Suggested Topics within your search.
Suggested Topics within your search.
-
661
Unidirectional-link detection algorithms in wireless sensor networks
Published 2008-01-01Get full text
Article -
662
Random Exploration and Attraction of the Best in Swarm Intelligence Algorithms
Published 2024-11-01Subjects: Get full text
Article -
663
Robust image hiding algorithm for secure multimodal biometrics
Published 2016-09-01“…In order to solve the bio-template secure transmission in multimode biometric authentication,a novel al-gorithm was presented that hiding face watermarks in fingerprint carrier image to improve security and recognition accuracy.RST invariant embedding region was obtained by carrier image normalization and the core point detection.Multiple embedding based on SVD in the region and watermark optimizations in extraction process were presented in hiding scheme.The security of the proposed algorithm and its robustness against different kinds of attacks were verified by simulations.…”
Get full text
Article -
664
A Specific Algorithm Based on Motion Direction Prediction
Published 2021-01-01“…In this paper, we study the estimation of motion direction prediction for fast motion and propose a threshold-based human target detection algorithm using motion vectors and other data as human target feature information. …”
Get full text
Article -
665
Faster backtracking algorithms for the generation of symmetry-invariant permutations
Published 2002-01-01“…Special cases give a new algorithm for generating solutions of the classical n-queens problem, as well as a new algorithm for generating Costas sequences, which are used in encoding radar and sonar signals. …”
Get full text
Article -
666
Research on mapping algorithm of virtual network oriented to SDN
Published 2017-10-01Subjects: “…ant colony hybrid genetic algorithm…”
Get full text
Article -
667
Clustering algorithm preserving differential privacy in the framework of Spark
Published 2016-11-01Subjects: Get full text
Article -
668
Efficient algorithm for computing Walsh spectrum and differential probability
Published 2015-05-01“…According to the characteristic of T-functions,along with the definition of narrow T-functions,the linear prop-erty and differential property were studied.Markov chain and transition matrices were constructed to propose fast algo-rithm for computing Walsh spectrum and differential probability,of which the time complexity is O(n).In addition,the algorithm is applied in the T-functions in TSC-family and finally the result expression is given.…”
Get full text
Article -
669
An Anti-Interference Control Algorithm for Continuum Robot Arm
Published 2024-11-01“…Experimental results further confirm the effectiveness and robustness of the algorithm.…”
Get full text
Article -
670
Efficient Model Predictive Algorithms for Tracking of Periodic Signals
Published 2012-01-01“…Besides the conventional formulation based on the control inputs as variables, a parameterization using a dynamic policy on the inputs is introduced, which further reduces the online computational requirements. Both proposed algorithms possess nice convergence properties, which are also verified with computer simulations.…”
Get full text
Article -
671
Treatment Algorithm for Acute Kidney Injury in Patients with Cirrhosis
Published 2024-12-01Get full text
Article -
672
Forecast-based resource reconfiguration algorithm for network virtualization
Published 2011-01-01“…In order to solve imbalance issues of used resources of substrate network,which are brought by virtual net-work joining and leaving dynamically,forecast-based resource reconfiguration algorithm(FRRA) for network virtualiza-tion environment was proposed.Algorithm FRRA took full advantage of known information to calculate interval of re-configuration and used this interval to replace the periodic time span in previous algorithms.In order to make reconfigu-ration time global optimal,it took two measures:resources were divided into critcal resources and general resources,and different algorithms were used to key resources and common resources respectively;according to the probability that re-source migration was failure,the limit number of reconfiguration requests was deduced.FRRA algorithm with VNA-II algorithm and PMPA algorithm in the experiments was compared.The results show that algorithm FRRA reduces recon-figuration cost 69% than that of VNA-II and 42% than that of PMPA.Algorithm FRRA improves VN request reception rate 29% than that of VNA-II and 52% than that of PMPA.…”
Get full text
Article -
673
An Example-Based Super-Resolution Algorithm for Selfie Images
Published 2016-01-01“…The proposed algorithm is evaluated for its efficiency and effectiveness both qualitatively and quantitatively with other state-of-the-art SR algorithms. …”
Get full text
Article -
674
Utilizing Statistical Tests for Comparing Machine Learning Algorithms
Published 2021-07-01Subjects: “…machine learning, machine learning assessment, statistical tests, machine learning algorithm, machine learning comparison.…”
Get full text
Article -
675
Damped Algorithms for the Split Fixed Point and Equilibrium Problems
Published 2013-01-01“…The main purpose of this paper is to study the split fixed point and equilibrium problems which includes fixed point problems, equilibrium problems, and variational inequality problems as special cases. A damped algorithm is presented for solving this split common problem. …”
Get full text
Article -
676
A Triangular Personalized Recommendation Algorithm for Improving Diversity
Published 2018-01-01“…However, diversity is also an important evaluation index in the recommendation algorithm. In order to study both the accuracy and diversity of a recommendation algorithm at the same time, this study introduced a “third dimension” to the commonly used user/product two-dimensional recommendation, and a recommendation algorithm is proposed that is based on a triangular area (TR algorithm). …”
Get full text
Article -
677
Nuclear Power Plant Maintenance Optimization with Heuristic Algorithm
Published 2014-01-01“…The optimal solution of the objective function is estimated with genetic algorithm. The proposed method is applied on probabilistic safety analysis model of the selected safety system of the reference nuclear power plant. …”
Get full text
Article -
678
Virtual machine placement algorithm based on cuckoo search
Published 2017-10-01“…A cuckoo search algorithm was introduced for virtual machine placement.Firstly,the virtual machine placement program was mapped to the nest,and according to the level,the fitness would be divided into top and bottom nest.Secondly,the bottom nest and the top nest were disturbed by the disturbance function.Finally,by selecting,iterations got the best placement scheme.The algorithm was used for physical integration of cloud data centers,minimizing the number of physical machines placed.The algorithm is simulated by Cloudsim and the results show that the proposed method not only avoids the local optimum,but also has higher performance advantages than the reordered grouping genetic algorithm,the group genetic algorithm,the improved least load algorithm and the improved first fit decrease algorithm.…”
Get full text
Article -
679
An AkNN Algorithm for High-Dimensional Big Data
Published 2015-07-01“…A new variant of k nearest neighbor queries,which called as all k-nearest neighbor queries(AkNN),is a process to search the k nearest neighbors of each object in a data set.An AkNN query algorithm for high-dimensional big data on the Hadoop system was proposed.Using the banding technique and the p-stable LSH algorithm,dimensionality reduction was performed,then the data was embeded in a Z-order curve.The preprocessed data were continued to be treated on a MapReduce framework in a distributed parallel manner.Experimental results show that the proposed algorithm can efficiently handle AkNN queries for large-scale high-dimensional data.…”
Get full text
Article -
680
Application of Golden Sine Algorithm in Hydrogeological Parameter Optimization
Published 2020-01-01Subjects: “…golden sine algorithm…”
Get full text
Article