Showing 781 - 800 results of 19,511 for search '"algorithms"', query time: 0.10s Refine Results
  1. 781
  2. 782

    Novel coverage control algorithm for wireless sensor network by HAN Zhi-jie1, WU Zhi-bin2, WANG Ru-chuan3, SUN Li-juan3, XIAO Fu3

    Published 2011-01-01
    “…Firstly,in order to make an effective coverage control of WSN,the algorithm was proposed in WSN called AASR(adaptive adjustment of sensing radius).Through the nodes choose the optimal coverage adaptively,node’s energy consumption could be reduced,and the coverage had been improved efficiency.Secondly,the result was presented in the simulation and analysis from respects of the effect of adjustment,energy consumption,as well as coverage redundancy.The result showes that AASR can effectively improve the survival time,reduce energy consumption,and increase cover-age.…”
    Get full text
    Article
  3. 783
  4. 784

    Chaotic Image Encryption Algorithm Based on Circulant Operation by Xiaoling Huang, Guodong Ye, Kwok-Wo Wong

    Published 2013-01-01
    “…Therefore, it can be adopted as an effective and fast image encryption algorithm.…”
    Get full text
    Article
  5. 785

    A QP-Free Algorithm for Finite Minimax Problems by Daolan Han, Jinbao Jian, Qinfeng Zhang

    Published 2014-01-01
    “…Due to the expensive computation for solving QP subproblems with inequality constraints of SQP algorithms, in this paper, a QP-free algorithm which is also called sequential systems of linear equations algorithm is presented. …”
    Get full text
    Article
  6. 786
  7. 787

    The Extended Hamiltonian Algorithm for the Solution of the Algebraic Riccati Equation by Zhikun Luo, Huafei Sun, Xiaomin Duan

    Published 2014-01-01
    “…Furthermore, this algorithm is compared with the Euclidean gradient algorithm, the Riemannian gradient algorithm, and the new subspace iteration method. …”
    Get full text
    Article
  8. 788

    Chaos-based scramble self-embedding watermarking algorithm by HE Hong-jie, ZHANG Jia-shu

    Published 2006-01-01
    “…A chaos-based scramble self-embedding watermarking algorithm was proposed to locate tamper block on the wa- termarked images and improve security of the existing self-embedding fragile watermarking algorithms that could not effec- tively locate tamper block. …”
    Get full text
    Article
  9. 789

    A Sparsity Preestimated Adaptive Matching Pursuit Algorithm by Xinhe Zhang, Yufeng Liu, Xin Wang

    Published 2021-01-01
    “…In the matching pursuit algorithm of compressed sensing, the traditional reconstruction algorithm needs to know the signal sparsity. …”
    Get full text
    Article
  10. 790

    An Improved Differential Evolution Algorithm Based on Adaptive Parameter by Zhehuang Huang, Yidong Chen

    Published 2013-01-01
    “…The differential evolution (DE) algorithm is a heuristic global optimization technique based on population which is easy to understand, simple to implement, reliable, and fast. …”
    Get full text
    Article
  11. 791

    Distributed Voronoi coverage algorithm in wireless sensor networks by XU Peng-fei1, CHEN Zhi-gang1, DENG Xiao-heng1

    Published 2010-01-01
    “…On the hypothesis conditions that wireless sensor networks only covered partial target region and the commu-nication radius was no less than twice of the sensing radius,a coverage-preserved and connected distributed Voronoi cov-erage algorithm was presented.Firstly,a method of detecting coverage redundancy sensors based on the local Voronoi re-gions was proposed,whose computational complexity was unconcerned with the density of sensors.Then,an en-ergy-prior self-scheduling strategy based on local Voronoi neighbors was proposed,where those sensors that were com-munication neighbors but not local Voronoi neighbors could synchronously execute self-scheduling,which improved the astringency of distributed scheduling.The simulation results show that the average number and coverage-degree of active sensors produced by the proposed algorithm are close to the centralized algorithm and smaller than the general distributed algorithm,while the proposed algorithm has more advantages in terms of active sensors’ average energy,scheduling as-tringency and runtime.…”
    Get full text
    Article
  12. 792

