Showing 1,881 - 1,900 results of 19,511 for search '"algorithm"', query time: 0.09s Refine Results
  1. 1881

    Approximate Iteration Algorithm with Error Estimate for Fixed Point of Nonexpansive Mappings by Yongfu Su

    Published 2012-01-01
    “…Meanwhile, a approximate iteration algorithm is presented which is used to calculate the fixed point of nonexpansive mapping and solution of variational inequality, the error estimate is also given. …”
    Get full text
    Article
  2. 1882
  3. 1883
  4. 1884
  5. 1885

    Dummy location selection algorithm based on location semantics and query probability by Jie WANG, Chunru WANG, Jianfeng MA, Hongtao LI

    Published 2020-03-01
    “…Aiming at the problem of privacy leakage caused by attackers possessing background knowledge in traditional location privacy protection schemes,a dummy location selection algorithm based on location semantics and query probability was proposed.Under the conditions that the locations in the dummy location set satisfied semantic difference,similar query probability,and geographically dispersed,it avoided attackers who filter dummy locations by combining background knowledge,and the accuracy of query results was guaranteed.Simulation experiments verify that the proposed algorithm can effectively protect the user’s location privacy.…”
    Get full text
    Article
  6. 1886

    Spam filtering algorithm based on geographic E-mail path analysis by ZHANG Ni1, JIANG Yu2, FANG Bin-xing1, LI Guo1

    Published 2007-01-01
    “…A geographic E-mail path based algorithm called GEPA(geographic E-mail path analysis) was proposed to al-low network administrators to cut off spam traffic on E-mail delivery.The algorithm first extracted route information to build E-mail path subset,and then uesed an effective method mapping IP addresses or domain names of nodes in an E-mail path into geographic information.Further,the algorithm detected spam by their geographic information deviation,using E-mail traffics from a link of backbone border router in China,which crosses the country boundary of China,the performance of GEPA algorithm is evaluated.The experimental results indicated that a 13.9% reduction of E-mail can be achieved with method.The results also showed GEPA was effective and practical which can be implemented in a mas-sive traffic environment handling over millions of mails every day with small memory consumption.…”
    Get full text
    Article
  7. 1887

    Contention graph based concurrent scheduling algorithm in millimeter wave WPAN by Yibing WANG, Yong NIU, Weiguang DING, Hao WU

    Published 2019-01-01
    “…The directional antennas and beamforming techniques in millimeter wave (mmWave) bands are used to make concurrent transmission between multiple flows become possible.However,higher mutual interference may be caused by concurrent transmission.Therefore,when the time slots were limited and the number of data flows was large,how to schedule the concurrent flows efficiently was solved by proposed algorithm.The contention graph based spatial-time division multiple access (CB-STDMA) concurrent scheduling algorithm guaranteed the quality of service (QoS) of users,and aimed at maximizing the number of flows with their QoS requirements satisfied.It considered the interference between different flows,and a higher priority was given to the flow with fewer time slots requirement.Extensive simulations demonstrated that the proposed CB-STDMA algorithm increased the number of flows with their QoS requirements satisfied and the network throughput by 50% and 20% respectively compared with the existing algorithms.…”
    Get full text
    Article
  8. 1888

    A Novel Edge Detection Algorithm for Mobile Robot Path Planning by Rami Al-Jarrah, Mohammad Al-Jarrah, Hubert Roth

    Published 2018-01-01
    “…A novel detection algorithm for vision systems has been proposed based on combined fuzzy image processing and bacterial algorithm. …”
    Get full text
    Article
  9. 1889

    A Secure Image Encryption Algorithm Based on Rubik's Cube Principle by Khaled Loukhaoukha, Jean-Yves Chouinard, Abdellah Berdai

    Published 2012-01-01
    “…In the past few years, several encryption algorithms based on chaotic systems have been proposed as means to protect digital images against cryptographic attacks. …”
    Get full text
    Article
  10. 1890

    A Hybrid Strategy Two‐Dimensional Concrete Aggregate Filling Algorithm by Xu Tian, Jun Ao, ChunBo Ma, JunJie Shi, HanJun Guo

    Published 2025-01-01
    “…The results show that the algorithm can rapidly generate more than 75% aggregate packing density concrete specimens and significantly outperforms similar algorithms regarding aggregate placement efficiency and model generation time. …”
    Get full text
    Article
  11. 1891

    Improved Laplacian Biogeography-Based Optimization Algorithm and Its Application to QAP by Xinming Zhang, Doudou Wang, Haiyan Chen, Wentao Mao, Shangwang Liu, Guoqi Liu, Zhi Dou

    Published 2020-01-01
    “…A lot of experimental results on the complex functions from the CEC-2013 test set show ILxBBO obtains better performance than LxBBO and quite a few state-of-the-art algorithms do. Also, the results on Quadratic Assignment Problems (QAPs) show that ILxBBO is more competitive compared with LxBBO, Improved Particle Swarm Optimization (IPSO), and Improved Firefly Algorithm (IFA).…”
    Get full text
    Article
  12. 1892

