Showing 481 - 500 results of 64,539 for search '"algorithm"', query time: 0.19s Refine Results
  1. 481

    An Effective Cache Algorithm for Heterogeneous Storage Systems by Yong Li, Dan Feng, Zhan Shi

    Published 2013-01-01
    “…In this paper, we present a new cache algorithm called HCM for heterogeneous storage systems. …”
    Get full text
    Article
  2. 482

    Information Hiding Based on Chan-Vese Algorithm by Samia Sh. Lazar, Nadia M. Mohammed

    Published 2011-12-01
    Subjects: “…chan-vese algorithm…”
    Get full text
    Article
  3. 483

    Efficient Quantum Cooling Algorithm for Fermionic Systems by Lucas Marti, Refik Mansuroglu, Michael J. Hartmann

    Published 2025-02-01
    “…We present a cooling algorithm for ground state preparation of fermionic Hamiltonians. …”
    Get full text
    Article
  4. 484
  5. 485

    Gap Functions and Algorithms for Variational Inequality Problems by Congjun Zhang, Baoqing Liu, Jun Wei

    Published 2013-01-01
    “…We solve several kinds of variational inequality problems through gap functions, give algorithms for the corresponding problems, obtain global error bounds, and make the convergence analysis. …”
    Get full text
    Article
  6. 486

    Embedding of national cryptographic algorithm in Hyperledger Fabric by Qi CAO, Shuhua RUAN, Xingshu CHEN, Xiao LAN, Hongxia ZHANG, Hongjian JIN

    Published 2021-02-01
    “…Hyperledger Fabric is an extensible alliance blockchain platform and provides support for enterprise-level commercial blockchain projects.The cryptographic algorithm is the core technologies of the platform, ensuring the security and non-tampering of the data on the chain.But the original Fabric platform lacks the national cryptographic algorithm support.The embedding and support of the national cryptographic algorithm of the Fabric platform was designed and implemented.Firstly, the interaction logic of between components and the invocation scenario of each type of cryptographic algorithm in the Fabric platform were analyzed, an idea of embedding national cryptographic algorithm support for the platform was proposed.Secondly, the modules and interfaces for SM2, SM3 and SM4 were added to BCCSP of the Fabric platform based on the open source code of national cryptographic algorithm implementation.Thirdly, the interface of cryptographic algorithm invoked by the upper layer of each component is associated to the interface of corresponding national cryptographic algorithms, which realized the invocation support of national cryptographic algorithm for the upper layer applications.Finally, the correctness and effectiveness of the embedded national cryptographic algorithm were verified by creating a fabric-gm test instance.And compared with the performances of the test instance built by the mirror of the native Fabric platform.The experimental results show that the embedded national cryptographic algorithm interfaces are corrected and the generated national cryptographic certificates are effective.Moreover, compared with the native Fabric platform, the network start up time increases by about 3%.In the millisecond unit, the transaction time cost increases by about one time, the dynamic certificate generation time increases by about 9%, and all the performance are within the acceptable range.…”
    Get full text
    Article
  7. 487

    Cloud scheduling algorithm based on fuzzy clustering by Wen-juan LI, Qi-fei ZHANG, Ling-di PING, Xue-zeng PAN

    Published 2012-03-01
    “…In order to better serve cloud’s objective of providing low-cost and on-demand services,a two-level and fuzzy clustering based cloud scheduling algorithm named FCTLBS(fuzzy clustering and two level based task scheduling algorithm) was proposed.Scheduling was divided into two levels:user scheduling and task cheduling.It used fuzzy clustering method to cluster resources according to their capabilities and computed tasks’resource bias coefficient according to their parameters.Thus tasks with different resource preference were able to choose different capability resources in the corresponding clusters.The new algorithm reduces the scale of resource choice,better reflects cloud tasks’ service requirements.Simulation results show that the proposed algorithm has some advantages compared to other kindred algorithms.…”
    Get full text
    Article
  8. 488

    Pupil Detection Algorithm Based on ViM by Yu Zhang, Changyuan Wang, Pengbo Wang, Pengxiang Xue

    Published 2025-06-01
    “…Existing pupil detection algorithms still face challenges in maintaining robustness under variable lighting conditions and occlusion scenarios. …”
    Get full text
    Article
  9. 489

    Generating diversity and securing completeness in algorithmic retrosynthesis by Florian Mrugalla, Christopher Franz, Yannic Alber, Georg Mogk, Martín Villalba, Thomas Mrziglod, Kevin Schewior

    Published 2025-05-01
    “…Our experiments show that our algorithm outperforms the algorithm predominantly employed in this domain, Monte-Carlo Tree Search, with respect to diversity in terms of our score as well as time efficiency. …”
    Get full text
    Article
  10. 490

    Greedy algorithms: a review and open problems by Andrea García

    Published 2025-02-01
    Subjects: “…Greedy algorithm…”
    Get full text
    Article
  11. 491

    Benchmarking network algorithms for contextualizing genes of interest. by Abby Hill, Scott Gleim, Florian Kiefer, Frederic Sigoillot, Joseph Loureiro, Jeremy Jenkins, Melody K Morris

