Showing 14,441 - 14,460 results of 19,511 for search '"algorithms"', query time: 0.09s Refine Results
  1. 14441

    Design of Sports Image Contour Feature Acquisition System Based on the Background Subtraction Method by Zhichao Xiong

    Published 2022-01-01
    “…We propose two methods are improved and fused, respectively, and the fusion algorithm is applied to the complex scene for MTD, so as to improve the accuracy of MTD in complex and hybrid scenes. …”
    Get full text
    Article
  2. 14442

    SVM classifier for telecom user arrears based on boundary samples-based under-sampling approaches by Chuangchuang LI, Guangyue LU, Hanglong WANG

    Published 2017-09-01
    “…Telecom users’ arrears forecasting is a classification problem of unbalanced data set.To deal with the problem that the traditional SVM on the unbalanced date set had a low detection accuracy of minority class,a novel method was proposed.Based on the fact that the position of classification plane was determined by the boundary samples,the proposed method was implemented via removing some of samples closed to the classification plane to avoid the deficiency of the traditional SVM algorithm.Finally,the proposed method was compared with other approaches on unbalanced data sets.The simulation results show that the proposed method can not only increase the detection accuracy of minority but also improve the overall classification performance.…”
    Get full text
    Article
  3. 14443

    Fuzzy reasoning model for analysis of program maliciousness by FU Wen, WEI Bo, ZHAO Rong-cai, PANG Jian-min

    Published 2010-01-01
    “…Finally, whether the program is malicious was determined approximately using a fuzzy reasoning algorithm. Experimental results show that the prototype based on this model is good at detecting unknown malicious programs and malware variants.…”
    Get full text
    Article
  4. 14444

    Analysis on the degree of freedom of interference alignment in cognitive radio by UNXian S, HAOXiao-hui Z

    Published 2016-02-01
    “…An improved minimum interference leakage algorithm was proposed, with which the conclu-sion was verified.…”
    Get full text
    Article
  5. 14445

    Research progress of blockchain network covert channel by Leixiao LI, Jinze DU, Hao LIN, Haoyu GAO, Yanyan YANG, Jing GAO

    Published 2022-09-01
    “…Characterized by decentration, anonymity, strong robustness and tamper resistance, blockchain accompanied by digital currency is a natural carrier for building the covert communication channel.First, the definition and development history of the network covert channel, the framework of blockchain technology and the traditional network covert channel were introduced and the advantages of the channel in the blockchain were given.Thus, the channel in blockchain was classified on the basis of transaction address, signature algorithm, smart contract and P2P broadcast mechanism.The merits and demerits were analyzed in terms of crypticity, transmission efficiency, and communication costs.Lastly, problems and the future research direction of the network covert channel in blockchain were presented.…”
    Get full text
    Article
  6. 14446

    Selection scheme of mobile sinks in wireless sensor networks by CHENG Long 1, CHEN Can-feng 2, MA Jian 2

    Published 2008-01-01
    “…By taking the ubiquitous nature of mo- bile devices into consideration, different selection schemes of mobile sinks in M2S2N were compared, and an opportunis- tic transmission scheduling algorithm (OTSA) for M2S2N was further proposed. Simulation results indicate that the pro- posed sink selection scheme in OTSA-M2S2N is effective and can significantly improve the performance such as energy efficiency and successful transmission ratio.…”
    Get full text
    Article
  7. 14447

    Separation method of predistortion for Wiener PA by CHEN Kai-ya, WANG Min-xi

    Published 2005-01-01
    “…The method first separated memory subsystem and nonlinear subsystem from Wiener PA, and then got their corresponding predistortion subsystems by identification algorithm. At last, it combined the two subsystems to a Hammerstein system and then linearized Wiener PA. …”
    Get full text
    Article
  8. 14448

    A video encryption in HEVC entropy coding based on magic square by Bowen XU, Xiaodong WANG, Lei GUO, Jian WANG

    Published 2018-03-01
    “…In view of the multimedia information security,based on the entropy module on high efficiency video coding (HEVC/H.265),combined with the magic square,a real time and high efficiency encryption technique for high-definition video streaming was proposed.The algorithm which had an effective use of transform coefficient sparsity enabled coefficient group (CG) of transform block (TB) scrambling,and used a selective encryption on syntax elements in CG's entropy.The experiments prove that the investigated scheme has high security,which can guarantee the standard compliance and the demand of video encryption while having a low impact on encoding-rate performance.…”
    Get full text
    Article
  9. 14449

    A study of the stored energy in titanium under deformation and failure using infrared data by A.Yu. Fedorova, M.V. Bannikov, O.A. Plekhov

    Published 2013-03-01
    “…The original mathematical algorithm for experimental data processing has been applied to obtain the rate of heat dissipation generated by plastic deformation and stored energy. …”
    Get full text
    Article
  10. 14450

    Research on intelligent scheme of telecommunication network by Tao LI, Chunjia WANG, Shanshan LI

