-
2601
Dynamic Coverage Based on Neural Gas Learning Algorithm for Wireless Sensor Network
Published 2009-01-01Get full text
Article -
2602
Numerical Algorithm Based on Haar-Sinc Collocation Method for Solving the Hyperbolic PDEs
Published 2014-01-01Get full text
Article -
2603
Research on dynamic alliance of task allocation and its algorithm in wireless sensor network
Published 2009-01-01“…In order to prolong the lifetime,reduce the energy consumption,and balance the network load effectively,a dynamic alliance model and its corresponding algorithm of task allocation in wireless sensor network(WSN) were proposed.This method described a cost function according to the execution time,energy consumption and load balance.Particle swarm optimization was used to optimize task allocation.Meanwhile,a mutation operator that could effectively improve the algorithm’s ability on global search and maintained population diversity was also introduced.Simulation results show that the proposed algorithm provides a good balance of local solutions and global exploration,which results in a great decrease of execution time and a steady balance of network load.…”
Get full text
Article -
2604
MgdFlow: multi-granularity data flow management algorithm in microgrid scenario
Published 2023-10-01“…Aiming at the problem of frequent entry space occupation and resource scheduling caused by passive response insertion of flow entries by software defined network (SDN) devices, a operational function-based multi-granularity data flow management algorithm (MgdFlow) was proposed.Through delayed sorting and multiple aggregation and splitting, the number of flow entry insertions and scheduling instructions were reduced.Experimental data shows that the load balancing performance is 18% higher than the adaptive two-stage flow, and the average entry occupation is 9% lower than the traditional OpenFlow scheme.There are also 24% and 12% improvements in the defined controller scheduling resource ratio ImproveQoS compared to other schemes.…”
Get full text
Article -
2605
Iterative Algorithms for Variational Inequalities Governed by Boundedly Lipschitzian and Strongly Monotone Operators
Published 2015-01-01“…In this paper, relaxed and self-adaptive iterative algorithms are proposed for computing this unique solution. …”
Get full text
Article -
2606
On Quantum Methods for Machine Learning Problems Part II: Quantum Classification Algorithms
Published 2020-03-01Subjects: Get full text
Article -
2607
CFD algorithm for moving boundary problems of isothermal drying and shrinkage: Case of prunes
Published 2025-01-01“…Water diffusivity and peel resistance were estimated using the Levenberg-Marquardt (L-M) optimisation algorithm based on the experimental drying data. The surface resistance is accounted as the sum of the peel and the diffusive boundary layer resistances, the latter being negligible compared to the former. …”
Get full text
Article -
2608
The optimal route search in Bengaluru city transport using Hamilton circuit algorithm
Published 2025-02-01Subjects: Get full text
Article -
2609
A Satellite Observation Data Transmission Scheduling Algorithm Oriented to Data Topics
Published 2020-01-01“…In order to further enhance the performance and speed up the convergence process of our algorithm, a domain-knowledge-based mutation operator is designed. …”
Get full text
Article -
2610
Image Reconstruction Algorithm Based on Tree Sparsity Model for Visual Sensor Network
Published 2013-02-01“…A tree sparsity mode1 based image compressed sensing(CS)algorithm was proposed to efficiently explore the correlation in visua1 sensor networks(VSN)data. …”
Get full text
Article -
2611
Improved YOLOv5s Algorithm for Small Target Detection in UAV Aerial Photography
Published 2024-01-01“…Applying existing object detection algorithms to such images is often inaccurate and prone to misdetection and omission. …”
Get full text
Article -
2612
Research on 2D/3D multimodal medical image registration algorithm
Published 2024-03-01“…A 2D/3D multimodal medical image alignment algorithm was proposed, which firstly utilized the excellent feature extraction capability of Swin Transformer to construct an initial pose estimation model to realize the fast prediction of pose parameters. …”
Get full text
Article -
2613
Investigations of MWISP Filaments. I. Filament Identification and Analysis Algorithms, and Source Catalog
Published 2025-01-01“…To facilitate the identification and analysis of filaments, we introduce Directional and Positional Consistency between Clumps and Filaments (DPConCFil), a suite of algorithms comprising one identification method and two analysis methods. …”
