-
481
Efficient attack detection and data aggregation algorithm
Published 2012-09-01“…An efficient algorithm of attack detection and data aggregation for wireless multimedia sensor networks based on the previous work was proposed.The proposed algorithm concludes the action trait of sensor nodes from their attribute vectors without any prior knowledge,at the same time;it was scalable and could be applied in large scale net-works.The simulation results show that the proposed algorithm can detect the attacks action more accurate than other technologies,and can make data aggregation efficiently.At the same time,the proposed algorithm can make the wireless multimedia sensor networks secure and reduce communication flow so that it will save a lot of resources in wireless mul-timedia sensor networks.…”
Get full text
Article -
482
-
483
MQHOA algorithm with energy level stabilizing process
Published 2016-07-01Subjects: “…optimization algorithm…”
Get full text
Article -
484
An Algorithm to Compute the H-Bases for Ideals of Subalgebras
Published 2021-01-01Get full text
Article -
485
Key-controlled Rijndael algorithm with multiple S-boxes
Published 2007-01-01Subjects: “…Rijndael algorithm…”
Get full text
Article -
486
An improved K‐means algorithm for big data
Published 2022-02-01“…Abstract An improved version of K‐means clustering algorithm that can be applied to big data through lower processing loads with acceptable precision rates is presented here. …”
Get full text
Article -
487
Beamforming Algorithm of LEO Satellite Communication System
Published 2022-06-01“…The rapid development of broadband satellite internet has brought satellite communication into a new era.The establishment of large-scale low-orbit satellite constellations has gradually saturated spectrum resources, and the high overlap in frequency use has led to serious interference problems between satellite communication systems.Satellite payloads typically communicate using phased-array antennas, which reduce interference by beamforming at the receiving and transmitting ends.The adaptive beamforming algorithm was used at the receiving end to suppressed interference by adaptive zeroing; The low sidelobe beamforming algorithm was used at the transmitting end, which reduced the interference by imposing specifi c constraints on the sidelobes to suppressed the sidelobe level.Three anti-jamming beamforming algorithms were introduced for the ground receiving end and the satellite sending end respectively, which provided a beamlevel method for reduced the interference between satellite communication systems.…”
Get full text
Article -
488
Automatic modulation recognition algorithm for MQAM signal
Published 2019-08-01“…An automatic modulation recognition algorithm for MQAM signal was proposed.Firstly,the feature parameter F based on the fourth order cumulants was constructed to classify the square QAM and the cross QAM.Secondly,the compactness of zero center normalized instantaneous amplitude was calculated to identify the 16QAM from the square QAM.Thirdly,the baud rate was estimated by frequency spectrum of amplitude square,and timing was synchronized to delete the ISI and resume the relatively ideal constellations.And aiming at the 32QAM and the 128QAM,two different clustering radii were set,and clustering point density was got respectively by the subtractive clustering algorithm,and then the 32QAM and the 128QAM was classified depending on the difference of density value.In the same way,the 64QAM and the 256QAM were classified.The proposed algorithm can recognize five kinds of QAM signals,including 16QAM signals,32QAM signals,64QAM signals,128QAM signal and 256QAM signal without prior knowledge of frequency and baud rate.Furthermore,the proposed algorithm does not need complex iterative process,which can be applied in practical signal recognition.…”
Get full text
Article -
489
The Precompression Processing of LMS Algorithm in Noise Elimination
Published 2019-01-01“…In this study, the authors propose a novel precompression processing (PCP) of the least mean squares (LMS) algorithm based on a regulator factor. The novelty of the PCP algorithm is that the compressed input signals vary from each other on different components at each iteration. …”
Get full text
Article -
490
Influence maximization algorithm based on social network
