Showing 581 - 600 results of 31,575 for search '"algorithm"', query time: 0.12s Refine Results
  1. 581
  2. 582

    A Simple Algorithm for Prime Factorization and Primality Testing by Kabenge Hamiss

    Published 2022-01-01
    “…We propose a new simple and faster algorithm to factor numbers based on the nature of the prime numbers contained in such composite numbers. …”
    Get full text
    Article
  3. 583
  4. 584

    PCA-Guided Routing Algorithm for Wireless Sensor Networks by Gong Chen, Liansheng Tan, Yanlin Gong, Wei Zhang

    Published 2012-01-01
    “…In this paper, we propose a routing algorithm termed as PCA-guided routing algorithm (PCA-RA) by exploring the principal component analysis (PCA) approach. …”
    Get full text
    Article
  5. 585
  6. 586

    Lightweight Block and Stream Cipher Algorithm: A Review by Suaad Ali Abead, Nada Hussein M. Ali

    Published 2024-06-01
    “…In this study, an overview of lightweight encryption algorithms, and methods, in addition, a modern technique for these algorithms also will be discussed. …”
    Get full text
    Article
  7. 587

    Frequency-Dependent FDTD Algorithm Using Newmark’s Method by Bing Wei, Le Cao, Fei Wang, Qian Yang

    Published 2014-01-01
    “…Theoretical analyses and numerical results demonstrate that this method is a general algorithm and it has advantages of higher accuracy and stability over the algorithms based on central difference method.…”
    Get full text
    Article
  8. 588
  9. 589

    5G network slicing algorithm based on prediction by Jiageng ZHANG, Min ZHU, Feng DU, Qi WANG, Jun LIU, Zhihai SUO, Li WANG

    Published 2021-09-01
    “…5G on line scenario needs short build time of network slice, it can use prediction algorithm to isolate network resource in advance to reduce the construction time of network slice.A 5G network slicing algorithm based on prediction was proposed, which used fourth square as cost function to predict the network resource requests with accepted accurate and lower complexity of algorithm.And then based on the prediction result, virtual nodes and links resource were allocated, and container was pulled up when network slice request arrives to network, the dynamic creation of network slices was completed.The simulation results show that the proposed algorithm can get 90% accurate of prediction, and reduce 50% construction time of network slice, and improve the network utilization ration,when new network slice reusing the original network slice.…”
    Get full text
    Article
  10. 590

    Research on IQ imbalance estimation algorithm based on GSOP by Xian ZHOU, Tianyu GAO, Jiahao HUO, Xiaojie SHEN, Dongxu LU, Wei HUANGFU, Jiajing TU, Keping LONG

    Published 2018-09-01
    “…In order to satisfy the demand of the efficiency and low cost measurement for high rate optical communication system,the IQ-ImEstimation algorithm was proposed for IQ imbalance estimation in the PDM-MQAM cohernt optical communication system based on GSOP.Two estimation schemes include amplitude impairment and phase impairment were designed by utilizing the power and correlation.Finally,a 34 GBaud PDM-MQAM system was simulated and experimentalized.The results indicate that the IQ-ImEstimation algorithm is accuracy and effective.…”
    Get full text
    Article
  11. 591

    A Synchronous-Asynchronous Particle Swarm Optimisation Algorithm by Nor Azlina Ab Aziz, Marizan Mubin, Mohd Saberi Mohamad, Kamarulzaman Ab Aziz

    Published 2014-01-01
    “…This algorithm is also known as synchronous PSO (S-PSO). …”
    Get full text
    Article
  12. 592
  13. 593
  14. 594
  15. 595

    Novel multi-rate multicast congestion control algorithm by ZHANG Deng-yin, WANG Qian-qian, LI Jun, WANG Ru-chuan

    Published 2007-01-01
    “…A novel congestion control mechanism based on packet-bunch probe and TCP throughput formula(PTMCC) was proposed.This receiver-driven multi-rate multicast congestion control mechanism probes available bandwidth by packet-bunch and gets TCP-friendly rate by TCP throughput formula.A new rate adjustment algorithm was also designed.Simulation results show that the PTMCC make good performance on convergence,TCP-friendliness and response to congestion.…”
    Get full text
    Article
  16. 596

    Secure Multicast Routing Algorithm for Wireless Mesh Networks by Rakesh Matam, Somanath Tripathy

    Published 2016-01-01
    “…In this paper, we propose SEMRAW (SEcure Multicast Routing Algorithm for Wireless mesh network) that is resistant against all known active threats including wormhole attack. …”
    Get full text
    Article
  17. 597

    Provident garbage collection algorithm for SSD storage system by Xuezhen TU, Zhenjiang Huang, Zhengguang CHEN

    Published 2019-05-01
    “…A predictive based proactive garbage collection algorithm was proposed.Firstly,the data was separated according to different heat factors,then the upper and lower predictions were performed on the number of different types of page allocation requests (PAR) that would be reached in the future.While satisfying the page allocation request lower prediction,the PAR upper prediction requirement was maximally satisfied,the WA problem was optimized,and invalid effective data migration was reduced,thereby maximizing the garbage collection utility.A mathematical model was defined for this problem,and an algorithm for obtaining the approximate optimal solution was given.The applicable scenario of the model was analyzed.The practical results show that the algorithm can obtain the maximum benefit and can significantly improve the performance of SSD and reduce the cost.…”
    Get full text
    Article
  18. 598

    An Improved Animal Migration Optimization Algorithm for Clustering Analysis by Mingzhi Ma, Qifang Luo, Yongquan Zhou, Xin Chen, Liangliang Li

    Published 2015-01-01
    “…Animal migration optimization (AMO) is one of the most recently introduced algorithms based on the behavior of animal swarm migration. …”
    Get full text
    Article
  19. 599

    The Treatment Algorithm in Diabetic Foot: An Alternative Against Amputation? by Tacettin Güçer

    Published 2022-12-01
    “…With this combination, this technique was found extremely effective by application, according to the algorithm explained below, and should be an alternative to the current therapy applications in diabetic ulcers.…”
    Get full text
    Article
  20. 600

    Stereo robust watermark algorithm based on parameter optimization by Yiming XUE, Jinyu ZHANG, Botao CHEN, Zhenghong YANG

    Published 2023-07-01
    “…Aiming at issues such as illegal dissemination of network audio data and privacy leakage, a stereo robust watermark algorithm based on parameter optimization was proposed.Firstly, the watermark was embedded by modifying the singular value ratio of odd segment based on the insensitivity of stereo channels to attack, and aiming at minimizing the relative distortion of the two channels.The embedding process was optimized and the perceived quality of the audio was improved.Then, a parameter optimization method was proposed to find optimal parameters on each audio file, and the imperceptibility and robustness were well balanced.The simulation results show that the proposed algorithm has good imperceptibility and robustness against conventional signal processing.…”
    Get full text
    Article