    Published 2019-12-01
    “…Our work highlights strengths and weaknesses of each algorithm and results in a recommendation of algorithms best suited for performing different tasks.…”
    Get full text
    Article
  12. 492

    Performance Simulations of Moving Target Search Algorithms by Peter K. K. Loh, Edmond C. Prakash

    Published 2009-01-01
    “…The design of appropriate moving target search (MTS) algorithms for computer-generated bots poses serious challenges as they have to satisfy stringent requirements that include computation and execution efficiency. …”
    Get full text
    Article
  13. 493

    Problems and prospects of algorithmic trade in financial markets by B. V. Batiuk

    Published 2020-05-01
    Subjects: “…algorithmic trading…”
    Get full text
    Article
  14. 494

    RTRS algorithm in low-power Internet of things by Yuchen CHEN, Yuan CAO, Laipeng ZHANG, Lianghui DING, Feng YANG

    Published 2019-12-01
    “…Considering the feature of periodical uplink data transmission in IEEE 802.11ah low-power wide area network (LWPAN),a real-time RAW setting (RTRS) algorithm was proposed.Multiple node send data to an access point (AP),and the uplink channel resources were divided into Beacon periods in time.During a Beacon period,AP firstly predicted the next data uploading time and the total amount of devices that will upload data in the next Beacon period.The AP calculated the optimal RAW parameters for minimum energy cost and broadcasted the information to all node.Then all devices upload data according to the RAW scheduling.The simulation results show that the current network state can be predicted accurately according to the upload time of the terminal in the last period.According to the predicted state,raw configuration parameters can be dynamically adjusted and the energy efficiency can be significantly improved.…”
    Get full text
    Article
  15. 495

    Location prediction algorithm based on movement tendency by Wen LI, Shi-xiong XIA, Feng LIU, Lei ZHANG, Guan YUAN

    Published 2014-02-01
    “…According to the characteristics of the future location, algorithm results were divided into prediction locations and recommendation locations. …”
    Get full text
    Article
  16. 496

    Design of Structure and Control Algorithm for Solar Tracker by Huo Xiangru, Hou Li, Wei Yongqiao, Luo Lan, Zhang Qi

    Published 2017-01-01
    “…Finally,the results of the experiments show that the structure design scheme and the tracking algorithm are of great significance for improving the utilization of solar energy.…”
    Get full text
    Article
  17. 497

    The development of algorithms for safe control of an autonomous ship by Monika Rybczak, Agnieszka Lazarowska

    Published 2024-11-01
    “…The paper presents the results of a research on the development of algorithms for ship’s safe ship trajectory calculation and automatic control of the ship along the determined trajectory. …”
    Get full text
    Article
  18. 498

    Automatic modulation recognition algorithm for MQAM signal by Huadi ZHANG, Huaxun LOU

    Published 2019-08-01
    “…An automatic modulation recognition algorithm for MQAM signal was proposed.Firstly,the feature parameter F based on the fourth order cumulants was constructed to classify the square QAM and the cross QAM.Secondly,the compactness of zero center normalized instantaneous amplitude was calculated to identify the 16QAM from the square QAM.Thirdly,the baud rate was estimated by frequency spectrum of amplitude square,and timing was synchronized to delete the ISI and resume the relatively ideal constellations.And aiming at the 32QAM and the 128QAM,two different clustering radii were set,and clustering point density was got respectively by the subtractive clustering algorithm,and then the 32QAM and the 128QAM was classified depending on the difference of density value.In the same way,the 64QAM and the 256QAM were classified.The proposed algorithm can recognize five kinds of QAM signals,including 16QAM signals,32QAM signals,64QAM signals,128QAM signal and 256QAM signal without prior knowledge of frequency and baud rate.Furthermore,the proposed algorithm does not need complex iterative process,which can be applied in practical signal recognition.…”
    Get full text
    Article
  19. 499

    EFH:an online unsupervised hash learning algorithm by Zhenyu SHOU, Jiangbo QIAN, Yihong DONG, Huahui CHEN

    Published 2020-03-01
    “…Many unsupervised learning to hash algorithm needs to load all data to memory in the training phase,which will occupy a large memory space and cannot be applied to streaming data.An unsupervised online learning to hash algorithm called evolutionary forest hash (EFH) was proposed.In a large-scale data retrieval scenario,the improved evolution tree can be used to learn the spatial topology of the data.A path coding strategy was proposed to map leaf nodes to similarity-preserved binary code.To further improve the querying performance,ensemble learning was combined,and an online evolving forest hashing method was proposed based on the evolving trees.Finally,the feasibility of this method was proved by experiments on two widely used data sets.…”
    Get full text
    Article
  20. 500

    Application of an Improved CHI Feature Selection Algorithm by Liang-jing Cai, Shu Lv, Kai-bo Shi

    Published 2021-01-01
    “…So, this paper studies the CHI feature selection algorithm, and the main work and innovations are as follows: firstly, this paper analyzed the CHI algorithm’s flaws, determined that the introduction of new parameters will be the improvement direction of the CHI algorithm, and thus proposed a new algorithm based on variance and coefficient of variation. …”
    Get full text
    Article