Showing 901 - 920 results of 64,539 for search '"algorithm"', query time: 0.24s Refine Results
  1. 901
  2. 902
  3. 903

    Algorithms for preliminary evaluation of the technical state of social buildings by Yu. V. Zazulya, O. V. Ashikhmin, D. S. Bayanov

    Published 2022-12-01
    “…The article presents an algorithm for the preliminary evaluation of the technical condition of structural elements of social buildings (on the example of kindergartens and schools in Tyumen), taking into account the date of construction, the characteristics of structures and the possibility of choosing the effective methods of repair. …”
    Get full text
    Article
  4. 904

    Anti-interference algorithm of wireless channel for IoT communication by Ling TAN, Yong ZHUANG

    Published 2017-10-01
    “…In IoT communication,the anti-interference of wireless channel is influenced by various factors.Multi-antenna system has significant effect for promoting anti-interference of channel,whose complexity and performance in signal detection need further improvement.The QR decomposition detection algorithm in signal detection of multi-antenna system has low computational complexity,but the algorithm performance is poor.In order to improve the performance of QR decomposition detection algorithm,a QR decomposition algorithm based on ML criterion and decision candidate mechanism was proposed,and the performance of the algorithm was analyzed.The ML criterion was used to estimate the initial level of the detection,and a reliable decision was adopted in the other detection layer.Candidate points were introduced in unreliable case and the optimal candidate were selected from the feedback.The algorithm could significantly improve the system interference,and propagation error were greatly reduced in the decision feedback.The experimental results show that the proposed algorithm can improve the performance of the IoT system effectively with certain complexity.…”
    Get full text
    Article
  5. 905

    Compact quantum algorithms for time-dependent differential equations by Sachin S. Bharadwaj, Katepalli R. Sreenivasan

    Published 2025-06-01
    “…The results offer evidence that the proposed algorithm is amenable for use on near-term quantum devices.…”
    Get full text
    Article
  6. 906

    Co-decode algorithm of network coding with hardware logic by Hui LI, Ming-long ZHANG, Fu-xing CHEN, Han-xu HOU, Kai PAN, Wei WANG, Hu-sheng YUAN, Tao SUN

    Published 2012-07-01
    “…Practical general coder and decoder of network coding(NC)with HDL(hardware description language)logic for wire-speed nodes was presented.The NC coders applied random linear network coding (RLNC) and the decoders recovered the original packets by Cramer’s rule.The structures and algorithms of NC coder and decoder were designed in detail and implemented in HDL with NetFPGA boards.Comparing with traditional stored-and-forward mechanism,network emulations showed that networks with wire-speed NC coder and decoder nodes could achieve the capacity bound of max-flow min-cut theorem,and the end-to-end delay was guaranteed on a small constant.…”
    Get full text
    Article
  7. 907

    An Improved YOLOv9s Algorithm for Underwater Object Detection by Shize Zhou, Long Wang, Zhuoqun Chen, Hao Zheng, Zhihui Lin, Li He

    Published 2025-01-01
    “…To solve these problems, the YOLOv9s-SD underwater target detection algorithm is proposed to improve the detection performance in underwater environments. …”
    Get full text
    Article
  8. 908

    A Stochastic Learning Algorithm for Machine Fault Diagnosis by Zhipeng Dong, Yucheng Liu, Jianshe Kang, Shaohui Zhang

    Published 2022-01-01
    “…To solve this problem, a new method, named stochastic learning algorithm (SL), is proposed in this paper for dimension reduction. …”
    Get full text
    Article
  9. 909
  10. 910

    Adversarial sample generation algorithm for vertical federated learning by Xiaolin CHEN, Daoguang ZAN, Bingchao WU, Bei GUAN, Yongji WANG

