Suggested Topics within your search.
Suggested Topics within your search.
-
221
An optimized routing algorithm in WSN for smart park
Published 2016-03-01“…To solve the energy problem in wireless sensor networks used for smart park,an optimized routing algorithm based on routing cost in WSN was proposed.According to the characteristics of smart park,the algorithm took a comprehensive consideration of the remaining energy and geographical location of nodes and exploited a new routing cost function.The sensor nodes selected the node with the minimum routing cost to forward the packets.Simulation results show that the algorithm significantly reduces the energy consumption of the network and extends the network lifetime effectively.…”
Get full text
Article -
222
()- model and counting algorithms in dynamic distributed systems
Published 2018-01-01“…These algorithms mainly differ in communication cost due to different information collection procedures. …”
Get full text
Article -
223
Scalable overlay multicast algorithm with high stability
Published 2016-05-01“…A new scalable overlay multicast algorithm with high stability(SOM-HS)was proposed.In SOM-HS algo-rithm,the node stability and the link weight factor were defined to ensure that the high stability nodes were located in the backbone network of multicast tree.In the hierarchica clustering configuration process,SOM-HS algorithm limits the degree of the nodes to ensure load balancing.The experimental results show that,the maximum delay with SOM-HS al-gorithm is minimum compared to the other existing algorithms in different multicast scales.…”
Get full text
Article -
224
Shot boundary detection algorithm based on ORB
Published 2013-11-01“…The existing algorithms of SBD show low robustness when there exist camera or object movements, light changes in the scene. …”
Get full text
Article -
225
Analysis and Algorithmic Generation of Hepatic Vascular Systems
Published 2012-01-01“…Results of the existing “Constrained Constructive Optimization” algorithm are compared to real vascular tree data. …”
Get full text
Article -
226
NEW ALGORITHM FOR SOLUTION OF MAXIMUM FLOW PROBLEM
Published 2013-10-01“…A new algorithm for detection of a maximum flow in multi-terminal network. …”
Get full text
Article -
227
Fast algorithm and architecture for embedded block coding
Published 2006-01-01“…By using this BPC algorithm, the coefficients bit modeling for all bit planes in a code block were completed as parallel and sequential mode by one scan. …”
Get full text
Article -
228
An Automatic Image Inpainting Algorithm Based on FCM
Published 2014-01-01“…Aiming at this drawback of the traditional image inpainting algorithms, this paper proposes an automatic image inpainting algorithm which automatically identifies the repaired area by fuzzy C-mean (FCM) algorithm. …”
Get full text
Article -
229
The general quasi-order algorithm in number theory
Published 1986-01-01Subjects: Get full text
Article -
230
Reparations of the horse? Algorithmic reparation and overspecialized remedies
Published 2024-09-01“…One understanding of algorithmic reparation is as a method for repairing algorithmic harms. …”
Get full text
Article -
231
Embedding of national cryptographic algorithm in Hyperledger Fabric
Published 2021-02-01“…Hyperledger Fabric is an extensible alliance blockchain platform and provides support for enterprise-level commercial blockchain projects.The cryptographic algorithm is the core technologies of the platform, ensuring the security and non-tampering of the data on the chain.But the original Fabric platform lacks the national cryptographic algorithm support.The embedding and support of the national cryptographic algorithm of the Fabric platform was designed and implemented.Firstly, the interaction logic of between components and the invocation scenario of each type of cryptographic algorithm in the Fabric platform were analyzed, an idea of embedding national cryptographic algorithm support for the platform was proposed.Secondly, the modules and interfaces for SM2, SM3 and SM4 were added to BCCSP of the Fabric platform based on the open source code of national cryptographic algorithm implementation.Thirdly, the interface of cryptographic algorithm invoked by the upper layer of each component is associated to the interface of corresponding national cryptographic algorithms, which realized the invocation support of national cryptographic algorithm for the upper layer applications.Finally, the correctness and effectiveness of the embedded national cryptographic algorithm were verified by creating a fabric-gm test instance.And compared with the performances of the test instance built by the mirror of the native Fabric platform.The experimental results show that the embedded national cryptographic algorithm interfaces are corrected and the generated national cryptographic certificates are effective.Moreover, compared with the native Fabric platform, the network start up time increases by about 3%.In the millisecond unit, the transaction time cost increases by about one time, the dynamic certificate generation time increases by about 9%, and all the performance are within the acceptable range.…”
