Suggested Topics within your search.
Suggested Topics within your search.
-
521
Dynamical resource allocation algorithm research in network virtualization
Published 2011-01-01“…Aim to the problem of resource allocation,a dynamical algorithm of allocating resource was proposed.The algorithm dynamical migrates virtual node,which based on the average load discrepant degree of physical nodes and the tolerant load discrepant degree of substrate network.It will choose a proper host according to the values of synthetically impact factor,that reduce impact on the delay of virtual link and the bandwidth of physical link.Simulation result shows that the algorithm can improve load balance on physical nodes,and reduce negative impact on delay and bandwidth.…”
Get full text
Article -
522
Application of intelligent optimization algorithms in supply chain network
Published 2022-06-01Subjects: “…supply chain network;optimization problem;intelligent optimization algorithm…”
Get full text
Article -
523
An Algorithm Using DBSCAN to Solve the Velocity Dealiasing Problem
Published 2021-01-01“…The results of the case study also show that the 4DD algorithm filters out many observation gates close to the missing data or radar center, whereas the proposed algorithm tends to retain and correct these gates.…”
Get full text
Article -
524
IMPROVEMENT OF CUCKOO ALGORITHM FOR ASSOCIATION RULE HIDING PROBLEM
Published 2018-07-01“…Recently, a meta-heuristic algorithm is relatively effective for this purpose, which is cuckoo optimization algorithm (COA4ARH). …”
Get full text
Article -
525
Routing algorithm for MPLS traffic engineering in satellite network
Published 2011-01-01Subjects: Get full text
Article -
526
Novel Architecture for Efficient Implementation of Modular Exponentiation Algorithm
Published 2024-01-01Get full text
Article -
527
Algorithm of NAF scalar multiplication on ECC against SPA
Published 2012-09-01“…Against the problem that non-adjacent form(NAF)scalar multiplication on Elliptic curve cryptography(ECC) were not well resist the simple power attack(SPA),the implementation of NAF scalar multiplication and the mechanism of SPA attack were analyzed.Then a new algorithm,named equal power NAF scalar multiplication was presented.It was verified that equal power NAF scalar multiplication was efficient countermeasure against SPA attack by experimental analysis on power traces of the smartcard collected from the power analysis platform.…”
Get full text
Article -
528
Learning Based Genetic Algorithm for Task Graph Scheduling
Published 2019-01-01“…An effective scheduling algorithm attempts to minimize the makespan and an efficient algorithm, in addition to that, tries to reduce the complexity of the optimization process. …”
Get full text
Article -
529
Algorithms for estimating equivalent resistances of in-plant electrical networks
Published 2021-10-01Subjects: “…algorithms…”
Get full text
Article -
530
Deep Learning-Based Diagnosis Algorithm for Alzheimer’s Disease
Published 2024-12-01“…This paper presents an innovative two-stage automatic auxiliary diagnosis algorithm for AD, based on an improved 3D DenseNet segmentation model and an improved MobileNetV3 classification model applied to brain MR images. …”
Get full text
Article -
531
Improved Visual SLAM Algorithm Based on Dynamic Scenes
Published 2024-11-01“…We performed experiments based on the public datasets to validate the feasibility of the proposed algorithm. The experimental results indicate that the improved SLAM algorithm, which boasts a reduction in absolute trajectory error (ATE) by approximately 97% compared to traditional static visual SLAM and about 20% compared to traditional dynamic visual SLAM, also exhibited a 68% decrease in computation time compared to well-known dynamic visual SLAM, thereby possessing absolute advantages in both positioning accuracy and operational efficiency.…”
Get full text
Article -
532
An Advanced Whale Optimization Algorithm for Grayscale Image Enhancement
Published 2024-12-01Subjects: Get full text
Article -
533
Intuitionistic Fuzzy Possibilistic C Means Clustering Algorithms
Published 2015-01-01“…The clustering algorithm has membership and nonmembership degrees as intervals. …”
Get full text
Article -
534
Research progress of mimic multi-execution scheduling algorithm
