Suggested Topics within your search.
Suggested Topics within your search.
-
541
Research on side information generation algorithm for Wyner-Ziv video coding
Published 2010-01-01“…To reduce the block artifacts and ghosting artifacts of side-information frame in Wyner-Ziv video coding,an overlapped block bi-directional motion compensation algorithm based on the original-image correlation was proposed.Firstly,the correlation of the original image in the encoder is calculated and sent to the decoder.Secondly,the correlation data is used to motion estimation in the decoder to get more accurate motion vector.Then the side information is gener-ated by bi-directional motion compensation.Compared with the existing algorithm,the proposed method can increase the average PSNR(peak signal-to-noise ratio) by 1.5~3dB,and also significantly improve the subjective quality of the side information.…”
Get full text
Article -
542
Packet-based routing algorithm in DTN based on the intimacy between nodes
Published 2014-12-01“…Through analyzing the moving law of nodes,the topology is defined based on intimacy between nodes by using the thoughts of reducing redundant copies through clustering in MANET and mining social community in social network for reference.Take topological trim according to the weight of edges and dig out groups of nodes which have higher inti-macy degree.And also improve the spray and wait routing protocol according to the group of source and destination nodes.Then put forward a packet-based routing algorithm in DTN based on the intimacy between nodes.Simulation result shows that this routing algorithm could effectively increase the delivery ratio and reduce delay.…”
Get full text
Article -
543
Traffic measurement algorithm based on least recent used and Bloom filter
Published 2013-01-01“…Aiming at the naïve algorithm’s deficiency of high false negative probability,a novel scheme called LRU-BF(least recent used &Bloom filter) was presented.In order to achieve high accuracy,the algorithm adopted mechanisms of LRU eliminating and Bloom filter representation to separate the process of heavy-hitter fliteration from the heavy-hitter recognition.Based on statistical theory,analytical expressions about upper-bound error probability were deduced.Simulated results indicate that LRU-BF can achieve space saving and lower error probabilit compared with Naïve-LRU algorithm.Meanwhile,it can also support the 10Gbit/s line-speed processing.…”
Get full text
Article -
544
Overview and Algorithmic Approach to Management of Male and Female Pattern Hair Loss
Published 2021-10-01“…This paper aims to provide a simple algorithmic approach toward diagnosis, staging, and treatment of PHL in males and females. …”
Get full text
Article -
545
Power control for successive interference cancellation algorithm based on game theory
Published 2015-09-01“…It was proved that implementation of successive interference cancellation could improve network throughput in wireless networks,while in order to maximize network throughput,it was a NP-Hard problem that how to control transmission power when successive interference cancellation was used in wireless networks.A non-cooperative game theory is proposed to solve power control between wireless nodes for successive interference cancellation,in which non-cooperative game theory model is proposed and Nash equilibrium is analyzed,and also the proposed algorithm can ob-tain good network throughput than others,simulations validate the results and demonstrate the superiority of the algorithm.…”
Get full text
Article -
546
Generating Self-Invertible Matrices by Hill Cipher Algorithm In Gaussian Integers
Published 2024-01-01“… In this paper, the Creating self-reflexive matrices for the Hill Cipher algorithm in Gaussian integers is discussed. It's not always possible to find the inverse of the matrix that was used to encrypt the plaintext. …”
Get full text
Article -
547
Exponential H∞ Synchronization of Chaotic Cryptosystems Using an Improved Genetic Algorithm
Published 2015-01-01“…A fuzzy controller is synthesized to not only realize the exponential synchronization, but also achieve optimal H∞ performance by minimizing the disturbance attenuation level. …”
Get full text
Article -
548
Application of modified genetic algorithms for solving evolutionary problems of the theory of schedules
Published 2023-08-01“…The article proposes ways to modify genetic algorithms used to automate the process of scheduling.Method. …”
Get full text
Article -
549
Micromedia News Dissemination Impact Assessment Integrated with Personalized Recommendation Algorithm
Published 2021-01-01“…These recommendation algorithms are effective. This promotes the dissemination of news, which also recommends news content that is more relevant to user preferences for most users. …”
Get full text
Article -
550
Research of a spam filter based on improved naive Bayes algorithm
Published 2017-03-01“…In spam filtering filed,naive Bayes algorithm is one of the most popular algorithm,a modified using support vector machine(SVM)of the native Bayes algorithm :SVM-NB was proposed.Firstly,SVM constructs an optimal separating hyperplane for training set in the sample space at the junction two types of collection,Secondly,according to its similarities and differences between the neighboring class mark for each sample to reduce the sample space also increase the independence of classes of each samples.Finally,using naive Bayesian classification algorithm for mails.The simulation results show that the algorithm reduces the sample space complexity,get the optimal classification feature subset fast,improve the classification speed and accuracy of spam filtering effectively.…”
Get full text
Article -
551
Application of DBN deep learning algorithm in anti stealing electricity system
Published 2019-02-01“…With the development of economy,the electric power demand increases gradually,but because of the relative backwardness in the automation of electricity,the phenomenon of electric stealing is common.But the traditional anti electric stealing means generally centered around how to strengthen the technical transformation of the electric energy metering device,and the management efficiency is low.The purpose of deep learning is to use the method of constructing the multi-layer neural network model.To learn the potential features of image,text,voice and other data,it also has good effect on the classification problem.The successful application of the deep learning algorithm in many complex fields provides a new effective way to solve the problem of anti stealing electricity.The structure and learning algorithm of DBN and the anti-stealing model based on DBN algorithm was mainly introduced.Finally,experiments were carried out and the results were analyzed.…”
