Suggested Topics within your search.
Suggested Topics within your search.
-
101
Comparative analysis of integer factorization algorithms
Published 2015-10-01Subjects: Get full text
Article -
102
-
103
-
104
Unfolded Algorithms for Deep Phase Retrieval
Published 2024-12-01“…Algorithms…”
Get full text
Article -
105
Diversity and multiplexing based on GMD algorithm
Published 2007-01-01Subjects: “…geometric mean decomposition algorithm…”
Get full text
Article -
106
The analysis of algorithm for transmitters locating problem
Published 2023-09-01“… The analysis of ACO algorithm for transmitters locating problem is presented in this paper. …”
Get full text
Article -
107
Improved space protocol identification algorithm
Published 2012-05-01Subjects: Get full text
Article -
108
The responsibility of news organizations in the use of algorithms
Published 2019-09-01Subjects: “…algorithm…”
Get full text
Article -
109
Analysis of the Consecutive Mean Excision Algorithms
Published 2010-01-01“…The backward and forward consecutive mean excision (CME/FCME) algorithms are diagnostic methods for outlier (signal) detection. …”
Get full text
Article -
110
-
111
-
112
Trajectories anonymous algorithm for association attack
Published 2017-06-01“…During the location based service of continuous query,the trajectories which were produced by different movement types may reveal the privacy of user’s location.To solve this problem,a mechanism was proposed to put forward the real-time similar trajectories.With this mechanism,the subsequent position was calculated and which the dummy one was generated to establish an anonymous group,the demands of real-time trajectory anonymity were met,compensating the shortage of real-time trajectories of anonymity in other similar kinds of algorithm.Under this mechanism,a method for calculating subsequent anonymous position was proposed,which used the user's movement patterns,such as mobile direction,speed.The dummy trajectories were made very similar with the trajectory produced by the continuous query user.At the same time,the position of reachable difference in real areas was put forward,and on the basis of position reachable,this mechanism also filtrates out the unreachable candidate locations which had been calculated in the phase of dummy position generates,then decrease the probability of adversary identifies the real trajectory from the location of unreachable.Experimental results show that this method is effective for protecting the location privacy of continuous query user,and provides a good working efficiency.…”
Get full text
Article -
113
-
114
Crowdsourcing Evaluation of Video Summarization Algorithm
Published 2024-11-01“…Thus, we are proposing an experiment that utilizes crowdsourcing to evaluate the efficacy of an algorithm that summarizes videos. A group of 45 individuals participated in the experiment, where each of them were asked to watch 24 videos, each of 30-second and 45-second duration. …”
Get full text
Article -
115
Opportunities of machine learning algorithms for education
Published 2024-11-01Subjects: Get full text
Article -
116
An Iterative Algorithm for a Hierarchical Problem
Published 2012-01-01“…A general hierarchical problem has been considered, and an explicit algorithm has been presented for solving this hierarchical problem. …”
Get full text
Article -
117
Distributed Constrained Optimization Algorithms for Drones
Published 2025-01-01“…The primary objective is to develop a distributed algorithm capable of tackling this optimization problem. …”
Get full text
Article -
118
Data scrambler knight tour algorithm
Published 2024-09-01“…Based on the knight tour matrix, data scrambler and descrambler algorithms are presented in the same manner. The algorithms have a linear time complexity. …”
Get full text
Article -
119
Voice recognition enhancement by genetic algorithm
Published 2024-12-01Subjects: Get full text
Article -
120
Proposing an Improved Version of the Bat Algorithm
Published 2024-12-01Subjects: Get full text
Article