Showing 701 - 720 results of 19,511 for search '"algorithms"', query time: 0.07s Refine Results
  1. 701

    Two-Stage Heuristic Algorithm for Aircraft Recovery Problem by Cheng Zhang

    Published 2017-01-01
    “…Hence, a two-stage heuristic is proposed to reduce the problem scale. The algorithm integrates a heuristic scoring procedure with an aggregated aircraft recovery model (AARM) to preselect LOFs. …”
    Get full text
    Article
  2. 702

    Low complexity uplink multiuser MIMO detecting algorithm by HEI Yong-qiang1, LI Xiao-hui1, YI Ke-chu1, YANG Hong2

    Published 2010-01-01
    “…Aiming at the uplink multiuser MIMO system,a new space-time detecting algorithm was proposed,in which a linear recombination strategy was imposed on the received signal first,and then the matched filter vectors orthogonal to each users’ interference sets were used to eliminate the interference among users.Finally the signal of each user was line-arly space-time decoded by means of the orthogonal equivalent channel.The design of the algorithm under imperfect channel scenario was also provided.Theory analysis and simulation results reveal that the proposed algorithm has the advantages of low complexity and good robustness,and is superior to other detecting algorithms.…”
    Get full text
    Article
  3. 703

    Service chain mapping algorithm based on reinforcement learning by Liang WEI, Tao HUANG, Jiao ZHANG, Zenan WANG, Jiang LIU, Yunjie LIU

    Published 2018-01-01
    “…A service chain resource scheduling architecture of multi-agent based on artificial intelligence technology was proposed.Meanwhile,a service chain mapping algorithm based on reinforcement learning was designed.Through the Q-learning mechanism,the location of each virtual network element in the service chain was determined according to the system status and the reward and punishment feedback after the deployment.The experimental results show that compared with the classical algorithms,the algorithm effectively reduces the average transmission delay of the service and improves the load balance of the system.…”
    Get full text
    Article
  4. 704
  5. 705

    Generalized Cycle Benchmarking Algorithm for Characterizing Midcircuit Measurements by Zhihan Zhang, Senrui Chen, Yunchao Liu, Liang Jiang

    Published 2025-01-01
    “…Finally, we conduct numerical simulations to illustrate the practical applicability of the algorithm. Similar to other CB-type algorithms, we expect the algorithm to provide a useful toolkit that is of experimental interest.…”
    Get full text
    Article
  6. 706

    Naive Bayes-Guided Bat Algorithm for Feature Selection by Ahmed Majid Taha, Aida Mustapha, Soong-Der Chen

    Published 2013-01-01
    “…The performance of the proposed feature selection algorithm was investigated using twelve benchmark datasets from different domains and was compared to three other well-known feature selection algorithms. …”
    Get full text
    Article
  7. 707

    A Study on the Security Algorithm for Contexts in Smart Cities by Hoon Ko, Kitae Bae, Sang Heon Kim, Kyung Jin An

    Published 2014-06-01
    “…Each customised service usually keeps tailored security policy and algorithm. Conventionally, every service including different servers, network, and users employs the same security algorithm so that sensitive information could be traced and revealed by using counter tracing method. …”
    Get full text
    Article
  8. 708
  9. 709
  10. 710

    An Improved Physarum polycephalum Algorithm for the Shortest Path Problem by Xiaoge Zhang, Qing Wang, Andrew Adamatzky, Felix T. S. Chan, Sankaran Mahadevan, Yong Deng

    Published 2014-01-01
    “…We also compare our algorithm with other existing algorithms, including the ant colony optimization algorithm and Dijkstra algorithm.…”
    Get full text
    Article
  11. 711

    Genetic Algorithm for Biobjective Urban Transit Routing Problem by J. S. C. Chew, L. S. Lee, H. V. Seow

    Published 2013-01-01
    “…The proposed algorithm employs an adding-node procedure which helps in converting an infeasible solution to a feasible solution. …”
    Get full text
    Article
  12. 712

    Online Boosting tracking algorithm combined with occlusion sensing by Ya-wen WANG, Hong-chang CHEN, Shao-mei LI, Chao GAO

