-
161
Research on the Multi-Armed Bandit Algorithm in Path Planning for Autonomous Vehicles
Published 2025-01-01“…When applied to autonomous driving, the MAB algorithm may be able to demonstrate its advantages. …”
Get full text
Article -
162
Information Fusion-Based Storage and Retrieve Algorithms for WSNs in Disaster Scenarios
Published 2011-10-01“…Sensor networks are especially useful in catastrophic or disaster scenarios such as abysmal sea, floods, fires, or earthquakes where human participation may be too dangerous. Storage technologies take a critical position for WSNs in such scenarios since the sensor nodes may themselves fail unpredictably, resulting in the loss of valuable data. …”
Get full text
Article -
163
Genetic Algorithm Optimization for Determining Fuzzy Measures from Fuzzy Data
Published 2013-01-01“…Though there have existed some methodologies for solving this problem, such as genetic algorithms, gradient descent algorithms, neural networks, and particle swarm algorithm, it is hard to say which one is more appropriate and more feasible. …”
Get full text
Article -
164
Friendship links-based privacy-preserving algorithm against inference attacks
Published 2022-11-01“…Directly publishing the original data of social networks may compromise personal privacy because social relationship data contain sensitive information about users. …”
Get full text
Article -
165
Comparison of algorithms for multi-objective optimization of radio technical device characteristics
Published 2022-12-01“…The GDE3 algorithm may be recommended as a basic method for solving the considered problems. …”
Get full text
Article -
166
Analysis and Research on Spectrogram-Based Emotional Speech Signal Augmentation Algorithm
Published 2025-06-01“…Inappropriate augmentation algorithms may distort emotional labels, thereby reducing the performance of models. …”
Get full text
Article -
167
An Consistent Routing Policy Based on Ant Algorithm in Software Defined Networking
Published 2015-11-01“…Software defined networking updated data through distributing flow table to switches.But the installation of flow table had delay and may lead to wrong forwarding.An consistent routing policy based on ant algorithm was proposed.The inconsistent delay was introduced in routing parameter.The sequence of flow setup was adjusted through the controller,so as to avoid the inconsistency of the control logic in switches.Results show that,compared with Dijstra algorithm,when the inconsistency problem happens,the proposed policy has less actual delay and the packet lost rate and the wrong forwarding rate have been increasinglydecreased.…”
Get full text
Article -
168
Design Secured Smart Door Lock Based on Jaro Winkler Algorithm
Published 2023-02-01“…The main purpose of design smart door lock, using Jaro Winkler algorithm is to compare the registered password security with each entered password which may contain some wrong or swapped characters. …”
Get full text
Article -
169
Target counting algorithm via local signal recovery in sensor networks
Published 2012-09-01“…In view of the deficiencies of existing targets counting algorithms in sensor networks,a local signal recovery based target counting algorithm(LSR)was proposed.LSR firstly searched for the possible local area where targets may exist,and then established a local signal recover model according to signal attenuation characteristic and nodes' distribu-tion.Finally,LSR sought the best target distribution estimation in each possible local area through the established model and obtained the target counting result by summarizing the estimations.Simulation results demonstrate that LSR pos-sesses good merits in counting precision,noise tolerance and energy consumption.…”
Get full text
Article -
170
Trust-Based Cooperative Spectrum Sensing Algorithm in Power Dedicated Network
Published 2015-03-01“…To fulfill the communication needs of smart distribution and utilization system,a novel power dedicated network has been developed.The system faces a problem that it may operate coexisted with a 230 data transceiver system.In order to keep the two systems operating stably and efficiently at the same time,a trust-based cooperative spectrum sensing algorithm was presented.According to the characteristics of user behavior,cognitive radio users were classified into fiduciary users,lapsed users and malicious users.By analyzing the relationship among detection result,credibility of cognitive radio users and communication channel signal-to-noise ratio,the credibility weight of cognitive radio users was given,and a trust-based cooperative spectrum sensing algorithm was proposed.The simulation results show that the algorithm improves detection performance effectively.…”
Get full text
Article -
171
Trust-Based Cooperative Spectrum Sensing Algorithm in Power Dedicated Network
Published 2015-03-01“…To fulfill the communication needs of smart distribution and utilization system,a novel power dedicated network has been developed.The system faces a problem that it may operate coexisted with a 230 data transceiver system.In order to keep the two systems operating stably and efficiently at the same time,a trust-based cooperative spectrum sensing algorithm was presented.According to the characteristics of user behavior,cognitive radio users were classified into fiduciary users,lapsed users and malicious users.By analyzing the relationship among detection result,credibility of cognitive radio users and communication channel signal-to-noise ratio,the credibility weight of cognitive radio users was given,and a trust-based cooperative spectrum sensing algorithm was proposed.The simulation results show that the algorithm improves detection performance effectively.…”
Get full text
Article -
172
A recommender algorithm based on SVD ++model under trust network
Published 2021-07-01“…Recommender algorithms are usually modeled based on user behavior data.However, the sparseness of explicit behavior data may cause the cold start problem of recommender algorithms.In order to solve the impact of data sparseness and cold-start problems on the effect of recommender algorithms, implicit trust relationship based on user similarity was introduced based on the existing revealed trust relationship, and a new recommender algorithm was designed through the SVD++ implicit semantic model.In order to improve the effect of the algorithm, the neighborhood model was integrated further, and the algorithm score prediction formula and loss function were derived.In the Epinions open source data set, RMSE and MAE were used as test indicators, and comparative experiments were conducted on the entire user set and the cold start user set.The experimental results show that the recommender algorithm can optimize the cold start problem of the original recommender algorithm to a certain extent, and achieve a better rating prediction accuracy.…”
