-
2461
Resource allocation strategies for improved mayfly algorithm in cognitive heterogeneous cellular network
Published 2022-06-01Subjects: Get full text
Article -
2462
Application of Improved Multi-objective Differential Evolution Algorithm in the Optimal Operation of Reservoirs
Published 2021-01-01Subjects: “…multi-objective differential evolution algorithm…”
Get full text
Article -
2463
Automated mining of packet signatures for traffic identification at application layer with apriori algorithm
Published 2008-01-01Subjects: Get full text
Article -
2464
AEUR: authenticated encryption algorithm design based on uBlock round function
Published 2023-08-01“…In order to improve the efficiency of the implementation of the authenticated encryption algorithm without compromising the security of the algorithm, a new authenticated encryption algorithm AEUR was designed.Firstly, based on the uBlock round function, with resistance to internal collision attacks as the security objective, a mixed integer linear programming approach was used to search for generic iterative component R(t,s) to meet the security objective.Secondly, the authenticated encryption algorithm AEUR was designed by using this component.AEUR consisted of two parts: authenticated encryption and decrypted verification, both of which performed the same process without the need to design additional operational sessions, reducing the algorithm’s resource consumption.In addition, the correctness of the algorithm was verified by comparing the corresponding round state values, and the security of the algorithm was analyzed using various analysis methods such as linear attacks and sliding attacks.Finally, the algorithm was implemented in C language to prove the AEUR has good performance.The results show that the proposed algorithm has a better overall performance in terms of software runtime, with efficiency improvements of 3% and 46% compared to AEGIS and ALE, and 74% and 92% compared to AES-GCM and ACORN, respectively.…”
Get full text
Article -
2465
Defense against Malicious Users in Cooperative Spectrum Sensing Using Genetic Algorithm
Published 2018-01-01“…In this paper, the FC takes a global decision based on the hard binary decisions received from all SUs. Genetic algorithm (GA) using one-to-many neighbor distance along with z-score as a fitness function is used for the identification of accurate sensing information in the presence of MUs. …”
Get full text
Article -
2466
Tighter bounds on the Gaussian Q-function based on wild horse optimization algorithm
Published 2025-01-01“…Journal of Algorithms & Computational Technology…”
Get full text
Article -
2467
Routing selection algorithm with considering the queuing delay for system protection communication network
Published 2018-10-01“…Currently,a fast and reliable transmission path was calculated by routing algorithm that satisfies the system protection communication network under the requirements of delay and reliability,without considering that when the grid fails or the traffic in the network is excessive,the queuing delay of many nodes in the communication network will greatly increase.Aiming at this problem,a routing algorithm was proposed to solve the minimum queuing delay and improve the real-time performance of wide area protection.Experimental results show that the total information delay of the path calculated by the routing algorithm proposed is the smallest under the requirements of system protection reliability.…”
Get full text
Article -
2468
Structural health evaluation of arch bridge by field test and optimized BPNN algorithm
Published 2023-07-01“…Back Propagation Neural Network (BPNN), Genetic Algorithm-based BPNN (GA-BPNN), Particle Swarm Optimization Algorithm-based BPNN (PSO-BPNN) approaches and test data analysis are adopted to compare the measured data with the simulated data to quantitatively identify the damage degree of the selected bridge. …”
Get full text
Article -
2469
Adaptive-mutation Whale Optimization Algorithm for Flood Control Operation of Reservoir Groups
Published 2023-01-01Subjects: Get full text
Article -
2470
Migration compensation algorithm for maneuvering target in passive radar based on FRT-MLVD
Published 2019-07-01Get full text
Article -
2471
An efficient routing and cache management algorithm based on interest-community for opportunity networks
Published 2018-06-01Subjects: Get full text
Article -
2472
Path Scheduling and Target Trajectory Optimization in UAVs Based on Dragonfly and Firefly Algorithm
Published 2022-10-01Subjects: Get full text
Article -
2473
Parameter Estimation of the Photovoltaic System Using Bald Eagle Search (BES) Algorithm
Published 2021-01-01“…Up to date, metaheuristic algorithms have proven to be the best methods to obtain accurate values of these intrinsic parameters. …”
Get full text
Article -
2474
A novel lossless encoding algorithm for data compression–genomics data as an exemplar
Published 2025-01-01“…In this study, a novel encoding algorithm is proposed, motivated by the compression of DNA data and associated characteristics. …”
Get full text
Article -
2475
Joint channel estimation and ICI cancellation algorithm for pilot-assisted OFDM systems
Published 2007-01-01“…The inter-carrier interference caused by double-selective channels in OFDM systems was analyzed.An OFDM channel estimation method with new pilot structure was also proposed,based on which the channel estimation in time domain and the ICI cancellation could be done within one OFDM symbol.The simulation results show that the proposed joint channel estimation and ICI cancellation algorithm can provide more accurate channel information,and improve system performance apparently.…”
Get full text
Article -
2476
Presenting an Optimal Algorithm for Resource Scheduling and Code Partition in Mobile Cloud Computing
Published 2022-03-01“…In this paper, a near-optimal strategy is proposed to solve the problems in this field, by using an evolutionary particle swarm algorithm to reduce the range of multiple targets to a proper level. …”
Get full text
Article -
2477
Intelligent interference decision algorithm with prior knowledge embedded LSTM-PPO model
Published 2024-12-01“…Focusing on the issues of low efficiency and effectiveness in decision-making as well as the instability of traditional reinforcement learning model-based multi-function radar (MFR) jamming decision algorithms, a prior knowledge embedded long short-term memory (LSTM) network-proximal policy optimization (PPO) model based intelligent interference decision algorithm was developed. …”
Get full text
Article -
2478
A Vector Algebraic Algorithm for Coverage Compensation in Hybrid Wireless Sensor Networks
Published 2013-11-01“…Particularly, this paper proposes a vector algebra based algorithm by exploring redundant nodes as an extra dimension for coverage compensation. …”
Get full text
Article -
2479
Enhancing Camera Source Identification: A Rapid Algorithm with Enhanced Discriminative Power
Published 2024-12-01Subjects: Get full text
Article -
2480
Accelerating the SM3 hash algorithm with CPU‐FPGA Co‐Designed architecture
Published 2021-11-01“…Abstract SM3 hash algorithm developed by the Chinese Government is used in various fields of information security, and it is being widely used in commercial security products. …”
Get full text
Article