Showing 2,701 - 2,720 results of 19,511 for search '"algorithm"', query time: 0.10s Refine Results
  1. 2701

    Deep deterministic policy gradient-based energy efficiency optimization algorithm for CR-NOMA by ZHANG Yun

    Published 2024-05-01
    “…In addition, compared with other algorithms, the proposed algorithm improves energy efficiency.…”
    Get full text
    Article
  2. 2702

    Robust watermarking algorithm for medical images based on accelerated‐KAZE discrete cosine transform by Dekai Li, Yen‐wei Chen, Jingbing Li, Lei Cao, Uzair Aslam Bhatti, Pengju Zhang

    Published 2022-11-01
    “…A medical image watermarking algorithm based on an accelerated‐KAZE discrete cosine transform (AKAZE‐DCT) is proposed to address the poor robustness of medical image watermarking algorithms to geometric attacks, which leads to low security of the information contained in medical images. …”
    Get full text
    Article
  3. 2703

    Research on Quantitative Remote Sensing Monitoring Algorithm of Air Pollution Based on Artificial Intelligence by Yun Liu, Yuqin Jing, Yinan Lu

    Published 2020-01-01
    “…When the current algorithm is used for quantitative remote sensing monitoring of air pollution, it takes a long time to monitor the air pollution data, and the obtained range coefficient is small. …”
    Get full text
    Article
  4. 2704

    Comprehensive influence evaluation algorithm of complex network nodes based on global-local attributes by Weijin JIANG, Ying YANG, Tiantian LUO, Wenying ZHOU, En LI, Xiaowei ZHANG

    Published 2022-09-01
    “…Mining key nodes in the network plays a great role in the evolution of information dissemination, virus marketing, and public opinion control, etc.The identification of key nodes can effectively help to control network attacks, detect financial risks, suppress the spread of viruses diseases and rumors, and prevent terrorist attacks.In order to break through the limitations of existing node influence assessment methods with high algorithmic complexity and low accuracy, as well as one-sided perspective of assessing the intrinsic action mechanism of evaluation metrics, a comprehensive influence (CI) assessment algorithm for identifying critical nodes was proposed, which simultaneously processes the local and global topology of the network to perform node importance.The global attributes in the algorithm consider the information entropy of neighboring nodes and the shortest distance nodes between nodes to represent the local attributes of nodes, and the weight ratio of global and local attributes was adjusted by a parameter.By using the SIR (susceptible infected recovered) model and Kendall correlation coefficient as evaluation criteria, experimental analysis on real-world networks of different scales shows that the proposed method is superior to some well-known heuristic algorithms such as betweenness centrality (BC), closeness centrality (CC), gravity index centrality(GIC), and global structure model (GSM), and has better ranking monotonicity, more stable metric results, more adaptable to network topologies, and is applicable to most of the real networks with different structure of real networks.…”
    Get full text
    Article
  5. 2705

    Research on elastic handover algorithm of 6G network based on fine-grained slicing by Xiaorong ZHU, Kang CHEN

    Published 2022-09-01
    “…With the emergence of high-bandwidth services such as holographic communication and augmented reality in the future, high-bandwidth services will be divided into finer-grained service slices according to the rates to meet diverse requirements of users.For the problem of how to complete network switching in a fine-grained slicing of large bandwidth services, an elastic handover algorithm of 6G network based on bipartite graph stable matching was proposed.By optimizing “user-network slice-base station” association, the total rate of users was maximized, and the access problem was modeled as a hierarchical bipartite graph stable matching problem.Then by using the two matching ideas of “slice base station” integration and “slice first and then base station”, the adaptive handoff of the network was realized by using Gale-Shapley algorithm.Simulation results show that the access success rates of the proposed integrated and two-stage matching algorithms are 15% and 10% higher respectively than that of the traditional method, and the total rate of users is also significantly improved.…”
    Get full text
    Article
  6. 2706

    A Bi-Level Probabilistic Path Planning Algorithm for Multiple Robots with Motion Uncertainty by Jingchuan Wang, Ruochen Tai, Jingwen Xu

    Published 2020-01-01
    “…For improving the system efficiency when there are motion uncertainties among robots in the warehouse environment, this paper proposes a bi-level probabilistic path planning algorithm. In the proposed algorithm, the map is partitioned into multiple interconnected districts and the architecture of proposed algorithm is composed of topology level and route level generating from above map: in the topology level, the order of passing districts is planned combined with the district crowdedness to achieve the district equilibrium and reduce the influence of robots under motion uncertainty. …”
    Get full text
    Article
  7. 2707

    Survey on channel assignment algorithms using partially overlapped channels in wireless Mesh network by Ji-hong WANG, Wen-xiao SHI, Yu-xin LI, Feng JIN, Chun-yue WANG

    Published 2014-05-01
    “…The basic concept of partially overlapped channels was presented, and then current partially overlapped channel assignment algorithms both at home and abroad were classified, summarized and analyzed from unicast and multicast point of view;problems and challenges of partially overlapped channel assignment were deeply analyzed, and the future directions for partially overlapped channels were pointed out. …”
    Get full text
    Article
  8. 2708

    Multiobjective Lightning Flash Algorithm Design and Its Convergence Analysis via Martingale Theory by Jiandong Duan, Jing Wang, Xinghua Liu, Gaoxi Xiao

