-
1481
An efficient XOR-based visual cryptography scheme with lossless reconfigurable algorithms
Published 2022-04-01“…This article proposes an efficient XOR-based visual cryptography scheme with lossless reconfigurable algorithms, which includes an encryption and a decryption schemes for gray-scale and color secret images. …”
Get full text
Article -
1482
Opportunistic routing algorithm based on trust model for ad hoc network
Published 2013-09-01“…Due to the absence of enough physical protection,dynamic topology,distributed collaboration,the limited bandwidth and computing ability in ad hoc network,traditional routing security mechanism cannot adapt to the design of routing protocols.Recently,opportunistic routing is of the research hotspots,which can cope with the unreliable transmissions to improve throughput of the whole network by exploiting the broadcast nature of the wireless medium and spatial diversity of multi-hop wireless network.The concept of trust-based similarity in opportunistic routing for ad hoc network was incorporated,and a novel trusted opportunistic forwarding model based on trust degree of node and least cost of opportunistic routing were also built.Then a trusted minimum cost routing algorithm (MCOR) was proposed and the correctness and effectiveness of this algorithm from theoretical ana ysis were proved.Finally,MCOR algorithm was verified by simulation and was compared with the classic protocols:ExOR,TAODV and Watchdog-DSR.The simulation results show that MCOR scheme can detect and mitigate node misbehaviors.Furthermore,MCOR scheme outperforms the other protocols in terms of throughput,delay,expected ETX and cost of routing.…”
Get full text
Article -
1483
Pade Method for Construction of Numerical Algorithms for Fractional Initial Value Problem
Published 2020-01-01“…In this paper, we propose an efficient method for constructing numerical algorithms for solving the fractional initial value problem by using the Pade approximation of fractional derivative operators. …”
Get full text
Article -
1484
Reduced-Dimension Noncircular-Capon Algorithm for DOA Estimation of Noncircular Signals
Published 2015-01-01“…The angle estimation performance of the proposed algorithm is much better than that of the conventional Capon algorithm and very close to that of the two-dimensional NC-Capon algorithm, which has a much higher complexity than the proposed algorithm. …”
Get full text
Article -
1485
A novel frequency-domain IQ imbalance estimation and compensation algorithm
Published 2016-08-01“…To solve the problem of deterioration of system performance for the RF front-end distortion and IQ imbalance in orthogonal frequency division multiplexing(OFDM)system,a novel IQ imbalance frequency domain estimation and compensation algorithm was proposed.The effect of channel could be offset,the complexity of algorithm could be reduced and the implemention conld be achieved easily using two different pilot signals on one sub-carrier.The simulation results show that the algorithm not only greatly reduces the computational complexity,but also gets a better estimation and compensation performance,and the performance is better than traditional algorithms.…”
Get full text
Article -
1486
Wafer Defect Classification Algorithm With Label Embedding Using Contrastive Learning
Published 2025-01-01Get full text
Article -
1487
Improved multi-bits flipping algorithm for high-speed LDPC decoding
Published 2014-02-01Subjects: “…weighted bit flipping algorithm…”
Get full text
Article -
1488
Cooperative localization algorithm based on time-ofarrival in wireless senor network
Published 2019-01-01Get full text
Article -
1489
COOPERATIVE BLOCK-PARALLEL ALGORITHMS FOR TASK EXECUTION ON MULTI-CORE SYSTEM
Published 2015-10-01“…The cooperative blockparallel algorithms of solving complex tasks that can be decomposed into subtasks, which decrease the number of control transfers among threads, reduce the critical path length in a parallel implementation and increase the cores load are proposed.…”
Get full text
Article -
1490
Analysis of Covid-19 Spread in Palopo City Using DBSCAN Algorithms
Published 2022-12-01“…Clustering using the DBSCAN algorithm is needed to find out the clusters that are formed and the location of Covid-19 spread in certain areas. …”
Get full text
Article -
1491
The Construction of Corporate Financial Management Risk Model Based on XGBoost Algorithm
Published 2022-01-01“…With the continuous development of intelligent algorithms and machine learning algorithms, new ideas have been brought to enterprise financial risk assessment. …”
Get full text
Article -
1492
Improved Filter-SQP Algorithm with Active Set for Constrained Minimax Problems
