-
16581
Optimized Naive-Bayes and Decision Tree Approaches for fMRI Smoking Cessation Classification
Published 2018-01-01“…The scientific research goal of this study was to interpret the fMRI connectivity maps based on machine learning algorithms to predict the patient who will relapse and the one who will not. …”
Get full text
Article -
16582
Testing Data Cloning as the Basis of an Estimator for the Stochastic Volatility in Mean Model
Published 2023-01-01“…This study introduces a Bayesian methodology that leverages data-cloning algorithms to obtain maximum likelihood estimates for SV and SVM model parameters. …”
Get full text
Article -
16583
An Improved Sensitivity Method for the Simultaneous Identification of Unknown Parameters and External Loads of Nonlinear Structures
Published 2018-01-01“…Because structures may be subject to unknown loads and may simultaneously involve unknown parameters and because simple load identification or parameter identification algorithms cannot be applied under such conditions, it is necessary to seek algorithms that can simultaneously identify unknown parameters and external loads of structures. …”
Get full text
Article -
16584
Modeling Multicellular Systems Using Subcellular Elements
Published 2005-07-01“…We also discuss efficient algorithms for encoding the model, and give an example of a simulation of an epithelial sheet. …”
Get full text
Article -
16585
A survey on resource allocation in backscatter communication networks
Published 2021-09-01“…With the development of Internet of things (IoT) technology, wireless networks have the characteristics of massive user access, high power consumption, and high capacity requirements.In order to meet the transmission requirements and reduce energy consumption, backscatter communication technology was considered to be one of the most effective solutions to the above problems.In the fact of complex network scenarios, the improvement of spectrum efficiency, system capacity, and energy management has become an urgent problem of resource allocation areas in backscatter communications.For this problem, resource allocation algorithms in backscatter communications were surveyed.Firstly, the basic concept and different network architectures of backscatter communication were introduced.Then, resource allocation algorithms in backscatter communication networks were analyzed according to different network types, optimization objectives, and the number of antennas.Finally, the challenges and future research trends of resource allocation problems in backscatter communication networks were prospected.…”
Get full text
Article -
16586
LAA system dynamic sub-frame configuration strategy in unlicensed bands
Published 2016-07-01“…The use of dynamic TDD technology in heterogeneous network can effectively increase the system throughput and improve the performance of the system.Due to the limitation of signaling control and other issues,there is usually a dynamic switching between the traditional seven fixed sub-frame ratios in the licensed bands.But as a complement to the LTE system worked in the licensed bands,the unlicensed bands can achieve a more flexible and complete dynamic sub-frame configuration without considering signaling control and other issues.Two new dynamic sub-frame configuration algorithms in unlicensed bands were proposed and compared with traditional static sub-frame configuration,then the impact of dynamic sub-frame allocation algorithms on system performance was verified by LAA system level simulation platform.The results show that the proposed dynamic sub-frame configuration strategies can effectively improve the resource utilization and the overall system throughput.…”
Get full text
Article -
16587
Evaluating the Efficiency and Reliability of Fertilizer Subsidy Systems: The Role of Blockchain in Driving Enhancements in Tanzania
Published 2025-02-01“…The proposed hybrid architecture integrates well-structured algorithms to improve operational efficiency and ensure a more secure and fair distribution system. …”
Get full text
Article -
16588
Smart health-care systems for rheumatology
Published 2022-01-01“…Wireless sensors, radio-frequency identification technology, Internet of things, and machine learning (ML) algorithms are the underlying technology to implement smart health care. …”
Get full text
Article -
16589
A Firefly Colony and Its Fuzzy Approach for Server Consolidation and Virtual Machine Placement in Cloud Datacenters
Published 2016-01-01“…Managing these resources to handle large number of virtual machine requests has created the need for heuristic optimization algorithms to provide the optimal placement strategies satisfying the objectives and constraints formulated. …”
Get full text
Article -
16590
Research and prospect of reversible data hiding method with contrast enhancement
Published 2016-04-01“…Reversible data hiding methods can recover the cover image losslessly after extracting the secret message from the marked image.Such technology can be used in the certification or the label of military,justice and medical images,which are sensitive and slight modification are not allowed.Especially for the medical images,RDH tech-nology can be used in protecting the privacy of the patient.A series of RDH methods with contrast enhancement ef-fect were introduced and classified into pixel-based histogram methods and prediction-error-based histogram meth-ods according to the type of carrier in RDH scheme.The main purpose of such algorithms was to improve the sub-jective visual quality of marked images and to embed secret data into cover image reversibly meanwhile.These se-ries of algorithms were suitable for the research of privacy protection of medical image.Finally,future development in this direction is prospected through analyzing the advantages and disadvantages of the existing work.…”
