-
3761
Improved Cylinder-Based Tree Trunk Detection in LiDAR Point Clouds for Forestry Applications
Published 2025-01-01“…While cylinder fitting algorithms provide a three-dimensional (3D) solution for trunk detection, their performance in complex forest environments remains limited due to sensitivity to parameters like distance thresholds. …”
Get full text
Article -
3762
Particle Swarm Optimization with Various Inertia Weight Variants for Optimal Power Flow Solution
Published 2010-01-01“…The PSO algorithm is simulated for each of the method individually. …”
Get full text
Article -
3763
Research and Implementation of Turbo Coding Technology in High-Speed Underwater Acoustic OFDM Communication
Published 2022-01-01“…It is demonstrated that the fully parallel turbo decoding algorithm can achieve an approximate error correction decoding performance when 36 iterations are used and when the log-map algorithm with 6 iterations is used. …”
Get full text
Article -
3764
Engineering project management technology based on visual simulation module and particle swarm optimization
Published 2025-07-01“…Compared with the efficiency value of the algorithm in the first 10s, the traditional single objective optimization algorithm was 0.28, while the proposed algorithm was 0.40. …”
Get full text
Article -
3765
Machine Learning–Driven Adaptive Testing: An Application for the MMPI Assessment
Published 2025-01-01“…The findings indicate that a machine learning classifier based on a model tree (ML-MT) algorithm effectively handled the complex MMPI-2 scales, yielding accurate scores while noticeably reducing item administration. …”
Get full text
Article -
3766
Channel-Hopping Using Reinforcement Learning for Rendezvous in Asymmetric Cognitive Radio Networks
Published 2024-12-01“…This paper addresses the rendezvous problem in asymmetric cognitive radio networks (CRNs) by proposing a novel reinforcement learning (RL)-based channel-hopping algorithm. Traditional methods like the jump-stay (JS) algorithm, while effective, often struggle with high time-to-rendezvous (TTR) in asymmetric scenarios where secondary users (SUs) have varying channel availability. …”
Get full text
Article -
3767
Structure-aware sample consensus for robust stereo visual odometry
Published 2017-10-01“…With this novel procedure, the structure-aware sample consensus gains more possibility to generate a correct motion model and performs as a robust estimator for the underground visual odometry algorithm. The experiments with both synthetic and real-world data show that structure-aware sample consensus outperforms the random sample consensus and its variants in robustness, while maintaining a lower computational cost. …”
Get full text
Article -
3768
Adaptive Steganography Using Improve Bit-plane Complexity Segmentation
Published 2024-06-01“…This research introduces an improved algorithm for concealing messages within color images. …”
Get full text
Article -
3769
A Fast and Efficient Adaptive Threshold Rate Control Scheme for Remote Sensing Images
Published 2012-01-01“…The simulation results show that the computational cost and working buffer memory size of the proposed algorithm reach only 18.13 and 7.81%, respectively, of the same parameters in the postcompression rate distortion algorithm, while the peak signal-to-noise ratio across the images remains almost the same. …”
Get full text
Article -
3770
Optimal Design of Low Sidelobe Sparse Linear Arrays
Published 2024-01-01“…The initial value of the algorithm is generated through the chaotic Piecewise map, while the scaling factor is adjusted dynamically in line with the iterations and fitness values. …”
Get full text
Article -
3771
A Novel Behavior-Based Virus Detection Method for Smart Mobile Terminals
Published 2012-01-01“…We first propose a model to collect and analyze user behaviors and then present a polynomial time algorithm for the virus detection. Next, we evaluate this algorithm by testing it with two commercial malwares and one malware written by ourselves and show that our algorithm enjoys a high virus detection rate. …”
Get full text
Article -
3772
The Differential Transform Method as an Effective Tool to Solve Implicit Hessenberg Index-3 Differential-Algebraic Equations
Published 2023-01-01“…This algorithm is easy to implement in Maple or Mathematica. …”
Get full text
Article -
3773
Data aggregation scheme based on SDN for internet of things
Published 2019-02-01“…There are many redundant parts in the data generated and transmitted by IoT devices.Transmitting this data reduces network lifetime and bandwidth.Aiming at the problem,the aggregation gateway layer was proposed,and a SDN-based IoT data aggregation architecture and algorithm were designed.The simulation analysis shows that compared with the architecture of the ordinary gateway and OF-GW,the network lifetime is improved by about 32.6%,and the amount of data packets sent by the sensing layer to the network layer is reduced by 6.1% to 55.1%.Compared with the LEACH algorithm,the designed rule algorithm reduces the average delay of data aggregation by about 24.1%,while avoiding data loss and improving the accuracy of data aggregation.…”
