Showing 461 - 480 results of 14,091 for search '"Algorithm"', query time: 0.12s Refine Results
  1. 461

    A Trust Value-Based Spectrum Allocation Algorithm in CWSNs by Qing-Qi Pei, Zi Li, Li-Chuan Ma

    Published 2013-05-01
    “…This algorithm uses “the last diminisher” algorithm, which appears in fair division models. …”
    Get full text
    Article
  2. 462
  3. 463

    Simple-Random-Sampling-Based Multiclass Text Classification Algorithm by Wuying Liu, Lin Wang, Mianzhu Yi

    Published 2014-01-01
    “…Multiclass text classification (MTC) is a challenging issue and the corresponding MTC algorithms can be used in many applications. The space-time overhead of the algorithms must be concerned about the era of big data. …”
    Get full text
    Article
  4. 464

    An Improved Genetic Algorithm for Developing Deterministic OTP Key Generator by Ashish Jain, Narendra S. Chaudhari

    Published 2017-01-01
    “…Hereby we would like to mention that no prior experimental work has been presented in the literature which is directly related to the OTP key generation using evolutionary algorithms. Therefore, this work can be considered as a guideline for future research.…”
    Get full text
    Article
  5. 465

    Textual and chemical information processing: different domains but similar algorithms by Peter Willett

    Published 2000-01-01
    “…This paper discusses the extent to which algorithms developed for the processing of textual databases are also applicable to the processing of chemical structure databases, and <I>vice</i> <i>versa</i>. …”
    Get full text
    Article
  6. 466
  7. 467

    COMPUTER ALGORITHMS FOR EVALUATION OF SPARKING INDICATED BY OPTOELECTRONIC SPARKING ANALYZER by W. Zelinski

    Published 2005-08-01
    “…Optoelectronic sparking analyzer provides the possibility to realize a number of algorithms that permit to convert indicated light signals containing information on number of sparkings in the measuring cycle and their intensity divided in ten classes. …”
    Get full text
    Article
  8. 468
  9. 469

    Computation task offloading algorithm and system level simulation for vehicles by Qicheng ZENG, Yuxuan SUN, Sheng ZHOU

    Published 2019-09-01
    “…With the development of autonomous driving and vehicular network,more and more vehicles will have powerful computing capabilities and connection with each other via wireless network.These computing resources can not only be applied to automatic driving,but also provide a wide range of edge computing services.Aiming at the task offloading among vehicles,a distributed task offloading algorithm based on online learning was proposed to minimize the average offloading delay.Furthermore,a system-level simulation platform was built to evaluate the impact of vehicle density and number of tasks on the average offloading delay in both highway and urban scenarios.The results provide a reference for the resource allocation and deployment of task offloading in different traffic situations.…”
    Get full text
    Article
  10. 470

    A Hybrid Algorithm of GA + Simplex Method in the WSN Localization by Feng Wang, Cong Wang, ZiZhong Wang, Xue-ying Zhang

    Published 2015-07-01
    “…In order to solve the large-error problem in the third phase and the poor position accuracy of the least square method in the weighted DV-Hop algorithm, a hybrid algorithm of GA + simplex method was proposed in this paper. …”
    Get full text
    Article
  11. 471
  12. 472

    Accelerated algorithm in attribute-based encryption over cloud environment by Guowei WU, Ning FAN, Laifu WANG, Shuai WANG, Jun SHEN, Huamin JIN

    Published 2019-11-01
    “…Cloud computing provides storage,computing and network services to tenants.Data security and data sharing and access control between tenants are indispensable functions.Attribute-based encryption (ABE) system is a one to many encryption system,which allows users to fine -grained access control on encrypted data according to users’ attributes.This encryption system is very suitable for multi-tenant data sharing overcloud computing environment.However,the existing attribute-based encryption schemes is inefficient,which cannot be applied to practical applications.Two types of ABE and their application scenarios were analyzed,and an acceleration algorithms scheme in attribute encryption cryptosystem was proposed.The experiment can illustrate that the proposed scheme can improve the efficiency of key generation algorithm,encryption algorithm and decryption algorithm.…”
    Get full text
    Article
  13. 473

    Semi-supervised tri-Adaboost algorithm for network intrusion detection by Yali Yuan, Liuwei Huo, Yachao Yuan, Zhixiao Wang

    Published 2019-06-01
    “…Here, a semi-supervised tri-Adaboost (STA) algorithm is proposed. In the algorithm, three different Adaboost algorithms are used as the weak classifiers (both for continuous and categorical data), constituting the decision stumps in the tri-training method. …”
    Get full text
    Article
  14. 474

    A robust audio steganography algorithm based on differential evolution by Zhaopin SU, Chaoyong SHEN, Guofu ZHANG, Feng YUE, Donghui HU

    Published 2021-11-01
    “…., segmented scaling parameters and steganography capacity) and imperceptibility as well as robustness was analyzed.Next, a multi-objective optimization model of audio steganography was presented, in which segmented scaling parameters and steganography capacity were decision variables, imperceptibility and steganography capacity were optimization objectives, and the signal-to-noise ratio was a constraint.Then, a robust audio steganography algorithm based on differential evolution was proposed, including the corresponding encoding, fitness function, crossover and mutation operators.Finally, comparative experimental results show that the proposed steganography algorithm can achieve better robustness against common signal processing attacks on the premise of ensuring imperceptibility and anti-detection.…”
    Get full text
    Article
  15. 475

    Bibliometric Survey on Particle Swarm Optimization Algorithms (2001–2021) by Samuel-Soma M. Ajibade, Adegoke Ojeniyi

    Published 2022-01-01
    “…Particle swarm optimization algorithms (PSOA) is a metaheuristic algorithm used to optimize computational problems using candidate solutions or particles based on selected quality measures. …”
    Get full text
    Article
  16. 476

    FPGA Implementation of A∗ Algorithm for Real-Time Path Planning by Yuzhi Zhou, Xi Jin, Tianqi Wang

    Published 2020-01-01
    “…The traditional A∗ algorithm is time-consuming due to a large number of iteration operations to calculate the evaluation function and sort the OPEN list. …”
    Get full text
    Article
  17. 477

    A Cooperative Coevolutionary Cuckoo Search Algorithm for Optimization Problem by Hongqing Zheng, Yongquan Zhou

    Published 2013-01-01
    “…Taking inspiration from an organizational evolutionary algorithm for numerical optimization, this paper designs a kind of dynamic population and combining evolutionary operators to form a novel algorithm, a cooperative coevolutionary cuckoo search algorithm (CCCS), for solving both unconstrained, constrained optimization and engineering problems. …”
    Get full text
    Article
  18. 478
  19. 479

    An Algorithm for Discretization of Real Value Attributes Based on Interval Similarity by Li Zou, Deqin Yan, Hamid Reza Karimi, Peng Shi

    Published 2013-01-01
    “…The algorithms related to Chi2 algorithm (includes modified Chi2 algorithm and extended Chi2 algorithm) are famous discretization algorithm exploiting the technique of probability and statistics. …”
    Get full text
    Article
  20. 480

    An Improved Clustering Algorithm of Tunnel Monitoring Data for Cloud Computing by Luo Zhong, KunHao Tang, Lin Li, Guang Yang, JingJing Ye

    Published 2014-01-01
    “…To solve this problem, an improved parallel clustering algorithm based on k-means has been proposed. It is a clustering algorithm using the MapReduce within cloud computing that deals with data. …”
    Get full text
    Article