-
2001
Dynamic load balancing algorithm based on queuing theory comprehensive index evaluation
Published 2018-07-01“…Internet communication,computer cluster and cloud environment have complex and dynamic characteristics,which can cause load imbalance easily,reduce the service efficiency and increase the energy consumption.Therefore,the load balancing technology becomes the focus of research.The existing load balancing strategy uses the occupancy of CPU,memories,processes to estimate the current load of each server.But it is hard to guarantee its accuracy.Aiming at this problem,a dynamic load balancing algorithm based on queuing theory comprehensive index evaluation was proposed.Firstly,queuing theory model was introduced to estimate the real-time load of each server,and then the tasks of input queue was distributed to each server separately according to the load comprehensive index of each server.Experimental results show that this method can balance the load of each server effectively and reduce the average waiting time of the task requests,which is of great application value.…”
Get full text
Article -
2002
A Dynamic Multistage Hybrid Swarm Intelligence Optimization Algorithm for Function Optimization
Published 2012-01-01“…A novel dynamic multistage hybrid swarm intelligence optimization algorithm is introduced, which is abbreviated as DM-PSO-ABC. …”
Get full text
Article -
2003
Regeneration Filter: Enhancing Mosaic Algorithm for Near Salt & Pepper Noise Reduction
Published 2025-01-01Get full text
Article -
2004
Sequential Uniformly Reweighted Sum-Product Algorithm for Cooperative Localization in Wireless Networks
Published 2014-08-01“…The proposed algorithm combines the distributed nature of belief propagation (BP) with the improved performance of sequential tree-reweighted message passing (TRW-S) algorithm. …”
Get full text
Article -
2005
A genetic algorithm based method of optimizing dispersion matrix for RDSM system
Published 2022-12-01Subjects: Get full text
Article -
2006
Handover algorithm using fast DAD mechanism for hierarchical mobile IPv6
Published 2008-01-01“…To solve the problem that the duplicate address detection (DAD) in hierarchical mobile IPv6 (HMIPv6) links too time consuming, a handover algorithm based on fast DAD mechanism for HMIPv6 was proposed. …”
Get full text
Article -
2007
Convergence of an Iterative Algorithm for Common Solutions for Zeros of Maximal Accretive Operator with Applications
Published 2012-01-01“…The aim of this paper is to introduce an iterative algorithm for finding a common solution of the sets (A+M2)−1(0) and (B+M1)−1(0), where M is a maximal accretive operator in a Banach space and, by using the proposed algorithm, to establish some strong convergence theorems for common solutions of the two sets above in a uniformly convex and 2-uniformly smooth Banach space. …”
Get full text
Article -
2008
Representing and Quantifying Conformational Changes of Kinases and Phosphatases Using the TSR-Based Algorithm
Published 2024-11-01“…We have developed a triangular spatial relationship (TSR)-based algorithm that enables a unique representation of a protein’s 3D structure using a vector of integers (keys). …”
Get full text
Article -
2009
LDPC code reconstruction based on algorithm of finding low weight code-words
Published 2017-06-01“…LDPC code reconstruction without a candidate set is one of the tough problems in channel code reconstruction.First,theoretical analysis was provided for the number of received code-vectors needed for the reconstruction,and a lower bound was derived.Then,according to the lower bound,and based on an algorithm for finding low weight code-words,a new reconstruction method was proposed.It looked for low weight vectors one by one from the dual space of the received code-vector space and used them to reconstruct the sparse parity-check matrices.Number of iterations and the computational complexity of the method were analyzed based on exponential distribution theory.Under noise-free conditions,drawbacks of the existing method,including limited applicable range and large quantity of required data,have been overcame.Under noisy conditions,the proposed method has higher robustness against noise and relatively low complexity,compared to existing methods.For QC-LDPC codes,the reconstruction performance can be further improved using the quasi-cyclic property of their sparse parity-check matrices.…”
