Showing 4,321 - 4,340 results of 13,928 for search '(whole OR while) algorithm', query time: 0.19s Refine Results
  1. 4321

    HGCS—A Multiplex Transmission Method for Wide-Area Unmanned Aerial Vehicle Cluster Inspection Data in Hybrid Networked Transmission Lines by Ruchao Liao, Xionggang Li, Jinchao Guo, Wenxing Sun, Guoqiang Li

    Published 2024-01-01
    “…To address these challenges, an effective optimization algorithm is required to balance the algorithmic performance while considering the fairness and QoS parameters. …”
    Get full text
    Article
  2. 4322

    Research on pedestrian detection technology for mining unmanned vehicles by ZHOU Libing, YU Zhengqian, WEI Jianjian, JIANG Xueli, YE Baisong, ZHAO Yexin, YANG Siliang

    Published 2024-10-01
    “…YOLOv3 and a coal mine key position personnel unsafe behavior recognition method based on improved YOLOv7 and ByteTrack experienced missed detections and false positives based on enhanced images, while the proposed pedestrian detection algorithm effectively mitigated these issues.…”
    Get full text
    Article
  3. 4323

    Multi-user joint task offloading and resource allocation based on mobile edge computing in mining scenarios by Siqi Li, Weidong Li, Wanbo Zheng, Yunni Xia, Kunyin Guo, Qinglan Peng, Xu Li, Jiaxin Ren

    Published 2025-05-01
    “…In the upper layer, an improved genetic algorithm (IGA) based on heuristic rules is employed to generate an offloading decision population, while the lower layer utilizes the deep deterministic policy gradient (DDPG) algorithm to optimize the offloading strategy and the weighted coefficients for latency and energy consumption. …”
    Get full text
    Article
  4. 4324

    Improved Cylinder-Based Tree Trunk Detection in LiDAR Point Clouds for Forestry Applications by Shaobo Ma, Yongkang Chen, Zhefan Li, Junlin Chen, Xiaolan Zhong

    Published 2025-01-01
    “…While cylinder fitting algorithms provide a three-dimensional (3D) solution for trunk detection, their performance in complex forest environments remains limited due to sensitivity to parameters like distance thresholds. …”
    Get full text
    Article
  5. 4325

    Particle Swarm Optimization with Various Inertia Weight Variants for Optimal Power Flow Solution by Prabha Umapathy, C. Venkataseshaiah, M. Senthil Arumugam

    Published 2010-01-01
    “…The PSO algorithm is simulated for each of the method individually. …”
    Get full text
    Article
  6. 4326

    Research and Implementation of Turbo Coding Technology in High-Speed Underwater Acoustic OFDM Communication by Yarang Yang, Yunpeng Li

    Published 2022-01-01
    “…It is demonstrated that the fully parallel turbo decoding algorithm can achieve an approximate error correction decoding performance when 36 iterations are used and when the log-map algorithm with 6 iterations is used. …”
    Get full text
    Article
  7. 4327

    Engineering project management technology based on visual simulation module and particle swarm optimization by Hua Tian

    Published 2025-07-01
    “…Compared with the efficiency value of the algorithm in the first 10s, the traditional single objective optimization algorithm was 0.28, while the proposed algorithm was 0.40. …”
    Get full text
    Article
  8. 4328

    Machine Learning–Driven Adaptive Testing: An Application for the MMPI Assessment by Daiana Colledani, Egidio Robusto, Pasquale Anselmi

    Published 2025-01-01
    “…The findings indicate that a machine learning classifier based on a model tree (ML-MT) algorithm effectively handled the complex MMPI-2 scales, yielding accurate scores while noticeably reducing item administration. …”
    Get full text
    Article
  9. 4329

    Channel-Hopping Using Reinforcement Learning for Rendezvous in Asymmetric Cognitive Radio Networks by Dongsup Jin, Minho Jang, Ji-Woong Jang, Gyuyeol Kong

    Published 2024-12-01
    “…This paper addresses the rendezvous problem in asymmetric cognitive radio networks (CRNs) by proposing a novel reinforcement learning (RL)-based channel-hopping algorithm. Traditional methods like the jump-stay (JS) algorithm, while effective, often struggle with high time-to-rendezvous (TTR) in asymmetric scenarios where secondary users (SUs) have varying channel availability. …”
    Get full text
    Article
  10. 4330

    Structure-aware sample consensus for robust stereo visual odometry by Chun Liu, Zhengning Li, Zhuo Chen, Hangbin Wu

    Published 2017-10-01
    “…With this novel procedure, the structure-aware sample consensus gains more possibility to generate a correct motion model and performs as a robust estimator for the underground visual odometry algorithm. The experiments with both synthetic and real-world data show that structure-aware sample consensus outperforms the random sample consensus and its variants in robustness, while maintaining a lower computational cost. …”
    Get full text
    Article
  11. 4331

    Adaptive Steganography Using Improve Bit-plane Complexity Segmentation by Noor Gassan Abdullah, Shahd Abdulrhman Hasso

    Published 2024-06-01
    “…This research introduces an improved algorithm for concealing messages within color images. …”
    Get full text
    Article
  12. 4332

