Showing 12,781 - 12,800 results of 19,511 for search '"algorithms"', query time: 0.14s Refine Results
  1. 12781

    Cooperative Cloud Service Aware Mobile Internet Coverage Connectivity Guarantee Protocol Based on Sensor Opportunistic Coverage Mechanism by Qin Qin, Yong-qiang He, Li-ming Nie

    Published 2015-01-01
    “…In this scheme, based on the opportunistic covering rules, the network coverage algorithm of high reliability and real-time security was achieved by using the opportunity of sensor nodes and the Internet mobile node. …”
    Get full text
    Article
  2. 12782

    Modified SIFT Descriptors for Face Recognition under Different Emotions by Nirvair Neeru, Lakhwinder Kaur

    Published 2016-01-01
    “…The main goal of this work is to develop a fully automatic face recognition algorithm. Scale Invariant Feature Transform (SIFT) has sparingly been used in face recognition. …”
    Get full text
    Article
  3. 12783

    Intelligent scheduling mechanism of time-sensitive network modal in polymorphic network by Sijin YANG, Lei ZHUANG, Yu SONG, Jiaxing WANG, Xinyu YANG

    Published 2022-05-01
    “…For the problems of uncertain forwarding scheduling and long solving time of time-sensitive network modal in polymorphic network, a joint routing and scheduling mechanism of time-sensitive network modal based on CSQF was proposed.Considering the requirement of bounded delay, network state and different routing mechanisms, a hybrid resource scheduling problem of joint cache queue and routing was formulated to optimize the resource usage of the entire network.Then, the traffic characteristics and cache queue utilization was used to predict the cache utilization of the next cycle, which was based on deep reinforcement learning.In addition, by using multi-queue CSQF forwarding scheduling mechanism and explicit routing algorithm based on cache utilization, an iterative scheduling algorithm was proposed to achieve deterministic forwarding and resource allocation.Simulation results show that the mechanism can effectively adjust the transmission scheduling of deterministic applications according to the resource usage of the network, and has better schedulability compared with other off-line scheduling mechanisms.…”
    Get full text
    Article
  4. 12784

    An adaptive video stream transmission control method for wireless heterogeneous networks based on A3C by Zhiqiang LUO, Wei WANG, Xiaorong ZHU

    Published 2020-12-01
    “…The adaptive bit rate (ABR) algorithm has become the focus research in video transmission.However,due to the characteristics of 5G wireless heterogeneous networks,such as large fluctuation of channel bandwidth and obvious differences between different networks,the adaptive video stream transmission with multi-terminal cooperation was faced with great challenges.An adaptive video stream transmission control method based on deep reinforcement learning was proposed.First of all,a video stream dynamic programming model was established to jointly optimize the transmission rate and diversion strategy.Since the solution of this optimization problem depended on accurate channel estimation,dynamically changing channel state was difficult to achieve.Therefore,the dynamic programming problem was improved to reinforcement learning task,and the A3C algorithm was used to dynamically determine the video bit rate and diversion strategy.Finally,the simulation was carried out according to the measured network data,and compared with the traditional optimization method,the method proposed better improved the user QoE.…”
    Get full text
    Article
  5. 12785

    An Adaptive Framework for Real-Time ECG Transmission in Mobile Environments by Kyungtae Kang

    Published 2014-01-01
    “…The algorithm takes into account the differing priorities of packets in each layer, which prevents the perceived quality of the reconstructed ECG signal from degrading abruptly as channel conditions worsen, while using the available bandwidth efficiently. …”
    Get full text
    Article
  6. 12786

    Accelerated unconstrained latent factorization of tensor model for Web service QoS estimation by Mingwei LIN, Wenqiang LI, Xiuqin XU, Jian LIU

    Published 2024-03-01
    “…Aiming at the problem that the Web service quality of service (QoS) estimation methods based on the non-negative latent factorization of tensor model (NLFT) depend heavily on non-negative initial random data and specially designed non-negative training schemes, which lead to low compatibility and scalability, an accelerated unconstrained latent factorization of tensor (AULFT) model was proposed.The proposed model consisted of three main parts.The non-negative constraints from decision parameters were transferred to output latent factors and they were connected through the single-element-dependent mapping function.A momentum-incorporated stochastic gradient descent (MSGD) algorithm was used to effectively improve the convergence rate and estimation accuracy of the proposed AULFT model.The detailed algorithm and result analysis of the proposed AULFT model were presented.The empirical study on two dynamic QoS datasets in real industrial applications demonstrates that the proposed AULFT model has higher computational efficiency and estimation accuracy than the state-of-the-art QoS estimation models.…”
    Get full text
    Article
  7. 12787

