Showing 521 - 540 results of 31,575 for search '"algorithm"', query time: 0.12s Refine Results
  1. 521

    Dynamical resource allocation algorithm research in network virtualization by LUO Juan, XU Yue-yang, LI Ren-fa

    Published 2011-01-01
    “…Aim to the problem of resource allocation,a dynamical algorithm of allocating resource was proposed.The algorithm dynamical migrates virtual node,which based on the average load discrepant degree of physical nodes and the tolerant load discrepant degree of substrate network.It will choose a proper host according to the values of synthetically impact factor,that reduce impact on the delay of virtual link and the bandwidth of physical link.Simulation result shows that the algorithm can improve load balance on physical nodes,and reduce negative impact on delay and bandwidth.…”
    Get full text
    Article
  2. 522

    Application of intelligent optimization algorithms in supply chain network by Xin ZHANG, Zhihui ZHAN

    Published 2022-06-01
    Subjects: “…supply chain network;optimization problem;intelligent optimization algorithm…”
    Get full text
    Article
  3. 523

    An Algorithm Using DBSCAN to Solve the Velocity Dealiasing Problem by Wei Zhao, Qinglan Li, Kuifeng Jin

    Published 2021-01-01
    “…The results of the case study also show that the 4DD algorithm filters out many observation gates close to the missing data or radar center, whereas the proposed algorithm tends to retain and correct these gates.…”
    Get full text
    Article
  4. 524

    IMPROVEMENT OF CUCKOO ALGORITHM FOR ASSOCIATION RULE HIDING PROBLEM by Đoàn Minh Khuê, Lê Hoài Bắc

    Published 2018-07-01
    “…Recently, a meta-heuristic algorithm is relatively effective for this purpose, which is cuckoo optimization algorithm (COA4ARH). …”
    Get full text
    Article
  5. 525
  6. 526
  7. 527

    Algorithm of NAF scalar multiplication on ECC against SPA by Min WANG, Zhen WU

    Published 2012-09-01
    “…Against the problem that non-adjacent form(NAF)scalar multiplication on Elliptic curve cryptography(ECC) were not well resist the simple power attack(SPA),the implementation of NAF scalar multiplication and the mechanism of SPA attack were analyzed.Then a new algorithm,named equal power NAF scalar multiplication was presented.It was verified that equal power NAF scalar multiplication was efficient countermeasure against SPA attack by experimental analysis on power traces of the smartcard collected from the power analysis platform.…”
    Get full text
    Article
  8. 528

    Learning Based Genetic Algorithm for Task Graph Scheduling by Habib Izadkhah

    Published 2019-01-01
    “…An effective scheduling algorithm attempts to minimize the makespan and an efficient algorithm, in addition to that, tries to reduce the complexity of the optimization process. …”
    Get full text
    Article
  9. 529
  10. 530

    Deep Learning-Based Diagnosis Algorithm for Alzheimer’s Disease by Zhenhao Jin, Junjie Gong, Minghui Deng, Piaoyi Zheng, Guiping Li

    Published 2024-12-01
    “…This paper presents an innovative two-stage automatic auxiliary diagnosis algorithm for AD, based on an improved 3D DenseNet segmentation model and an improved MobileNetV3 classification model applied to brain MR images. …”
    Get full text
    Article
  11. 531

    Improved Visual SLAM Algorithm Based on Dynamic Scenes by Jinxing Niu, Ziqi Chen, Tao Zhang, Shiyu Zheng

    Published 2024-11-01
    “…We performed experiments based on the public datasets to validate the feasibility of the proposed algorithm. The experimental results indicate that the improved SLAM algorithm, which boasts a reduction in absolute trajectory error (ATE) by approximately 97% compared to traditional static visual SLAM and about 20% compared to traditional dynamic visual SLAM, also exhibited a 68% decrease in computation time compared to well-known dynamic visual SLAM, thereby possessing absolute advantages in both positioning accuracy and operational efficiency.…”
    Get full text
    Article
  12. 532
  13. 533

    Intuitionistic Fuzzy Possibilistic C Means Clustering Algorithms by Arindam Chaudhuri

    Published 2015-01-01
    “…The clustering algorithm has membership and nonmembership degrees as intervals. …”
    Get full text
    Article
  14. 534

    Research progress of mimic multi-execution scheduling algorithm by Zhengbin ZHU, Qinrang LIU, Dongpei LIU, Chong WANG

