Showing 1,081 - 1,100 results of 19,511 for search '"Algorithms"', query time: 0.10s Refine Results
  1. 1081
  2. 1082
  3. 1083

    Multicast service protection algorithm based on elastic optical network by Jingjing WU, Jianfang ZHANG

    Published 2019-03-01
    “…With the rapid growth of the network traffic,the elastic optical network (EON) has been proposed as a promising solution due to its high spectrum efficiency and flexible bandwidth provision.Meanwhile,multicast routing and spectrum allocation,and the survivability of the network become more challenging than that in the conventional optical network.The routing for multicast traffic and its protection algorithm in EON was investigated.An integer linear programming (ILP) formulation with the objective to minimize total spectrum consumption was presented.In addition,a heuristic algorithm called multicast sub-tree protection algorithm (MSPA) to achieve sufficient protection and satisfy resources savings was designed.The simulation results demonstrate that comparing with the traditional multicast routing and protection algorithm,MSPA performs well in improving the blocking probability and the spectrum utilization of the network.…”
    Get full text
    Article
  4. 1084

    Simple-Random-Sampling-Based Multiclass Text Classification Algorithm by Wuying Liu, Lin Wang, Mianzhu Yi

    Published 2014-01-01
    “…Multiclass text classification (MTC) is a challenging issue and the corresponding MTC algorithms can be used in many applications. The space-time overhead of the algorithms must be concerned about the era of big data. …”
    Get full text
    Article
  5. 1085

    An Improved Genetic Algorithm for Developing Deterministic OTP Key Generator by Ashish Jain, Narendra S. Chaudhari

    Published 2017-01-01
    “…Hereby we would like to mention that no prior experimental work has been presented in the literature which is directly related to the OTP key generation using evolutionary algorithms. Therefore, this work can be considered as a guideline for future research.…”
    Get full text
    Article
  6. 1086

    Task scheduling algorithm for distributed environment based on signal-driven by Yu XIN, Jing YANG, Zhi-qiang XIE

    Published 2015-07-01
    “…In order to optimize the performance of user services in IaaS,the task scheduling algorithm for IaaS based on signal-driven is proposed,by which CS(control subsystem) and NS(inquiry nodes subsystem) based on the structural characteristics of the IaaS is established,and the DAG scheduling model based on the structural characteristics of the inquiry task is created.Then the conversion mechanism for the task partitions is created,constructing the signal communication mechanism for CS and NS,changing the status of the task partitions by signal-driven between the CS and NS,completing the task partitions allocation by POSS (parallel optimization selective strategy) in the scheduling time.This algorithm with low complexity is compatible with the distributed architecture of IaaS,because of utilizing dual system control mode.The effectiveness and practicality of this algorithm is verified by experiment.…”
    Get full text
    Article
  7. 1087
  8. 1088

    Decision feedback demodulation algorithm for recursive SOQPSK-TG signal by UNJin-hua S, ANHui-mei H

    Published 2014-07-01
    “…Simulation results show that at E<sub>b</sub>/N<sub>0</sub>≥0 dB, the decision feedback demodulation algorithm can achieve a BER performance which is very close to four-state demodulation algorithm performance.…”
    Get full text
    Article
  9. 1089
  10. 1090
  11. 1091

    Computation task offloading algorithm and system level simulation for vehicles by Qicheng ZENG, Yuxuan SUN, Sheng ZHOU

    Published 2019-09-01
    “…With the development of autonomous driving and vehicular network,more and more vehicles will have powerful computing capabilities and connection with each other via wireless network.These computing resources can not only be applied to automatic driving,but also provide a wide range of edge computing services.Aiming at the task offloading among vehicles,a distributed task offloading algorithm based on online learning was proposed to minimize the average offloading delay.Furthermore,a system-level simulation platform was built to evaluate the impact of vehicle density and number of tasks on the average offloading delay in both highway and urban scenarios.The results provide a reference for the resource allocation and deployment of task offloading in different traffic situations.…”
    Get full text
    Article
  12. 1092

    A Hybrid Algorithm of GA + Simplex Method in the WSN Localization by Feng Wang, Cong Wang, ZiZhong Wang, Xue-ying Zhang

