-
1881
Approximate Iteration Algorithm with Error Estimate for Fixed Point of Nonexpansive Mappings
Published 2012-01-01“…Meanwhile, a approximate iteration algorithm is presented which is used to calculate the fixed point of nonexpansive mapping and solution of variational inequality, the error estimate is also given. …”
Get full text
Article -
1882
Improved Backpropagation Using Genetic Algorithm for Prediction of Anomalies and Data Unavailability
Published 2024-08-01Subjects: Get full text
Article -
1883
Multi-microgrid marketized transaction models and algorithms based on smart contracts
Published 2020-08-01Get full text
Article -
1884
Research and implementation of reconfigurable SM4 cryptographic algorithm based on HRCA
Published 2020-10-01Subjects: Get full text
Article -
1885
Dummy location selection algorithm based on location semantics and query probability
Published 2020-03-01“…Aiming at the problem of privacy leakage caused by attackers possessing background knowledge in traditional location privacy protection schemes,a dummy location selection algorithm based on location semantics and query probability was proposed.Under the conditions that the locations in the dummy location set satisfied semantic difference,similar query probability,and geographically dispersed,it avoided attackers who filter dummy locations by combining background knowledge,and the accuracy of query results was guaranteed.Simulation experiments verify that the proposed algorithm can effectively protect the user’s location privacy.…”
Get full text
Article -
1886
Spam filtering algorithm based on geographic E-mail path analysis
Published 2007-01-01“…A geographic E-mail path based algorithm called GEPA(geographic E-mail path analysis) was proposed to al-low network administrators to cut off spam traffic on E-mail delivery.The algorithm first extracted route information to build E-mail path subset,and then uesed an effective method mapping IP addresses or domain names of nodes in an E-mail path into geographic information.Further,the algorithm detected spam by their geographic information deviation,using E-mail traffics from a link of backbone border router in China,which crosses the country boundary of China,the performance of GEPA algorithm is evaluated.The experimental results indicated that a 13.9% reduction of E-mail can be achieved with method.The results also showed GEPA was effective and practical which can be implemented in a mas-sive traffic environment handling over millions of mails every day with small memory consumption.…”
Get full text
Article -
1887
Contention graph based concurrent scheduling algorithm in millimeter wave WPAN
Published 2019-01-01“…The directional antennas and beamforming techniques in millimeter wave (mmWave) bands are used to make concurrent transmission between multiple flows become possible.However,higher mutual interference may be caused by concurrent transmission.Therefore,when the time slots were limited and the number of data flows was large,how to schedule the concurrent flows efficiently was solved by proposed algorithm.The contention graph based spatial-time division multiple access (CB-STDMA) concurrent scheduling algorithm guaranteed the quality of service (QoS) of users,and aimed at maximizing the number of flows with their QoS requirements satisfied.It considered the interference between different flows,and a higher priority was given to the flow with fewer time slots requirement.Extensive simulations demonstrated that the proposed CB-STDMA algorithm increased the number of flows with their QoS requirements satisfied and the network throughput by 50% and 20% respectively compared with the existing algorithms.…”
Get full text
Article -
1888
A Novel Edge Detection Algorithm for Mobile Robot Path Planning
Published 2018-01-01“…A novel detection algorithm for vision systems has been proposed based on combined fuzzy image processing and bacterial algorithm. …”
Get full text
Article -
1889
A Secure Image Encryption Algorithm Based on Rubik's Cube Principle
Published 2012-01-01“…In the past few years, several encryption algorithms based on chaotic systems have been proposed as means to protect digital images against cryptographic attacks. …”
Get full text
Article -
1890
A Hybrid Strategy Two‐Dimensional Concrete Aggregate Filling Algorithm
Published 2025-01-01“…The results show that the algorithm can rapidly generate more than 75% aggregate packing density concrete specimens and significantly outperforms similar algorithms regarding aggregate placement efficiency and model generation time. …”
Get full text
Article -
1891
Improved Laplacian Biogeography-Based Optimization Algorithm and Its Application to QAP
Published 2020-01-01“…A lot of experimental results on the complex functions from the CEC-2013 test set show ILxBBO obtains better performance than LxBBO and quite a few state-of-the-art algorithms do. Also, the results on Quadratic Assignment Problems (QAPs) show that ILxBBO is more competitive compared with LxBBO, Improved Particle Swarm Optimization (IPSO), and Improved Firefly Algorithm (IFA).…”
Get full text
Article -
1892
Student knowledge tracking based multi-indicator exercise recommendation algorithm
