Showing 15,841 - 15,860 results of 19,511 for search '"algorithms"', query time: 0.09s Refine Results
  1. 15841

    Location-Routing Problem of Emergency Facilities under Uncertain Demand by Branch-Price and Cut by Xuchen Deng

    Published 2021-01-01
    “…We propose a branch and price cutting algorithm, whose pricing problem is a robust resource-constrained shortest path problem. …”
    Get full text
    Article
  2. 15842

    Research on video streaming media cooperative downloading in vehicular ad hoc network by Liang CHEN, Jun WANG, Rong CHEN, Xiang GU, Jin WANG, Jie WAN

    Published 2019-01-01
    “…The same direction multi-hop downloading network flow model was proposed for vehicle communication range and channel competition under forwarding.According to the model and video streaming media characteristic,the same & opposite direction cooperative downloading quality of service (SODCD-QoS) scheme was presented.First,the same direction vehicles helped the target vehicle to achieve multi-hop cooperative downloading.It can reduce the waste of time which the target vehicle has to wait for opposite direction cooperative vehicle.Secondly,the next base stations loaded data into eligible opposite direction vehicles according to vehicles option strategy based on time first or picture quality first.Then the opposite direction vehicles helped the target vehicle to achieve one-hop cooperative downloading.NS simulations show that the SODCD-QoS scheme is better than DSRelay and VCoDS algorithm in terms of download time.Further,the new scheme can maintain good picture quality PSNR.…”
    Get full text
    Article
  3. 15843

    A Single-Valued Extended Hesitant Fuzzy Score-Based Technique for Probabilistic Hesitant Fuzzy Multiple Criteria Decision-Making by Bahram Farhadinia, Atefeh Taghavi

    Published 2021-01-01
    “…Recently, in order to address the issue of difficulty in aggregating decision makers’ opinions, a probability splitting algorithm has been developed that drives an efficient probabilistic-unification process of PHFSs. …”
    Get full text
    Article
  4. 15844

    A mobility support method based on ELM prediction for named data networking by Hua QU, Yansong LI, Jihong ZHAO, Dongxu ZHAO, Jianlong ZHAO

    Published 2017-12-01
    “…Named data networking (NDN) is a new generation network architecture under the guidance of information center network,and the mobility support method is the main research point in NDN.In the traditional way of the producer-side mobility support method,the post-response mode is adopted,which makes it impossible to realize the transparency of the switching process.A mobility support method called PB based on ELM prediction was proposed.In the method,the original forwarding interest base was modified and a new control message packet was added so that the corresponding node in the network could adjust the result of the prediction algorithm in advance,and the switch of the producer terminal could respond to the interest package at any time by means of interest packet multicast.At the same time,the method provided a way to quickly restore the original state of the network for the problem that the prediction may fail.The simulation results show that the proposed PB mobility support method can reduce the handoff latency and the packet loss caused by handoff compared with the RP and IP mobility support methods.…”
    Get full text
    Article
  5. 15845

    Distributed Channel-Aware Quantization Based on Maximum Mutual Information by Sahar Movaghati, Masoud Ardakani

    Published 2016-05-01
    “…We observe that the optimal design depends on both the measurement and channel noises. Moreover, our algorithm can be used to design quantizers that can be deployed in different applications. …”
    Get full text
    Article
  6. 15846

    AOA, Delay, and Complex Propagation Factor Estimation for the Monostatic MIMO Radar System by Saleh O. Al-Jazzar, Sami Aldalahmeh

    Published 2018-01-01
    “…These estimates can be used as initializations for other MIMO radar methods, such as the maximum likelihood algorithm. Simulation results show significantly low root mean square error (RMSE) for AOAs and complex propagation factors. …”
    Get full text
    Article
  7. 15847

    Surface Error Evaluation of Non-circular Bevel Gear of Variable Ratio Differential by Xie Xia, Zhang Xiaobao, Jia Jumin

    Published 2017-01-01
    “…Integrating ICP and BFGS algorithm,an error evaluation model is built,and the measuring data is initially matched and precisely matched to the design model. …”
    Get full text
    Article
  8. 15848

    EBS-based efficient and secure group key management in wireless sensor networks by WANG Wei1, ZHAO Wen-hong2, LI Feng-hua3.4, MA Jian-feng3

