首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6篇
  免费   0篇
无线电   2篇
自动化技术   4篇
  2022年   3篇
  2021年   2篇
  2020年   1篇
排序方式: 共有6条查询结果,搜索用时 15 毫秒
1
1.
A super peer is a peer that has the highest capacity in comparison with other peers in the network. It is trying to reduce the load of the rest of the peers and improve network performance. Selecting a super peer in a peer‐to‐peer–based network is a very crucial challenge. As the ability of peers are very different, by considering capacity of each peer and selecting a proper role, we can use network components much more efficiently. Because of the dynamicity of these networks, comparative methods of selecting super peers is of special importance. Comparative selection is continuously trying to select proper super peer. In recent studies, learning automata was introduced as a powerful learning model to solve this issue. In most of the studies, learning automata with an S model is employed. In this article, another selection method of learning automata with a P model environment is presented and its capability for super peer selection is shown. Moreover, simulation results show that removing some of the super peers would result in better performance in terms of inversion time in the high level of super‐peer capacity, required time for selecting proper super peer, and super peer tolerance.  相似文献   
2.
The Journal of Supercomputing - Medical information systems such as Internet of Medical Things (IoMT) are gained special attention over recent years. X-ray and MRI images are important sources of...  相似文献   
3.
Computational Economics - The knowledge-based economy has drawn increasing attention recently, particularly in online shopping applications where all the transactions and consumer opinions are...  相似文献   
4.
5.

One of the major challenges in cyber space and Internet of things (IoT) environments is the existence of fake or phishing websites that steal users’ information. A website as a multimedia system provides access to different types of data such as text, image, video, audio. Each type of these data are prune to be used by fishers to perform a phishing attack. In phishing attacks, people are directed to fake pages and their important information is stolen by a thief or phisher. Machine learning and data mining algorithms are the widely used algorithms for classifying websites and detecting phishing attacks. Classification accuracy is highly dependent on the feature selection method employed to choose appropriate features for classification. In this research, an improved spotted hyena optimization algorithm (ISHO algorithm) is proposed to select proper features for classifying phishing websites through support vector machine. The proposed ISHO algorithm outperformed the standard spotted hyena optimization algorithm with better accuracy. In addition, the results indicate the superiority of ISHO algorithm to three other meta-heuristic algorithms including particle swarm optimization, firefly algorithm, and bat algorithm. The proposed algorithm is also compared with a number of classification algorithms proposed before on the same dataset.

  相似文献   
6.
The Journal of Supercomputing - Wavelet packet transform (WPT) is a powerful mathematical tool for analyzing nonlinear biomedical signals, such as phonocardiogram (PCG). WPT decomposes a PCG signal...  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号