Search alternatives:
man » many (Expand Search), mean (Expand Search)
Showing 301 - 320 results of 6,339 for search '(man OR main) algorithm', query time: 0.15s Refine Results
  1. 301

    HitIct:Chinese corpus for the evaluation of lossless compression algorithms by CHANG Wei-ling1, YUN Xiao-chun2, FANG Bin-xing1, WANG Shu-peng2

    Published 2009-01-01
    “…HitIct, a Chinese corpus for the evaluation of lossless compression algorithms based on ANSI code, was proposed.In accordance with the principle of application representativeness, Complementary principle and openness principle, a large number of candidate files were obtained from the Internet, and then average compression ratio, average correlation coefficient, compression ratio correlation coefficient and standard deviation were used to select the files that give the most accurate indication of the overall performance of compression algorithms.Experimental results show that this collection has a good representativeness and stability, and can be used as the supplementary test set of the main benchmark for comparing compression methods.…”
    Get full text
    Article
  2. 302

    SDN hypervisor oriented vSDN controller placement algorithm by Xiaodong DONG, Zhiqiang GUO, Sheng CHEN, Xiaobo ZHOU, Heng QI, Keqiu LI

    Published 2017-04-01
    “…With the development of the future internet technology,the future network architecture which utilizes network virtualization as a tool to solve the rigidity of traditional network becomes the main stream.As a new network architecture,software defined networking provides an effective network virtualization solution.Firstly,related technology of network virtualization in SDN was concluded,distinguished differences between deploying virtual network in SDN and traditional network was compared,and aiming at the virtual network mapping problem in SDN virtualization platform,a latency sensitive SDN virtualization controller placement algorithm.At last,experiment results show that the algorithm not only can assure the delay between SDN controllers and switches in an acceptable range,but also improve the utilization efficiency of network resources.…”
    Get full text
    Article
  3. 303

    Symmetric Encryption Algorithms in a Polynomial Residue Number System by I. Yakymenko, M. Karpinski, R. Shevchuk, M. Kasianchuk

    Published 2024-01-01
    “…In this paper, we develop the theoretical provisions of symmetric cryptographic algorithms based on the polynomial residue number system for the first time. …”
    Get full text
    Article
  4. 304

    SDN hypervisor oriented vSDN controller placement algorithm by Xiaodong DONG, Zhiqiang GUO, Sheng CHEN, Xiaobo ZHOU, Heng QI, Keqiu LI

    Published 2017-04-01
    “…With the development of the future internet technology,the future network architecture which utilizes network virtualization as a tool to solve the rigidity of traditional network becomes the main stream.As a new network architecture,software defined networking provides an effective network virtualization solution.Firstly,related technology of network virtualization in SDN was concluded,distinguished differences between deploying virtual network in SDN and traditional network was compared,and aiming at the virtual network mapping problem in SDN virtualization platform,a latency sensitive SDN virtualization controller placement algorithm.At last,experiment results show that the algorithm not only can assure the delay between SDN controllers and switches in an acceptable range,but also improve the utilization efficiency of network resources.…”
    Get full text
    Article
  5. 305
  6. 306

    A Method for Adapting Stereo Matching Algorithms to Real Environments by Adam L. Kaczmarek

    Published 2025-04-01
    “…One of the main problems is that the poor quality of the results is either blamed on an inappropriate stereo camera calibration or a bad stereo matching algorithm. …”
    Get full text
    Article
  7. 307

    Analysis of algorithms performing basic arithmetic operations in the quadratic RNS by Lyudmila Borisovna Kopytkova

    Published 2022-09-01
    “…In this paper we explore the question of representing complex numbers in a residue number system and build algorithms for the operations of addition and multiplication. …”
    Get full text
    Article
  8. 308

    Adaptor signature scheme based on ISRSAC digital signature algorithm by Yanshuo ZHANG, Ning LIU, Yuqi YUAN, Yatao YANG

    Published 2023-03-01
    “…The adapter signature scheme can provide good properties of atomic exchange in the block chain, and has been widely used in practice.A new adapter signature scheme was constructed based on a digital signature algorithm for improved security of RSA cryptosystem (ISRSAC).After proving that the proposed scheme satisfied the correctness of the pre-signature, unforgeability, adaptability of the pre-signature, extractability of the evidence and the security of the signature scheme, it was compared with the adapter signature scheme based on the SM2 digital signature algorithm, the Schnorr-based adapter signature scheme and the ECDSA-based adapter signature scheme.And these schemes were analyzed in terms of time overhead and main calculation amount.The analysis results show that the proposed scheme is similar to other schemes in terms of time overhead, but the proposed scheme expands the application scenarios of ISRSAC algorithm in the current environment, and through the combination of ISRSAC algorithm and adapter signature technology, the selection of adapter signature is more flexible and can have a wider range of applications.…”
    Get full text
    Article
  9. 309

