-
681
Differential evolution algorithm for identification of structural damage in steel beams
Published 2020-04-01Get full text
Article -
682
An Innovative Linear Wireless Sensor Network Reliability Evaluation Algorithm
Published 2025-01-01“…Compared to Multi-Valued Decision Diagram (MDD)-based evaluation algorithms, this method is suitable for large-scale LWSNs and offers lower time complexity.…”
Get full text
Article -
683
Comparative analysis of elementwise reception-algorithms in intersymbol interference channels
Published 2024-12-01“…Optimal and suboptimal sorting-algorithms as well as algorithms on linear equalizer based were consider. …”
Get full text
Article -
684
Optimization of Backpropagation Neural Network under the Adaptive Genetic Algorithm
Published 2021-01-01“…This study is to explore the optimization of the adaptive genetic algorithm (AGA) in the backpropagation (BP) neural network (BPNN), so as to expand the application of the BPNN model in nonlinear issues. …”
Get full text
Article -
685
MOANA: Multi-objective ant nesting algorithm for optimization problems
Published 2025-01-01“…This paper presents the Multi-Objective Ant Nesting Algorithm (MOANA), a novel extension of the Ant Nesting Algorithm (ANA), specifically designed to address multi-objective optimization problems (MOPs). …”
Get full text
Article -
686
Joint resource allocation algorithm for clustering cognitive Internet of things
Published 2019-03-01“…Cognitive Internet of things (CIoT) can improve spectrum utilization effectively through spectrum sensing and sharing,but spectrum sensing may generate overhead.Clustering CIoT was proposed to decrease sensing overhead,whose transmission rate could be improved through joint resource allocation.The network model and frame structure of the CIoT were proposed firstly,and the average transmission rate and interference power of the CIoT were deduced.Then,an optimization model was built to maximize the transmission rate through jointly optimizing the sensing time,sensing cluster head and transmission power,and a joint optimization algorithm was given to solve the optimization problem.Finally,the node clustering and cluster head selection algorithm of the CIoT was presented.The simulations show that the maximal transmission rate through joint resource allocation can be achieved and the transmission performance compared with the traditional schemes can be improved by the proposed scheme.…”
Get full text
Article -
687
Special Issue “Algorithms for Feature Selection (2nd Edition)”
Published 2025-01-01“…Algorithms…”
Get full text
Article -
688
Multi-view graph neural network for fraud detection algorithm
Published 2022-11-01“…Aiming at the problem that in the field of fraud detection, imbalance labels and lack of necessary connections between fraud nodes, resulting in fraud detection tasks not conforming to the hypothesis of homogeneity of graph neural networks, multi-view graph neural network for fraud detection (MGFD) algorithm was proposed.First, A structure-independent encoder was used to encode the attributes of nodes in the network to learn the difference between the fraud node and the normal node.The hierarchical attention mechanism was designed to integrate the multi-view information in the network, and made full use of the interaction information between different perspectives in the network to model the nodes on the basis of learning differences.Then, based on the data imbalance ratio sampled subgraph, the sample was constructed according to the connection characteristics of fraud nodes for classification, which solved the problem of imbalance sample labels.Finally, the prediction label was used to identify whether a node is fraudulent.Experiments on real-world datasets have shown that the MGFD algorithm outperforms the comparison method in the field of graph-based fraud detection.…”
Get full text
Article -
689
Design of DBA algorithm in EPON upstream channel in support of SLA
Published 2005-01-01“…Based on the SLA (service level agreement) in access network, the inherent deficiencies of two classical DBA algorithms: IPACT and Cyclic DBA in EPON to support multi-user types were analyzed. …”
Get full text
Article -
690
Bearing Defect Classification Algorithm Based on Autoencoder Neural Network
Published 2020-01-01“…Comparative experiments show that the neural network can effectively complete feature selection and substantially improve classification accuracy while avoiding the laborious algorithm of the conventional method.…”
Get full text
Article -
691
SURVEY OF MACHINE LEARNING APPLICATIONS IN MEDICAL IMAGING. ALGORITHMS AND TECHNOLOGIES
Published 2023-05-01“…A literature survey was conducted attempting to report usage of Machine Learning (ML) algorithms in processing and interpretation of medical images (X-ray, CT scan, MRI, DEXA, etc.) for the purpose of diagnosing orthopedic disorders. …”
Get full text
Article -
692
Chaotic Puma Optimizer Algorithm for controlling wheeled mobile robots
Published 2025-03-01Subjects: Get full text
Article -
693
WLAN indoor positioning algorithm based on skewness-kurtosis testing
Published 2012-05-01“…Focused on the issues that large positioning errors produced by the inconsistency of received signal strength (RSS)sample population distributions under indoor wireless local area network (WLAN),an indoor positioning algorithm based on skewness-kurtosis testing was proposed.By using the testing method of skewness and kurtosis,whether the RSS samples come from the normal population or not was checked.The distribution functions of the samples accepting null hypothesis were approximated with normal distribution,and the probability density functions of the samples refusing null hypothesis were estimated by kernel function.Experimental results show that the proposed algorithm leads to a 15 percent improvement over the previous methods.Moreover,the proposed algorithm can significantly reduce the workload of the off-line phase at the same positioning accuracy.…”
Get full text
Article -
694
Key distribution and recovery algorithm based on Shamir's secret sharing
Published 2015-03-01“…The case of secret sharing problem was discussed based on Shamir's secret sharing scheme and reconstructs the secret by introducing a linear combination of shadows—Lagrange factor. Then, the improved algorithm of key distribu-tion and recovery was proposed and extended to a multi-secret sharing scheme. …”
Get full text
Article -
695
An Enhanced -Means Clustering Algorithm for Pattern Discovery in Healthcare Data
Published 2015-06-01“…Mainly, we study k -means clustering algorithms on large datasets and present an enhancement to k -means clustering, which requires k or a lesser number of passes to a dataset. …”
Get full text
Article -
696
Improved Epidemic algorithm based on trust mechanism in opportunistic networks
Published 2017-08-01Subjects: Get full text
Article -
697
Research on simple query algorithm during mobile terminal disconnection
Published 2014-03-01Subjects: Get full text
Article -
698
Reconstruction algorithm for block compressed sensing based on variation model
Published 2016-01-01“…The algorithms for block compressed sensing based on total variation and mixed variation (abbreviated as BCS-TV and BCS-MV) models were proposed to improve the performance of current reconstruction algorithms for the block-based compressed sensing. …”
Get full text
Article -
699
Determination of the FIFO-stack size for the algorithm of the image region growing
Published 2019-12-01“…The aim of the work is to derive an expression that allows determining the size of the FIFO-stack for storing the coordinates of adjacent pixels depending on the image size for the segmentation algorithm based on region growing. The FIFO stack, organized on the principle of a ring multi-bit shift register, is considered. …”
Get full text
Article -
700
Learning attribute network algorithm based on high-order similarity
Published 2020-12-01Get full text
Article