Suggested Topics within your search.
Suggested Topics within your search.
-
481
An Effective Cache Algorithm for Heterogeneous Storage Systems
Published 2013-01-01“…In this paper, we present a new cache algorithm called HCM for heterogeneous storage systems. …”
Get full text
Article -
482
Information Hiding Based on Chan-Vese Algorithm
Published 2011-12-01Subjects: “…chan-vese algorithm…”
Get full text
Article -
483
Efficient Quantum Cooling Algorithm for Fermionic Systems
Published 2025-02-01“…We present a cooling algorithm for ground state preparation of fermionic Hamiltonians. …”
Get full text
Article -
484
Recursive algorithms of adaptive lattice filters adjustment
Published 2016-06-01Subjects: Get full text
Article -
485
Gap Functions and Algorithms for Variational Inequality Problems
Published 2013-01-01“…We solve several kinds of variational inequality problems through gap functions, give algorithms for the corresponding problems, obtain global error bounds, and make the convergence analysis. …”
Get full text
Article -
486
Embedding of national cryptographic algorithm in Hyperledger Fabric
Published 2021-02-01“…Hyperledger Fabric is an extensible alliance blockchain platform and provides support for enterprise-level commercial blockchain projects.The cryptographic algorithm is the core technologies of the platform, ensuring the security and non-tampering of the data on the chain.But the original Fabric platform lacks the national cryptographic algorithm support.The embedding and support of the national cryptographic algorithm of the Fabric platform was designed and implemented.Firstly, the interaction logic of between components and the invocation scenario of each type of cryptographic algorithm in the Fabric platform were analyzed, an idea of embedding national cryptographic algorithm support for the platform was proposed.Secondly, the modules and interfaces for SM2, SM3 and SM4 were added to BCCSP of the Fabric platform based on the open source code of national cryptographic algorithm implementation.Thirdly, the interface of cryptographic algorithm invoked by the upper layer of each component is associated to the interface of corresponding national cryptographic algorithms, which realized the invocation support of national cryptographic algorithm for the upper layer applications.Finally, the correctness and effectiveness of the embedded national cryptographic algorithm were verified by creating a fabric-gm test instance.And compared with the performances of the test instance built by the mirror of the native Fabric platform.The experimental results show that the embedded national cryptographic algorithm interfaces are corrected and the generated national cryptographic certificates are effective.Moreover, compared with the native Fabric platform, the network start up time increases by about 3%.In the millisecond unit, the transaction time cost increases by about one time, the dynamic certificate generation time increases by about 9%, and all the performance are within the acceptable range.…”
Get full text
Article -
487
Cloud scheduling algorithm based on fuzzy clustering
Published 2012-03-01“…In order to better serve cloud’s objective of providing low-cost and on-demand services,a two-level and fuzzy clustering based cloud scheduling algorithm named FCTLBS(fuzzy clustering and two level based task scheduling algorithm) was proposed.Scheduling was divided into two levels:user scheduling and task cheduling.It used fuzzy clustering method to cluster resources according to their capabilities and computed tasks’resource bias coefficient according to their parameters.Thus tasks with different resource preference were able to choose different capability resources in the corresponding clusters.The new algorithm reduces the scale of resource choice,better reflects cloud tasks’ service requirements.Simulation results show that the proposed algorithm has some advantages compared to other kindred algorithms.…”
Get full text
Article -
488
Pupil Detection Algorithm Based on ViM
Published 2025-06-01“…Existing pupil detection algorithms still face challenges in maintaining robustness under variable lighting conditions and occlusion scenarios. …”
Get full text
Article -
489
Generating diversity and securing completeness in algorithmic retrosynthesis
Published 2025-05-01“…Our experiments show that our algorithm outperforms the algorithm predominantly employed in this domain, Monte-Carlo Tree Search, with respect to diversity in terms of our score as well as time efficiency. …”
Get full text
Article -
490
Greedy algorithms: a review and open problems
Published 2025-02-01Subjects: “…Greedy algorithm…”
Get full text
Article -
491
Benchmarking network algorithms for contextualizing genes of interest.
