Showing 11,821 - 11,840 results of 14,091 for search '"algorithm"', query time: 0.11s Refine Results
  1. 11821

    A Firefly Colony and Its Fuzzy Approach for Server Consolidation and Virtual Machine Placement in Cloud Datacenters by Boominathan Perumal, Aramudhan Murugaiyan

    Published 2016-01-01
    “…Managing these resources to handle large number of virtual machine requests has created the need for heuristic optimization algorithms to provide the optimal placement strategies satisfying the objectives and constraints formulated. …”
    Get full text
    Article
  2. 11822

    Research and prospect of reversible data hiding method with contrast enhancement by Yang YANG, Wei-ming ZHANG, ong-dong HOUD, Hui WANG, Neng-hai YU

    Published 2016-04-01
    “…Reversible data hiding methods can recover the cover image losslessly after extracting the secret message from the marked image.Such technology can be used in the certification or the label of military,justice and medical images,which are sensitive and slight modification are not allowed.Especially for the medical images,RDH tech-nology can be used in protecting the privacy of the patient.A series of RDH methods with contrast enhancement ef-fect were introduced and classified into pixel-based histogram methods and prediction-error-based histogram meth-ods according to the type of carrier in RDH scheme.The main purpose of such algorithms was to improve the sub-jective visual quality of marked images and to embed secret data into cover image reversibly meanwhile.These se-ries of algorithms were suitable for the research of privacy protection of medical image.Finally,future development in this direction is prospected through analyzing the advantages and disadvantages of the existing work.…”
    Get full text
    Article
  3. 11823
  4. 11824

    Hole Detection for Quantifying Connectivity in Wireless Sensor Networks: A Survey by Pearl Antil, Amita Malik

    Published 2014-01-01
    “…Coverage hole detection schemes have been classified into three categories based on the type of information used by algorithms, computation model, and network dynamics for better understanding. …”
    Get full text
    Article
  5. 11825

    Interference-Aware Fault-Tolerant Energy Spanner in Wireless Ad Hoc Networks by Dong Wang, Wang-Chen Long, Xiao-Hong Li

    Published 2012-12-01
    “…In this paper, we study the problem of power assignment in order that its induced communication graph meets the following properties: (1) it is an energy- t -spanner which is energy efficient; (2) it is k -fault resistant which can withstand up to k - 1 node failures where k   ⩾  1; (3) the interference is minimal. We propose algorithms to address this problem. Both the theoretic analysis and the simulations in the paper prove that our algorithms can induce a k -fault resistant energy spanner and furthermore the interference is minimized. …”
    Get full text
    Article
  6. 11826

    Multiplicatively weighted Voronoi-based sensor collaborative redeployment in software-defined wireless sensor networks by Minghua Wang, Ran Ou, Yan Wang

    Published 2022-03-01
    “…Finally, we demonstrate the superiority of the confident information coverage–based multiplicatively weighted Voronoi diagram and the effectiveness and efficiency of our proposed algorithms via a series of experiments.…”
    Get full text
    Article
  7. 11827

    Consensus Tracking of Fractional-Order Multiagent Systems via Fractional-Order Iterative Learning Control by Shuaishuai Lv, Mian Pan, Xungen Li, Qi Ma, Tianyi Lan, Bingqiang Li, Wenyu Cai

    Published 2019-01-01
    “…Both distributed PDα-type and Dα-type fractional-order iterative learning control (FOILC) algorithms are proposed. Here, a virtual leader is introduced to generate the desired trajectory, fixed communication topology is considered, and only a subset of followers can access the desired trajectory. …”
    Get full text
    Article
  8. 11828

    Accelerated Reconstruction of Scenes Using CUDA-Based Parallel Computing by Gui Zou, Jin Jiang, Qi Chen

    Published 2025-01-01
    “…Since the drone needs to use an embedded onboard computer and stereo matching algorithms require massive computing resources, this paper studies the optimization of CUDA-based stereo matching algorithms on embedded devices to improve the reconstruction effect of scenes and achieve rapid reconstruction, thereby reducing time costs, and enhancing drone efficiency.…”
    Get full text
    Article
  9. 11829

    Automated Shape Analysis and DEM Study on Graded Crushed Stone by Hao Bai, Ruidong Li, Xiangyu Hu, Fei Chen, Zhiyong Liao

