Showing 1,421 - 1,440 results of 12,475 for search '"algorithms"', query time: 0.06s Refine Results
  1. 1421

    Research on Word Vector Training Method Based on Improved Skip-Gram Algorithm by Yachun Tang

    Published 2022-01-01
    “…In view of the shortcomings of the traditional skip-gram model in coding and modeling the processing of context words, this study proposes an improved word vector-training method based on skip-gram algorithm. Based on the analysis of the existing skip-gram model, the concept of distribution hypothesis is introduced. …”
    Get full text
    Article
  2. 1422

    Single anchor node real-time positioning algorithm based on the antenna array by Yong Fu

    Published 2017-05-01
    “…Finally, the algorithm is evaluated by experiments in real environments. …”
    Get full text
    Article
  3. 1423

    A tensor compression algorithm using Tucker decomposition and dictionary dimensionality reduction by Chenquan Gan, Junwei Mao, Zufan Zhang, Qingyi Zhu

    Published 2020-04-01
    “…Tensor compression algorithms play an important role in the processing of multidimensional signals. …”
    Get full text
    Article
  4. 1424
  5. 1425

    Energy-Aware Distributed Intelligent Data Gathering Algorithm in Wireless Sensor Networks by Rongbo Zhu, Yingying Qin, Jiangqing Wang

    Published 2011-05-01
    “…To plan the data collecting path for the mobile collector in wireless sensor network (WSN), an efficient energy-aware distributed intelligent data gathering algorithm (DIDGA) is proposed, which includes cluster formation and path formation phases. …”
    Get full text
    Article
  6. 1426

    Amending the algorithm of aerosol–radiation interactions in WRF-Chem (v4.4) by J. Feng, C. Zhao, C. Zhao, C. Zhao, C. Zhao, C. Zhao, C. Zhao, Q. Du, Z. Yang, C. Jin

    Published 2025-02-01
    “…The impacts of changing this calculation algorithm are then evaluated. The simulation results of aerosol optical properties are quite different using the new Resolved algorithm, especially for dust aerosols. …”
    Get full text
    Article
  7. 1427

    Optimal Scheduling of Multi-Energy Complementary Systems Based on an Improved Pelican Algorithm by Hongbo Zou, Jiehao Chen, Fushuan Wen, Yuhong Luo, Jinlong Yang, Changhua Yang

    Published 2025-01-01
    “…The improved pelican optimization algorithm (IPOA) is compared with other leading algorithms, demonstrating the validity of our model and the superiority of IPOA in reducing costs and managing complex constraints in optimization.…”
    Get full text
    Article
  8. 1428

    Design of Branch Definition Algorithm for Top-k Inverse Queries for Image Processing by Haixia Zhang, Qingxiu Peng

    Published 2022-01-01
    “…Currently, the most efficient algorithm for computing top-k inverse sets is the inverse top-k algorithm. …”
    Get full text
    Article
  9. 1429

    Heuristic Algorithm for Cross-Platform Credit Risk Transmission Based on Hybrid Strategies by Zhang Xiaodong, Shen Hong, Wang Tao, Li Yazhi

    Published 2022-01-01
    “…In detail, the mathematical association structure between credit entities is firstly given in the algorithm, and the breadth first search algorithm is used to find the hierarchical nodes on the credit risk transmission paths. …”
    Get full text
    Article
  10. 1430

    Global dynamic path‐planning algorithm in gravity‐aided inertial navigation system by Shengwu Zhao, Lei Shi, Wenzhe Zhang, Zhihong Deng

    Published 2021-10-01
    “…To deal with such problems, this work improves the global static path‐planning algorithm based on the A* algorithm, and the local dynamic path‐planning algorithm based on dynamic window approach (DWA). …”
    Get full text
    Article
  11. 1431

    SACWOM: Synergistic Adaptive Congestion Window Optimization Mechanism for Self-Clocked Algorithm by Haider Dhia Zubaydi, Ahmed Samir Jagmagji, Sandor Molnar

    Published 2025-01-01
    “…Congestion Control (CC) is essential in networked systems, especially in environments with strict delay and throughput requirements. While CC algorithms like Self-Clocked Rate Adaptation for Multimedia (SCReAM) and Bottleneck Bandwidth and Round-trip propagation time (BBR) have shown progress, each faces limitations: BBR encounters difficulty in balancing responsiveness and fairness when rapid fluctuations in network conditions arise, which can lead to inefficient performance in shared environments. …”
    Get full text
    Article
  12. 1432
  13. 1433

    An Effective Privacy-Preserving Algorithm Based on Logistic Map and Rubik’s Cube Transformation by Wenbin Yao, Pengdi Ye, Xiaoyong Li

    Published 2014-01-01
    “…In this paper, a new algorithm for data splitting called EPPA is presented to strengthen the confidentiality of data by two-phase process. …”
    Get full text
    Article
  14. 1434

    Efficient Cross-Layer Optimization Algorithm for Data Transmission in Wireless Sensor Networks by Chengtie Li, Jinkuan Wang, Mingwei Li

    Published 2015-01-01
    “…Simulation results demonstrate the validity and high performance of the proposed algorithm.…”
    Get full text
    Article
  15. 1435

    Clustering Algorithm for Urban Taxi Carpooling Vehicle Based on Data Field Energy by Xiao Qiang, Yao Shuang-Shuang

    Published 2018-01-01
    “…The clustering results of the proposed algorithm are better than those of the classical clustering algorithm. …”
    Get full text
    Article
  16. 1436

    Hybrid Projection Algorithm for Two Countable Families of Hemirelatively Nonexpansive Mappings and Applications by Zi-Ming Wang, Poom Kumam

    Published 2013-01-01
    “…Two countable families of hemirelatively nonexpansive mappings are considered based on a hybrid projection algorithm. Strong convergence theorems of iterative sequences are obtained in an uniformly convex and uniformly smooth Banach space. …”
    Get full text
    Article
  17. 1437

    Quantum Particle Swarm Optimization Extraction Algorithm Based on Quantum Chaos Encryption by Chao Li, Mengna Shi, Yanqi Zhou, Erfu Wang

    Published 2021-01-01
    “…Finally, the signal is extracted using the Levi flight strategy based on kurtosis and the quantum particle swarm optimization optimized by the greedy algorithm (KLG-QPSO). The bit error rate and similarity coefficient of the voice signal are extracted by testing the source voice signal SA1, SA2, and SI943 under different SNR, and the similarity coefficient, uncertainty, and disorder of the observed signal and the source voice signal SA1, SA2, and SI943 verify the effectiveness of the proposed speech signal extraction method and the security of quantum chaos used in speech signal encryption.…”
    Get full text
    Article
  18. 1438
  19. 1439
  20. 1440