Suggested Topics within your search.
Suggested Topics within your search.
-
501
Weibo spammers’ identification algorithm based on Bayesian model
Published 2017-01-01Subjects: Get full text
Article -
502
Generalized Cycle Benchmarking Algorithm for Characterizing Midcircuit Measurements
Published 2025-01-01“…Finally, we conduct numerical simulations to illustrate the practical applicability of the algorithm. Similar to other CB-type algorithms, we expect the algorithm to provide a useful toolkit that is of experimental interest.…”
Get full text
Article -
503
Naive Bayes-Guided Bat Algorithm for Feature Selection
Published 2013-01-01“…The performance of the proposed feature selection algorithm was investigated using twelve benchmark datasets from different domains and was compared to three other well-known feature selection algorithms. …”
Get full text
Article -
504
A Study on the Security Algorithm for Contexts in Smart Cities
Published 2014-06-01“…Each customised service usually keeps tailored security policy and algorithm. Conventionally, every service including different servers, network, and users employs the same security algorithm so that sensitive information could be traced and revealed by using counter tracing method. …”
Get full text
Article -
505
Correlation probability indistinguishable location privacy protection algorithm
Published 2017-08-01Get full text
Article -
506
Enhanced Tunicate Swarm Algorithm for Big Data Optimization
Published 2023-04-01“…One of them is metaheuristic algorithms. Meta-heuristic methods, which have been used by very few researchers yet, have become increasingly common. …”
Get full text
Article -
507
Lightweight Barcode Positioning Algorithm Based on YOLO Model
Published 2024-01-01“…An improved YOLO-MCG barcode localization algorithm was proposed to address the problems of interference, inefficiency, and poor real-time performance encountered by traditional barcode detection methods in complex backgrounds and field environments. …”
Get full text
Article -
508
A New Iterative Algorithm for Magnetic Motion Tracking
Published 2024-10-01Subjects: Get full text
Article -
509
Efficient traffic information dissemination algorithm based on ranking
Published 2009-01-01Subjects: Get full text
Article -
510
An Improved Physarum polycephalum Algorithm for the Shortest Path Problem
Published 2014-01-01“…We also compare our algorithm with other existing algorithms, including the ant colony optimization algorithm and Dijkstra algorithm.…”
Get full text
Article -
511
Genetic Algorithm for Biobjective Urban Transit Routing Problem
Published 2013-01-01“…The proposed algorithm employs an adding-node procedure which helps in converting an infeasible solution to a feasible solution. …”
Get full text
Article -
512
Online Boosting tracking algorithm combined with occlusion sensing
Published 2016-09-01“…Online Boosting tracking algorithm combined with occlusion sensing was presented.In this method,occlusion sensor was introduced to check the tracking results,and classifier updating strategy was adjusted depending on the occlusion checking results.By this way,the feature pool of the classifier can be kept pure,which will improve the tracking robustness under occlusion.Experimental results show that compared with traditional Boosting tracking algorithm,improved algorithm can solve the problem of occlusion very well.…”
Get full text
Article -
513
Hadoop bottleneck detection algorithm based on information gain
Published 2016-07-01“…Hadoop has become a major platform for big data storage and large data mining nowadays.Although Hadoop platform achieves high performance parallel computing through a distributed cluster of machines,the bottlenecks will inevitably appear on a machine when cluster load increases,because the cluster is composed of inexpensive host.Aiming at this problem,a bottleneck detection algorithms based on information gain was proposed.The algorithm detected cluster's bottlenecks resource by computing the information gain of each resource.The experiments show that the bottleneck detection algorithm is feasible.…”
Get full text
Article -
514
Nonexposure Accurate Location K-Anonymity Algorithm in LBS
Published 2014-01-01“…Experimental results show that our algorithms are more secure than the existent cloaking algorithms, need not have all the users reporting their locations all the time, and can generate smaller ASR.…”
Get full text
Article -
515
Comparison of Two Algorithms for Multiline Bus Dynamic Dispatching
Published 2022-01-01“…By comparing the experimental results of genetic algorithm (GA) and hyperheuristic algorithm in solving different scenarios, the results show that in smooth, increasing, decreasing, and multiconvex passenger flow mode, the performance of the hyperheuristic algorithm is higher than that of GA. …”
Get full text
Article -
516
Algorithm to design UWB pulse based on the peak frequency
Published 2005-01-01“…Not like other algorithms that only work out one pulse, the proposed algorithm can lead to the design of a myriad of pulses that are compliant, namely, it can figure out all α which satisfy the regulation and give out the range of α.…”
Get full text
Article -
517
Research on a combining algorithm for harassing calls to identify
Published 2017-07-01Subjects: Get full text
Article -
518
ALBERTA: ALgorithm-Based Error Resilience in Transformer Architectures
Published 2025-01-01“…Ensuring the correct execution of these models in GPUs is critical, despite the potential for transient hardware errors. We propose a novel algorithm-based resilience framework called ALBERTA that allows us to perform end-to-end resilience analysis and protection of transformer-based architectures. …”
Get full text
Article -
519
Power services scheduling algorithm based on quantum communication
Published 2019-11-01“…Quantum communication could effectively improve the transmission’s reliability and security of power system services.However,limited by the generating rate of quantum key,it was difficult to meet the encryption requirements of important services.Therefore,a queue scheduling algorithm was required to legitimately schedule the power system services which need to be encrypted in quantum communication.An improved weighted fair queuing (weighted fair queuing,WFQ) algorithm LD-WFQ was proposed.By estimating the expected delay of the data packets to be encrypted,sending the packets that would soon be timeout,the proposed algorithm effectively reduced the timeout ratio of the packets and improved the effective utilization of quantum keys,while maintaining the timeout ratio of the packets in high priority queue at a low level.Compared with the WFQ algorithm,the simulation result proves the superiority of LD-WFQ algorithm.…”
Get full text
Article -
520
GMM-based localization algorithm under NLOS conditions
Published 2014-01-01Subjects: Get full text
Article