Suggested Topics within your search.
Suggested Topics within your search.
-
1241
An Efficient Feature Subset Selection Algorithm for Classification of Multidimensional Dataset
Published 2015-01-01“…In this paper, an efficient feature selection algorithm is proposed for the classification of MDD. …”
Get full text
Article -
1242
Timing synchronization algorithm based on clock skew estimation for WSN
Published 2015-09-01“…In order to solve the problem of poor synchronization stability on classical synchronization algorithm,high overhead on joint clock offset and skew correction synchronization algorithm in wireless sensor network,a timing syn-chronization algorithm based on clock skew estimation for WSN (CSMS) was proposed.The algorithm adopted low-overhead clock offset and skew estimation method to improve the synchronization precision and stability of paired node.At the same time of guaranteeing the stability and accuracy,it realized synchronization with the root node and the neighbors,and optimized synchronization overhead by using the combination of hierarchical network structure and radio listening.The experimental results show that the CSMS algorithm balances energy consumption,accuracy and stability of synchronization.…”
Get full text
Article -
1243
Research on load-balanced construction algorithm of logical carrying network
Published 2012-09-01“…To improve the extensibility of network service,constructing algorithm of logical carrying network was pro-posed by mapping the demands of network service into substrate network.To solve the problem of construction efficiency,on-demand carrying strategy was introduced to provide different resources to meet different service requirements.Based on available resource and current link load,an improved multi-commodity flow model was proposed to compute the re-source allocation.Simulation results indicate this al ithm can improve network service capability from construction success rate and average construction profit.…”
Get full text
Article -
1244
Partial blind signature scheme based on SM9 algorithm
Published 2021-08-01Subjects: “…SM9 algorithm…”
Get full text
Article -
1245
Time shift TDT timing acquisition algorithm for PPM-UWB
Published 2005-01-01“…It was proved that the TDT (timing with a dirty template) blind timing algorithm was only suitable for PAM-UWB systems rather than PPM-UWB systems.Furthermore,a TS-TDT (time-shift-TDT) blind timing synchronization algorithm was presented for PPM-UWB,which got synchronizing information from calculating the delay cross-correlation values by means of two correlation branches.Theoretical analysis and simulation results demonstrate that the implementation of the algorithm is of low complexity and flexible in precision control.…”
Get full text
Article -
1246
Interior design assistant algorithm based on indoor scene analysis
Published 2025-12-01“…The scene analysis algorithm in interior design is widely used in computer vision. …”
Get full text
Article -
1247
Numerical Algorithms for the Fractional Diffusion-Wave Equation with Reaction Term
Published 2013-01-01“…Two numerical algorithms are derived to compute the fractional diffusion-wave equation with a reaction term. …”
Get full text
Article -
1248
Privacy preserving algorithm based on trajectory location and shape similarity
Published 2015-02-01“…In order to reduce the privacy disclosure risks when trajectory data is released,a variety of trajectories anonymity methods were proposed.However,while calculating similarity of trajectories,the existing methods ignore the impact that the shape factor of trajectory has on similarity of trajectories,and therefore the produced set of trajectory anonymity has a lower utility.To solve this problem,a trajectory similarity measure model was presented,considered not only the time and space elements of the trajectory,but also the shape factor of trajectory.It is computable in polynomial time,and can calculate the distance of trajectories not defined over the same time span.On this basis,a greedy clustering and data mask based trajectory anonymization algorithm was presented,which maximized the trajectory similarity in the clusters,and formed data "mask" which is formed by fully accurate true original locations information to meet the trajectory k-anonymity.Finally,experimental results on a synthetic data set and a real-life data set were presented; our method offer better utility and cost less time than comparable previous proposals in the literature.…”
Get full text
Article -
1249
Research on the Optimization of Agricultural Industry Structure Based on Genetic Algorithm
Published 2022-01-01“…By examining the water balance of submerged irrigation, an optimization model of the agricultural industry structure was developed using genetic algorithms, and the model was solved using an accelerated genetic algorithm. …”
Get full text
Article -
1250
A CONTROL ALGORITHM FOR JOINT FLIGHT OF A GROUP OF DRONES
Published 2021-03-01Subjects: Get full text
Article -
1251
Detection and Estimation of Damage in Structures Using Imperialist Competitive Algorithm
Published 2012-01-01“…This paper presents a method for detection and estimation of structural damage on the basis of modal parameters of a damaged structure using imperialist competitive algorithm. The imperialist competitive algorithm was developed over the last few years in an attempt to overcome inherent limitations of traditional optimize method. …”
Get full text
Article -
1252
POSSIBLE APPLICATIONS OF ARTIFICIAL INTELLIGENCE ALGORITHMS IN F-16 AIRCRAFT
Published 2024-06-01Subjects: Get full text
Article -
1253
METHOD AND ALGORITHMS OF CALCULATION OF PARAMETERS OF RELIABILITY IN ACCORDANCE WITH MULTIVARIATE DATA
Published 2017-01-01“…The lack of specialized software systems, the knowledge-intensiveness of algorithms of calculation needed for the solution of operational tasks determine the predominant application of the intuitive approach. …”
Get full text
Article -
1254
A New Adaptive Hungarian Mating Scheme in Genetic Algorithms
Published 2016-01-01“…In genetic algorithms, selection or mating scheme is one of the important operations. …”
Get full text
Article -
1255
Automatic Card Fraud Detection Based on Decision Tree Algorithm
Published 2024-12-01“…Furthermore, empirical research is conducted to evaluate the effectiveness of Machine Learning-based decision tree algorithms in identifying card fraud using real-world datasets. …”
Get full text
Article -
1256
Fair Resource Allocation Algorithm for OFDMA System with Imperfect CSI
Published 2015-02-01“…Existing resource allocation algorithms can't balance system capacity and fairness well when the channel state information is imperfect. …”
Get full text
Article -
1257
Evolving multicast tree based artificial fish swarm algorithm
Published 2012-09-01Subjects: “…artificial fish swarm algorithm…”
Get full text
Article -
1258
Distributed Asynchronous Fusion Algorithm for Sensor Networks with Packet Losses
Published 2014-01-01“…A distributed asynchronous fusion algorithm is proposed via the covariance intersection method. …”
Get full text
Article -
1259
Map Floodwater Radar Imagery using Machine Learning Algorithms
Published 2025-01-01Get full text
Article -
1260
Multi-path backup optimized power algorithm for wideband networks
Published 2005-01-01“…A multi-path backup optimized power algorithm was presented for wideband network, which exerted multi-path backup routing and reduced the total transmission power. …”
Get full text
Article