Showing 541 - 560 results of 1,978 for search 'since algorithm', query time: 0.09s Refine Results
  1. 541

    Adaptive WSN Scheduling for Lifetime Extension in Environmental Monitoring Applications by Jong Chern Lim, Chris Bleakley

    Published 2011-12-01
    “…For multihop networks, the proposed algorithm improves on the previously published algorithm by up to 553% and 38% in terms of lifetime and accuracy, respectively.…”
    Get full text
    Article
  2. 542

    Application of Chaotic Neural Network for Authentication using the Database by Ammar Yaseen Abd Alazeez

    Published 2014-07-01
    “…In this paper a new algorithm is suggested to encrypt data, since it was to take advantage of properties of the chaotic, so it was entered as a key in encryption and hiding  by entering values to the artificial neural network for training as well as hide in the picture, beside use the database for storage and retrieval information and increase the secret system. …”
    Get full text
    Article
  3. 543

    Efficient Reverse Skyline Processing over Sliding Windows in Wireless Sensor Networks by Jun-Ki Min

    Published 2015-04-01
    “…Since the energy efficiency is utmost important issue to prolong the network lifetime, in this paper, we proposed efficient algorithms to process a reverse skyline query over a sliding window in WSN environments. …”
    Get full text
    Article
  4. 544

    Level Set Based Coverage Holes Detection and Holes Healing Scheme in Hybrid Sensor Network by Xiaosheng Yu, Chengdong Wu, Dongyue Chen, Nan Hu

    Published 2013-11-01
    “…Then we propose genetic algorithms based coverage holes healing algorithm. This algorithm could leverage mobility to optimize the average coverage rate and the average movement distance of the mobile nodes. …”
    Get full text
    Article
  5. 545

    Application of GA in Furniture Modeling Style Design by Heng Yu, Chunjing Liu

    Published 2022-01-01
    “…In this paper, an interactive innovation evolution system based on evolutionary algorithm is proposed. Taking full advantage of the evolution function of genetic algorithm and the modeling advantages of ACIS platform, a prototype innovation evolution system is developed based on ACIS/hoops platform with the genetic algorithm based on tree structure as the innovation support, which can help designers complete the innovation modeling design. …”
    Get full text
    Article
  6. 546

    Radar signal recognition exploiting information geometry and support vector machine by Yuqing Cheng, Muran Guo, Limin Guo

    Published 2023-01-01
    “…In addition, the proposed algorithm has better robustness to small samples than other deep learning‐based algorithms, since the SVM method minimises the structural risk instead of the empirical risk. …”
    Get full text
    Article
  7. 547

    Theory Analysis for the Convergence of Kernel-Regularized Online Binary Classification Learning Associated with RKBSs by Lin Liu, Xiaoling Pan, Baohuai Sheng

    Published 2023-01-01
    “…We give investigations on the convergence of a kernel-regularized online binary classification learning algorithm in the setting of reproducing kernel Banach spaces (RKBSs), design an online iteration algorithm with the subdifferential of the norm and the logistic loss, and provide an upper bound for the learning rate, which shows that the online learning algorithm converges if RKBSs satisfy 2-uniform convexity.…”
    Get full text
    Article
  8. 548

    Scheme of extending elliptic curve method to three phases by Guiwen LUO

    Published 2018-12-01
    “…Elliptic curve method for integer factorization (ECM) is one of the most popular integer factorization algorithms,and it was firstly proposed by Lenstra in 1985.The original ECM contained just first phase.Since its invention,researches about the algorithm and implementation emerged up,among which the most important improvement is the extension to two phases proposed by Brent and Montgomery.This improvement tremendously strengthened ECM's capacity and efficiency.Elliptic curve method was extended to three phases.Extension method is kind of like “mixing together” the first phase and second phase.Compared to the best current two phases ECM,the new algorithm shows 2 advantages.First,under the same factorization parameters,the proposed algorithm improves the probability of finding out prime factor at the expense of negligible increasement of time.Second,when searching the same prime factor,the proposed algorithm can utilize smaller “smoothness parameters”.…”
    Get full text
    Article
  9. 549

    Spline approximation of multivalued functions in linear structures routing by D. A. Karpov, V. I. Struchenkov

    Published 2022-07-01
    “…However, in the present paper, the first stage is considered only, since the complex algorithm of the second stage and its justification require separate consideration.Conclusions. …”
    Get full text
    Article
  10. 550

    Interference Coordination Based on POMDP in Multi-Cell OFDMA System by Qiang Wei, Tao Yang, Hui Feng, Bo Hu

    Published 2013-04-01
    “…The inter-cell interference coordination(ICIC)of OFDMA system was studied,and a dynamic ICIC algorithm based on the theory of partially observable Markov decision process(POMDP)was proposed.The statistic model of interference and SINR of channel was combined to allocate channels for cell-edge user in this algorithm.Simulation results show that the proposed scheme can efficiently avoid interference for the cell-edge user.Since this algorithm avoids the coordination between cells,the system overhead is saved.Furthermore,a likelihood relation between SINR and interference was established by using particle filter,so there was no necessary for system to measure the interference.…”
    Get full text
    Article
  11. 551