    Published 2020-01-01
    “…In this paper, a novel multiobjective lightning flash algorithm (MOLFA) is proposed to solve the multiobjective optimization problem. …”
    Get full text
    Article
  9. 2709

    A comparative assessment of machine learning models and algorithms for osteosarcoma cancer detection and classification by Amoakoh Gyasi-Agyei

    Published 2025-06-01
    “…Using the seven derived datasets and eight ML algorithms, this study designed and performed an extensive comparative analysis of seven sets of ML models (altogether over 160 models) with their hyperparameters optimized using grid search. …”
    Get full text
    Article
  10. 2710

    A Novel Algorithm of Quantum Random Walk in Server Traffic Control and Task Scheduling by Dong Yumin, Xiao Shufen

    Published 2014-01-01
    “…A quantum random walk optimization model and algorithm in network cluster server traffic control and task scheduling is proposed. …”
    Get full text
    Article
  11. 2711

    Improvement of CRF-Based Saliency Detection Algorithm Using Matrix Decomposition Based Features by Mohammad Shouryabi, Mohammad Javad Fadaeieslam

    Published 2020-09-01
    “…Since saliency map can be applied to algorithms such as segmentation, compression and image retrieval, Researchers have focused on providing an efficient model to recognize it. …”
    Get full text
    Article
  12. 2712

    Copyright protection algorithm based on differential privacy deep fake fingerprint detection model by Chengsheng YUAN, Qiang GUO, Zhangjie FU

    Published 2022-09-01
    “…A copyright protection algorithm based on differential privacy for deep fake fingerprint detection model (DFFDM) was proposed, realizing active copyright protection and passive copyright verification of DFFDM without weakening the performance of the original task.In the original task training, noise was added to introduce randomness, and the expected stability of the differential privacy algorithm was used to make classification decisions to reduce the sensitivity to noise.In passive verification, FGSM was used to generate adversarial samples, the decision boundary was fine-adjusted to establish a backdoor, and the mapping was used as an implanted watermark to realize passive verification.To solve the copyright confusion caused by multiple backdoors, a watermark verification framework was designed, which stamped the trigger backdoors and identified the copyright with the help of time order.In active protection, to provide users with hierarchical services, the key neurons in the task were frozen by probabilistic selection strategy, and the access rights were designed to realize the thawing of neurons, so as to obtain the right to use the original task.Experimental results show that the backdoor verification is still effective under different model performance, and the embedded backdoor shows a certain robustness to the model modification.Also, the proposed algorithm can resist not only the collusion attack by the attacker to recruit legitimate users, but also the fine-tuning and compression attacks caused by the model modification.…”
    Get full text
    Article
  13. 2713
  14. 2714

    Dynamic deployment algorithm for multi-controllers based on bidirectional matching in software defined networking by Tao HU, Jianhui ZHANG, Weigong KONG, Sen YANG, Lujia CAO

    Published 2018-01-01
    “…Aiming at the controller load imbalance problem in distributed SDN,a multi-controller dynamic deployment algorithm based on bidirectional matching was proposed.Through collecting hop counts,delay and flow information in the network periodically,match lists of switch and controller was built respectively.According to the principle of optimal queuing,switches and controllers were selected from two match lists for implementing bidirectional matching,and the relationship of matching with the help of simulated annealing algorithm was optimized,which achieved dynamic deployment for multi-controller in distributed network.Results show that,compared with the existing approaches,this algorithm can match the connections between switches and controllers reasonably,and reduce the queue delay of flow request effectively.Moreover,and the controller load balancing rate has increased by 17.9% at least.…”
    Get full text
    Article
  15. 2715
  16. 2716

    The PARAFAC-MUSIC Algorithm for DOA Estimation with Doppler Frequency in a MIMO Radar System by Nan Wang, Wenguang Wang, Fan Zhang, Yunneng Yuan

    Published 2014-01-01
    “…To estimate the Doppler frequency, the PARAFAC (parallel factor) algorithm is firstly utilized in the proposed algorithm, and after the compensation of Doppler frequency, MUSIC (multiple signal classification) algorithm is applied to estimate the DOA. …”
    Get full text
    Article
  17. 2717
  18. 2718

    Industrial Printing Image Defect Detection Using Multi-Edge Feature Fusion Algorithm by Bangchao Liu, Youping Chen, Jingming Xie, Bing Chen

    Published 2021-01-01
    “…In this paper, we propose a new multi-edge feature fusion algorithm which is effective in solving this problem. …”
    Get full text
    Article
  19. 2719
  20. 2720

    Coordinate transformation based coefficients estimation algorithm for digital predistortion of RF power amplifiers by GHao HUAN, Hua QIAN, Sai-jie YAO, Xiu-mei YANG

    Published 2015-01-01
    “…Based on the low-IF digital predistortion (DPD) architecture,a coordinate transformation based low-complex coefficients estimation algorithm is proposed to reduce the hardware implementation cost and numerical calculation complexity significantly.The proposed algorithm transforms the complex multiplication of the conventional DPD coefficients estimation method to amplitude multiplication and phase addition in polar coordinates.To complete the same calculation,times of multiplications and accumulations are reduced by 75% and 50%.The algorithm is derived from the general Volterra pass-band nonlinear model,and proves the equivalency of baseband predistortion and IF predistortion.The proposed low-IF architecture and the coefficients estimation algorithm are verified by the measurement results on a practical radio frequency power amplifier.…”
    Get full text
    Article