Get full text
Article -
552
Research on performance optimizations for TCM-KNN network anomaly detection algorithm
Published 2009-01-01“…Based on TCM-KNN(transductive confidence machine for K-nearest neighbors) algorithm,the filter-based feature selection and cluster-based instance selection methods were used towards optimizing it as a lightweight network anomaly detection scheme,which not only reduced its complex feature space,but also acquired high quality instances for training.A series of experimental results demonstrate the two methods for optimizations are actually effective in greatly reducing the computational costs while ensuring high detection performances for TCM-KNN algorithm.Therefore,the two methods make TCM-KNN be a good scheme for a lightweight network anomaly detection in practice.…”
Get full text
Article -
553
Fuzzy kernel feature selection with multi-objective differential evolution algorithm
Published 2019-10-01Get full text
Article -
554
Research on sybil attack in defense blockchain based on improved PBFT algorithm
Published 2020-09-01“…Aiming at the problem that sybil attack has great harm to block chain technology,a method to improve the PBFT algorithm in the alliance chain to defend against sybil attacks was proposed.Firstly,using the idea of consensus algorithm based on proof of rights and interests,a reputation model was established,the reputation value of each node accorded to the behavior of each node in the consensus process was calculated,and different discourse rights accorded to the size of the reputation value was given.Then pre-commit phase was added to the PBFT algorithm to reduce the number of communication between nodes.The solution through formal analysis and reasoning and security testing shows that the improved PBFT algorithm can not only effectively defend against sybil attacks in the blockchain,but also make the performance of the blockchain system in terms of TPS and block generation delay.…”
Get full text
Article -
555
Distributed locating algorithm for wireless sensor networks-MDS-MAP(D)
Published 2008-01-01“…A new distributed locating algorithm MDS-MAP(D) was proposed,which attempted to improve the perform-ance of node localization in wireless sensor networks.The process of the computation about node relative coordinates and the aggregation from local network to global network are introduced explicitly.Further,the analyses to computational complexity and the simulations of the algorithm are also present.MDS-MAP(D),which is based on node clustering mechanism and uses connectivity of nodes to estimate the coordinates of nodes,reduces the complexity and energy con-sumption of node localization on the absence of distance measurement with high precision.The simulation and analysis results indicate that the complexity of node localization algorithm falls to O(Nm 2),m < N from O(N 3) and the accu-racy is improved 1%~3%.…”
Get full text
Article -
556
An evaluation of flow-routing algorithms for calculating contributing area on regular grids
Published 2025-03-01“…We also introduce a new flow-routing algorithm entitled IDS (in reference to the iterative depth- and slope-dependent nature of the algorithm) that is more suitable than MFD for applications in which the bed and water surface slopes differ substantially. …”
Get full text
Article -
557
Semianalytical algorithms to study longitudinal beam instabilities in double rf systems
Published 2025-05-01“…In this paper, we provide semianalytical algorithms designed to predict and analyze these instabilities with improved accuracy and robustness. …”
Get full text
Article -
558
An Improved Algorithm of Wireless Sensor Networks Routing Protocol Based on LEACH
Published 2013-04-01“…One of the most popular research focuses of wireless sensor network is postponing the life cycle of sensor network as well as reducing energy consumption.An efficient clustering routing algorithm based on LEACH(low energy adaptive clustering hierarch)was presented,which is the representative of hierarchy based protocol in wireless sensor network.The residual energy,average energy and maximum energy are considered in this algorithm while electing the cluster header.It can also limit the number of members of each cluster.At the same time,it can produce the first cluster header among the cluster heads which will use the multi-hop mode to balance the load of network.The simulation results show that this improved algorithm can reduce the energy consumption,extend the network life cycle and ensure the load balance of the system.…”
Get full text
Article -
559
Data aggregation scheduling algorithm based on twice maximum independent set
Published 2014-01-01“…The main task in designing a data aggregation schedule was to get a good trade-off between QoS and weighted fairness guarantee.In order to address this problem,a novel data aggregation scheduling algorithm,MISS,was proposed,which could produce a collision-free TDMA schedule for data aggregation based on twice Maximum Independent Set (MIS).In the first phase,a tree structure based on MIS was constructed,and then it was adjusted according to the energy consumption forecast of each node,forming the balanced data aggregation tree.In the second phase,the approximate maximum weighted Independent set (WMIS) was utilized of all selected links to allocate time slots for each communication link.The results of simulation demonstrate that MISS not only improves the aggregation delay and lifetime of the network,but also gives weighted fairness guarantee.…”
Get full text
Article -
560
CC-MRSJ:Cache Conscious Star Join Algorithm on Hadoop Platform
Published 2013-10-01“…A cache-conscious MapReduce star join algorithm was presented,each column of fact table was separately stored,and dimension table was divided into several column families according to dimension hierarchy.Fact table foreign key column and corresponding dimension table was co-location storage,thus reducing data movement in the join process.CC-MRSJ consists of two phases:firstly each foreign key column and the corresponding dimension table were joined; then the intermediate results were joined and random accessed measure columns,and so got the final result.CC-MRSJ read only the data needed,and cache utilization is high,so it has good cache conscious feature; it also takes advantage of late materialization,avoiding unnecessary data access and movement.CC-MRSJ has higher performance comparing to hive system based on SSB datasets.…”
Get full text
Article