-
1441
Weapon-Target Assignment Problem by Multiobjective Evolutionary Algorithm Based on Decomposition
Published 2018-01-01“…Since this is an NP-complete problem, multiobjective evolutionary algorithms (MOEAs) can be used to solve it effectively. …”
Get full text
Article -
1442
Identification of hypertension gene expression biomarkers based on the DeepGCFS algorithm.
Published 2025-01-01“…The algorithm then uses hybrid clustering methods for gene module detection. …”
Get full text
Article -
1443
Research of a spam filter based on improved naive Bayes algorithm
Published 2017-03-01“…In spam filtering filed,naive Bayes algorithm is one of the most popular algorithm,a modified using support vector machine(SVM)of the native Bayes algorithm :SVM-NB was proposed.Firstly,SVM constructs an optimal separating hyperplane for training set in the sample space at the junction two types of collection,Secondly,according to its similarities and differences between the neighboring class mark for each sample to reduce the sample space also increase the independence of classes of each samples.Finally,using naive Bayesian classification algorithm for mails.The simulation results show that the algorithm reduces the sample space complexity,get the optimal classification feature subset fast,improve the classification speed and accuracy of spam filtering effectively.…”
Get full text
Article -
1444
Control Design of the Wave Compensation System Based on the Genetic PID Algorithm
Published 2019-01-01“…The control block diagram of the wave compensation system based on the genetic PID control algorithm is established, and the optimal index and PID parameters are optimized by the crossover and mutation operators of the genetic particle swarm optimization algorithm. …”
Get full text
Article -
1445
Improving doublet cell removal efficiency through multiple algorithm runs
Published 2025-01-01“…However, due to the randomness of the algorithms, most doublet removal methods still leave a certain proportion of doublets after application. …”
Get full text
Article -
1446
Robust uplink power control algorithm for multimedia CDMA cellular systems
Published 2009-01-01“…Finally, the convergence of the proposed NIA was validated and the performance advantage of the proposed PRCAs was shown to a suboptimal algorithm by simulation.…”
Get full text
Article -
1447
Research and application of adaptive algorithm for 5G voice quality evaluation
Published 2023-11-01“…MOS (mean opinion score) is usually used to evaluate voice quality in the industry.It can objectively and fairly reflect the user’s voice service perception.It is difficult and costly to obtain data by road test, so a trained supervised learning model is usually used to predict the MOS score.However, the operator voice data has the characteristics of low percentage of MOS low score data and time sequence change, which affects the accuracy and generalization of the model prediction.Based on the study of existing data acquisition systems and machine learning algorithms of operators, an adaptive algorithm for MOS evaluation of 5G speech quality was proposed.Firstly, POLQA algorithm test equipment based on full parameter evaluation obtained training data to ensure the accuracy of training samples.Secondly, by means of data enhancement, the difficulty of acquiring poor quality samples was solved.Finally, based on the adaptive algorithm selection, the optimal MOS prediction model could be selected periodically and dynamically according to the timing changes of data features, so as to achieve large-scale and intelligent evaluation of 5G voice quality.…”
Get full text
Article -
1448
Finite-Time Cooperative Tracking Control Algorithm for Multiple Surface Vessels
Published 2014-01-01“…A robust finite-time cooperative tracking algorithm based on terminal sliding-mode control is proposed for multiple surface vessels. …”
Get full text
Article -
1449
Wireless Mobile Power Communication System Based on Artificial Intelligence Algorithm
Published 2022-01-01“…In order to solve the problems of low-risk assessment accuracy and long time-consuming assessment of current wireless mobile communication systems, a wireless mobile communication system based on artificial intelligence algorithms is proposed. First, the research status of risk assessment of wireless mobile communication system at home and abroad is analyzed, and the risk assessment index system of wireless mobile communication system is established; then, the learning samples are collected according to the risk assessment index system of wireless mobile communication system, and artificial intelligence algorithm is used to optimize the neural network. …”
Get full text
Article -
1450
Comparative Study for Classification Algorithms Performance in Crop Yields Prediction Systems
Published 2021-05-01“…The comparison involves measuring the error values and accuracy. The SVM algorithm achieved the highest accuracy value with 76.82%. while the lowest is achieved by the KNN algorithm with 35.76%. …”
Get full text
Article -
1451
Modern Art Interactive Design Relying on Neural Network Intelligent Algorithms
Published 2022-01-01Get full text
Article -
1452
Multi-Strategy Improved Whale Optimization Algorithm and Its Engineering Applications
Published 2025-01-01Subjects: “…improved whale optimization algorithm…”
Get full text
Article -
1453
Resource allocation algorithm for intelligent reflecting surface-aided SWIPT networks
