Suggested Topics within your search.
Suggested Topics within your search.
-
641
Compress Digital Image based on Genetic Meta-Heuristic algorithm
Published 2013-07-01“…In this research a propose method has be used to compression Data of digital image based on one of Meta Heuristic Algorithm. …”
Get full text
Article -
642
Test case minimizing based on combination chaos genetic algorithm
Published 2016-06-01“…Test case minimizing is one of the most important research fields in software testing.Uniformly distributed Chebyshev and Logistic chaos sequence were introduced in the selection,crossover and mutation of genetic algorithm.Chaos disturbance was also added in genetic testing suite to address the common problems of weak ability in local search and premature convergence,thus to optimize the test result.Experiments were conducted in randomly generated test suites and Siemens test suites.Comparisons were also made with classical methods regard to the scale of production of test suite and the execution time of the algorithms.The results of the experiment indicate that based on the same execution time of the algorithms,a smaller scale test suite can be produced by introducing chaotic sequence in genetic testing suite selection.…”
Get full text
Article -
643
-
644
GNN-based optimization algorithm for joint user scheduling and beamforming
Published 2022-07-01“…The coordinated multi-point (CoMP) transmission technology has the characteristics of reducing co-channel interference and improving spectral efficiency.For the CoMP technology, user scheduling (US) and beamforming (BF) design are two fundamental research problems located in the media access control layer and the physical layer, respectively.Under the consideration of user service quality requirements, the joint user US-BF optimization problem was investigated with the goal of maximizing network throughput.To overcome the problem that the traditional optimization algorithm had high computational cost and couldn’t effectively utilize the network historical data information, a joint US and power allocation (M-JEEPON) model based on graph neural network was proposed to realize joint US-BF optimization by combining the beam vector analytical solution.The simulation results show that the proposed algorithm can achieve the performance matching or even better than traditional optimization algorithms with lower computational overhead.…”
Get full text
Article -
645
Genetic Algorithm Based Hybrid Fuzzy System for Assessing Morningness
Published 2014-01-01“…So, assessing them in crisp environments with their responses does not seem to be justifiable. Fuzzy approach based research works for assessing morningness of people are very few in the literature. …”
Get full text
Article -
646
Image Segmentation Based on New Modification on Normalized-Cut Algorithm
Published 2010-12-01Get full text
Article -
647
Music Genre Classification Algorithm Based on Multihead Attention Mechanism
Published 2022-01-01“…It can be seen from the experimental research that the music genre classification algorithm based on the multihead attention mechanism proposed in this paper has obvious advantages compared with the traditional algorithm, and it has a certain role in music genre classification.…”
Get full text
Article -
648
Multiobject Detection Algorithm Based on Adaptive Default Box Mechanism
Published 2020-01-01“…Aiming at the shortcomings of the SSD algorithm, an improved algorithm based on the adaptive default box mechanism (ADB) is proposed. …”
Get full text
Article -
649
A robust audio steganography algorithm based on differential evolution
Published 2021-11-01“…Audio steganography is to hide secret information into the audio carrier and has become a research hotspot in the field of information hiding.Most of the existing studies focus on minimizing distortion at the expense of steganography capacity, and it is often difficult for them to extract secret information correctly after some common signal processing attacks.Therefore, based on the spread spectrum technology, firstly, the relationship between steganography parameters (i.e., segmented scaling parameters and steganography capacity) and imperceptibility as well as robustness was analyzed.Next, a multi-objective optimization model of audio steganography was presented, in which segmented scaling parameters and steganography capacity were decision variables, imperceptibility and steganography capacity were optimization objectives, and the signal-to-noise ratio was a constraint.Then, a robust audio steganography algorithm based on differential evolution was proposed, including the corresponding encoding, fitness function, crossover and mutation operators.Finally, comparative experimental results show that the proposed steganography algorithm can achieve better robustness against common signal processing attacks on the premise of ensuring imperceptibility and anti-detection.…”
Get full text
Article -
650
Design and implementation of codec based on BCH error correction algorithm
Published 2022-05-01Get full text
Article -
651
Image encryption algorithm based on improved Clifford chaotic system
Published 2022-06-01Get full text
Article -
652
A quantum multiplier based on the quantum Fourier transform algorithm
Published 2022-03-01Get full text
Article -
653
Analyzing cryptographic algorithm efficiency with in graph-based encryption models
Published 2025-07-01“…This research paper investigates the efficiency of cryptographic algorithms within graph-based encryption models such as star graph, focusing on their computational performance and security robustness. …”
Get full text
Article -
654
Construction and Analysis of Macroeconomic Forecasting Model Based on Biclustering Algorithm
Published 2022-01-01“…The results of the class methods are compared. The research results show that the hierarchical clustering algorithm is relatively intuitive and easy to apply to the overall analysis of the national economic divisions. …”
Get full text
Article -
655
Sorting algorithm acceleration based on CPU-FPGA heterogeneous system
Published 2022-01-01Get full text
Article -
656
A high precision arctangent solution based on CORDIC algorithm
Published 2022-01-01Get full text
Article -
657
Microservice combination optimisation based on improved gray wolf algorithm
Published 2023-12-01“…Therefore, aiming to quantify the non-functional requirements of computing microservice systems, while solving the problem of latency in computing the best combination of services with the maximum QoS objective function value, this paper proposes a microservice combination approach based on the QoS model and a CGWO algorithm for optimisation computation for this model. …”
Get full text
Article -
658
Analysis of Brand Visual Design Based on Collaborative Filtering Algorithm
Published 2022-01-01“…Finally, the collaborative filtering algorithm is optimized to improve the consumer similarity based on the original algorithm. …”
Get full text
Article -
659
Internet Financial Risk Monitoring and Evaluation Based on GABP Algorithm
Published 2022-01-01Get full text
Article -
660
Algorithm of Estimating Import-Substitution Based on Costs – Output Tables
Published 2021-05-01“…The article studies problems and prospects of managerial decisions dealing with the process of import-substitution of certain products and puts forward the method of raising its efficiency. This research is based on costs – output tables, as a result of which a special algorithm is designed to estimate the efficiency and accompanying effects for different lines of import-substitution. …”
Get full text
Article