Showing 1,241 - 1,260 results of 31,575 for search '"algorithm"', query time: 0.17s Refine Results
  1. 1241

    An Efficient Feature Subset Selection Algorithm for Classification of Multidimensional Dataset by Senthilkumar Devaraj, S. Paulraj

    Published 2015-01-01
    “…In this paper, an efficient feature selection algorithm is proposed for the classification of MDD. …”
    Get full text
    Article
  2. 1242

    Timing synchronization algorithm based on clock skew estimation for WSN by Yi SUN, Lu-kun ZENG, Xin WU, Jun LU, Yue SUN

    Published 2015-09-01
    “…In order to solve the problem of poor synchronization stability on classical synchronization algorithm,high overhead on joint clock offset and skew correction synchronization algorithm in wireless sensor network,a timing syn-chronization algorithm based on clock skew estimation for WSN (CSMS) was proposed.The algorithm adopted low-overhead clock offset and skew estimation method to improve the synchronization precision and stability of paired node.At the same time of guaranteeing the stability and accuracy,it realized synchronization with the root node and the neighbors,and optimized synchronization overhead by using the combination of hierarchical network structure and radio listening.The experimental results show that the CSMS algorithm balances energy consumption,accuracy and stability of synchronization.…”
    Get full text
    Article
  3. 1243

    Research on load-balanced construction algorithm of logical carrying network by Hao-xue WANG, Ming JIANG, Ji FU

    Published 2012-09-01
    “…To improve the extensibility of network service,constructing algorithm of logical carrying network was pro-posed by mapping the demands of network service into substrate network.To solve the problem of construction efficiency,on-demand carrying strategy was introduced to provide different resources to meet different service requirements.Based on available resource and current link load,an improved multi-commodity flow model was proposed to compute the re-source allocation.Simulation results indicate this al ithm can improve network service capability from construction success rate and average construction profit.…”
    Get full text
    Article
  4. 1244
  5. 1245

    Time shift TDT timing acquisition algorithm for PPM-UWB by XIANG Xin1, TIAN Bin1, YI Ke-chu1, LIU Lei1

    Published 2005-01-01
    “…It was proved that the TDT (timing with a dirty template) blind timing algorithm was only suitable for PAM-UWB systems rather than PPM-UWB systems.Furthermore,a TS-TDT (time-shift-TDT) blind timing synchronization algorithm was presented for PPM-UWB,which got synchronizing information from calculating the delay cross-correlation values by means of two correlation branches.Theoretical analysis and simulation results demonstrate that the implementation of the algorithm is of low complexity and flexible in precision control.…”
    Get full text
    Article
  6. 1246

    Interior design assistant algorithm based on indoor scene analysis by Lu Zhang

    Published 2025-12-01
    “…The scene analysis algorithm in interior design is widely used in computer vision. …”
    Get full text
    Article
  7. 1247

    Numerical Algorithms for the Fractional Diffusion-Wave Equation with Reaction Term by Hengfei Ding, Changpin Li

    Published 2013-01-01
    “…Two numerical algorithms are derived to compute the fractional diffusion-wave equation with a reaction term. …”
    Get full text
    Article
  8. 1248

    Privacy preserving algorithm based on trajectory location and shape similarity by Chao WANG, Jing YANG, Jian-pei ZHANG

    Published 2015-02-01
    “…In order to reduce the privacy disclosure risks when trajectory data is released,a variety of trajectories anonymity methods were proposed.However,while calculating similarity of trajectories,the existing methods ignore the impact that the shape factor of trajectory has on similarity of trajectories,and therefore the produced set of trajectory anonymity has a lower utility.To solve this problem,a trajectory similarity measure model was presented,considered not only the time and space elements of the trajectory,but also the shape factor of trajectory.It is computable in polynomial time,and can calculate the distance of trajectories not defined over the same time span.On this basis,a greedy clustering and data mask based trajectory anonymization algorithm was presented,which maximized the trajectory similarity in the clusters,and formed data "mask" which is formed by fully accurate true original locations information to meet the trajectory k-anonymity.Finally,experimental results on a synthetic data set and a real-life data set were presented; our method offer better utility and cost less time than comparable previous proposals in the literature.…”
    Get full text
    Article
  9. 1249

    Research on the Optimization of Agricultural Industry Structure Based on Genetic Algorithm by Lingxiao Liu

    Published 2022-01-01
    “…By examining the water balance of submerged irrigation, an optimization model of the agricultural industry structure was developed using genetic algorithms, and the model was solved using an accelerated genetic algorithm. …”
    Get full text
    Article
  10. 1250
  11. 1251

    Detection and Estimation of Damage in Structures Using Imperialist Competitive Algorithm by A. Bagheri, H.R. Razeghi, G. Ghodrati Amiri

    Published 2012-01-01
    “…This paper presents a method for detection and estimation of structural damage on the basis of modal parameters of a damaged structure using imperialist competitive algorithm. The imperialist competitive algorithm was developed over the last few years in an attempt to overcome inherent limitations of traditional optimize method. …”
    Get full text
    Article
  12. 1252
  13. 1253

    METHOD AND ALGORITHMS OF CALCULATION OF PARAMETERS OF RELIABILITY IN ACCORDANCE WITH MULTIVARIATE DATA by E. M. Farhadzadeh, A. Z. Muradaliyev, T. K. Rafiyeva, S. A. Abdullayeva

    Published 2017-01-01
    “…The lack of specialized software systems, the knowledge-intensiveness of algorithms of calculation needed for the solution of operational tasks determine the predominant application of the intuitive approach. …”
    Get full text
    Article
  14. 1254

    A New Adaptive Hungarian Mating Scheme in Genetic Algorithms by Chanju Jung, Yong-Hyuk Kim, Yourim Yoon, Byung-Ro Moon

    Published 2016-01-01
    “…In genetic algorithms, selection or mating scheme is one of the important operations. …”
    Get full text
    Article
  15. 1255

    Automatic Card Fraud Detection Based on Decision Tree Algorithm by Elena Flondor, Liliana Donath, Mihaela Neamtu

    Published 2024-12-01
    “…Furthermore, empirical research is conducted to evaluate the effectiveness of Machine Learning-based decision tree algorithms in identifying card fraud using real-world datasets. …”
    Get full text
    Article
  16. 1256

    Fair Resource Allocation Algorithm for OFDMA System with Imperfect CSI by Yaohui Wu, Youming Li, Liping Jin, Pengfei Shao

    Published 2015-02-01
    “…Existing resource allocation algorithms can't balance system capacity and fairness well when the channel state information is imperfect. …”
    Get full text
    Article
  17. 1257

    Evolving multicast tree based artificial fish swarm algorithm by Xuan MA, Qing LIU

    Published 2012-09-01
    Subjects: “…artificial fish swarm algorithm…”
    Get full text
    Article
  18. 1258

    Distributed Asynchronous Fusion Algorithm for Sensor Networks with Packet Losses by Tianpeng Chu, Guoqing Qi, Yinya Li, Andong Sheng

    Published 2014-01-01
    “…A distributed asynchronous fusion algorithm is proposed via the covariance intersection method. …”
    Get full text
    Article
  19. 1259
  20. 1260

    Multi-path backup optimized power algorithm for wideband networks by XU Yu-bin, TAN Wei

    Published 2005-01-01
    “…A multi-path backup optimized power algorithm was presented for wideband network, which exerted multi-path backup routing and reduced the total transmission power. …”
    Get full text
    Article