Showing 14,701 - 14,720 results of 19,511 for search '"algorithms"', query time: 0.11s Refine Results
  1. 14701

    An Efficient Cluster Head Selection Approach for Collaborative Data Processing in Wireless Sensor Networks by Yan Qiang, Bo Pei, Wei Wei, Yue Li

    Published 2015-06-01
    “…This paper proposes an efficient cluster head selection approach for collaborative data processing in WSNs. The proposed algorithm designs an effective energy-efficient model to select the optimal cluster heads among all nodes fairly, which helps to reduce the impact of the monitoring scheme on the lifetime of network. …”
    Get full text
    Article
  2. 14702

    A GenEO Domain Decomposition method for Saddle Point problems by Nataf, Frédéric, Tournier, Pierre-Henri

    Published 2023-03-01
    “…We introduce an adaptive element-based domain decomposition (DD) method for solving saddle point problems defined as a block two by two matrix. The algorithm does not require any knowledge of the constrained space. …”
    Get full text
    Article
  3. 14703

    Multi-sensor image fusion based on contrast and directional features optimization by Haiyan Jin, Meng Zhang, Zhaolin Xiao, Yaning Li

    Published 2018-12-01
    “…Then, we compute the decomposition coefficients of visible and infrared images using a low-pass filter on the decomposed data; and finally, we introduce the whale optimization algorithm to search optimal coefficients to reconstruct the final fusion image. …”
    Get full text
    Article
  4. 14704

    Mining behavior pattern of mobile malware with convolutional neural network by Xin ZHANG, Weizhong QIANG, Yueming WU, Deqing ZOU, Hai JIN

    Published 2020-12-01
    “…The features extracted by existing malicious Android application detection methods are redundant and too abstract to reflect the behavior patterns of malicious applications in high-level semantics.In order to solve this problem,an interpretable detection method was proposed.Suspicious system call combinations clustering by social network analysis was converted to a single channel image.Convolution neural network was applied to classify Android application.The model trained was used to find the most suspicious system call combinations by convolution layer gradient weight classification activation mapping algorithm,thus mining and understanding malicious application behavior.The experimental results show that the method can correctly discover the behavior patterns of malicious applications on the basis of efficient detection.…”
    Get full text
    Article
  5. 14705

    Disturbance Observer-Based Adaptive Neural Network Control of Marine Vessel Systems with Time-Varying Output Constraints by Wei Zhao, Li Tang, Yan-Jun Liu

    Published 2020-01-01
    “…This article investigates an adaptive neural network (NN) control algorithm for marine surface vessels with time-varying output constraints and unknown external disturbances. …”
    Get full text
    Article
  6. 14706

    BI-DIRECTIONAL EVOLUTIONARY STRUCTURAL OPTIMIZATION USING ADAPTIVE P-VERSION FINITE ELEMENT METHOD by XU JiaoE, YAO Song, LIU Rong

    Published 2020-01-01
    “…According to the error control parameter setting,the element order is improved adaptively through the element energy error analysis,which effectively improves the finite element calculation accuracy,and the sensitivity filtering algorithm and the stabilization strategy are adopted to mitigate the checkerboard and iterative oscillation phenomenon. …”
    Get full text
    Article
  7. 14707

    Comparison of Gaussian Elimination and Cholesky Decomposition Solving A Linear System Of Equation. by Nzabonimpa, Godfrey

    Published 2024
    “…It is found out that Gaussian elimination is an algorithm in linear algebra for solving a system of linear equations and can also be used to find the rank of a matrix, to calculate the determinant of a matrix, and to calculate the inverse of an invertible square matrix Whereas Cho!…”
    Get full text
    Thesis
  8. 14708

    A Comparison of Gaussian Elimination and Cholesky Decomposition Methods in Solving a System of Linear Equations. by Niringiye, Richard

