-
281
Application of DBN deep learning algorithm in anti stealing electricity system
Published 2019-02-01“…With the development of economy,the electric power demand increases gradually,but because of the relative backwardness in the automation of electricity,the phenomenon of electric stealing is common.But the traditional anti electric stealing means generally centered around how to strengthen the technical transformation of the electric energy metering device,and the management efficiency is low.The purpose of deep learning is to use the method of constructing the multi-layer neural network model.To learn the potential features of image,text,voice and other data,it also has good effect on the classification problem.The successful application of the deep learning algorithm in many complex fields provides a new effective way to solve the problem of anti stealing electricity.The structure and learning algorithm of DBN and the anti-stealing model based on DBN algorithm was mainly introduced.Finally,experiments were carried out and the results were analyzed.…”
Get full text
Article -
282
Multimedia Vision Improvement and Simulation in Consideration of Virtual Reality Reconstruction Algorithms
Published 2022-01-01“…Due to the large noise and many discrete points of the image in the traditional image reconstruction process, the reconstruction quality of the image deviates greatly from the actual target. …”
Get full text
Article -
283
Optimal Layout of Sensors on Wind Turbine Blade Based on Combinational Algorithm
Published 2016-02-01“…This algorithm integrates the advantages of kinetic energy method, effective independence method, modal assurance criterion (MAC), and many other optimal methods. …”
Get full text
Article -
284
Improved ant colony optimization algorithm for solving constraint satisfaction problem
Published 2015-05-01“…The traditional backtracking algorithm was less efficient on solving large-scale constraint satisfaction problem,and more difficult to be solved within a reasonable time.In order to overcome this problem,many incompleteness algo-rithms based on heuristic search have been proposed.Two improvements based on ant colony optimization meta-heuristic constraint solving algorithm were presented:First,arc consistency checks was done to preprocess before exploring the search space,Second,a new parameter setting scheme was proposed for ant colony optimization to improve the effi-ciency of the search.Finally,the improved algorithm is applied to solve random problems and combinatorial optimization problems.The results of the experiment have showed its superiority.…”
Get full text
Article -
285
An Implementable First-Order Primal-Dual Algorithm for Structured Convex Optimization
Published 2014-01-01“…Many application problems of practical interest can be posed as structured convex optimization models. …”
Get full text
Article -
286
Heterogeneous Resource Allocation Algorithm for Ad Hoc Networks with Utility Fairness
Published 2015-01-01“…In this paper, a novel heterogeneous resource allocation algorithm (HRA) is presented for ad hoc networks, supporting both elastic and inelastic traffic. …”
Get full text
Article -
287
A Mahalanobis Hyperellipsoidal Learning Machine Class Incremental Learning Algorithm
Published 2014-01-01“…A Mahalanobis hyperellipsoidal learning machine class incremental learning algorithm is proposed. To each class sample, the hyperellipsoidal that encloses as many as possible and pushes the outlier samples away is trained in the feature space. …”
Get full text
Article -
288
PREDICTION OF TELECOM SERVICES CONSUMERS CHURN BY USING MACHINE LEARNING ALGORITHMS
Published 2022-11-01“…Machine learning is gaining importance in many different areas of the economy. One of those areas is the prediction and prevention of consumer churn. …”
Get full text
Article -
289
PREDICTION OF TELECOM SERVICES CONSUMERS CHURN BY USING MACHINE LEARNING ALGORITHMS
Published 2022-11-01“…Machine learning is gaining importance in many different areas of the economy. One of those areas is the prediction and prevention of consumer churn. …”
Get full text
Article -
290
Personalization in Mobile Activity Recognition System Using -Medoids Clustering Algorithm
Published 2013-07-01“…Nowadays mobile activity recognition (AR) has been creating great potentials in many applications including mobile healthcare and context-aware systems. …”
Get full text
Article -
291
Detecting DDoS attack based on compensation non-parameter CUSUM algorithm
Published 2008-01-01“…t,calculated the ratio of the number of unacknowledged segments and the number of all segments.Then,the statistical sequence based on time came into being.After that,an improved non-parameter recursive CUSUM algorithm was used to detect attack effi-ciently on line.In this procedure,the suspicious packets were also recorded.Experiments prove that this algorithm is fast and efficient.It has low false-positive rate and could adapt to more complex network environments.In addition,it is helpful to attack analysis and tracing.…”
Get full text
Article -
292
Newton-Krylov Type Algorithm for Solving Nonlinear Least Squares Problems
Published 2009-01-01“…The minimization of a quadratic function within an ellipsoidal trust region is an important subproblem for many nonlinear programming algorithms. When the number of variables is large, one of the most widely used strategies is to project the original problem into a small dimensional subspace. …”
Get full text
Article -
293
Application of the Artificial Bee Colony Algorithm for Solving the Set Covering Problem
Published 2014-01-01“…Here, we present a novel application of the artificial bee colony algorithm to solve the non-unicost set covering problem. …”
Get full text
Article -
294
Methods and Algorithms for Flexible Job Shop Scheduling − A State of the Art
Published 2025-06-01“…The Job Shop Scheduling Problem (JSSP) attracts many researchers due to its combinatorial nature and its discovery in numerous practical applications. …”
Get full text
Article -
295
Designing an algorithm to detect depression in users: A quantitative correlational study.