Get full text
Article -
173
Algorithm based on randomly assigning filters to reduce PAPR in GFDM system
Published 2016-09-01“…As an alternative of the fifth generation mobile communication system waveforms,generalized frequency division multiplexing(GFDM)which has more advantages over OFDM has been trusted into the limelight.Nevertheless,GFDM still suffers from a high peak to average power ratio(PAPR).Considering that different filters have their own phase-frequency characteristics,a new algorithm based on randomly assigning filters to reduce PAPR in GFDM(RAF-GFDM)was proposed.According to the feature of GFDM system that the filter structure could be selected flexibly,different filters were assigned to subcarriers randomly to adjust the phase congruency due to signals superimposition.Additionally,this method can suppress PAPR effectively without causing signal distortion.Theoretical analysis and simulation results demonstrate that the proposed algorithm does not bring additional calculation costs while reducing PAPR and almost has no effect on the bit error rate(BER),and it may provide a higher application value.…”
Get full text
Article -
174
Collaborative Filtering Recommendation Algorithm for MOOC Resources Based on Deep Learning
Published 2021-01-01“…In view of the poor recommendation performance of traditional resource collaborative filtering recommendation algorithms, this article proposes a collaborative filtering recommendation model based on deep learning for art and MOOC resources. …”
Get full text
Article -
175
Workflow for effective integration of community detection algorithms in brain network analysis
Published 2025-07-01“…High modularity values were achieved, and validation tests confirmed the robustness of the algorithm used in the analysis. This study advances our understanding of brain architecture and has significant clinical implications by identifying altered connectivity patterns, which may improve the diagnosis and treatment of neurological and psychiatric conditions.…”
Get full text
Article -
176
Contention graph based concurrent scheduling algorithm in millimeter wave WPAN
Published 2019-01-01“…The directional antennas and beamforming techniques in millimeter wave (mmWave) bands are used to make concurrent transmission between multiple flows become possible.However,higher mutual interference may be caused by concurrent transmission.Therefore,when the time slots were limited and the number of data flows was large,how to schedule the concurrent flows efficiently was solved by proposed algorithm.The contention graph based spatial-time division multiple access (CB-STDMA) concurrent scheduling algorithm guaranteed the quality of service (QoS) of users,and aimed at maximizing the number of flows with their QoS requirements satisfied.It considered the interference between different flows,and a higher priority was given to the flow with fewer time slots requirement.Extensive simulations demonstrated that the proposed CB-STDMA algorithm increased the number of flows with their QoS requirements satisfied and the network throughput by 50% and 20% respectively compared with the existing algorithms.…”
Get full text
Article -
177
Contention graph based concurrent scheduling algorithm in millimeter wave WPAN
Published 2019-01-01“…The directional antennas and beamforming techniques in millimeter wave (mmWave) bands are used to make concurrent transmission between multiple flows become possible.However,higher mutual interference may be caused by concurrent transmission.Therefore,when the time slots were limited and the number of data flows was large,how to schedule the concurrent flows efficiently was solved by proposed algorithm.The contention graph based spatial-time division multiple access (CB-STDMA) concurrent scheduling algorithm guaranteed the quality of service (QoS) of users,and aimed at maximizing the number of flows with their QoS requirements satisfied.It considered the interference between different flows,and a higher priority was given to the flow with fewer time slots requirement.Extensive simulations demonstrated that the proposed CB-STDMA algorithm increased the number of flows with their QoS requirements satisfied and the network throughput by 50% and 20% respectively compared with the existing algorithms.…”
Get full text
Article -
178
A Novel Algorithm for Imbalance Data Classification Based on Neighborhood Hypergraph
Published 2014-01-01“…But more efficient methods are needed still. Hypergraph may not be powerful enough to deal with the data in boundary region, although it is an efficient tool to knowledge discovery. …”
Get full text
Article -
179
Joint scheduling algorithm for correlative tasks in multi-access edge computing
Published 2023-04-01“…Multi-access edge computing (MEC) has emerged as a promising computing paradigm for resource-intensive applications.However, most of the previous research work has not considered correlative tasks, which may lead to infeasible scheduling decisions.Considering that some tasks on the application must be completed locally and another non-negligible energy consumption problem in the multi-access edge computing offloading scenario, the joint scheduling algorithm of correlative tasks on the local and edge sides was studied.The problem was formalized as minimizing the energy consumption in the system while satisfying the application’s completion deadline constraints, and the joint scheduling (JS) algorithm was proposed to solve the problem.Finally, the performance of the JS algorithm in the application completion rate and system energy consumption were analyzed through simulation experiments.The simulation results show that the JS algorithm is superior to other comparison algorithms in the application completion rate and can save at least 43% of the system energy consumption.…”
Get full text
Article -
180
Features of modern algorithm of examination and treatment patients with endo-perio lesions
Published 2020-04-01Get full text
Article