Showing 2,461 - 2,480 results of 19,511 for search '"Algorithms"', query time: 0.07s Refine Results
  1. 2461
  2. 2462
  3. 2463
  4. 2464

    AEUR: authenticated encryption algorithm design based on uBlock round function by Yatao YANG, Hui DONG, Jiantao LIU, Yanshuo ZHANG

    Published 2023-08-01
    “…In order to improve the efficiency of the implementation of the authenticated encryption algorithm without compromising the security of the algorithm, a new authenticated encryption algorithm AEUR was designed.Firstly, based on the uBlock round function, with resistance to internal collision attacks as the security objective, a mixed integer linear programming approach was used to search for generic iterative component R(t,s) to meet the security objective.Secondly, the authenticated encryption algorithm AEUR was designed by using this component.AEUR consisted of two parts: authenticated encryption and decrypted verification, both of which performed the same process without the need to design additional operational sessions, reducing the algorithm’s resource consumption.In addition, the correctness of the algorithm was verified by comparing the corresponding round state values, and the security of the algorithm was analyzed using various analysis methods such as linear attacks and sliding attacks.Finally, the algorithm was implemented in C language to prove the AEUR has good performance.The results show that the proposed algorithm has a better overall performance in terms of software runtime, with efficiency improvements of 3% and 46% compared to AEGIS and ALE, and 74% and 92% compared to AES-GCM and ACORN, respectively.…”
    Get full text
    Article
  5. 2465

    Defense against Malicious Users in Cooperative Spectrum Sensing Using Genetic Algorithm by Noor Gul, Ijaz Mansoor Qureshi, Atif Elahi, Imtiaz Rasool

    Published 2018-01-01
    “…In this paper, the FC takes a global decision based on the hard binary decisions received from all SUs. Genetic algorithm (GA) using one-to-many neighbor distance along with z-score as a fitness function is used for the identification of accurate sensing information in the presence of MUs. …”
    Get full text
    Article
  6. 2466

    Tighter bounds on the Gaussian Q-function based on wild horse optimization algorithm by Reza Etesami, Mohsen Madadi

    Published 2025-01-01
    “…Journal of Algorithms & Computational Technology…”
    Get full text
    Article
  7. 2467

    Routing selection algorithm with considering the queuing delay for system protection communication network by Chuan LIU, Zaichao HUANG, Jing TAO, Huibin JIA

    Published 2018-10-01
    “…Currently,a fast and reliable transmission path was calculated by routing algorithm that satisfies the system protection communication network under the requirements of delay and reliability,without considering that when the grid fails or the traffic in the network is excessive,the queuing delay of many nodes in the communication network will greatly increase.Aiming at this problem,a routing algorithm was proposed to solve the minimum queuing delay and improve the real-time performance of wide area protection.Experimental results show that the total information delay of the path calculated by the routing algorithm proposed is the smallest under the requirements of system protection reliability.…”
    Get full text
    Article
  8. 2468

    Structural health evaluation of arch bridge by field test and optimized BPNN algorithm by Zhihua Xiong, Zhuoxi Liang, Xulin Mou, Yu Zhang

    Published 2023-07-01
    “…Back Propagation Neural Network (BPNN), Genetic Algorithm-based BPNN (GA-BPNN), Particle Swarm Optimization Algorithm-based BPNN (PSO-BPNN) approaches and test data analysis are adopted to compare the measured data with the simulated data to quantitatively identify the damage degree of the selected bridge. …”
    Get full text
    Article
  9. 2469
  10. 2470
  11. 2471
  12. 2472
  13. 2473

    Parameter Estimation of the Photovoltaic System Using Bald Eagle Search (BES) Algorithm by Ndongmo Fotsa Nicaire, Perabi Ngoffe Steve, Ndjakomo Essiane Salome, Abessolo Ondoua Grégroire

    Published 2021-01-01
    “…Up to date, metaheuristic algorithms have proven to be the best methods to obtain accurate values of these intrinsic parameters. …”
    Get full text
    Article
  14. 2474

    A novel lossless encoding algorithm for data compression–genomics data as an exemplar by Anas Al-okaily, Abdelghani Tbakhi

    Published 2025-01-01
    “…In this study, a novel encoding algorithm is proposed, motivated by the compression of DNA data and associated characteristics. …”
    Get full text
    Article
  15. 2475

    Joint channel estimation and ICI cancellation algorithm for pilot-assisted OFDM systems by JIANG Qi 1, ZHAO Chun-ming 1, JIA Peng 1

    Published 2007-01-01
    “…The inter-carrier interference caused by double-selective channels in OFDM systems was analyzed.An OFDM channel estimation method with new pilot structure was also proposed,based on which the channel estimation in time domain and the ICI cancellation could be done within one OFDM symbol.The simulation results show that the proposed joint channel estimation and ICI cancellation algorithm can provide more accurate channel information,and improve system performance apparently.…”
    Get full text
    Article
  16. 2476

    Presenting an Optimal Algorithm for Resource Scheduling and Code Partition in Mobile Cloud Computing by Raziyeh Ghasemi, Farzaneh Famoori

    Published 2022-03-01
    “…In this paper, a near-optimal strategy is proposed to solve the problems in this field, by using an evolutionary particle swarm algorithm to reduce the range of multiple targets to a proper level. …”
    Get full text
    Article
  17. 2477

    Intelligent interference decision algorithm with prior knowledge embedded LSTM-PPO model by ZHANG Jingke, YANG Kai, LI Chao, WANG Hongyan

    Published 2024-12-01
    “…Focusing on the issues of low efficiency and effectiveness in decision-making as well as the instability of traditional reinforcement learning model-based multi-function radar (MFR) jamming decision algorithms, a prior knowledge embedded long short-term memory (LSTM) network-proximal policy optimization (PPO) model based intelligent interference decision algorithm was developed. …”
    Get full text
    Article
  18. 2478

    A Vector Algebraic Algorithm for Coverage Compensation in Hybrid Wireless Sensor Networks by Ning-ning Qin, Li-xia Guo, Zhi-guo Ding, Bao-guo Xu

    Published 2013-11-01
    “…Particularly, this paper proposes a vector algebra based algorithm by exploring redundant nodes as an extra dimension for coverage compensation. …”
    Get full text
    Article
  19. 2479
  20. 2480

    Accelerating the SM3 hash algorithm with CPU‐FPGA Co‐Designed architecture by Xiaoying Huang, Zhichuan Guo, Mangu Song, Xuewen Zeng

    Published 2021-11-01
    “…Abstract SM3 hash algorithm developed by the Chinese Government is used in various fields of information security, and it is being widely used in commercial security products. …”
    Get full text
    Article