Suggested Topics within your search.
Suggested Topics within your search.
-
581
-
582
A Simple Algorithm for Prime Factorization and Primality Testing
Published 2022-01-01“…We propose a new simple and faster algorithm to factor numbers based on the nature of the prime numbers contained in such composite numbers. …”
Get full text
Article -
583
Modified link prediction algorithm based on AdaBoost
Published 2014-03-01Subjects: Get full text
Article -
584
PCA-Guided Routing Algorithm for Wireless Sensor Networks
Published 2012-01-01“…In this paper, we propose a routing algorithm termed as PCA-guided routing algorithm (PCA-RA) by exploring the principal component analysis (PCA) approach. …”
Get full text
Article -
585
An Algorithm for Producing Fuzzy Implications via Conical Sections
Published 2024-11-01“…Algorithms…”
Get full text
Article -
586
Lightweight Block and Stream Cipher Algorithm: A Review
Published 2024-06-01“…In this study, an overview of lightweight encryption algorithms, and methods, in addition, a modern technique for these algorithms also will be discussed. …”
Get full text
Article -
587
Frequency-Dependent FDTD Algorithm Using Newmark’s Method
Published 2014-01-01“…Theoretical analyses and numerical results demonstrate that this method is a general algorithm and it has advantages of higher accuracy and stability over the algorithms based on central difference method.…”
Get full text
Article -
588
Algorithm of surgical tactics for the treatment of carpal tunnel syndrome
Published 2023-03-01Get full text
Article -
589
5G network slicing algorithm based on prediction
Published 2021-09-01“…5G on line scenario needs short build time of network slice, it can use prediction algorithm to isolate network resource in advance to reduce the construction time of network slice.A 5G network slicing algorithm based on prediction was proposed, which used fourth square as cost function to predict the network resource requests with accepted accurate and lower complexity of algorithm.And then based on the prediction result, virtual nodes and links resource were allocated, and container was pulled up when network slice request arrives to network, the dynamic creation of network slices was completed.The simulation results show that the proposed algorithm can get 90% accurate of prediction, and reduce 50% construction time of network slice, and improve the network utilization ration,when new network slice reusing the original network slice.…”
Get full text
Article -
590
Research on IQ imbalance estimation algorithm based on GSOP
Published 2018-09-01“…In order to satisfy the demand of the efficiency and low cost measurement for high rate optical communication system,the IQ-ImEstimation algorithm was proposed for IQ imbalance estimation in the PDM-MQAM cohernt optical communication system based on GSOP.Two estimation schemes include amplitude impairment and phase impairment were designed by utilizing the power and correlation.Finally,a 34 GBaud PDM-MQAM system was simulated and experimentalized.The results indicate that the IQ-ImEstimation algorithm is accuracy and effective.…”
Get full text
Article -
591
A Synchronous-Asynchronous Particle Swarm Optimisation Algorithm
Published 2014-01-01“…This algorithm is also known as synchronous PSO (S-PSO). …”
Get full text
Article -
592
Deep Learning Algorithms for Detection and Classification of Gastrointestinal Diseases
Published 2021-01-01Get full text
Article -
593
An Interference Links Selection Method Based on Genetic Algorithm
Published 2015-09-01Subjects: Get full text
Article -
594
Cognitive Algorithms for Learning Foreign Languages: Psycholinguistics Approach
Published 2021-03-01Get full text
Article -
595
Novel multi-rate multicast congestion control algorithm
Published 2007-01-01“…A novel congestion control mechanism based on packet-bunch probe and TCP throughput formula(PTMCC) was proposed.This receiver-driven multi-rate multicast congestion control mechanism probes available bandwidth by packet-bunch and gets TCP-friendly rate by TCP throughput formula.A new rate adjustment algorithm was also designed.Simulation results show that the PTMCC make good performance on convergence,TCP-friendliness and response to congestion.…”
Get full text
Article -
596
Secure Multicast Routing Algorithm for Wireless Mesh Networks
Published 2016-01-01“…In this paper, we propose SEMRAW (SEcure Multicast Routing Algorithm for Wireless mesh network) that is resistant against all known active threats including wormhole attack. …”
Get full text
Article -
597
Provident garbage collection algorithm for SSD storage system
Published 2019-05-01“…A predictive based proactive garbage collection algorithm was proposed.Firstly,the data was separated according to different heat factors,then the upper and lower predictions were performed on the number of different types of page allocation requests (PAR) that would be reached in the future.While satisfying the page allocation request lower prediction,the PAR upper prediction requirement was maximally satisfied,the WA problem was optimized,and invalid effective data migration was reduced,thereby maximizing the garbage collection utility.A mathematical model was defined for this problem,and an algorithm for obtaining the approximate optimal solution was given.The applicable scenario of the model was analyzed.The practical results show that the algorithm can obtain the maximum benefit and can significantly improve the performance of SSD and reduce the cost.…”
Get full text
Article -
598
An Improved Animal Migration Optimization Algorithm for Clustering Analysis
Published 2015-01-01“…Animal migration optimization (AMO) is one of the most recently introduced algorithms based on the behavior of animal swarm migration. …”
Get full text
Article -
599
The Treatment Algorithm in Diabetic Foot: An Alternative Against Amputation?
Published 2022-12-01“…With this combination, this technique was found extremely effective by application, according to the algorithm explained below, and should be an alternative to the current therapy applications in diabetic ulcers.…”
Get full text
Article -
600
Stereo robust watermark algorithm based on parameter optimization
Published 2023-07-01“…Aiming at issues such as illegal dissemination of network audio data and privacy leakage, a stereo robust watermark algorithm based on parameter optimization was proposed.Firstly, the watermark was embedded by modifying the singular value ratio of odd segment based on the insensitivity of stereo channels to attack, and aiming at minimizing the relative distortion of the two channels.The embedding process was optimized and the perceived quality of the audio was improved.Then, a parameter optimization method was proposed to find optimal parameters on each audio file, and the imperceptibility and robustness were well balanced.The simulation results show that the proposed algorithm has good imperceptibility and robustness against conventional signal processing.…”
Get full text
Article