-
161
-
162
An Optimized Strategy Coverage Control Algorithm for WSN
Published 2014-07-01“…Thirdly, OSCC picks out the optimal routing solution while conducting combinatorial optimization of routing path using ant colony optimization (ACO) algorithm, thus reducing the energy spending of whole network. …”
Get full text
Article -
163
DIDADTIC TOOLS FOR THE STUDENTS’ ALGORITHMIC THINKING DEVELOPMENT
Published 2017-12-01“…Modern engineers must possess high potential of cognitive abilities, in particular, the algorithmic thinking (AT). In this regard, the training of future experts (university graduates) of technical specialities has to provide the knowledge of principles and ways of designing of various algorithms, abilities to analyze them, and to choose the most optimal variants for engineering activity implementation. …”
Get full text
Article -
164
Loopback matching algorithm with support set protection
Published 2015-09-01“…There was a drawback of deleting right support elements in some greedy iterative reconstruction algorithms.To resolve this problem,loopback matching algorithm with support set protection (LM-P) was proposed.First,LM-P ini-tialized elements of non-protected support set based on minimum residual inner product.Second,it computed the projec-tions of observations on the observation sub-matrix corresponding to non-protected support set elements.Then,an ele-ment in non-protected support set with the largest projection was added to the protected support set.An alternative multi-plicative iteration method was employed to obtain the whole protected support set.As to reconstruct a sparse signal whose nonzero elements are normally distributed and the signal sparsity is less than half the number of measurements,experimental results show that the reconstruction accuracy of LM-P algorithm exceeds 86%.For sparse signals with small noise,the reconstruction accuracy of LM-P can maintain over 99 %.Compared with OMP,CoSaMP,SP and GPA algo-rithms,LM-P's observations are smaller.LM-P also has good performance for image reconstruction.greedy iteration;support set;sparse signal;LM-P…”
Get full text
Article -
165
Loopback matching algorithm with support set protection
Published 2015-09-01“…There was a drawback of deleting right support elements in some greedy iterative reconstruction algorithms.To resolve this problem,loopback matching algorithm with support set protection (LM-P) was proposed.First,LM-P ini-tialized elements of non-protected support set based on minimum residual inner product.Second,it computed the projec-tions of observations on the observation sub-matrix corresponding to non-protected support set elements.Then,an ele-ment in non-protected support set with the largest projection was added to the protected support set.An alternative multi-plicative iteration method was employed to obtain the whole protected support set.As to reconstruct a sparse signal whose nonzero elements are normally distributed and the signal sparsity is less than half the number of measurements,experimental results show that the reconstruction accuracy of LM-P algorithm exceeds 86%.For sparse signals with small noise,the reconstruction accuracy of LM-P can maintain over 99 %.Compared with OMP,CoSaMP,SP and GPA algo-rithms,LM-P's observations are smaller.LM-P also has good performance for image reconstruction.greedy iteration;support set;sparse signal;LM-P…”
Get full text
Article -
166
Inexact Version of Bregman Proximal Gradient Algorithm
Published 2020-01-01“…In this paper, we give an inexact version of the BPG algorithm while circumventing the condition of supercoercivity by replacing it with a simple condition on the parameters of the problem. …”
Get full text
Article -
167
ALGORITHM FOR POST-BURN BACTERIAL SEPSIS DIAGNOSIS
Published 2013-10-01“…The purpose of our work was to develop the algorithm of bacterial sepsis diagnosis in patients with severe burn disease. …”
Get full text
Article -
168
Intelligent data collection algorithm research for WSNs
Published 2025-02-01“…The remaining algorithms in Scenario 4 dropped below 50% by 500 rounds, while the dynamic data collection algorithm was still close to 70% by 1,500 rounds. …”
Get full text
Article -
169
PFW-YOLO Lightweight Helmet Detection Algorithm
Published 2025-01-01“…The final experimental results indicate that, compared to the original YOLOv8n algorithm, the PFW-YOLO algorithm achieves a 53% reduction in parameters, a 42% decrease in computational effort, and a 51% reduction in model size, while enhancing the mean average precision (mAP) by 0.4%.…”
Get full text
Article -
170
Multifactor Algorithm for Test Case Selection and Ordering
Published 2021-06-01“…Moreover, evolutionary algorithms such as the genetic process often help in depleting test cases, together with a concurrent decrease in computational runtime. …”
Get full text
Article -
171
Video watermarking algorithm for resisting collusion attacks
