Showing 161 - 180 results of 5,420 for search 'may algorithm', query time: 0.10s Refine Results
  1. 161

    Research on the Multi-Armed Bandit Algorithm in Path Planning for Autonomous Vehicles by Li Jingyu

    Published 2025-01-01
    “…When applied to autonomous driving, the MAB algorithm may be able to demonstrate its advantages. …”
    Get full text
    Article
  2. 162

    Information Fusion-Based Storage and Retrieve Algorithms for WSNs in Disaster Scenarios by Zhe Xiao, Ming Huang, Jihong Shi, Wenwei Niu, Jingjing Yang

    Published 2011-10-01
    “…Sensor networks are especially useful in catastrophic or disaster scenarios such as abysmal sea, floods, fires, or earthquakes where human participation may be too dangerous. Storage technologies take a critical position for WSNs in such scenarios since the sensor nodes may themselves fail unpredictably, resulting in the loss of valuable data. …”
    Get full text
    Article
  3. 163

    Genetic Algorithm Optimization for Determining Fuzzy Measures from Fuzzy Data by Chen Li, Gong Zeng-tai, Duan Gang

    Published 2013-01-01
    “…Though there have existed some methodologies for solving this problem, such as genetic algorithms, gradient descent algorithms, neural networks, and particle swarm algorithm, it is hard to say which one is more appropriate and more feasible. …”
    Get full text
    Article
  4. 164

    Friendship links-based privacy-preserving algorithm against inference attacks by Jiawei Shen, Junfeng Tian, Ziyuan Wang, Hongyun Cai

    Published 2022-11-01
    “…Directly publishing the original data of social networks may compromise personal privacy because social relationship data contain sensitive information about users. …”
    Get full text
    Article
  5. 165

    Comparison of algorithms for multi-objective optimization of radio technical device characteristics by A. V. Smirnov

    Published 2022-12-01
    “…The GDE3 algorithm may be recommended as a basic method for solving the considered problems. …”
    Get full text
    Article
  6. 166

    Analysis and Research on Spectrogram-Based Emotional Speech Signal Augmentation Algorithm by Huawei Tao, Sixian Li, Xuemei Wang, Binkun Liu, Shuailong Zheng

    Published 2025-06-01
    “…Inappropriate augmentation algorithms may distort emotional labels, thereby reducing the performance of models. …”
    Get full text
    Article
  7. 167

    An Consistent Routing Policy Based on Ant Algorithm in Software Defined Networking by Yuwei Wang, Julong Lan, Xiaoqiang Xi, Ximian Fan, Yiming Jiang

    Published 2015-11-01
    “…Software defined networking updated data through distributing flow table to switches.But the installation of flow table had delay and may lead to wrong forwarding.An consistent routing policy based on ant algorithm was proposed.The inconsistent delay was introduced in routing parameter.The sequence of flow setup was adjusted through the controller,so as to avoid the inconsistency of the control logic in switches.Results show that,compared with Dijstra algorithm,when the inconsistency problem happens,the proposed policy has less actual delay and the packet lost rate and the wrong forwarding rate have been increasinglydecreased.…”
    Get full text
    Article
  8. 168

    Design Secured Smart Door Lock Based on Jaro Winkler Algorithm by Sura Mahmood Abdullah

    Published 2023-02-01
    “…The main purpose of design smart door lock, using Jaro Winkler algorithm is to compare the registered password security with each entered password which may contain some wrong or swapped characters. …”
    Get full text
    Article
  9. 169

    Target counting algorithm via local signal recovery in sensor networks by Wen-tao JIANG, Li-min SUN, Jun-wei LV, Hong-song ZHU

    Published 2012-09-01
    “…In view of the deficiencies of existing targets counting algorithms in sensor networks,a local signal recovery based target counting algorithm(LSR)was proposed.LSR firstly searched for the possible local area where targets may exist,and then established a local signal recover model according to signal attenuation characteristic and nodes' distribu-tion.Finally,LSR sought the best target distribution estimation in each possible local area through the established model and obtained the target counting result by summarizing the estimations.Simulation results demonstrate that LSR pos-sesses good merits in counting precision,noise tolerance and energy consumption.…”
    Get full text
    Article
  10. 170