    Published 2021-05-01
    “…Mimic defense is the new active defense technology based on the dynamic heterogeneous redundant architecture.With inherent uncertainty, heterogeneous, redundant and negative feedback features, it can significantly improve the robustness and security of system.Among them, the scheduling algorithm is the key to mimic defense technology, which advantages and disadvantages directly affect the ability of system to resist attacks based on known or unknown vulnerabilities.Based on this, the principle and goal of mimic scheduling algorithm were firstly introduced.Then the state-of-the-art of mimic scheduling algorithms were analyzed and summarized from three aspects, such as scheduling object, scheduling quantity and scheduling timing.Finally, the future research direction and trend of mimic scheduling algorithms were prospected.…”
    Get full text
    Article
  15. 535
  16. 536

    Secure key-sharing algorithm based on smart grid by Wei GU, Jian SHEN, Yongjun REN

    Published 2021-08-01
    “…Most of establishment-key protocols suffer from both session-specific temporary information attack and private key leakage issue.Therefore, a novel public key sharing-based symmetric encryption algorithm (PKS-SE) was proposed, in order to maintain the security of communication between smart meter and service providers.Based on bilinear mapping and super-singular curve, PKS-SE algorithm constructed the communication key between intelligent electricity meter and service provider, in order to avoid the key escrow problem.At the same time, PKS-SE algorithm reduced the number of required messages during the mutual authentication to only two messages, thus controlling the communication cost and operation cost of PKS-SE algorithm.Simulation results show that the proposed PKS-SE algorithm can effectively realize public key-sharing…”
    Get full text
    Article
  17. 537

    Hierarchical Sliding Mode Algorithm for Athlete Robot Walking by Van Dong Hai Nguyen, Xuan-Dung Huynh, Minh-Tam Nguyen, Ionel Cristian Vladu, Mircea Ivanescu

    Published 2017-01-01
    “…A new method based on hierarchical sliding mode for controlling postures is also introduced. Genetic algorithm is applied to design the oscillator for robot motion. …”
    Get full text
    Article
  18. 538

    Geometrically synchronous watermarking algorithm based on the corner feature by LIU Quan1, ZHANG Le1, ZHANG Yong-gang2, Christian Bessiere3, FU Qi-ming1, WANG Xiao-yan1

    Published 2011-01-01
    “…Simple geometric attacks could destroy watermark or its position,causing the failure of most watermarking algorithm.A geometrically synchronous watermarking algorithm robust based on the corner feature was proposed.In this paper,the feature point was detected on the normalization of the image to resist geometric attack;the combination of Harris and MIC corner detected algorithm was utilized to extract steady corner based on analyzing the advantages and disadvantages of the two algorithm;the watermarking information was statistic embed in the shape of rings instead of changing the simply one pixel.Sufficient experiments demonstrate the robustness of this approach,especially in resisting geometry attack such as RST(rotation,scaling and translation).…”
    Get full text
    Article
  19. 539

    Algorithm of grid reliability assessment and reconstruction optimization system by Zhibin ZANG, Peihao ZHENG, Benhai WEI, Zaipei ZHAI, Shengguo MA

    Published 2017-12-01
    “…Based on the research of the reliability of distribution network and the reconstruction of network,a new method was put forward to reconstruct the power grid reliability.Firstly,the evaluation index system was proposed,which included the active network LOSS (LOSS),lack of system power supply (ENS) and the average power supply availability (ASAI).A multi-objective model of distribution network was constructed by normalization,and the multi-objective function was transformed into a new single objective function by using the judgment matrix method,which realized fast calculation of power distribution network reconstruction and optimization.Through IEEE69 example verification,the optimization algorithm can obtain the global optimal solution and reduce the computational time at the same time,effectively solve the problem of the reconstruction of the complex network optimization.…”
    Get full text
    Article
  20. 540

    Research on Phase Stabilization Algorithm of Femtosecond Timing System by Jingwei Zhang, Ming Liu

    Published 2024-10-01
    “…The system incorporates a phase detection module with a non-In-phase/Quadrature downconversion approach, enabling high-accuracy phase measurements. A collaborative algorithm was designed to optimize the interplay between the optical delay line and the fiber stretcher, utilizing a proportional-integral-derivative (PID) control algorithm to enhance adjustment precision. …”
    Get full text
    Article