Showing 441 - 460 results of 645 for search '"Computational complexity theory', query time: 0.14s Refine Results
  1. 441

    Survey of code-based digital signatures by Yongcheng SONG, Xinyi HUANG, Wei WU, Haixia CHEN

    Published 2021-08-01
    “…The rapid development of quantum computing theory and practice brings great uncertainty to the security of cryptography based on hard problems in number theory.Code-based hard problem is recognized as NP-complete problem, the complexity increases exponentially, and there is currently no threat of quantum computing to code-based cryptographic algorithm.Therefore, code-based algorithm can resist the quantum algorithm attack, which is one of the main directions of quantum-resistant cryptography.It is still an open problem to design secure and efficient code-based signatures.For many years, international researchers use classical and new methods to construct code-based signatures, but existing constructions are weak in security or poor in performance.Code-based signatures were comprehensively summarized and analyzed, and future research directions were indicated.…”
    Get full text
    Article
  2. 442

    Adaptive Hierarchical Collocation Method for Solving Fractional Population Diffusion Model by Linqiang Yang, Yafei Liu, Hongmei Ma, Xue Liu, Shuli Mei

    Published 2023-01-01
    “…This paper presents an adaptive hierarchical collocation method for solving this model, enhancing the efficiency of algorithms based on Low-Complexity Shannon-Cosine wavelet derived from combinatorial identity theory. …”
    Get full text
    Article
  3. 443

    Multi-threshold algorithm about image segmentation based on polynomial uniform approximation by Yan-jun WEI, Bo-qin FENG, Wei-guo WU

    Published 2016-10-01
    “…Aiming at those shortcomings of previous multi-threshold image segmentation algorithm such as large complexity and instability caused by the image histogram glitch interference,a new multi-threshold image segmentation algorithm was proposed using Bernstein polynomial to uniformly approximate histogram curve.First,according to the approximation theory of Weierstrass to construct Bernstein polynomial for the histogram curve,then more difficult peak value calculating of the histogram was reduced to the Bernstein polynomial extremal generating,that was exported easily by the first and second derivative of Bernstein polynomial function,and finally obtain the actual peak value of the image histogram by picking up these extremes and polar values and filtering through classification algorithm,and finish multi-threshold image segmentation.Experimental results show that the algorithm is insensitive for histogram glitch interference,the overall is stable,the redundant computation and time complexity are smaller,with less time and high efficiency,the approximate performance and segmentation effect are better.…”
    Get full text
    Article
  4. 444

    Trust evaluation algorithm of IoT edge server based on cooperation reputation and device feedback by Lin ZHANG, Xinyan WEI, Xiping LIU, Haiping HUANG, Ruchuan WANG

    Published 2022-02-01
    “…Aiming at the security problem of edge server, a trust evaluation algorithm was proposed, which integrated server cooperation reputation and device user feedback to improve the security of edge computing context.In the process of interaction, a fusion algorithm based on objective information entropy theory was used to aggregate the cooperation reputation between servers, and a partial homomorphic encryption algorithm was used to prevent the leakage of user data in the process of interaction.After the interaction, the highly trusted device node was selected to calculate the feedback trust, which overcame the malicious feedback of the traditional mechanism.When calculating the global trust, the expected score of the server and the adaptive weight calculation method were considered, which overcame the limitations of the traditional trust scheme.The experimental results show that the proposed trust calculation scheme has low time complexity and spatial complexity, and can effectively resist the attack of malicious nodes.…”
    Get full text
    Article
  5. 445
  6. 446

    A Comprehensive Model and Numerical Study of Shear Flow in Compressible Viscous Micropolar Real Gases by Nelida Črnjarić, Ivan Dražić

    Published 2024-12-01
    “…However, the finite-difference method offers advantages in speed, stability, and lower computational demands. This research bridges gaps in existing models and establishes a foundation for further investigations into complex flow phenomena in micropolar real gases.…”
    Get full text
    Article
  7. 447

    A Lightweight CNN-Transformer Implemented via Structural Re-Parameterization and Hybrid Attention for Remote Sensing Image Super-Resolution by Jie Wang, Hongwei Li, Yifan Li, Zilong Qin

    Published 2024-12-01
    “…The proposed approach achieves SR reconstruction for remote sensing images with fewer parameters and less computational overhead than those of traditional transformers and high-performance CNN models. …”
    Get full text
    Article
  8. 448
  9. 449

    A Multistep Look-Ahead Deadlock Avoidance Policy for Automated Manufacturing Systems by Chao Gu, Zhiwu Li, Abdulrahman Al-Ahmari

    Published 2017-01-01
    “…This paper focuses on the deadlock avoidance problem for systems of simple sequential processes with resources (S3PR) by using Petri nets structural analysis theory. Inspired by the one-step look-ahead DAP that is an established result, which is of polynomial complexity, for an S3PR without one-unit-capacity resources shared by two or more resource-transition circuits (in the Petri net model) that do not include each other, this research explores a multiple-step look-ahead deadlock avoidance policy for a system modeled with an S3PR that contains a shared one-unit-capacity resource in resource-transition circuits. …”
    Get full text
    Article
  10. 450

