-
1801
ε-approximate spatial-window aggregation algorithm in wireless sensor networks
Published 2012-02-01“…An efficient ε-approximate spatial-window aggregate query processing technique was proposed to approximate aggregate values over arbitrary regions with arbitrary accuracy.A dynamic programming algorithm was devised to compute minimum number of data to refine approximate summation to reach arbitrary accuracy.The proposed algorithm was efficient to compute minimum/maximum values by only transmitting values promising to be in the exact results in order to reduce energy consumption.The experiment using real-world data demonstrates that the algorithms provide high quality results in arbitrary region and reach arbitrary accuracy with low energy cost.…”
Get full text
Article -
1802
A Hybrid Genetic Algorithm for Satellite Image Downlink Scheduling Problem
Published 2018-01-01“…A schedule generation algorithm (SGA) is proposed to assign the downlink time window for each scheduled request according to a given request permutation. …”
Get full text
Article -
1803
Convergence Rate Estimate of Distributed Localization Algorithms in Wireless Sensor Networks
Published 2015-06-01“…Although existing works established optimal consensus convergence analysis for this algorithm, they did not provide the convergence rate estimate. …”
Get full text
Article -
1804
Robust Beamforming Algorithm for Multibeam Satellite Communication Based on Downlink NOMA
Published 2021-12-01Get full text
Article -
1805
Blockchain data access control scheme based on CP-ABE algorithm
Published 2020-06-01“…Different from the public chain,the consortium blockchain Hyperledger Fabric integrates the additional member management service(MSP) mechanism to provide channel-based data isolation protection.However,the data isolation protection mechanism still synchronizes the plaintext data within a channel,so there is a risk of data leakage.Besides,the channel-based data access control mechanism does not apply to some fine-grained privacy protection scenarios.To solve the problems of data privacy and security involved in the consortium chain Hyperledger mentioned above,a blockchain data access control scheme based on the CP-ABE algorithm was proposed.Based on the original existing Fabric-CA module in the Hyperledger,our scheme can realize the secure distribution of user attribute keys in the CP-ABE scheme while implementing the fine-grained security access control of blockchain data at the user level.The security analysis shows that the scheme achieves the security goals of ABE user attribute private key security distribution and data privacy protection.The performance analysis also shows that the proposed scheme has good usability.…”
Get full text
Article -
1806
Algorithm design on energy efficiency maximization for UAV-assisted edge computing
Published 2020-10-01“…For the unmanned aerial vehicle (UAV)-assisted edge computing system,a two-stage alternative algorithm was proposed to solve the formulated complex non-convex problem.Firstly,the formulated non-linear fractional programming problem was reformulated to the equivalent parametric problem by using Dinkelbach method.Secondly,two sub-problems were further considered based on it.By employing the Lagrange duality method,the closed-form solutions for the central processing unit frequencies and the number of data bits were derived.Finally,based on the solutions obtained,the conditions that the source node prefers to offload/share its data and the relay chooses to forward the computation results,as well as the approaches to achieve high energy efficiency were revealed.Numerical results demonstrate that the proposed design can achieve a performance improvement of up to 20 times over the conventional schemes.…”
Get full text
Article -
1807
Eel and Grouper Optimizer improvement three-stage algorithm for photovoltaic MPPT
Published 2025-03-01Subjects: “…Grasshopper Optimization Algorithm…”
Get full text
Article -
1808
Temporal filtering for target detection algorithm based on static background elimination
Published 2009-01-01“…A new temporal based target detection algorithm was presented by using static background elimination to deal with the drawback of large scale data processing and real-time implementation in temporal filtering.Firstly,a uniform model was developed based on the temporal behavior of different types of pixels.And the parameter of the model was estimated by introducing least square method.Using the new model,static background pixels could be eliminated.Secondly,a minimum filer was designed to obtain the baseline of the temporal profile.Finally,the deviation of the temporal profile and its baseline was analyzed,which led to a detection criterion.Since the target signal was well preserved during the static background elimination and large sale tracking data was eliminated,the method could have higher speed and computational efficiency.Experiments with real image sequences have proved the validity of the new approach.…”
Get full text
Article -
1809
Visual System Inspired Algorithm for Enhanced Visibility in Coronary Angiograms (VIAEVCA)
Published 2025-01-01Subjects: Get full text
Article -
1810
A hybrid indoor localization algorithm based on RSSI and inertial navigation
