Showing 16,581 - 16,600 results of 19,511 for search '"algorithm"', query time: 0.10s Refine Results
  1. 16581

    Optimized Naive-Bayes and Decision Tree Approaches for fMRI Smoking Cessation Classification by Amirhessam Tahmassebi, Amir H. Gandomi, Mieke H. J. Schulte, Anna E. Goudriaan, Simon Y. Foo, Anke Meyer-Baese

    Published 2018-01-01
    “…The scientific research goal of this study was to interpret the fMRI connectivity maps based on machine learning algorithms to predict the patient who will relapse and the one who will not. …”
    Get full text
    Article
  2. 16582

    Testing Data Cloning as the Basis of an Estimator for the Stochastic Volatility in Mean Model by E. Romero, E. Ropero-Moriones

    Published 2023-01-01
    “…This study introduces a Bayesian methodology that leverages data-cloning algorithms to obtain maximum likelihood estimates for SV and SVM model parameters. …”
    Get full text
    Article
  3. 16583

    An Improved Sensitivity Method for the Simultaneous Identification of Unknown Parameters and External Loads of Nonlinear Structures by Chongwen Wang, Chengbin Du

    Published 2018-01-01
    “…Because structures may be subject to unknown loads and may simultaneously involve unknown parameters and because simple load identification or parameter identification algorithms cannot be applied under such conditions, it is necessary to seek algorithms that can simultaneously identify unknown parameters and external loads of structures. …”
    Get full text
    Article
  4. 16584

    Modeling Multicellular Systems Using Subcellular Elements by T. J. Newman

    Published 2005-07-01
    “…We also discuss efficient algorithms for encoding the model, and give an example of a simulation of an epithelial sheet. …”
    Get full text
    Article
  5. 16585

    A survey on resource allocation in backscatter communication networks by Yongjun XU, Haoke YANG, Yinghui YE, Qianbin CHEN, Guangyue LU

    Published 2021-09-01
    “…With the development of Internet of things (IoT) technology, wireless networks have the characteristics of massive user access, high power consumption, and high capacity requirements.In order to meet the transmission requirements and reduce energy consumption, backscatter communication technology was considered to be one of the most effective solutions to the above problems.In the fact of complex network scenarios, the improvement of spectrum efficiency, system capacity, and energy management has become an urgent problem of resource allocation areas in backscatter communications.For this problem, resource allocation algorithms in backscatter communications were surveyed.Firstly, the basic concept and different network architectures of backscatter communication were introduced.Then, resource allocation algorithms in backscatter communication networks were analyzed according to different network types, optimization objectives, and the number of antennas.Finally, the challenges and future research trends of resource allocation problems in backscatter communication networks were prospected.…”
    Get full text
    Article
  6. 16586

    LAA system dynamic sub-frame configuration strategy in unlicensed bands by Wei JIANG, Shixiao LIU, Heng HU, Chenlu ZHANG

    Published 2016-07-01
    “…The use of dynamic TDD technology in heterogeneous network can effectively increase the system throughput and improve the performance of the system.Due to the limitation of signaling control and other issues,there is usually a dynamic switching between the traditional seven fixed sub-frame ratios in the licensed bands.But as a complement to the LTE system worked in the licensed bands,the unlicensed bands can achieve a more flexible and complete dynamic sub-frame configuration without considering signaling control and other issues.Two new dynamic sub-frame configuration algorithms in unlicensed bands were proposed and compared with traditional static sub-frame configuration,then the impact of dynamic sub-frame allocation algorithms on system performance was verified by LAA system level simulation platform.The results show that the proposed dynamic sub-frame configuration strategies can effectively improve the resource utilization and the overall system throughput.…”
    Get full text
    Article
  7. 16587

    Evaluating the Efficiency and Reliability of Fertilizer Subsidy Systems: The Role of Blockchain in Driving Enhancements in Tanzania by O. D. Mbita, M. R. Nicholaus, R. K. Twahir

    Published 2025-02-01
    “…The proposed hybrid architecture integrates well-structured algorithms to improve operational efficiency and ensure a more secure and fair distribution system. …”
    Get full text
    Article
  8. 16588

    Smart health-care systems for rheumatology by Suneeta Mohanty, Prasant Kumar Pattnaik

    Published 2022-01-01
    “…Wireless sensors, radio-frequency identification technology, Internet of things, and machine learning (ML) algorithms are the underlying technology to implement smart health care. …”
    Get full text
    Article
  9. 16589

    A Firefly Colony and Its Fuzzy Approach for Server Consolidation and Virtual Machine Placement in Cloud Datacenters by Boominathan Perumal, Aramudhan Murugaiyan

    Published 2016-01-01
    “…Managing these resources to handle large number of virtual machine requests has created the need for heuristic optimization algorithms to provide the optimal placement strategies satisfying the objectives and constraints formulated. …”
    Get full text
    Article
  10. 16590

    Research and prospect of reversible data hiding method with contrast enhancement by Yang YANG, Wei-ming ZHANG, ong-dong HOUD, Hui WANG, Neng-hai YU

    Published 2016-04-01
    “…Reversible data hiding methods can recover the cover image losslessly after extracting the secret message from the marked image.Such technology can be used in the certification or the label of military,justice and medical images,which are sensitive and slight modification are not allowed.Especially for the medical images,RDH tech-nology can be used in protecting the privacy of the patient.A series of RDH methods with contrast enhancement ef-fect were introduced and classified into pixel-based histogram methods and prediction-error-based histogram meth-ods according to the type of carrier in RDH scheme.The main purpose of such algorithms was to improve the sub-jective visual quality of marked images and to embed secret data into cover image reversibly meanwhile.These se-ries of algorithms were suitable for the research of privacy protection of medical image.Finally,future development in this direction is prospected through analyzing the advantages and disadvantages of the existing work.…”
    Get full text
    Article
  11. 16591
  12. 16592