    Energy consumption optimization scheme in UAV-assisted MEC system based on optimal SIC order by Wei JI, Xuxin YANG, Fei LI, Ting LI, Yan LIANG, Yunchao SONG

    Published 2024-02-01
    “…In uplink non-orthogonal multiple access (NOMA)-based unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) system, the successive interference cancellation (SIC) order of NOMA became a bottleneck limiting the transmission performance of task offload in uplink link.To reduce the energy consumption of the system, the SIC order was discussed and the optimal SIC order based on channel gain and task delay constraint was proposed.The optimization problem of minimizing the system energy consumption was proposed based on the optimal SIC order while satisfying the constraints of the given task delay of the device, the maximum transmit power constraint of the device, and the UAV trajectory.Since the problem was a complex non-convex problem, an alternating optimization method was adopted to solve the optimization problem to achieve power allocation and UAV trajectory optimization.A low-complexity algorithm based on matching theory was proposed to obtain the optimal device grouping in different time slots.Simulation results show that the optimal SIC order can realize smaller system energy consumption under the same task delay constraint compared with other SIC order, the proposed low-complexity device grouping algorithm can obtain the optimal device grouping.…”
    Get full text
    Article
  11. 451

    Trends in Language Formalization in Architecture by Franklim Morais Pereira

    Published 2014-12-01
    “…This is the domain where the more recent advances in formal languages (such as discrete maths, theory of computation, logics, language theory, higher algebras, decision theory) have been applied more often and profoundly. …”
    Get full text
    Article
  12. 452

    Observer-Based Adaptive Neural Control of Quadrotor Unmanned Aerial Vehicles Subject to Model Uncertainties and External Disturbances by Rashin Mousavi, Arash Mousavi, Yashar Mousavi, Mahsa Tavasoli, Aliasghar Arab, Ibrahim Beklan Kucukdemiral, Afef Fekih

    Published 2024-12-01
    “…A direct control approach is employed, significantly reducing computational complexity by minimizing the need for frequent online parameter updates while maintaining high tracking precision and robustness. …”
    Get full text
    Article
  13. 453

    Discovery of Staircase Chirality through the Design of Unnatural Amino Acid Derivatives by Anis U. Rahman, Yu Wang, Ting Xu, Kambham Devendra Reddy, Shengzhou Jin, Jasmine X. Yan, Qingkai Yuan, Daniel Unruh, Ruibin Liang, Guigen Li

    Published 2024-01-01
    “…Remarkably, one of the staircase molecules exhibits 4 distinct types of chirality: central, orientational, turbo, and staircase chirality, a combination that has not been previously documented in the literature. Computational studies using density functional theory (DFT) calculations were conducted to analyze the relative energies of individual staircase isomers, and the results are in agreement with our experimental findings. …”
    Get full text
    Article
  14. 454

    Vertex Coloring and Eulerian and Hamiltonian Paths of Delaunay Graphs Associated with Sensor Networks by Manuel Ceballos, María Millán

    Published 2024-12-01
    “…In this paper, we explore the connection between sensor networks and graph theory. Sensor networks represent distributed systems of interconnected devices that collect and transmit data, while graph theory provides a robust framework for modeling and analyzing complex networks. …”
    Get full text
    Article
  15. 455

    Hybrid Cryptosystem Using Polybius and Elgamal Algorithm Over the Gaussian Integers by Hiba A. Khalaf, Rifaat Z. Khalaf

    Published 2024-01-01
    “… In composition theory, computer security, and engineering are all closely related fields under which cryptography, a technology that deals with data security, falls. …”
    Get full text
    Article
  16. 456
  17. 457
  18. 458

    Discovering Representations of Democracy in Big Data: Purposive Semantic Sample Selection for Qualitative and Mixed-Methods Research by Hubert Plisiecki, Agnieszka Kwiatkowska

    Published 2024-11-01
    “…Our contribution includes validating this NLP approach for social sciences and humanities as well as providing a robust tool for researchers, facilitating deeper qualitative analysis and exploration of big data corpora within the computational grounded theory framework.…”
    Get full text
    Article
  19. 459

    A Bilevel Approach to the Facility Location Problem with Customer Preferences Under a Mill Pricing Policy by Herminia I. Calvete, Carmen Galé, Aitor Hernández, José A. Iranzo

    Published 2024-11-01
    “…This allows for a more accurate representation of customer preferences and the resulting decisions regarding facility location and pricing. To address the complexities of this model, we apply duality theory to the lower-level problems and, ultimately, reformulate the bilevel problem as a single-level mixed-integer optimization problem. …”
    Get full text
    Article
  20. 460

    Optimal dimensions of steel welded beams with hinged support units by G. M. Bazhin

    Published 2023-11-01
    “…At the present time, the requirements to reliability and durability of steel structures, as well as their economic feasibility, are increasing. Considering the complexity of analyzing multiple factors influencing the strength, stability and durability of steel welded beams, a new approach to the determination of optimal dimensions based on maximum-strain-energy theory is proposed, with the derivation of new coefficients to simplify the selection of beam cross-sections.Materials and methods. …”
    Get full text
    Article