Get full text
Article -
2010
Algorithm Indicating Moment of P-Wave Arrival Based on Second-Moment Characteristic
Published 2016-01-01“…In order to save time required to indicate P-wave arrival moment manually, one can benefit from automatic picking algorithms. In this paper two algorithms based on a method finding a regime switch point are applied to seismic event data in order to find P-wave arrival time. …”
Get full text
Article -
2011
A METHOD FOR MONITORING RICE SEED LOSS BASED ON WOA-BP ALGORITHM
Published 2025-01-01“…Aiming at the problems of the slow response speed and low monitoring accuracy of the existing domestic seed loss rate monitoring models, this paper proposed a rice seed loss rate monitoring method based on the whale optimization algorithm-back propagation neural network (WOA-BP). …”
Get full text
Article -
2012
Consensus Control of Second-Order Multiagent Systems with Particle Swarm Optimization Algorithm
Published 2018-01-01“…In order to improve the control effect of a given system, the particle swarm optimization (PSO) algorithm is introduced and an improved PSO algorithm is proposed. …”
Get full text
Article -
2013
Research on the Roller Contact Load Algorithm of Rolling Bearings Based on the Equivalent Substitution
Published 2023-06-01Get full text
Article -
2014
Retracted: Association Rule Mining Algorithm in College Students’ Quality Evaluation System
Published 2023-01-01Get full text
Article -
2015
Image visualization encryption algorithm based on Shamir threshold secret key sharing
Published 2018-07-01“…An image visualization encryption algorithm with authentication function by using Shamir scheme was proposed.The main idea of this algorithm is to obtain the data by segmenting the binary secret image into blocks.Then,Shamir scheme was used to obtain the sub-secret data and simultaneously sign the secret image with the SM2 signature algorithm.And it would embed the shared data and signature information into carrier images.When the restoration is required,a specified number of sub-secret images are required for information extraction,restoration and authentication.The simulation experiment of the scheme shows that the secret image sharing scheme improves the security of secret image storage and transmission.…”
Get full text
Article -
2016
Based on optimally rigid graph energy efficient distributed topology control algorithm
Published 2013-12-01“…To solve the problem that most of existing algorithms cannot balance energy consumption,the energy efficient distributed topology control algorithm (OREE) based on optimally rigid graph was presented.Through the link weight function reflecting both the energy consumption and residual energy of two end nodes,OREE builds a dynamic network topology that changes with the variation of node energy,and thus balances energy consumption of nodes.The topology derived under OREE is 2-connected and sparse was proved,and the average degree of nodes in the topology converges to four approximately.Furthermore,simulation results show that OREE can balance energy consumption of nodes effi-ciently compared with other algorithms,thereby extend the lifetime of networks.…”
Get full text
Article -
2017
Correlation Analysis of Japanese Literature and Psychotherapy Effects Based on an Equation Diagnosis Algorithm
Published 2022-01-01“…In this paper, an equation diagnosis algorithm based on iterative learning for a class of linear discrete systems is studied, and the existing discrete iterative learning diagnostics are improved. …”
Get full text
Article -
2018
Image Texture Analysis and Edge Detection Algorithm Based on Anisotropic Diffusion Equation
Published 2021-01-01“…We propose a class of image texture analysis algorithms based on anisotropic diffusion equations and discrete gray level sets. …”
Get full text
Article -
2019
A Buffer-Sizing Algorithm for Network-on-Chips with Multiple Voltage-Frequency Islands
Published 2012-01-01“…Our algorithm considers both the static and dynamic effects when sizing buffers. …”
Get full text
Article -
2020
Wireless Network Virtualization Resource Sharing considering Dynamic Resource Allocation Algorithm
Published 2022-01-01“…In order to improve the efficiency of wireless network virtualization resource processing, this paper combines the dynamic resource allocation algorithm to construct a wireless network virtualization resource sharing model. …”
Get full text
Article