Showing 681 - 700 results of 18,268 for search '"algorithm"', query time: 0.10s Refine Results
  1. 681
  2. 682

    An Innovative Linear Wireless Sensor Network Reliability Evaluation Algorithm by Tao Ma, Huidong Guo, Xin Li

    Published 2025-01-01
    “…Compared to Multi-Valued Decision Diagram (MDD)-based evaluation algorithms, this method is suitable for large-scale LWSNs and offers lower time complexity.…”
    Get full text
    Article
  3. 683

    Comparative analysis of elementwise reception-algorithms in intersymbol interference channels by Eugene O. Khabarov, Vladimir D. Martyshenko

    Published 2024-12-01
    “…Optimal and suboptimal sorting-algorithms as well as algorithms on linear equalizer based were consider. …”
    Get full text
    Article
  4. 684

    Optimization of Backpropagation Neural Network under the Adaptive Genetic Algorithm by Junxi Zhang, Shiru Qu

    Published 2021-01-01
    “…This study is to explore the optimization of the adaptive genetic algorithm (AGA) in the backpropagation (BP) neural network (BPNN), so as to expand the application of the BPNN model in nonlinear issues. …”
    Get full text
    Article
  5. 685

    MOANA: Multi-objective ant nesting algorithm for optimization problems by Noor A. Rashed, Yossra H. Ali, Tarik A. Rashid, Seyedali Mirjalili

    Published 2025-01-01
    “…This paper presents the Multi-Objective Ant Nesting Algorithm (MOANA), a novel extension of the Ant Nesting Algorithm (ANA), specifically designed to address multi-objective optimization problems (MOPs). …”
    Get full text
    Article
  6. 686

    Joint resource allocation algorithm for clustering cognitive Internet of things by Xin LIU

    Published 2019-03-01
    “…Cognitive Internet of things (CIoT) can improve spectrum utilization effectively through spectrum sensing and sharing,but spectrum sensing may generate overhead.Clustering CIoT was proposed to decrease sensing overhead,whose transmission rate could be improved through joint resource allocation.The network model and frame structure of the CIoT were proposed firstly,and the average transmission rate and interference power of the CIoT were deduced.Then,an optimization model was built to maximize the transmission rate through jointly optimizing the sensing time,sensing cluster head and transmission power,and a joint optimization algorithm was given to solve the optimization problem.Finally,the node clustering and cluster head selection algorithm of the CIoT was presented.The simulations show that the maximal transmission rate through joint resource allocation can be achieved and the transmission performance compared with the traditional schemes can be improved by the proposed scheme.…”
    Get full text
    Article
  7. 687
  8. 688

    Multi-view graph neural network for fraud detection algorithm by Zhuo CHEN, Miao ZHU, Junwei DU

    Published 2022-11-01
    “…Aiming at the problem that in the field of fraud detection, imbalance labels and lack of necessary connections between fraud nodes, resulting in fraud detection tasks not conforming to the hypothesis of homogeneity of graph neural networks, multi-view graph neural network for fraud detection (MGFD) algorithm was proposed.First, A structure-independent encoder was used to encode the attributes of nodes in the network to learn the difference between the fraud node and the normal node.The hierarchical attention mechanism was designed to integrate the multi-view information in the network, and made full use of the interaction information between different perspectives in the network to model the nodes on the basis of learning differences.Then, based on the data imbalance ratio sampled subgraph, the sample was constructed according to the connection characteristics of fraud nodes for classification, which solved the problem of imbalance sample labels.Finally, the prediction label was used to identify whether a node is fraudulent.Experiments on real-world datasets have shown that the MGFD algorithm outperforms the comparison method in the field of graph-based fraud detection.…”
    Get full text
    Article
  9. 689

    Design of DBA algorithm in EPON upstream channel in support of SLA by WANG Dong, QIU Kun, WANG Li-cun

