Showing 401 - 420 results of 19,511 for search '"Algorithm"', query time: 0.08s Refine Results
  1. 401
  2. 402

    ALBERTA: ALgorithm-Based Error Resilience in Transformer Architectures by Haoxuan Liu, Vasu Singh, Michal Filipiuk, Siva Kumar Sastry Hari

    Published 2025-01-01
    “…Ensuring the correct execution of these models in GPUs is critical, despite the potential for transient hardware errors. We propose a novel algorithm-based resilience framework called ALBERTA that allows us to perform end-to-end resilience analysis and protection of transformer-based architectures. …”
    Get full text
    Article
  3. 403

    Power services scheduling algorithm based on quantum communication by Zhuozhi YU, Yefeng ZHANG, Bingyang HAN, Wenwei CHEN, Dong WANG

    Published 2019-11-01
    “…Quantum communication could effectively improve the transmission’s reliability and security of power system services.However,limited by the generating rate of quantum key,it was difficult to meet the encryption requirements of important services.Therefore,a queue scheduling algorithm was required to legitimately schedule the power system services which need to be encrypted in quantum communication.An improved weighted fair queuing (weighted fair queuing,WFQ) algorithm LD-WFQ was proposed.By estimating the expected delay of the data packets to be encrypted,sending the packets that would soon be timeout,the proposed algorithm effectively reduced the timeout ratio of the packets and improved the effective utilization of quantum keys,while maintaining the timeout ratio of the packets in high priority queue at a low level.Compared with the WFQ algorithm,the simulation result proves the superiority of LD-WFQ algorithm.…”
    Get full text
    Article
  4. 404
  5. 405

    Dynamical resource allocation algorithm research in network virtualization by LUO Juan, XU Yue-yang, LI Ren-fa

    Published 2011-01-01
    “…Aim to the problem of resource allocation,a dynamical algorithm of allocating resource was proposed.The algorithm dynamical migrates virtual node,which based on the average load discrepant degree of physical nodes and the tolerant load discrepant degree of substrate network.It will choose a proper host according to the values of synthetically impact factor,that reduce impact on the delay of virtual link and the bandwidth of physical link.Simulation result shows that the algorithm can improve load balance on physical nodes,and reduce negative impact on delay and bandwidth.…”
    Get full text
    Article
  6. 406

    An Algorithm Using DBSCAN to Solve the Velocity Dealiasing Problem by Wei Zhao, Qinglan Li, Kuifeng Jin

    Published 2021-01-01
    “…The results of the case study also show that the 4DD algorithm filters out many observation gates close to the missing data or radar center, whereas the proposed algorithm tends to retain and correct these gates.…”
    Get full text
    Article
  7. 407

    IMPROVEMENT OF CUCKOO ALGORITHM FOR ASSOCIATION RULE HIDING PROBLEM by Đoàn Minh Khuê, Lê Hoài Bắc

    Published 2018-07-01
    “…Recently, a meta-heuristic algorithm is relatively effective for this purpose, which is cuckoo optimization algorithm (COA4ARH). …”
    Get full text
    Article
  8. 408
  9. 409

    Algorithm of NAF scalar multiplication on ECC against SPA by Min WANG, Zhen WU

    Published 2012-09-01
    “…Against the problem that non-adjacent form(NAF)scalar multiplication on Elliptic curve cryptography(ECC) were not well resist the simple power attack(SPA),the implementation of NAF scalar multiplication and the mechanism of SPA attack were analyzed.Then a new algorithm,named equal power NAF scalar multiplication was presented.It was verified that equal power NAF scalar multiplication was efficient countermeasure against SPA attack by experimental analysis on power traces of the smartcard collected from the power analysis platform.…”
    Get full text
    Article
  10. 410

    Learning Based Genetic Algorithm for Task Graph Scheduling by Habib Izadkhah

    Published 2019-01-01
    “…An effective scheduling algorithm attempts to minimize the makespan and an efficient algorithm, in addition to that, tries to reduce the complexity of the optimization process. …”
    Get full text
    Article
  11. 411

    Intuitionistic Fuzzy Possibilistic C Means Clustering Algorithms by Arindam Chaudhuri

    Published 2015-01-01
    “…The clustering algorithm has membership and nonmembership degrees as intervals. …”
    Get full text
    Article
  12. 412

    Research progress of mimic multi-execution scheduling algorithm by Zhengbin ZHU, Qinrang LIU, Dongpei LIU, Chong WANG

    Published 2021-05-01
    “…Mimic defense is the new active defense technology based on the dynamic heterogeneous redundant architecture.With inherent uncertainty, heterogeneous, redundant and negative feedback features, it can significantly improve the robustness and security of system.Among them, the scheduling algorithm is the key to mimic defense technology, which advantages and disadvantages directly affect the ability of system to resist attacks based on known or unknown vulnerabilities.Based on this, the principle and goal of mimic scheduling algorithm were firstly introduced.Then the state-of-the-art of mimic scheduling algorithms were analyzed and summarized from three aspects, such as scheduling object, scheduling quantity and scheduling timing.Finally, the future research direction and trend of mimic scheduling algorithms were prospected.…”
    Get full text
    Article
  13. 413
  14. 414

