-
301
Cognitive Radio Transceivers: RF, Spectrum Sensing, and Learning Algorithms Review
Published 2014-01-01“…Sophisticated spectrum sensing algorithms that overcome main sensing challenges such as model uncertainty, hardware impairments, and wideband sensing are highlighted. …”
Get full text
Article -
302
Review of One-Stage Universal Object Detection Algorithms in Deep Learning
Published 2025-05-01“…The general object detection algorithms under deep learning are mainly divided into one-stage object detection and two-stage object detection. …”
Get full text
Article -
303
-
304
Visual System Inspired Algorithm for Enhanced Visibility in Coronary Angiograms (VIAEVCA)
Published 2025-01-01“…We propose a novel visibility enhancement algorithm, whose main body is inspired by a line completion mechanism of the visual system, i.e., lateral interactions. …”
Get full text
Article -
305
Research and implementation of mobile DPI association algorithm with big data technology
Published 2017-12-01Get full text
Article -
306
Research and implementation of mobile DPI association algorithm with big data technology
Published 2017-12-01Get full text
Article -
307
Application of the spectral bisection algorithm for the analysis of criminal communities in social networks
Published 2024-07-01“…The purpose of the study is to substantiate the use of one of the graph separation methods – the spectral bisection algorithm for the analysis of social networks, as well as to evaluate the possibilities of software implementation of this algorithm during the collection of evidence-based information in the investigation of crimes committed using information and telecommunications technologies.Method. …”
Get full text
Article -
308
ALGORITHMS FOR IDENTIFICATION OF CUES WITH AUTHORS’ TEXT INSERTIONS IN BELARUSIAN ELECTRONIC BOOKS
Published 2016-10-01“…The main stages of algorithms for characters’ gender identification in Belarusian electronic texts are described. …”
Get full text
Article -
309
A Novel Acceleration Estimation Algorithm Based on Least Square Method
Published 2018-01-01Get full text
Article -
310
Seismic Inversion Problem Using a Multioperator Whale Optimization Algorithm
Published 2022-01-01“…The whale optimization algorithm (WOA) is a metaheuristic algorithm based on swarm intelligence and it mimics the hunting behavior of whales. …”
Get full text
Article -
311
Wireless sensor indoor positioning based on an improved particle filter algorithm
Published 2020-02-01“…Positioning by wireless sensor network is one of its main functions and has been widely used in many fields. …”
Get full text
Article -
312
Novel virtual topology configuration algorithm for IP over WDM network
Published 2007-01-01“…The load balancing for the whole network was chosen as the optimal objective and a novel virtual topology configuration algorithm was proposed.In the proposed algorithm,the load distribution variance was chosen as a key criterion for judging the load balancing.And the definition and the computing method of the load distribution variance were introduced.In addition,the blocking probability was chosen as the main performance parameter for comparing with other algorithms.In the optical layer,the algorithm proposed was compared with the routing with load balancing heuristics(RLBH) algorithm.Similarly,in IP layer,the algorithm was compared with the fixed-path least-congestion(FPLC) algorithm.Moreover,the numerical results of the algorithm comparison were shown and discussed.The simulation results show that the performance of the algorithm is better than RLBH algorithm and FPLC algorithm on the blocking probability.…”
Get full text
Article -
313
Electronic Controller Automatic Test System Based on Intelligent Control Algorithm
Published 2022-01-01“…In order to improve the automatic test effect of the electronic controller, this paper combines the intelligent control algorithm to construct the automatic test system of the electronic controller. …”
Get full text
Article -
314
A Simplified Hypervolume-Based Evolutionary Algorithm for Many-Objective Optimization
Published 2020-01-01“…Evolutionary algorithms based on hypervolume have demonstrated good performance for solving many-objective optimization problems. …”
Get full text
Article -
315
Traffic identification of network business based on multi-layer cascade algorithm
Published 2015-12-01“…The contradiction between traffic demand and network bandwidth is the main problem of the current network.Traffic management is one of the effective solutions,at the same time it can improve the quality of service of the network,and network traffic identification is the basis of fine traffic management.The traffic identification method of network business based on multi-layer cascade algorithm was proposed,after the research of network traffic identification and machine learning techniques.This method can adapt to the situation of the complex network traffic flow,and can balance the contradiction between the time performance and the accuracy of the machine learning algorithm.Furthermore the cascade algorithm of this method takes the cost imbalance into account,and takes more attention to the identification of important business,so it can help enhance user experience.…”
Get full text
Article -
316
Semianalytical algorithms to study longitudinal beam instabilities in double rf systems
Published 2025-05-01“…In this paper, we provide semianalytical algorithms designed to predict and analyze these instabilities with improved accuracy and robustness. …”
Get full text
Article -
317
Data aggregation scheduling algorithm based on twice maximum independent set
Published 2014-01-01“…The main task in designing a data aggregation schedule was to get a good trade-off between QoS and weighted fairness guarantee.In order to address this problem,a novel data aggregation scheduling algorithm,MISS,was proposed,which could produce a collision-free TDMA schedule for data aggregation based on twice Maximum Independent Set (MIS).In the first phase,a tree structure based on MIS was constructed,and then it was adjusted according to the energy consumption forecast of each node,forming the balanced data aggregation tree.In the second phase,the approximate maximum weighted Independent set (WMIS) was utilized of all selected links to allocate time slots for each communication link.The results of simulation demonstrate that MISS not only improves the aggregation delay and lifetime of the network,but also gives weighted fairness guarantee.…”
Get full text
Article -
318
Scalable PBFT-like algorithm for trust management of degree/graduation certificates
Published 2024-09-01“…The algorithm was based on a hierarchical design using regional grouping, with a model consisting of main region and sub-region node clusters. …”
Get full text
Article -
319
Detecting DDoS attack based on compensation non-parameter CUSUM algorithm
Published 2008-01-01“…An effective DDoS attack detection method on target-end network was proposed.The main goal was to detect attack in early stages with few expenditure,and record the suspicious packets in the same time.For DDoS attacks which based on TCP,many unacknowledged segments will be observed in victim end.In every time period ? …”
Get full text
Article -
320
Analysis Algorithm of Biomedical Signals in Remote Monitoring Systems of Human Health
Published 2023-03-01“…At the first stage, the main indicators (heart rate and human fall signal) are monitored. …”
Get full text
Article