Published 2022-08-01“…The influence maximization (IM) problem asks for a group of seed users in a social network under a given propagation model, so that the information spread is maximized through these users.Existing algorithms have two main problems.Firstly, these algorithms were difficult to be applied in large-scale social networks due to limited expected influence and high time complexity.Secondly, these algorithms were limited to specific propagation models and could only solve the IM problem under a single type of social network.When they were used in different types of networks, the effect was poor.In this regard, an efficient algorithm (MTIM) based on two classic propagation models and reverse influence sampling (RIS) was proposed.To verify the effectiveness of MTIM, experiments were conducted to compare MTIM with greedy algorithms such as IMM, TIM and PMC, and heuristic algorithms such as OneHop and Degree Discount on four real social networks.The results show that MTIM can return a <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mrow><mo>(</mo> <mrow> <mn>1</mn><mo>−</mo><mfrac> <mn>1</mn> <mtext>e</mtext> </mfrac> <mo>−</mo><mi>ε</mi></mrow> <mo>)</mo></mrow></math></inline-formula> approximate solution, effectively expand the expected influence and significantly improve the efficiency.…”
Get full text
Article -
491
ABOUT AN ALGORITHM OF OPTIMIZATION OF THE INGOT CRYSTALLIZATION PROCESS
Published 2006-05-01Get full text
Article -
492
The Application of Baum-Welch Algorithm in Multistep Attack
Published 2014-01-01“…Firstly, we train the existing hidden Markov model(s) by the Baum-Welch algorithm of HMM. Then we recognize the alert belonging to attack scenarios with the Forward algorithm of HMM. …”
Get full text
Article -
493
Corrigendum to “Potential Extensions of the US FRAX Algorithm”
Published 2018-01-01Get full text
Article -
494
Research on Spam Filters Based on NB Algorithm
Published 2025-01-01“…The SpamAssassin dataset is used in this study to explore the use of the Naive Bayes (NB) algorithm for spam detection. The algorithm demonstrated high accuracy and efficiency in classifying large-scale text data, achieving an accuracy of 97.74%, a recall rate of 96.60%, and a precision rate of 96.8%, with an F1 score of 0.97. …”
Get full text
Article -
495
Service-Aware Algorithm Based on DT-KSVM
Published 2015-11-01“…A novel service-aware method based on decision tree kernel support vector machine(DT-KSVM) algorithm was proposed.A service-aware model was developed by using ReliefF algorithm to extract service characteristics,and proposing the separable degree between samples to simply the service-aware process.Through experiment comparison between this proposed model and traditional one-versus-one SVM method,it is shown that the proposed method has a better service-aware accuracy and time performance.…”
Get full text
Article -
496
Fuzzy Logic Transformer Design Algorithm (FLTDA)
Published 1999-01-01Subjects: Get full text
Article -
497
Research on Multi-Dimensional Packet Classification Algorithm
Published 2014-12-01“…Firstly, the theoretical foundation of packet classification algorithm was introduced. Secondly, the typical packet classification algorithms were introduced and analyzed, and the improvement measures were proposed. …”
Get full text
Article -
498
Frequent path discovery algorithm for financial network
Published 2019-10-01“…With the proliferation of various illegal financial activities,more and more attention is paid to the research of finding criminal cues in financial network by scholars.The characteristics of the transaction data generated by bank accounts are analyzed in detail,and a general model of bank account transaction network is established.On this basis,a two-direction active edge searching method is proposed to solve the problem of evaluating the relationship strength between financial entities.And then,a breadth-first frequent path discovery algorithm with depth controlled is presented,with which the way how the financial flows is restored.Experiment results on the real bank data show that the above two methods are effective in solving the problem of peer prediction and financial tracking respectively.…”
Get full text
Article -
499
Feature selection algorithm for uncertain text classification
Published 2009-01-01“…A novel algorithm called FSUNT was proposed based on HSIC, with the focus on the vagueness and uncertainty which might be taken into account during feature selection. …”
Get full text
Article -
500
A comparative approach for the optimal design of steel structures using biogeography-based optimization (BBO) algorithm and genetic algorithm (GA)
Published 2023-12-01Subjects: Get full text
Article