-
941
An Efficient Feature Subset Selection Algorithm for Classification of Multidimensional Dataset
Published 2015-01-01“…In this paper, an efficient feature selection algorithm is proposed for the classification of MDD. …”
Get full text
Article -
942
Timing synchronization algorithm based on clock skew estimation for WSN
Published 2015-09-01“…In order to solve the problem of poor synchronization stability on classical synchronization algorithm,high overhead on joint clock offset and skew correction synchronization algorithm in wireless sensor network,a timing syn-chronization algorithm based on clock skew estimation for WSN (CSMS) was proposed.The algorithm adopted low-overhead clock offset and skew estimation method to improve the synchronization precision and stability of paired node.At the same time of guaranteeing the stability and accuracy,it realized synchronization with the root node and the neighbors,and optimized synchronization overhead by using the combination of hierarchical network structure and radio listening.The experimental results show that the CSMS algorithm balances energy consumption,accuracy and stability of synchronization.…”
Get full text
Article -
943
Research on load-balanced construction algorithm of logical carrying network
Published 2012-09-01“…To improve the extensibility of network service,constructing algorithm of logical carrying network was pro-posed by mapping the demands of network service into substrate network.To solve the problem of construction efficiency,on-demand carrying strategy was introduced to provide different resources to meet different service requirements.Based on available resource and current link load,an improved multi-commodity flow model was proposed to compute the re-source allocation.Simulation results indicate this al ithm can improve network service capability from construction success rate and average construction profit.…”
Get full text
Article -
944
Partial blind signature scheme based on SM9 algorithm
Published 2021-08-01Subjects: “…SM9 algorithm…”
Get full text
Article -
945
Time shift TDT timing acquisition algorithm for PPM-UWB
Published 2005-01-01“…It was proved that the TDT (timing with a dirty template) blind timing algorithm was only suitable for PAM-UWB systems rather than PPM-UWB systems.Furthermore,a TS-TDT (time-shift-TDT) blind timing synchronization algorithm was presented for PPM-UWB,which got synchronizing information from calculating the delay cross-correlation values by means of two correlation branches.Theoretical analysis and simulation results demonstrate that the implementation of the algorithm is of low complexity and flexible in precision control.…”
Get full text
Article -
946
Interior design assistant algorithm based on indoor scene analysis
Published 2025-12-01“…The scene analysis algorithm in interior design is widely used in computer vision. …”
Get full text
Article -
947
Numerical Algorithms for the Fractional Diffusion-Wave Equation with Reaction Term
Published 2013-01-01“…Two numerical algorithms are derived to compute the fractional diffusion-wave equation with a reaction term. …”
Get full text
Article -
948
Privacy preserving algorithm based on trajectory location and shape similarity
Published 2015-02-01“…In order to reduce the privacy disclosure risks when trajectory data is released,a variety of trajectories anonymity methods were proposed.However,while calculating similarity of trajectories,the existing methods ignore the impact that the shape factor of trajectory has on similarity of trajectories,and therefore the produced set of trajectory anonymity has a lower utility.To solve this problem,a trajectory similarity measure model was presented,considered not only the time and space elements of the trajectory,but also the shape factor of trajectory.It is computable in polynomial time,and can calculate the distance of trajectories not defined over the same time span.On this basis,a greedy clustering and data mask based trajectory anonymization algorithm was presented,which maximized the trajectory similarity in the clusters,and formed data "mask" which is formed by fully accurate true original locations information to meet the trajectory k-anonymity.Finally,experimental results on a synthetic data set and a real-life data set were presented; our method offer better utility and cost less time than comparable previous proposals in the literature.…”
Get full text
Article -
949
Research on the Optimization of Agricultural Industry Structure Based on Genetic Algorithm
Published 2022-01-01“…By examining the water balance of submerged irrigation, an optimization model of the agricultural industry structure was developed using genetic algorithms, and the model was solved using an accelerated genetic algorithm. …”
Get full text
Article -
950
Detection and Estimation of Damage in Structures Using Imperialist Competitive Algorithm
Published 2012-01-01“…This paper presents a method for detection and estimation of structural damage on the basis of modal parameters of a damaged structure using imperialist competitive algorithm. The imperialist competitive algorithm was developed over the last few years in an attempt to overcome inherent limitations of traditional optimize method. …”
Get full text
Article -
951
METHOD AND ALGORITHMS OF CALCULATION OF PARAMETERS OF RELIABILITY IN ACCORDANCE WITH MULTIVARIATE DATA
Published 2017-01-01“…The lack of specialized software systems, the knowledge-intensiveness of algorithms of calculation needed for the solution of operational tasks determine the predominant application of the intuitive approach. …”
Get full text
Article -
952
A New Adaptive Hungarian Mating Scheme in Genetic Algorithms
Published 2016-01-01“…In genetic algorithms, selection or mating scheme is one of the important operations. …”
Get full text
Article -
953
Fair Resource Allocation Algorithm for OFDMA System with Imperfect CSI
Published 2015-02-01“…Existing resource allocation algorithms can't balance system capacity and fairness well when the channel state information is imperfect. …”
Get full text
Article -
954
Evolving multicast tree based artificial fish swarm algorithm
Published 2012-09-01Subjects: “…artificial fish swarm algorithm…”
Get full text
Article -
955
Distributed Asynchronous Fusion Algorithm for Sensor Networks with Packet Losses
Published 2014-01-01“…A distributed asynchronous fusion algorithm is proposed via the covariance intersection method. …”
Get full text
Article -
956
Multi-path backup optimized power algorithm for wideband networks
Published 2005-01-01“…A multi-path backup optimized power algorithm was presented for wideband network, which exerted multi-path backup routing and reduced the total transmission power. …”
Get full text
Article -
957
Self-Adaptive K-Means Based on a Covering Algorithm
Published 2018-01-01“…The K-means algorithm is one of the ten classic algorithms in the area of data mining and has been studied by researchers in numerous fields for a long time. …”
Get full text
Article -
958
SVR Prediction Algorithm for Crack Propagation of Aviation Aluminum Alloy
Published 2020-01-01“…In this paper, support vector regression (SVR) was used to fit the crack data, and the parameters of SVR are optimized by the grid search algorithm at the same time. And then the model of SVR to predict the crack length was established. …”
Get full text
Article -
959
Fast intra prediction algorithm applied in QS enhancement layer
Published 2011-01-01“…A fast intra coding algorithm was proposed which was suitable for enhancement layer in quality salability.Base on the coding structure of quality scalability,our algorithm used the relationships between layers,the relationships between rate distortion and modes,and temporal and spatial relationships to predict the modes and coding order to be ap-plied,with an early termination determined by the relationships between quantization parameters and modes,residual co-efficients,and rate distortion.The experimental results show that the encoding speed of the proposed algorithm can be improved by 70%,with negligible coding loss.…”
Get full text
Article -
960
Routing lookup algorithm based on parallel BP neural network
Published 2012-02-01Subjects: Get full text
Article