Suggested Topics within your search.
Suggested Topics within your search.
-
581
A Novel Image Mosaicking Algorithm for Wireless Multimedia Sensor Networks
Published 2013-10-01“…Furthermore, the simulation results also show that the proposed algorithm can improve the accuracy of image registration, reduce the complexity of the image mosaic, and prolong the network lifetime while providing better image quality.…”
Get full text
Article -
582
Enhanced Retinal Vessel Detection Using Gradient Pyramid Fusion Algorithm
Published 2024-12-01“…The proposed fusion method manages to overcome these limitations by combining the strengths of traditional techniques, which creates more continuous edges through gradient fusion across multiple scales, thus managing to also limit the number of image artifacts. We used images from the DRIVE database, to evaluate the fusion algorithm’s precision, with results showing improved vascular tree detection and continuous edges, a reduction in the number of artifacts and improved measurement accuracy. …”
Get full text
Article -
583
SYNTHESIS OF VIRTUAL ENTERPRISE BASED ON COMBINATION OF WEB-SERVICES AND THE ALGORITHM OF DELIVERY
Published 2017-09-01“…Fast development of technologies, wide proliferation of cloud services, upgrading means of big data processing and storage, virtualization is changing our ideas not only about modern enterprise but also about ways of building advanced corporate information systems (CIS). …”
Get full text
Article -
584
Optimization for Ultrabroadband Polarization Beam Splitters Using a Genetic Algorithm
Published 2019-01-01“…We present a design method for a directional coupler-type polarization beam splitter (PBS) for ultrabroadband operation based on a genetic algorithm (GA). The PBS is discretized into short sections, with the geometric parameters of each section optimized using a GA. …”
Get full text
Article -
585
Path Optimization of Welding Robot Based on Ant Colony and Genetic Algorithm
Published 2022-01-01“…Simulation experiments show that the optimization strategy of ACO can increase the iterative calculation efficiency and path optimization performance of the algorithm. At the same time, the robot with optimized genetic algorithm has smaller fluctuations in joint angle and angular velocity in the simulated welding task, and the optimization algorithm takes 17.6 s less than the traditional particle swarm algorithm and 11 s less than the single A∗ algorithm. …”
Get full text
Article -
586
Modify PRESENT Algorithm by New technique and key Generator by External unit
Published 2023-04-01“…We also used a physical part with the developed algorithm (an external unit that is a USB and using it as a fingerprint for the system) to generate the key while ensuring that the system does not work until after the external unit is connected to the calculator to provide more security for the system from breaches. …”
Get full text
Article -
587
A Social DTN Network Routing Algorithm Based on Data Link
Published 2020-02-01“…Data transmission in the network rely on network protocols, while the design of network protocols also require accommodation with the communication environmental characteristics. …”
Get full text
Article -
588
A Fast Overlapping Community Detection Algorithm with Self-Correcting Ability
Published 2014-01-01“…Under the control of overlapping properties, the complexity of the algorithm tends to be approximate linear. And we also give a new understanding on membership vector. …”
Get full text
Article -
589
Spam filtering algorithm based on geographic E-mail path analysis
Published 2007-01-01“…A geographic E-mail path based algorithm called GEPA(geographic E-mail path analysis) was proposed to al-low network administrators to cut off spam traffic on E-mail delivery.The algorithm first extracted route information to build E-mail path subset,and then uesed an effective method mapping IP addresses or domain names of nodes in an E-mail path into geographic information.Further,the algorithm detected spam by their geographic information deviation,using E-mail traffics from a link of backbone border router in China,which crosses the country boundary of China,the performance of GEPA algorithm is evaluated.The experimental results indicated that a 13.9% reduction of E-mail can be achieved with method.The results also showed GEPA was effective and practical which can be implemented in a mas-sive traffic environment handling over millions of mails every day with small memory consumption.…”
Get full text
Article -
590
Routing algorithm for railway monitoring linear WSN based on improved PSO
Published 2022-05-01“…To solve the problems of short network lifetime and large data transmission delay, caused by unbalanced node energy consumption of linear wireless sensor network in railway monitoring scenario, a routing algorithm based on particle swarm optimization theory and breadth first search was proposed.The fitness function was constructed based on the relative energy consumption, spacing and load of candidate cluster heads.The local search ability of particle swarm algorithm was enhanced by adjusting the inertia weight coefficient to set up the cluster head optimal set.Meanwhile, a path cost function driven by energy consumption and delay was built up, and the optimal main path from the source node to the sink node was obtained by breadth first search.Lastly, a Q-learning alternative path updating and route maintenance mechanism based on discrete Markov decision process (MDP) was designed.Simulation results show that the proposed algorithm can balance the node energy consumption effectively, and has also advantages in prolonging the network lifetime and reducing the data transmission delay.…”
