataset MFD generated based on the CK+ dataset, and the PSNR of the repaired image reached 30.49 dB and SSIM reached 96.85%. …”
    Get full text
    Article
  17. 2617

    Energy-saving algorithm considering idle light-path prediction in SDM-EON by Yu XIONG, Jinyou HE, Baohua WANG, Bin ZHOU

    Published 2019-10-01
    “…To effectively reduce the energy consumption,blocking rate and crosstalk between adjacent cores in a multi-core fiber for space division multiplexing elastic optical network (SDM-EON),an energy-saving algorithm considering idle light-path prediction was proposed.The extreme learning machine model was used to predict the traffic volume of each light-path in the network.Thus the idle light-path set and the maintenance time threshold of each idle light-path were obtained.Then,the actual maintenance time of the idle light-path was perceived by the prediction algorithm.Finally,in the light-paths where the actual maintenance time do not exceed the minimum maintenance time threshold and the inter-core crosstalk are lower than the crosstalk threshold,the idle light-path with the least loading energy consumption was selected to carry the new traffic.The simulation results show that compared with the traditional energy-saving algorithm,when the SDM-EON crosstalk limitation is satisfied,the proposed algorithm can lead better energy-saving while maintain the blocking rate at levels compatible.…”
    Get full text
    Article
  18. 2618

    Motion estimation algorithm using 2 bit-depth pixel and fuzzy quantization by Chuan-ming SONG, Yan-wen GUO, Xiang-hai WANG, Dan LIU

    Published 2013-07-01
    “…A motion estimation algorithm was proposed using 2 bit-depth pixels. The reduction of pixel depth was first formalized by two successive steps, namely interval partitioning and interva mapping. …”
    Get full text
    Article
  19. 2619

    Parameter Optimization of Single-Diode Model of Photovoltaic Cell Using Memetic Algorithm by Yourim Yoon, Zong Woo Geem

    Published 2015-01-01
    “…First, 10 single algorithms were considered including genetic algorithm, simulated annealing, particle swarm optimization, harmony search, differential evolution, cuckoo search, least squares method, and pattern search; then their final solutions were used as initial vectors for generalized reduced gradient technique. …”
    Get full text
    Article
  20. 2620

    Firefly Optimization Algorithm for the Prediction of Uplift due to High-Pressure Jet Grouting by Wukui Dai, Li Liang, Bingji Zhang

    Published 2020-01-01
    “…Therefore, we proposed a new method based on the firefly optimization algorithm to search for the optimal solution for the target function. …”
    Get full text
    Article