Showing 721 - 740 results of 19,511 for search '"algorithms"', query time: 0.07s Refine Results
  1. 721

    An Algorithm Using DBSCAN to Solve the Velocity Dealiasing Problem by Wei Zhao, Qinglan Li, Kuifeng Jin

    Published 2021-01-01
    “…The results of the case study also show that the 4DD algorithm filters out many observation gates close to the missing data or radar center, whereas the proposed algorithm tends to retain and correct these gates.…”
    Get full text
    Article
  2. 722

    IMPROVEMENT OF CUCKOO ALGORITHM FOR ASSOCIATION RULE HIDING PROBLEM by Đoàn Minh Khuê, Lê Hoài Bắc

    Published 2018-07-01
    “…Recently, a meta-heuristic algorithm is relatively effective for this purpose, which is cuckoo optimization algorithm (COA4ARH). …”
    Get full text
    Article
  3. 723
  4. 724

    Algorithm of NAF scalar multiplication on ECC against SPA by Min WANG, Zhen WU

    Published 2012-09-01
    “…Against the problem that non-adjacent form(NAF)scalar multiplication on Elliptic curve cryptography(ECC) were not well resist the simple power attack(SPA),the implementation of NAF scalar multiplication and the mechanism of SPA attack were analyzed.Then a new algorithm,named equal power NAF scalar multiplication was presented.It was verified that equal power NAF scalar multiplication was efficient countermeasure against SPA attack by experimental analysis on power traces of the smartcard collected from the power analysis platform.…”
    Get full text
    Article
  5. 725

    Learning Based Genetic Algorithm for Task Graph Scheduling by Habib Izadkhah

    Published 2019-01-01
    “…An effective scheduling algorithm attempts to minimize the makespan and an efficient algorithm, in addition to that, tries to reduce the complexity of the optimization process. …”
    Get full text
    Article
  6. 726

    Research progress of mimic multi-execution scheduling algorithm by Zhengbin ZHU, Qinrang LIU, Dongpei LIU, Chong WANG

    Published 2021-05-01
    “…Mimic defense is the new active defense technology based on the dynamic heterogeneous redundant architecture.With inherent uncertainty, heterogeneous, redundant and negative feedback features, it can significantly improve the robustness and security of system.Among them, the scheduling algorithm is the key to mimic defense technology, which advantages and disadvantages directly affect the ability of system to resist attacks based on known or unknown vulnerabilities.Based on this, the principle and goal of mimic scheduling algorithm were firstly introduced.Then the state-of-the-art of mimic scheduling algorithms were analyzed and summarized from three aspects, such as scheduling object, scheduling quantity and scheduling timing.Finally, the future research direction and trend of mimic scheduling algorithms were prospected.…”
    Get full text
    Article
  7. 727
  8. 728

    Secure key-sharing algorithm based on smart grid by Wei GU, Jian SHEN, Yongjun REN

    Published 2021-08-01
    “…Most of establishment-key protocols suffer from both session-specific temporary information attack and private key leakage issue.Therefore, a novel public key sharing-based symmetric encryption algorithm (PKS-SE) was proposed, in order to maintain the security of communication between smart meter and service providers.Based on bilinear mapping and super-singular curve, PKS-SE algorithm constructed the communication key between intelligent electricity meter and service provider, in order to avoid the key escrow problem.At the same time, PKS-SE algorithm reduced the number of required messages during the mutual authentication to only two messages, thus controlling the communication cost and operation cost of PKS-SE algorithm.Simulation results show that the proposed PKS-SE algorithm can effectively realize public key-sharing…”
    Get full text
    Article
  9. 729

    Hierarchical Sliding Mode Algorithm for Athlete Robot Walking by Van Dong Hai Nguyen, Xuan-Dung Huynh, Minh-Tam Nguyen, Ionel Cristian Vladu, Mircea Ivanescu

    Published 2017-01-01
    “…A new method based on hierarchical sliding mode for controlling postures is also introduced. Genetic algorithm is applied to design the oscillator for robot motion. …”
    Get full text
    Article
  10. 730

    Geometrically synchronous watermarking algorithm based on the corner feature by LIU Quan1, ZHANG Le1, ZHANG Yong-gang2, Christian Bessiere3, FU Qi-ming1, WANG Xiao-yan1

    Published 2011-01-01
    “…Simple geometric attacks could destroy watermark or its position,causing the failure of most watermarking algorithm.A geometrically synchronous watermarking algorithm robust based on the corner feature was proposed.In this paper,the feature point was detected on the normalization of the image to resist geometric attack;the combination of Harris and MIC corner detected algorithm was utilized to extract steady corner based on analyzing the advantages and disadvantages of the two algorithm;the watermarking information was statistic embed in the shape of rings instead of changing the simply one pixel.Sufficient experiments demonstrate the robustness of this approach,especially in resisting geometry attack such as RST(rotation,scaling and translation).…”
    Get full text
    Article
  11. 731

    Algorithm of grid reliability assessment and reconstruction optimization system by Zhibin ZANG, Peihao ZHENG, Benhai WEI, Zaipei ZHAI, Shengguo MA

