Showing 481 - 500 results of 19,511 for search '"algorithms"', query time: 0.07s Refine Results
  1. 481

    Efficient attack detection and data aggregation algorithm by Hong-bing CHENG, Chun-ming RONG, Xiao HUANG, Skjalg EGGEN, Qing-kai ZENG

    Published 2012-09-01
    “…An efficient algorithm of attack detection and data aggregation for wireless multimedia sensor networks based on the previous work was proposed.The proposed algorithm concludes the action trait of sensor nodes from their attribute vectors without any prior knowledge,at the same time;it was scalable and could be applied in large scale net-works.The simulation results show that the proposed algorithm can detect the attacks action more accurate than other technologies,and can make data aggregation efficiently.At the same time,the proposed algorithm can make the wireless multimedia sensor networks secure and reduce communication flow so that it will save a lot of resources in wireless mul-timedia sensor networks.…”
    Get full text
    Article
  2. 482
  3. 483

    MQHOA algorithm with energy level stabilizing process by Peng WANG, Yan HUANG

    Published 2016-07-01
    Subjects: “…optimization algorithm…”
    Get full text
    Article
  4. 484
  5. 485

    Key-controlled Rijndael algorithm with multiple S-boxes by YIN Xin-chun 1, YANG Jie 1, XIE Li 2

    Published 2007-01-01
    Subjects: “…Rijndael algorithm…”
    Get full text
    Article
  6. 486

    An improved K‐means algorithm for big data by Fatemeh Moodi, Hamid Saadatfar

    Published 2022-02-01
    “…Abstract An improved version of K‐means clustering algorithm that can be applied to big data through lower processing loads with acceptable precision rates is presented here. …”
    Get full text
    Article
  7. 487

    Beamforming Algorithm of LEO Satellite Communication System by Haiwang WANG, Chenguang HUANG, Cheng ZOU, Fengwei SHAO, Jiachao CHANG, Guotong LI

    Published 2022-06-01
    “…The rapid development of broadband satellite internet has brought satellite communication into a new era.The establishment of large-scale low-orbit satellite constellations has gradually saturated spectrum resources, and the high overlap in frequency use has led to serious interference problems between satellite communication systems.Satellite payloads typically communicate using phased-array antennas, which reduce interference by beamforming at the receiving and transmitting ends.The adaptive beamforming algorithm was used at the receiving end to suppressed interference by adaptive zeroing; The low sidelobe beamforming algorithm was used at the transmitting end, which reduced the interference by imposing specifi c constraints on the sidelobes to suppressed the sidelobe level.Three anti-jamming beamforming algorithms were introduced for the ground receiving end and the satellite sending end respectively, which provided a beamlevel method for reduced the interference between satellite communication systems.…”
    Get full text
    Article
  8. 488

    Automatic modulation recognition algorithm for MQAM signal by Huadi ZHANG, Huaxun LOU

    Published 2019-08-01
    “…An automatic modulation recognition algorithm for MQAM signal was proposed.Firstly,the feature parameter F based on the fourth order cumulants was constructed to classify the square QAM and the cross QAM.Secondly,the compactness of zero center normalized instantaneous amplitude was calculated to identify the 16QAM from the square QAM.Thirdly,the baud rate was estimated by frequency spectrum of amplitude square,and timing was synchronized to delete the ISI and resume the relatively ideal constellations.And aiming at the 32QAM and the 128QAM,two different clustering radii were set,and clustering point density was got respectively by the subtractive clustering algorithm,and then the 32QAM and the 128QAM was classified depending on the difference of density value.In the same way,the 64QAM and the 256QAM were classified.The proposed algorithm can recognize five kinds of QAM signals,including 16QAM signals,32QAM signals,64QAM signals,128QAM signal and 256QAM signal without prior knowledge of frequency and baud rate.Furthermore,the proposed algorithm does not need complex iterative process,which can be applied in practical signal recognition.…”
    Get full text
    Article
  9. 489

    The Precompression Processing of LMS Algorithm in Noise Elimination by Pengfei Lin, Chunsheng Lin, Ning Zhang, Xingya wu

    Published 2019-01-01
    “…In this study, the authors propose a novel precompression processing (PCP) of the least mean squares (LMS) algorithm based on a regulator factor. The novelty of the PCP algorithm is that the compressed input signals vary from each other on different components at each iteration. …”
    Get full text
    Article
  10. 490

