-
661
A Compact Representation for 3D Animation Using Octrees and Affine Transformations
Published 2010-01-01“…In fact, we demonstrate a computation complexity of Θ(𝑛2) for our method, while some of these methods can reach complexities of 𝑂(𝑛3) and worse. …”
Get full text
Article -
662
A Comparative Analysis of Fractional Space-Time Advection-Dispersion Equation via Semi-Analytical Methods
Published 2022-01-01“…Researchers use a variety of numerical techniques to study such fractional models, but the nonlocality of the derivative having fractional order leads to high computation complexity and complex calculations, so the task is to find an efficient technique that requires less computation and provides greater accuracy when numerically solving such models. …”
Get full text
Article -
663
Interference Mitigation Based on Low Complexity Subspace Tracking Method for Vehicle Positioning
Published 2022-01-01“…The proposed monitor is simple, efficient, and can decide when to start the interference mitigation procedure, which can reduce the computation complexity significantly; Subspace-based method is introduced to track the interference basis matrix that can be feed to RootMUSIC to detect the frequency of interference, followed by the interference mitigation with a notch filter. …”
Get full text
Article -
664
Sparse Deep Nonnegative Matrix Factorization
Published 2020-03-01“…We also analyzed the computing complexity of our frameworks to demonstrate their efficiency. …”
Get full text
Article -
665
A distributed scheme for energy-efficient event-based target recognition using Internet of Multimedia Things
Published 2022-05-01“…Some solutions presented in the literature, such as image compression, do not efficiently solve this problem because of the algorithms’ computational complexities. Thus, detecting the event of interest locally before the communication using shape-based descriptors would avoid useless data transmission and would extend the network lifetime. …”
Get full text
Article -
666
Robust H-Infinity Filter and PSO-SVM Based Monitoring of Power Quality Disturbances System
Published 2024-01-01“…Twelve different statistical features are extracted by passing the disturbances through robust H-infinity filter in order to minimize the data size and computational complexities. The statistical properties of PQ disturbances are initially categorized using the Fast Generalized Fuzzy-C means (FGFCM) clustering approach. …”
Get full text
Article -
667
High Performance GPU-Based Fourier Volume Rendering
Published 2015-01-01“…As a result of its O(N2logN) time complexity, it provides a faster alternative to spatial domain volume rendering algorithms that are O(N3) computationally complex. Relying on the Fourier projection-slice theorem, this technique operates on the spectral representation of a 3D volume instead of processing its spatial representation to generate attenuation-only projections that look like X-ray radiographs. …”
Get full text
Article -
668
Effect of Physically Realistic Potential Energy Form on Spatial Pattern Complexity in a Collective Motion Model
Published 2023-01-01“…The particle model was simulated under a number of parameterizations of this generalized potential, and the average complexity of the spatial pattern produced by each was computed. Complexity was measured by tracking the information needed to describe the particle system at different scales (the complexity profile). …”
Get full text
Article -
669
Minimum-cost gateway placement in wireless mesh networks with QoS constraints
Published 2009-01-01“…Focusing on gateway optimal placement with QoS constraints in WMNs and aiming to minimize the cost of gateway placement,firstly,a new concept of limited dominating set(LDS) in graph was presented to addresses the gate-way placement problem,and to find the solution of minimum placement cost is to find the LDS of minimum weight in the graph.Then,in order to find the minimum weighted LDS in graph,a greedy algorithm GREEDY<sub>L</sub>DS was proposed,in which the ratio of LOAD/COST was used as heuristic information to find minimum cost placement of gateway.To get further optimal solution,a particle swarm optimization algorithm PSO<sub>L</sub>DS was proposed,in which two premature avoidance methods were presented to improve the algorithm’s ability of searching for global optimal solution.At last,simulation has been done,and experiment result shows that GREEDY<sub>L</sub>DS has lower computing complexity,and when the number of gateway candidate is more than 17% of the total number of node,the result from GREEDY<sub>L</sub>DS is better than the others.Simulation also shows that PSO<sub>L</sub>DS can get the more optimal solution at the price of increasing of executing time.Compared with GREEDY<sub>L</sub>DS and OPEN/CLOSE,the average cost of gateway placement is decreased by about 15% and 9% respectively.…”
Get full text
Article -
670
Advanced Text Summarization Model Incorporating NLP Techniques and Feature-Based Scoring
Published 2025-01-01“…Moreover, although it is more computationally complex, it efficiently combines higher quality with faster summarization. …”
Get full text
Article -
671
Improved Laplacian Biogeography-Based Optimization Algorithm and Its Application to QAP