    Published 2024
    “…It is found out that Gaussian elimination is an algorithm in linear algebra for solving a system of linear equations and can also be used to find the rank of a matrix, to calculate the determinant of a matrix, and to calculate the inverse of an invertible square matrix Whereas Cholesky decomposition is a decomposition of a Hermitian, positive-definite matrix into the product of a lower triangular matrix and its conjugate transpose, which is useful for efficient numerical solutions.…”
    Get full text
    Thesis
  9. 14709

    Fréchet Random Noise for k-Regime-Switching Mixture Autoregressive Model by Rasaki, Olawale Olanrewaju, Anthony, Gichuhi Waititu, Nafiu, Lukman Abiodun

    Published 2021
    “…Fréchet Mixture Autoregressive (FMAR) model of k-regime-switching, denoted by FMAR(k; p1, p2 ,, pk ) was developed and Expectation-Maximization (EM) algorithm was used as a method of parameter estimation for the embedded coefficients of AR of k-mixing weights and lag pk. …”
    Get full text
    Article
  10. 14710

    Validation of formaldehyde products from three satellite retrievals (OMI SAO, OMPS-NPP SAO, and OMI BIRA) in the marine atmosphere with four seasons of Atmospheric Tomography Missi... by J. Liao, J. Liao, G. M. Wolfe, A. E. Kotsakis, A. E. Kotsakis, A. E. Kotsakis, J. M. Nicely, J. M. Nicely, J. M. St. Clair, J. M. St. Clair, T. F. Hanisco, G. González Abad, C. R. Nowlan, Z. Ayazpour, Z. Ayazpour, I. De Smedt, E. C. Apel, R. S. Hornbrook

    Published 2025-01-01
    “…Here we intercompare three satellite retrievals of total HCHO columns from the Ozone Monitoring Instrument Smithsonian Astrophysical Observatory (OMI SAO (v004)) algorithm, Ozone Mapping and Profiler Suite on Suomi National Polar-orbiting Partnership Smithsonian Astrophysical Observatory (OMPS-NPP SAO) algorithm, and Ozone Monitoring Instrument Belgian Institute for Space Aeronomy (OMI BIRA) algorithm and validate them against in situ observations from the NASA Atmospheric Tomography Mission (ATom) mission. …”
    Get full text
    Article
  11. 14711

    Asymptotic Optimality and Rates of Convergence of Quantized Stationary Policies in Continuous-Time Markov Decision Processes by Xiao Wu, Yanqiu Tang

    Published 2022-01-01
    “…Also, we give an iteration algorithm on the approximate optimal policies. Finally, we give an example to illustrate the asymptotic optimality.…”
    Get full text
    Article
  12. 14712

    Proactive migration model of SWIM service based on situation awareness by Zhijun WU, Shengyan ZHOU, Jin LEI

    Published 2019-08-01
    “…To solve the problem that in the system wide information management (SWIM) network,the SWIM service provider suffers from SWIM service interruption,service delay increase or service quality degradation due to malicious attack or self-failure.Therefore,a proactive migration model of SWIM service was proposed on the basis of situation awareness,which used the random forest algorithm to timely judge the SWIM service provider security situation.SWIM service authority was actively migrated according to security situation,and the emergencies impact on SWIM services were reduces.Experimental results show that the proposed model can guarantee services continuity in an emergency event,which has higher reliability and stability than SWIM network in which the service migration model is not deployed.…”
    Get full text
    Article
  13. 14713

    Anti-packet-loss joint encoding for voice-over-IP steganography by Zhan-zhan GAO, Guang-ming TANG, Wei-wei ZHANG

    Published 2016-11-01
    “…Furthermore, the influences of key parameters on the performance of joint coding were studied. The selection algorithm for optimal parameters was also given. Experimental results show that the proposed joint coding can effectively improve steganographic resistance to packet loss, and decrease the number of modifications to the voice stream.…”
    Get full text
    Article
  14. 14714

    Link duration probability based cross-layer routing protocol for epoch-based movement by SUN Jie, GUO Wei