    Influence maximization algorithm based on social network by Xuan WANG, Yu ZHANG, Junfeng ZHOU, Ziyang CHEN

    Published 2022-08-01
    “…The influence maximization (IM) problem asks for a group of seed users in a social network under a given propagation model, so that the information spread is maximized through these users.Existing algorithms have two main problems.Firstly, these algorithms were difficult to be applied in large-scale social networks due to limited expected influence and high time complexity.Secondly, these algorithms were limited to specific propagation models and could only solve the IM problem under a single type of social network.When they were used in different types of networks, the effect was poor.In this regard, an efficient algorithm (MTIM) based on two classic propagation models and reverse influence sampling (RIS) was proposed.To verify the effectiveness of MTIM, experiments were conducted to compare MTIM with greedy algorithms such as IMM, TIM and PMC, and heuristic algorithms such as OneHop and Degree Discount on four real social networks.The results show that MTIM can return a <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mrow><mo>(</mo> <mrow> <mn>1</mn><mo>−</mo><mfrac> <mn>1</mn> <mtext>e</mtext> </mfrac> <mo>−</mo><mi>ε</mi></mrow> <mo>)</mo></mrow></math></inline-formula> approximate solution, effectively expand the expected influence and significantly improve the efficiency.…”
    Get full text
    Article
  11. 491
  12. 492

    The Application of Baum-Welch Algorithm in Multistep Attack by Yanxue Zhang, Dongmei Zhao, Jinxing Liu

    Published 2014-01-01
    “…Firstly, we train the existing hidden Markov model(s) by the Baum-Welch algorithm of HMM. Then we recognize the alert belonging to attack scenarios with the Forward algorithm of HMM. …”
    Get full text
    Article
  13. 493
  14. 494

    Research on Spam Filters Based on NB Algorithm by Su Shengyue

    Published 2025-01-01
    “…The SpamAssassin dataset is used in this study to explore the use of the Naive Bayes (NB) algorithm for spam detection. The algorithm demonstrated high accuracy and efficiency in classifying large-scale text data, achieving an accuracy of 97.74%, a recall rate of 96.60%, and a precision rate of 96.8%, with an F1 score of 0.97. …”
    Get full text
    Article
  15. 495

    Service-Aware Algorithm Based on DT-KSVM by Hao Dong, Hua Qu, Jihong Zhao, Liangjun Chen, Huijun Dai

    Published 2015-11-01
    “…A novel service-aware method based on decision tree kernel support vector machine(DT-KSVM) algorithm was proposed.A service-aware model was developed by using ReliefF algorithm to extract service characteristics,and proposing the separable degree between samples to simply the service-aware process.Through experiment comparison between this proposed model and traditional one-versus-one SVM method,it is shown that the proposed method has a better service-aware accuracy and time performance.…”
    Get full text
    Article
  16. 496
  17. 497

    Research on Multi-Dimensional Packet Classification Algorithm by Hanbing Liu, Yali Yang, Aina Hu

    Published 2014-12-01
    “…Firstly, the theoretical foundation of packet classification algorithm was introduced. Secondly, the typical packet classification algorithms were introduced and analyzed, and the improvement measures were proposed. …”
    Get full text
    Article
  18. 498

    Frequent path discovery algorithm for financial network by Fang LYU, Fenghe TANG, Junheng HUANG, Bailing WANG

    Published 2019-10-01
    “…With the proliferation of various illegal financial activities,more and more attention is paid to the research of finding criminal cues in financial network by scholars.The characteristics of the transaction data generated by bank accounts are analyzed in detail,and a general model of bank account transaction network is established.On this basis,a two-direction active edge searching method is proposed to solve the problem of evaluating the relationship strength between financial entities.And then,a breadth-first frequent path discovery algorithm with depth controlled is presented,with which the way how the financial flows is restored.Experiment results on the real bank data show that the above two methods are effective in solving the problem of peer prediction and financial tracking respectively.…”
    Get full text
    Article
  19. 499

    Feature selection algorithm for uncertain text classification by WANG Bo, JIA Yan, YANG Shu-qiang, ZHOU Bin

    Published 2009-01-01
    “…A novel algorithm called FSUNT was proposed based on HSIC, with the focus on the vagueness and uncertainty which might be taken into account during feature selection. …”
    Get full text
    Article
  20. 500