Get full text
Article -
232
Cloud scheduling algorithm based on fuzzy clustering
Published 2012-03-01“…In order to better serve cloud’s objective of providing low-cost and on-demand services,a two-level and fuzzy clustering based cloud scheduling algorithm named FCTLBS(fuzzy clustering and two level based task scheduling algorithm) was proposed.Scheduling was divided into two levels:user scheduling and task cheduling.It used fuzzy clustering method to cluster resources according to their capabilities and computed tasks’resource bias coefficient according to their parameters.Thus tasks with different resource preference were able to choose different capability resources in the corresponding clusters.The new algorithm reduces the scale of resource choice,better reflects cloud tasks’ service requirements.Simulation results show that the proposed algorithm has some advantages compared to other kindred algorithms.…”
Get full text
Article -
233
Greedy algorithms: a review and open problems
Published 2025-02-01Subjects: “…Greedy algorithm…”
Get full text
Article -
234
RTRS algorithm in low-power Internet of things
Published 2019-12-01“…Considering the feature of periodical uplink data transmission in IEEE 802.11ah low-power wide area network (LWPAN),a real-time RAW setting (RTRS) algorithm was proposed.Multiple node send data to an access point (AP),and the uplink channel resources were divided into Beacon periods in time.During a Beacon period,AP firstly predicted the next data uploading time and the total amount of devices that will upload data in the next Beacon period.The AP calculated the optimal RAW parameters for minimum energy cost and broadcasted the information to all node.Then all devices upload data according to the RAW scheduling.The simulation results show that the current network state can be predicted accurately according to the upload time of the terminal in the last period.According to the predicted state,raw configuration parameters can be dynamically adjusted and the energy efficiency can be significantly improved.…”
Get full text
Article -
235
Design of Structure and Control Algorithm for Solar Tracker
Published 2017-01-01“…Finally,the results of the experiments show that the structure design scheme and the tracking algorithm are of great significance for improving the utilization of solar energy.…”
Get full text
Article -
236
Investigating algorithmic bias in student progress monitoring
Published 2024-12-01“…This research investigates bias in AI algorithms used for monitoring student progress, specifically focusing on bias related to age, disability, and gender. …”
Get full text
Article -
237
Optimal Algorithms for Nonlinear Equations with Applications and Their Dynamics
Published 2022-01-01“…In the present work, we introduce two novel root-finding algorithms for nonlinear scalar equations. Among these algorithms, the second one is optimal according to Kung-Traub’s conjecture. …”
Get full text
Article -
238
The development of algorithms for safe control of an autonomous ship
Published 2024-11-01“…The paper presents the results of a research on the development of algorithms for ship’s safe ship trajectory calculation and automatic control of the ship along the determined trajectory. …”
Get full text
Article -
239
EFH:an online unsupervised hash learning algorithm
Published 2020-03-01“…Many unsupervised learning to hash algorithm needs to load all data to memory in the training phase,which will occupy a large memory space and cannot be applied to streaming data.An unsupervised online learning to hash algorithm called evolutionary forest hash (EFH) was proposed.In a large-scale data retrieval scenario,the improved evolution tree can be used to learn the spatial topology of the data.A path coding strategy was proposed to map leaf nodes to similarity-preserved binary code.To further improve the querying performance,ensemble learning was combined,and an online evolving forest hashing method was proposed based on the evolving trees.Finally,the feasibility of this method was proved by experiments on two widely used data sets.…”
Get full text
Article -
240
Algorithm of blockchain data provenance based on ABE
Published 2019-11-01“…To solve the problem that the blockchain-based traceability algorithm mainly used homomorphic encryption and zero-knowledge proof for privacy protection,making it difficult to achieve dynamic sharing of traceability information,a blockchain data traceability algorithm based on attribute encryption was proposed.In order to realize the dynamic protection of transaction privacy,the strategy update algorithm applicable to block chain was designed based on the CP-ABE scheme proposed by Waters to achieve dynamic protection of transaction privacy.In order to realize the dynamic update of the visibility about block content,based on the strategy update algorithm,the block structure was designed to achieve the dynamic update about the content visibility of the block.The security and experimental simulation analysis show that the proposed algorithm can realize the dynamic sharing of traceability information while completing the protection transaction privacy.…”
Get full text
Article