    Approach of glowworm swarm optimization based virtual machine placement by Shengchao XU, Maohua XIONG, Tianqi ZHOU

    Published 2022-03-01
    “…In a cloud data center, one of the most important problems is using novel virtual machine placement strategy to promote the physical resource utilization.An approach of glowworm swarm optimization based virtual machine placement for cloud data centers called GSO-VMP was proposed.In the virtual placement, GSO algorithm was used to find a near-optimal solution.Each physical host had a luciferin value which represented the available CPU utilization.Whenever a VM was placed to a physical host, luciferin value of this physical host was updated.GSO-VMP algorithm could search the more available physical host within local range and thus the virtual migration numbers had been decreased and low energy consumption had been obtained.GSO-VMP had been evaluated using CloudSim with real-world workload data.The experimental results show that GSO-VMP has good performance in resource wastage and energy consumption.…”
    Get full text
    Article
  8. 12788

    Estimation of partially linear single-index spatial autoregressive model using B-splines by Lei Liu, Jun Dai

    Published 2024-12-01
    “…The Nelder-Mead iteration algorithm is adopted to calculate the parametric and nonparametric parts simultaneously in the optimization. …”
    Get full text
    Article
  9. 12789

    Blockchain-based noisy data sharing control protocol by Qingqing XIE, Nianmin YANG, Xia FENG

    Published 2023-10-01
    “…Blockchain provides a trusted channel for information sharing in an untrusted network.However, blockchain ledgers are public and transparent.Hence, the sensitive data stored in plaintext on the blockchain will compromise user privacy.Considering privacy preservation, users are more inclined to provide noisy data.And in different application scenarios, the level of data noise that users need to provide also varies.To this end, a secure, efficient, and searchable noisy data sharing control protocol was proposed based on the blockchain and smart contract technology with the ciphertext policy attribute-based encryption (CP-ABE) algorithm.First, an outsourced CP-ABE algorithm was introduced to reduce the computing burden on the user side.Secondly, smart contract was implemented to perform data search on ciphertext, which could prevent malicious operations by malicious servers.Third, the proposed protocol reduced the data update complexity to O(1), which is friendly to the scenarios with real-time data update.Finally, security analysis and simulation experiments demonstrate the security and feasibility of the proposed protocol.…”
    Get full text
    Article
  10. 12790

    Denoising recovery for compressive sensing based on selective measure by Li-ye PEI, Hua JIANG, Yue-liang MA

    Published 2017-02-01
    “…In order to reduce the effect of noise folding (NF) phenomenon on the performance of sparse signal recon-struction,a new denoising recovery algorithm based on selective measure was proposed.Firstly,the NF phenomenon in compressive sensing (CS) was explained in theory.Secondly,a new statistic based on compressive measurement data was proposed,and its probability density function (PDF) was deduced and analyzed.Then a noise filter matrix was constructed based on the PDF to guide the optimization of measurement matrix.The optimized measurement matrix can selectively sense the sparse signal and suppress the noise to improve the SNR of the measurement data,resulting in the improvement of sparse reconstruction performance.Finally,it was pointed out that increasing the measurement times can further enhance the performance of denoising reconstruction.Simulation results show that the proposed denoising recon-struction algorithm has a better improvement in the performance of reconstruction of noisy signal,especially under low SNR.…”
    Get full text
    Article
  11. 12791

    Performance optimization of active RIS-assisted near-shore dual-function radar communicaiton system by XU Miao, YUE Dianwu, SUN Yu, WU Xiangkai, YUAN Meng

    Published 2025-01-01
    “…An alternating optimization algorithm based on fractional programming theory and the Lagrangian operator method was proposed. …”
    Get full text
    Article
  12. 12792

    Research on Path Planning Method of Coal Mine Robot to Avoid Obstacle in Gas Distribution Area by Ruiqing Mao, Xiliang Ma

    Published 2016-01-01
    “…Second, the initial working paths for the coal mine robot are obtained based on Dijkstra algorithm, and then the global optimal working path for the coal mine robot is obtained based on ant colony algorithm. …”
    Get full text
    Article
  13. 12793

    Intelligent System of Somatosensory Music Therapy Information Feedback in Deep Learning Environment by Nan Zhao

    Published 2021-01-01
    “…The simulation results show that this optimization algorithm can effectively improve the recognition performance of DBN, with an accuracy of 94% in a certain environment, and has a better classification effect than other traditional classification methods.…”
    Get full text
    Article
  14. 12794