    Published 2023-03-01
    “…The network of telecom operators needs to be promoted urgently in agility, efficiency and intelligence to realize its self-configuration, self-management and self-optimization.However, due to the inconsistent development route and technical characteristics between AI and communication network, how to deeply integrate AI and communication network is necessary to be considered systematically.Based on the development of the telecommunication network intelligence industry, and on the basis of the analysis of the needs of telecom operators for intelligence and the assessment of the status quo, the goal and technical scheme of telecommunication network intelligence were proposed, which covered the intelligent framework, intelligent functional modules and processes, data processing, algorithm model construction and integration.The scheme was helpful to promote the large-scale intellectualization of telecom operators and improve operational efficiency.…”
    Get full text
    Article
  11. 14451

    Design and implementation of routing strategy based on terminal trust by Ansheng YIN, Shunyi ZHANG

    Published 2016-04-01
    “…Currently,the research focuses on the routing strategies of lightweight network. The routing algorithm has the large overhead and small applications,which is mainly based on IPv4. …”
    Get full text
    Article
  12. 14452
  13. 14453

    Repairbads: An automatic and adaptive method to repair bad channels and segments for OPM-MEG by Fulong Wang, Yujie Ma, Tianyu Gao, Yue Tao, Ruonan Wang, Ruochen Zhao, Fuzhi Cao, Yang Gao, Xiaolin Ning

    Published 2025-02-01
    “…Repairbads employs Riemannian Potato combined with joint decorrelation to project out artifact components, achieving automatic bad segment repair. Then, an adaptive algorithm is used to segment the signal into relatively stable noise data chunks, and the source-estimate-utilizing noise-discarding algorithm is applied to each chunk to achieve automatic bad channel repair. …”
    Get full text
    Article
  14. 14454

    Upper Elevational Limit of Vegetation in the Himalayas Identified from Landsat Images by Bo Wei, Yili Zhang, Linshan Liu, Binghua Zhang, Dianqing Gong, Changjun Gu, Lanhui Li, Basanta Paudel

    Published 2024-12-01
    “…Subsequently, the Canny edge detection algorithm was applied to identify vegetation edge pixels, and elevation differences were utilized to determine the upper edges of the vegetation. …”
    Get full text
    Article
  15. 14455

    CCD Standard Curve Fitting for Microarray Detection Base on Multi-Layer Perceptron by Zhenhua Gan, Dongyu He, Peishu Wu, Baoping Xiong, Nianyin Zeng, Fumin Zou, Feng Guo, Qin Bao, Fengyan Zhao

    Published 2024-01-01
    “…In view of the poor curve fitting performance of LSA, Weighted Least Squares (WLS), and Penalized Least Squares (PLS), as well as the small dataset, this paper proposes the Multi-Layer Perceptron (MLP) neural network algorithm with the minimization of relative error as the constraint, which is applied to the standard curve fitting of the scanner. …”
    Get full text
    Article
  16. 14456

    Late-onset first epileptic seizure and cerebral small vessel disease: role of juxtacortical white matter lesions by Adrian Nasca, Adrian Nasca, Leo Sokolovič, Leo Sokolovič, Oliver Koprda, Patrick Haage, Patrick Haage, Thorsten Schmidt, Juraj Kukolja, Juraj Kukolja

    Published 2025-01-01
    “…WML segmentation was performed on FLAIR images using the SPM based automated lesion prediction algorithm of the LST toolbox and careful manual adjustment. …”
    Get full text
    Article
  17. 14457

    Machine learning model and nomogram to predict the risk of heart failure hospitalization in peritoneal dialysis patients by Liping Xu, Fang Cao, Lian Wang, Weihua Liu, Meizhu Gao, Li Zhang, Fuyuan Hong, Miao Lin

    Published 2024-12-01
    “…The performance was validated using fivefold cross-validation. The optimal ML algorithm was used to construct the models to predictive the risk of the HF and all-cause mortality. …”
    Get full text
    Article
  18. 14458

    Devil’s Vortex Phase Structure as Frequency Plane Mask for Image Encryption Using the Fractional Mellin Transform by Sunanda Vashisth, Hukum Singh, A. K. Yadav, Kehar Singh

    Published 2014-01-01
    “…The phase key for decryption is obtained by an iterative phase retrieval algorithm. The proposed scheme has been validated for grayscale secret target images, by numerical simulation. …”
    Get full text
    Article
  19. 14459

    Cardinality-constrained structured data-fitting problems by Fan, Zhenan, Fang, Huang, Friedlander, Michael P.

    Published 2024-05-01
    “…Dual-based atom-identification rules reveal the structure of the optimal primal solution from near-optimal dual solutions, which allows for a simple and computationally efficient algorithm that translates any feasible dual solution into a primal solution satisfying the cardinality constraint. …”
    Get full text
    Article
  20. 14460

    Novel approach based on neighborhood relation signature against polymorphic internet worms by WANG Jie1, WANG Jian-xin1, LIU Xu-chong2

    Published 2011-01-01
    “…A class of neighborhood-relation signatures(NRS) was proposed based on neighborhood relationship between worm bytes.Because NRS embodies common characteristics of different morph of some polymorphic worms,Different patterns of polymorphic worms efficiently were detected.NRS generating algorithm(NRSGA) was designed to generate three types of signatures: 1-NRS,2-NRS and(1,2)-NRS.Some experiments were performed to demonstrate the correct-ness of the process of signatures generation and the effectiveness of NRS.Experiment results show that our approach has lower false negative ratio in detecting worms,and is effective to prevent polymorphic worms from propagating.…”
    Get full text
    Article