Showing 261 - 280 results of 19,511 for search '"algorithms"', query time: 0.08s Refine Results
  1. 261

    The analysis of algorithm for transmitters locating problem by Saulius Lazaravičius, Narimantas Listopadskis

    Published 2023-09-01
    “… The analysis of ACO algorithm for transmitters locating problem is presented in this paper. …”
    Get full text
    Article
  2. 262
  3. 263
  4. 264
  5. 265

    Trajectories anonymous algorithm for association attack by Lei ZHANG, Chun-guang MA, Song-tao YANG, Zeng-peng LI

    Published 2017-06-01
    “…During the location based service of continuous query,the trajectories which were produced by different movement types may reveal the privacy of user’s location.To solve this problem,a mechanism was proposed to put forward the real-time similar trajectories.With this mechanism,the subsequent position was calculated and which the dummy one was generated to establish an anonymous group,the demands of real-time trajectory anonymity were met,compensating the shortage of real-time trajectories of anonymity in other similar kinds of algorithm.Under this mechanism,a method for calculating subsequent anonymous position was proposed,which used the user's movement patterns,such as mobile direction,speed.The dummy trajectories were made very similar with the trajectory produced by the continuous query user.At the same time,the position of reachable difference in real areas was put forward,and on the basis of position reachable,this mechanism also filtrates out the unreachable candidate locations which had been calculated in the phase of dummy position generates,then decrease the probability of adversary identifies the real trajectory from the location of unreachable.Experimental results show that this method is effective for protecting the location privacy of continuous query user,and provides a good working efficiency.…”
    Get full text
    Article
  6. 266
  7. 267

    An Iterative Algorithm for a Hierarchical Problem by Yonghong Yao, Yeol Je Cho, Pei-Xia Yang

    Published 2012-01-01
    “…A general hierarchical problem has been considered, and an explicit algorithm has been presented for solving this hierarchical problem. …”
    Get full text
    Article
  8. 268
  9. 269

    Bacteria Foraging Algorithm in Antenna Design by Biswa Binayak Mangaraj, Manas Ranjan Jena, Saumendra Kumar Mohanty

    Published 2016-01-01
    “…A simple design procedure to realize an optimum antenna using bacteria foraging algorithm (BFA) is proposed in this paper. The first antenna considered is imaginary. …”
    Get full text
    Article
  10. 270

    An improved geometric algorithm for indoor localization by Junhua Yang, Yong Li, Wei Cheng

    Published 2018-03-01
    “…In this article, we propose a bilateral greed iteration localization method based on greedy algorithm in order to use all of the effective anchor points. …”
    Get full text
    Article
  11. 271

    Evolutionary Game Algorithm for Image Segmentation by Jin Zhong, Hao Wu

    Published 2017-01-01
    “…The traditional two-dimensional Otsu algorithm only considers the limitations of the maximum variance of between-cluster variance of the target class and background class; this paper proposes evolutionary game improved algorithm. …”
    Get full text
    Article
  12. 272

    Impossible differential cryptanalysis of Saturnin algorithm by Zilong JIANG, Chenhui JIN

    Published 2022-03-01
    “…A lightweight block cipher, Saturnin, is an AES-like algorithm.In a resource-constrained environment, Saturnin can also provide high security.The impossible differential analysis on Saturnin was proposed.First, based on the structure of Saturnin, the sufficient condition of 3.5-round impossible differential distinguisher of Saturnin was presented and proved, and 2<sup>70.1</sup>truncated impossible differential distinguishers could be quickly constructed by utilizing the sufficient condition.Then, from the constructed 2<sup>70.1</sup>distinguishers, the 64 distinguishers could be picked out pointedly and classified into four types.Four attack trails could be obtained by appending two rounds before the four types of distinguishers.These four attack trails had the same plaintext structure and a number of common subkey bits.With the help of these two properties, the complexity of the attack scheme could be reduced.Combined with the analysis technologies such as early abort, present the 5.5-round impossible differential attack scheme with 2<sup>176.88</sup>chosen plaintexts, 2<sup>143.88</sup> 256-bit blocks, and 2<sup>176.91</sup>5.5-round encryption.As so far, this is the known attack scheme for Saturnin against impossible differential attack.…”
    Get full text
    Article
  13. 273

    Intelligent optimization algorithm based on benchmarking by Anshi XIE

    Published 2018-07-01
    Subjects: “…intelligent optimization algorithm…”
    Get full text
    Article
  14. 274
  15. 275
  16. 276

    Improved ABR flow control algorithm by LIU Zhi-xin, GUAN Xin-ping, LONG Cheng-nian

    Published 2005-01-01
    “…To improve the performance of traffic management of ATM networks, an improved ABR flow control algorithm was proposed based on discrete model. The effect of the delay elements was considered further with the structure of follow-up control system. …”
    Get full text
    Article
  17. 277

    Design and Implementation of DHT Algorithm for NDN by Kai Lei, Meng Yuan

    Published 2014-12-01
    “…The algorithm brings the DHT to NDN for the first time. …”
    Get full text
    Article
  18. 278

    A Relativistic Algorithm with Isotropic Coordinates by S. A. Ngubelanga, S. D. Maharaj

    Published 2013-01-01
    “…The algorithm leads to a nonlinear Bernoulli equation which can be integrated in terms of arbitrary functions. …”
    Get full text
    Article
  19. 279

    Cloud architecture data center network abnormal traffic filtering algorithm based on improved grey clustering algorithm by Xuefeng ZHOU, Qiang XU, Yanting TAN, Jiayi LANG, Hang JING, Zhiqiang ZHAO

    Published 2023-07-01
    “…To avoid abnormal traffic affecting the safe operation of the cloud architecture data center network, it was necessary to filter the abnormal traffic of the cloud architecture data center network.The difficulty of filtering abnormal traffic varies under different signal-to-noise ratios and channel conditions.In order to ensure the filtering effect of abnormal traffic under different filtering conditions, a cloud architecture data center network abnormal traffic filtering algorithm based on improved grey clustering algorithm was proposed.A network traffic transmission model was built for cloud architecture data centers through time-frequency analysis, and network traffic sequences were collected.Weighted generalized distance was introduced to improve the grey clustering algorithm, and the improved grey clustering algorithm was used to calculate the optimal clustering results of network traffic sequence features, achieving traffic sequence feature extraction.The principal component eigenvalues of traffic sequence features were obtained through principal component analysis, two subspaces were constructed, and traffic features were mapped in a matrix manner to the two subspaces.Abnormal traffic was filtered based on the square prediction error of the mapping period vector and the threshold calculation results.The experimental results show that this algorithm can achieve feature extraction of data center network traffic sequences through clustering, effectively filtering abnormal traffic under different signal-to-noise ratios and channel conditions.When the signal-to-noise ratio of the network was 25 dB and the traffic was transmitted in a Gaussian channel, the filtering effect of abnormal traffic was more prominent.…”
    Get full text
    Article
  20. 280