    Published 2009-01-01
    “…To achieve the secure group communication in wireless sensor networks(WSN), a EBS-based group key management scheme was presented.First, the network topology was simplified by combining the chain-clusters and the star-clusters.Next, to prevent the adversary uncover all the administrative keys by a few colluding sensors, the number of sensors needed to capture WSN was increased.Then, the sensors of key combinations distribution were sorted through a coloring algorithm.Based on all these operations, the presented scheme distributed the administrative keys based on the hamming distance and EBS.Furthermore, the approaches handling the join event and leave event were described.Two experiments were performed to study the potential for collusions and the influence of size of compromised nodes on the effectiveness against collusions.Simulation results demonstrate that the presented scheme boosts the WSN’ resilience to attacks.The performance evaluation on join event and leave event shows that the number of key-updating messages and storage of sensors in the proposed scheme are fewer than those of SHELL.…”
    Get full text
    Article
  9. 15849

    Considering the Carbon Penalty Rates to Optimize the Urban Distribution Model in Time-Varying Network by Yuanyuan Ji, Shoufeng Ji, Tingting Ji

    Published 2022-01-01
    “…An improved variable neighborhood search (VNS) heuristic algorithm is designed to solve the model. The numerical example demonstrates that the higher the carbon emission cost, the greater the carbon penalty rate. …”
    Get full text
    Article
  10. 15850

    Mobile Multi-Agent Evaluation Method for Wireless Sensor Networks-Based Large-Scale Structural Health Monitoring by Shenfang Yuan, Dong Liang, Lei Qiu, Menglong Liu

    Published 2012-11-01
    “…Mobile agent with the signal processing or evaluation algorithm is designed to migrate among different sensor nodes and perform network self-organization, data processing, information fusion, and damage estimation. …”
    Get full text
    Article
  11. 15851

    Assessing the Current Limitations of Large Language Models in Advancing Health Care Education by JaeYong Kim, Bathri Narayan Vajravelu

    Published 2025-01-01
    “…This study aims to evaluate the application of state-of-the-art LLMs in health care education, highlighting the following shortcomings as areas requiring significant and urgent improvements: (1) threats to academic integrity, (2) dissemination of misinformation and risks of automation bias, (3) challenges with information completeness and consistency, (4) inequity of access, (5) risks of algorithmic bias, (6) exhibition of moral instability, (7) technological limitations in plugin tools, and (8) lack of regulatory oversight in addressing legal and ethical challenges. …”
    Get full text
    Article
  12. 15852

    Improvement of Student Weariness Emotion in English Classroom Based on Intelligent Internet of Things and Big Data Technology by Ya Pang

    Published 2022-01-01
    “…In addition, this paper proposes a Fast Point Feature Histogram, which uses an iterative closest point fine registration algorithm for image registration. Finally, this paper constructs an emotion recognition model of students’ weariness in English classroom. …”
    Get full text
    Article
  13. 15853

    A hybrid unsupervised machine learning model with spectral clustering and semi-supervised support vector machine for credit risk assessment. by Tao Yu, Wei Huang, Xin Tang, Duosi Zheng

    Published 2025-01-01
    “…The effectiveness, efficiency, and robustness of the proposed TSC-SVM model are demonstrated through various real-world applications. The proposed algorithm is anticipated to expand the customer base for financial institutions while reducing economic losses.…”
    Get full text
    Article
  14. 15854

    DeTEcT: dynamic and probabilistic parameters extension by R. Sadykhov, G. Goodell, P. Treleaven

    Published 2025-01-01
    “…DeTEcT is a framework for analysing economic activity, simulating macroeconomic scenarios, and algorithmically setting policies in token economies. This paper proposes four ways of parametrizing the framework, where dynamic vs. static parametrization is considered along with the probabilistic vs. non-probabilistic parameters. …”
    Get full text
    Article
  15. 15855

    Fault Diagnosis of Gearbox Multi-channel Vibration Signal based on Improved Multivariate Multiscale Dispersion Entropy by Fuming Zhou, Jinxing Shen, Xiaoqiang Yang, Wuqiang Liu, Xiaolin Liu

    Published 2021-04-01
    “…Based on this,a new gearbox fault diagnosis method based on ensemble empirical mode decomposition (EEMD),IMMDE and genetic algorithm optimization support vector machine(GA-SVM) is proposed. …”
    Get full text
    Article
  16. 15856

    Fast two dimensional to three dimensional registration of fluoroscopy and CT-scans using Octrees on segmentation maps by Luca Bertelli, Frédéric Gibou