Get full text
Article -
3774
Secure resource allocation in hybrid energy-harvesting relay and full-duplex receiver
Published 2019-01-01“…Taking into account the wireless physical layer security in energy-constrained relaying systems,a secure resource allocation scheme was proposed under simultaneous wireless information and power transfer (SWIPT) protocol.The utility optimization problem was considered aiming to maximize the secrecy rate by jointly optimizing the power splitting (PS) ratio and the transmit powers under the constraint of the transmit powers of the nodes and the harvested energy of the relay.The objective problem,which is non-convex,was decoupled into two subproblems.One was to optimize the PS ratio,another was to optimize the transmit powers.The optimal solution of the subproblems can be obtained in the closed-form.Then,the suboptimal solution is obtained with the proposed convergent iterative algorithm.Simulation results show the effects of artificial noise signal,residual self-interference signal,transmit power of nodes,amplification factor of relay and other factors on the security performance.Compared with the traditional gradient descent algorithm,the proposed algorithm can reduce more than 80% of the computational load,while the algorithm has the slightly better performance.…”
Get full text
Article -
3775
Quantum natural stochastic pairwise coordinate descent
Published 2025-07-01“…We develop a quantum optimization algorithm that leverages the geometry of the state space via this estimator while avoiding full-state tomography, as in conventional techniques. …”
Get full text
Article -
3776
Improving energy efficiency and network performance in IaaS cloud with virtual machine placement
Published 2014-01-01“…The existing virtual machine(VM) placement schemes mostly reduce energy consumption by optimizing utilization of physical server or network element.However,the aggressive consolidation of these resources may lead to network performance degradation.In view of this,a VM placement scheme was proposed to achieve two objectives.One is to minimize the number of activating physical machines and network elements to reduce the energy consumption,and the other is to minimize the maximum link utilization to improve the network performance.This scheme is able to reduce the energy consumption caused by physical servers and network equipment while optimizing the network performance,making a trade off between energy efficiency and network performance.A novel two-stage heuristic algorithm for a solution was designed.Firstly,the hierarchical clustering algorithm based on minimum cut and best fit algorithm was used to optimize energy efficiency,and then,local search algorithm was used to minimize the maximum link utilization.The simulations show that this solution achieves good results.…”
Get full text
Article -
3777
Hybrid clustering strategies for effective oversampling and undersampling in multiclass classification
Published 2025-01-01“…By clustering and separating classes into majority and minority categories, this algorithm retains the most information during undersampling while generating efficient data in the minority class. …”
Get full text
Article -
3778
Face Detection and Recognition using Color Segmentation,Template Matching and Gabor Neural Network with Fuzzy System
Published 2018-12-01“…While implementing the proposed algorithm, a tradeoff between accuracy and computational complexity of the algorithm are made, because the face recognition system is implemented on a device with limited hardware capabilities …”
Get full text
Article -
3779
Radar High-Resolution Range Profile Target Recognition by the Dual Parallel Sequence Network Model
Published 2021-01-01“…Using traditional neural network algorithms to adapt to high-resolution range profile (HRRP) target recognition is a complex problem in the current radar target recognition field. …”
Get full text
Article -
3780
Indoor Wi-Fi fingerprint localization method based on CSI tensor decomposition
Published 2021-11-01“…Aiming at the problem that as the scale of the fingerprint database increases, the training cost and processing complexity of CSI fingerprints will also greatly increase, an indoor Wi-Fi fingerprint localization method based on CSI tensor decomposition was proposed.Firstly, the tensor decomposition algorithm based on the PARAFAC (parallel factor) analysis model and the ALS (alternate least squares) iterative algorithm were combined to reduce the interference of the environment.Then, the tensor wavelet decomposition algorithm was used to extract the feature and obtain the CSI fingerprint.Finally, a localization model was established based on the PLSR (partial least squares regression) algorithm to realize the location estimation.Experimental results show that the confidence probability of the proposed method is 94.88% within 4 m localization error, which verifies that the proposed method has good localization performance while fitting the relationship between CSI location fingerprints and location coordinates.…”
Get full text
Article