    Secure key-sharing algorithm based on smart grid by Wei GU, Jian SHEN, Yongjun REN

    Published 2021-08-01
    “…Most of establishment-key protocols suffer from both session-specific temporary information attack and private key leakage issue.Therefore, a novel public key sharing-based symmetric encryption algorithm (PKS-SE) was proposed, in order to maintain the security of communication between smart meter and service providers.Based on bilinear mapping and super-singular curve, PKS-SE algorithm constructed the communication key between intelligent electricity meter and service provider, in order to avoid the key escrow problem.At the same time, PKS-SE algorithm reduced the number of required messages during the mutual authentication to only two messages, thus controlling the communication cost and operation cost of PKS-SE algorithm.Simulation results show that the proposed PKS-SE algorithm can effectively realize public key-sharing…”
    Get full text
    Article
  15. 415

    Hierarchical Sliding Mode Algorithm for Athlete Robot Walking by Van Dong Hai Nguyen, Xuan-Dung Huynh, Minh-Tam Nguyen, Ionel Cristian Vladu, Mircea Ivanescu

    Published 2017-01-01
    “…A new method based on hierarchical sliding mode for controlling postures is also introduced. Genetic algorithm is applied to design the oscillator for robot motion. …”
    Get full text
    Article
  16. 416

    Geometrically synchronous watermarking algorithm based on the corner feature by LIU Quan1, ZHANG Le1, ZHANG Yong-gang2, Christian Bessiere3, FU Qi-ming1, WANG Xiao-yan1

    Published 2011-01-01
    “…Simple geometric attacks could destroy watermark or its position,causing the failure of most watermarking algorithm.A geometrically synchronous watermarking algorithm robust based on the corner feature was proposed.In this paper,the feature point was detected on the normalization of the image to resist geometric attack;the combination of Harris and MIC corner detected algorithm was utilized to extract steady corner based on analyzing the advantages and disadvantages of the two algorithm;the watermarking information was statistic embed in the shape of rings instead of changing the simply one pixel.Sufficient experiments demonstrate the robustness of this approach,especially in resisting geometry attack such as RST(rotation,scaling and translation).…”
    Get full text
    Article
  17. 417

    Algorithm of grid reliability assessment and reconstruction optimization system by Zhibin ZANG, Peihao ZHENG, Benhai WEI, Zaipei ZHAI, Shengguo MA

    Published 2017-12-01
    “…Based on the research of the reliability of distribution network and the reconstruction of network,a new method was put forward to reconstruct the power grid reliability.Firstly,the evaluation index system was proposed,which included the active network LOSS (LOSS),lack of system power supply (ENS) and the average power supply availability (ASAI).A multi-objective model of distribution network was constructed by normalization,and the multi-objective function was transformed into a new single objective function by using the judgment matrix method,which realized fast calculation of power distribution network reconstruction and optimization.Through IEEE69 example verification,the optimization algorithm can obtain the global optimal solution and reduce the computational time at the same time,effectively solve the problem of the reconstruction of the complex network optimization.…”
    Get full text
    Article
  18. 418

    Efficient top-k string similarity query algorithms by Zi-yang CHEN, Yu-jun HAN, Xuan WANG, Jun-feng ZHOU

    Published 2014-12-01
    “…,given a query string σ and string set S,finding k similar strings to σ based on edit distance from S.Firstly,two adaptive filter strategies based on length-skip index are proposed,such that to reduce the times of edit distance computation between two strings.Then the lower bound of edit distance between query string and unmatched string set is proposed,such that to further reduce the times of edit dis-tance computation when processing strings that do not have common signatures with the query string.Finally efficient algorithms to return top-k similar strings are proposed.Experimental results on three real datasets verify the benefits over the state-of-the-art algorithm.…”
    Get full text
    Article
  19. 419

    Federated learning optimization algorithm based on incentive mechanism by Youliang TIAN, Shihong WU, Ta LI, Lindong WANG, Hua ZHOU

    Published 2023-05-01
    “…Federated learning optimization algorithm based on incentive mechanism was proposed to address the issues of multiple iterations, long training time and low efficiency in the training process of federated learning.Firstly, the reputation value related to time and model loss was designed.Based on the reputation value, an incentive mechanism was designed to encourage clients with high-quality data to join the training.Secondly, the auction mechanism was designed based on the auction theory.By auctioning local training tasks to the fog node, the client entrusted the high-performance fog node to train local data, so as to improve the efficiency of local training and solve the problem of performance imbalance between clients.Finally, the global gradient aggregation strategy was designed to increase the weight of high-precision local gradient in the global gradient and eliminate malicious clients, so as to reduce the number of model training.…”
    Get full text
    Article
  20. 420

    Algorithms for Computing Wiener Indices of Acyclic and Unicyclic Graphs by Bo Bi, Muhammad Kamran Jamil, Khawaja Muhammad Fahd, Tian-Le Sun, Imran Ahmad, Lei Ding

    Published 2021-01-01
    “…In this paper, we described a linear time algorithm (LTA) that computes the Wiener index for acyclic graphs and extended this algorithm for unicyclic graphs. …”
    Get full text
    Article