Showing 941 - 960 results of 18,224 for search '"algorithm"', query time: 0.09s Refine Results
  1. 941

    An Efficient Feature Subset Selection Algorithm for Classification of Multidimensional Dataset by Senthilkumar Devaraj, S. Paulraj

    Published 2015-01-01
    “…In this paper, an efficient feature selection algorithm is proposed for the classification of MDD. …”
    Get full text
    Article
  2. 942

    Timing synchronization algorithm based on clock skew estimation for WSN by Yi SUN, Lu-kun ZENG, Xin WU, Jun LU, Yue SUN

    Published 2015-09-01
    “…In order to solve the problem of poor synchronization stability on classical synchronization algorithm,high overhead on joint clock offset and skew correction synchronization algorithm in wireless sensor network,a timing syn-chronization algorithm based on clock skew estimation for WSN (CSMS) was proposed.The algorithm adopted low-overhead clock offset and skew estimation method to improve the synchronization precision and stability of paired node.At the same time of guaranteeing the stability and accuracy,it realized synchronization with the root node and the neighbors,and optimized synchronization overhead by using the combination of hierarchical network structure and radio listening.The experimental results show that the CSMS algorithm balances energy consumption,accuracy and stability of synchronization.…”
    Get full text
    Article
  3. 943

    Research on load-balanced construction algorithm of logical carrying network by Hao-xue WANG, Ming JIANG, Ji FU

    Published 2012-09-01
    “…To improve the extensibility of network service,constructing algorithm of logical carrying network was pro-posed by mapping the demands of network service into substrate network.To solve the problem of construction efficiency,on-demand carrying strategy was introduced to provide different resources to meet different service requirements.Based on available resource and current link load,an improved multi-commodity flow model was proposed to compute the re-source allocation.Simulation results indicate this al ithm can improve network service capability from construction success rate and average construction profit.…”
    Get full text
    Article
  4. 944
  5. 945

    Time shift TDT timing acquisition algorithm for PPM-UWB by XIANG Xin1, TIAN Bin1, YI Ke-chu1, LIU Lei1

    Published 2005-01-01
    “…It was proved that the TDT (timing with a dirty template) blind timing algorithm was only suitable for PAM-UWB systems rather than PPM-UWB systems.Furthermore,a TS-TDT (time-shift-TDT) blind timing synchronization algorithm was presented for PPM-UWB,which got synchronizing information from calculating the delay cross-correlation values by means of two correlation branches.Theoretical analysis and simulation results demonstrate that the implementation of the algorithm is of low complexity and flexible in precision control.…”
    Get full text
    Article
  6. 946

    Interior design assistant algorithm based on indoor scene analysis by Lu Zhang

    Published 2025-12-01
    “…The scene analysis algorithm in interior design is widely used in computer vision. …”
    Get full text
    Article
  7. 947

    Numerical Algorithms for the Fractional Diffusion-Wave Equation with Reaction Term by Hengfei Ding, Changpin Li

    Published 2013-01-01
    “…Two numerical algorithms are derived to compute the fractional diffusion-wave equation with a reaction term. …”
    Get full text
    Article
  8. 948

    Privacy preserving algorithm based on trajectory location and shape similarity by Chao WANG, Jing YANG, Jian-pei ZHANG

    Published 2015-02-01
    “…In order to reduce the privacy disclosure risks when trajectory data is released,a variety of trajectories anonymity methods were proposed.However,while calculating similarity of trajectories,the existing methods ignore the impact that the shape factor of trajectory has on similarity of trajectories,and therefore the produced set of trajectory anonymity has a lower utility.To solve this problem,a trajectory similarity measure model was presented,considered not only the time and space elements of the trajectory,but also the shape factor of trajectory.It is computable in polynomial time,and can calculate the distance of trajectories not defined over the same time span.On this basis,a greedy clustering and data mask based trajectory anonymization algorithm was presented,which maximized the trajectory similarity in the clusters,and formed data "mask" which is formed by fully accurate true original locations information to meet the trajectory k-anonymity.Finally,experimental results on a synthetic data set and a real-life data set were presented; our method offer better utility and cost less time than comparable previous proposals in the literature.…”
    Get full text
    Article
  9. 949

    Research on the Optimization of Agricultural Industry Structure Based on Genetic Algorithm by Lingxiao Liu

