-
461
Hammerstein Nonlinear Active Noise Control with the Filtered-Error LMS Algorithm
Published 2013-09-01“…observed in classical ANC using loudspeakers. They are mainly due to vibrations of a not ideally clamped plate and use of nonlinear actuators, like MFC patches. …”
Get full text
Article -
462
Application of the spectral bisection algorithm for the analysis of criminal communities in social networks
Published 2024-07-01“…The purpose of the study is to substantiate the use of one of the graph separation methods – the spectral bisection algorithm for the analysis of social networks, as well as to evaluate the possibilities of software implementation of this algorithm during the collection of evidence-based information in the investigation of crimes committed using information and telecommunications technologies.Method. …”
Get full text
Article -
463
Distributed energy efficient unequal clustering algorithm for wireless sensor networks
Published 2009-01-01“…A distributed energy-efficient unequal clustering (DEEUC) algorithm was proposed for wireless sensor net-works by research current routing algorithms. …”
Get full text
Article -
464
ALGORITHMS FOR IDENTIFICATION OF CUES WITH AUTHORS’ TEXT INSERTIONS IN BELARUSIAN ELECTRONIC BOOKS
Published 2016-10-01“…The main stages of algorithms for characters’ gender identification in Belarusian electronic texts are described. …”
Get full text
Article -
465
A Novel Acceleration Estimation Algorithm Based on Least Square Method
Published 2018-01-01Get full text
Article -
466
Seismic Inversion Problem Using a Multioperator Whale Optimization Algorithm
Published 2022-01-01“…The whale optimization algorithm (WOA) is a metaheuristic algorithm based on swarm intelligence and it mimics the hunting behavior of whales. …”
Get full text
Article -
467
Algorithms for Effector Prediction in Plant Pathogens and Pests: Achievements and Current Challenges
Published 2024-10-01“…Future algorithms may contemplate these highlighted features and will be better equipped to identify not only canonical effectors but highly elusive non-canonical effectors as well.…”
Get full text
Article -
468
Formation of the pediatric electroretinogram database parameters for the development of doctor’s decisionmaking algorithm
Published 2022-05-01“…The development of automated algorithms for analyzing electroretinogram signals may simplify routine processes and improve the quality of diagnosing eye diseases. …”
Get full text
Article -
469
Wireless sensor indoor positioning based on an improved particle filter algorithm
Published 2020-02-01“…Positioning by wireless sensor network is one of its main functions and has been widely used in many fields. …”
Get full text
Article -
470
Novel virtual topology configuration algorithm for IP over WDM network
Published 2007-01-01“…The load balancing for the whole network was chosen as the optimal objective and a novel virtual topology configuration algorithm was proposed.In the proposed algorithm,the load distribution variance was chosen as a key criterion for judging the load balancing.And the definition and the computing method of the load distribution variance were introduced.In addition,the blocking probability was chosen as the main performance parameter for comparing with other algorithms.In the optical layer,the algorithm proposed was compared with the routing with load balancing heuristics(RLBH) algorithm.Similarly,in IP layer,the algorithm was compared with the fixed-path least-congestion(FPLC) algorithm.Moreover,the numerical results of the algorithm comparison were shown and discussed.The simulation results show that the performance of the algorithm is better than RLBH algorithm and FPLC algorithm on the blocking probability.…”
Get full text
Article -
471
Electronic Controller Automatic Test System Based on Intelligent Control Algorithm
Published 2022-01-01“…In order to improve the automatic test effect of the electronic controller, this paper combines the intelligent control algorithm to construct the automatic test system of the electronic controller. …”
Get full text
Article -
472
A Simplified Hypervolume-Based Evolutionary Algorithm for Many-Objective Optimization
Published 2020-01-01“…Evolutionary algorithms based on hypervolume have demonstrated good performance for solving many-objective optimization problems. …”
Get full text
Article -
473
Traffic identification of network business based on multi-layer cascade algorithm
Published 2015-12-01“…The contradiction between traffic demand and network bandwidth is the main problem of the current network.Traffic management is one of the effective solutions,at the same time it can improve the quality of service of the network,and network traffic identification is the basis of fine traffic management.The traffic identification method of network business based on multi-layer cascade algorithm was proposed,after the research of network traffic identification and machine learning techniques.This method can adapt to the situation of the complex network traffic flow,and can balance the contradiction between the time performance and the accuracy of the machine learning algorithm.Furthermore the cascade algorithm of this method takes the cost imbalance into account,and takes more attention to the identification of important business,so it can help enhance user experience.…”
Get full text
Article -
474
Implementation of Haar Cascade and Adaboost Algorithms in Photo Classification on Social Networks
Published 2023-06-01“…For example, image searches on Instagram may use certain keywords, sometimes called hashtags. …”
Get full text
Article -
475
Research on the Multi-Armed Bandit Algorithm in Path Planning for Autonomous Vehicles
Published 2025-01-01“…When applied to autonomous driving, the MAB algorithm may be able to demonstrate its advantages. …”
Get full text
Article -
476
Information Fusion-Based Storage and Retrieve Algorithms for WSNs in Disaster Scenarios
Published 2011-10-01“…Sensor networks are especially useful in catastrophic or disaster scenarios such as abysmal sea, floods, fires, or earthquakes where human participation may be too dangerous. Storage technologies take a critical position for WSNs in such scenarios since the sensor nodes may themselves fail unpredictably, resulting in the loss of valuable data. …”
Get full text
Article -
477
Semianalytical algorithms to study longitudinal beam instabilities in double rf systems
Published 2025-05-01“…In this paper, we provide semianalytical algorithms designed to predict and analyze these instabilities with improved accuracy and robustness. …”
Get full text
Article -
478
Data aggregation scheduling algorithm based on twice maximum independent set
Published 2014-01-01“…The main task in designing a data aggregation schedule was to get a good trade-off between QoS and weighted fairness guarantee.In order to address this problem,a novel data aggregation scheduling algorithm,MISS,was proposed,which could produce a collision-free TDMA schedule for data aggregation based on twice Maximum Independent Set (MIS).In the first phase,a tree structure based on MIS was constructed,and then it was adjusted according to the energy consumption forecast of each node,forming the balanced data aggregation tree.In the second phase,the approximate maximum weighted Independent set (WMIS) was utilized of all selected links to allocate time slots for each communication link.The results of simulation demonstrate that MISS not only improves the aggregation delay and lifetime of the network,but also gives weighted fairness guarantee.…”
Get full text
Article -
479
Scalable PBFT-like algorithm for trust management of degree/graduation certificates
Published 2024-09-01“…The algorithm was based on a hierarchical design using regional grouping, with a model consisting of main region and sub-region node clusters. …”
Get full text
Article -
480
Detecting DDoS attack based on compensation non-parameter CUSUM algorithm
Published 2008-01-01“…An effective DDoS attack detection method on target-end network was proposed.The main goal was to detect attack in early stages with few expenditure,and record the suspicious packets in the same time.For DDoS attacks which based on TCP,many unacknowledged segments will be observed in victim end.In every time period ? …”
Get full text
Article