    Published 2012-06-01
    “…We introduce a computationally efficient approach to the generation of Digital Reconstructed Radiographs (DRRs) needed to perform three dimensional to two dimensional medical image registration and apply this algorithm to virtual surgery. The DRR generation process is the bottleneck of any three dimensional to two dimensional registration system, since its computational complexity scales with the number of voxels in the Computed Tomography Data, which can be of the order of tens to hundreds of millions. …”
    Get full text
    Article
  17. 15857

    Fault Diagnosis of Gearbox based on Multi-fractal and PSO-SVM by Li Sha, Pan Hongxia, Zhang Jundong, Zhao Weiwei

    Published 2015-01-01
    “…Aiming at the non-stationary and nonlinear of gearbox vibration signals,a fault diagnosis method based on the multi-fractal and particle swarm optimization support vector machine(PSO-SVM)is put forward.Firstly,the fractal filter with short-time fractal dimension as fuzzy control parameters is used to filtering noise reduction the gearbox vibration signals with bigger background noises.Secondly,the multi-fractal spectrum algorithm is applied to analyze the signal after filtering,the results show that the characteristic parameters:Δa(q)、f(a(q))maxand box dimensions Dbcan give a good presentation for gearbox working condition.Finally,the particle swarm optimization(PSO)is applied to optimize the parameters of support vector machine(SVM).Taking the multi-fractal characteristic vectors as input parameters of PSO-SVM and SVM to recognize the fault types of the gearbox.The results show that SVM based on particle swarm optimization can improve the classification accuracy.Meanwhile,the validity of gearbox fault diagnosis based on muti-fractal and PSO-SVM is proved.…”
    Get full text
    Article
  18. 15858

    Privacy-preserving photo sharing framework cross different social network by Fenghua LI, Zhe SUN, Ben NIU, Jin CAO, Hui LI

    Published 2019-07-01
    “…With rapid developments of digital photography and social networks,users of photo-sharing-supported social networking applications can easily forward photos across different social networks at the cost of their growing privacy concerns.To address this problem,a privacy-preserving photo sharing framework was proposed,which could apply to extended control and privacy invasion tracing.In extended control scheme,the following users on a dissemination chain was restrained by each user’s privacy policy.Then several privacy areas of photos were encrypted and the access control polices were bound to the uploaded photos,so that any privacy areas on the photos could be hidden away from unwanted viewers even across different social networks.On this basis,the behaviors of users were record by tracing scheme of privacy invasion,the integrality of records was protected by using nested signature algorithm.The correctness,security and performance of overhead of the scheme are then thoroughly analyzed and evaluated via detailed simulations.…”
    Get full text
    Article
  19. 15859

    Adversarial training driven malicious code detection enhancement method by Yanhua LIU, Jiaqi LI, Zhengui OU, Xiaoling GAO, Ximeng LIU, Weizhi MENG, Baoxu LIU

    Published 2022-09-01
    “…To solve the deficiency of the malicious code detector’s ability to detect adversarial input, an adversarial training driven malicious code detection enhancement method was proposed.Firstly, the applications were preprocessed by a decompiler tool to extract API call features and map them into binary feature vectors.Secondly, the Wasserstein generative adversarial network was introduced to build a benign sample library to provide a richer combination of perturbations for malicious sample evasion detectors.Then, a perturbation reduction algorithm based on logarithmic backtracking was proposed.The benign samples were added to the malicious code in the form of perturbations, and the added benign perturbations were culled dichotomously to reduce the number of perturbations with fewer queries.Finally, the adversarial malicious code samples were marked as malicious and the detector was retrained to improve its accuracy and robustness of the detector.The experimental results show that the generated malicious code adversarial samples can evade the detector well.Additionally, the adversarial training increases the target detector’s accuracy and robustness.…”
    Get full text
    Article
  20. 15860

    Research of Kinematics and Workspace of 2-SPR/(U+UPR)P(vA) Reconfigurable Parallel Mechanism by Chunsheng Ma, Wenbo Mi, Xiaoqin Yin, Zhendong Ma

    Published 2021-06-01
    “…Secondly,the closed-loop vector method is used to solve the two sets of inverse kinematic solutions of the mechanism and verification,and the particle swarm optimization algorithm is used to study and establish the positive solution model of the mechanism under the R phase and verify. …”
    Get full text
    Article