Showing 1,621 - 1,640 results of 25,328 for search 'research algorithm', query time: 0.26s Refine Results
  1. 1621

    Improved meet-in-the-middle attack on reduced-round Kiasu-BC algorithm by Manman LI, Shaozhen CHEN

    Published 2022-07-01
    “…Kiasu-BC algorithm is an internal tweakable block cipher of authenticated encryption algorithm Kiasu as one of first-round candidates in the CAESAR competition.The precomputation complexity is reduced by utilizing the freedom of the tweak and the internal key restriction through the research on structural characteristics of Kiasu-BC algorithm based on AES-128 round function.Combined with the differential enumeration technique, a new 5-round meet-in-the-middle distinguisher was constructed to improve the meet-in-the-middle attack on 8-round Kiasu-BC algorithm.The improved attack requires the time complexity of 2<sup>114</sup>, the memory complexity of 2<sup>63</sup> and the data complexity of 2<sup>108</sup>.…”
    Get full text
    Article
  2. 1622
  3. 1623

    A survey on AI algorithms applied in communication and computation in Internet of vehicles by Yu KANG, Yaqiong LIU, Tongyu ZHAO, Guochu SHOU

    Published 2023-01-01
    “…In the 5G era, the development of communication and computing in the Internet of vehicles has been limited by the rapidly increasing amount of information.New breakthroughs in communication and computing in Internet of vehicles can be achieved by applying AI algorithms to the Internet of vehicles.Firstly, the application of AI algorithms in communication security, communication resource allocation, computation resource allocation, task offloading decision, server deployment, communication-computation integration were investigated.Secondly, the achievements and shortcomings of the present AI algorithms in different scenarios were analyzed.Finally, combined with the Internet of vehicle development trend, some future research directions for AI algorithms applied in the Internet of vehicles were discussed.…”
    Get full text
    Article
  4. 1624
  5. 1625

    Distributed energy efficient unequal clustering algorithm for wireless sensor networks by SHANG Feng-jun1, Mehran Abolhasan2, Tadeusz Wysocki3

    Published 2009-01-01
    “…A distributed energy-efficient unequal clustering (DEEUC) algorithm was proposed for wireless sensor net-works by research current routing algorithms. …”
    Get full text
    Article
  6. 1626

    ESYN:efficient synchronization clustering algorithm based on dynamic synchronization model by Xue-wen DONG, Chao YANG, Li-jie SHENG, Jian-feng MA

    Published 2014-11-01
    “…Clustering is an important research field in data mining.Based on dynamical synchronization model,an efficient synchronization clustering algorithm ESYN is proposed.Firstly,based on local structure information of a non-vector network,a new concept vertex similarity is brought up to describe the link density between vertices.Secondly,the network is vectoried by OPTICS algorithm and turned into one-dimensional coordination sequence.Finally,global coupling analysis is applied to generalized Kuramoto synchronization model,synchronization radius is increased and the optimal clustering result is automatically selected.The experimental results on a large number of synthetic and real-world networks show that proposed algorithm achieves high accuracy.…”
    Get full text
    Article
  7. 1627

    Amazigh spell checker using Damerau-Levenshtein algorithm and N-gram by Youness Chaabi, Fadoua Ataa Allah

    Published 2022-09-01
    “…Natural language processing (NLP) is a rapidly growing research field in computer science and cognitive science. …”
    Get full text
    Article
  8. 1628

    An Algorithm for Part Input Sequencing of Flexible Manufacturing Systems with Machine Disruption by Yumin He, Alexandre Dolgui, Milton Smith

    Published 2024-10-01
    “…Evaluation is performed for the proposed algorithm by simulation experiments and result analyses. …”
    Get full text
    Article
  9. 1629

    Performance analysis and testing of personal influence algorithm in online social networks by Yong QUAN, Yan JIA, Liang ZHANG, Zheng ZHU, Bin ZHOU, Binxing FANG

    Published 2018-10-01
    “…Social influence is the key factor to drive information propagation in online social networks and can be modeled and analyzed with social networking data.As a kind of classical personal influence algorithm,two parallel implementation versions of a PageRank based method were introduced.Furthermore,extensive experiments were conducted on a large-scale real dataset to test the performance of these parallel methods in a distributed environment.The results demonstrate that the computational efficiency of the personal influence algorithm can be improved significantly in massive data sets by virtue of existing big data processing framework,and provide an empirical reference for the future research and optimization of the algorithm as well.…”
    Get full text
    Article
  10. 1630

