Showing 181 - 200 results of 1,978 for search 'since algorithm', query time: 0.07s Refine Results
  1. 181
  2. 182

    A Two-Step Projected Iterative Algorithm for Tropospheric Water Vapor Tomography by Shangyi Liu, Kefei Zhang, Suqin Wu, Wenyuan Zhang, Longjiang Li, Moufeng Wan, Jiaqi Shi, Minghao Zhang, Andong Hu

    Published 2022-01-01
    “…To address this, a new tomographic algorithm, named two-step projected iterative algorithm (TSPIA), is proposed. …”
    Get full text
    Article
  3. 183

    Improving the Processing Algorithm of Beijing MST Radar Power Spectral Density Data by Chen Ze, Tian Yufang, Lü Daren

    Published 2020-11-01
    “…Thus the effectiveness and reliability of the improved algorithm are verified, and it is relatively easy to implement.…”
    Get full text
    Article
  4. 184

    Parameter Optimization of MALDI-TOF MS Based on Improved Whale Optimization Algorithm by Yu-peng ZHANG, Yu-gong DANG, Hui-yuan YANG, Zhi-gang ZHOU, Gao-hang JIANG

    Published 2025-05-01
    “…To address the shortcomings of the Whale optimization algorithm, including slow convergence speed, low precision and susceptibility to local optima, improvements were made on the convergence factor, inertia weight and position update strategy. …”
    Get full text
    Article
  5. 185

    Study of SDN intrusion intent identification algorithm based on Bayesian attack graph by Zhiyong LUO, Yu ZHANG, Qing WANG, Weiwei SONG

    Published 2023-04-01
    “…Since the existing software defined network (SDN) security prediction methods do not consider the attack cost and the impact of controller vulnerabilities on SDN security, a Bayesian attack graph-based algorithm to assessing SDN intrusion intent was proposed.The PageRank algorithm was used to obtain the criticality of the device, and combining with the vulnerability value, attack cost, attack benefit and attack preference, an attack graph was constructed, and a risk assessment model was established to predict the intrusion path.Through experimental comparison, it is obvious that the proposed model can more accurately predict the intrusion path, effectively ensure the accuracy of security prediction, and provide a basis for SDN defense.…”
    Get full text
    Article
  6. 186

    Non-Destructive Thickness Measurement of Energy Storage Electrodes via Terahertz Technology by Zhengxian Gao, Xiaoqing Jia, Jin Wang, Zhijun Zhou, Jianyong Wang, Dongshan Wei, Xuecou Tu, Lin Kang, Jian Chen, Dengzhi Chen, Peiheng Wu

    Published 2025-06-01
    “…Secondly, a hybrid signal processing algorithm is applied, combining an optimized Savitzky–Golay filter for high-frequency noise suppression with an enhanced sinc function wavelet threshold technique for signal fidelity improvement. …”
    Get full text
    Article
  7. 187

    <italic>UAV-NavS</italic>: Three-Dimensional Navigation System of Multiple Unmanned Aerial Vehicles Using Hybrid Optimization Algorithm by Monia Digra, Upma Jain, Ram Kishan Dewangan, Himanshu Suyal

    Published 2025-01-01
    “…The proposed approach enhances the exploration capabilities of the whale optimization algorithm. Then, it hybridises this improved whale optimization algorithm with the sine cosine algorithm to improve the overall exploitation capabilities. …”
    Get full text
    Article
  8. 188
  9. 189

    A Dynamic Topology Reformation Algorithm for Power Saving in ZigBee Sensor Networks by Reen-Cheng Wang, Ruay-Shiung Chang, Jei-Hsiang Yen, Pu-I Lee

    Published 2013-11-01
    “…In order to extend the life time of network, we proposed a dynamic topology reformation algorithm. The algorithm consists of a cluster reformation scheme for enhancing connectivity and a self-swapping method for averaging the loading of router nodes and end devices. …”
    Get full text
    Article
  10. 190

    Joint optimization algorithm for task offloading resource allocation based on edge-end collaboration by Liuqing WU, Xiaorong ZHU

    Published 2020-03-01
    “…In order to solve the problem of limited mobile terminal resources and improve task processing efficiency,a task offloading resource allocation algorithm based on edge-end collaboration was proposed.With the goal of maximizing the total benefit of tasks,the optimal task offloading resource allocation problem based on Lyapunov theory was formed by the constraint of service QoS guarantee and resource limitation.Since the problem is NP-hard,it was decoupled into a channel resource allocation problem solved by KKT condition and a 0-1 integer programming problem about task assignment.Compared with the traditional algorithm,the complexity of the proposed algorithm was O(mn),the efficiency was improved by about 20%,and the delay was reduced more than 15%.…”
    Get full text
    Article
  11. 191
  12. 192

