Showing 701 - 720 results of 14,091 for search '"algorithm"', query time: 0.09s Refine Results
  1. 701
  2. 702

    An Adaptive Evolutionary Algorithm for Traveling Salesman Problem with Precedence Constraints by Jinmo Sung, Bongju Jeong

    Published 2014-01-01
    “…We propose a new evolutionary algorithm to efficiently obtain good solutions by improving the search process. …”
    Get full text
    Article
  3. 703

    Improved KNN Algorithm Based on Preprocessing of Center in Smart Cities by Haiyan Wang, Peidi Xu, Jinghua Zhao

    Published 2021-01-01
    “…The KNN algorithm is one of the most famous algorithms in machine learning and data mining. …”
    Get full text
    Article
  4. 704
  5. 705

    Minimum Cost Flow Model and Algorithm of Virtual Network Embedding by Xiaohua Chen, Chunzhi Li, Liangyu Chen, Zhenbing Zeng

    Published 2014-06-01
    “…The dynamic process of network virtualization was studied,and the inversion phenomenon that the revenue did not rely on embedding cost was discovered.Then minimum cost flow model and algorithms of virtual network embedding which fit for creating virtual network online on the large-scale substrate network were proposed.Simulation results reveal that the proposed algorithms can improve virtual network acceptance ratio and system revenue,and significantly reduce the time complexity of multi-path virtual link embedding algorithm which ensures real-time performance of online virtual network embedding.The inversion phenomenon also occurs in the simulation.…”
    Get full text
    Article
  6. 706

    Energy optimization of ant colony algorithm in wireless sensor network by Peng Li, Huqing Nie, Lingfeng Qiu, Ruchuan Wang

    Published 2017-04-01
    “…An energy consumption optimization algorithm based on ant colony algorithm is proposed for wireless sensor network. …”
    Get full text
    Article
  7. 707

    Blunt trauma of the scrotum and testicle: algorithm of choice of treatment tactics by S. K. Yarovoy, R. A. Khromov

    Published 2018-12-01
    “…The study is a comparison of the results of prospective (according to the algorithm) and retrospective fragments, including a total of 459 patients (414 retrospectively, 45 prospectively). …”
    Get full text
    Article
  8. 708

    A Hybrid Maximum Power Point Tracking Approach for Photovoltaic Systems under Partial Shading Conditions Using a Modified Genetic Algorithm and the Firefly Algorithm by Yu-Pei Huang, Xiang Chen, Cheng-En Ye

    Published 2018-01-01
    “…The proposed algorithm integrates a genetic algorithm (GA) and the firefly algorithm (FA) and further improves its calculation process via a differential evolution (DE) algorithm. …”
    Get full text
    Article
  9. 709
  10. 710
  11. 711
  12. 712
  13. 713
  14. 714
  15. 715

    Data recommendation algorithm of network security event based on knowledge graph by Xianwei ZHU, Wei LIU, Zihao LIU, Zeyu GU

    Published 2023-12-01
    “…To address the difficulty faced by network security operation and maintenance personnel in timely and accurate identification of required data during network security event analysis, a recommendation algorithm based on a knowledge graph for network security events was proposed.The algorithm utilized the network threat framework ATT&CK to construct an ontology model and establish a network threat knowledge graph based on this model.It extracted relevant security data such as attack techniques, vulnerabilities, and defense measures into interconnected security knowledge within the knowledge graph.Entity data was extracted based on the knowledge graph, and entity vectors were obtained using the TransH algorithm.These entity vectors were then used to calculate data similarity between entities in network threat data.Disposal behaviors were extracted from literature on network security event handling and treated as network security data entities.A disposal behavior matrix was constructed, and the behavior matrix enabled the vector representation of network threat data.The similarity of network threat data entities was calculated based on disposal behaviors.Finally, the similarity between network threat data and threat data under network security event handling behavior was fused to generate a data recommendation list for network security events, which established correlations between network threat domains based on user behavior.Experimental results demonstrate that the algorithm performs optimally when the fusion weight α=7 and the recommended data volume K=5, achieving a recall rate of 62.37% and an accuracy rate of 68.23%.By incorporating disposition behavior similarity in addition to data similarity, the algorithm better represents factual disposition behavior.Compared to other algorithms, this algorithm exhibits significant advantages in recall rate and accuracy, particularly when the recommended data volume is less than 10.…”
    Get full text
    Article
  16. 716

    A Mathematical Modeling and an Optimization Algorithm for Marine Ship Route Planning by Lili Huang

    Published 2023-01-01
    “…Based on the mathematical model, the ant colony algorithm is used to optimize the initial route of the ship. …”
    Get full text
    Article
  17. 717

    Spectrum allocation algorithm of elastic optical networks in power distribution system by Biyou ZHAO, Shanhui ZHANG, Jinshuai WANG

    Published 2019-02-01
    “…In order to effectively improve the resource utilization of information transmission network in reality,the spectrum allocation problem in flexible optical network in smart grid environment was analyzed,and a spectrum allocation method was proposed.Combining the advantages of genetic algorithm and ant colony algorithm,the genetic algorithm was used to generate the initial solution.Finally,the optimal solution of the spectrum allocation problem was obtained by the characteristics of positive feedback of ant colony algorithm and efficient convergence.The performance of the optimization algorithm mentioned was verified by software simulation.The proposed algorithm can optimize the use of idle spectrum resources to meet the needs of mass data transmission in distribution network,and improve the reliability of distribution network communication system,which is of great significance to the safe and reliable operation of smart grid.…”
    Get full text
    Article
  18. 718

    Application of Evolutionary Algorithms and Statistical Analysis in the Numerical Optimization of an Axial Compressor by Alberto Clarich, Giovanni Mosetti, Valentino Pediroda, Carlo Poloni

    Published 2005-01-01
    “…This analysis has helped us to choose the most appropriate variables and their ranges in order to implement the optimization algorithm more efficiently and rapidly. For the simulation of the fluid flow through the machine, we have used a cluster of 12 processors.…”
    Get full text
    Article
  19. 719

    Dynamic frame length selection algorithm for slotted access in LTE-Advanced by Hongguang DUAN, Songpin LU, Lifei WANG, Sheng WANG, Tonghui LI, Dan TAN

    Published 2017-03-01
    “…Through analyzing the random access model of slotted access based channel access control protocol (SCACP) in LTE-Advanced system, an optimization algorithm for access frame length selection based on slotted access was proposed. …”
    Get full text
    Article
  20. 720

    Improved F-RRT∗ Algorithm for Flight-Path Optimization in Hazardous Weather by Xue Qiu, Yaohui Li, Rui Jin, Zhi Zhao, Jiajun Li, Donglin Lu, Linhui Ma

    Published 2022-01-01
    “…Then, under the grid environment model, the range of influence, size, and distribution characteristics of the flight-restricted area was examined, and the path optimization model was created according to constraints related to the path distance, corner size, and number of turning points. An improved F-RRT∗ algorithm was developed to solve the model. The algorithm can overcome the problems of traditional path planning algorithms, such as strong randomness, poor guidance, slow convergence speed, unsmooth paths, and poor tracing smoothness. …”
    Get full text
    Article