Published 2014-01-01“…An improved filter-SQP algorithm with active set for constrained finite minimax problems is proposed. …”
Get full text
Article -
1493
Research on strong robustness watermarking algorithm based on dynamic difference expansion
Published 2023-10-01“…A surge in the amount of information comes with the rapid development of the technology industry.Across all industries, there is a need to collect and utilize vast amounts of data.While this big data holds immense value, it also poses unprecedented challenges to the field of data security.As relational databases serve as a fundamental storage medium for data, they often contain large-scale data rich in content and privacy.In the event of a data leak, significant losses may occur, highlighting the pressing need to safeguard database ownership and verify data ownership.However, existing database watermarking technologies face an inherent tradeoff between improving watermark embedding capacity and reducing data distortion.To address this issue and enhance watermark robustness, a novel robust database watermarking algorithm based on dynamic difference expansion was introduced.The QR code was employed as the watermark, the SVD decomposition of the low frequency part of the image was utilized after Haar wavelet transform.By extracting specific feature values and using residual feature values as the watermark sequence, it was ensured that the same-length watermark sequence contains more information and the embedded watermark length can be reduced.Furthermore, by combining the adaptive differential evolution algorithm and the minimum difference algorithm, the optimal embedding attribute bits were selected to alleviate the problems of low computational efficiency, high data distortion and poor robustness of traditional difference expansion techniques in embedding watermarks, and to improve the embedding capacity of watermarks while reducing the distortion of data.Experimental results demonstrate that the proposed algorithm achieves a high watermark embedding rate with low data distortion.It is resilient against multiple attacks, exhibiting excellent robustness and strong traceability.Compared to existing algorithms, it offers distinct advantages and holds great potential for broad application in the field of data security.…”
Get full text
Article -
1494
Self-adaptive encryption algorithm for image based on affine and composed chaos
Published 2012-11-01“…On the basis of three-dimensional affine transformation in limited integer domain and composed chaos,a novel digital image encryption algorithm was proposed.Firstly,it scrambled pixels’ position and confused pixels’ value according to corresponding coordination.Secondly,it took a series of nonlinear diffusion,substitution and re-diffusion.In the process of substitution,it introduced pixels’ value to perturb multiple chaos systems that were coupled together for self-adaptive encryption.The algorithm proceeded the above two steps for 3 times to defend chosen plaintext attack,and had huge key space to defend violent attack.The scrambling function in it was compatible with images at any ratio of length to width without any preprocessing; the constructed whole chaos system which had a simple form was designed modularly,and could be realized parallel conveniently.…”
Get full text
Article -
1495
Prioritized Experience Replay–Based Path Planning Algorithm for Multiple UAVs
Published 2024-01-01“…In this paper, we study the path planning problem for multiple UAVs and propose a reinforcement learning algorithm: PERDE-MADDPG based on prioritized experience replay (PER) and delayed update skills. …”
Get full text
Article -
1496
Optimizing power system trading processes using smart contract algorithms
Published 2024-12-01Get full text
Article -
1497
A New Metaheuristic-Based Hierarchical Clustering Algorithm for Software Modularization
Published 2020-01-01“…Due to the NP hardness of the clustering problem, evolutionary approaches such as the genetic algorithm have been used to solve this problem. In the structural refactoring literature, there exists no search-based algorithm that employs a hierarchical approach for modularization. …”
Get full text
Article -
1498
Hybrid Genetic Grey Wolf Algorithm for Large-Scale Global Optimization
Published 2019-01-01“…In general, the metaheuristic algorithms for solving such problems often suffer from the “curse of dimensionality.” …”
Get full text
Article -
1499
EDWF-MTTF-based heuristic scheduling algorithm in time-sensitive networks
Published 2024-02-01Subjects: Get full text
Article -
1500
Direct localization algorithm of the aerial target based on external radiation source
Published 2023-06-01Get full text
Article