-
201
Intelligent data collection algorithm research for WSNs
Published 2025-02-01“…The remaining algorithms in Scenario 4 dropped below 50% by 500 rounds, while the dynamic data collection algorithm was still close to 70% by 1,500 rounds. …”
Get full text
Article -
202
PFW-YOLO Lightweight Helmet Detection Algorithm
Published 2025-01-01“…The final experimental results indicate that, compared to the original YOLOv8n algorithm, the PFW-YOLO algorithm achieves a 53% reduction in parameters, a 42% decrease in computational effort, and a 51% reduction in model size, while enhancing the mean average precision (mAP) by 0.4%.…”
Get full text
Article -
203
Multifactor Algorithm for Test Case Selection and Ordering
Published 2021-06-01“…Moreover, evolutionary algorithms such as the genetic process often help in depleting test cases, together with a concurrent decrease in computational runtime. …”
Get full text
Article -
204
Video watermarking algorithm for resisting collusion attacks
Published 2010-01-01“…A content dependent video watermark algorithm for resisting linear collusion attacks was presented. …”
Get full text
Article -
205
OPTIMISATION OF THE MACHINING PROCESS USING GENETIC ALGORITHM
Published 2019-09-01“…Tool path verification and optimisation are two best ways of dramatically improving manufacturing operations while saving money with relatively little work. Genetic algorithms can be used for improvement of these operations and considerably reduce length of tool paths leading to the reduction of machine times and optimisation of cutting parameters. …”
Get full text
Article -
206
Video watermarking algorithm for resisting collusion attacks
Published 2010-01-01“…A content dependent video watermark algorithm for resisting linear collusion attacks was presented. …”
Get full text
Article -
207
Algorithm of blockchain data provenance based on ABE
Published 2019-11-01“…To solve the problem that the blockchain-based traceability algorithm mainly used homomorphic encryption and zero-knowledge proof for privacy protection,making it difficult to achieve dynamic sharing of traceability information,a blockchain data traceability algorithm based on attribute encryption was proposed.In order to realize the dynamic protection of transaction privacy,the strategy update algorithm applicable to block chain was designed based on the CP-ABE scheme proposed by Waters to achieve dynamic protection of transaction privacy.In order to realize the dynamic update of the visibility about block content,based on the strategy update algorithm,the block structure was designed to achieve the dynamic update about the content visibility of the block.The security and experimental simulation analysis show that the proposed algorithm can realize the dynamic sharing of traceability information while completing the protection transaction privacy.…”
Get full text
Article -
208
Research of embedding algorithm for wireless network virtualization
Published 2017-01-01“…Wireless network virtualization has become one of the promising techniques in fifth generation mobile networks (5G),and the virtual network embedding plays a very important role.A model was formulated to describe the problem and a wireless virtual network embedding algorithm based on joint bandwidth and power allocation (WVNEA-JBP) was put forward,which selected the suitable node and path to serve the data transmission from virtual networks.In order to minimize the overhead while satisfy the higher capacity request,this algorithm considered the impact of interference of wireless links and supports path splitting.A case study was introduced to show how WVNEA-JBP to work.Furthermore,simulation results show that WVNEA-JBP is able to accomplish the efficient utilization of network resources and improve the accept rate of virtual network requests.…”
Get full text
Article -
209
Congestion control algorithm for unreliable unicast traffic
Published 2008-01-01“…To improve performance in high bandwidth networks when trying to retain fairness, a rate-based congestion control algorithm was proposed for unreliable unicast traffic. …”
Get full text
Article -
210
Influencer autonomy: Navigating authenticity, agencies, and algorithms
Published 2025-05-01“…Our findings reveal that while influencer autonomy is always limited and partial, it remains a compelling narrative.…”
Get full text
Article -
211
Discorpy: algorithms and software for camera calibration and correction
Published 2025-05-01Get full text
Article -
212
Research of embedding algorithm for wireless network virtualization
Published 2017-01-01“…Wireless network virtualization has become one of the promising techniques in fifth generation mobile networks (5G),and the virtual network embedding plays a very important role.A model was formulated to describe the problem and a wireless virtual network embedding algorithm based on joint bandwidth and power allocation (WVNEA-JBP) was put forward,which selected the suitable node and path to serve the data transmission from virtual networks.In order to minimize the overhead while satisfy the higher capacity request,this algorithm considered the impact of interference of wireless links and supports path splitting.A case study was introduced to show how WVNEA-JBP to work.Furthermore,simulation results show that WVNEA-JBP is able to accomplish the efficient utilization of network resources and improve the accept rate of virtual network requests.…”
Get full text
Article -
213
SOMO-m Optimization Algorithm with Multiple Winners
Published 2012-01-01“…More importantly, SOMO-m algorithm with m≥2 can be used to find two or more minimums simultaneously in a single learning iteration process, while the original SOM-based optimization (SOMO) algorithm has to fulfil the same task much less efficiently by restarting the learning iteration process twice or more times.…”
Get full text
Article -
214
Prediction of Hypertension Patients with Machine Learning Algorithm
Published 2025-06-01“…These algorithms can predict hypertension risk based on clinical data, such as age, medical history, and lifestyle. …”
Get full text
Article -
215
Fuzzy Guiding of Roulette Selection in Evolutionary Algorithms
Published 2025-02-01“…The proposed system enhances the performance, efficiency, and robustness of evolutionary algorithms while reducing the risk of stagnation in suboptimal solutions. …”
Get full text
Article -
216
Parallelization of the Bison Algorithm Applied to Data Classification
Published 2024-11-01“…In data science and machine learning, efficient and scalable algorithms are paramount for handling large datasets and complex tasks. …”
Get full text
Article -
217
Algorithm of fire detection for multi-sensor system
Published 2021-11-01“…The main scientific goal is for the system to work autonomously on certain segments of the monitoring process, while the three agents, to varying degrees, must interact with each other based on communication and decision-making algorithms.Method. …”
Get full text
Article -
218
Routing Algorithms for SDM Flexible Optical Networks
Published 2024-10-01“…This paper considers the online routing, modulation, spectrum, and core allocation problem in elastic optical networks. Three algorithms are proposed to minimize the bandwidth blocking probability while taking into account the impact of interference from established lightpaths. …”
Get full text
Article -
219
Managing Descemet Membrane Detachment by HELP Algorithm
Published 2016-10-01“…We present an anterior segment coherence tomography based algorithm using Height, length, extent and pupil (HELP) for management of post operative DMD. …”
Get full text
Article -
220
On the Effectiveness of Optimisation Algorithms for Hydrodynamic Lubrication Problems
Published 2025-05-01“…While the PSWM algorithm also reliably found the global minimum, it exhibited lower speed in the defined problems. …”
Get full text
Article