-
301
HitIct:Chinese corpus for the evaluation of lossless compression algorithms
Published 2009-01-01“…HitIct, a Chinese corpus for the evaluation of lossless compression algorithms based on ANSI code, was proposed.In accordance with the principle of application representativeness, Complementary principle and openness principle, a large number of candidate files were obtained from the Internet, and then average compression ratio, average correlation coefficient, compression ratio correlation coefficient and standard deviation were used to select the files that give the most accurate indication of the overall performance of compression algorithms.Experimental results show that this collection has a good representativeness and stability, and can be used as the supplementary test set of the main benchmark for comparing compression methods.…”
Get full text
Article -
302
SDN hypervisor oriented vSDN controller placement algorithm
Published 2017-04-01“…With the development of the future internet technology,the future network architecture which utilizes network virtualization as a tool to solve the rigidity of traditional network becomes the main stream.As a new network architecture,software defined networking provides an effective network virtualization solution.Firstly,related technology of network virtualization in SDN was concluded,distinguished differences between deploying virtual network in SDN and traditional network was compared,and aiming at the virtual network mapping problem in SDN virtualization platform,a latency sensitive SDN virtualization controller placement algorithm.At last,experiment results show that the algorithm not only can assure the delay between SDN controllers and switches in an acceptable range,but also improve the utilization efficiency of network resources.…”
Get full text
Article -
303
Symmetric Encryption Algorithms in a Polynomial Residue Number System
Published 2024-01-01“…In this paper, we develop the theoretical provisions of symmetric cryptographic algorithms based on the polynomial residue number system for the first time. …”
Get full text
Article -
304
SDN hypervisor oriented vSDN controller placement algorithm
Published 2017-04-01“…With the development of the future internet technology,the future network architecture which utilizes network virtualization as a tool to solve the rigidity of traditional network becomes the main stream.As a new network architecture,software defined networking provides an effective network virtualization solution.Firstly,related technology of network virtualization in SDN was concluded,distinguished differences between deploying virtual network in SDN and traditional network was compared,and aiming at the virtual network mapping problem in SDN virtualization platform,a latency sensitive SDN virtualization controller placement algorithm.At last,experiment results show that the algorithm not only can assure the delay between SDN controllers and switches in an acceptable range,but also improve the utilization efficiency of network resources.…”
Get full text
Article -
305
DEVELOPMENT OF ALGORITHM OF PLANNING OF INCREASE OF COMPETITIVENESS OF AUTO REPAIR BUSINESSES
Published 2022-03-01Get full text
Article -
306
A Method for Adapting Stereo Matching Algorithms to Real Environments
Published 2025-04-01“…One of the main problems is that the poor quality of the results is either blamed on an inappropriate stereo camera calibration or a bad stereo matching algorithm. …”
Get full text
Article -
307
Analysis of algorithms performing basic arithmetic operations in the quadratic RNS
Published 2022-09-01“…In this paper we explore the question of representing complex numbers in a residue number system and build algorithms for the operations of addition and multiplication. …”
Get full text
Article -
308
Adaptor signature scheme based on ISRSAC digital signature algorithm
Published 2023-03-01“…The adapter signature scheme can provide good properties of atomic exchange in the block chain, and has been widely used in practice.A new adapter signature scheme was constructed based on a digital signature algorithm for improved security of RSA cryptosystem (ISRSAC).After proving that the proposed scheme satisfied the correctness of the pre-signature, unforgeability, adaptability of the pre-signature, extractability of the evidence and the security of the signature scheme, it was compared with the adapter signature scheme based on the SM2 digital signature algorithm, the Schnorr-based adapter signature scheme and the ECDSA-based adapter signature scheme.And these schemes were analyzed in terms of time overhead and main calculation amount.The analysis results show that the proposed scheme is similar to other schemes in terms of time overhead, but the proposed scheme expands the application scenarios of ISRSAC algorithm in the current environment, and through the combination of ISRSAC algorithm and adapter signature technology, the selection of adapter signature is more flexible and can have a wider range of applications.…”
Get full text
Article -
309
Associative Parallel Algorithm for Dynamic Update of the Shortest Paths Tree
Published 2013-04-01“…To this end, we provide the data structure and its building along with the STAR–machine that simulates the run of associative (content–addressable) parallel systems with simple single–bit processing elements and vertical processing. The associative algorithm is represented on the STAR–machine as the main procedure DeleteArcSPT that uses some auxiliary procedures. …”
Get full text
Article -
310
SWR: Smartness Provided by Simple, Efficient, and Self-Adaptive Algorithm
Published 2012-02-01“…In this paper, a novel routing algorithm, stateless weight routing (SWR), is proposed. …”
Get full text
Article -
311
A Comparison of Four Classification Algorithms for Facial Expression Recognition
Published 2020-06-01“…This paper provides a comparison approach for FER based on three feature selection methods which are correlation, gain ration, and information gain for determining the most distinguished features of face images using multi-classification algorithms which are multilayer perceptron, Naïve Bayes, decision tree, and K-nearest neighbor (KNN). …”
Get full text
Article -
312
Nowcasting of rainfall based on extrapolation and evolution algorithms. Preliminary results
Published 2018-12-01“…The paper gives an overview of algorithms used in the SNAR model and provides preliminary results.…”
Get full text
Article -
313
Collaborative Spectrum Sensing Optimisation Algorithms for Cognitive Radio Networks
Published 2010-01-01“…The main challenge for a cognitive radio is to detect the existence of primary users reliably in order to minimise the interference to licensed communications. …”
Get full text
Article -
314
Identification of Grass Weed Species Using YOLO5 Algorithm
Published 2025-05-01“…The developed system detects and identifies the four main types of weeds, contributing to the improvement of weed control management.…”
Get full text
Article -
315
Mass public opinion: algorithmic colonisation and synthetisation of the public sphere
Published 2024-12-01“…This paper examines the strategic change in the manipulation of public opinion through algorithmic colonisation, technological imperialism, data generation and the creation of synthetic content. …”
Get full text
Article -
316
A trajectory data publishing algorithm satisfying local suppression
Published 2021-02-01“…The main contributions of this article include as follows: (1) introducing privacy protection method in trajectory data release, (2) performing effective local suppression judgment on the points in the minimum violation sequence of the trajectory data set, and (3) proposing a differential privacy protection algorithm based on local suppression. …”
Get full text
Article -
317
An Aeromagnetic Compensation Algorithm Based on a Temporal Convolutional Network
Published 2025-03-01Get full text
Article -
318
Algorithmic Method for Precision Enhancement of Paper Pulp Blade Consistometer
Published 2016-12-01“…The article deals with the algorithmic method for precision enhancement of paper pulp blade consistometers . …”
Get full text
Article -
319
Multi-clustering algorithm based on improved tensor chain decomposition
Published 2025-06-01“…The innovations were mainly reflected in two aspects: firstly, a new tensor decomposition framework was proposed, which effectively reduced the storage cost and improved the computational efficiency by optimizing the objective function; secondly, the improved tensor decomposition technique was applied to three main multi-clustering algorithms, including self-weighted multi-view clustering (SwMC), latent multi-view subspace clustering (LMSC), and multi-view subspace clustering with intactness-aware similarity (MSC IAS), which significantly improved the accuracy and efficiency of clustering. …”
Get full text
Article -
320
An Evolutionary Algorithm of the Regional Collaborative Innovation Based on Complex Network
Published 2016-01-01“…This paper proposed a new perspective to study the evolution of regional collaborative innovation based on complex network theory. The two main conceptions of evolution, “graph with dynamic features” and “network evolution,” have been provided in advance. …”
Get full text
Article