Showing 2,401 - 2,420 results of 19,511 for search '"Algorithms"', query time: 0.11s Refine Results
  1. 2401
  2. 2402

    Image visualization encryption algorithm based on Shamir threshold secret key sharing by Yifu TAN, Zichen LI

    Published 2018-07-01
    “…An image visualization encryption algorithm with authentication function by using Shamir scheme was proposed.The main idea of this algorithm is to obtain the data by segmenting the binary secret image into blocks.Then,Shamir scheme was used to obtain the sub-secret data and simultaneously sign the secret image with the SM2 signature algorithm.And it would embed the shared data and signature information into carrier images.When the restoration is required,a specified number of sub-secret images are required for information extraction,restoration and authentication.The simulation experiment of the scheme shows that the secret image sharing scheme improves the security of secret image storage and transmission.…”
    Get full text
    Article
  3. 2403

    Based on optimally rigid graph energy efficient distributed topology control algorithm by Xiao-yuan LUO, Yan-lin YAN, Li-juan HAO, Shao-bao LI, Xin-ping GUAN

    Published 2013-12-01
    “…To solve the problem that most of existing algorithms cannot balance energy consumption,the energy efficient distributed topology control algorithm (OREE) based on optimally rigid graph was presented.Through the link weight function reflecting both the energy consumption and residual energy of two end nodes,OREE builds a dynamic network topology that changes with the variation of node energy,and thus balances energy consumption of nodes.The topology derived under OREE is 2-connected and sparse was proved,and the average degree of nodes in the topology converges to four approximately.Furthermore,simulation results show that OREE can balance energy consumption of nodes effi-ciently compared with other algorithms,thereby extend the lifetime of networks.…”
    Get full text
    Article
  4. 2404

    Correlation Analysis of Japanese Literature and Psychotherapy Effects Based on an Equation Diagnosis Algorithm by Zhang Tingting

    Published 2022-01-01
    “…In this paper, an equation diagnosis algorithm based on iterative learning for a class of linear discrete systems is studied, and the existing discrete iterative learning diagnostics are improved. …”
    Get full text
    Article
  5. 2405

    Image Texture Analysis and Edge Detection Algorithm Based on Anisotropic Diffusion Equation by Xiaoqin Li

    Published 2021-01-01
    “…We propose a class of image texture analysis algorithms based on anisotropic diffusion equations and discrete gray level sets. …”
    Get full text
    Article
  6. 2406

    A Buffer-Sizing Algorithm for Network-on-Chips with Multiple Voltage-Frequency Islands by Anish S. Kumar, M. Pawan Kumar, Srinivasan Murali, V. Kamakoti, Luca Benini, Giovanni De Micheli

    Published 2012-01-01
    “…Our algorithm considers both the static and dynamic effects when sizing buffers. …”
    Get full text
    Article
  7. 2407

    Wireless Network Virtualization Resource Sharing considering Dynamic Resource Allocation Algorithm by Xueming Guan, Yaozhi Ma

    Published 2022-01-01
    “…In order to improve the efficiency of wireless network virtualization resource processing, this paper combines the dynamic resource allocation algorithm to construct a wireless network virtualization resource sharing model. …”
    Get full text
    Article
  8. 2408

    A Population Classification Evolution Algorithm for the Parameter Extraction of Solar Cell Models by Yiqun Zhang, Peijie Lin, Zhicong Chen, Shuying Cheng

    Published 2016-01-01
    “…The experimental analyses demonstrate that the proposed PCE is superior when comparing it with other optimization algorithms for parameter identification. Moreover, PCE is tested using three different sources of data with good accuracy.…”
    Get full text
    Article
  9. 2409
  10. 2410

    Target Tracking Algorithm for Underwater Acoustic Sensor Networks under DoS Attack by Jing YAN, Jin YANG, Xian YANG, Xiaoyuan LUO

    Published 2024-12-01
    “…Then, the underwater target movement model and the underwater DoS attack model were constructed, and an improved consensus-based unscented Kalman filter(UKF) underwater target tracking algorithm was proposed. Finally, the Cramer-Rao lower bound of the algorithm was derived, and the effectiveness of the algorithm was proved. …”
    Get full text
    Article
  11. 2411

    Multi-source information transmission and classification algorithm for equipment based on compressed sensing by Xiaohu ZHAO, Gang WANG, Boming SONG, Jiacheng YU

