Showing 441 - 460 results of 19,511 for search '"algorithms"', query time: 0.11s Refine Results
  1. 441

    Algorithm of blockchain data provenance based on ABE by Youliang TIAN, Kedi YANG, Zuan WANG, Tao FENG

    Published 2019-11-01
    “…To solve the problem that the blockchain-based traceability algorithm mainly used homomorphic encryption and zero-knowledge proof for privacy protection,making it difficult to achieve dynamic sharing of traceability information,a blockchain data traceability algorithm based on attribute encryption was proposed.In order to realize the dynamic protection of transaction privacy,the strategy update algorithm applicable to block chain was designed based on the CP-ABE scheme proposed by Waters to achieve dynamic protection of transaction privacy.In order to realize the dynamic update of the visibility about block content,based on the strategy update algorithm,the block structure was designed to achieve the dynamic update about the content visibility of the block.The security and experimental simulation analysis show that the proposed algorithm can realize the dynamic sharing of traceability information while completing the protection transaction privacy.…”
    Get full text
    Article
  2. 442
  3. 443

    Probabilistic decoding algorithm for quantum stabilizer codes by XIAO Fang-ying, CHEN Han-wu

    Published 2011-01-01
    “…To improve the performance of quantum decoding algorithm,a quantum probabilistic decoding algorithm(QPDA) based on the check matrix for quantum stabilizer codes was proposed.To achieve low error rates the error op-erator with the minimum quantum weight was chosen and to shorten the time of decoding a quantum standard array(QSA) was constructed before decoding.Comparing with the quantum maximum likelihood decoding algorithm,the QPAD improves the reliability of degenerate decoding due to uniform decoding methods for degenerate and non-degenerate codes,furthermore,has less complexity due to does not require pre-search the bases of vector space cor-responding to the error operator.…”
    Get full text
    Article
  4. 444

    An Evolved Wavelet Library Based on Genetic Algorithm by D. Vaithiyanathan, R. Seshasayanan, K. Kunaraj, J. Keerthiga

    Published 2014-01-01
    “…As the size of the images being captured increases, there is a need for a robust algorithm for image compression which satiates the bandwidth limitation of the transmitted channels and preserves the image resolution without considerable loss in the image quality. …”
    Get full text
    Article
  5. 445

    Optimization of the learning rate in the algorithm for data visualization by Viktor Medvedev, Gintautas Dzemyda

    Published 2005-12-01
    “…The paper describes an unsupervised backpropagation algorithm to train a multilayer feed-forward neural network (SAMANN) to perform the Sammon‘s nonlinear projection. …”
    Get full text
    Article
  6. 446
  7. 447
  8. 448
  9. 449

    Trajectory clustering algorithm based on structural similarity by YUAN Guan, XIA Shi-xiong, ZHANG Lei, ZHOU Yong

    Published 2011-01-01
    “…For current trajectory clustering algorithms,most of them group full trajectories as basic units,and lead the low efficient results.Aiming at this problem,a trajectory clustering algorithm based on structural similarity was proposed.By introducing a new concept of trajectory structure and presenting structural similarity function,the internal and external features of trajectories were analyzed.The algorithm first partitioned trajectories into trajectory segments according to corner;then computed the matching degree between every trajectory segment pairs by comparing their structure features;finally grouped trajectories into clusters.Experiment results on real data set demonstrate not only the efficiency and effectiveness of the algorithm,but also the flexibility that feature sensitivity can be adjusted by different parameters.…”
    Get full text
    Article
  10. 450
  11. 451
  12. 452

    An Augmented Lagrangian Algorithm for Solving Semiinfinite Programming by Qian Liu, Changyu Wang

    Published 2012-01-01
    “…We present a smooth augmented Lagrangian algorithm for semiinfinite programming (SIP). For this algorithm, we establish a perturbation theorem under mild conditions. …”
    Get full text
    Article
  13. 453
  14. 454

    Content-based effective event matching algorithm by CHEN Ji-ming1, JU Shi-guang1, PAN Jin-gui2, ZOU Zhi-wen1, GONG Zhen-yu2

    Published 2011-01-01
    “…Based on the study of characteristics of the distributed virtual environment and current event matching algo-rithms,a content-based effective event matching(CEEM) algorithm was proposed.By considering the efficiency of both subscription processing and event matching,this algorithm can solve the symmetric event matching efficiently,so as to make the content-based publish/subscribe model fit the virtual environment better.Finally,experiments and performance analysis show that CEEM is both practical and effective.…”
    Get full text
    Article
  15. 455

    Elasto-mammography: Theory, Algorithm, and Phantom Study

    Published 2006-01-01
    “…Incorporating the displacement measurement, an elastography reconstruction algorithm is specifically developed to estimate the elastic moduli of heterogeneous breast tissues. …”
    Get full text
    Article
  16. 456

    Reconceptualizing Constitutionalism in the AI Run Algorithmic Society by Matej Avbelj

    Published 2024-10-01
    “…It examines the theoretical and practical challenges to constitutionalism arising from the profound technological changes under the influence of artificial intelligence (AI) in our emerging algorithmic society. The unprecedented rapid development of AI technology has not only rendered conventional theories of modern constitutionalism obsolete, but it has also created an epistemic gap in constitutional theory. …”
    Get full text
    Article
  17. 457
  18. 458
  19. 459

    Bearing Fault Diagnosis based on ACSBP Algorithm by Cheng Jiatang, Xiong Yan

    Published 2017-01-01
    “…In the ACS algorithm,the Levy flight strategy is eliminated to reduce the randomness of the search process. …”
    Get full text
    Article
  20. 460