-
1001
Complex Network Filtering and Compression Algorithm Based on Triangle-Subgraph
Published 2020-01-01“…Based on the triangle-subgraph structure in complex networks, complex network filtering compression algorithm based on the triangle-subgraph is proposed. …”
Get full text
Article -
1002
Port scan detection algorithms based on statistical traffic features
Published 2007-01-01Get full text
Article -
1003
An Efficient T-S Assimilation Strategy Based on the Developed Argo-Extending Algorithm
Published 2017-01-01“…Finally, the positive impact of the developed algorithm on data assimilation is validated.…”
Get full text
Article -
1004
Video semantics-driven resource allocation algorithm in Internet of vehicles
Published 2021-07-01“…Aiming at the problem that traditional resource allocation methods will no longer be applicable, with the demand of intelligent computing services such as video semantic understanding in Internet of vehicles, the video semantic driven resource allocation algorithm was studied.First of all, taking the object detection task as an example, a semantic driven resource allocation guidance model for video was proposed and an algorithm for solving model parameters was given.Secondly, an optimization problem of resource allocation driven by video semantics in Internet of vehicles was constructed, which was transformed into a convex problem and solved by convex optimization algorithm.Furthermore, in order to reduce the complexity of the convex optimization algorithm, a resource allocation algorithm based on reinforcement Q learning was proposed.Finally, the performance advantages of the proposed algorithm are verified by simulations.…”
Get full text
Article -
1005
Algorithmic emergence? Epistemic in/justice in AI-directed transformations of healthcare
Published 2025-02-01“…We then consider the implications of this, how AI might be best employed in healthcare, and how to tackle the algorithmic injustices which become reproduced within health AI assemblages.…”
Get full text
Article -
1006
Improved Grid-Scan Localization Algorithm for Wireless Sensor Networks
Published 2014-01-01“…In this paper an improved grid-scan localization algorithm has been proposed. In the proposed algorithm, information about 1-hop, 2-hop, and farther neighboring anchors has been collected that estimates the region using 1-hop anchors. …”
Get full text
Article -
1007
OPTIMIZATION METHOD OF DYNAMIC LOAD IDENTIFICATION BASED ON GENETIC ALGORITHM
Published 2015-01-01Subjects: Get full text
Article -
1008
Multi-Label Classification Algorithm for Adaptive Heterogeneous Classifier Group
Published 2024-12-01“…Ensemble classification is widely used in multi-label algorithms, and it can be divided into homogeneous ensembles and heterogeneous ensembles according to classifier types. …”
Get full text
Article -
1009
Variable threshold energy detection algorithm based on trust degree
Published 2018-08-01“…Aiming at stochastic probabilistic SSDF attacks,a variable threshold energy detection algorithm based on trust degree was proposed.Firstly,the variable threshold was updated by comparing the actual fusion value with the upper and lower boundary values of the fusion center.The upper and lower boundary values were determined through the given false alarm probability andmissed probability.Secondly,a soft fusionmethod was used based on the ratio of correct perception times and the total number of times to update the trust value.Simulation results show that,compared with the traditional fixed threshold,the proposed algorithm can not only reduce the false alarm andmissed detection probability,but also improve the detection probability of the system.…”
Get full text
Article -
1010
Some Algorithms for Finding Fixed Points and Solutions of Variational Inequalities
Published 2012-01-01“…We introduce new implicit and explicit algorithms for finding the fixed point of a k-strictly pseudocontractive mapping and for solving variational inequalities related to the Lipschitzian and strongly monotone operator in Hilbert spaces. …”
Get full text
Article -
1011
On Distribution Reduction and Algorithm Implementation in Inconsistent Ordered Information Systems
Published 2014-01-01“…For more detailed and valid illustrations, cases are employed to explain and verify the algorithm and the program which shows the effectiveness of the algorithm in complicated information systems.…”
Get full text
Article -
1012
Meeting delay expect value in spray and forward routing algorithm
Published 2016-11-01“…The existing DTN routing algorithms tend to make data transition inflexible and have a long delay in contact.To solve those problems,an algorithm was proposed which called meeting delay expect value in spray and forward routing algorithm for DTN(MDESF).This algorithm will use mobile node's contact history to conduct the expected average contact/disconnect time and message expected wait value(EWV).With those attributes the MDESF will proportionally distribute replicas of a message between two nodes in multiple replicas phase.A buffer management strategy was proposed in order to improve the success rate of imformation fornarded.The simulation results illustrate that the proposed MDESF protocol outperform other existing ones.…”
Get full text
Article -
1013
Parameter Extraction for Photovoltaic Models with Flood-Algorithm-Based Optimization
Published 2024-12-01Subjects: “…flood algorithm…”
Get full text
Article -
1014
Watermarking algorithm for image authentication based on second generation Bandelet
Published 2010-01-01“…A watermarking algorithm for image authentication was designed,which was based on second generation Bandelet translation and statistical model.The image directional flow was constructed by using Bandelet,and it could depict the characteristic of the image.By applying noise visibility function,the noise visibility intensity algorithm which was based on Gaussian statistical models was proposed.The blocks of image which contain more texture information were selected to hide the image directional flow,based on the noise visibility intensity algorithm.The image was authen-ticated through comparing the hiding information and the carrier image directional flow created by Bandelet.Experimen-tal results show that the algorithm can resist the JPEG compression and noise attack strongly and guarantee the quality of the sight.It is a blind detection algorithm,and this algorithm has high concealment performance and security.…”
Get full text
Article -
1015
Research on Human Pose Capture Based on the Deep Learning Algorithm
Published 2022-01-01“…A method based on the deep learning algorithm is proposed to accurately capture the posture of the human body. …”
Get full text
Article -
1016
Ant-Based Swarm Algorithm for Charging Coordination of Electric Vehicles
Published 2013-05-01“…Given this, an ant-based swarm algorithm (ASA) is proposed to realize the EVs charging coordination at the transformer level, which can overcome the drawbacks of centralized control method. …”
Get full text
Article -
1017
An Adaptive Bacterial Foraging Optimization Algorithm with Lifecycle and Social Learning
Published 2012-01-01“…Bacterial Foraging Algorithm (BFO) is a recently proposed swarm intelligence algorithm inspired by the foraging and chemotactic phenomenon of bacteria. …”
Get full text
Article -
1018
Fast algorithms for classical specifications of stabiliser states and Clifford gates
Published 2025-01-01“…We provide implementations of our algorithms in $\texttt{Python}$ and $\texttt{C++}$ that exhibit vastly improved practical performance over existing algorithms in the cases where they exist.…”
Get full text
Article -
1019
Analysis of algorithmic problems solved in Olympiads: stands of students and experts
Published 2003-12-01“… Olympiads (National, Baltic, International) in Informatics are well-known among students. Various algorithmic problems are given to students. The paper deals with the problems from the latest three years. …”
Get full text
Article -
1020
Efficient Algorithm for Isotropic and Anisotropic Total Variation Deblurring and Denoising
Published 2013-01-01“…A new deblurring and denoising algorithm is proposed, for isotropic total variation-based image restoration. …”
Get full text
Article