Published 2021-08-01Get full text
Article -
296
Deduplication algorithm based on condensed nearest neighbor rule for deduplication metadata
Published 2015-08-01“…Building effective deduplication index in the memory could reduce disk access times and enhance chunk fingerprint lookup speed,which was a big challenge for deduplication algorithms in massive data environments.As deduplication data set had many samples with high similarity,a deduplication algorithm based on condensed nearest neighbor rule,which was called Dedup<sup>2</sup>,was proposed.Dedup<sup>2</sup>uses clustering algorithm to divide the original deduplication metadata into several categories.According to these categories,it employs condensed nearest neighbor rule to remove the highest similar data in the deduplication metadata.After that it can get the subset of deduplication metadata.Based on this subset,new data objects will be deduplicated based on the principle of data similarity.The results of experiments show that Dedup<sup>2</sup>can reduce the size of deduplication data set more than 50% effectively while maintain similar deduplication ratio.…”
Get full text
Article -
297
A Novel Image Mosaicking Algorithm for Wireless Multimedia Sensor Networks
Published 2013-10-01“…After the image registration, the adaptive weighted average algorithm is proposed to do the image fusion. The simulation experiments show that compared with homogeneous algorithms, the IMBPW algorithm has higher real-time and fast convergence speed. …”
Get full text
Article -
298
CSI feedback algorithm based on deep unfolding for massive MIMO systems
Published 2022-12-01“…In order to solve the problem that the channel state information (CSI) feedback algorithm based on deep learning in massive MIMO systems at present had too many parameters to be trained and could not be explained well, two CSI feedback algorithms based on depth expansion were proposed.The first one was approximate message delivery (AMP) algorithm based on learnable parameters.The learnable parameters in deep learning were used to replace the threshold value of the threshold function in the AMP algorithm and the parameters of the Onsage correction term.The nonlinear ability of threshold function in dealing with non-strict sparse data was enhanced.The other was the AMP algorithm based on convolutional network, which replaced the threshold function module with the convolutional residual learning module, and used the module to remove the Gaussian random noise generated by each iteration of the AMP algorithm.Simulation results show that the proposed two algorithms have better CSI feedback performance than AMP algorithm, and the AMP algorithm based on convolutional network has better CSI reconstruction performance than the representative method based on deep learning.…”
Get full text
Article -
299
Deduplication algorithm based on condensed nearest neighbor rule for deduplication metadata
Published 2015-08-01“…Building effective deduplication index in the memory could reduce disk access times and enhance chunk fingerprint lookup speed,which was a big challenge for deduplication algorithms in massive data environments.As deduplication data set had many samples with high similarity,a deduplication algorithm based on condensed nearest neighbor rule,which was called Dedup<sup>2</sup>,was proposed.Dedup<sup>2</sup>uses clustering algorithm to divide the original deduplication metadata into several categories.According to these categories,it employs condensed nearest neighbor rule to remove the highest similar data in the deduplication metadata.After that it can get the subset of deduplication metadata.Based on this subset,new data objects will be deduplicated based on the principle of data similarity.The results of experiments show that Dedup<sup>2</sup>can reduce the size of deduplication data set more than 50% effectively while maintain similar deduplication ratio.…”
Get full text
Article -
300
Optimization of Consignment-Store-Based Supply Chain with Black Hole Algorithm
Published 2017-01-01“…Next, an enhanced black hole algorithm dealing with multiobjective supply chain model is presented. …”
Get full text
Article