Showing 1,801 - 1,820 results of 19,511 for search '"algorithm"', query time: 0.09s Refine Results
  1. 1801

    ε-approximate spatial-window aggregation algorithm in wireless sensor networks by Jing GAO, Jian-zhong LI, Yu LIU

    Published 2012-02-01
    “…An efficient ε-approximate spatial-window aggregate query processing technique was proposed to approximate aggregate values over arbitrary regions with arbitrary accuracy.A dynamic programming algorithm was devised to compute minimum number of data to refine approximate summation to reach arbitrary accuracy.The proposed algorithm was efficient to compute minimum/maximum values by only transmitting values promising to be in the exact results in order to reduce energy consumption.The experiment using real-world data demonstrates that the algorithms provide high quality results in arbitrary region and reach arbitrary accuracy with low energy cost.…”
    Get full text
    Article
  2. 1802

    A Hybrid Genetic Algorithm for Satellite Image Downlink Scheduling Problem by Bingyu Song, Feng Yao, Yuning Chen, Yingguo Chen, Yingwu Chen

    Published 2018-01-01
    “…A schedule generation algorithm (SGA) is proposed to assign the downlink time window for each scheduled request according to a given request permutation. …”
    Get full text
    Article
  3. 1803

    Convergence Rate Estimate of Distributed Localization Algorithms in Wireless Sensor Networks by Shujuan Pang

    Published 2015-06-01
    “…Although existing works established optimal consensus convergence analysis for this algorithm, they did not provide the convergence rate estimate. …”
    Get full text
    Article
  4. 1804
  5. 1805

    Blockchain data access control scheme based on CP-ABE algorithm by Yunxiang QIU, Hongxia ZHANG, Qi CAO, Jiancong ZHANG, Xingshu CHEN, Hongjian JIN

    Published 2020-06-01
    “…Different from the public chain,the consortium blockchain Hyperledger Fabric integrates the additional member management service(MSP) mechanism to provide channel-based data isolation protection.However,the data isolation protection mechanism still synchronizes the plaintext data within a channel,so there is a risk of data leakage.Besides,the channel-based data access control mechanism does not apply to some fine-grained privacy protection scenarios.To solve the problems of data privacy and security involved in the consortium chain Hyperledger mentioned above,a blockchain data access control scheme based on the CP-ABE algorithm was proposed.Based on the original existing Fabric-CA module in the Hyperledger,our scheme can realize the secure distribution of user attribute keys in the CP-ABE scheme while implementing the fine-grained security access control of blockchain data at the user level.The security analysis shows that the scheme achieves the security goals of ABE user attribute private key security distribution and data privacy protection.The performance analysis also shows that the proposed scheme has good usability.…”
    Get full text
    Article
  6. 1806

    Algorithm design on energy efficiency maximization for UAV-assisted edge computing by Qihui WU, Wei WU

    Published 2020-10-01
    “…For the unmanned aerial vehicle (UAV)-assisted edge computing system,a two-stage alternative algorithm was proposed to solve the formulated complex non-convex problem.Firstly,the formulated non-linear fractional programming problem was reformulated to the equivalent parametric problem by using Dinkelbach method.Secondly,two sub-problems were further considered based on it.By employing the Lagrange duality method,the closed-form solutions for the central processing unit frequencies and the number of data bits were derived.Finally,based on the solutions obtained,the conditions that the source node prefers to offload/share its data and the relay chooses to forward the computation results,as well as the approaches to achieve high energy efficiency were revealed.Numerical results demonstrate that the proposed design can achieve a performance improvement of up to 20 times over the conventional schemes.…”
    Get full text
    Article
  7. 1807

    Eel and Grouper Optimizer improvement three-stage algorithm for photovoltaic MPPT by ZiJian Zhou, YanHong Fang

    Published 2025-03-01
    Subjects: “…Grasshopper Optimization Algorithm…”
    Get full text
    Article
  8. 1808

    Temporal filtering for target detection algorithm based on static background elimination by WANG Bo, LIU De-lian, ZHANG Jian-qi

    Published 2009-01-01
    “…A new temporal based target detection algorithm was presented by using static background elimination to deal with the drawback of large scale data processing and real-time implementation in temporal filtering.Firstly,a uniform model was developed based on the temporal behavior of different types of pixels.And the parameter of the model was estimated by introducing least square method.Using the new model,static background pixels could be eliminated.Secondly,a minimum filer was designed to obtain the baseline of the temporal profile.Finally,the deviation of the temporal profile and its baseline was analyzed,which led to a detection criterion.Since the target signal was well preserved during the static background elimination and large sale tracking data was eliminated,the method could have higher speed and computational efficiency.Experiments with real image sequences have proved the validity of the new approach.…”
    Get full text
    Article
  9. 1809
  10. 1810

    A hybrid indoor localization algorithm based on RSSI and inertial navigation by Yaping ZHU, Weiwei XIA, Yueyue ZHANG, Feng YAN, Xuzhou ZUO, Lianfeng SHEN