    An efficient method for mining frequent weighted subgraphs based on weighted edges by Lam B. Q. Nguyen, Nhan H. Vo, Nhung N. Chau, Bay Vo

    Published 2025-05-01
    “…Since the GraMi algorithm was introduced to mine frequent subgraphs, many other algorithms based it have also been published. …”
    Get full text
    Article
  12. 552

    Dynamic Path Planning Method for Unmanned Surface Vessels in Complex Traffic Conditions of Island Reefs Waters by Jing Peng, Xinyuan Zhao, Qi Zhao

    Published 2024-10-01
    “…Furthermore, to ensure robust dynamic path planning for USVs across various water environments, such as narrow channels, reef-laden waters, and open seas, fuzzy logic is integrated with the improved DWA algorithm. Since USVs must comply with COLREGS during navigation, the algorithm incorporates these regulations, enhancing the DWA algorithm with fuzzy logic to ensure compliance. …”
    Get full text
    Article
  13. 553

    Creating Balance on Bandwidth Consumption using Network Coding in Wireless Sensor Networks by Ehsan Kharati

    Published 2024-02-01
    “…For this purpose, we need to calculate the derivative of the Lagrangian function relative to its variables, in order to determine the condition as a multi-excited multi-equation device. But since the solution of equations KKT is centralized and for WSNs with a large number of SNs, it is very difficult and time consuming and almost impractical, we provide a distributed and repeatable algorithm for solving proposed model in which instead of deriving derivatives, combination Sub-gradient method and network flow separation method are used, thus allow each SN locally and based on the information of its neighboring nodes performs optimal routing and balances bandwidth consumption in the network. …”
    Get full text
    Article
  14. 554

    Improved Ant Colony Optimization for the Operational Aircraft Maintenance Routing Problem with Cruise Speed Control by Qing Zhang, Felix T. S. Chan, Xiaowen Fu

    Published 2023-01-01
    “…The operational aircraft maintenance routing problem (OAMRP) plays a critical part in producing considerable cost reductions for airlines, since its solution directly influences the number of operating leased aircraft. …”
    Get full text
    Article
  15. 555

    Low-complexity optimal MPSK detection for spatial modulation by Hong-zhi MEN, Ming-lu JIN

    Published 2015-08-01
    “…The low-complexity optimal SM detection algorithm for MQAM signal detection had been proposed,but no similar method was found for MPSK signal.The problem of low-complexity detection for MPSK signal was considered in SM systems.Utilizing 2-D vector quantization of ML demodulation and the property of MPSK constellation,a low-complexity optimal detection which is independent to modulation order was developed.Since the approach avoids the exhaustive searching on signal constellation space,the computational complexity can be significantly reduced.The proposed detection algorithm can provide the identical performance with ML-optimum detector and has lower computational complexity.Therefore,it has both theoretical and practical significance.The proposed algorithm is of great significance in the large antenna and green communication technology.…”
    Get full text
    Article
  16. 556

    Optimal control of agent-based models via surrogate modeling. by Luis L Fonseca, Lucas Böttcher, Borna Mehrad, Reinhard C Laubenbacher

    Published 2025-01-01
    “…There is a broad range of applications for such an algorithm, since ABMs are used widely in the life sciences, such as ecology, epidemiology, and biomedicine and healthcare, areas where optimal control is an important purpose for modeling, such as for medical digital twin technology.…”
    Get full text
    Article
  17. 557

    Monocular Vision-inertial Fusion Approach for MAV State Estimation by RU Xiangyu, JIN Chao, PAN Chengfeng, XU Chao

    Published 2018-01-01
    “…The algorithm still works well when the visual result is abnormal, and it shows a good performance in the experiment.…”
    Get full text
    Article
  18. 558

    Image Processing Method Based on Chaotic Encryption and Wavelet Transform for Planar Design by Yiying Liu, Young Chun Ko

    Published 2021-01-01
    “…This paper provides an in-depth study and analysis of image processing for graphic design through chaotic encryption combined with a wavelet transform algorithm. Firstly, the traditional Mallat algorithm is optimized; since the mean value of the transform coefficients generated after the wavelet transform of the image is used as the initial value of the chaotic system to iterate, when the image is modified, then the mean value of the wavelet coefficients will also change, and the final iteration comes out as two different sequences using the property that the chaotic system is extremely sensitive to the initial conditions, so the algorithm has a certain sensitivity to tampering and localization effect. …”
    Get full text
    Article
  19. 559

    Intelligent tuning method for service scheduling in electric power communication networks based on operational risk and QoS guarantee. by Yang Yu, YueLin Jiang, Zeng Dou, Li Cong, Wei Huang, Qiang Zhang, Yang Hu, YanJun Bi

    Published 2025-01-01
    “…Utilizing this model, an enhanced Risk-Time Ant Colony Optimization (RT-ACO) routing algorithm is proposed, which builds upon the traditional ant colony algorithm. …”
    Get full text
    Article
  20. 560

    Computation of symmetries of rational surfaces by Juan Gerardo Alcázar, Carlos Hermoso, Hüsnü Anıl Çoban, Uğur Gözütok

    Published 2024-11-01
    “…This algorithm works extremely well in practice, since the problem is reduced to that of rational space curves, which can be efficiently solved by using existing methods. …”
    Get full text
    Article