Published 2020-01-01“…Finally, some measures such as example learning, mutation operation removing, and greedy selection are adopted mostly to reduce the computation complexity of LxBBO. A lot of experimental results on the complex functions from the CEC-2013 test set show ILxBBO obtains better performance than LxBBO and quite a few state-of-the-art algorithms do. …”
Get full text
Article -
672
Genetic optimization–based scheduling in maritime cyber physical systems
Published 2017-07-01“…In order to cope with the computation complexity of traditional scheduling algorithms in intermittent infostations scenario, time-capacity mapping method is exploited to transfer it to a continue scenario when classic scheduling algorithms could be utilized with lower time complexity. …”
Get full text
Article -
673
Fast Skyline Community Search in Multi-Valued Networks
Published 2020-09-01“…However, the algorithms proposed on skyline community search can only work in the special case that the nodes have different values on each attribute, and the computation complexity degrades exponentially as the number of attributes increases. …”
Get full text
Article -
674
A kurtosis-ESPRIT algorithm for RealTime stability assessment in droop controlled microgrids
Published 2025-01-01“…Abstract Although detailed analytical models for droop-controlled microgrids are available, they are computationally complex and do not consider real-time variations in microgrid parameters and operating conditions. …”
Get full text
Article -
675
ZenLDA: Large-Scale Topic Model Training on Distributed Data-Parallel Platform
Published 2018-03-01“…The novelty of ZenLDA consists of three main aspects: (1) it converts the commonly used serial Collapsed Gibbs Sampling (CGS) inference algorithm to a Monte-Carlo Collapsed Bayesian (MCCB) estimation method, which is embarrassingly parallel; (2) it decomposes the LDA inference formula into parts that can be sampled more efficiently to reduce computation complexity; (3) it proposes a distributed LDA training framework, which represents the corpus as a directed graph with the parameters annotated as corresponding vertices and implements ZenLDA and other well-known inference methods based on Spark. …”
Get full text
Article -
676
Smart Home Security: An Efficient Multi-Factor Authentication Protocol
Published 2024-01-01“…Evaluating the computation complexity and space complexity of the proposed protocol also verifies its superior performance compared with similar schemes.…”
Get full text
Article -
677
Testing convolutional neural network based deep learning systems: a statistical metamorphic approach
Published 2025-01-01“…Metamorphic testing (MT) is considered a simple but very powerful approach in testing such computationally complex systems for which either an oracle is not available or is available but difficult to apply. …”
Get full text
Article -
678
Enhanced crayfish optimization algorithm: Orthogonal refracted opposition-based learning for robotic arm trajectory planning.
Published 2025-01-01“…In high-dimensional scenarios, trajectory planning is a challenging and computationally complex optimization task that requires finding the optimal trajectory within a complex domain. …”
Get full text
Article -
679
Two-party cooperative blind signature based on SM2
Published 2022-12-01“…SM2, issued by China in 2010, is a public key cryptography standard based on elliptic curves.It has been widely used in finance, social security and other fields thanks to its advantages of improved signature efficiency, decreased storage space and computing complexity than RSA.With the popularization and application of SM2, the issues of its key security and data privacy are of great concern.The single-key mode inhibits the potential application in multi-user settings, and the leakage of the key will threaten the security of the entire cryptosystem due to the centralization.The problem of secure storage and reasonable utilization of keys needs to be solved urgently.In addition, the SM2 digital signature algorithm cannot guarantee the message privacy.Aiming at the issues of key security and data privacy of the signature algorithm, many researchers have proposed the idea of cooperative signature and blind signature for SM2.However, there isn’t SM2 collaborative blind signature scheme proposed.Then a two-party cooperative blind signing protocol based on SM2 was proposed in this paper, which allowed two parties to sign except the user.The signing process did not require recovering the complete private key, while not revealing the information of the partial private key and secret number.The key was stored separately to improve the security of the key, while the blind signature protected the privacy of the message.In terms of security, the protocol satisfied unforgeability and unlinkability.The protocol was implemented using C to demonstrate the efficiency of each participant’s local operation.In the honest model, the time cost of each entity in the cooperative signature phase was similar as that of executing a lightweight SM2 blind signature.Overall, the proposed protocol has certain advantages in terms of function and efficiency.…”
Get full text
Article -
680
LMF-Net: A Learnable Multimodal Fusion Network for Semantic Segmentation of Remote Sensing Data
Published 2025-01-01“…Experiments on two well-established benchmark datasets reveal that our LMF-Net possesses superior segmentation behavior and strong generalization capability. In terms of computation complexity, it achieves competitive performance as well. …”
Get full text
Article