    ESYN:efficient synchronization clustering algorithm based on dynamic synchronization model by Xue-wen DONG, Chao YANG, Li-jie SHENG, Jian-feng MA

    Published 2014-11-01
    “…Clustering is an important research field in data mining.Based on dynamical synchronization model,an efficient synchronization clustering algorithm ESYN is proposed.Firstly,based on local structure information of a non-vector network,a new concept vertex similarity is brought up to describe the link density between vertices.Secondly,the network is vectoried by OPTICS algorithm and turned into one-dimensional coordination sequence.Finally,global coupling analysis is applied to generalized Kuramoto synchronization model,synchronization radius is increased and the optimal clustering result is automatically selected.The experimental results on a large number of synthetic and real-world networks show that proposed algorithm achieves high accuracy.…”
    Get full text
    Article
  11. 1631

    Traffic identification of network business based on multi-layer cascade algorithm by Feng HUANG, Yao WANG, Li HUANG, Jiming YAO, Shidong LIU

    Published 2015-12-01
    “…The contradiction between traffic demand and network bandwidth is the main problem of the current network.Traffic management is one of the effective solutions,at the same time it can improve the quality of service of the network,and network traffic identification is the basis of fine traffic management.The traffic identification method of network business based on multi-layer cascade algorithm was proposed,after the research of network traffic identification and machine learning techniques.This method can adapt to the situation of the complex network traffic flow,and can balance the contradiction between the time performance and the accuracy of the machine learning algorithm.Furthermore the cascade algorithm of this method takes the cost imbalance into account,and takes more attention to the identification of important business,so it can help enhance user experience.…”
    Get full text
    Article
  12. 1632
  13. 1633

    Algorithm for Calculating Noise Immunity of Cognitive Dynamic Systems in the State Space by A. A. Solodov, T. G. Trembach, K. E. Zhovnovatiy

    Published 2023-11-01
    “…The research method consists in applying the state space method, widely used in the study of automatic dynamical systems, to describe the behavior of cognitive systems. …”
    Get full text
    Article
  14. 1634
  15. 1635

    Speed and Power Consumption Comparison between DES and AES Algorithm in Arduino by Arcelina Sukiatmodjo, YB Dwi Setianto

    Published 2019-05-01
    “…Besides that, the algorithm must be light, fast and use less power. In this study, a comparison of the Data Encryption Standard (DES) and Advanced Encryption Standard (AES) algorithms will be implemented in the encryption module. …”
    Get full text
    Article
  16. 1636

    Enhancement of the Moving Horizon Estimation Performance Based on an Adaptive Estimation Algorithm by Steve Alan Talla Ouambo, Alexandre Teplaira Boum, Adolphe Moukengue Imano, Jean-Pierre Corriou

    Published 2021-01-01
    “…In this paper, using an adaptive estimation algorithm, we approximate and update the parameters of the arrival cost of the moving horizon estimator. …”
    Get full text
    Article
  17. 1637

    An Improved Algorithm of Wireless Sensor Networks Routing Protocol Based on LEACH by Jinshen Weng, Huabiao Qin, Zongguo Zhang

    Published 2013-04-01
    “…One of the most popular research focuses of wireless sensor network is postponing the life cycle of sensor network as well as reducing energy consumption.An efficient clustering routing algorithm based on LEACH(low energy adaptive clustering hierarch)was presented,which is the representative of hierarchy based protocol in wireless sensor network.The residual energy,average energy and maximum energy are considered in this algorithm while electing the cluster header.It can also limit the number of members of each cluster.At the same time,it can produce the first cluster header among the cluster heads which will use the multi-hop mode to balance the load of network.The simulation results show that this improved algorithm can reduce the energy consumption,extend the network life cycle and ensure the load balance of the system.…”
    Get full text
    Article
  18. 1638

    Design and Implemented of an Algorithm for Covered Writing on a Video File (mov) by Raed A-Naima, Sarah Al-Naima

    Published 2010-12-01
    “…In this research, video file type (mov) is used to hide an English text. …”
    Get full text
    Article
  19. 1639
  20. 1640

    Simulation of film transmission path based on ant colony optimization algorithm by Yiyuan Wang

    Published 2025-07-01
    “…The research results show that the effect of the optimized ACA is significantly better than the basic ACA. …”
    Get full text
    Article