    Published 2022-01-01
    “…By examining the water balance of submerged irrigation, an optimization model of the agricultural industry structure was developed using genetic algorithms, and the model was solved using an accelerated genetic algorithm. …”
    Get full text
    Article
  10. 950

    Detection and Estimation of Damage in Structures Using Imperialist Competitive Algorithm by A. Bagheri, H.R. Razeghi, G. Ghodrati Amiri

    Published 2012-01-01
    “…This paper presents a method for detection and estimation of structural damage on the basis of modal parameters of a damaged structure using imperialist competitive algorithm. The imperialist competitive algorithm was developed over the last few years in an attempt to overcome inherent limitations of traditional optimize method. …”
    Get full text
    Article
  11. 951

    METHOD AND ALGORITHMS OF CALCULATION OF PARAMETERS OF RELIABILITY IN ACCORDANCE WITH MULTIVARIATE DATA by E. M. Farhadzadeh, A. Z. Muradaliyev, T. K. Rafiyeva, S. A. Abdullayeva

    Published 2017-01-01
    “…The lack of specialized software systems, the knowledge-intensiveness of algorithms of calculation needed for the solution of operational tasks determine the predominant application of the intuitive approach. …”
    Get full text
    Article
  12. 952

    A New Adaptive Hungarian Mating Scheme in Genetic Algorithms by Chanju Jung, Yong-Hyuk Kim, Yourim Yoon, Byung-Ro Moon

    Published 2016-01-01
    “…In genetic algorithms, selection or mating scheme is one of the important operations. …”
    Get full text
    Article
  13. 953

    Fair Resource Allocation Algorithm for OFDMA System with Imperfect CSI by Yaohui Wu, Youming Li, Liping Jin, Pengfei Shao

    Published 2015-02-01
    “…Existing resource allocation algorithms can't balance system capacity and fairness well when the channel state information is imperfect. …”
    Get full text
    Article
  14. 954

    Evolving multicast tree based artificial fish swarm algorithm by Xuan MA, Qing LIU

    Published 2012-09-01
    Subjects: “…artificial fish swarm algorithm…”
    Get full text
    Article
  15. 955

    Distributed Asynchronous Fusion Algorithm for Sensor Networks with Packet Losses by Tianpeng Chu, Guoqing Qi, Yinya Li, Andong Sheng

    Published 2014-01-01
    “…A distributed asynchronous fusion algorithm is proposed via the covariance intersection method. …”
    Get full text
    Article
  16. 956

    Multi-path backup optimized power algorithm for wideband networks by XU Yu-bin, TAN Wei

    Published 2005-01-01
    “…A multi-path backup optimized power algorithm was presented for wideband network, which exerted multi-path backup routing and reduced the total transmission power. …”
    Get full text
    Article
  17. 957

    Self-Adaptive K-Means Based on a Covering Algorithm by Yiwen Zhang, Yuanyuan Zhou, Xing Guo, Jintao Wu, Qiang He, Xiao Liu, Yun Yang

    Published 2018-01-01
    “…The K-means algorithm is one of the ten classic algorithms in the area of data mining and has been studied by researchers in numerous fields for a long time. …”
    Get full text
    Article
  18. 958

    SVR Prediction Algorithm for Crack Propagation of Aviation Aluminum Alloy by Jincai Chang, Zhihang Wang, Qingyu Zhu, Zhao Wang

    Published 2020-01-01
    “…In this paper, support vector regression (SVR) was used to fit the crack data, and the parameters of SVR are optimized by the grid search algorithm at the same time. And then the model of SVR to predict the crack length was established. …”
    Get full text
    Article
  19. 959

    Fast intra prediction algorithm applied in QS enhancement layer by WANG Da-yong1 SHU Jian2

    Published 2011-01-01
    “…A fast intra coding algorithm was proposed which was suitable for enhancement layer in quality salability.Base on the coding structure of quality scalability,our algorithm used the relationships between layers,the relationships between rate distortion and modes,and temporal and spatial relationships to predict the modes and coding order to be ap-plied,with an early termination determined by the relationships between quantization parameters and modes,residual co-efficients,and rate distortion.The experimental results show that the encoding speed of the proposed algorithm can be improved by 70%,with negligible coding loss.…”
    Get full text
    Article
  20. 960