-
441
Algorithm of blockchain data provenance based on ABE
Published 2019-11-01“…To solve the problem that the blockchain-based traceability algorithm mainly used homomorphic encryption and zero-knowledge proof for privacy protection,making it difficult to achieve dynamic sharing of traceability information,a blockchain data traceability algorithm based on attribute encryption was proposed.In order to realize the dynamic protection of transaction privacy,the strategy update algorithm applicable to block chain was designed based on the CP-ABE scheme proposed by Waters to achieve dynamic protection of transaction privacy.In order to realize the dynamic update of the visibility about block content,based on the strategy update algorithm,the block structure was designed to achieve the dynamic update about the content visibility of the block.The security and experimental simulation analysis show that the proposed algorithm can realize the dynamic sharing of traceability information while completing the protection transaction privacy.…”
Get full text
Article -
442
The Fast Blind Equalization Algorithm with Global Convergence
Published 1997-01-01Get full text
Article -
443
Probabilistic decoding algorithm for quantum stabilizer codes
Published 2011-01-01“…To improve the performance of quantum decoding algorithm,a quantum probabilistic decoding algorithm(QPDA) based on the check matrix for quantum stabilizer codes was proposed.To achieve low error rates the error op-erator with the minimum quantum weight was chosen and to shorten the time of decoding a quantum standard array(QSA) was constructed before decoding.Comparing with the quantum maximum likelihood decoding algorithm,the QPAD improves the reliability of degenerate decoding due to uniform decoding methods for degenerate and non-degenerate codes,furthermore,has less complexity due to does not require pre-search the bases of vector space cor-responding to the error operator.…”
Get full text
Article -
444
An Evolved Wavelet Library Based on Genetic Algorithm
Published 2014-01-01“…As the size of the images being captured increases, there is a need for a robust algorithm for image compression which satiates the bandwidth limitation of the transmitted channels and preserves the image resolution without considerable loss in the image quality. …”
Get full text
Article -
445
Optimization of the learning rate in the algorithm for data visualization
Published 2005-12-01“…The paper describes an unsupervised backpropagation algorithm to train a multilayer feed-forward neural network (SAMANN) to perform the Sammon‘s nonlinear projection. …”
Get full text
Article -
446
Inverse scattering transform algorithm for the Manakov system
Published 2023-12-01Subjects: Get full text
Article -
447
-
448
Intelligent Load Balancing Algorithm of Mega Constellation
Published 2023-12-01Subjects: Get full text
Article -
449
Trajectory clustering algorithm based on structural similarity
Published 2011-01-01“…For current trajectory clustering algorithms,most of them group full trajectories as basic units,and lead the low efficient results.Aiming at this problem,a trajectory clustering algorithm based on structural similarity was proposed.By introducing a new concept of trajectory structure and presenting structural similarity function,the internal and external features of trajectories were analyzed.The algorithm first partitioned trajectories into trajectory segments according to corner;then computed the matching degree between every trajectory segment pairs by comparing their structure features;finally grouped trajectories into clusters.Experiment results on real data set demonstrate not only the efficiency and effectiveness of the algorithm,but also the flexibility that feature sensitivity can be adjusted by different parameters.…”
Get full text
Article -
450
-
451
-
452
An Augmented Lagrangian Algorithm for Solving Semiinfinite Programming
Published 2012-01-01“…We present a smooth augmented Lagrangian algorithm for semiinfinite programming (SIP). For this algorithm, we establish a perturbation theorem under mild conditions. …”
Get full text
Article -
453
Algorithm Domination As A New Surveillance System
Published 2024-12-01Subjects: Get full text
Article -
454
Content-based effective event matching algorithm
Published 2011-01-01“…Based on the study of characteristics of the distributed virtual environment and current event matching algo-rithms,a content-based effective event matching(CEEM) algorithm was proposed.By considering the efficiency of both subscription processing and event matching,this algorithm can solve the symmetric event matching efficiently,so as to make the content-based publish/subscribe model fit the virtual environment better.Finally,experiments and performance analysis show that CEEM is both practical and effective.…”
Get full text
Article -
455
Elasto-mammography: Theory, Algorithm, and Phantom Study
Published 2006-01-01“…Incorporating the displacement measurement, an elastography reconstruction algorithm is specifically developed to estimate the elastic moduli of heterogeneous breast tissues. …”
Get full text
Article -
456
Reconceptualizing Constitutionalism in the AI Run Algorithmic Society
Published 2024-10-01“…It examines the theoretical and practical challenges to constitutionalism arising from the profound technological changes under the influence of artificial intelligence (AI) in our emerging algorithmic society. The unprecedented rapid development of AI technology has not only rendered conventional theories of modern constitutionalism obsolete, but it has also created an epistemic gap in constitutional theory. …”
Get full text
Article -
457
Numerical algorithm for integrals with rapid oscilatory functions
Published 1999-12-01Get full text
Article -
458
-
459
Bearing Fault Diagnosis based on ACSBP Algorithm
Published 2017-01-01“…In the ACS algorithm,the Levy flight strategy is eliminated to reduce the randomness of the search process. …”
Get full text
Article -
460