    Comprehensive Outlier Detection in Wireless Sensor Network with Fast Optimization Algorithm of Classification Model by Haiqing Yao, Heng Cao, Jin Li

    Published 2015-07-01
    “…Regarding the one-sided consideration of optimization or iterative updating algorithm for QSSVM model within current techniques, we have proposed comprehensive outlier detection methods in WSN based on the QSSVM algorithm. …”
    Get full text
    Article
  13. 193

    Application of a Channel Estimation Algorithm to Spectrum Sensing in a Cognitive Radio Context by Vincent Savaux, Moïse Djoko-Kouam, Yves Louët, Alexandre Skrzypczak

    Published 2014-01-01
    “…The proposed method is based on an iterative algorithm used for the joint estimation of noise variance and frequency selective channel. …”
    Get full text
    Article
  14. 194

    A data forwarding algorithm based on Markov thought in underwater wireless sensor networks by Dongwei Li, Jingli Du, Linfeng Liu

    Published 2017-02-01
    “…To this end, we propose a data forwarding algorithm based on Markov thought, which logically transforms the underwater three-dimensional deployment model into a two-dimensional model, and thus the nodes are considered to be hierarchically deployed. …”
    Get full text
    Article
  15. 195

    A Survey of Unsupervised Learning Algorithms for Zero-Day Attacks in Intrusion Detection Systems. by Sunkanmi Oluwadare, Zag ElSayed

    Published 2023-05-01
    “…Based on our evaluation, we propose Long Short-Term (LSTM) networks and Autoencoder networks as the best algorithms for further analysis in intrusion detection.…”
    Get full text
    Article
  16. 196

    Assigning Metaheuristics to a Logistics Problem: A Novel Classification System for Algorithms and Problems by Tamara J. Bíró, Adrián Horváth

    Published 2024-12-01
    “…However, finding a suitable technique for optimizing a complex problem is not an easy task since there are hundreds of methods. The majority of metaheuristic research is characterized by developing a new algorithm for a task or modifying or improving an existing technique. …”
    Get full text
    Article
  17. 197

    An efficient dictionary refinement algorithm for multiple target counting and localization in wireless sensor networks by Baoming Sun, Yan Guo, Gengfa Fang, Eryk Dutkiewicz

    Published 2017-08-01
    “…Extensive simulation results show that the proposed dictionary refinement algorithm achieves more accurate counting and localization compared to the state-of-the-art compressive sensing reconstruction algorithms.…”
    Get full text
    Article
  18. 198

    Iterative Algorithm for Common Fixed Points of Infinite Family of Nonexpansive Mappings in Banach Spaces by Songnian He, Jun Guo

    Published 2012-01-01
    “…Under certain appropriate conditions on {αn}, we prove that {xn} converges strongly to a common fixed point x* of {Tk}k=1∞, which solves the following variational inequality: 〈x*-f(x*),J(x*-p)〉≤0,    p∈⋂k=1∞Fix(Tk), where J is the (normalized) duality mapping of X. This algorithm is brief and needs less computational work, since it does not involve W-mapping.…”
    Get full text
    Article
  19. 199

    Prediction of Gait Neurodegenerative Diseases by Variational Mode Decomposition Using Machine Learning Algorithms by P. Visvanathan, P.M. Durai Raj Vincent

    Published 2024-12-01
    “…Prediction of different neurodegenerative disease such as Parkinsons Disease (PD), Huntingtons Disease (HD), Amyotrophic Lateral Sclerosis (ALS) and healthy subjects are carried out by Multilayer Perceptron (MLP) with the parameters optimized with Genetic Algorithm (GA). The results of the experiments shows that the proposed model produces a better accuracy of 98.4% than the other existing algorithms for the gait dataset.…”
    Get full text
    Article
  20. 200

    Multi-hop clustering routing algorithm based on fuzzy inference and multi-path tree by Yanshan Tian, Qingguo Zhou, Fangqin Zhang, Jinjuan Li

    Published 2017-05-01
    “…Wireless sensor network technologies have been widely used in modern life especially in Internet of Things. Since battery energy of sensor nodes is limited, balancing the energy consumption of each node on a transmitting path is an important issue. …”
    Get full text
    Article