Showing 221 - 240 results of 31,575 for search '"algorithm"', query time: 0.17s Refine Results
  1. 221

    An optimized routing algorithm in WSN for smart park by Wei DING, Shuquan LI, Siwei LI, Liangrui TANG, Dandan SUN

    Published 2016-03-01
    “…To solve the energy problem in wireless sensor networks used for smart park,an optimized routing algorithm based on routing cost in WSN was proposed.According to the characteristics of smart park,the algorithm took a comprehensive consideration of the remaining energy and geographical location of nodes and exploited a new routing cost function.The sensor nodes selected the node with the minimum routing cost to forward the packets.Simulation results show that the algorithm significantly reduces the energy consumption of the network and extends the network lifetime effectively.…”
    Get full text
    Article
  2. 222

    ()- model and counting algorithms in dynamic distributed systems by Zhiwei Yang, Weigang Wu, Yishun Chen, Xiaola Lin, Jiannong Cao

    Published 2018-01-01
    “…These algorithms mainly differ in communication cost due to different information collection procedures. …”
    Get full text
    Article
  3. 223

    Scalable overlay multicast algorithm with high stability by Ye SHEN, Jing FENG, Zhan-feng WANG

    Published 2016-05-01
    “…A new scalable overlay multicast algorithm with high stability(SOM-HS)was proposed.In SOM-HS algo-rithm,the node stability and the link weight factor were defined to ensure that the high stability nodes were located in the backbone network of multicast tree.In the hierarchica clustering configuration process,SOM-HS algorithm limits the degree of the nodes to ensure load balancing.The experimental results show that,the maximum delay with SOM-HS al-gorithm is minimum compared to the other existing algorithms in different multicast scales.…”
    Get full text
    Article
  4. 224

    Shot boundary detection algorithm based on ORB by Jiang-qi TANG, Lin-jiang XIE, Qing-sheng YUAN, Dong-ming ZHANG, Xiu-guo BAO, Wei Guo

    Published 2013-11-01
    “…The existing algorithms of SBD show low robustness when there exist camera or object movements, light changes in the scene. …”
    Get full text
    Article
  5. 225

    Analysis and Algorithmic Generation of Hepatic Vascular Systems by Lars Ole Schwen, Tobias Preusser

    Published 2012-01-01
    “…Results of the existing “Constrained Constructive Optimization” algorithm are compared to real vascular tree data. …”
    Get full text
    Article
  6. 226

    NEW ALGORITHM FOR SOLUTION OF MAXIMUM FLOW PROBLEM by A. D. Korznikov

    Published 2013-10-01
    “…A new algorithm for detection of a maximum flow in multi-terminal network. …”
    Get full text
    Article
  7. 227

    Fast algorithm and architecture for embedded block coding by XIONG Cheng-yi1, HOU Jian-hua1, TIAN Jin-wen1, LIU Jian1

    Published 2006-01-01
    “…By using this BPC algorithm, the coefficients bit modeling for all bit planes in a code block were completed as parallel and sequential mode by one scan. …”
    Get full text
    Article
  8. 228

    An Automatic Image Inpainting Algorithm Based on FCM by Jiansheng Liu, Hui Liu, Shangping Qiao, Guangxue Yue

    Published 2014-01-01
    “…Aiming at this drawback of the traditional image inpainting algorithms, this paper proposes an automatic image inpainting algorithm which automatically identifies the repaired area by fuzzy C-mean (FCM) algorithm. …”
    Get full text
    Article
  9. 229
  10. 230

    Reparations of the horse? Algorithmic reparation and overspecialized remedies by Colin Doyle, Melissa Alvarez-Garcia, Pelle Tracey, Gabriel Grill, Cedric Whitney, Lauren M Chambers

    Published 2024-09-01
    “…One understanding of algorithmic reparation is as a method for repairing algorithmic harms. …”
    Get full text
    Article
  11. 231

    Embedding of national cryptographic algorithm in Hyperledger Fabric by Qi CAO, Shuhua RUAN, Xingshu CHEN, Xiao LAN, Hongxia ZHANG, Hongjian JIN

    Published 2021-02-01
    “…Hyperledger Fabric is an extensible alliance blockchain platform and provides support for enterprise-level commercial blockchain projects.The cryptographic algorithm is the core technologies of the platform, ensuring the security and non-tampering of the data on the chain.But the original Fabric platform lacks the national cryptographic algorithm support.The embedding and support of the national cryptographic algorithm of the Fabric platform was designed and implemented.Firstly, the interaction logic of between components and the invocation scenario of each type of cryptographic algorithm in the Fabric platform were analyzed, an idea of embedding national cryptographic algorithm support for the platform was proposed.Secondly, the modules and interfaces for SM2, SM3 and SM4 were added to BCCSP of the Fabric platform based on the open source code of national cryptographic algorithm implementation.Thirdly, the interface of cryptographic algorithm invoked by the upper layer of each component is associated to the interface of corresponding national cryptographic algorithms, which realized the invocation support of national cryptographic algorithm for the upper layer applications.Finally, the correctness and effectiveness of the embedded national cryptographic algorithm were verified by creating a fabric-gm test instance.And compared with the performances of the test instance built by the mirror of the native Fabric platform.The experimental results show that the embedded national cryptographic algorithm interfaces are corrected and the generated national cryptographic certificates are effective.Moreover, compared with the native Fabric platform, the network start up time increases by about 3%.In the millisecond unit, the transaction time cost increases by about one time, the dynamic certificate generation time increases by about 9%, and all the performance are within the acceptable range.…”
    Get full text
    Article
  12. 232