    Improved tree structure anti-collision algorithm of RFID by Xue WANG, Zhi-hong QIAN, Xiao-hui LIU, Chao CHENG

    Published 2015-07-01
    “…The whole big query tree is divided into several branches,and the work of tag recognition is executed in each branch,thus reducing the probability of tag collision.The proposed algorithm can be divided into prefix determination and branch query two phases.In the prefix determination phase,the prefix of every tag is identified,and each prefix denotes a branch.Traverse each branch by turns to recognize tags; in the branch query phase,backward search strategy and dynamic search method are used.Theoretical analysis and simulation experiment show that when the improved algorithm can improved the overall performance of RFID system from the aspects of the number of queries,time delay,and throughput.…”
    Get full text
    Article
  13. 793

    Mapping Iterative Medical Imaging Algorithm on Cell Accelerator by Meilian Xu, Parimala Thulasiraman

    Published 2011-01-01
    “…We compare the performance of our proposed algorithm on Cell BE to that of Sun Fire ×4600, a shared memory machine. …”
    Get full text
    Article
  14. 794

    Effect of Population Structures on Quantum-Inspired Evolutionary Algorithm by Nija Mani, Gursaran Srivastava, A. K. Sinha, Ashish Mani

    Published 2014-01-01
    “…Quantum-inspired evolutionary algorithm (QEA) has been designed by integrating some quantum mechanical principles in the framework of evolutionary algorithms. …”
    Get full text
    Article
  15. 795
  16. 796

    Automatic search algorithm for differential characteristics in ARX ciphers by Zheng-bin LIU

    Published 2016-05-01
    “…How to compute the differential of modular addition efficiently is critical to automatic search for differential characteristic in ARX ciphers.To solve this problem,firstly,the concept of collerated difference distribution table (CDDT) was proposed.By looking up the CDDT,it was very efficient to compute the differential probability of modular addition.Secondly,extending Matsui’s algorithm to ARX cihpers and using CDDT,an automatic search algorithm was proposed,and the algorithm could give the differential characteristic with highest probability in ARX ciphers.Finally,the proposed algorithm was applied to the ARX cipher SPECK,and got the best differential characteristics for SPECK32,SPECK48 and SPECK64.…”
    Get full text
    Article
  17. 797

    Association rules recommendation algorithm supporting recommendation nonempty by Ming HE, Wei-shi LIU, Jiang ZHANG

    Published 2017-10-01
    “…Existing association rule recommendation technologies were focus on extraction efficiency of association rule in data mining.However,it lacked consideration of recommendation balance between popular and unusual data and efficient processing.In order to improve the quality and efficiency of personalized recommendation and balance the recommendation weight of cold and hot data,the problem of mining frequent itemset based on association rule was revaluated and analyzed,a new evaluation metric called recommendation RecNon and a notion of k-pre association rule were defined,and the pruning strategy based on k-pre frequent itemset was designed.Moreover,an association rule mining algorithm based on the idea was proposed,which optimized the Apriori algorithm and was suitable for different evaluation criteria,reduced the time complexity of mining frequent itemset.The theoretic analysis and experiment results on the algorithm show that the method improved the efficiency of data mining and has higher RecNon,F-measure and precision of recommendation,and efficiently balance the recommendation weight of cold data and popular one.…”
    Get full text
    Article
  18. 798
  19. 799

    A Global Optimization Algorithm for Generalized Quadratic Programming by Hongwei Jiao, Yongqiang Chen

    Published 2013-01-01
    “…We present a global optimization algorithm for solving generalized quadratic programming (GQP), that is, nonconvex quadratic programming with nonconvex quadratic constraints. …”
    Get full text
    Article
  20. 800

    Wireless indoor localization technology based on fingerprint algorithm by Mengdan ZHANG, Guangyue LU, Honggang WANG, Jiming LIU

    Published 2016-10-01
    “…Then the principle of the existing indoor localization algorithm and its developing condition at present were summarized. …”
    Get full text
    Article