    Student knowledge tracking based multi-indicator exercise recommendation algorithm by Bin ZHUGE, Zhenghu YIN, Wenxue SI, Lei YAN, Ligang DONG, Xian JIANG

    Published 2022-09-01
    “…Personalized exercise recommendation was an important topic in the era of education informatization, the forgetting laws of students in the learning process were ignored by the traditional problem recommendation algorithm, which failed to fully tap the students’ knowledge mastery level and the common characteristics of similar students, insufficient, could not reasonably promote students’ learning of new knowledge or help students find and fill omissions.In view of the above defects, a multi-index exercise recommendation method based on student knowledge tracking was proposed, which was divided into two modules: preliminary screening and re-filtering of exercises, focusing on the novelty, difficulty and diversity of exercise recommendation.Firstly, a knowledge probability prediction (SF-KCCP) model combined with students’ forgetting law was constructed to ensure the novelty of the recommended exercises.Then, students’ knowledge and concept mastery level was accurately excavated based on the dynamic key-value knowledge tracking (DKVMN) model to ensure that exercises of appropriate difficulty were recommended.Finally, the user-based collaborative filtering (UserCF) algorithm was integrated into the re-filtering module, and the similarity between student groups was used to achieve the diversity of recommendation results.The proposed method is demonstrated by extensive experiments to achieve better performance than some existing baseline models.…”
    Get full text
    Article
  13. 1893

    Effective Evolutionary Algorithm for Solving the Real-Resource-Constrained Scheduling Problem by Huu Dang Quoc, Loc Nguyen The, Cuong Nguyen Doan, Naixue Xiong

    Published 2020-01-01
    “…Experimental results on the iMOPSE simulation dataset show that the proposed algorithm achieves better solution quality than the existing algorithms, while the experimental results on the TNG dataset have proved that the proposed algorithm decreases the execution time of current production lines at the TNG company.…”
    Get full text
    Article
  14. 1894
  15. 1895

    Distributed K-Means algorithm based on a Spark optimization sample. by Yongan Feng, Jiapeng Zou, Wanjun Liu, Fu Lv

    Published 2024-01-01
    “…To address the instability and performance issues of the classical K-Means algorithm when dealing with massive datasets, we propose SOSK-Means, an improved K-Means algorithm based on Spark optimization. …”
    Get full text
    Article
  16. 1896

    Sparsity induced convex nonnegative matrix factorization algorithm with manifold regularization by Feiyue QIU, Bowen CHEN, Tieming CHEN, Guodao ZHANG

    Published 2020-05-01
    “…To address problems that the effectiveness of feature learned from real noisy data by classical nonnegative matrix factorization method,a novel sparsity induced manifold regularized convex nonnegative matrix factorization algorithm (SGCNMF) was proposed.Based on manifold regularization,the L<sub>2,1</sub>norm was introduced to the basis matrix of low dimensional subspace as sparse constraint.The multiplicative update rules were given and the convergence of the algorithm was analyzed.Clustering experiment was designed to verify the effectiveness of learned features within various of noisy environments.The empirical study based on K-means clustering shows that the sparse constraint reduces the representation of noisy features and the new method is better than the 8 similar algorithms with stronger robustness to a variable extent.…”
    Get full text
    Article
  17. 1897

    An improved YOLOv4 algorithm for pedestrian detection in complex visual scenes by Shuai KANG, Jianwu ZHANG, Zunjie ZHU, Guofeng TONG

    Published 2021-08-01
    “…At present, the difficulty of pedestrian detection has been dramatically increased because of some problems, such as the dark or exposed illumination, bad weather, serious occlusion, large difference size of pedestrians and blurred images in complex visual scenes.Therefore, an improved YOLOv4 algorithm was proposed, which improved the detection performance of pedestrian detection in complex visual scenes, aiming at the problems of low accuracy and highly missed detection rate.Firstly, the self-annotation data set pedetrian were constructed.Secondly, the hybrid dilated convolution (HDC) was added into the backbone network to improve the ability of pedestrian feature extraction.Finally, in order to obtain more detailed feature, the spatial jagged dilated convolution (SJDC) structure was proposed to replace the spatial pyramid pooling structure.The experimental results show that the average precision (AP) of the proposed algorithm can achieve 90.08%.The proposed algorithm can substantially improve AP by 7.2%, and the log-average miss rate (LAMR) reduce by 13.69% compared with the original YOLOv4 algorithm.…”
    Get full text
    Article
  18. 1898

    Crime Prediction Using Decision Tree (J48) Classification Algorithm. by Ivan, Niyonzima, Emmanuel Ahishakiye, Elisha Opiyo Omulo, Danison Taremwa

    Published 2018
    Subjects: “…crime prediction; machine learning; decision tree; J48; artificial intelligence; Classification Algorithms.…”
    Get full text
    Article
  19. 1899
  20. 1900