    Cloud scheduling algorithm based on fuzzy clustering by Wen-juan LI, Qi-fei ZHANG, Ling-di PING, Xue-zeng PAN

    Published 2012-03-01
    “…In order to better serve cloud’s objective of providing low-cost and on-demand services,a two-level and fuzzy clustering based cloud scheduling algorithm named FCTLBS(fuzzy clustering and two level based task scheduling algorithm) was proposed.Scheduling was divided into two levels:user scheduling and task cheduling.It used fuzzy clustering method to cluster resources according to their capabilities and computed tasks’resource bias coefficient according to their parameters.Thus tasks with different resource preference were able to choose different capability resources in the corresponding clusters.The new algorithm reduces the scale of resource choice,better reflects cloud tasks’ service requirements.Simulation results show that the proposed algorithm has some advantages compared to other kindred algorithms.…”
    Get full text
    Article
  13. 233

    Greedy algorithms: a review and open problems by Andrea García

    Published 2025-02-01
    Subjects: “…Greedy algorithm…”
    Get full text
    Article
  14. 234

    RTRS algorithm in low-power Internet of things by Yuchen CHEN, Yuan CAO, Laipeng ZHANG, Lianghui DING, Feng YANG

    Published 2019-12-01
    “…Considering the feature of periodical uplink data transmission in IEEE 802.11ah low-power wide area network (LWPAN),a real-time RAW setting (RTRS) algorithm was proposed.Multiple node send data to an access point (AP),and the uplink channel resources were divided into Beacon periods in time.During a Beacon period,AP firstly predicted the next data uploading time and the total amount of devices that will upload data in the next Beacon period.The AP calculated the optimal RAW parameters for minimum energy cost and broadcasted the information to all node.Then all devices upload data according to the RAW scheduling.The simulation results show that the current network state can be predicted accurately according to the upload time of the terminal in the last period.According to the predicted state,raw configuration parameters can be dynamically adjusted and the energy efficiency can be significantly improved.…”
    Get full text
    Article
  15. 235

    Design of Structure and Control Algorithm for Solar Tracker by Huo Xiangru, Hou Li, Wei Yongqiao, Luo Lan, Zhang Qi

    Published 2017-01-01
    “…Finally,the results of the experiments show that the structure design scheme and the tracking algorithm are of great significance for improving the utilization of solar energy.…”
    Get full text
    Article
  16. 236

    Investigating algorithmic bias in student progress monitoring by Jamiu Adekunle Idowu, Adriano Soares Koshiyama, Philip Treleaven

    Published 2024-12-01
    “…This research investigates bias in AI algorithms used for monitoring student progress, specifically focusing on bias related to age, disability, and gender. …”
    Get full text
    Article
  17. 237

    Optimal Algorithms for Nonlinear Equations with Applications and Their Dynamics by Amir Naseem, M. A. Rehman, Nasr Al Din Ide

    Published 2022-01-01
    “…In the present work, we introduce two novel root-finding algorithms for nonlinear scalar equations. Among these algorithms, the second one is optimal according to Kung-Traub’s conjecture. …”
    Get full text
    Article
  18. 238

    The development of algorithms for safe control of an autonomous ship by Monika Rybczak, Agnieszka Lazarowska

    Published 2024-11-01
    “…The paper presents the results of a research on the development of algorithms for ship’s safe ship trajectory calculation and automatic control of the ship along the determined trajectory. …”
    Get full text
    Article
  19. 239

    EFH:an online unsupervised hash learning algorithm by Zhenyu SHOU, Jiangbo QIAN, Yihong DONG, Huahui CHEN

    Published 2020-03-01
    “…Many unsupervised learning to hash algorithm needs to load all data to memory in the training phase,which will occupy a large memory space and cannot be applied to streaming data.An unsupervised online learning to hash algorithm called evolutionary forest hash (EFH) was proposed.In a large-scale data retrieval scenario,the improved evolution tree can be used to learn the spatial topology of the data.A path coding strategy was proposed to map leaf nodes to similarity-preserved binary code.To further improve the querying performance,ensemble learning was combined,and an online evolving forest hashing method was proposed based on the evolving trees.Finally,the feasibility of this method was proved by experiments on two widely used data sets.…”
    Get full text
    Article
  20. 240

    Algorithm of blockchain data provenance based on ABE by Youliang TIAN, Kedi YANG, Zuan WANG, Tao FENG

    Published 2019-11-01
    “…To solve the problem that the blockchain-based traceability algorithm mainly used homomorphic encryption and zero-knowledge proof for privacy protection,making it difficult to achieve dynamic sharing of traceability information,a blockchain data traceability algorithm based on attribute encryption was proposed.In order to realize the dynamic protection of transaction privacy,the strategy update algorithm applicable to block chain was designed based on the CP-ABE scheme proposed by Waters to achieve dynamic protection of transaction privacy.In order to realize the dynamic update of the visibility about block content,based on the strategy update algorithm,the block structure was designed to achieve the dynamic update about the content visibility of the block.The security and experimental simulation analysis show that the proposed algorithm can realize the dynamic sharing of traceability information while completing the protection transaction privacy.…”
    Get full text
    Article