    Published 2015-07-01
    “…In order to solve the large-error problem in the third phase and the poor position accuracy of the least square method in the weighted DV-Hop algorithm, a hybrid algorithm of GA + simplex method was proposed in this paper. …”
    Get full text
    Article
  13. 1093
  14. 1094
  15. 1095

    Accelerated algorithm in attribute-based encryption over cloud environment by Guowei WU, Ning FAN, Laifu WANG, Shuai WANG, Jun SHEN, Huamin JIN

    Published 2019-11-01
    “…Cloud computing provides storage,computing and network services to tenants.Data security and data sharing and access control between tenants are indispensable functions.Attribute-based encryption (ABE) system is a one to many encryption system,which allows users to fine -grained access control on encrypted data according to users’ attributes.This encryption system is very suitable for multi-tenant data sharing overcloud computing environment.However,the existing attribute-based encryption schemes is inefficient,which cannot be applied to practical applications.Two types of ABE and their application scenarios were analyzed,and an acceleration algorithms scheme in attribute encryption cryptosystem was proposed.The experiment can illustrate that the proposed scheme can improve the efficiency of key generation algorithm,encryption algorithm and decryption algorithm.…”
    Get full text
    Article
  16. 1096

    Semi-supervised tri-Adaboost algorithm for network intrusion detection by Yali Yuan, Liuwei Huo, Yachao Yuan, Zhixiao Wang

    Published 2019-06-01
    “…Here, a semi-supervised tri-Adaboost (STA) algorithm is proposed. In the algorithm, three different Adaboost algorithms are used as the weak classifiers (both for continuous and categorical data), constituting the decision stumps in the tri-training method. …”
    Get full text
    Article
  17. 1097

    Sensor fault detection algorithm based on credibility and neighbor-cooperation by Yan-fei LIN, Su-jie SHAO, Cheng ZHONG, Shao-yong GUO, Xue-song QIU

    Published 2016-09-01
    “…To effectively detect whether a node was failure,one of the effective sensor fault detection methods was to compare historical data of suspicious node with its neighbors.The key points of this method were identification of suspicious nodes,as well as decision problem of sending timing for fault diagnosis messages.To this end,a sensor fault detection algorithm was presented based on credibility and neighbor-cooperation.Firstly,a credibility model to determine whether nodes are suspicious was established.Then suspicious nodes send fault diagnosis requests to neighbor nodes based on neighbor-cooperation.The sending timing was determined by equal probability time window.Finally,it could finish classification of fault condition and state judgment based on diagnosis responds of neighbor nodes.Simulation experiments show that this algorithm can achieve higher fault detection rate with less fault diagnosis times and low data congestion probability.…”
    Get full text
    Article
  18. 1098

    A robust audio steganography algorithm based on differential evolution by Zhaopin SU, Chaoyong SHEN, Guofu ZHANG, Feng YUE, Donghui HU

    Published 2021-11-01
    “…., segmented scaling parameters and steganography capacity) and imperceptibility as well as robustness was analyzed.Next, a multi-objective optimization model of audio steganography was presented, in which segmented scaling parameters and steganography capacity were decision variables, imperceptibility and steganography capacity were optimization objectives, and the signal-to-noise ratio was a constraint.Then, a robust audio steganography algorithm based on differential evolution was proposed, including the corresponding encoding, fitness function, crossover and mutation operators.Finally, comparative experimental results show that the proposed steganography algorithm can achieve better robustness against common signal processing attacks on the premise of ensuring imperceptibility and anti-detection.…”
    Get full text
    Article
  19. 1099

    FPGA Implementation of A∗ Algorithm for Real-Time Path Planning by Yuzhi Zhou, Xi Jin, Tianqi Wang

    Published 2020-01-01
    “…The traditional A∗ algorithm is time-consuming due to a large number of iteration operations to calculate the evaluation function and sort the OPEN list. …”
    Get full text
    Article
  20. 1100

    Design of steganography algorithm based on MPEG-4 coding scheme by YUAN Kai-guo, ZHANG Ru, XU Xin, NIU Xin-xin, YANG Yi-xian

    Published 2009-01-01
    “…An information hiding algorithm based on MPEG-4 texture coding was proposed. …”
    Get full text
    Article