-
701
Two-Stage Heuristic Algorithm for Aircraft Recovery Problem
Published 2017-01-01“…Hence, a two-stage heuristic is proposed to reduce the problem scale. The algorithm integrates a heuristic scoring procedure with an aggregated aircraft recovery model (AARM) to preselect LOFs. …”
Get full text
Article -
702
Low complexity uplink multiuser MIMO detecting algorithm
Published 2010-01-01“…Aiming at the uplink multiuser MIMO system,a new space-time detecting algorithm was proposed,in which a linear recombination strategy was imposed on the received signal first,and then the matched filter vectors orthogonal to each users’ interference sets were used to eliminate the interference among users.Finally the signal of each user was line-arly space-time decoded by means of the orthogonal equivalent channel.The design of the algorithm under imperfect channel scenario was also provided.Theory analysis and simulation results reveal that the proposed algorithm has the advantages of low complexity and good robustness,and is superior to other detecting algorithms.…”
Get full text
Article -
703
Service chain mapping algorithm based on reinforcement learning
Published 2018-01-01“…A service chain resource scheduling architecture of multi-agent based on artificial intelligence technology was proposed.Meanwhile,a service chain mapping algorithm based on reinforcement learning was designed.Through the Q-learning mechanism,the location of each virtual network element in the service chain was determined according to the system status and the reward and punishment feedback after the deployment.The experimental results show that compared with the classical algorithms,the algorithm effectively reduces the average transmission delay of the service and improves the load balance of the system.…”
Get full text
Article -
704
Weibo spammers’ identification algorithm based on Bayesian model
Published 2017-01-01Subjects: Get full text
Article -
705
Generalized Cycle Benchmarking Algorithm for Characterizing Midcircuit Measurements
Published 2025-01-01“…Finally, we conduct numerical simulations to illustrate the practical applicability of the algorithm. Similar to other CB-type algorithms, we expect the algorithm to provide a useful toolkit that is of experimental interest.…”
Get full text
Article -
706
Naive Bayes-Guided Bat Algorithm for Feature Selection
Published 2013-01-01“…The performance of the proposed feature selection algorithm was investigated using twelve benchmark datasets from different domains and was compared to three other well-known feature selection algorithms. …”
Get full text
Article -
707
A Study on the Security Algorithm for Contexts in Smart Cities
Published 2014-06-01“…Each customised service usually keeps tailored security policy and algorithm. Conventionally, every service including different servers, network, and users employs the same security algorithm so that sensitive information could be traced and revealed by using counter tracing method. …”
Get full text
Article -
708
Correlation probability indistinguishable location privacy protection algorithm
Published 2017-08-01Get full text
Article -
709
Efficient traffic information dissemination algorithm based on ranking
Published 2009-01-01Subjects: Get full text
Article -
710
An Improved Physarum polycephalum Algorithm for the Shortest Path Problem
Published 2014-01-01“…We also compare our algorithm with other existing algorithms, including the ant colony optimization algorithm and Dijkstra algorithm.…”
Get full text
Article -
711
Genetic Algorithm for Biobjective Urban Transit Routing Problem
Published 2013-01-01“…The proposed algorithm employs an adding-node procedure which helps in converting an infeasible solution to a feasible solution. …”
Get full text
Article -
712
Online Boosting tracking algorithm combined with occlusion sensing
Published 2016-09-01“…Online Boosting tracking algorithm combined with occlusion sensing was presented.In this method,occlusion sensor was introduced to check the tracking results,and classifier updating strategy was adjusted depending on the occlusion checking results.By this way,the feature pool of the classifier can be kept pure,which will improve the tracking robustness under occlusion.Experimental results show that compared with traditional Boosting tracking algorithm,improved algorithm can solve the problem of occlusion very well.…”
Get full text
Article -
713
Hadoop bottleneck detection algorithm based on information gain
Published 2016-07-01“…Hadoop has become a major platform for big data storage and large data mining nowadays.Although Hadoop platform achieves high performance parallel computing through a distributed cluster of machines,the bottlenecks will inevitably appear on a machine when cluster load increases,because the cluster is composed of inexpensive host.Aiming at this problem,a bottleneck detection algorithms based on information gain was proposed.The algorithm detected cluster's bottlenecks resource by computing the information gain of each resource.The experiments show that the bottleneck detection algorithm is feasible.…”
Get full text
Article -
714
Nonexposure Accurate Location K-Anonymity Algorithm in LBS
Published 2014-01-01“…Experimental results show that our algorithms are more secure than the existent cloaking algorithms, need not have all the users reporting their locations all the time, and can generate smaller ASR.…”
Get full text
Article -
715
Algorithm to design UWB pulse based on the peak frequency
Published 2005-01-01“…Not like other algorithms that only work out one pulse, the proposed algorithm can lead to the design of a myriad of pulses that are compliant, namely, it can figure out all α which satisfy the regulation and give out the range of α.…”
Get full text
Article -
716
Research on a combining algorithm for harassing calls to identify
Published 2017-07-01Subjects: Get full text
Article -
717
ALBERTA: ALgorithm-Based Error Resilience in Transformer Architectures
Published 2025-01-01“…Ensuring the correct execution of these models in GPUs is critical, despite the potential for transient hardware errors. We propose a novel algorithm-based resilience framework called ALBERTA that allows us to perform end-to-end resilience analysis and protection of transformer-based architectures. …”
Get full text
Article -
718
Power services scheduling algorithm based on quantum communication
Published 2019-11-01“…Quantum communication could effectively improve the transmission’s reliability and security of power system services.However,limited by the generating rate of quantum key,it was difficult to meet the encryption requirements of important services.Therefore,a queue scheduling algorithm was required to legitimately schedule the power system services which need to be encrypted in quantum communication.An improved weighted fair queuing (weighted fair queuing,WFQ) algorithm LD-WFQ was proposed.By estimating the expected delay of the data packets to be encrypted,sending the packets that would soon be timeout,the proposed algorithm effectively reduced the timeout ratio of the packets and improved the effective utilization of quantum keys,while maintaining the timeout ratio of the packets in high priority queue at a low level.Compared with the WFQ algorithm,the simulation result proves the superiority of LD-WFQ algorithm.…”
Get full text
Article -
719
GMM-based localization algorithm under NLOS conditions
Published 2014-01-01Subjects: Get full text
Article -
720
Dynamical resource allocation algorithm research in network virtualization
Published 2011-01-01“…Aim to the problem of resource allocation,a dynamical algorithm of allocating resource was proposed.The algorithm dynamical migrates virtual node,which based on the average load discrepant degree of physical nodes and the tolerant load discrepant degree of substrate network.It will choose a proper host according to the values of synthetically impact factor,that reduce impact on the delay of virtual link and the bandwidth of physical link.Simulation result shows that the algorithm can improve load balance on physical nodes,and reduce negative impact on delay and bandwidth.…”
Get full text
Article