Showing 1,481 - 1,500 results of 19,511 for search '"algorithm"', query time: 0.09s Refine Results
  1. 1481

    An efficient XOR-based visual cryptography scheme with lossless reconfigurable algorithms by Huan Wang, Zhongyuan Jiang, Qing Qian, Hong Wang

    Published 2022-04-01
    “…This article proposes an efficient XOR-based visual cryptography scheme with lossless reconfigurable algorithms, which includes an encryption and a decryption schemes for gray-scale and color secret images. …”
    Get full text
    Article
  2. 1482

    Opportunistic routing algorithm based on trust model for ad hoc network by Bo WANG, Xun-xun CHEN

    Published 2013-09-01
    “…Due to the absence of enough physical protection,dynamic topology,distributed collaboration,the limited bandwidth and computing ability in ad hoc network,traditional routing security mechanism cannot adapt to the design of routing protocols.Recently,opportunistic routing is of the research hotspots,which can cope with the unreliable transmissions to improve throughput of the whole network by exploiting the broadcast nature of the wireless medium and spatial diversity of multi-hop wireless network.The concept of trust-based similarity in opportunistic routing for ad hoc network was incorporated,and a novel trusted opportunistic forwarding model based on trust degree of node and least cost of opportunistic routing were also built.Then a trusted minimum cost routing algorithm (MCOR) was proposed and the correctness and effectiveness of this algorithm from theoretical ana ysis were proved.Finally,MCOR algorithm was verified by simulation and was compared with the classic protocols:ExOR,TAODV and Watchdog-DSR.The simulation results show that MCOR scheme can detect and mitigate node misbehaviors.Furthermore,MCOR scheme outperforms the other protocols in terms of throughput,delay,expected ETX and cost of routing.…”
    Get full text
    Article
  3. 1483

    Pade Method for Construction of Numerical Algorithms for Fractional Initial Value Problem by Feng Gao, Chunmei Chi

    Published 2020-01-01
    “…In this paper, we propose an efficient method for constructing numerical algorithms for solving the fractional initial value problem by using the Pade approximation of fractional derivative operators. …”
    Get full text
    Article
  4. 1484

    Reduced-Dimension Noncircular-Capon Algorithm for DOA Estimation of Noncircular Signals by Weihua Lv, Huapu Sun, Xiaofei Zhang, Dazhuan Xu

    Published 2015-01-01
    “…The angle estimation performance of the proposed algorithm is much better than that of the conventional Capon algorithm and very close to that of the two-dimensional NC-Capon algorithm, which has a much higher complexity than the proposed algorithm. …”
    Get full text
    Article
  5. 1485

    A novel frequency-domain IQ imbalance estimation and compensation algorithm by Wenjie NI, Wei CAO, Kai KANG

    Published 2016-08-01
    “…To solve the problem of deterioration of system performance for the RF front-end distortion and IQ imbalance in orthogonal frequency division multiplexing(OFDM)system,a novel IQ imbalance frequency domain estimation and compensation algorithm was proposed.The effect of channel could be offset,the complexity of algorithm could be reduced and the implemention conld be achieved easily using two different pilot signals on one sub-carrier.The simulation results show that the algorithm not only greatly reduces the computational complexity,but also gets a better estimation and compensation performance,and the performance is better than traditional algorithms.…”
    Get full text
    Article
  6. 1486
  7. 1487
  8. 1488
  9. 1489

    COOPERATIVE BLOCK-PARALLEL ALGORITHMS FOR TASK EXECUTION ON MULTI-CORE SYSTEM by A. A. Prihozhy, O. N. Karasik

    Published 2015-10-01
    “…The cooperative block­parallel algorithms of solving complex tasks that can be decomposed into subtasks, which decrease the number of control transfers among threads, reduce the critical path length in a parallel implementation and increase the cores load are proposed.…”
    Get full text
    Article
  10. 1490

    Analysis of Covid-19 Spread in Palopo City Using DBSCAN Algorithms by Muhammad Arfan Bandi, Muhammad Syahid Pebriadi

    Published 2022-12-01
    “…Clustering using the DBSCAN algorithm is needed to find out the clusters that are formed and the location of Covid-19 spread in certain areas. …”
    Get full text
    Article
  11. 1491

    The Construction of Corporate Financial Management Risk Model Based on XGBoost Algorithm by Rongyuan Qin