Published 2017-10-01“…To cater for the requirements of high-precision indoor localization algorithms,a hybrid indoor localization algorithm based on received signal strength identification (RSSI) and inertial navigation was proposed.This algorithm used fingerprint identification algorithm to localize the agents,based on the RSSI values of ZigBee nodes in wireless sensor network.The algorithm combined the inertial information provided by inertial measurement units (IMU),to correct the RSSI localization results.This algorithm used Kalman filter and adopted state equations to describe the dynamic change rules of agents’ positions,thus it achieved a hybrid localization algorithm which relied WSN localization first and IMU last.Simulations evaluate that the proposed algorithm can improve the localization performances of algorithms which adopt RSSI localization and inertial navigation individually,and can greatly improve localization accuracy.…”
Get full text
Article -
1811
Detection algorithm of LSB hidden messages based local image stability
Published 2009-01-01“…Aimed at the characteristics of LSB steganogtaphy, an algorithm based on local image stability was proposed.Combined with the idea of pollution data analysis, the secret information was regarded as noise in the process of informa-tion transmission.Then using the noise analysis technique, and selecting appropriate critical point value to achieve the detection purpose of the secret information.The theoretic analysis and experimental results show that detection algorithm advances than traditional algorithm in low embedding rate.…”
Get full text
Article -
1812
Parallel Implementations of Candidate Solution Evaluation Algorithm for N-Queens Problem
Published 2021-01-01“…The N-Queens problem plays an important role in academic research and practical application. Heuristic algorithm is often used to solve variant 2 of the N-Queens problem. …”
Get full text
Article -
1813
Solving Multiobjective Optimization Problems Using Artificial Bee Colony Algorithm
Published 2011-01-01“…This paper presents a novel algorithm based on artificial bee colony (ABC) to deal with multi-objective optimization problems. …”
Get full text
Article -
1814
A quality assessment algorithm for no-reference images based on transfer learning
Published 2025-01-01“…In this article, we propose a novel no-reference IQA algorithm based on transfer learning (IQA-NRTL). This algorithm leverages a deep convolutional neural network (CNN) due to its ability to effectively capture multi-scale semantic information features, which are essential for representing the complex visual perception in images. …”
Get full text
Article -
1815
Survey algorithm for cold and hot water supply systems of residential buildings
Published 2023-10-01Get full text
Article -
1816
Traffic identification of network business based on multi-layer cascade algorithm
Published 2015-12-01Subjects: Get full text
Article -
1817
A Generalized Gradient Projection Filter Algorithm for Inequality Constrained Optimization
Published 2013-01-01“…A generalized gradient projection filter algorithm for inequality constrained optimization is presented. …”
Get full text
Article -
1818
Research on the Wavelet Denoising Algorithm for Thorpe Analysis Based on the Radiosonde Data
Published 2025-01-01Get full text
Article -
1819
Improved information hiding algorithm based on twice positioning in coding channel
Published 2013-12-01“…Based on analysis of existing information hiding algorithms and capacities in coding channel,the defects of those existing algorithms were pointed out,and an improved information hiding algorithm with capacity upper limit analysis and based on twice positioning was proposed.the proposed algorithm,the information hiding capacity upper limit is firstly computed before embedding,and used for comparison with the size of hiding secret data.Then,twice posi-tioning scheme and cyclic shift mechanism for choosing the embedding position were used in the proposed algorithm.Simulation results show that,compared with those existing algorithms,the proposed algorithm is able to avoid the risk of exposure of the secret channel caused by capacity exceeding of hiding data.It can not only improve the randomness of the embedding position,but also avoid the risk of overlap among different secret data.The hiding performances of the coding channel information hiding system are improved.…”
Get full text
Article -
1820
Research on Energy Saving Algorithm of 5G Relay Cellular Network
Published 2015-03-01“…The energy saving issue of 5G relay cellular network was discussed.Relay technology is an important technology in the fifth generation mobile communication network(5G).By switching some base stations with low traffic into sleep mode,the energy can be saved.Therefore,the state of base stations in 5G may convert usually,the network topology and business changed over time.Considering both quality of service(QoS)and power consumption of the whole network,a dynamic energy saving(DES)algorithm was proposed to optimize the overall performance of QoS and energy efficiency for 5G relay cellular network.Simulation results under different traffic conditions demonstrate that the DES algorithm can reconfigure the network,shut down part of the base station and relay nodes to significantly reduce energy consumption,especially when the network load is low.…”
Get full text
Article