Showing 961 - 980 results of 31,575 for search '"algorithm"', query time: 0.13s Refine Results
  1. 961

    A Hybrid Algorithm of GA + Simplex Method in the WSN Localization by Feng Wang, Cong Wang, ZiZhong Wang, Xue-ying Zhang

    Published 2015-07-01
    “…In order to solve the large-error problem in the third phase and the poor position accuracy of the least square method in the weighted DV-Hop algorithm, a hybrid algorithm of GA + simplex method was proposed in this paper. …”
    Get full text
    Article
  2. 962

    An Iterative Optimization Algorithm for Planning Spacecraft Pathways Through Asteroids by Valentino Santucci

    Published 2024-11-01
    “…In this article, we explore the use of meta-heuristic algorithms for costly black-box permutation optimization problems. …”
    Get full text
    Article
  3. 963
  4. 964
  5. 965

    Accelerated algorithm in attribute-based encryption over cloud environment by Guowei WU, Ning FAN, Laifu WANG, Shuai WANG, Jun SHEN, Huamin JIN

    Published 2019-11-01
    “…Cloud computing provides storage,computing and network services to tenants.Data security and data sharing and access control between tenants are indispensable functions.Attribute-based encryption (ABE) system is a one to many encryption system,which allows users to fine -grained access control on encrypted data according to users’ attributes.This encryption system is very suitable for multi-tenant data sharing overcloud computing environment.However,the existing attribute-based encryption schemes is inefficient,which cannot be applied to practical applications.Two types of ABE and their application scenarios were analyzed,and an acceleration algorithms scheme in attribute encryption cryptosystem was proposed.The experiment can illustrate that the proposed scheme can improve the efficiency of key generation algorithm,encryption algorithm and decryption algorithm.…”
    Get full text
    Article
  6. 966

    Semi-supervised tri-Adaboost algorithm for network intrusion detection by Yali Yuan, Liuwei Huo, Yachao Yuan, Zhixiao Wang

    Published 2019-06-01
    “…Here, a semi-supervised tri-Adaboost (STA) algorithm is proposed. In the algorithm, three different Adaboost algorithms are used as the weak classifiers (both for continuous and categorical data), constituting the decision stumps in the tri-training method. …”
    Get full text
    Article
  7. 967

    Sensor fault detection algorithm based on credibility and neighbor-cooperation by Yan-fei LIN, Su-jie SHAO, Cheng ZHONG, Shao-yong GUO, Xue-song QIU

    Published 2016-09-01
    “…To effectively detect whether a node was failure,one of the effective sensor fault detection methods was to compare historical data of suspicious node with its neighbors.The key points of this method were identification of suspicious nodes,as well as decision problem of sending timing for fault diagnosis messages.To this end,a sensor fault detection algorithm was presented based on credibility and neighbor-cooperation.Firstly,a credibility model to determine whether nodes are suspicious was established.Then suspicious nodes send fault diagnosis requests to neighbor nodes based on neighbor-cooperation.The sending timing was determined by equal probability time window.Finally,it could finish classification of fault condition and state judgment based on diagnosis responds of neighbor nodes.Simulation experiments show that this algorithm can achieve higher fault detection rate with less fault diagnosis times and low data congestion probability.…”
    Get full text
    Article
  8. 968
  9. 969

    A robust audio steganography algorithm based on differential evolution by Zhaopin SU, Chaoyong SHEN, Guofu ZHANG, Feng YUE, Donghui HU

    Published 2021-11-01
    “…., segmented scaling parameters and steganography capacity) and imperceptibility as well as robustness was analyzed.Next, a multi-objective optimization model of audio steganography was presented, in which segmented scaling parameters and steganography capacity were decision variables, imperceptibility and steganography capacity were optimization objectives, and the signal-to-noise ratio was a constraint.Then, a robust audio steganography algorithm based on differential evolution was proposed, including the corresponding encoding, fitness function, crossover and mutation operators.Finally, comparative experimental results show that the proposed steganography algorithm can achieve better robustness against common signal processing attacks on the premise of ensuring imperceptibility and anti-detection.…”
    Get full text
    Article
  10. 970

    Bibliometric Survey on Particle Swarm Optimization Algorithms (2001–2021) by Samuel-Soma M. Ajibade, Adegoke Ojeniyi

    Published 2022-01-01
    “…Particle swarm optimization algorithms (PSOA) is a metaheuristic algorithm used to optimize computational problems using candidate solutions or particles based on selected quality measures. …”
    Get full text
    Article
  11. 971

    FPGA Implementation of A∗ Algorithm for Real-Time Path Planning by Yuzhi Zhou, Xi Jin, Tianqi Wang

    Published 2020-01-01
    “…The traditional A∗ algorithm is time-consuming due to a large number of iteration operations to calculate the evaluation function and sort the OPEN list. …”
    Get full text
    Article
  12. 972