Published 2021-05-01“…Mimic defense is the new active defense technology based on the dynamic heterogeneous redundant architecture.With inherent uncertainty, heterogeneous, redundant and negative feedback features, it can significantly improve the robustness and security of system.Among them, the scheduling algorithm is the key to mimic defense technology, which advantages and disadvantages directly affect the ability of system to resist attacks based on known or unknown vulnerabilities.Based on this, the principle and goal of mimic scheduling algorithm were firstly introduced.Then the state-of-the-art of mimic scheduling algorithms were analyzed and summarized from three aspects, such as scheduling object, scheduling quantity and scheduling timing.Finally, the future research direction and trend of mimic scheduling algorithms were prospected.…”
Get full text
Article -
535
A novel perturbation attack on SVM by greedy algorithm
Published 2019-01-01Subjects: Get full text
Article -
536
Secure key-sharing algorithm based on smart grid
Published 2021-08-01“…Most of establishment-key protocols suffer from both session-specific temporary information attack and private key leakage issue.Therefore, a novel public key sharing-based symmetric encryption algorithm (PKS-SE) was proposed, in order to maintain the security of communication between smart meter and service providers.Based on bilinear mapping and super-singular curve, PKS-SE algorithm constructed the communication key between intelligent electricity meter and service provider, in order to avoid the key escrow problem.At the same time, PKS-SE algorithm reduced the number of required messages during the mutual authentication to only two messages, thus controlling the communication cost and operation cost of PKS-SE algorithm.Simulation results show that the proposed PKS-SE algorithm can effectively realize public key-sharing…”
Get full text
Article -
537
Hierarchical Sliding Mode Algorithm for Athlete Robot Walking
Published 2017-01-01“…A new method based on hierarchical sliding mode for controlling postures is also introduced. Genetic algorithm is applied to design the oscillator for robot motion. …”
Get full text
Article -
538
Geometrically synchronous watermarking algorithm based on the corner feature
Published 2011-01-01“…Simple geometric attacks could destroy watermark or its position,causing the failure of most watermarking algorithm.A geometrically synchronous watermarking algorithm robust based on the corner feature was proposed.In this paper,the feature point was detected on the normalization of the image to resist geometric attack;the combination of Harris and MIC corner detected algorithm was utilized to extract steady corner based on analyzing the advantages and disadvantages of the two algorithm;the watermarking information was statistic embed in the shape of rings instead of changing the simply one pixel.Sufficient experiments demonstrate the robustness of this approach,especially in resisting geometry attack such as RST(rotation,scaling and translation).…”
Get full text
Article -
539
Algorithm of grid reliability assessment and reconstruction optimization system
Published 2017-12-01“…Based on the research of the reliability of distribution network and the reconstruction of network,a new method was put forward to reconstruct the power grid reliability.Firstly,the evaluation index system was proposed,which included the active network LOSS (LOSS),lack of system power supply (ENS) and the average power supply availability (ASAI).A multi-objective model of distribution network was constructed by normalization,and the multi-objective function was transformed into a new single objective function by using the judgment matrix method,which realized fast calculation of power distribution network reconstruction and optimization.Through IEEE69 example verification,the optimization algorithm can obtain the global optimal solution and reduce the computational time at the same time,effectively solve the problem of the reconstruction of the complex network optimization.…”
Get full text
Article -
540
Research on Phase Stabilization Algorithm of Femtosecond Timing System
Published 2024-10-01“…The system incorporates a phase detection module with a non-In-phase/Quadrature downconversion approach, enabling high-accuracy phase measurements. A collaborative algorithm was designed to optimize the interplay between the optical delay line and the fiber stretcher, utilizing a proportional-integral-derivative (PID) control algorithm to enhance adjustment precision. …”
Get full text
Article