Showing 661 - 680 results of 31,575 for search '"algorithm"', query time: 0.17s Refine Results
  1. 661
  2. 662
  3. 663

    Robust image hiding algorithm for secure multimodal biometrics by Yu-qiang CAO, Wei-guo GONG, Sen BAI

    Published 2016-09-01
    “…In order to solve the bio-template secure transmission in multimode biometric authentication,a novel al-gorithm was presented that hiding face watermarks in fingerprint carrier image to improve security and recognition accuracy.RST invariant embedding region was obtained by carrier image normalization and the core point detection.Multiple embedding based on SVD in the region and watermark optimizations in extraction process were presented in hiding scheme.The security of the proposed algorithm and its robustness against different kinds of attacks were verified by simulations.…”
    Get full text
    Article
  4. 664

    A Specific Algorithm Based on Motion Direction Prediction by Zhesen Chu, Min Li

    Published 2021-01-01
    “…In this paper, we study the estimation of motion direction prediction for fast motion and propose a threshold-based human target detection algorithm using motion vectors and other data as human target feature information. …”
    Get full text
    Article
  5. 665

    Faster backtracking algorithms for the generation of symmetry-invariant permutations by Oscar Moreno, John Ramírez, Dorothy Bollman, Edusmildo Orozco

    Published 2002-01-01
    “…Special cases give a new algorithm for generating solutions of the classical n-queens problem, as well as a new algorithm for generating Costas sequences, which are used in encoding radar and sonar signals. …”
    Get full text
    Article
  6. 666

    Research on mapping algorithm of virtual network oriented to SDN by Jian WANG, Guo-sheng ZHAO, Zhi-xin LI

    Published 2017-10-01
    Subjects: “…ant colony hybrid genetic algorithm…”
    Get full text
    Article
  7. 667
  8. 668

    Efficient algorithm for computing Walsh spectrum and differential probability by IUYan L, UBin H, ULi-ping X

    Published 2015-05-01
    “…According to the characteristic of T-functions,along with the definition of narrow T-functions,the linear prop-erty and differential property were studied.Markov chain and transition matrices were constructed to propose fast algo-rithm for computing Walsh spectrum and differential probability,of which the time complexity is O(n).In addition,the algorithm is applied in the T-functions in TSC-family and finally the result expression is given.…”
    Get full text
    Article
  9. 669

    An Anti-Interference Control Algorithm for Continuum Robot Arm by Hongwei Liu, Qianyi Meng, Junlei Wang

    Published 2024-11-01
    “…Experimental results further confirm the effectiveness and robustness of the algorithm.…”
    Get full text
    Article
  10. 670

    Efficient Model Predictive Algorithms for Tracking of Periodic Signals by Yun-Chung Chu, Michael Z. Q. Chen

    Published 2012-01-01
    “…Besides the conventional formulation based on the control inputs as variables, a parameterization using a dynamic policy on the inputs is introduced, which further reduces the online computational requirements. Both proposed algorithms possess nice convergence properties, which are also verified with computer simulations.…”
    Get full text
    Article
  11. 671
  12. 672

    Forecast-based resource reconfiguration algorithm for network virtualization by ZHANG Shun-li, QIU Xue-song, PAN Ya-lian, MENG Luo-ming

    Published 2011-01-01
    “…In order to solve imbalance issues of used resources of substrate network,which are brought by virtual net-work joining and leaving dynamically,forecast-based resource reconfiguration algorithm(FRRA) for network virtualiza-tion environment was proposed.Algorithm FRRA took full advantage of known information to calculate interval of re-configuration and used this interval to replace the periodic time span in previous algorithms.In order to make reconfigu-ration time global optimal,it took two measures:resources were divided into critcal resources and general resources,and different algorithms were used to key resources and common resources respectively;according to the probability that re-source migration was failure,the limit number of reconfiguration requests was deduced.FRRA algorithm with VNA-II algorithm and PMPA algorithm in the experiments was compared.The results show that algorithm FRRA reduces recon-figuration cost 69% than that of VNA-II and 42% than that of PMPA.Algorithm FRRA improves VN request reception rate 29% than that of VNA-II and 52% than that of PMPA.…”
    Get full text
    Article
  13. 673