Get full text
Article -
591
Voice Control in Calorie Tracker Application using Levenshtein Distance Algorithm
Published 2018-04-01“…In addition, this application also uses Levenshtein Distance algorithm to correct food recognition errors which is spoken by user. …”
Get full text
Article -
592
Performance Evaluation of a Topology Control Algorithm for Wireless Sensor Networks
Published 2010-07-01“…OTC does not assume the network graph to be a Unit Disk Graph; OTC also works well on general weighted network graphs. …”
Get full text
Article -
593
Qualitative Simulation Algorithm for Resource Scheduling in Enterprise Management Cloud Mode
Published 2021-01-01“…Aiming at the problem of resource scheduling optimization in enterprise management cloud mode, a customizable fuzzy clustering cloud resource scheduling algorithm based on trust sensitivity is proposed. Firstly, on the one hand, a fuzzy clustering method is used to divide cloud resource scheduling into two aspects: cloud user resource scheduling and cloud task resource scheduling. …”
Get full text
Article -
594
Numerical algorithms to solve one inverse problem for Navier–Stokes equations
Published 2025-07-01“…Different regularization techniques also can be used to control the influence of error pollution with not equal efficiency. …”
Get full text
Article -
595
Optimization of Consignment-Store-Based Supply Chain with Black Hole Algorithm
Published 2017-01-01“…The sensitivity analysis of the heuristic black hole optimization method is also described to check the efficiency of new operators to increase the convergence of the algorithm. …”
Get full text
Article -
596
Fingerprint localization algorithm based on linear spatial dependence of WLAN RSS
Published 2017-03-01“…Due to RSS time-varying and difference of signal receiving ability of different terminals,the performance of RSS-based technologies is usually instability.In order to solve such problem, a novel fingerprint localization algorithm based on linear spatial dependence of RSS was proposed.Multiple sets of RSS samples were collected at each reference point to form a feature matrix and an offline location fingerprint database was conducted.When the real-time RSS matrix was used to calculate the correlation between the real-time RSS matrix and the reference point of the fingerprint library, the k-reference points were obtained, and the final position of the user was calculated by the quadratic weighted centroid algorithm.In order to effectively reduce the influence of signal time-varying,the sampling and sorting process were carried out, and the number of sampling times increased as much as possible when constructing the offline fingerprint database,but the samples needed to be aggregated to fit the positioning correlation calculation.Experiment results show that the proposed algorithm can guarantee the high positioning accuracy and also achieve the better stability for different terminal.…”
Get full text
Article -
597
Deep learning channel estimation algorithm for ultra-massive terahertz systems
Published 2025-01-01“…Firstly, the least squares algorithm was used to obtain the channel information at the pilot location, and then the channel information was input into the proposed FPN-OTFN algorithm. …”
Get full text
Article -
598
An Optimal CDS Construction Algorithm with Activity Scheduling in Ad Hoc Networks
Published 2015-01-01“…The theoretical analysis and simulation results of this algorithm are also presented which yield better results.…”
Get full text
Article -
599
Spam filtering algorithm based on geographic E-mail path analysis
Published 2007-01-01“…A geographic E-mail path based algorithm called GEPA(geographic E-mail path analysis) was proposed to al-low network administrators to cut off spam traffic on E-mail delivery.The algorithm first extracted route information to build E-mail path subset,and then uesed an effective method mapping IP addresses or domain names of nodes in an E-mail path into geographic information.Further,the algorithm detected spam by their geographic information deviation,using E-mail traffics from a link of backbone border router in China,which crosses the country boundary of China,the performance of GEPA algorithm is evaluated.The experimental results indicated that a 13.9% reduction of E-mail can be achieved with method.The results also showed GEPA was effective and practical which can be implemented in a mas-sive traffic environment handling over millions of mails every day with small memory consumption.…”
Get full text
Article -
600
Optimal Midcourse Guidance Algorithm for Exoatmospheric Interception Using Analytical Gradients
Published 2019-01-01Get full text
Article