    Trust-Based Cooperative Spectrum Sensing Algorithm in Power Dedicated Network by Jinping Cao, Wei Li, Yiying Zhang

    Published 2015-03-01
    “…To fulfill the communication needs of smart distribution and utilization system,a novel power dedicated network has been developed.The system faces a problem that it may operate coexisted with a 230 data transceiver system.In order to keep the two systems operating stably and efficiently at the same time,a trust-based cooperative spectrum sensing algorithm was presented.According to the characteristics of user behavior,cognitive radio users were classified into fiduciary users,lapsed users and malicious users.By analyzing the relationship among detection result,credibility of cognitive radio users and communication channel signal-to-noise ratio,the credibility weight of cognitive radio users was given,and a trust-based cooperative spectrum sensing algorithm was proposed.The simulation results show that the algorithm improves detection performance effectively.…”
    Get full text
    Article
  11. 171

    Trust-Based Cooperative Spectrum Sensing Algorithm in Power Dedicated Network by Jinping Cao, Wei Li, Yiying Zhang

    Published 2015-03-01
    “…To fulfill the communication needs of smart distribution and utilization system,a novel power dedicated network has been developed.The system faces a problem that it may operate coexisted with a 230 data transceiver system.In order to keep the two systems operating stably and efficiently at the same time,a trust-based cooperative spectrum sensing algorithm was presented.According to the characteristics of user behavior,cognitive radio users were classified into fiduciary users,lapsed users and malicious users.By analyzing the relationship among detection result,credibility of cognitive radio users and communication channel signal-to-noise ratio,the credibility weight of cognitive radio users was given,and a trust-based cooperative spectrum sensing algorithm was proposed.The simulation results show that the algorithm improves detection performance effectively.…”
    Get full text
    Article
  12. 172

    A recommender algorithm based on SVD ++model under trust network by Peiwu CHEN, Fangxing SHU

    Published 2021-07-01
    “…Recommender algorithms are usually modeled based on user behavior data.However, the sparseness of explicit behavior data may cause the cold start problem of recommender algorithms.In order to solve the impact of data sparseness and cold-start problems on the effect of recommender algorithms, implicit trust relationship based on user similarity was introduced based on the existing revealed trust relationship, and a new recommender algorithm was designed through the SVD++ implicit semantic model.In order to improve the effect of the algorithm, the neighborhood model was integrated further, and the algorithm score prediction formula and loss function were derived.In the Epinions open source data set, RMSE and MAE were used as test indicators, and comparative experiments were conducted on the entire user set and the cold start user set.The experimental results show that the recommender algorithm can optimize the cold start problem of the original recommender algorithm to a certain extent, and achieve a better rating prediction accuracy.…”
    Get full text
    Article
  13. 173

    Algorithm based on randomly assigning filters to reduce PAPR in GFDM system by Miao ZHANG, Xianzhong XIE, Lei WU, Weijia LEI

    Published 2016-09-01
    “…As an alternative of the fifth generation mobile communication system waveforms,generalized frequency division multiplexing(GFDM)which has more advantages over OFDM has been trusted into the limelight.Nevertheless,GFDM still suffers from a high peak to average power ratio(PAPR).Considering that different filters have their own phase-frequency characteristics,a new algorithm based on randomly assigning filters to reduce PAPR in GFDM(RAF-GFDM)was proposed.According to the feature of GFDM system that the filter structure could be selected flexibly,different filters were assigned to subcarriers randomly to adjust the phase congruency due to signals superimposition.Additionally,this method can suppress PAPR effectively without causing signal distortion.Theoretical analysis and simulation results demonstrate that the proposed algorithm does not bring additional calculation costs while reducing PAPR and almost has no effect on the bit error rate(BER),and it may provide a higher application value.…”
    Get full text
    Article
  14. 174

    Collaborative Filtering Recommendation Algorithm for MOOC Resources Based on Deep Learning by Lili Wu