    Published 2023-08-01
    “…To adapt to the scenario characteristics of vertical federated learning (VFL) applications regarding high communication cost, fast model iteration, and decentralized data storage, a generalized adversarial sample generation algorithm named VFL-GASG was proposed.Specifically, an adversarial sample generation framework was constructed for the VFL architecture.A white-box adversarial attack in the VFL was implemented by extending the centralized machine learning adversarial sample generation algorithm with different policies such as L-BFGS, FGSM, and C&W.By introducing deep convolutional generative adversarial network (DCGAN), an adversarial sample generation algorithm named VFL-GASG was designed to address the problem of universality in the generation of adversarial perturbations.Hidden layer vectors were utilized as local prior knowledge to train the adversarial perturbation generation model, and through a series of convolution-deconvolution network layers, finely crafted adversarial perturbations were produced.Experiments show that VFL-GASG can maintain a high attack success while achieving a higher generation efficiency, robustness, and generalization ability than the baseline algorithm, and further verify the impact of relevant settings for adversarial attacks.…”
    Get full text
    Article
  11. 911

    Search Strategy Optimization of Affine Propagation Clustering Algorithm by DONG Jing-wei, ZHANG Tian-qi, LIU Yang, YANG Guang

    Published 2018-06-01
    “…For multi floor fingerprint location, large scale fingerprint samples increase the complexity of the matching algorithm, which not only hinders the realtime performance of the system, but also increases the energy loss of the mobile terminal.According to the theory of affinity propagation clustering algorithm, we can reduce the amount of computation.Fingerprint sample search in complex environment usually adopts the binary search method, and the optimal parameters for bias results clustering quality of the coarse positioning stages, but this method takes a long time.In the calculation of quality guarantee under the premise, in order to improve the clustering speed, the coarse positioning stage and the matching process, and gives the method to improve the binary search method.The experimental results show that the clustering of the same sample space, the binary search method the optimized algorithm can reduce the number of iterations, improve the work efficiency of the system, and the use of the iteration time is 74.5% shorter than the traditional binary search method.…”
    Get full text
    Article
  12. 912
  13. 913

    Algorithms of diagnosis and therapy of a primary depressive episode by V. L. Pidlubnyi, V. S. Makoid

    Published 2023-07-01
    “…The aim of the work is to develop algorithms for rapid diagnosis and therapy of the PDE. …”
    Get full text
    Article
  14. 914

    Least square-based vehicle position estimation algorithm by PENG Xin, LI Ren-fa, YANG Liu, LIU Liang-jiao

    Published 2010-01-01
    “…A vehicle position estimation algorithm base on least square optimization was prposed.Firstly,the algorithm deduced the convex constraint condition which the distance matrix had to conform within a short time interval.Then,the least square method was employed to estimate the vehicles’ relative position.Finally,the local maps were merged into the global map.Simulation results demonstrate that the algorithm can achieve preferable estimation accuracy,and meet the real time constraint in vehicular networks.…”
    Get full text
    Article
  15. 915
  16. 916

    Outlier Detection and Explanation Method Based on FOLOF Algorithm by Lei Bai, Jiasheng Wang, Yu Zhou

    Published 2025-05-01
    “…Finally, a weighted local outlier factor detection algorithm computes the degree of anomaly for each sample in the candidate set. …”
    Get full text
    Article
  17. 917
  18. 918

    Feature engineering through two-level genetic algorithm by Aditi Gulati, Armin Felahatpisheh, Camilo E. Valderrama

    Published 2025-09-01
    Subjects: “…Multi-objective genetic algorithms…”
    Get full text
    Article
  19. 919

    Spatiotemporal Fusion Algorithm Based on Multikernal Adaptive Network by Qiuhui Wang, Qiong Ran, Ke Zheng, Jiaxin Li

    Published 2025-01-01
    “…Compared to optimal comparison algorithms, MKAN increases structural similarity by an average of 1.4% and reduces global dimensionless error by an average of 4.4%, fully demonstrating the rationality and superiority of its design. …”
    Get full text
    Article
  20. 920

    Parallel lightweight Block Cipher algorithm for Multicore CPUs by Hawraa J. Hamiza, Ahmed Fanfakh

    Published 2024-10-01
    “…To achieve high performance, lightweight speck cipher algorithms have been presented and implemented on CPU platforms with various improvements. …”
    Get full text
    Article