    Published 2016-09-01
    “…Online Boosting tracking algorithm combined with occlusion sensing was presented.In this method,occlusion sensor was introduced to check the tracking results,and classifier updating strategy was adjusted depending on the occlusion checking results.By this way,the feature pool of the classifier can be kept pure,which will improve the tracking robustness under occlusion.Experimental results show that compared with traditional Boosting tracking algorithm,improved algorithm can solve the problem of occlusion very well.…”
    Get full text
    Article
  13. 713

    Hadoop bottleneck detection algorithm based on information gain by Zaole TAN, Zhifeng HAO, Ruichu CAI, Xiaojun XIAO, Yu LU

    Published 2016-07-01
    “…Hadoop has become a major platform for big data storage and large data mining nowadays.Although Hadoop platform achieves high performance parallel computing through a distributed cluster of machines,the bottlenecks will inevitably appear on a machine when cluster load increases,because the cluster is composed of inexpensive host.Aiming at this problem,a bottleneck detection algorithms based on information gain was proposed.The algorithm detected cluster's bottlenecks resource by computing the information gain of each resource.The experiments show that the bottleneck detection algorithm is feasible.…”
    Get full text
    Article
  14. 714

    Nonexposure Accurate Location K-Anonymity Algorithm in LBS by Jinying Jia, Fengli Zhang

    Published 2014-01-01
    “…Experimental results show that our algorithms are more secure than the existent cloaking algorithms, need not have all the users reporting their locations all the time, and can generate smaller ASR.…”
    Get full text
    Article
  15. 715

    Algorithm to design UWB pulse based on the peak frequency by ZOU Wei-xia1, ZHANG Chun-qing2, ZHOU Zheng1

    Published 2005-01-01
    “…Not like other algorithms that only work out one pulse, the proposed algorithm can lead to the design of a myriad of pulses that are compliant, namely, it can figure out all α which satisfy the regulation and give out the range of α.…”
    Get full text
    Article
  16. 716
  17. 717

    ALBERTA: ALgorithm-Based Error Resilience in Transformer Architectures by Haoxuan Liu, Vasu Singh, Michal Filipiuk, Siva Kumar Sastry Hari

    Published 2025-01-01
    “…Ensuring the correct execution of these models in GPUs is critical, despite the potential for transient hardware errors. We propose a novel algorithm-based resilience framework called ALBERTA that allows us to perform end-to-end resilience analysis and protection of transformer-based architectures. …”
    Get full text
    Article
  18. 718

    Power services scheduling algorithm based on quantum communication by Zhuozhi YU, Yefeng ZHANG, Bingyang HAN, Wenwei CHEN, Dong WANG

    Published 2019-11-01
    “…Quantum communication could effectively improve the transmission’s reliability and security of power system services.However,limited by the generating rate of quantum key,it was difficult to meet the encryption requirements of important services.Therefore,a queue scheduling algorithm was required to legitimately schedule the power system services which need to be encrypted in quantum communication.An improved weighted fair queuing (weighted fair queuing,WFQ) algorithm LD-WFQ was proposed.By estimating the expected delay of the data packets to be encrypted,sending the packets that would soon be timeout,the proposed algorithm effectively reduced the timeout ratio of the packets and improved the effective utilization of quantum keys,while maintaining the timeout ratio of the packets in high priority queue at a low level.Compared with the WFQ algorithm,the simulation result proves the superiority of LD-WFQ algorithm.…”
    Get full text
    Article
  19. 719
  20. 720

    Dynamical resource allocation algorithm research in network virtualization by LUO Juan, XU Yue-yang, LI Ren-fa

    Published 2011-01-01
    “…Aim to the problem of resource allocation,a dynamical algorithm of allocating resource was proposed.The algorithm dynamical migrates virtual node,which based on the average load discrepant degree of physical nodes and the tolerant load discrepant degree of substrate network.It will choose a proper host according to the values of synthetically impact factor,that reduce impact on the delay of virtual link and the bandwidth of physical link.Simulation result shows that the algorithm can improve load balance on physical nodes,and reduce negative impact on delay and bandwidth.…”
    Get full text
    Article