-
261
The analysis of algorithm for transmitters locating problem
Published 2023-09-01“… The analysis of ACO algorithm for transmitters locating problem is presented in this paper. …”
Get full text
Article -
262
Improved space protocol identification algorithm
Published 2012-05-01Subjects: Get full text
Article -
263
-
264
-
265
Trajectories anonymous algorithm for association attack
Published 2017-06-01“…During the location based service of continuous query,the trajectories which were produced by different movement types may reveal the privacy of user’s location.To solve this problem,a mechanism was proposed to put forward the real-time similar trajectories.With this mechanism,the subsequent position was calculated and which the dummy one was generated to establish an anonymous group,the demands of real-time trajectory anonymity were met,compensating the shortage of real-time trajectories of anonymity in other similar kinds of algorithm.Under this mechanism,a method for calculating subsequent anonymous position was proposed,which used the user's movement patterns,such as mobile direction,speed.The dummy trajectories were made very similar with the trajectory produced by the continuous query user.At the same time,the position of reachable difference in real areas was put forward,and on the basis of position reachable,this mechanism also filtrates out the unreachable candidate locations which had been calculated in the phase of dummy position generates,then decrease the probability of adversary identifies the real trajectory from the location of unreachable.Experimental results show that this method is effective for protecting the location privacy of continuous query user,and provides a good working efficiency.…”
Get full text
Article -
266
-
267
An Iterative Algorithm for a Hierarchical Problem
Published 2012-01-01“…A general hierarchical problem has been considered, and an explicit algorithm has been presented for solving this hierarchical problem. …”
Get full text
Article -
268
Proposing an Improved Version of the Bat Algorithm
Published 2024-12-01Subjects: Get full text
Article -
269
Bacteria Foraging Algorithm in Antenna Design
Published 2016-01-01“…A simple design procedure to realize an optimum antenna using bacteria foraging algorithm (BFA) is proposed in this paper. The first antenna considered is imaginary. …”
Get full text
Article -
270
An improved geometric algorithm for indoor localization
Published 2018-03-01“…In this article, we propose a bilateral greed iteration localization method based on greedy algorithm in order to use all of the effective anchor points. …”
Get full text
Article -
271
Evolutionary Game Algorithm for Image Segmentation
Published 2017-01-01“…The traditional two-dimensional Otsu algorithm only considers the limitations of the maximum variance of between-cluster variance of the target class and background class; this paper proposes evolutionary game improved algorithm. …”
Get full text
Article -
272
Impossible differential cryptanalysis of Saturnin algorithm
Published 2022-03-01“…A lightweight block cipher, Saturnin, is an AES-like algorithm.In a resource-constrained environment, Saturnin can also provide high security.The impossible differential analysis on Saturnin was proposed.First, based on the structure of Saturnin, the sufficient condition of 3.5-round impossible differential distinguisher of Saturnin was presented and proved, and 2<sup>70.1</sup>truncated impossible differential distinguishers could be quickly constructed by utilizing the sufficient condition.Then, from the constructed 2<sup>70.1</sup>distinguishers, the 64 distinguishers could be picked out pointedly and classified into four types.Four attack trails could be obtained by appending two rounds before the four types of distinguishers.These four attack trails had the same plaintext structure and a number of common subkey bits.With the help of these two properties, the complexity of the attack scheme could be reduced.Combined with the analysis technologies such as early abort, present the 5.5-round impossible differential attack scheme with 2<sup>176.88</sup>chosen plaintexts, 2<sup>143.88</sup> 256-bit blocks, and 2<sup>176.91</sup>5.5-round encryption.As so far, this is the known attack scheme for Saturnin against impossible differential attack.…”
Get full text
Article -
273
Intelligent optimization algorithm based on benchmarking
Published 2018-07-01Subjects: “…intelligent optimization algorithm…”
Get full text
Article -
274
Distributed refinement algorithm for WSN localization
Published 2015-01-01Subjects: Get full text
Article -
275
-
276
Improved ABR flow control algorithm
Published 2005-01-01“…To improve the performance of traffic management of ATM networks, an improved ABR flow control algorithm was proposed based on discrete model. The effect of the delay elements was considered further with the structure of follow-up control system. …”
Get full text
Article -
277
Design and Implementation of DHT Algorithm for NDN
Published 2014-12-01“…The algorithm brings the DHT to NDN for the first time. …”
Get full text
Article -
278
A Relativistic Algorithm with Isotropic Coordinates
Published 2013-01-01“…The algorithm leads to a nonlinear Bernoulli equation which can be integrated in terms of arbitrary functions. …”
Get full text
Article -
279
Cloud architecture data center network abnormal traffic filtering algorithm based on improved grey clustering algorithm
Published 2023-07-01“…To avoid abnormal traffic affecting the safe operation of the cloud architecture data center network, it was necessary to filter the abnormal traffic of the cloud architecture data center network.The difficulty of filtering abnormal traffic varies under different signal-to-noise ratios and channel conditions.In order to ensure the filtering effect of abnormal traffic under different filtering conditions, a cloud architecture data center network abnormal traffic filtering algorithm based on improved grey clustering algorithm was proposed.A network traffic transmission model was built for cloud architecture data centers through time-frequency analysis, and network traffic sequences were collected.Weighted generalized distance was introduced to improve the grey clustering algorithm, and the improved grey clustering algorithm was used to calculate the optimal clustering results of network traffic sequence features, achieving traffic sequence feature extraction.The principal component eigenvalues of traffic sequence features were obtained through principal component analysis, two subspaces were constructed, and traffic features were mapped in a matrix manner to the two subspaces.Abnormal traffic was filtered based on the square prediction error of the mapping period vector and the threshold calculation results.The experimental results show that this algorithm can achieve feature extraction of data center network traffic sequences through clustering, effectively filtering abnormal traffic under different signal-to-noise ratios and channel conditions.When the signal-to-noise ratio of the network was 25 dB and the traffic was transmitted in a Gaussian channel, the filtering effect of abnormal traffic was more prominent.…”
Get full text
Article -
280
ECC fault attack algorithm based on Grover's quantum search algorithm with 0.1π phase rotation
Published 2017-08-01Get full text
Article