Showing 141 - 160 results of 1,978 for search 'since algorithm', query time: 0.10s Refine Results
  1. 141

    Steganography in Audio Using Wavelet and DES by Baghdad Science Journal

    Published 2015-06-01
    “…The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secret message in high frequency. …”
    Get full text
    Article
  2. 142
  3. 143
  4. 144

    Novel adaptive generalized principal component analysis algorithm based on Hebbian rule by Yingbin GAO, Xiangyu KONG, Qiaohua CUI, Haidi DONG

    Published 2020-07-01
    “…In order to adaptively estimate the generalized principal component from input signals,a novel generalized principal component analysis algorithm was proposed based on the Hebbian linear neuron model.Since the autocorrelation matrices of the signals were estimated directly from the sampled data at the current time,the proposed algorithm had low computation complexity.Trough analyzing all of the equilibrium points by Lyapunov method,it is proven that if and only if the weight vector in the neuron had the same direction with the generalized principal component,the proposed algorithm attains the convergence status.Simulation results shows that compared with some same type algorithms,the proposed algorithm has faster convergence speed.…”
    Get full text
    Article
  5. 145

    Adaptive Enhancement Algorithm of High-Resolution Satellite Image Based on Feature Fusion by Ruizhe Wang, Wang Xiao

    Published 2022-01-01
    “…Since the traditional adaptive enhancement algorithm of high-resolution satellite images has the problems of poor enhancement effect and long enhancement time, an adaptive enhancement algorithm of high-resolution satellite images based on feature fusion is proposed. …”
    Get full text
    Article
  6. 146

    Study on self-similar call admission control algorithm in WiM AX by Yong-dong HU, Guo-xin WU, Ning QIAN, San-feng ZHANG

    Published 2012-09-01
    “…As to the self-similarity of WiMAX network traffic,M/Pareto model was proposed to model network traf-fic.Through the statistical nature between the M/Pareto model and FBM traffic model,the parameters of the M/Pareto were mapped to the ones of FBM traffic model.The effective bandwidth formula was derived for M/Pareto model para-meters.Whereby,a self-similar call admission control algorithm(SS-CAC)was designed.It avoided getting the parame-ter values of FBM traffic flow model with the measurem method and adapted to the self-similarity of WiMAX traffic.Since the calculation of the effective bandwidth was accurate and convenient,simulation results show that SS-CAC greatly reduces the call blocking rate and improves the bandwidth utilization.…”
    Get full text
    Article
  7. 147

    Energy and channel transmission management algorithm for resource harvesting body area networks by Zhigang Chen, Lin Guo, Deyu Zhang, Xuehan Chen

    Published 2018-02-01
    “…Simulation results demonstrate the effectiveness of the proposed algorithm.…”
    Get full text
    Article
  8. 148

    A Proposed Algorithm to Detect the Effect of an Object Within a Video Series by Abeer Thanoon

    Published 2010-06-01
    “…In this research an algorithm for detecting a specific object and tracing its movement within a depicted series is proposed . …”
    Get full text
    Article
  9. 149

    Energy-Efficient Chain Formation Algorithm for Data Gathering in Wireless Sensor Networks by Se-Jung Lim, Myong-Soon Park

    Published 2012-09-01
    “…We propose energy efficient chain formation (EECF) algorithm to resolve the unbalanced energy consumption problem caused by long-distance data transmission of some nodes in a chain formed by the greedy algorithm. …”
    Get full text
    Article
  10. 150

    A Greedy Algorithm on Constructing the Minimum Connected Dominating Set in Wireless Network by Deqian Fu, Lihua Han, Zifen Yang, Seong Tae Jhang

    Published 2016-07-01
    “…Many researchers have been devoted to designing approximate algorithms for CDS problem since constructing the minimum CDS (MCDS) is NP-hard problem. …”
    Get full text
    Article
  11. 151

    Novel cooperative global spectrum sensing algorithm based on variational Bayesian inference by Ming WU, Tie-cheng SONG, Jing HU, Lian-feng SHEN

    Published 2016-02-01
    “…Furthermore, it is proved that the proposed algorithm has better MSE performance than another algorithm since the sparsity of model coefficient vector is util zed.…”
    Get full text
    Article
  12. 152

    Classifying High School Scholarship Recipients Using the K-Nearest Neighbor Algorithm by Ica Dwi Yulisa, Gusmelia Testiana, Imamulhakim Syahid Putra

    Published 2023-02-01
    “…Data mining with a classification method using the K-Nearest Neighbor algorithm is believed to be one of the alternative solutions to solve this problem. …”
    Get full text
    Article
  13. 153
  14. 154

    Parameters Identification for Photovoltaic Module Based on an Improved Artificial Fish Swarm Algorithm by Wei Han, Hong-Hua Wang, Ling Chen

    Published 2014-01-01
    “…Different from the traditional linear model, the model of PV module has the features of nonlinearity and multiparameters. Since conventional methods are incapable of identifying the parameters of PV module, an excellent optimization algorithm is required. …”
    Get full text
    Article
  15. 155

    Railway safety monitoring algorithm based on distributed optical fiber vibration sensor by Fuyang CHEN, Bin JIANG, Yu SHA

    Published 2020-09-01
    “…Aiming at the monitoring problem of the human climbing behaviour existing along the railway,a railway safety detection algorithm based on distributed optical fiber vibration sensors was proposed by combining the distributed optical fiber sensing technology and signal analysis technology.The surrounding vibration was sensed and transmitted through the optical cables laid along the fence network of the railway,and then the Internet of things (IoT) connection between the railway and monitoring algorithm was built to realize the intelligent monitoring of the climbing behavior.In view of the complicated surrounding environment of the railway and more interference,the Hamming window and wavelet threshold denoising method were used to filter the signal of each frame to improve the signal-to-noise ratio of the vibration signal.In the selection of features,the power spectrum and short-time over-level rate of the signal were extracted from the time domain and frequency domain respectively as a joint feature to determine whether there was climbing or creeping behavior.Since that the climbing behavior was spatially continuous,the minimum alarm range was set to filter out alarms with a too small range,which improved the accuracy of the monitoring system.…”
    Get full text
    Article
  16. 156

    DAG Based Multipath Routing Algorithm for Load Balancing in Machine-to-Machine Networks by Liang Liu, Tao Zhang, Jun Zhang

    Published 2013-12-01
    “…In addition, our algorithm is a polynomial time complexity algorithm with nodes and links number of the entire network.…”
    Get full text
    Article
  17. 157
  18. 158

    A Mobile Agent Routing Algorithm in Dual-Channel Wireless Sensor Network by Kui Liu, Sanyang Liu, Hailin Feng

    Published 2012-05-01
    “…A mobile agent routing algorithm (MARA) is presented in this paper, and then based on the dual-channel communication model, the two-layer network combination optimization strategy is also proposed. …”
    Get full text
    Article
  19. 159

    Exploring the Performance of Path Reliability in MANETs Through an Energy-Efficient RRS Algorithm by Vijay U. Rathod, Shyamrao V. Gumaste, Sameer S. Gajghate

    Published 2025-01-01
    “…In a dynamic network, the intermediate nodes rapidly exhaust energy since they receive and send data. The proposed algorithm decides which of these nodes to use based on the section representing their remaining maximum energy level to better use the node’s energy for a longer lifespan. …”
    Get full text
    Article
  20. 160

    Learning Path Analysis of Optimizing Educational Data Mining Based on Genetic Algorithm by Wu Yanhong

    Published 2025-01-01
    “…The iterative process of genetic algorithms preserves high fitness pathways while generating new ones. …”
    Get full text
    Article