    Published 2021-01-01
    “…In view of the poor recommendation performance of traditional resource collaborative filtering recommendation algorithms, this article proposes a collaborative filtering recommendation model based on deep learning for art and MOOC resources. …”
    Get full text
    Article
  15. 175

    Workflow for effective integration of community detection algorithms in brain network analysis by Flavio Averhoff, Vladimir Aristov, Ivan Stepanyan, Chen Yunwei, Jorge Gulín González

    Published 2025-07-01
    “…High modularity values were achieved, and validation tests confirmed the robustness of the algorithm used in the analysis. This study advances our understanding of brain architecture and has significant clinical implications by identifying altered connectivity patterns, which may improve the diagnosis and treatment of neurological and psychiatric conditions.…”
    Get full text
    Article
  16. 176

    Contention graph based concurrent scheduling algorithm in millimeter wave WPAN by Yibing WANG, Yong NIU, Weiguang DING, Hao WU

    Published 2019-01-01
    “…The directional antennas and beamforming techniques in millimeter wave (mmWave) bands are used to make concurrent transmission between multiple flows become possible.However,higher mutual interference may be caused by concurrent transmission.Therefore,when the time slots were limited and the number of data flows was large,how to schedule the concurrent flows efficiently was solved by proposed algorithm.The contention graph based spatial-time division multiple access (CB-STDMA) concurrent scheduling algorithm guaranteed the quality of service (QoS) of users,and aimed at maximizing the number of flows with their QoS requirements satisfied.It considered the interference between different flows,and a higher priority was given to the flow with fewer time slots requirement.Extensive simulations demonstrated that the proposed CB-STDMA algorithm increased the number of flows with their QoS requirements satisfied and the network throughput by 50% and 20% respectively compared with the existing algorithms.…”
    Get full text
    Article
  17. 177

    Contention graph based concurrent scheduling algorithm in millimeter wave WPAN by Yibing WANG, Yong NIU, Weiguang DING, Hao WU

    Published 2019-01-01
    “…The directional antennas and beamforming techniques in millimeter wave (mmWave) bands are used to make concurrent transmission between multiple flows become possible.However,higher mutual interference may be caused by concurrent transmission.Therefore,when the time slots were limited and the number of data flows was large,how to schedule the concurrent flows efficiently was solved by proposed algorithm.The contention graph based spatial-time division multiple access (CB-STDMA) concurrent scheduling algorithm guaranteed the quality of service (QoS) of users,and aimed at maximizing the number of flows with their QoS requirements satisfied.It considered the interference between different flows,and a higher priority was given to the flow with fewer time slots requirement.Extensive simulations demonstrated that the proposed CB-STDMA algorithm increased the number of flows with their QoS requirements satisfied and the network throughput by 50% and 20% respectively compared with the existing algorithms.…”
    Get full text
    Article
  18. 178

    A Novel Algorithm for Imbalance Data Classification Based on Neighborhood Hypergraph by Feng Hu, Xiao Liu, Jin Dai, Hong Yu

    Published 2014-01-01
    “…But more efficient methods are needed still. Hypergraph may not be powerful enough to deal with the data in boundary region, although it is an efficient tool to knowledge discovery. …”
    Get full text
    Article
  19. 179

    Joint scheduling algorithm for correlative tasks in multi-access edge computing by Weifeng LU, Ning LI, Jia XU, Lijie XU, Jian XU

    Published 2023-04-01
    “…Multi-access edge computing (MEC) has emerged as a promising computing paradigm for resource-intensive applications.However, most of the previous research work has not considered correlative tasks, which may lead to infeasible scheduling decisions.Considering that some tasks on the application must be completed locally and another non-negligible energy consumption problem in the multi-access edge computing offloading scenario, the joint scheduling algorithm of correlative tasks on the local and edge sides was studied.The problem was formalized as minimizing the energy consumption in the system while satisfying the application’s completion deadline constraints, and the joint scheduling (JS) algorithm was proposed to solve the problem.Finally, the performance of the JS algorithm in the application completion rate and system energy consumption were analyzed through simulation experiments.The simulation results show that the JS algorithm is superior to other comparison algorithms in the application completion rate and can save at least 43% of the system energy consumption.…”
    Get full text
    Article
  20. 180