Search alternatives:
many » may (Expand Search)
Showing 581 - 600 results of 4,135 for search 'many algorithm', query time: 0.13s Refine Results
  1. 581

    Research on Reliability-Oriented Data Fusaggregation Algorithm in Large-Scale Probabilistic Wireless Sensor Networks by Hai-xia Peng, Hai Zhao, Da-zhou Li, Shuai-zong Si, Wei Cai

    Published 2014-05-01
    “…A lot of facts show that many researches just place emphasis on data aggregation or data fusion, which is not beneficial to analyze the sensed data thoroughly and will lead to the aggregation results' not being used fully; worse yet, the actual networks are always existed with lossy links; many now available aggregation algorithms are based on ideal network models and not any further analysis and fusion about aggregation results are done. …”
    Get full text
    Article
  2. 582
  3. 583
  4. 584

    QoS-aware enhanced proportional faire scheduling algorithm for real-time services in LTE networks by Mahnaz Sotoudeh Bahreyni, Vahid Sattari-Naeini

    Published 2023-06-01
    “…The new generation of wireless networks (LTE advance and WIMAX) supports many services that consume many resources (such as VOIP, video conference …). …”
    Get full text
    Article
  5. 585

    Vehicle Collision Warning Based on Combination of the YOLO Algorithm and the Kalman Filter in the Driving Assistance System by Guihua Miao, Weihe Wang, Jinjun Tang, Fang Li, Yunyi Liang

    Published 2025-01-01
    “…This study applies the YOLO algorithm to detect the vehicle and uses the Kalman filter to track the vehicle. …”
    Get full text
    Article
  6. 586

    Model Selection and Parameter Estimation for an Improved Approximate Bayesian Computation Sequential Monte Carlo Algorithm by Yue Deng, Yongzhen Pei, Changguo Li, Bin Zhu

    Published 2022-01-01
    “…Model selection and parameter estimation are very important in many fields. However, the existing methods have many problems, such as low efficiency in model selection and inaccuracy in parameter estimation. …”
    Get full text
    Article
  7. 587

    Optimizing Blockchain Network Performance Using Blake3 Hash Function in POS Consensus Algorithm by Zainab Abdullah Jasim, Ameer Kadhim Hadi

    Published 2025-01-01
    “…This study introduces a revolutionary change to the Proof-of-Stake (POS) consensus methods by suggesting the replacement of the commonly used SHA256 hash function with the extremely efficient Blake3. Many blockchain-based systems, including POS algorithms, still employ the widely used SHA256 algorithm for cryptographic hashing. …”
    Get full text
    Article
  8. 588
  9. 589

    NIRS identification of cashmere and wool fibers based on spare representation and improved AdaBoost algorithm by Zhu Yaolin, Li Zheng, Chen Xin, Chen Jinni, Zhang Hongsong

    Published 2025-07-01
    “…It optimizes these weights with many decision tree (DT) classifiers. It then uses the sparrow optimization algorithm. …”
    Get full text
    Article
  10. 590

    NMCT: A Novel Monte Carlo-Based Tracking Algorithm Using Potential Proximity Information by Qiang Niu, Tian Huan, Pengpeng Chen

    Published 2016-02-01
    “…Currently, many services benefit greatly from the availability of accurate tracking. …”
    Get full text
    Article
  11. 591

    Diagnostic and treatment algorithm for anaphylactic shock of the Self-regulatory organization of the “National board of phlebologists” Association by article Editorial

    Published 2021-06-01
    “…Many phlebologists today work in ambulatory settings, using both local anesthetics and sclerosants. …”
    Get full text
    Article
  12. 592
  13. 593

    Low-complexity likelihood probability derivation algorithm for non-binary LDPC-coded modulation system by Guang-hua HE, Bao-ming BAI, Xiao MA, Bing LI