Published 2022-02-01“…In order to achieve the efficient interconnection of everything, under the limitations of terminal devices’ batteries and network coverage, the intelligent reflecting surface (IRS) technology was introduced to build a new IRS-aided simultaneous wireless information and power transfer (SWIPT) network.To further improve the total throughput of the network, a resource allocation (RA) scheme aiming at sum-rate maximization was proposed.Considering that the constraints of the maximum transmit power of a base station, the minimum energy requirement of each device and the phase shifts on an IRS, a joint transmit beamforming, power splitting (PS) ratio and phase shift optimization problem was formulated.Due to the non-convex problem and coupled variables, a block coordinate descent (BCD)-based algorithm was proposed.Then, the joint transmit beam forming design, PS ratio optimization and phase shift design were solved by using the successive convex approximation (SCA) and Riemannian manifold methods, respectively.Simulation results show that the proposed RA scheme performs better than the existing RA schemes in terms of sum-rate.…”
Get full text
Article -
1454
Application of DBN deep learning algorithm in anti stealing electricity system
Published 2019-02-01“…With the development of economy,the electric power demand increases gradually,but because of the relative backwardness in the automation of electricity,the phenomenon of electric stealing is common.But the traditional anti electric stealing means generally centered around how to strengthen the technical transformation of the electric energy metering device,and the management efficiency is low.The purpose of deep learning is to use the method of constructing the multi-layer neural network model.To learn the potential features of image,text,voice and other data,it also has good effect on the classification problem.The successful application of the deep learning algorithm in many complex fields provides a new effective way to solve the problem of anti stealing electricity.The structure and learning algorithm of DBN and the anti-stealing model based on DBN algorithm was mainly introduced.Finally,experiments were carried out and the results were analyzed.…”
Get full text
Article -
1455
Inverse Kinematics Solution for Manipulators Based on the Artificial Evolved Hummingbird Algorithm
Published 2024-12-01Subjects: “…Artificial evolved hummingbird algorithm…”
Get full text
Article -
1456
Performance analysis and testing of personal influence algorithm in online social networks
Published 2018-10-01“…Social influence is the key factor to drive information propagation in online social networks and can be modeled and analyzed with social networking data.As a kind of classical personal influence algorithm,two parallel implementation versions of a PageRank based method were introduced.Furthermore,extensive experiments were conducted on a large-scale real dataset to test the performance of these parallel methods in a distributed environment.The results demonstrate that the computational efficiency of the personal influence algorithm can be improved significantly in massive data sets by virtue of existing big data processing framework,and provide an empirical reference for the future research and optimization of the algorithm as well.…”
Get full text
Article -
1457
Image and video resizing algorithm based on importance diffusion and adaptive scaling
Published 2011-01-01“…An image and video resizing algorithm was proposed based on importance map diffusion and adaptive scaling.It compromised between the protections of image content and important regions.To avoid the image distortion by exces-sive deletion of un-important regions,the importance of current row and column was spread to their neighboring pixels.To protect importance regions,different weighting coefficients were allocated to every row and column in terms of their importance by adaptive scaling function.Moreover,it was also effective for video resizing by incorporating the constraint of temporal coherency.Experimental results show that compared with other techniques such as cropping and seam carv-ing,satisfactory results were achieved by the proposed approach.…”
Get full text
Article -
1458
IMPROVED TIME DOMAIN BLIND DECONVOLUTION ALGORITHM IN BEARING FAULT DIAGNOSIS
Published 2016-01-01“…An improved blind deconvolution algorithm which based on generalized morphological filtering and improved KL distance clustering methods was proposed to deal with industrial field noise,multi interference sources and disadvantage of blind extraction algorithm. …”
Get full text
Article -
1459
Particle Swarm Algorithms to Solve Engineering Problems: A Comparison of Performance
Published 2013-01-01“…In many disciplines, the use of evolutionary algorithms to perform optimizations is limited because of the extensive number of objective evaluations required. …”
Get full text
Article -
1460
False Financial Statement Identification Based on Fuzzy C-Means Algorithm
Published 2021-01-01“…In this paper, the fuzzy C-means (FCM) clustering method is used to amplify these differences and thus identify false financial statements. In the proposed algorithm, firstly, the normalization constraint of the FCM clustering algorithm on the sum of affiliation of individual samples is relaxed to the constraint on the sum of affiliation of all samples, thus reducing the sensitivity of the algorithm to noise and isolated points; secondly, a new affiliation correction method is proposed to address the problem that the difference in affiliation is too large after the relaxation of the constraint. …”
Get full text
Article