    Published 2020-02-01
    “…Aiming at the characteristics of various types of equipment in coal preparation plant and the dispersion of monitoring points,a multi-source information wireless transmission and classification algorithm for equipment based on compressed sensing was proposed.By constructing a multi-hop information transmission model,the information transmission problem was transformed into the compressed sensing problem of multi-path measurement signals,thereby the measurement matrix acquisition was transformed into the routing problem of the multi-hop information transmission model.Aiming at the large coherence of the obtained measurement matrix and affecting the signal reconstruction effect,the idea of random routing was introduced into the routing construction,and a random dynamic self-organizing routing algorithm was proposed.In order to solve the problem that the time domain features of the reconstructed signal were difficult to accurately classify the fault type,a new time domain feature,the total variation (TV) of the vibration signal,was introduced for the reconstructed signal,and the compensation distance estimation algorithm was adopted to verify the superiority of the introduction of indicators.The analysis of the measured data of the coal preparation plant shows that the proposed multi-source information transmission and classification algorithm can effectively improve the fault recognition accuracy under the condition of improving the real-time transmission efficiency of the monitoring data.…”
    Get full text
    Article
  12. 2412

    Location parameter estimation algorithm based on fractals theory for single mobile LMU by TIAN Zeng-shan, ZHOU Dong-sheng

    Published 2007-01-01
    “…According to the diffculity of mobile station loction for third party,the location algorithm was designed for single LMU(location measurement unit).The algorithm of fractal interpolation and signal strength different of three an-tenna was adopted to advance the location parameter precision.The Strobe correlator algorithm was introduced to miti-gate the multipath effect.The simulation result indicates the location algorithm can provide the high accuracy position.…”
    Get full text
    Article
  13. 2413
  14. 2414
  15. 2415

    High-capacity image steganography algorithm combining image encryption and deep learning by Xiaoyuan YANG, Xinliang BI, Jia LIU, Siyuan HUANG

    Published 2021-09-01
    “…Aiming at the problem that the residual image of cover image and carrier image in the high-capacity image steganography scheme based on deep learning will expose the secret image, a high-capacity image steganography scheme combining image encryption and deep learning was proposed.An image feature extraction method was used, so that the features extracted from the cover image were consistent with the features extracted from the carrier image.Before the image steganography, the sender extracted features from the cover image as a key to encrypt the secret image.After the extractor extracted the encrypted secret image, the features were extracted from the carrier image as a key to decrypt the secret image.The experimental results show that the attacker cannot find the information of the secret image from the residual image, and the frequency of key transmission is lower, and the security of the algorithm is improved.…”
    Get full text
    Article
  16. 2416
  17. 2417
  18. 2418

    Shockwave-Based Automated Vehicle Longitudinal Control Algorithm for Nonrecurrent Congestion Mitigation by Liuhui Zhao, Joyoung Lee, Steven Chien, Cheol Oh

    Published 2017-01-01
    “…A shockwave-based speed harmonization algorithm for the longitudinal movement of automated vehicles is presented in this paper. …”
    Get full text
    Article
  19. 2419

    Vehicle maneuver recognition and correction algorithm for road quality measurement system optimization by Roland Nagy, István Szalai

    Published 2025-04-01
    “…This algorithm combines rule-based methods with machine learning, offering enhanced accuracy and lower computational costs compared to alternative approaches. …”
    Get full text
    Article
  20. 2420

    Cooperative Handover Algorithm Based on Auxiliary Carrier in LTE-Advanced Relay System by Jihong Zhao, Weiyang He, Hua Qu

    Published 2013-08-01
    “…Handover is one of the most important parts in mobility management.In the LTE-Advanced system,more new technologies such as relay and carrier aggregation and so on were introduced,which put forward higher requirements and challenges to the handover mechanism of system.The handover process of the traditional LTE-Advanced system and LTE-Advanced relay system were analyzed,the cooperative handover algorithm based on auxiliary carrier in LTE-Advanced relay system was proposed.This algorithm makes use of the advantages of wide spreading of low-frequency carrier and rich resources of high-frequency carrier,and in conjunction with relay technology and carrier aggregation technology,achieving the purpose of reducing the handover outage probability and improving the throughput of the system.…”
    Get full text
    Article