-
11821
A Firefly Colony and Its Fuzzy Approach for Server Consolidation and Virtual Machine Placement in Cloud Datacenters
Published 2016-01-01“…Managing these resources to handle large number of virtual machine requests has created the need for heuristic optimization algorithms to provide the optimal placement strategies satisfying the objectives and constraints formulated. …”
Get full text
Article -
11822
Research and prospect of reversible data hiding method with contrast enhancement
Published 2016-04-01“…Reversible data hiding methods can recover the cover image losslessly after extracting the secret message from the marked image.Such technology can be used in the certification or the label of military,justice and medical images,which are sensitive and slight modification are not allowed.Especially for the medical images,RDH tech-nology can be used in protecting the privacy of the patient.A series of RDH methods with contrast enhancement ef-fect were introduced and classified into pixel-based histogram methods and prediction-error-based histogram meth-ods according to the type of carrier in RDH scheme.The main purpose of such algorithms was to improve the sub-jective visual quality of marked images and to embed secret data into cover image reversibly meanwhile.These se-ries of algorithms were suitable for the research of privacy protection of medical image.Finally,future development in this direction is prospected through analyzing the advantages and disadvantages of the existing work.…”
Get full text
Article -
11823
Chaos in a System with an Absolute Nonlinearity and Chaos Synchronization
Published 2018-01-01Get full text
Article -
11824
Hole Detection for Quantifying Connectivity in Wireless Sensor Networks: A Survey
Published 2014-01-01“…Coverage hole detection schemes have been classified into three categories based on the type of information used by algorithms, computation model, and network dynamics for better understanding. …”
Get full text
Article -
11825
Interference-Aware Fault-Tolerant Energy Spanner in Wireless Ad Hoc Networks
Published 2012-12-01“…In this paper, we study the problem of power assignment in order that its induced communication graph meets the following properties: (1) it is an energy- t -spanner which is energy efficient; (2) it is k -fault resistant which can withstand up to k - 1 node failures where k ⩾ 1; (3) the interference is minimal. We propose algorithms to address this problem. Both the theoretic analysis and the simulations in the paper prove that our algorithms can induce a k -fault resistant energy spanner and furthermore the interference is minimized. …”
Get full text
Article -
11826
Multiplicatively weighted Voronoi-based sensor collaborative redeployment in software-defined wireless sensor networks
Published 2022-03-01“…Finally, we demonstrate the superiority of the confident information coverage–based multiplicatively weighted Voronoi diagram and the effectiveness and efficiency of our proposed algorithms via a series of experiments.…”
Get full text
Article -
11827
Consensus Tracking of Fractional-Order Multiagent Systems via Fractional-Order Iterative Learning Control
Published 2019-01-01“…Both distributed PDα-type and Dα-type fractional-order iterative learning control (FOILC) algorithms are proposed. Here, a virtual leader is introduced to generate the desired trajectory, fixed communication topology is considered, and only a subset of followers can access the desired trajectory. …”
Get full text
Article -
11828
Accelerated Reconstruction of Scenes Using CUDA-Based Parallel Computing
Published 2025-01-01“…Since the drone needs to use an embedded onboard computer and stereo matching algorithms require massive computing resources, this paper studies the optimization of CUDA-based stereo matching algorithms on embedded devices to improve the reconstruction effect of scenes and achieve rapid reconstruction, thereby reducing time costs, and enhancing drone efficiency.…”
Get full text
Article -
11829
Automated Shape Analysis and DEM Study on Graded Crushed Stone
Published 2021-01-01“…In this study, the realistic particle outline is first automatically extracted based on digital image processing and deep learning algorithms. Then, the elongation (EI), roundness (Rd), and roughness (Rg) of GCS are quantified by shape evaluation algorithms. …”
Get full text
Article -
11830
Adaptive optimal control of prosumer energy storage system with renewable energy sources
Published 2020-11-01“…A method for adaptation control rules using swarm intelligence algorithms is proposed. The computer simulation has shown that the use of swarm algorithms makes it possible to increase the economic efficiency of managing the prosumer’s energy storage system by 2–4 times compared to the control rules manually constructed by an expert. …”
Get full text
Article -
11831
An analysis of artificial intelligence automation in digital music streaming platforms for improving consumer subscription responses: a review
Published 2025-01-01“…Potential challenges related to privacy, ethics, and algorithmic biases are also discussed, showcasing how AI is revolutionizing the music streaming industry.…”
Get full text
Article -
11832
A Hybrid Approach to Protect Palmprint Templates
Published 2014-01-01“…Accuracy, changeability, and security are three critical requirements for template protection algorithms. However, existing template protection algorithms cannot satisfy all these requirements well. …”
Get full text
Article -
11833
Speedup of Interval Type 2 Fuzzy Logic Systems Based on GPU for Robot Navigation
Published 2012-01-01“…The T2FLS has a large membership value of inherent algorithmic parallelism that modern CPU architectures do not exploit. …”
Get full text
Article -
11834
Virtual Inertia Support for Renewable Energy Integration: A Review
Published 2025-01-01“…This study serves as a reference for future research on VSG models and control algorithms in microgrid applications.…”
Get full text
Article -
11835
Multinomial logit death forecasting model
Published 1999-12-01“… The multinomial regression logit model is analyzed. The algorithms and software are made for this model in order to get estimation of parameters. …”
Get full text
Article -
11836
MATHEMATICAL FORMALISM AND SOFTWARE FOR PROCESSING OF IMAGES OF IRON-CARBON ALLOYS MICROSTRUCTURE
Published 2010-09-01“…The description of mathematical apparatus, algorithms and software АОМ-1 and АОМ-2, used for computer processing and quantitative analysis of microstructures of pearlitic steels and grey irons, is given.…”
Get full text
Article -
11837
Some Results on Strictly Pseudocontractive Nonself-Mappings and Equilibrium Problems in Hilbert Spaces
Published 2012-01-01“…Strong convergence theorems of common elements are established based on hybrid projection algorithms in the framework of real Hilbert spaces.…”
Get full text
Article -
11838
Categorizing and Determining of BI-RAD Breast Cancer Score by Using Deep Learning Techniques
Published 2024-11-01“…Artificial intelligence algorithms have created many techniques to extract features from massive volumes of data through training, such as deep learning. …”
Get full text
Article -
11839
-
11840
Fortifying IoT Infrastructure Using Machine Learning for DDoS Attack within Distributed Computing-based Routing in Networks
Published 2024-06-01“…We evaluate these algorithms using metrics such as the confusion matrix, F1 score, and AUC-ROC to determine their performance in managing imbalanced datasets and generating meaningful insights. …”
Get full text
Article