    Published 2013-09-01
    “…The derivation of likelihood probabilities which are sent into the decoder in many LDPC-coded modulation systems is a challenging task especially when high-order modulations are used.This is because likelihood probabilities are usually complicated functions of the channel output and their calculation also requires knowledge of the channel parameters.To this end,a low-complexity likelihood probability derivation algorithm was proposed.Also,the Euclidean distance between the received signal and the constellation points was considered to divide the constellation points into two signal sets.Simulation results show that the proposed algorithm provides good trade-offs between performance and complexity,making it a good candidate for the hardware implementation of the front-end in the non-binary LDPC decoders.…”
    Get full text
    Article
  14. 594

    Brazilian exports imputation: A new algorithm for estimating the municipal production directed at the foreign market by Alan Leal, Michelle Marcia Viana Martins

    Published 2025-05-01
    “… This paper aims to present a new algorithm to estimate Brazilian municipalities exports at the HS6 level. …”
    Get full text
    Article
  15. 595
  16. 596

    Research on DV-Hop location algorithm based on range correction and improved gray wolf optimizer by Xiaoqiang ZHAO, Shuai WU, Chuanyi GAO, Ning LI, Bodong LI, Xiaoyong YANG

    Published 2021-12-01
    “…Node location is an important problem in wireless sensor network.Although the location algorithm based on distance measurement has small positioning error, it has many limitations when applied to outdoor environments.Therefore, based on the original distance vector-hop (DV-Hop) algorithm, received signal strength indication (RSSI) technology and the minimum mean square error (MMSE) criterion to modify the algorithm’s ranging process were introduced, and the improved gray wolf optimizer was used to optimize the process of determining the coordinates of unknown nodes.Simulation results show that, compared with the original DV-Hop algorithm and IPDV-Hop algorithm, the average location error rate of the IGDV-Hop algorithm under the initial parameters was reduced by 28% and 17% respectively, and the location effect was significantly improved.…”
    Get full text
    Article
  17. 597

    A Distributed Weighted Possibilistic c-Means Algorithm for Clustering Incomplete Big Sensor Data by Qingchen Zhang, Zhikui Chen

    Published 2014-05-01
    “…Possibilistic c-means clustering algorithm (PCM) has emerged as an important technique for pattern recognition and data analysis. …”
    Get full text
    Article
  18. 598

    Relaxed Iterative Algorithms for Generalized Mixed Equilibrium Problems with Constraints of Variational Inequalities and Variational Inclusions by Lu-Chuan Ceng, Chi-Ming Chen, Ching-Feng Wen, Chin-Tzong Pang

    Published 2014-01-01
    “…We introduce and analyze a relaxed extragradient-like viscosity iterative algorithm for finding a solution of a generalized mixed equilibrium problem with constraints of several problems: a finite family of variational inequalities for inverse strongly monotone mappings, a finite family of variational inclusions for maximal monotone and inverse strongly monotone mappings, and a fixed point problem of infinitely many nonexpansive mappings in a real Hilbert space. …”
    Get full text
    Article
  19. 599

    Iterative Algorithms for Systems of Generalized Equilibrium Problems with the Constraints of Variational Inclusion and Fixed Point Problems by Lu-Chuan Ceng, Abdul Latif, Abdullah E. Al-Mazrooei

    Published 2014-01-01
    “…We introduce and analyze a hybrid extragradient-like viscosity iterative algorithm for finding a common solution of a systems of generalized equilibrium problems and a generalized mixed equilibrium problem with the constraints of two problems: a finite family of variational inclusions for maximal monotone and inverse strongly monotone mappings and a fixed point problem of infinitely many nonexpansive mappings in a real Hilbert space. …”
    Get full text
    Article
  20. 600

    An Algorithm of Traffic Perception of DDoS Attacks against SOA Based on Time United Conditional Entropy by Yuntao Zhao, Hengchi Liu, Yongxin Feng

    Published 2016-01-01
    “…The algorithm is provided with perception ability of DDoS attacks on SOA services by introducing time dimension. …”
    Get full text
    Article