-
1181
Link-disjoint routing algorithm under multiple additive QoS constraints
Published 2010-01-01“…The problem of finding link-disjoint paths under multiple additive QoS constraints was studied.Since the existing algorithms depended on network’s structure and could not guarantee to find feasible solutions for arbitrary net-works,a novel algorithm called multiple constrained link-disjoint path routing algorithm(MCLPRA) was proposed.MCLPRA was based on SAMCRA and didn’t rely on the network’s structure.By introducing the parameter to control its search depth,dividing the solution space into different classes and performing searching according to the classes respectively,MCLPRA was able to obtain the feasible solutions for arbitrary networks.Theoretic analysis shows that MCLPRA can get the feasible and optimal solutions when traditional schemes can not.Comprehensive simulations also show that MCLPRA has better performances than existing algorithms in terms of higher average successful rate of getting feasible solutions with shorter average total length of the obtained path pair.…”
Get full text
Article -
1182
Modelling and Neuro-Adaptive Robust Control Algorithms for Solid Fuel Rockets
Published 2025-01-01“…The modelling and neuro-adaptive robust control algorithms for these rockets are presented. Initially, the methodology is evaluated for a robust controller based on a reference model with ANN-RBF for altitude control. …”
Get full text
Article -
1183
Novel non-cooperative power control game algorithm for cognitive radio
Published 2012-11-01“…A novel non-cooperative power control algorithm based on new pricing function and the characteristics of cognitive radio technology was proposed with the interference temperature constrain,in order to improve signal to interference plus noise ratio of CR.The problem of power control was changed into the problem of multi-restraints non-linear optimization with interference limits based on channel conditions,maximal network and power limits.The existence and unique of nash equilibrium(NE)in utility function by the principle of game theory and optimization were proved and a distributed algorithm for this game was proposed.Simulation results show that the proposed algorithm can improve users QoS(quality of serves),system performance effectively and improve radio resource efficiency.…”
Get full text
Article -
1184
Digital Music Waveform Analysis and Retrieval Based on Feature Extraction Algorithm
Published 2021-01-01“…Taking the extraction of waveform music file features as the starting point, this paper combines the digital music feature extraction algorithm to build a music feature extraction model and conducts an in-depth analysis of the digital music waveform extraction process. …”
Get full text
Article -
1185
An Intrusion Detection System Based on Deep Learning and Metaheuristic Algorithm for IOT
Published 2024-04-01Subjects: Get full text
Article -
1186
State-of-the-Art Review on Relevance of Genetic Algorithm to Internet Web Search
Published 2012-01-01“…This paper looks at how GAs can be applied in the field of IR and specifically the relevance of genetic algorithms to internet web search. Finally, from the proposals surveyed it turns out that GA is applied to diverse problem fields of internet web search.…”
Get full text
Article -
1187
A Modified Key Generation Algorithm to Rebalanced-RSA and RPower-RSA
Published 2024-12-01Subjects: Get full text
Article -
1188
Energy Efficient Distributed Fault Identification Algorithm in Wireless Sensor Networks
Published 2014-01-01“…A distributed fault identification algorithm is proposed here to find both hard and soft faulty sensor nodes present in wireless sensor networks. …”
Get full text
Article -
1189
Simple power analysis attack against cryptosystems based on Montgomery algorithm
Published 2013-08-01Subjects: Get full text
Article -
1190
Topology Control Algorithm in Heterogeneous Wireless Sensor Network with Energy Supply
Published 2015-08-01“…In view of the problem that current algorithm mainly research on topology construction or topology maintenance separately,a topology control algorithm based on two processes combined was proposed,which was adaptive to the network with heterogeneous communication and energy.Topology construction was to construct connected dominating set with low message overhead,and topology maintenance was to execute local or global repair strategies by sink node based on time,energy or failure mechanism to save energy.Theoretical analysis and simulation experiments confirm that the algorithm can construct topology with low time and message overhead and extend network lifetime.…”
Get full text
Article -
1191
Cooperative Spectrum Sensing Algorithm Based on Double Eigenvalue Limiting Distribution
Published 2014-04-01“…A spectrum sensing algorithm using double eigenvalue limiting(DEL)distributions was presented. …”
Get full text
Article -
1192
Joint Angles and Mutual Coupling Estimation Algorithm for Bistatic MIMO Radar
Published 2012-01-01“…The simulation results verify the algorithmic effectiveness of our scheme.…”
Get full text
Article -
1193
Ocean parameter adaptive time synchronization algorithm for ocean sensor network
Published 2017-10-01“…An ocean parameter adaptive time synchronization (OPA-Sync) algorithm was proposed,which based on the influence of ocean parameters in different conditions.It improved the adaptation of time synchronization algorithm by adjusting the ocean parameters in the complex and varied environment.And the algorithm was optimized to improve the operation efficiency.Simulation results show that OPA-Sync can be adapted to different ocean environments,which is better than other existing time synchronization algorithms on the synchronization precision and efficiency.…”
Get full text
Article -
1194
A Group Rotate-Vector Algorithm for Mixed-Variable Optimization Problems
Published 2024-01-01Subjects: Get full text
Article -
1195
FI-SURF algorithm for image copy-flip-move forgery detection
Published 2015-05-01“…FI-SURF (flip invariant SURF) algorithm was proposed,for the consideration of the copy-move forgery detec-tion of digital images.The arrangement of the SURF (speeded-up robust features) descriptor after image flip was studied.After extract the SURF interest points,rearrange the descriptors,the interest points can still be matched even under the condition of copy-flip-move.The experiment results show that FI-SURF not only reserved the advantage of SURF,but also can detect the copy-flip-move forgery,and can locate the duplicated region.…”
Get full text
Article -
1196
Research on Multiscene Vehicle Dataset Based on Improved FCOS Detection Algorithms
Published 2021-01-01“…FCOS as a representative of anchor-free detection algorithms was once a sensation, but now it seems to be slightly insufficient. …”
Get full text
Article -
1197
The PIC Cystogram: Its Place in the Treatment Algorithm of Recurrent Febrile UTIs
Published 2008-01-01“…A prospective randomized trial is underway to further define its role in the treatment algorithm of febrile UTIs.…”
Get full text
Article -
1198
Delay constraint minimum interruption routing algorithm for mobile satellite network
Published 2006-01-01Subjects: Get full text
Article -
1199
Time slot-based RED algorithm on self-similar flows:SFRED
Published 2010-01-01“…Based on fractional Brownian motion(FBM),one calculation of the packet drop probability in the RED algorithm was derived under self-similar flows.Based on the self-similarity and the long-range dependence characteristics of Internet network traffics,a time slot-based RED algorithm on self-similar flows(SFRED) was proposed to the router queue management.The packet drop probability is calculated in every time-slot so that the burden is greatly reduced.It is simulated by NS2 and the experimental results show that the algorithm SFRED outperforms RED.SFRED can control the queue length under adaptive flows with a good throughput.…”
Get full text
Article -
1200
DNS log analysis system based on big data fusion algorithm
Published 2019-05-01“…The existing problems of big data analysis of DNS logs in the current industry were summarized,and a DNS log analysis system based on big data fusion algorithm was designed.The system integrates six information databases,such as record information database,website database,domain name database,IP address database,CNAME domain name database and security information database.It has powerful log analysis performance,comprehensive content analysis,and classification.With high analysis depth and flexible report customization function,it can provide decision-making basis for telecom operators to improve the management efficiency,optimize network security and enhance the network rate.…”
Get full text
Article