Get full text
Article -
16591
Chaos in a System with an Absolute Nonlinearity and Chaos Synchronization
Published 2018-01-01Get full text
Article -
16592
HybridFA:a memory reduction technique for the AC automata based on statistics
Published 2015-07-01“…Despite the fast speed in multiple string matching tasks,the advanced Aho-Corasick(AC) automata wastes storage memory to a great extent.Study indicated that the automata states have specific statistical access characteristics in practice.Accordingly,a series of algorithms based on statistical characteristics for building hybrid finite automata,named HybridFA,are proposed.This work completes partial states of the AC automata according to different features,including access frequency,state hierarchy,and combined characteristics respectively.Experimental results on the real-world datasets like Snort,ClamAV,and URL show that the storage space of HybridAC is reduced to less than 5% of the space cost by the advanced AC automata.Furthermore,HybridFA based on combined characteristics achieves the superior performance on matching speed and robustness comparing to other proposed algorithms.…”
Get full text
Article -
16593
Hole Detection for Quantifying Connectivity in Wireless Sensor Networks: A Survey
Published 2014-01-01“…Coverage hole detection schemes have been classified into three categories based on the type of information used by algorithms, computation model, and network dynamics for better understanding. …”
Get full text
Article -
16594
Intrusion detection scheme based on neural network in vehicle network
Published 2014-11-01“…Vehicle networking intrusion detection solutions (IDS) can be used to confirm the authenticity of the events described in the notice of traffic incidents.The current Vehicle networking IDS frequently use detection scheme based on the consistency of redundant data,to reduce dependence on redundant data,an intrusion detection scheme based on neural network is presented.The program can be described as a lot of traffic event types ,and the integrated use of the back-propagation (BP) and support vector machine (SVM) two learning algorithms.The two algorithms respectively applicable to personal safety driving fast and efficient transportation system with high detection applications.Simulation results and performance analysis show that our scheme has a faster speed intrusion detection,and has a high detection rate and low false alarm rate.…”
Get full text
Article -
16595
Interference-Aware Fault-Tolerant Energy Spanner in Wireless Ad Hoc Networks
Published 2012-12-01“…In this paper, we study the problem of power assignment in order that its induced communication graph meets the following properties: (1) it is an energy- t -spanner which is energy efficient; (2) it is k -fault resistant which can withstand up to k - 1 node failures where k ⩾ 1; (3) the interference is minimal. We propose algorithms to address this problem. Both the theoretic analysis and the simulations in the paper prove that our algorithms can induce a k -fault resistant energy spanner and furthermore the interference is minimized. …”
Get full text
Article -
16596
Anti-ransomware method based on active deception
Published 2024-07-01“…By combining static heuristic algorithms and dynamic heuristic algorithms to dynamically deploy deceptive files, a dynamic file security model based on active deception was established. …”
Get full text
Article -
16597
Multiplicatively weighted Voronoi-based sensor collaborative redeployment in software-defined wireless sensor networks
Published 2022-03-01“…Finally, we demonstrate the superiority of the confident information coverage–based multiplicatively weighted Voronoi diagram and the effectiveness and efficiency of our proposed algorithms via a series of experiments.…”
Get full text
Article -
16598
Consensus Tracking of Fractional-Order Multiagent Systems via Fractional-Order Iterative Learning Control
Published 2019-01-01“…Both distributed PDα-type and Dα-type fractional-order iterative learning control (FOILC) algorithms are proposed. Here, a virtual leader is introduced to generate the desired trajectory, fixed communication topology is considered, and only a subset of followers can access the desired trajectory. …”
Get full text
Article -
16599
Accelerated Reconstruction of Scenes Using CUDA-Based Parallel Computing
Published 2025-01-01“…Since the drone needs to use an embedded onboard computer and stereo matching algorithms require massive computing resources, this paper studies the optimization of CUDA-based stereo matching algorithms on embedded devices to improve the reconstruction effect of scenes and achieve rapid reconstruction, thereby reducing time costs, and enhancing drone efficiency.…”
Get full text
Article -
16600
Automated Shape Analysis and DEM Study on Graded Crushed Stone
Published 2021-01-01“…In this study, the realistic particle outline is first automatically extracted based on digital image processing and deep learning algorithms. Then, the elongation (EI), roundness (Rd), and roughness (Rg) of GCS are quantified by shape evaluation algorithms. …”
Get full text
Article