Published 2019-12-01“…Our work highlights strengths and weaknesses of each algorithm and results in a recommendation of algorithms best suited for performing different tasks.…”
Get full text
Article -
492
Performance Simulations of Moving Target Search Algorithms
Published 2009-01-01“…The design of appropriate moving target search (MTS) algorithms for computer-generated bots poses serious challenges as they have to satisfy stringent requirements that include computation and execution efficiency. …”
Get full text
Article -
493
Problems and prospects of algorithmic trade in financial markets
Published 2020-05-01Subjects: “…algorithmic trading…”
Get full text
Article -
494
RTRS algorithm in low-power Internet of things
Published 2019-12-01“…Considering the feature of periodical uplink data transmission in IEEE 802.11ah low-power wide area network (LWPAN),a real-time RAW setting (RTRS) algorithm was proposed.Multiple node send data to an access point (AP),and the uplink channel resources were divided into Beacon periods in time.During a Beacon period,AP firstly predicted the next data uploading time and the total amount of devices that will upload data in the next Beacon period.The AP calculated the optimal RAW parameters for minimum energy cost and broadcasted the information to all node.Then all devices upload data according to the RAW scheduling.The simulation results show that the current network state can be predicted accurately according to the upload time of the terminal in the last period.According to the predicted state,raw configuration parameters can be dynamically adjusted and the energy efficiency can be significantly improved.…”
Get full text
Article -
495
Location prediction algorithm based on movement tendency
Published 2014-02-01“…According to the characteristics of the future location, algorithm results were divided into prediction locations and recommendation locations. …”
Get full text
Article -
496
Design of Structure and Control Algorithm for Solar Tracker
Published 2017-01-01“…Finally,the results of the experiments show that the structure design scheme and the tracking algorithm are of great significance for improving the utilization of solar energy.…”
Get full text
Article -
497
The development of algorithms for safe control of an autonomous ship
Published 2024-11-01“…The paper presents the results of a research on the development of algorithms for ship’s safe ship trajectory calculation and automatic control of the ship along the determined trajectory. …”
Get full text
Article -
498
Automatic modulation recognition algorithm for MQAM signal
Published 2019-08-01“…An automatic modulation recognition algorithm for MQAM signal was proposed.Firstly,the feature parameter F based on the fourth order cumulants was constructed to classify the square QAM and the cross QAM.Secondly,the compactness of zero center normalized instantaneous amplitude was calculated to identify the 16QAM from the square QAM.Thirdly,the baud rate was estimated by frequency spectrum of amplitude square,and timing was synchronized to delete the ISI and resume the relatively ideal constellations.And aiming at the 32QAM and the 128QAM,two different clustering radii were set,and clustering point density was got respectively by the subtractive clustering algorithm,and then the 32QAM and the 128QAM was classified depending on the difference of density value.In the same way,the 64QAM and the 256QAM were classified.The proposed algorithm can recognize five kinds of QAM signals,including 16QAM signals,32QAM signals,64QAM signals,128QAM signal and 256QAM signal without prior knowledge of frequency and baud rate.Furthermore,the proposed algorithm does not need complex iterative process,which can be applied in practical signal recognition.…”
Get full text
Article -
499
EFH:an online unsupervised hash learning algorithm
Published 2020-03-01“…Many unsupervised learning to hash algorithm needs to load all data to memory in the training phase,which will occupy a large memory space and cannot be applied to streaming data.An unsupervised online learning to hash algorithm called evolutionary forest hash (EFH) was proposed.In a large-scale data retrieval scenario,the improved evolution tree can be used to learn the spatial topology of the data.A path coding strategy was proposed to map leaf nodes to similarity-preserved binary code.To further improve the querying performance,ensemble learning was combined,and an online evolving forest hashing method was proposed based on the evolving trees.Finally,the feasibility of this method was proved by experiments on two widely used data sets.…”
Get full text
Article -
500
Application of an Improved CHI Feature Selection Algorithm
Published 2021-01-01“…So, this paper studies the CHI feature selection algorithm, and the main work and innovations are as follows: firstly, this paper analyzed the CHI algorithm’s flaws, determined that the introduction of new parameters will be the improvement direction of the CHI algorithm, and thus proposed a new algorithm based on variance and coefficient of variation. …”
Get full text
Article