    HybridFA:a memory reduction technique for the AC automata based on statistics by Gang XIONG, Hui-min HE, Jing YU, Yan-bing LIU, Li GUO

    Published 2015-07-01
    “…Despite the fast speed in multiple string matching tasks,the advanced Aho-Corasick(AC) automata wastes storage memory to a great extent.Study indicated that the automata states have specific statistical access characteristics in practice.Accordingly,a series of algorithms based on statistical characteristics for building hybrid finite automata,named HybridFA,are proposed.This work completes partial states of the AC automata according to different features,including access frequency,state hierarchy,and combined characteristics respectively.Experimental results on the real-world datasets like Snort,ClamAV,and URL show that the storage space of HybridAC is reduced to less than 5% of the space cost by the advanced AC automata.Furthermore,HybridFA based on combined characteristics achieves the superior performance on matching speed and robustness comparing to other proposed algorithms.…”
    Get full text
    Article
  13. 16593

    Hole Detection for Quantifying Connectivity in Wireless Sensor Networks: A Survey by Pearl Antil, Amita Malik

    Published 2014-01-01
    “…Coverage hole detection schemes have been classified into three categories based on the type of information used by algorithms, computation model, and network dynamics for better understanding. …”
    Get full text
    Article
  14. 16594

    Intrusion detection scheme based on neural network in vehicle network by Yi-liang LIU, Ya-li SHI, Hao FENG, Liang-min WANG

    Published 2014-11-01
    “…Vehicle networking intrusion detection solutions (IDS) can be used to confirm the authenticity of the events described in the notice of traffic incidents.The current Vehicle networking IDS frequently use detection scheme based on the consistency of redundant data,to reduce dependence on redundant data,an intrusion detection scheme based on neural network is presented.The program can be described as a lot of traffic event types ,and the integrated use of the back-propagation (BP) and support vector machine (SVM) two learning algorithms.The two algorithms respectively applicable to personal safety driving fast and efficient transportation system with high detection applications.Simulation results and performance analysis show that our scheme has a faster speed intrusion detection,and has a high detection rate and low false alarm rate.…”
    Get full text
    Article
  15. 16595

    Interference-Aware Fault-Tolerant Energy Spanner in Wireless Ad Hoc Networks by Dong Wang, Wang-Chen Long, Xiao-Hong Li

    Published 2012-12-01
    “…In this paper, we study the problem of power assignment in order that its induced communication graph meets the following properties: (1) it is an energy- t -spanner which is energy efficient; (2) it is k -fault resistant which can withstand up to k - 1 node failures where k   ⩾  1; (3) the interference is minimal. We propose algorithms to address this problem. Both the theoretic analysis and the simulations in the paper prove that our algorithms can induce a k -fault resistant energy spanner and furthermore the interference is minimized. …”
    Get full text
    Article
  16. 16596

    Anti-ransomware method based on active deception by CHEN Kai, MA Duohe, TANG Zhimin, DAI Jun

    Published 2024-07-01
    “…By combining static heuristic algorithms and dynamic heuristic algorithms to dynamically deploy deceptive files, a dynamic file security model based on active deception was established. …”
    Get full text
    Article
  17. 16597

    Multiplicatively weighted Voronoi-based sensor collaborative redeployment in software-defined wireless sensor networks by Minghua Wang, Ran Ou, Yan Wang

    Published 2022-03-01
    “…Finally, we demonstrate the superiority of the confident information coverage–based multiplicatively weighted Voronoi diagram and the effectiveness and efficiency of our proposed algorithms via a series of experiments.…”
    Get full text
    Article
  18. 16598

    Consensus Tracking of Fractional-Order Multiagent Systems via Fractional-Order Iterative Learning Control by Shuaishuai Lv, Mian Pan, Xungen Li, Qi Ma, Tianyi Lan, Bingqiang Li, Wenyu Cai

    Published 2019-01-01
    “…Both distributed PDα-type and Dα-type fractional-order iterative learning control (FOILC) algorithms are proposed. Here, a virtual leader is introduced to generate the desired trajectory, fixed communication topology is considered, and only a subset of followers can access the desired trajectory. …”
    Get full text
    Article
  19. 16599

    Accelerated Reconstruction of Scenes Using CUDA-Based Parallel Computing by Gui Zou, Jin Jiang, Qi Chen

    Published 2025-01-01
    “…Since the drone needs to use an embedded onboard computer and stereo matching algorithms require massive computing resources, this paper studies the optimization of CUDA-based stereo matching algorithms on embedded devices to improve the reconstruction effect of scenes and achieve rapid reconstruction, thereby reducing time costs, and enhancing drone efficiency.…”
    Get full text
    Article
  20. 16600

    Automated Shape Analysis and DEM Study on Graded Crushed Stone by Hao Bai, Ruidong Li, Xiangyu Hu, Fei Chen, Zhiyong Liao

    Published 2021-01-01
    “…In this study, the realistic particle outline is first automatically extracted based on digital image processing and deep learning algorithms. Then, the elongation (EI), roundness (Rd), and roughness (Rg) of GCS are quantified by shape evaluation algorithms. …”
    Get full text
    Article