Published 2010-01-01“…A content dependent video watermark algorithm for resisting linear collusion attacks was presented. …”
Get full text
Article -
172
OPTIMISATION OF THE MACHINING PROCESS USING GENETIC ALGORITHM
Published 2019-09-01“…Tool path verification and optimisation are two best ways of dramatically improving manufacturing operations while saving money with relatively little work. Genetic algorithms can be used for improvement of these operations and considerably reduce length of tool paths leading to the reduction of machine times and optimisation of cutting parameters. …”
Get full text
Article -
173
Video watermarking algorithm for resisting collusion attacks
Published 2010-01-01“…A content dependent video watermark algorithm for resisting linear collusion attacks was presented. …”
Get full text
Article -
174
Algorithm of blockchain data provenance based on ABE
Published 2019-11-01“…To solve the problem that the blockchain-based traceability algorithm mainly used homomorphic encryption and zero-knowledge proof for privacy protection,making it difficult to achieve dynamic sharing of traceability information,a blockchain data traceability algorithm based on attribute encryption was proposed.In order to realize the dynamic protection of transaction privacy,the strategy update algorithm applicable to block chain was designed based on the CP-ABE scheme proposed by Waters to achieve dynamic protection of transaction privacy.In order to realize the dynamic update of the visibility about block content,based on the strategy update algorithm,the block structure was designed to achieve the dynamic update about the content visibility of the block.The security and experimental simulation analysis show that the proposed algorithm can realize the dynamic sharing of traceability information while completing the protection transaction privacy.…”
Get full text
Article -
175
Research of embedding algorithm for wireless network virtualization
Published 2017-01-01“…Wireless network virtualization has become one of the promising techniques in fifth generation mobile networks (5G),and the virtual network embedding plays a very important role.A model was formulated to describe the problem and a wireless virtual network embedding algorithm based on joint bandwidth and power allocation (WVNEA-JBP) was put forward,which selected the suitable node and path to serve the data transmission from virtual networks.In order to minimize the overhead while satisfy the higher capacity request,this algorithm considered the impact of interference of wireless links and supports path splitting.A case study was introduced to show how WVNEA-JBP to work.Furthermore,simulation results show that WVNEA-JBP is able to accomplish the efficient utilization of network resources and improve the accept rate of virtual network requests.…”
Get full text
Article -
176
Congestion control algorithm for unreliable unicast traffic
Published 2008-01-01“…To improve performance in high bandwidth networks when trying to retain fairness, a rate-based congestion control algorithm was proposed for unreliable unicast traffic. …”
Get full text
Article -
177
Influencer autonomy: Navigating authenticity, agencies, and algorithms
Published 2025-05-01“…Our findings reveal that while influencer autonomy is always limited and partial, it remains a compelling narrative.…”
Get full text
Article -
178
Discorpy: algorithms and software for camera calibration and correction
Published 2025-05-01Get full text
Article -
179
Research of embedding algorithm for wireless network virtualization
Published 2017-01-01“…Wireless network virtualization has become one of the promising techniques in fifth generation mobile networks (5G),and the virtual network embedding plays a very important role.A model was formulated to describe the problem and a wireless virtual network embedding algorithm based on joint bandwidth and power allocation (WVNEA-JBP) was put forward,which selected the suitable node and path to serve the data transmission from virtual networks.In order to minimize the overhead while satisfy the higher capacity request,this algorithm considered the impact of interference of wireless links and supports path splitting.A case study was introduced to show how WVNEA-JBP to work.Furthermore,simulation results show that WVNEA-JBP is able to accomplish the efficient utilization of network resources and improve the accept rate of virtual network requests.…”
Get full text
Article -
180
SOMO-m Optimization Algorithm with Multiple Winners
Published 2012-01-01“…More importantly, SOMO-m algorithm with m≥2 can be used to find two or more minimums simultaneously in a single learning iteration process, while the original SOM-based optimization (SOMO) algorithm has to fulfil the same task much less efficiently by restarting the learning iteration process twice or more times.…”
Get full text
Article