Suggested Topics within your search.
Suggested Topics within your search.
-
121
Personalized-Template-Guided Intelligent Evolutionary Algorithm
Published 2025-08-01“…Existing heuristic algorithms are based on inspiration sources and have not yet done a good job of basing themselves on optimization principles to minimize and utilize historical information, which may lead to low efficiency, accuracy, and stability of the algorithm. …”
Get full text
Article -
122
The Hybrid Taguchi-Genetic Algorithm for Mobile Location
Published 2014-03-01“…Finally, we compare HTGA with GA and find that the Taguchi algorithm can enhance genetic algorithm. We also can find that the average convergence of generation number will not be affected no matter which propagation models we use. …”
Get full text
Article -
123
The diagnostic algorithm in pre-invasive cervical lesions
Published 2021-10-01Get full text
Article -
124
Survey of Autonomous Vehicles’ Collision Avoidance Algorithms
Published 2025-01-01“…The primary collision avoidance algorithms currently employed by self-driving cars are examined in this thorough survey. …”
Get full text
Article -
125
Influence of Using ACO Algorithm in STATCOM Performance
Published 2024-03-01“…Two optimization methods were used Ant Colony Algorithm (ACO) and Genetic Algorithm (GA) to adjust the parameters of the outer PI controller. …”
Get full text
Article -
126
An Optimized Strategy Coverage Control Algorithm for WSN
Published 2014-07-01“…In the end, this paper verifies OSCC algorithm by simulation experiment and proves it can use least sensor nodes to effectively cover target area. …”
Get full text
Article -
127
Application of an Improved CHI Feature Selection Algorithm
Published 2021-01-01“…So, this paper studies the CHI feature selection algorithm, and the main work and innovations are as follows: firstly, this paper analyzed the CHI algorithm’s flaws, determined that the introduction of new parameters will be the improvement direction of the CHI algorithm, and thus proposed a new algorithm based on variance and coefficient of variation. …”
Get full text
Article -
128
Comparison of fast regression algorithms in large datasets
Published 2023-03-01Get full text
Article -
129
Observations on TETRA Encryption Algorithm TEA-3
Published 2025-03-01“… We present a number of observations on TEA-3, a stream cipher used in TETRA radio networks that was kept secret until recently. While the same also holds for the six other TETRA encryption algorithms, we pick TEA-3 to start with, as (i) it is not obviously weakened as TEA-{1,4,7} but (ii) in contrast to TEA-2 it is approved for extra-European emergency service, and (iii) as already noted by [MBW23] the TEA-3 design surprisingly contains a non-bijective S-box. …”
Get full text
Article -
130
Metaheuristic Algorithms for Optimization: A Brief Review
Published 2024-03-01“…This work also addressed some of the difficulties associated with metaheuristic algorithms. …”
Get full text
Article -
131
Subsampling Algorithms for Irregularly Spaced Autoregressive Models
Published 2024-11-01“…To overcome this challenge, subsampling algorithms are widely used to perform statistical analyses on smaller, more manageable subsets of the data. …”
Get full text
Article -
132
Apllication of optimization algorithms to improve the design of turnouts
Published 2016-04-01“…The article describes the formulation and algorithms for solving optimization of turnout elements at the design stage. …”
Get full text
Article -
133
Algorithm for finding subcritical paths on network diagrams
Published 2023-02-01“…The conducted runs of computational experiments confirmed the operability and efficiency of the software-implemented algorithm. The performed analysis demonstrated the good convergence characteristics of the proposed algorithm as compared with other algorithms of this class applied to network diagrams. …”
Get full text
Article -
134
Review on algorithms of dealing with depressions in grid DEM
Published 2019-04-01“…Existing ways of improving the computation efficiency of depression-processing algorithms are also presented, i.e. serial algorithm optimization and parallel algorithms. …”
Get full text
Article -
135
Limited Comp Handover Algorithm For LTE-Advanced
Published 2013-01-01“…Therefore a new handover algorithm that not only supports JP in CoMP but also takes system capacity into consideration in LTE-A system is necessary. …”
Get full text
Article -
136
RGB-DSLAM Visual Odometry Optimization Algorithm
Published 2020-12-01“…In view of the long time-consuming and poor precision of RGB-D SLAM algorithm in the field ofvisual SLAM,an implementation scheme of RGB-D SLAM visual odometry is proposed. …”
Get full text
Article -
137
Carrier-independent deep optical watermarking algorithm
Published 2022-08-01“…With the development of multimedia techniques, the demand for copyright protection of digital products has also gradually risen.Digital watermarking is an effective means to protect the copyright of digital products.It is generally made by adding important identification information (i.e., digital watermark) to a digital carrier (e.g., text, image, etc.), so that the carrier carries the identification information but does not affect the normal use of the carrier.The common digital watermark embedding scheme is to embed the watermark information by modifying the carrier via specific algorithms.In the actual application scenarios, there are many images or objects to be protected (such as art paintings, etc.) that are not allowed to be modified.Based on this background, a new carrier-independent deep optical watermarking algorithm was proposed, which can realize watermark information embedding without modifying the original carrier and achieve the purpose of copyright protection.Specifically, a new watermark template expression scheme at the embedding end was proposed, which expressed the watermark information by visible light modulation.By analyzing the visual system of human eyes, a watermark template pattern based on alternating projection was proposed to embed the watermark information, which made the embedding process neither require modification of the original carrier nor affect the visual senses of human eyes.At the extraction end, a watermark extraction network based on residual connection was designed, and the captured watermarked images were fed into this network after perspective transformation to extract the watermark information.The experiments were conducted under various conditions and comparisons with three baseline algorithms were made.The experimental results show that the proposed algorithm generates watermarked images with less visual distortion and is robust to the "projecting-shooting" process.The watermark extraction network has high accuracy in extracting watermark information at different distances, angles and illumination conditions, and has certain advantages over other general networks.…”
Get full text
Article -
138
Performance Evaluation of MRMED Algorithm by Monitoring BER
Published 2021-03-01Get full text
Article -
139
Black Hole Algorithm for Software Requirements Prioritization
Published 2025-01-01“…Furthermore, the proposed BHA-based solution was evaluated on three real-world datasets (RALIC, Word, and ReleasePlanner), and its performance was compared with that of multiple state-of-the-art algorithms, including Ant Colony Optimization (ACO), Genetic Algorithm (GA), Grey Wolf Optimizer (GWO), Particle Swarm Optimization (PSO), Fitness Dependent Optimizer (FDO), Goose Algorithm (GAO), and Lagrange Elementary Optimization (LEO). …”
Get full text
Article -
140
Decision support algorithm to prevent hardware failures
Published 2024-11-01“…The algorithm is based on the consistent application of singular spectrum analysis and allows not only timely detecting of deviations, but also assessing the probability of a decision error. …”
Get full text
Article