    An Example-Based Super-Resolution Algorithm for Selfie Images by Jino Hans William, N. Venkateswaran, Srinath Narayanan, Sandeep Ramachandran

    Published 2016-01-01
    “…The proposed algorithm is evaluated for its efficiency and effectiveness both qualitatively and quantitatively with other state-of-the-art SR algorithms. …”
    Get full text
    Article
  14. 674

    Utilizing Statistical Tests for Comparing Machine Learning Algorithms by Hozan Khalid Hamarashid

    Published 2021-07-01
    Subjects: “…machine learning, machine learning assessment, statistical tests, machine learning algorithm, machine learning comparison.…”
    Get full text
    Article
  15. 675

    Damped Algorithms for the Split Fixed Point and Equilibrium Problems by Li-Jun Zhu, Minglun Ren

    Published 2013-01-01
    “…The main purpose of this paper is to study the split fixed point and equilibrium problems which includes fixed point problems, equilibrium problems, and variational inequality problems as special cases. A damped algorithm is presented for solving this split common problem. …”
    Get full text
    Article
  16. 676

    A Triangular Personalized Recommendation Algorithm for Improving Diversity by Biao Cai, Xiaowang Yang, Yusheng Huang, Hongjun Li, Qiang Sang

    Published 2018-01-01
    “…However, diversity is also an important evaluation index in the recommendation algorithm. In order to study both the accuracy and diversity of a recommendation algorithm at the same time, this study introduced a “third dimension” to the commonly used user/product two-dimensional recommendation, and a recommendation algorithm is proposed that is based on a triangular area (TR algorithm). …”
    Get full text
    Article
  17. 677

    Nuclear Power Plant Maintenance Optimization with Heuristic Algorithm by Andrija Volkanovski, Leon Cizelj

    Published 2014-01-01
    “…The optimal solution of the objective function is estimated with genetic algorithm. The proposed method is applied on probabilistic safety analysis model of the selected safety system of the reference nuclear power plant. …”
    Get full text
    Article
  18. 678

    Virtual machine placement algorithm based on cuckoo search by Donghan JIANG, Haitao LIN

    Published 2017-10-01
    “…A cuckoo search algorithm was introduced for virtual machine placement.Firstly,the virtual machine placement program was mapped to the nest,and according to the level,the fitness would be divided into top and bottom nest.Secondly,the bottom nest and the top nest were disturbed by the disturbance function.Finally,by selecting,iterations got the best placement scheme.The algorithm was used for physical integration of cloud data centers,minimizing the number of physical machines placed.The algorithm is simulated by Cloudsim and the results show that the proposed method not only avoids the local optimum,but also has higher performance advantages than the reordered grouping genetic algorithm,the group genetic algorithm,the improved least load algorithm and the improved first fit decrease algorithm.…”
    Get full text
    Article
  19. 679

    An AkNN Algorithm for High-Dimensional Big Data by Zhongwei Wang, Yefang Chen, Siyou Xiao, Jiangbo Qian

    Published 2015-07-01
    “…A new variant of k nearest neighbor queries,which called as all k-nearest neighbor queries(AkNN),is a process to search the k nearest neighbors of each object in a data set.An AkNN query algorithm for high-dimensional big data on the Hadoop system was proposed.Using the banding technique and the p-stable LSH algorithm,dimensionality reduction was performed,then the data was embeded in a Z-order curve.The preprocessed data were continued to be treated on a MapReduce framework in a distributed parallel manner.Experimental results show that the proposed algorithm can efficiently handle AkNN queries for large-scale high-dimensional data.…”
    Get full text
    Article
  20. 680