    Published 2017-12-01
    “…Based on the research of the reliability of distribution network and the reconstruction of network,a new method was put forward to reconstruct the power grid reliability.Firstly,the evaluation index system was proposed,which included the active network LOSS (LOSS),lack of system power supply (ENS) and the average power supply availability (ASAI).A multi-objective model of distribution network was constructed by normalization,and the multi-objective function was transformed into a new single objective function by using the judgment matrix method,which realized fast calculation of power distribution network reconstruction and optimization.Through IEEE69 example verification,the optimization algorithm can obtain the global optimal solution and reduce the computational time at the same time,effectively solve the problem of the reconstruction of the complex network optimization.…”
    Get full text
    Article
  12. 732

    Federated learning optimization algorithm based on incentive mechanism by Youliang TIAN, Shihong WU, Ta LI, Lindong WANG, Hua ZHOU

    Published 2023-05-01
    “…Federated learning optimization algorithm based on incentive mechanism was proposed to address the issues of multiple iterations, long training time and low efficiency in the training process of federated learning.Firstly, the reputation value related to time and model loss was designed.Based on the reputation value, an incentive mechanism was designed to encourage clients with high-quality data to join the training.Secondly, the auction mechanism was designed based on the auction theory.By auctioning local training tasks to the fog node, the client entrusted the high-performance fog node to train local data, so as to improve the efficiency of local training and solve the problem of performance imbalance between clients.Finally, the global gradient aggregation strategy was designed to increase the weight of high-precision local gradient in the global gradient and eliminate malicious clients, so as to reduce the number of model training.…”
    Get full text
    Article
  13. 733

    A ranking hashing algorithm based on listwise supervision by Anbang YANG, Jiangbo QIAN, Yihong DONG, Huahui CHEN

    Published 2019-05-01
    “…Recently,learning to hash technology has been used for the similarity search of large-scale data.It can simultaneous increase the search speed and reduce the storage cost through transforming the data into binary codes.At present,most ranking hashing algorithms compare the consistency of data in the Euclidean space and the Hamming space to construct the loss function.However,because the Hamming distance is a discrete integer value,there may be many data points sharing the same Hamming distance result in the exact ranking cannot be performed.To address this challenging issue,the encoded data was divided into several subspaces with the same length.Each subspace was set with different weights.The Hamming distance was calculated according to different subspace weights.The experimental results show that this algorithm can effectively sort the data in the Hamming space and improve the accuracy of the query compared with other learning to hash algorithms.…”
    Get full text
    Article
  14. 734
  15. 735

    Automatic Synthesis Algorithm of Topological Structure of Series Mechanism by Liu Xiaoshan, Luo Yufeng, Shi Zhixin, Wang Gang, Xia Yongqiang

    Published 2018-01-01
    “…Then,the locations relationships among kinematic pairs are thoroughly enumerated by using the method of exhaustion,the automatically solving of position and orientation characteristics set is realized by using algorithm,the mechanism that meet the requirement is selected,and the GUI human-computer interaction interface is designed. …”
    Get full text
    Article
  16. 736
  17. 737

    Development of algorithm for segmentation of handwritten text using masks by V. Yu. Kobenko, S. O. Frolov, V. I. Talalayev

    Published 2020-09-01
    “…Describes common methods of segmentation, allowing to solve this problem: method of color image analysis the binary image segmentation method of fixing level, as well as, a method for the separation and analysis of circuits. The proposed algorithm for text segmentation based on the use of the mask of the original image to simplify the segmentation of text in images with a non-monotonic background. …”
    Get full text
    Article
  18. 738

    Survey of research on application of heuristic algorithm in machine learning by Yanping SHEN, Kangfeng ZHENG, Chunhua WU, Yixian YANG

    Published 2019-12-01
    “…Aiming at the problems existing in the application of machine learning algorithm,an optimization system of the machine learning model based on the heuristic algorithm was constructed.Firstly,the existing types of heuristic algorithms and the modeling process of heuristic algorithms were introduced.Then,the advantages of the heuristic algorithm were illustrated from its applications in machine learning,including the parameter and structure optimization of neural network and other machine learning algorithms,feature optimization,ensemble pruning,prototype optimization,weighted voting ensemble and kernel function learning.Finally,the heuristic algorithms and their development directions in the field of machine learning were given according to the actual needs.…”
    Get full text
    Article
  19. 739

    Application of Extreme Learning Machine Algorithm for Drought Forecasting by Muhammad Ahmad Raza, Mohammed M. A. Almazah, Zulfiqar Ali, Ijaz Hussain, Fuad S. Al-Duais

    Published 2022-01-01
    “…Generally, graphical results illustrated an excellent performance of the ELM algorithm over MLP and ARIMA models. For training data of SPTI-1, ELM’s best performance has observed at Chitral station (RMSE = 0.374, KGE = 0.838, WI = 0.960, MAE = 0.272, MAPE = 259.59, R = 0.93). …”
    Get full text
    Article
  20. 740

    Study on an improved naive Bayes algorithm in spam filtering by Lei YANG, Cui-ling CAO, Jian-guo SUN, Li-guo ZHANG

    Published 2017-04-01
    “…A method of improved support vector machine naive Bayes algorithm was proposed——TSVM-NB algorithm.…”
    Get full text
    Article