    Published 2022-01-01
    “…With the continuous development of intelligent algorithms and machine learning algorithms, new ideas have been brought to enterprise financial risk assessment. …”
    Get full text
    Article
  12. 1492

    Improved Filter-SQP Algorithm with Active Set for Constrained Minimax Problems by Zhijun Luo, Lirong Wang

    Published 2014-01-01
    “…An improved filter-SQP algorithm with active set for constrained finite minimax problems is proposed. …”
    Get full text
    Article
  13. 1493

    Research on strong robustness watermarking algorithm based on dynamic difference expansion by Tianqi WANG, Yingzhou ZHANG, Yunlong DI, Dingwen LI, Linlin ZHU

    Published 2023-10-01
    “…A surge in the amount of information comes with the rapid development of the technology industry.Across all industries, there is a need to collect and utilize vast amounts of data.While this big data holds immense value, it also poses unprecedented challenges to the field of data security.As relational databases serve as a fundamental storage medium for data, they often contain large-scale data rich in content and privacy.In the event of a data leak, significant losses may occur, highlighting the pressing need to safeguard database ownership and verify data ownership.However, existing database watermarking technologies face an inherent tradeoff between improving watermark embedding capacity and reducing data distortion.To address this issue and enhance watermark robustness, a novel robust database watermarking algorithm based on dynamic difference expansion was introduced.The QR code was employed as the watermark, the SVD decomposition of the low frequency part of the image was utilized after Haar wavelet transform.By extracting specific feature values and using residual feature values as the watermark sequence, it was ensured that the same-length watermark sequence contains more information and the embedded watermark length can be reduced.Furthermore, by combining the adaptive differential evolution algorithm and the minimum difference algorithm, the optimal embedding attribute bits were selected to alleviate the problems of low computational efficiency, high data distortion and poor robustness of traditional difference expansion techniques in embedding watermarks, and to improve the embedding capacity of watermarks while reducing the distortion of data.Experimental results demonstrate that the proposed algorithm achieves a high watermark embedding rate with low data distortion.It is resilient against multiple attacks, exhibiting excellent robustness and strong traceability.Compared to existing algorithms, it offers distinct advantages and holds great potential for broad application in the field of data security.…”
    Get full text
    Article
  14. 1494

    Self-adaptive encryption algorithm for image based on affine and composed chaos by Chang-ci WEN, Qin WANG, Fu-min HUANG, Zhi-shu YUAN, Chun-sheng TAO

    Published 2012-11-01
    “…On the basis of three-dimensional affine transformation in limited integer domain and composed chaos,a novel digital image encryption algorithm was proposed.Firstly,it scrambled pixels’ position and confused pixels’ value according to corresponding coordination.Secondly,it took a series of nonlinear diffusion,substitution and re-diffusion.In the process of substitution,it introduced pixels’ value to perturb multiple chaos systems that were coupled together for self-adaptive encryption.The algorithm proceeded the above two steps for 3 times to defend chosen plaintext attack,and had huge key space to defend violent attack.The scrambling function in it was compatible with images at any ratio of length to width without any preprocessing; the constructed whole chaos system which had a simple form was designed modularly,and could be realized parallel conveniently.…”
    Get full text
    Article
  15. 1495

    Prioritized Experience Replay–Based Path Planning Algorithm for Multiple UAVs by Chongde Ren, Jinchao Chen, Chenglie Du

    Published 2024-01-01
    “…In this paper, we study the path planning problem for multiple UAVs and propose a reinforcement learning algorithm: PERDE-MADDPG based on prioritized experience replay (PER) and delayed update skills. …”
    Get full text
    Article
  16. 1496
  17. 1497

    A New Metaheuristic-Based Hierarchical Clustering Algorithm for Software Modularization by Masoud Aghdasifam, Habib Izadkhah, Ayaz Isazadeh

    Published 2020-01-01
    “…Due to the NP hardness of the clustering problem, evolutionary approaches such as the genetic algorithm have been used to solve this problem. In the structural refactoring literature, there exists no search-based algorithm that employs a hierarchical approach for modularization. …”
    Get full text
    Article
  18. 1498

    Hybrid Genetic Grey Wolf Algorithm for Large-Scale Global Optimization by Qinghua Gu, Xuexian Li, Song Jiang

    Published 2019-01-01
    “…In general, the metaheuristic algorithms for solving such problems often suffer from the “curse of dimensionality.” …”
    Get full text
    Article
  19. 1499
  20. 1500