    Published 2005-01-01
    “…Based on the SLA (service level agreement) in access network, the inherent deficiencies of two classical DBA algorithms: IPACT and Cyclic DBA in EPON to support multi-user types were analyzed. …”
    Get full text
    Article
  10. 690

    Bearing Defect Classification Algorithm Based on Autoencoder Neural Network by Manhuai Lu, Yuanxiang Mou

    Published 2020-01-01
    “…Comparative experiments show that the neural network can effectively complete feature selection and substantially improve classification accuracy while avoiding the laborious algorithm of the conventional method.…”
    Get full text
    Article
  11. 691

    SURVEY OF MACHINE LEARNING APPLICATIONS IN MEDICAL IMAGING. ALGORITHMS AND TECHNOLOGIES by Marius Eremia Vlaicu POPA, Mihai CRUCERU, Bogdan DIACONU

    Published 2023-05-01
    “…A literature survey was conducted attempting to report usage of Machine Learning (ML) algorithms in processing and interpretation of medical images (X-ray, CT scan, MRI, DEXA, etc.) for the purpose of diagnosing orthopedic disorders. …”
    Get full text
    Article
  12. 692
  13. 693

    WLAN indoor positioning algorithm based on skewness-kurtosis testing by Zhen-long SONG, Gang-yi JIANG, Chao HUANG, Mei YU, Jia-le ZHANG

    Published 2012-05-01
    “…Focused on the issues that large positioning errors produced by the inconsistency of received signal strength (RSS)sample population distributions under indoor wireless local area network (WLAN),an indoor positioning algorithm based on skewness-kurtosis testing was proposed.By using the testing method of skewness and kurtosis,whether the RSS samples come from the normal population or not was checked.The distribution functions of the samples accepting null hypothesis were approximated with normal distribution,and the probability density functions of the samples refusing null hypothesis were estimated by kernel function.Experimental results show that the proposed algorithm leads to a 15 percent improvement over the previous methods.Moreover,the proposed algorithm can significantly reduce the workload of the off-line phase at the same positioning accuracy.…”
    Get full text
    Article
  14. 694

    Key distribution and recovery algorithm based on Shamir's secret sharing by Hui-gui RONG, Jin-xia MO, Bing-guo CHANG, Guang SUN, Fei LONG

    Published 2015-03-01
    “…The case of secret sharing problem was discussed based on Shamir's secret sharing scheme and reconstructs the secret by introducing a linear combination of shadows—Lagrange factor. Then, the improved algorithm of key distribu-tion and recovery was proposed and extended to a multi-secret sharing scheme. …”
    Get full text
    Article
  15. 695

    An Enhanced -Means Clustering Algorithm for Pattern Discovery in Healthcare Data by Ramzi A. Haraty, Mohamad Dimishkieh, Mehedi Masud

    Published 2015-06-01
    “…Mainly, we study k -means clustering algorithms on large datasets and present an enhancement to k -means clustering, which requires k or a lesser number of passes to a dataset. …”
    Get full text
    Article
  16. 696
  17. 697
  18. 698

    Reconstruction algorithm for block compressed sensing based on variation model by Jian CHEN, xiong SUKai, zhi YANGXiu, kui ZHENGMing, qun LINLi

    Published 2016-01-01
    “…The algorithms for block compressed sensing based on total variation and mixed variation (abbreviated as BCS-TV and BCS-MV) models were proposed to improve the performance of current reconstruction algorithms for the block-based compressed sensing. …”
    Get full text
    Article
  19. 699

    Determination of the FIFO-stack size for the algorithm of the image region growing by V. Yu. Tsviatkou

    Published 2019-12-01
    “…The aim of the work is to derive an expression that allows determining the size of the FIFO-stack for storing the coordinates of adjacent pixels depending on the image size for the segmentation algorithm based on region growing. The FIFO stack, organized on the principle of a ring multi-bit shift register, is considered. …”
    Get full text
    Article
  20. 700