Published 2022-09-01“…Personalized exercise recommendation was an important topic in the era of education informatization, the forgetting laws of students in the learning process were ignored by the traditional problem recommendation algorithm, which failed to fully tap the students’ knowledge mastery level and the common characteristics of similar students, insufficient, could not reasonably promote students’ learning of new knowledge or help students find and fill omissions.In view of the above defects, a multi-index exercise recommendation method based on student knowledge tracking was proposed, which was divided into two modules: preliminary screening and re-filtering of exercises, focusing on the novelty, difficulty and diversity of exercise recommendation.Firstly, a knowledge probability prediction (SF-KCCP) model combined with students’ forgetting law was constructed to ensure the novelty of the recommended exercises.Then, students’ knowledge and concept mastery level was accurately excavated based on the dynamic key-value knowledge tracking (DKVMN) model to ensure that exercises of appropriate difficulty were recommended.Finally, the user-based collaborative filtering (UserCF) algorithm was integrated into the re-filtering module, and the similarity between student groups was used to achieve the diversity of recommendation results.The proposed method is demonstrated by extensive experiments to achieve better performance than some existing baseline models.…”
Get full text
Article -
1893
Effective Evolutionary Algorithm for Solving the Real-Resource-Constrained Scheduling Problem
Published 2020-01-01“…Experimental results on the iMOPSE simulation dataset show that the proposed algorithm achieves better solution quality than the existing algorithms, while the experimental results on the TNG dataset have proved that the proposed algorithm decreases the execution time of current production lines at the TNG company.…”
Get full text
Article -
1894
Retracted: Research on Dual Mode Target Detection Algorithm for Embedded Platform
Published 2024-01-01Get full text
Article -
1895
Distributed K-Means algorithm based on a Spark optimization sample.
Published 2024-01-01“…To address the instability and performance issues of the classical K-Means algorithm when dealing with massive datasets, we propose SOSK-Means, an improved K-Means algorithm based on Spark optimization. …”
Get full text
Article -
1896
Sparsity induced convex nonnegative matrix factorization algorithm with manifold regularization
Published 2020-05-01“…To address problems that the effectiveness of feature learned from real noisy data by classical nonnegative matrix factorization method,a novel sparsity induced manifold regularized convex nonnegative matrix factorization algorithm (SGCNMF) was proposed.Based on manifold regularization,the L<sub>2,1</sub>norm was introduced to the basis matrix of low dimensional subspace as sparse constraint.The multiplicative update rules were given and the convergence of the algorithm was analyzed.Clustering experiment was designed to verify the effectiveness of learned features within various of noisy environments.The empirical study based on K-means clustering shows that the sparse constraint reduces the representation of noisy features and the new method is better than the 8 similar algorithms with stronger robustness to a variable extent.…”
Get full text
Article -
1897
An improved YOLOv4 algorithm for pedestrian detection in complex visual scenes
Published 2021-08-01“…At present, the difficulty of pedestrian detection has been dramatically increased because of some problems, such as the dark or exposed illumination, bad weather, serious occlusion, large difference size of pedestrians and blurred images in complex visual scenes.Therefore, an improved YOLOv4 algorithm was proposed, which improved the detection performance of pedestrian detection in complex visual scenes, aiming at the problems of low accuracy and highly missed detection rate.Firstly, the self-annotation data set pedetrian were constructed.Secondly, the hybrid dilated convolution (HDC) was added into the backbone network to improve the ability of pedestrian feature extraction.Finally, in order to obtain more detailed feature, the spatial jagged dilated convolution (SJDC) structure was proposed to replace the spatial pyramid pooling structure.The experimental results show that the average precision (AP) of the proposed algorithm can achieve 90.08%.The proposed algorithm can substantially improve AP by 7.2%, and the log-average miss rate (LAMR) reduce by 13.69% compared with the original YOLOv4 algorithm.…”
Get full text
Article -
1898
Crime Prediction Using Decision Tree (J48) Classification Algorithm.
Published 2018Subjects: “…crime prediction; machine learning; decision tree; J48; artificial intelligence; Classification Algorithms.…”
Get full text
Article -
1899
Research on Sparse Code Multiple Access Detection Technology in Satellite Communication Systems
Published 2020-09-01Subjects: Get full text
Article -
1900
Improving diversification by a hybrid bat-Nelder-Mead algorithm and DDE for rapid convergence to solve global optimization
Published 2024-12-01Subjects: Get full text
Article