Showing 2,081 - 2,100 results of 19,511 for search '"algorithm"', query time: 0.08s Refine Results
  1. 2081
  2. 2082

    AEUR: authenticated encryption algorithm design based on uBlock round function by Yatao YANG, Hui DONG, Jiantao LIU, Yanshuo ZHANG

    Published 2023-08-01
    “…In order to improve the efficiency of the implementation of the authenticated encryption algorithm without compromising the security of the algorithm, a new authenticated encryption algorithm AEUR was designed.Firstly, based on the uBlock round function, with resistance to internal collision attacks as the security objective, a mixed integer linear programming approach was used to search for generic iterative component R(t,s) to meet the security objective.Secondly, the authenticated encryption algorithm AEUR was designed by using this component.AEUR consisted of two parts: authenticated encryption and decrypted verification, both of which performed the same process without the need to design additional operational sessions, reducing the algorithm’s resource consumption.In addition, the correctness of the algorithm was verified by comparing the corresponding round state values, and the security of the algorithm was analyzed using various analysis methods such as linear attacks and sliding attacks.Finally, the algorithm was implemented in C language to prove the AEUR has good performance.The results show that the proposed algorithm has a better overall performance in terms of software runtime, with efficiency improvements of 3% and 46% compared to AEGIS and ALE, and 74% and 92% compared to AES-GCM and ACORN, respectively.…”
    Get full text
    Article
  3. 2083

    Defense against Malicious Users in Cooperative Spectrum Sensing Using Genetic Algorithm by Noor Gul, Ijaz Mansoor Qureshi, Atif Elahi, Imtiaz Rasool

    Published 2018-01-01
    “…In this paper, the FC takes a global decision based on the hard binary decisions received from all SUs. Genetic algorithm (GA) using one-to-many neighbor distance along with z-score as a fitness function is used for the identification of accurate sensing information in the presence of MUs. …”
    Get full text
    Article
  4. 2084

    Tighter bounds on the Gaussian Q-function based on wild horse optimization algorithm by Reza Etesami, Mohsen Madadi

    Published 2025-01-01
    “…Journal of Algorithms & Computational Technology…”
    Get full text
    Article
  5. 2085

    Routing selection algorithm with considering the queuing delay for system protection communication network by Chuan LIU, Zaichao HUANG, Jing TAO, Huibin JIA

    Published 2018-10-01
    “…Currently,a fast and reliable transmission path was calculated by routing algorithm that satisfies the system protection communication network under the requirements of delay and reliability,without considering that when the grid fails or the traffic in the network is excessive,the queuing delay of many nodes in the communication network will greatly increase.Aiming at this problem,a routing algorithm was proposed to solve the minimum queuing delay and improve the real-time performance of wide area protection.Experimental results show that the total information delay of the path calculated by the routing algorithm proposed is the smallest under the requirements of system protection reliability.…”
    Get full text
    Article
  6. 2086

    Structural health evaluation of arch bridge by field test and optimized BPNN algorithm by Zhihua Xiong, Zhuoxi Liang, Xulin Mou, Yu Zhang

    Published 2023-07-01
    “…Back Propagation Neural Network (BPNN), Genetic Algorithm-based BPNN (GA-BPNN), Particle Swarm Optimization Algorithm-based BPNN (PSO-BPNN) approaches and test data analysis are adopted to compare the measured data with the simulated data to quantitatively identify the damage degree of the selected bridge. …”
    Get full text
    Article
  7. 2087
  8. 2088
  9. 2089

    Algorithms for Solving System of Extended General Variational Inclusions and Fixed Points Problems by Narin Petrot, Javad Balooee

    Published 2012-01-01
    “…Subsequently, the convergence analysis of the proposed iterative algorithm under some suitable conditions is considered. …”
    Get full text
    Article
  10. 2090
  11. 2091
  12. 2092

    Parameter Estimation of the Photovoltaic System Using Bald Eagle Search (BES) Algorithm by Ndongmo Fotsa Nicaire, Perabi Ngoffe Steve, Ndjakomo Essiane Salome, Abessolo Ondoua Grégroire

    Published 2021-01-01
    “…Up to date, metaheuristic algorithms have proven to be the best methods to obtain accurate values of these intrinsic parameters. …”
    Get full text
    Article
  13. 2093

    A novel lossless encoding algorithm for data compression–genomics data as an exemplar by Anas Al-okaily, Abdelghani Tbakhi

    Published 2025-01-01
    “…In this study, a novel encoding algorithm is proposed, motivated by the compression of DNA data and associated characteristics. …”
    Get full text
    Article
  14. 2094

    Joint channel estimation and ICI cancellation algorithm for pilot-assisted OFDM systems by JIANG Qi 1, ZHAO Chun-ming 1, JIA Peng 1

    Published 2007-01-01
    “…The inter-carrier interference caused by double-selective channels in OFDM systems was analyzed.An OFDM channel estimation method with new pilot structure was also proposed,based on which the channel estimation in time domain and the ICI cancellation could be done within one OFDM symbol.The simulation results show that the proposed joint channel estimation and ICI cancellation algorithm can provide more accurate channel information,and improve system performance apparently.…”
    Get full text
    Article
  15. 2095

    Presenting an Optimal Algorithm for Resource Scheduling and Code Partition in Mobile Cloud Computing by Raziyeh Ghasemi, Farzaneh Famoori

    Published 2022-03-01
    “…In this paper, a near-optimal strategy is proposed to solve the problems in this field, by using an evolutionary particle swarm algorithm to reduce the range of multiple targets to a proper level. …”
    Get full text
    Article
  16. 2096

    Intelligent interference decision algorithm with prior knowledge embedded LSTM-PPO model by ZHANG Jingke, YANG Kai, LI Chao, WANG Hongyan

    Published 2024-12-01
    “…Focusing on the issues of low efficiency and effectiveness in decision-making as well as the instability of traditional reinforcement learning model-based multi-function radar (MFR) jamming decision algorithms, a prior knowledge embedded long short-term memory (LSTM) network-proximal policy optimization (PPO) model based intelligent interference decision algorithm was developed. …”
    Get full text
    Article
  17. 2097

    A Vector Algebraic Algorithm for Coverage Compensation in Hybrid Wireless Sensor Networks by Ning-ning Qin, Li-xia Guo, Zhi-guo Ding, Bao-guo Xu

    Published 2013-11-01
    “…Particularly, this paper proposes a vector algebra based algorithm by exploring redundant nodes as an extra dimension for coverage compensation. …”
    Get full text
    Article
  18. 2098
  19. 2099

    Optimal Algorithms and the BFGS Updating Techniques for Solving Unconstrained Nonlinear Minimization Problems by Chein-Shan Liu

    Published 2014-01-01
    “…To solve an unconstrained nonlinear minimization problem, we propose an optimal algorithm (OA) as well as a globally optimal algorithm (GOA), by deflecting the gradient direction to the best descent direction at each iteration step, and with an optimal parameter being derived explicitly. …”
    Get full text
    Article
  20. 2100

    A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges by Donagani Ramakrishna, Mohammed Ali Shaik

    Published 2025-01-01
    “…To analyze the efficiency of these algorithms, a comparative study was conducted using crucial factors, including security, secrecy, and integrity. …”
    Get full text
    Article