-
3721
Analysing Topology Control Protocols in Wireless Sensor Network Using Network Evolution Model
Published 2015-10-01“…In the study of wireless ad hoc and sensor networks, clustering is an important research problem as it aims at maximizing network lifetime and minimizing latency. A large number of algorithms have been devised to compute “good” clusters in a WSN but few papers have tried to characterize these algorithms in an analytical manner. …”
Get full text
Article -
3722
The Information Theoretic Approach to Signal Anomaly Detection for Cognitive Radio
Published 2010-01-01“…Additionally, neither of the algorithms require demodulation of the signal.…”
Get full text
Article -
3723
Efficient Hybrid Iterative Method for Signal Detection in Massive MIMO Uplink System over AWGN Channel
Published 2022-01-01“…Although the OCD, CG, and GS algorithms have less computational complexity than the MMSE algorithm, they perform poorly in comparison. …”
Get full text
Article -
3724
Objects outline delineation by nonliniear filtration methods for boundary pixels
Published 2022-12-01“…A processing of border pixel from pixel map originate problem while work with outline objects segmentation algorithm on bitmap images, which are based on 2D convolution operation. …”
Get full text
Article -
3725
A Survey of Post-Quantum Cryptography Migration in Vehicles
Published 2025-01-01“…The advent of quantum computers makes asymmetric cryptographic algorithms insecure and vulnerable. A promising solution to ensure the continued security attributes of confidentiality, integrity, and availability is the use of Post-Quantum Cryptography (PQC) algorithms. …”
Get full text
Article -
3726
Efficient Boundary Extraction from Orthogonal Pseudo-Polytopes: An Approach Based on the 𝑛D-EVM
Published 2011-01-01“…This work is devoted to contribute with two algorithms for performing, in an efficient way, connected components labeling and boundary extraction from orthogonal pseudo-polytopes. …”
Get full text
Article -
3727
Multi-level high utility-itemset hiding.
Published 2025-01-01“…To address this issue, this work suggests two PPUM algorithms, namely MLHProtector and FMLHProtector, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. …”
Get full text
Article -
3728
Recognition and Localization of Target Images for Robot Vision Navigation Control
Published 2022-01-01“…The application of RANSAC algorithm and improved Hough algorithm was analyzed in visual navigation control, and the two navigation line detection algorithms based on the image characteristics of the target image were improved in the optical detection area of the navigation line for the shortcomings of the two algorithms in visual navigation control, and the algorithms before and after the improvement were compared.…”
Get full text
Article -
3729
-
3730
Mining Conditional Functional Dependency Rules on Big Data
Published 2020-03-01“…Current Conditional Functional Dependency (CFD) discovery algorithms always need a well-prepared training dataset. …”
Get full text
Article -
3731
Conditions for Existence, Representations, and Computation of Matrix Generalized Inverses
Published 2017-01-01“…Particularly, these algorithms can be used to compute the Moore-Penrose inverse, the Drazin inverse, and the usual matrix inverse. …”
Get full text
Article -
3732
Effects of Taxon Sampling in Reconstructions of Intron Evolution
Published 2013-01-01“…Interpretation of these differences is hindered because different algorithms and taxon sampling strategies were used. …”
Get full text
Article -
3733
Hybrid Time Series Method for Long-Time Temperature Series Analysis
Published 2021-01-01“…This paper combines discrete wavelet transform (DWT), autoregressive moving average (ARMA), and XGBoost algorithm to propose a weighted hybrid algorithm named DWTs-ARMA-XGBoost (DAX) on long-time temperature series analysis. …”
Get full text
Article -
3734
Modified Grey Wolf Optimizer for Global Engineering Optimization
Published 2016-01-01“…Nature-inspired algorithms are becoming popular among researchers due to their simplicity and flexibility. …”
Get full text
Article -
3735
TOPPER: Topology Prediction of Transmembrane Protein Based on Evidential Reasoning
Published 2013-01-01“…Usually, these individual prediction algorithms depend on various principles such as the hydrophobicity or charges of residues. …”
Get full text
Article -
3736
Enabling Super-Resolution for Automotive Imaging Radars in the Presence of Antenna Calibration Errors
Published 2025-01-01“…In this paper we address the issues faced when applying such algorithms in a radar application and offer a solution based on linear prediction and spatial smoothing to enhance the performance of such algorithms.…”
Get full text
Article -
3737
An Analytical Study on Two High-Order Hybrid Methods to Solve Systems of Nonlinear Equations
Published 2023-01-01“…Furthermore, the stability analysis of both algorithms is investigated. These algorithms are applied for solving two real stiff systems of ordinary differential equations. …”
Get full text
Article -
3738
Novel machine learning-driven comparative analysis of CSP, STFT, and CSP-STFT fusion for EEG data classification across multiple meditation and non-meditation sessions in BCI pipel...
Published 2025-02-01“…While testing different feature extraction algorithms, a common neural network structure was used as the classification algorithm to compare the performance of the feature extraction algorithms. …”
Get full text
Article -
3739
Some Graph-Based Encryption Schemes
Published 2021-01-01“…There exist many encryption algorithms in cryptography for data security. The need of new nonstandard encryption algorithms has been raised to prevent the communication from traditional attacks. …”
Get full text
Article -
3740
A Comparative Study on Qualification Criteria of Nonlinear Solvers with Introducing Some New Ones
Published 2022-01-01“…To achieve the criteria, different algorithms to solve nonlinear systems are categorised to three kinds. …”
Get full text
Article