Suggested Topics within your search.
Suggested Topics within your search.
-
561
Genetic algorithm feature selection resilient to increasing amounts of data imputation
Published 2024-05-01“…Beyond these benefits, it also enables a clearer understanding of the algorithm's decision-making processes. …”
Get full text
Article -
562
Application of Whale Optimization Algorithm to Inverse Scattering of an Imperfect Conductor with Corners
Published 2020-01-01“…In this paper, the whale optimization algorithm (WOA) is applied to the inverse scattering of an imperfect conductor with corners. …”
Get full text
Article -
563
PREDICTION OF TELECOM SERVICES CONSUMERS CHURN BY USING MACHINE LEARNING ALGORITHMS
Published 2022-11-01“… Machine learning, or as it is also called automated learning, is a special subfield of scientific information technologies. …”
Get full text
Article -
564
Four Machine Learning Algorithms for Biometrics Fusion: A Comparative Study
Published 2012-01-01“…The comparison of the algorithms reveals that the biometrics fusion system is superior to the original unimodal systems and also other fusion schemes found in the literature.…”
Get full text
Article -
565
Dimensionality Reduction Algorithms in Machine Learning: A Theoretical and Experimental Comparison
Published 2023-12-01“…First, we discuss the theoretical foundation of a variety of FEAs from various categories like supervised vs. unsupervised, linear vs. nonlinear and random-projection-based vs. manifold-based, show their algorithms and compare these methods conceptually. Second, we determine the finest sets of new features for various datasets, as well as in terms of statistical significance, evaluate the eminence of the different types of transformed feature spaces and power analysis, and also determine the FEA efficacy in terms of speed and classification accuracy.…”
Get full text
Article -
566
PREDICTION OF TELECOM SERVICES CONSUMERS CHURN BY USING MACHINE LEARNING ALGORITHMS
Published 2022-11-01“… Machine learning, or as it is also called automated learning, is a special subfield of scientific information technologies. …”
Get full text
Article -
567
Evolutionary Algorithms Applied to Antennas and Propagation: A Review of State of the Art
Published 2016-01-01“…In this paper, our primary focus is on Genetic Algorithms (GAs), Particle Swarm Optimization (PSO), and Differential Evolution (DE), though we also briefly review other recently introduced nature-inspired algorithms. …”
Get full text
Article -
568
Detecting DDoS attack based on compensation non-parameter CUSUM algorithm
Published 2008-01-01“…t,calculated the ratio of the number of unacknowledged segments and the number of all segments.Then,the statistical sequence based on time came into being.After that,an improved non-parameter recursive CUSUM algorithm was used to detect attack effi-ciently on line.In this procedure,the suspicious packets were also recorded.Experiments prove that this algorithm is fast and efficient.It has low false-positive rate and could adapt to more complex network environments.In addition,it is helpful to attack analysis and tracing.…”
Get full text
Article -
569
Statistical modeling based fast rate distortion estimation algorithm for HEVC
Published 2021-01-01“…To reduce the coding computational complexity of the rate and distortion calculations in HEVC, a fast TU level rate model with higher accuracy was proposed.The contribution percentages of different syntax elements in entropy coding were evaluated, and syntax element-wise accurate rate models were individually developed to construct the whole TU level model.In addition, coefficient levels were weighted adaptively to distinguish the nonuniform contributions of different coefficients in terms of rate profiling.Moreover, position-wise parameter was defined to depict the distribution patterns for possible non-zero coefficients within one block.The final linear rate model was developed by fine-tuning the model parameters from great amounts of samples in a statistical way.Finally, the transform domain distortion model was also established to bypass unnecessary reconstruction process.Experimental results show that the proposed algorithm can achieve 49.76% complexity reduction with 1.74% BD-BR increase for RA configuration.…”
Get full text
Article -
570
Improved information hiding algorithm based on twice positioning in coding channel
Published 2013-12-01“…Based on analysis of existing information hiding algorithms and capacities in coding channel,the defects of those existing algorithms were pointed out,and an improved information hiding algorithm with capacity upper limit analysis and based on twice positioning was proposed.the proposed algorithm,the information hiding capacity upper limit is firstly computed before embedding,and used for comparison with the size of hiding secret data.Then,twice posi-tioning scheme and cyclic shift mechanism for choosing the embedding position were used in the proposed algorithm.Simulation results show that,compared with those existing algorithms,the proposed algorithm is able to avoid the risk of exposure of the secret channel caused by capacity exceeding of hiding data.It can not only improve the randomness of the embedding position,but also avoid the risk of overlap among different secret data.The hiding performances of the coding channel information hiding system are improved.…”
Get full text
Article -
571
CC-MRSJ:Cache Conscious Star Join Algorithm on Hadoop Platform
Published 2013-10-01“…A cache-conscious MapReduce star join algorithm was presented,each column of fact table was separately stored,and dimension table was divided into several column families according to dimension hierarchy.Fact table foreign key column and corresponding dimension table was co-location storage,thus reducing data movement in the join process.CC-MRSJ consists of two phases:firstly each foreign key column and the corresponding dimension table were joined; then the intermediate results were joined and random accessed measure columns,and so got the final result.CC-MRSJ read only the data needed,and cache utilization is high,so it has good cache conscious feature; it also takes advantage of late materialization,avoiding unnecessary data access and movement.CC-MRSJ has higher performance comparing to hive system based on SSB datasets.…”