    A Fast and Efficient Adaptive Threshold Rate Control Scheme for Remote Sensing Images by Xiao Chen, Xiaoqing Xu

    Published 2012-01-01
    “…The simulation results show that the computational cost and working buffer memory size of the proposed algorithm reach only 18.13 and 7.81%, respectively, of the same parameters in the postcompression rate distortion algorithm, while the peak signal-to-noise ratio across the images remains almost the same. …”
    Get full text
    Article
  13. 4333

    Optimal Design of Low Sidelobe Sparse Linear Arrays by Li Wang, Fenggan Zhang, Banghuan Hou

    Published 2024-01-01
    “…The initial value of the algorithm is generated through the chaotic Piecewise map, while the scaling factor is adjusted dynamically in line with the iterations and fitness values. …”
    Get full text
    Article
  14. 4334

    A Novel Behavior-Based Virus Detection Method for Smart Mobile Terminals by Yanbing Liu, Shousheng Jia, Congcong Xing

    Published 2012-01-01
    “…We first propose a model to collect and analyze user behaviors and then present a polynomial time algorithm for the virus detection. Next, we evaluate this algorithm by testing it with two commercial malwares and one malware written by ourselves and show that our algorithm enjoys a high virus detection rate. …”
    Get full text
    Article
  15. 4335
  16. 4336

    Data aggregation scheme based on SDN for internet of things by Bowei WANG, Jin TAN, Wenbin JIANG

    Published 2019-02-01
    “…There are many redundant parts in the data generated and transmitted by IoT devices.Transmitting this data reduces network lifetime and bandwidth.Aiming at the problem,the aggregation gateway layer was proposed,and a SDN-based IoT data aggregation architecture and algorithm were designed.The simulation analysis shows that compared with the architecture of the ordinary gateway and OF-GW,the network lifetime is improved by about 32.6%,and the amount of data packets sent by the sensing layer to the network layer is reduced by 6.1% to 55.1%.Compared with the LEACH algorithm,the designed rule algorithm reduces the average delay of data aggregation by about 24.1%,while avoiding data loss and improving the accuracy of data aggregation.…”
    Get full text
    Article
  17. 4337

    Secure resource allocation in hybrid energy-harvesting relay and full-duplex receiver by Wei WANG, Xinrui LI, Liuguo YIN, Guoan ZHANG, Shibing ZHANG

    Published 2019-01-01
    “…Taking into account the wireless physical layer security in energy-constrained relaying systems,a secure resource allocation scheme was proposed under simultaneous wireless information and power transfer (SWIPT) protocol.The utility optimization problem was considered aiming to maximize the secrecy rate by jointly optimizing the power splitting (PS) ratio and the transmit powers under the constraint of the transmit powers of the nodes and the harvested energy of the relay.The objective problem,which is non-convex,was decoupled into two subproblems.One was to optimize the PS ratio,another was to optimize the transmit powers.The optimal solution of the subproblems can be obtained in the closed-form.Then,the suboptimal solution is obtained with the proposed convergent iterative algorithm.Simulation results show the effects of artificial noise signal,residual self-interference signal,transmit power of nodes,amplification factor of relay and other factors on the security performance.Compared with the traditional gradient descent algorithm,the proposed algorithm can reduce more than 80% of the computational load,while the algorithm has the slightly better performance.…”
    Get full text
    Article
  18. 4338

    Quantum natural stochastic pairwise coordinate descent by Mohammad Aamir Sohail, Mohsen Heidari, S. Sandeep Pradhan

    Published 2025-07-01
    “…We develop a quantum optimization algorithm that leverages the geometry of the state space via this estimator while avoiding full-state tomography, as in conventional techniques. …”
    Get full text
    Article
  19. 4339

    Improving energy efficiency and network performance in IaaS cloud with virtual machine placement by Jian-kang DONG, Hong-bo WANG, Yang-yang LI, Shi-duan CHENG

    Published 2014-01-01
    “…The existing virtual machine(VM) placement schemes mostly reduce energy consumption by optimizing utilization of physical server or network element.However,the aggressive consolidation of these resources may lead to network performance degradation.In view of this,a VM placement scheme was proposed to achieve two objectives.One is to minimize the number of activating physical machines and network elements to reduce the energy consumption,and the other is to minimize the maximum link utilization to improve the network performance.This scheme is able to reduce the energy consumption caused by physical servers and network equipment while optimizing the network performance,making a trade off between energy efficiency and network performance.A novel two-stage heuristic algorithm for a solution was designed.Firstly,the hierarchical clustering algorithm based on minimum cut and best fit algorithm was used to optimize energy efficiency,and then,local search algorithm was used to minimize the maximum link utilization.The simulations show that this solution achieves good results.…”
    Get full text
    Article
  20. 4340

    Hybrid clustering strategies for effective oversampling and undersampling in multiclass classification by Amirreza Salehi, Majid Khedmati

    Published 2025-01-01
    “…By clustering and separating classes into majority and minority categories, this algorithm retains the most information during undersampling while generating efficient data in the minority class. …”
    Get full text
    Article