    Published 2010-01-01
    “…The end to end transmission performance is very poor because of routing failure caused by node movement in MANET.To solve this problem,an algorithm for the link duration probability of epoch-based movement was proposed,and based on which a link duration probability based cross-layer routing protocol for epoch-based movement(LPCP) was proposed.LPCP cross-layer interacts with transport layer,and considered both the maximum path availability and the minimum hops of an end to end connection.Three complementary mechanisms:routing switch,save then forward,ack reconfirm were proposed to prevent routing failure and the transmission efficiency reduction.It is shown by computer simulation that LPCP results in a significant improvement of the packet loss caused by routing failure,and increase the throughput much more.…”
    Get full text
    Article
  15. 14715

    Research on Parking Service Optimization Based on Permit Reservation and Allocation by Duo Xu, Huijun Sun

    Published 2022-01-01
    “…It first analyzes the characteristics and costs of “arrival priority” and “reservation priority” modes, and then, it proposes the parking permit reservation and allocation mode based on “service order optimization” and designs an “ant colony-genetic” algorithm to solve the optimal service order. The numerical example shows that the measures of quantity control and matching optimization are effective in parking management. …”
    Get full text
    Article
  16. 14716

    Communication-efficient distributed precoding design for Massive MIMO by Mian LI, Yang LI, Zonghui ZHANG, Qingjiang SHI

    Published 2023-08-01
    “…A communication-efficient distributed precoding scheme was proposed for multi-baseband processing unit (BBU) baseband processing architecture, aiming to reduce fronthaul data exchange and computational complexity between BBUs.Firstly, a distributed framework based on R-WMMSE algorithm was proposed, which utilized the subspace property of the optimal solution to compress the interactive data losslessly, thereby reducing data exchange.Furthermore, two learnable compression modules based on matrix multiplication were designed, using optimized computing structures and matrix parameters to reduce the parameters and computations while maintaining function expressiveness.Finally, the learnable modules and the distributed precoding framework were jointly optimized with achievable rate as the optimization objective to obtain the final model.The proposed scheme can achieve guaranteed precoding performance under lower requirements on data interaction and computational complexity…”
    Get full text
    Article
  17. 14717

    Fast TDOA and FDOA Estimation for Coherent Pulse Signals by Yan Liu, Fucheng Guo

    Published 2022-01-01
    “…The estimates are then refined with the cross-ambiguity function (CAF) algorithm within a small TDOA and FDOA neighborhood. …”
    Get full text
    Article
  18. 14718

    Approximate Method to Evaluate Reliability of Complex Networks by Petru Caşcaval

    Published 2018-01-01
    “…The method requires an algorithm for transforming the set of minimal paths into a sum of disjoint products (SDP). …”
    Get full text
    Article
  19. 14719

    Research of vehicular cloud storage resource management based on trust mechanism by Jin Wang, Miao Zhang, Xiang Gu, Tiequan Wang, Jie Wang, Liang Chen

    Published 2021-03-01
    “…The model can reasonably arrange the suitable scheduling algorithm according to the attribute characteristics of different kind of service requirements. …”
    Get full text
    Article
  20. 14720

    Video description method based on multidimensional and multimodal information by Enjie DING, Zhongyu LIU, Yafeng LIU, Wanli YU

    Published 2020-02-01
    “…In order to solve the problem of complex information representation in automatic video description tasks,a multi-dimensional and multi-modal visual feature extraction and fusion method was proposed.Firstly,multi-dimensional features such as static and dynamic attributes of the video sequence were extracted by transfer learning,and the image description algorithm was also used to extract the semantic information of the key frames in the video.By doing this,the video features extraction was carried out.Then,multi-layer long and short memory networks were used to fuse multi-dimensional and multi-modal information,and finally generated a language description of the video content.Compared with the existing methods,experimental simulations results show that the proposed method achieves better results in the video automatic description task.…”
    Get full text
    Article