-
1581
Accounting Data Encryption Processing Based on Data Encryption Standard Algorithm
Published 2021-01-01“…The 3DES algorithm is a cascade of the DES algorithm, and its encryption process is based on the DES algorithm principle. …”
Get full text
Article -
1582
On the Convergence of a Smooth Penalty Algorithm without Computing Global Solutions
Published 2012-01-01“…We consider a smooth penalty algorithm to solve nonconvex optimization problem based on a family of smooth functions that approximate the usual exact penalty function. …”
Get full text
Article -
1583
Theoretical and methodological approaches to the problem of student’s health in the algorithm of recreational activities
Published 2022-06-01“…The aim of the study is theoretical and methodological approaches to the problem of student’s health in the algorithm of recreational activities. Materials and Methods. …”
Get full text
Article -
1584
Analysis of constant modulus blind equalization algorithms base on "data reuse"
Published 2009-01-01Subjects: Get full text
Article -
1585
One-Step Leapfrog LOD-BOR-FDTD Algorithm with CPML Implementation
Published 2016-01-01“…The equations of the proposed algorithm are obtained by the algebraic manipulation of those used in the conventional LOD-BOR-FDTD algorithm. …”
Get full text
Article -
1586
An Aeromagnetic Compensation Algorithm for Aircraft Based on Fuzzy Adaptive Kalman Filter
Published 2014-01-01“…In this paper, the classical aircraft aeromagnetic compensation algorithm based on Leliak Model is analyzed and an aircraft aeromagnetic compensation algorithm based on fuzzy adaptive Kalman filter is proposed, which is a new approach for aircraft to achieve aeromagnetic compensation. …”
Get full text
Article -
1587
Application of Random Dynamic Grouping Simulation Algorithm in PE Teaching Evaluation
Published 2021-01-01“…To address this problem, a stochastic simulation-based comprehensive evaluation solution algorithm based on the idea of “Monte Carlo simulation” is proposed, and the corresponding ranking method is investigated, which is characterized by generating evaluation conclusions with probability (reliability) information, and thus has more advantages than the absolute conclusion form in terms of problem interpretability. …”
Get full text
Article -
1588
A survey of image object detection algorithm based on deep learning
Published 2020-07-01Get full text
Article -
1589
Routing optimization method of WSN based on improved ant colony algorithm
Published 2016-03-01Subjects: Get full text
Article -
1590
STUDY ON NEUTRON – GAMMA PULSE SHAPE DISCRIMINATION ALGORITHMS FOR SCINTILLATION DETECTOR
Published 2016-09-01“…The four neutron - gamma pulsed shape discrimination algorithms for the model NE213 scintillation detector by using digital signal processing were developed. …”
Get full text
Article -
1591
Two-Dimensional AOA Estimation Based on a Constant Modulus Algorithm
Published 2017-01-01“…We propose a two-dimensional (2D) angle of arrival (AOA) estimator using the algebraic constant modulus algorithm (ACMA). This algorithm was originally introduced to estimate the one-dimensional (1D) AOA. …”
Get full text
Article -
1592
Agent-based dynamic spectrum trading algorithm in cognitive radio network
Published 2013-03-01“…In order to improve the benefits generated by spectrum sharing, the spectrum management was studied and the agent-based dynamic spectrum trading algorithm was proposed. In the algorithm, the agent was used as a medium for spectrum trading, which reduced the huge system overhead among multi-primary service providers (PSP) and mul-ti-secondary users (SU). …”
Get full text
Article -
1593
Evaluation of Building Seismic Capacity Based on Improved Naive Bayesian Algorithm
Published 2023-01-01“…On the basis of the Spearman correlation coefficient calculation of the index, the improved naive Bayesian algorithm is combined with the importance of the index to build a judgment model for the seismic capacity of housing buildings. …”
Get full text
Article -
1594
Improvement of Specific Multi-target Tracking Algorithm in Cross-domain Environment
Published 2025-01-01“…[Findings] In the comparative ablation tests, the MOTA value of the improved algorithm reached 62.8%, and the IDswitch value was also significantly reduced.…”
Get full text
Article -
1595
Analysis of Regional Economic Development Differences Based on Intelligent Hybrid Algorithm
Published 2021-01-01“…Therefore, this paper's main point is on the analysis of regional economic development differences based on intelligent hybrid algorithms. On the basis of summarizing and analyzing previous research works, this paper expounded the research status and significance of regional economic development differences analysis, elaborated the development background, current status, and future challenges of intelligent hybrid algorithms, introduced the methods and principles of principal component distance weighting algorithm and sequential quadratic programming algorithm, constructed a basic model for regional economic development differences based on intelligent hybrid algorithm, conducted the construction of analysis index system and the hybrid of intelligence algorithm, analyzed the regional economic development differences based on intelligent hybrid algorithm, performed the principal component analysis and time-space change analysis of regional economic development, and finally carried out a simulation experiment and its result analysis. …”
Get full text
Article -
1596
Research on indoor localization algorithm based on kernel principal component analysis
Published 2017-01-01“…An indoor localization algorithm based on kernel principal component analysis (KPCA) was proposed.It applied KPCA to train the original location fingerprint (OLF) and extract the nonlinear feature of the OLF data at the offline stage,such that the information of all AP was more efficiently utilized.At the online stage,an improved weight k-nearest neighbor algorithm for positioning which could automatically choose neighbors was proposed.The experiments were carried out in a realistic WLAN environment.The results show that the algorithm outperforms the existing methods in terms of the mean error and localization accuracy.Moreover,it requires less times of RSS acquisition and AP number.…”
Get full text
Article -
1597
NUMERICAL CONTROL MILLING PARAMETER OPTIMIZATION ON THE BASIS OF IMPROVED GENETIC ALGORITHM
Published 2022-01-01“…By adoption of the NDX crossover algorithm, CA sorting method and DE strategy can increase the search interval, ensure the population diversification distribution, and improve the convergence rate. …”
Get full text
Article -
1598
K connectivity algorithm based on flow network in wireless sensor networks
Published 2019-09-01Subjects: Get full text
Article -
1599
Construction and Application of Music Audio Database Based on Collaborative Filtering Algorithm
Published 2022-01-01“…Based on this background, this paper first realizes the construction of multilevel music audio database using Big Data technology and collaborative filtering algorithm. Then, through the Big Data analysis technology based on collaborative filtering algorithm, the QRE (quick reaction estimate) model is constructed and the data query system is formed. …”
Get full text
Article -
1600
Research on seed node mining algorithm in large-scale temporal graph
Published 2022-09-01“…Most of the existing maximizing influence algorithms based on temporal graph were not applicable for large-scale networks due to the low time efficiency or narrow influence range.Therefore, the seed node mining algorithm named CHG combining heuristic algorithm and greedy strategy was proposed.Firstly, based on the time sequence characteristics of information diffusion in temporal graph, the concept of two-order degree of nodes was given, and the influence of nodes was heuristically evaluated.Secondly, the nodes were filtered according to the influence evaluation results, and the candidate seed node set was constructed.Finally, the marginal effect of candidate seed nodes was calculated to solve the overlap of influence ranges between nodes to ensure the optimal combination of seed nodes.The experiments were carried out on three different scale data sets, and the results show that the proposed algorithm can ensure the high influence of the seed node set even though its running time is relatively shorter.And it can achieve a better trade-off between the time efficiency and the influence range of the seed node set.…”
Get full text
Article