    Published 2021-01-01
    “…In this study, the realistic particle outline is first automatically extracted based on digital image processing and deep learning algorithms. Then, the elongation (EI), roundness (Rd), and roughness (Rg) of GCS are quantified by shape evaluation algorithms. …”
    Get full text
    Article
  10. 11830

    Adaptive optimal control of prosumer energy storage system with renewable energy sources by D. V. Antonenkov, V. Z. Manusov, P. V. Matrenin, V. R. Kiushkina

    Published 2020-11-01
    “…A method for adaptation control rules using swarm intelligence algorithms is proposed. The computer simulation has shown that the use of swarm algorithms makes it possible to increase the economic efficiency of managing the prosumer’s energy storage system by 2–4 times compared to the control rules manually constructed by an expert. …”
    Get full text
    Article
  11. 11831

    An analysis of artificial intelligence automation in digital music streaming platforms for improving consumer subscription responses: a review by Nontokozo Mokoena, Ibidun Christiana Obagbuwa

    Published 2025-01-01
    “…Potential challenges related to privacy, ethics, and algorithmic biases are also discussed, showcasing how AI is revolutionizing the music streaming industry.…”
    Get full text
    Article
  12. 11832

    A Hybrid Approach to Protect Palmprint Templates by Hailun Liu, Dongmei Sun, Ke Xiong, Zhengding Qiu

    Published 2014-01-01
    “…Accuracy, changeability, and security are three critical requirements for template protection algorithms. However, existing template protection algorithms cannot satisfy all these requirements well. …”
    Get full text
    Article
  13. 11833

    Speedup of Interval Type 2 Fuzzy Logic Systems Based on GPU for Robot Navigation by Long Thanh Ngo, Dzung Dinh Nguyen, Long The Pham, Cuong Manh Luong

    Published 2012-01-01
    “…The T2FLS has a large membership value of inherent algorithmic parallelism that modern CPU architectures do not exploit. …”
    Get full text
    Article
  14. 11834

    Virtual Inertia Support for Renewable Energy Integration: A Review by M. Chethan, K. Ravi

    Published 2025-01-01
    “…This study serves as a reference for future research on VSG models and control algorithms in microgrid applications.…”
    Get full text
    Article
  15. 11835

    Multinomial logit death forecasting model by Audronė Jakaitienė

    Published 1999-12-01
    “… The multinomial regression logit model is analyzed. The algorithms and software are made for this model in order to get estimation of parameters. …”
    Get full text
    Article
  16. 11836

    MATHEMATICAL FORMALISM AND SOFTWARE FOR PROCESSING OF IMAGES OF IRON-CARBON ALLOYS MICROSTRUCTURE by A. N. Chichko, O. A. Cachek, S. G. Lihousov, V. F. Sobolev, O. I. Chichko

    Published 2010-09-01
    “…The description of mathematical apparatus, algorithms and software АОМ-1 and АОМ-2, used for computer processing and quantitative analysis of microstructures of pearlitic steels and grey irons, is given.…”
    Get full text
    Article
  17. 11837

    Some Results on Strictly Pseudocontractive Nonself-Mappings and Equilibrium Problems in Hilbert Spaces by Yan Hao, Sun Young Cho

    Published 2012-01-01
    “…Strong convergence theorems of common elements are established based on hybrid projection algorithms in the framework of real Hilbert spaces.…”
    Get full text
    Article
  18. 11838

    Categorizing and Determining of BI-RAD Breast Cancer Score by Using Deep Learning Techniques by Azhar Kassem Flayeh, Ali Douik

    Published 2024-11-01
    “…Artificial intelligence algorithms have created many techniques to extract features from massive volumes of data through training, such as deep learning. …”
    Get full text
    Article
  19. 11839
  20. 11840

    Fortifying IoT Infrastructure Using Machine Learning for DDoS Attack within Distributed Computing-based Routing in Networks by Sharaf Aldeen Abdulkadhum Abbas, Abdullahi Abdu Ibrahim

    Published 2024-06-01
    “…We evaluate these algorithms using metrics such as the confusion matrix, F1 score, and AUC-ROC to determine their performance in managing imbalanced datasets and generating meaningful insights. …”
    Get full text
    Article