-
2081
Automated mining of packet signatures for traffic identification at application layer with apriori algorithm
Published 2008-01-01Subjects: Get full text
Article -
2082
AEUR: authenticated encryption algorithm design based on uBlock round function
Published 2023-08-01“…In order to improve the efficiency of the implementation of the authenticated encryption algorithm without compromising the security of the algorithm, a new authenticated encryption algorithm AEUR was designed.Firstly, based on the uBlock round function, with resistance to internal collision attacks as the security objective, a mixed integer linear programming approach was used to search for generic iterative component R(t,s) to meet the security objective.Secondly, the authenticated encryption algorithm AEUR was designed by using this component.AEUR consisted of two parts: authenticated encryption and decrypted verification, both of which performed the same process without the need to design additional operational sessions, reducing the algorithm’s resource consumption.In addition, the correctness of the algorithm was verified by comparing the corresponding round state values, and the security of the algorithm was analyzed using various analysis methods such as linear attacks and sliding attacks.Finally, the algorithm was implemented in C language to prove the AEUR has good performance.The results show that the proposed algorithm has a better overall performance in terms of software runtime, with efficiency improvements of 3% and 46% compared to AEGIS and ALE, and 74% and 92% compared to AES-GCM and ACORN, respectively.…”
Get full text
Article -
2083
Defense against Malicious Users in Cooperative Spectrum Sensing Using Genetic Algorithm
Published 2018-01-01“…In this paper, the FC takes a global decision based on the hard binary decisions received from all SUs. Genetic algorithm (GA) using one-to-many neighbor distance along with z-score as a fitness function is used for the identification of accurate sensing information in the presence of MUs. …”
Get full text
Article -
2084
Tighter bounds on the Gaussian Q-function based on wild horse optimization algorithm
Published 2025-01-01“…Journal of Algorithms & Computational Technology…”
Get full text
Article -
2085
Routing selection algorithm with considering the queuing delay for system protection communication network
Published 2018-10-01“…Currently,a fast and reliable transmission path was calculated by routing algorithm that satisfies the system protection communication network under the requirements of delay and reliability,without considering that when the grid fails or the traffic in the network is excessive,the queuing delay of many nodes in the communication network will greatly increase.Aiming at this problem,a routing algorithm was proposed to solve the minimum queuing delay and improve the real-time performance of wide area protection.Experimental results show that the total information delay of the path calculated by the routing algorithm proposed is the smallest under the requirements of system protection reliability.…”
Get full text
Article -
2086
Structural health evaluation of arch bridge by field test and optimized BPNN algorithm
Published 2023-07-01“…Back Propagation Neural Network (BPNN), Genetic Algorithm-based BPNN (GA-BPNN), Particle Swarm Optimization Algorithm-based BPNN (PSO-BPNN) approaches and test data analysis are adopted to compare the measured data with the simulated data to quantitatively identify the damage degree of the selected bridge. …”
Get full text
Article -
2087
Adaptive-mutation Whale Optimization Algorithm for Flood Control Operation of Reservoir Groups
Published 2023-01-01Subjects: Get full text
Article -
2088
Migration compensation algorithm for maneuvering target in passive radar based on FRT-MLVD
Published 2019-07-01Get full text
Article -
2089
Algorithms for Solving System of Extended General Variational Inclusions and Fixed Points Problems
Published 2012-01-01“…Subsequently, the convergence analysis of the proposed iterative algorithm under some suitable conditions is considered. …”
Get full text
Article -
2090
An efficient routing and cache management algorithm based on interest-community for opportunity networks
Published 2018-06-01Subjects: Get full text
Article -
2091
Path Scheduling and Target Trajectory Optimization in UAVs Based on Dragonfly and Firefly Algorithm
Published 2022-10-01Subjects: Get full text
Article -
2092
Parameter Estimation of the Photovoltaic System Using Bald Eagle Search (BES) Algorithm
Published 2021-01-01“…Up to date, metaheuristic algorithms have proven to be the best methods to obtain accurate values of these intrinsic parameters. …”
Get full text
Article -
2093
A novel lossless encoding algorithm for data compression–genomics data as an exemplar
Published 2025-01-01“…In this study, a novel encoding algorithm is proposed, motivated by the compression of DNA data and associated characteristics. …”
Get full text
Article -
2094
Joint channel estimation and ICI cancellation algorithm for pilot-assisted OFDM systems
Published 2007-01-01“…The inter-carrier interference caused by double-selective channels in OFDM systems was analyzed.An OFDM channel estimation method with new pilot structure was also proposed,based on which the channel estimation in time domain and the ICI cancellation could be done within one OFDM symbol.The simulation results show that the proposed joint channel estimation and ICI cancellation algorithm can provide more accurate channel information,and improve system performance apparently.…”
Get full text
Article -
2095
Presenting an Optimal Algorithm for Resource Scheduling and Code Partition in Mobile Cloud Computing
Published 2022-03-01“…In this paper, a near-optimal strategy is proposed to solve the problems in this field, by using an evolutionary particle swarm algorithm to reduce the range of multiple targets to a proper level. …”
Get full text
Article -
2096
Intelligent interference decision algorithm with prior knowledge embedded LSTM-PPO model
Published 2024-12-01“…Focusing on the issues of low efficiency and effectiveness in decision-making as well as the instability of traditional reinforcement learning model-based multi-function radar (MFR) jamming decision algorithms, a prior knowledge embedded long short-term memory (LSTM) network-proximal policy optimization (PPO) model based intelligent interference decision algorithm was developed. …”
Get full text
Article -
2097
A Vector Algebraic Algorithm for Coverage Compensation in Hybrid Wireless Sensor Networks
Published 2013-11-01“…Particularly, this paper proposes a vector algebra based algorithm by exploring redundant nodes as an extra dimension for coverage compensation. …”
Get full text
Article -
2098
Enhancing Camera Source Identification: A Rapid Algorithm with Enhanced Discriminative Power
Published 2024-12-01Subjects: Get full text
Article -
2099
Optimal Algorithms and the BFGS Updating Techniques for Solving Unconstrained Nonlinear Minimization Problems
Published 2014-01-01“…To solve an unconstrained nonlinear minimization problem, we propose an optimal algorithm (OA) as well as a globally optimal algorithm (GOA), by deflecting the gradient direction to the best descent direction at each iteration step, and with an optimal parameter being derived explicitly. …”
Get full text
Article -
2100
A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges
Published 2025-01-01“…To analyze the efficiency of these algorithms, a comparative study was conducted using crucial factors, including security, secrecy, and integrity. …”
Get full text
Article