Get full text
Article -
2614
K-nearest neighbor algorithm for imputing missing longitudinal prenatal alcohol data
Published 2025-01-01“…AimsThe objective of this study is to illustrate the application of a machine learning algorithm, K Nearest Neighbor (k-NN) to impute missing alcohol data in a prospective study among pregnant women.MethodsWe used data from the Safe Passage study (n = 11,083). …”
Get full text
Article -
2615
Auto forensic detecting algorithms of malicious code fragment based on TensorFlow
Published 2021-08-01“…In order to auto detect the underlying malicious code fragments in complex,heterogeneous and massive evidence data about digital forensic investigation, a framework for malicious code fragment detecting algorithm based on TensorFlow was proposed by analyzing TensorFlow model and its characteristics.Back-propagation training algorithm was designed through the training progress of deep learning.The underlying binary feature pre-processing algorithm of malicious code fragment was discussed and proposed to address the problem about different devices and heterogeneous evidence sources from storage media and such as AFF forensic containers.An algorithm which used to generate data set about code fragments was designed and implemented.The experimental results show that the comprehensive evaluation index F<sub>1</sub>of the method can reach 0.922, and compared with CloudStrike, Comodo, FireEye antivirus engines, the algorithm has obvious advantage in dealing with the underlying code fragment data from heterogeneous storage media.…”
Get full text
Article -
2616
Lightweight face image restoration algorithm based on multi-scale feature fusion
Published 2024-08-01“…Finally, a positional attention module was introduced to enhance the salient information of the face image, and improve the model’s effective extraction ability of facial positional pixel information of the model. The algorithm was trained, validated and tested on the occluded face dataset MFD generated based on the CK+ dataset, and the PSNR of the repaired image reached 30.49 dB and SSIM reached 96.85%. …”
Get full text
Article -
2617
Energy-saving algorithm considering idle light-path prediction in SDM-EON
Published 2019-10-01“…To effectively reduce the energy consumption,blocking rate and crosstalk between adjacent cores in a multi-core fiber for space division multiplexing elastic optical network (SDM-EON),an energy-saving algorithm considering idle light-path prediction was proposed.The extreme learning machine model was used to predict the traffic volume of each light-path in the network.Thus the idle light-path set and the maintenance time threshold of each idle light-path were obtained.Then,the actual maintenance time of the idle light-path was perceived by the prediction algorithm.Finally,in the light-paths where the actual maintenance time do not exceed the minimum maintenance time threshold and the inter-core crosstalk are lower than the crosstalk threshold,the idle light-path with the least loading energy consumption was selected to carry the new traffic.The simulation results show that compared with the traditional energy-saving algorithm,when the SDM-EON crosstalk limitation is satisfied,the proposed algorithm can lead better energy-saving while maintain the blocking rate at levels compatible.…”
Get full text
Article -
2618
Motion estimation algorithm using 2 bit-depth pixel and fuzzy quantization
Published 2013-07-01“…A motion estimation algorithm was proposed using 2 bit-depth pixels. The reduction of pixel depth was first formalized by two successive steps, namely interval partitioning and interva mapping. …”
Get full text
Article -
2619
Parameter Optimization of Single-Diode Model of Photovoltaic Cell Using Memetic Algorithm
Published 2015-01-01“…First, 10 single algorithms were considered including genetic algorithm, simulated annealing, particle swarm optimization, harmony search, differential evolution, cuckoo search, least squares method, and pattern search; then their final solutions were used as initial vectors for generalized reduced gradient technique. …”
Get full text
Article -
2620
Firefly Optimization Algorithm for the Prediction of Uplift due to High-Pressure Jet Grouting
Published 2020-01-01“…Therefore, we proposed a new method based on the firefly optimization algorithm to search for the optimal solution for the target function. …”
Get full text
Article