    Published 2017-10-01
    “…To cater for the requirements of high-precision indoor localization algorithms,a hybrid indoor localization algorithm based on received signal strength identification (RSSI) and inertial navigation was proposed.This algorithm used fingerprint identification algorithm to localize the agents,based on the RSSI values of ZigBee nodes in wireless sensor network.The algorithm combined the inertial information provided by inertial measurement units (IMU),to correct the RSSI localization results.This algorithm used Kalman filter and adopted state equations to describe the dynamic change rules of agents’ positions,thus it achieved a hybrid localization algorithm which relied WSN localization first and IMU last.Simulations evaluate that the proposed algorithm can improve the localization performances of algorithms which adopt RSSI localization and inertial navigation individually,and can greatly improve localization accuracy.…”
    Get full text
    Article
  11. 1811

    Detection algorithm of LSB hidden messages based local image stability by ZHANG Qiu-yu, LIU Hong-guo, YUAN Zhan-ting

    Published 2009-01-01
    “…Aimed at the characteristics of LSB steganogtaphy, an algorithm based on local image stability was proposed.Combined with the idea of pollution data analysis, the secret information was regarded as noise in the process of informa-tion transmission.Then using the noise analysis technique, and selecting appropriate critical point value to achieve the detection purpose of the secret information.The theoretic analysis and experimental results show that detection algorithm advances than traditional algorithm in low embedding rate.…”
    Get full text
    Article
  12. 1812

    Parallel Implementations of Candidate Solution Evaluation Algorithm for N-Queens Problem by Jianli Cao, Zhikui Chen, Yuxin Wang, He Guo

    Published 2021-01-01
    “…The N-Queens problem plays an important role in academic research and practical application. Heuristic algorithm is often used to solve variant 2 of the N-Queens problem. …”
    Get full text
    Article
  13. 1813

    Solving Multiobjective Optimization Problems Using Artificial Bee Colony Algorithm by Wenping Zou, Yunlong Zhu, Hanning Chen, Beiwei Zhang

    Published 2011-01-01
    “…This paper presents a novel algorithm based on artificial bee colony (ABC) to deal with multi-objective optimization problems. …”
    Get full text
    Article
  14. 1814

    A quality assessment algorithm for no-reference images based on transfer learning by Yang Yang, Chang Liu, Hui Wu, Dingguo Yu

    Published 2025-01-01
    “…In this article, we propose a novel no-reference IQA algorithm based on transfer learning (IQA-NRTL). This algorithm leverages a deep convolutional neural network (CNN) due to its ability to effectively capture multi-scale semantic information features, which are essential for representing the complex visual perception in images. …”
    Get full text
    Article
  15. 1815
  16. 1816
  17. 1817

    A Generalized Gradient Projection Filter Algorithm for Inequality Constrained Optimization by Wei Wang, Shaoli Hua, Junjie Tang

    Published 2013-01-01
    “…A generalized gradient projection filter algorithm for inequality constrained optimization is presented. …”
    Get full text
    Article
  18. 1818
  19. 1819

    Improved information hiding algorithm based on twice positioning in coding channel by Li-quan CHEN, Miao LU, Ai-qun HU, Xiao-yan SUN

    Published 2013-12-01
    “…Based on analysis of existing information hiding algorithms and capacities in coding channel,the defects of those existing algorithms were pointed out,and an improved information hiding algorithm with capacity upper limit analysis and based on twice positioning was proposed.the proposed algorithm,the information hiding capacity upper limit is firstly computed before embedding,and used for comparison with the size of hiding secret data.Then,twice posi-tioning scheme and cyclic shift mechanism for choosing the embedding position were used in the proposed algorithm.Simulation results show that,compared with those existing algorithms,the proposed algorithm is able to avoid the risk of exposure of the secret channel caused by capacity exceeding of hiding data.It can not only improve the randomness of the embedding position,but also avoid the risk of overlap among different secret data.The hiding performances of the coding channel information hiding system are improved.…”
    Get full text
    Article
  20. 1820

    Research on Energy Saving Algorithm of 5G Relay Cellular Network by Yangbo Guo, Zhizhong Zhang, Haonan Hu, Fang Cheng

    Published 2015-03-01
    “…The energy saving issue of 5G relay cellular network was discussed.Relay technology is an important technology in the fifth generation mobile communication network(5G).By switching some base stations with low traffic into sleep mode,the energy can be saved.Therefore,the state of base stations in 5G may convert usually,the network topology and business changed over time.Considering both quality of service(QoS)and power consumption of the whole network,a dynamic energy saving(DES)algorithm was proposed to optimize the overall performance of QoS and energy efficiency for 5G relay cellular network.Simulation results under different traffic conditions demonstrate that the DES algorithm can reconfigure the network,shut down part of the base station and relay nodes to significantly reduce energy consumption,especially when the network load is low.…”
    Get full text
    Article