    Method of network slicing deployment based on performance-aware by Kaizhi HUANG, Qirun PAN, Quan YUAN, Wei YOU, Hongbo TANG

    Published 2019-08-01
    “…In order to deal with the performance degradation caused by resource contention due to the sharing of physical resources between VNF in the network slicing,a network slicing deployment method based on performance-awareness was proposed.When deploying network slice instances,first two-phase deployment that mapping virtual nodes was adopted,and then virtual links were mapped.In the virtual nodes mapping phase,the VNF performance influences factor was defined from the perspective of resource supply and demand to quantify the degree of VNF performance impact.Then the sum of the performance influence factors of all VNF on the deployable physical server was found in the network slice instance,the physical server with the smallest sum of performance influence factors was used as the mapping location,and the simulated annealing-discrete particle swarm algorithm was used to find the nodes mapping result.In the virtual links mapping phase,the shortest path algorithm was used to obtain the link mapping result.The simulation results show that the proposed method reduces the impact of other network slices on its own service performance.…”
    Get full text
    Article
  15. 12795

    An Efficient Clustering Protocol for Wireless Sensor Networks Based on Localized Game Theoretical Approach by Dongfeng Xie, Qi Sun, Qianwei Zhou, Yunzhou Qiu, Xiaobing Yuan

    Published 2013-08-01
    “…The sensor nodes, which are modelled as players, join in a clustering game to campaign for cluster heads with an equilibrium probability. However, the CROSS algorithm needs the global information of how many nodes participate in the game at every round. …”
    Get full text
    Article
  16. 12796

    Flexible Emergency Vehicle Network Design considering Stochastic Demands and Inverse-Direction Lanes by Hua Wang, Ling Xiao, Zhang Chen

    Published 2018-01-01
    “…A simulation-based genetic algorithm is proposed to solve the model. With numerical experiments, we demonstrate the value of deploying inverse-direction EV lanes and the computational efficiency of the proposed algorithm. …”
    Get full text
    Article
  17. 12797

    Sparse Blossom: correcting a million errors per core second with minimum-weight matching by Oscar Higgott, Craig Gidney

    Published 2025-01-01
    “…In this work, we introduce a fast implementation of the minimum-weight perfect matching (MWPM) decoder, the most widely used decoder for several important families of quantum error correcting codes, including surface codes. Our algorithm, which we call sparse blossom, is a variant of the blossom algorithm which directly solves the decoding problem relevant to quantum error correction. …”
    Get full text
    Article
  18. 12798

    A Labeled Multi-Bernoulli Filter Based on Maximum Likelihood Recursive Updating by Yuhan Song, Han Shen-Tu, Junhao Lin, Yizhen Wei, Yunfei Guo

    Published 2024-01-01
    “…A labeled multi-Bernoulli tracking algorithm based on maximum likelihood recursive update is proposed, which can reduce the computational scale while maintaining tracking accuracy. …”
    Get full text
    Article
  19. 12799

    Clustering perception mining of network protocol’s stealth attack behavior by Yan-jing HU, Qing-qi PEI

    Published 2017-06-01
    “…Deep stealth attack behavior in the network protocol becomes a new challenge to network security.In view of the shortcomings of the existing protocol reverse methods in the analysis of protocol behavior,especially the stealth attack behavior mining,a novel instruction clustering perception mining algorithm was proposed.By extracting the protocol's behavior instruction sequences,and clustering analysis of all the behavior instruction sequences using the instruction clustering algorithm,the stealth attack behavior instruction sequences can be mined quickly and accurately from a large number of unknown protocol programs according to the calculation results of the behavior distance.Combining dynamic taint analysis with instruction clustering analysis,1 297 protocol samples were analyzed in the virtual analysis platform hidden disc which was developed independently,and 193 stealth attack behaviors were successfully mined,the results of automatic analysis and manual analysis were completely consistent.Experimental results show that,the solution is ideal for perception mining the protocol's stealth attack behavior in terms of efficiency and accuracy.…”
    Get full text
    Article
  20. 12800

    Enhancing Intelligent Control Strategies for UAVs: A Comparative Analysis of Fuzzy Logic, Fuzzy PID, and GA-Optimized Fuzzy PID Controllers by Nigatu Wanore Madebo

    Published 2025-01-01
    “…The GAFPID controller employs evolutionary computation through a genetic algorithm to optimize parameter tuning, offering superior control performance. …”
    Get full text
    Article