    Design of steganography algorithm based on MPEG-4 coding scheme by YUAN Kai-guo, ZHANG Ru, XU Xin, NIU Xin-xin, YANG Yi-xian

    Published 2009-01-01
    “…An information hiding algorithm based on MPEG-4 texture coding was proposed. …”
    Get full text
    Article
  13. 973

    High-precision symbol timing algorithm for specific emitter identification by Yiwei PAN, Hua PENG, Tianyun LI, Wenya WANG

    Published 2018-08-01
    “…The existing symbol timing algorithms have the problems that the method of delay estimation is improper and the calculation precision of the interpolation is insufficient for the pretreatment of specific emitter identification.A high-precision symbol timing algorithm was proposed to solve these problems.Aiming at the former problem,a two-step estimation method was adopted,rough estimation of delay was firstly obtained by the forward algorithm,and then the accurate value was acquired through local search with the demodulated symbols.For the latter problem,a window-based approach was used to design an interpolating filter which could optimize the anti-aliasing characteristics and improve the calculation accuracy.Simulation results show that the proposed algorithm can effectively solve the above problems and achieve better recognition results in the radiation source recognition compared with the conventional symbol timing algorithm.…”
    Get full text
    Article
  14. 974

    A Cooperative Coevolutionary Cuckoo Search Algorithm for Optimization Problem by Hongqing Zheng, Yongquan Zhou

    Published 2013-01-01
    “…Taking inspiration from an organizational evolutionary algorithm for numerical optimization, this paper designs a kind of dynamic population and combining evolutionary operators to form a novel algorithm, a cooperative coevolutionary cuckoo search algorithm (CCCS), for solving both unconstrained, constrained optimization and engineering problems. …”
    Get full text
    Article
  15. 975
  16. 976

    Multi-level local differential privacy algorithm recommendation framework by Hanyi WANG, Xiaoguang LI, Wenqing BI, Yahong CHEN, Fenghua LI, Ben NIU

    Published 2022-08-01
    “…Local differential privacy (LDP) algorithm usually assigned the same protection mechanism and parameters to different users.However, it ignored the differences among the device resources and the privacy requirements of different users.For this reason, a multi-level LDP algorithm recommendation framework was proposed.The server and the users’ requirements were considered in the framework, and the multi-users’ differential privacy protections were realized by the server and the users’ multi-level management.The framework was applied to the frequency statistics scenario to form an LDP algorithm recommendation scheme.LDP algorithm was improved to ensure the availability of statistical results, and a collaborative mechanism was designed to protect users’ privacy preferences.The experimental results demonstrate the availability of the proposed scheme.…”
    Get full text
    Article
  17. 977

    Cognitive radio auto-adaptive sensing algorithm based on POMDP by Rui-chen XU, Ting JIANG

    Published 2013-06-01
    “…In order to design an appropriate spectrum sensing mechanism in millisecond spectrum hole environment,the optimal data transmission time of secondary users was derived to maximize the data throughput.Furthermore,in order to exploit the millisecond spectrum holes,an auto-adaptive spectrum sensing algorithm based on POMDP (partially observ-able Markov decision process) was proposed.This algorithm executes spectrum sensing or data transmission action in the current decision epoch based on the belief vector and the observation result in the last decision epoch.Simulation results show that the proposed algorithm can constrain the collision probability between primary users and secondary users,and improve systemic spectrum utilization at the same time.…”
    Get full text
    Article
  18. 978

    An Algorithm for Discretization of Real Value Attributes Based on Interval Similarity by Li Zou, Deqin Yan, Hamid Reza Karimi, Peng Shi

    Published 2013-01-01
    “…The algorithms related to Chi2 algorithm (includes modified Chi2 algorithm and extended Chi2 algorithm) are famous discretization algorithm exploiting the technique of probability and statistics. …”
    Get full text
    Article
  19. 979

    Random Forest Algorithm for Toddler Nutritional Status Classification Website by Maylia Fatmawati, Bambang Agus Herlambang, Noora Qotrun Nada

    Published 2024-11-01
    “…Accurate data processing is essential for classifying toddler nutritional status on a website platform. The Random Forest algorithm is particularly effective in this context due to its ability to manage large datasets and mitigate overfitting. …”
    Get full text
    Article
  20. 980

    An Improved Clustering Algorithm of Tunnel Monitoring Data for Cloud Computing by Luo Zhong, KunHao Tang, Lin Li, Guang Yang, JingJing Ye

    Published 2014-01-01
    “…To solve this problem, an improved parallel clustering algorithm based on k-means has been proposed. It is a clustering algorithm using the MapReduce within cloud computing that deals with data. …”
    Get full text
    Article