Showing 901 - 920 results of 19,511 for search '"Algorithm"', query time: 0.10s Refine Results
  1. 901

    Efficient Dynamic Replication Algorithm Using Agent for Data Grid by Priyanka Vashisht, Rajesh Kumar, Anju Sharma

    Published 2014-01-01
    “…The result shows the efficiency of EDRA algorithm in terms of mean job execution time, network usage, and storage usage of node.…”
    Get full text
    Article
  2. 902

    Fractional Dynamics of Genetic Algorithms Using Hexagonal Space Tessellation by J. A. Tenreiro Machado

    Published 2013-01-01
    “…The paper formulates a genetic algorithm that evolves two types of objects in a plane. …”
    Get full text
    Article
  3. 903

    Polar codes decoding algorithm based on convolutional neural network by Rui GUO, Fanchun RAN

    Published 2020-06-01
    “…In order to solve the problem that the existing Polar code decoding algorithm based on neural network can only decode short codewords (codewords length N≤64),a new decoding algorithm using convolution neural network for long codewords (N≥512) was put forward.Instead of using a fixed drawn from the data sample proportion as training set and test set,the neural network parameters epoch and batch were used to control the neural network input,and the data explosion problem caused by the long codewords was solved.In addition,the influence of batch and epoch parameters on the decoding performance of convolution neural network was explored and the performance difference of neural network using different activation functions were investigated.Simulation results show that with the traditional SCL (successive cancellation list,L=2) decoding algorithm,convolution neural network in low signal-to-noise ratio on the performance is better than that of SCL (L=2),in high signal-to-noise ratio and SCL (L=2) algorithm of similar performance,and the larger the training data set,the better the decoding performance of neural network.…”
    Get full text
    Article
  4. 904

    Multiobjective Salp Swarm Algorithm Approach for Transmission Congestion Management by Anjali Agrawal, Seema N. Pandey, Laxmi Srivastava, Pratima Walde, R. K. Saket, Baseem Khan

    Published 2022-01-01
    “…This paper proposes a multiobjective salp swarm algorithm (MOSSA) approach for transmission congestion management (CM), implementing demand side management activities. …”
    Get full text
    Article
  5. 905

    Improved Image Compression Scheme Using Hybrid Encoding Algorithm by Yusra Ahmed Salih, Aree Ali Mohammed, Loay Edwar George

    Published 2019-10-01
    “…In this work, an effective compression method for hybrid images is proposed based on the discrete wavelet transformation and hybrid encoding algorithm (Huffman and SPIHT). This paper's primary participation is to take advantage of the hybrid encoding technique to maintain the quality of the reconstructed image and the reduction of time complexity. …”
    Get full text
    Article
  6. 906

    A Vehicle Detection Algorithm Based on Deep Belief Network by Hai Wang, Yingfeng Cai, Long Chen

    Published 2014-01-01
    “…On-road experimental results demonstrate that the algorithm performs better than state-of-the-art vehicle detection algorithm in testing data sets.…”
    Get full text
    Article
  7. 907

    Fault-injection attack on countermeasure algorithms of RSA-CRT cryptosystem by Fanyu KONG, Yong QIAO, Pengtao LIU, Xiaodong LIU, Dashui ZHOU

    Published 2019-02-01
    “…As a widely-applied public-key cryptosystem in TLS,SSL and IPSec protocols,the security of RSA cryptosystem is of great importance.At FDTC 2014,Rauzy and Guilley proposed several improved countermeasure algorithms of RSA implementation based on Chinese remainder theorem,which were used to defeat fault-injection attacks.New fault-injection attacks on two of their countermeasure algorithms are proposed.During the RSA computation process,a permanent fault is injected and then a faulty RSA signature result is induced.The RSA private key can be obtained by using the faulty RSA signature and the correct result.Therefore,Rauzy and Guilley’s two countermeasure algorithms cannot resist our fault-injection attack.…”
    Get full text
    Article
  8. 908

    Statistical modeling based fast rate estimation algorithm for VVC by Wei QI, Haibing YIN, Hongkui WANG, Xiaofeng HUANG, Weihong NIU

    Published 2022-12-01
    “…To reduce the coding complexity of the rate-distortion optimization process of the latest video coding standard versatile video coding (VVC), a fast rate estimation model based on statistical modeling was proposed.Firstly, the quantization behavior in dependent quantization (DQ) and the context dependency in entropy coding were fully considered.Features that could describe context state transition in the coding process were proposed to estimate rate of some synatax elements in a TU preliminarily.Secondly, coefficient chaos and sparsity features were proposed to distinguish the influence of coefficient distribution difference on the rate cost based on the coefficient distribution characteristics which built a TU level rate model.Finally, large-size transform unit (TU) and small-size TU was modeling respectively according to the rate composition character to achieve more accurate rate estimation.A large number of parameters were trained by regression model through statistical methods, and the final linear rate model was obtained which was applied to the mode decision.Experimental results show that the proposed algorithm can achieve 16.289% complexity reduction with 1.567% BD-BR increase for RA configuration.…”
    Get full text
    Article
  9. 909

    A microscopic image stitching algorithm with improved energy function by WANG Jiang’an, LIANG Wenqian, HUANG Le, QIN Linzhen

    Published 2024-09-01
    “…Addressing the challenge of traditional optimal suture algorithms in effectively eradicating splicing seams after fusing microscopic images, an image fusion optimization algorithm based on the optimal suture was proposed. …”
    Get full text
    Article
  10. 910

    Bloom filter–based efficient broadcast algorithm for the Internet of things by Anum Talpur, Faisal K Shaikh, Thomas Newe, Adil A Sheikh, Emad Felemban, Abdelmajid Khelil

    Published 2017-12-01
    “…The simulation results show that parallel broadcasting among different clusters and the use of a bloom filter can achieve a reduction in broadcast overhead from hundreds to ones and tens, when compared with a conventional non-bloom-based broadcast algorithm and a bloom-based algorithm. In addition, it helps to reduce energy usage evenly throughout the network, 1/100 times, when compared with conventional broadcast (non-bloom-based) and, 1/10 times, when compared with bloom-based broadcast. …”
    Get full text
    Article
  11. 911
  12. 912
  13. 913

    KMOBPSO-Based High Reliability Controller Placement Algorithm in SDN by Jingting Xu, Hua Qu, Jihong Zhao

    Published 2015-06-01
    “…N+1 redundancy backup model was applied to controller placement problem in SDN in order to solve single node failure problem and to improve system reliability with taking system cost and latency into consideration,and the problem was abstracted as a multi-objective optimization problem. Meanwhile,an algorithm called KMOBPSO was proposed to calculate the result of high-reliability controller placement in SDN merged with K-means clustering algorithm and genetic operators. …”
    Get full text
    Article
  14. 914

    Distributed robust RLS estimation algorithm over sensor networks by Kaikai KANG, Zhaoting LIU, Yingbiao YAO

    Published 2019-01-01
    “…A distributed RLS estimation algorithm based on node cooperation and robustness was proposed. …”
    Get full text
    Article
  15. 915

    Correlation-Based Task Scheduling Algorithm in Wireless Sensor Network by Fangfang Yan, Yue Shi, Wei Wei

    Published 2013-05-01
    “…There are some shortages of static scheduling algorithm(SCP)while scheduling tasks in wireless sensor network.A scheduling clustered tree was proposed,and a new clustering algorithm(ICS)based on task duplication was put forward. …”
    Get full text
    Article
  16. 916
  17. 917
  18. 918
  19. 919
  20. 920