    Associative Parallel Algorithm for Dynamic Update of the Shortest Paths Tree by A. S. Nepomniaschaya

    Published 2013-04-01
    “…To this end, we provide the data structure and its building along with the STAR–machine that simulates the run of associative (content–addressable) parallel systems with simple single–bit processing elements and vertical processing. The associative algorithm is represented on the STAR–machine as the main procedure DeleteArcSPT that uses some auxiliary procedures. …”
    Get full text
    Article
  10. 310

    SWR: Smartness Provided by Simple, Efficient, and Self-Adaptive Algorithm by Mujdat Soyturk, Deniz Turgay Altilar

    Published 2012-02-01
    “…In this paper, a novel routing algorithm, stateless weight routing (SWR), is proposed. …”
    Get full text
    Article
  11. 311

    A Comparison of Four Classification Algorithms for Facial Expression Recognition by Hivi I. Dino, Maiwan B. Abdulrazzaq

    Published 2020-06-01
    “…This paper provides a comparison approach for FER based on three feature selection methods which are correlation, gain ration, and information gain for determining the most distinguished features of face images using multi-classification algorithms which are multilayer perceptron, Naïve Bayes, decision tree, and K-nearest neighbor (KNN). …”
    Get full text
    Article
  12. 312

    Nowcasting of rainfall based on extrapolation and evolution algorithms. Preliminary results by Mateusz Giszterowicz, Katarzyna Ośródka, Jan Szturc

    Published 2018-12-01
    “…The paper gives an overview of algorithms used in the SNAR model and provides preliminary results.…”
    Get full text
    Article
  13. 313

    Collaborative Spectrum Sensing Optimisation Algorithms for Cognitive Radio Networks by Kamran Arshad, Muhammad Ali Imran, Klaus Moessner

    Published 2010-01-01
    “…The main challenge for a cognitive radio is to detect the existence of primary users reliably in order to minimise the interference to licensed communications. …”
    Get full text
    Article
  14. 314

    Identification of Grass Weed Species Using YOLO5 Algorithm by Charlene Grace Rabulan, John Alfred Gascon, Noel Linsangan

    Published 2025-05-01
    “…The developed system detects and identifies the four main types of weeds, contributing to the improvement of weed control management.…”
    Get full text
    Article
  15. 315

    Mass public opinion: algorithmic colonisation and synthetisation of the public sphere by Carlos Saura García, Patrici Calvo

    Published 2024-12-01
    “…This paper examines the strategic change in the manipulation of public opinion through algorithmic colonisation, technological imperialism, data generation and the creation of synthetic content. …”
    Get full text
    Article
  16. 316

    A trajectory data publishing algorithm satisfying local suppression by Xiaohui Li, Yuliang Bai, Yajun Wang, Bo Li

    Published 2021-02-01
    “…The main contributions of this article include as follows: (1) introducing privacy protection method in trajectory data release, (2) performing effective local suppression judgment on the points in the minimum violation sequence of the trajectory data set, and (3) proposing a differential privacy protection algorithm based on local suppression. …”
    Get full text
    Article
  17. 317
  18. 318

    Algorithmic Method for Precision Enhancement of Paper Pulp Blade Consistometer by Oleksandr Romaniuk, Bohdan Kril, Oleksandr Kril

    Published 2016-12-01
    “…The article deals with the algorithmic method for precision enhancement of paper pulp blade consistometers . …”
    Get full text
    Article
  19. 319

    Multi-clustering algorithm based on improved tensor chain decomposition by ZHANG Hongjun, ZHANG Zeyu, ZHANG Yingjiao, YE Hao, PAN Gaojun

    Published 2025-06-01
    “…The innovations were mainly reflected in two aspects: firstly, a new tensor decomposition framework was proposed, which effectively reduced the storage cost and improved the computational efficiency by optimizing the objective function; secondly, the improved tensor decomposition technique was applied to three main multi-clustering algorithms, including self-weighted multi-view clustering (SwMC), latent multi-view subspace clustering (LMSC), and multi-view subspace clustering with intactness-aware similarity (MSC IAS), which significantly improved the accuracy and efficiency of clustering. …”
    Get full text
    Article
  20. 320

    An Evolutionary Algorithm of the Regional Collaborative Innovation Based on Complex Network by Kun Wang, Duoyong Sun

    Published 2016-01-01
    “…This paper proposed a new perspective to study the evolution of regional collaborative innovation based on complex network theory. The two main conceptions of evolution, “graph with dynamic features” and “network evolution,” have been provided in advance. …”
    Get full text
    Article