Get full text
Article -
572
Novel extended cyclic MUSIC algorithm based on uniform circular array
Published 2014-02-01“…On the other hand, the proposed method also breaks through the limitation of the classic MUSIC algorithm in which the number of source signal cannot be greater than the number of element in the receiving array.…”
Get full text
Article -
573
Link-disjoint routing algorithm under multiple additive QoS constraints
Published 2010-01-01“…The problem of finding link-disjoint paths under multiple additive QoS constraints was studied.Since the existing algorithms depended on network’s structure and could not guarantee to find feasible solutions for arbitrary net-works,a novel algorithm called multiple constrained link-disjoint path routing algorithm(MCLPRA) was proposed.MCLPRA was based on SAMCRA and didn’t rely on the network’s structure.By introducing the parameter to control its search depth,dividing the solution space into different classes and performing searching according to the classes respectively,MCLPRA was able to obtain the feasible solutions for arbitrary networks.Theoretic analysis shows that MCLPRA can get the feasible and optimal solutions when traditional schemes can not.Comprehensive simulations also show that MCLPRA has better performances than existing algorithms in terms of higher average successful rate of getting feasible solutions with shorter average total length of the obtained path pair.…”
Get full text
Article -
574
Low-Complexity Saliency Detection Algorithm for Fast Perceptual Video Coding
Published 2013-01-01“…The simulation results validate that the proposed algorithm can avoid a large amount of computation work in the visual perception characteristics analysis processing compared with other existing algorithms; it also has better performance in saliency detection for videos and can realize fast saliency detection. …”
Get full text
Article -
575
Sparse adaptive constant blind equalization algorithm for sparse multipath channel
Published 2017-01-01“…In order to improve the convergence rate of the blind equalizer for sparse multipath channel,a novel blind equalization approach called l<sub>0</sub>-norm constraint proportionate normalized least mean square constant algorithm was proposed for M-order phase-shift keying (MPSK) signal.Based on the constant modulus characteristics of MPSK signal and the sparse property of equalizer,a new blind equalization cost function with the l<sub>0</sub>-norm penalty on the equalizer tap coefficients was firstly constructed.Then the update formula of the tap coefficients was derived according to the gradient descent algorithm.Moreover,the iteration step was updated by drawing upon the normalized proportionate factor.The algorithm not only assigned step sizes proportionate to the magnitude of the current individual tap weights,but also attracted the inactive taps to zero adaptively.Theoretical analysis and simulation results show that the proposed algorithm outperforms the existing blind equalization algorithms for sparse channel in reducing ISI and improving convergence rate.…”
Get full text
Article -
576
On-board Multi-User Detection Algorithm Based on Conditional Neural Process
Published 2021-12-01“…With the characteristics of all-terrain, all-weather and seamless coverage, satellite communications have become a potentially important part of 6G.An important prerequisite for achieving satellite intelligence is that the satellite have on-board processing capabilities.Multi-user detection (MUD) is a classic method of suppressing multiple access interference (MAI) in wireless communication, such as MMSE, Gaussian processregression (GPR) and other algorithms.Due to the inverse matrix required in the detection process, the algorithm complexity is usually cubic, and it is diff cult to directly apply to satellite platforms because of its limited processing capabilities.The conditional neural process combined the characteristics of the low complexity of the neural network and the data-eff cient of the Gaussian process.The neural network was used to parameterized the Gaussian process to avoided the inversion of the matrix, thereby reduced the computational complexity.The application of conditional neural process in MUD was studied.The simulation results showed that, while reduced complexity, conditional neural process also greatly improved the performance of bit error rate (BER).…”
Get full text
Article -
577
An Effective Hybrid Firefly Algorithm with Harmony Search for Global Numerical Optimization
Published 2013-01-01“…A hybrid metaheuristic approach by hybridizing harmony search (HS) and firefly algorithm (FA), namely, HS/FA, is proposed to solve function optimization. …”
Get full text
Article -
578
Features of modern algorithm of examination and treatment patients with endo-perio lesions
Published 2020-04-01Get full text
Article -
579
Panel defect detection algorithm based on improved Faster R-CNN
Published 2022-01-01“…It also analyzes the difference in the aspect ratio of the defect data set, sets the generation size of the aiming window, and combines the DIoU-NMS suggestion frame screening mechanism to improve the matching rate of the prior frame and the target frame. …”
Get full text
Article -
580
A Manipulator Pose Planning Algorithm Based on Matrix Information Geometry
Published 2024-01-01“…The matrix information geometry algorithm enabled not only the manipulator to accelerate and decelerate uniformly along the detection trajectory, but also the angular acceleration of the end effector to accelerate uniformly at first, then keep a uniform velocity, and finally decelerate uniformly. …”
Get full text
Article