-
601
Deduplication algorithm based on condensed nearest neighbor rule for deduplication metadata
Published 2015-08-01“…Building effective deduplication index in the memory could reduce disk access times and enhance chunk fingerprint lookup speed,which was a big challenge for deduplication algorithms in massive data environments.As deduplication data set had many samples with high similarity,a deduplication algorithm based on condensed nearest neighbor rule,which was called Dedup<sup>2</sup>,was proposed.Dedup<sup>2</sup>uses clustering algorithm to divide the original deduplication metadata into several categories.According to these categories,it employs condensed nearest neighbor rule to remove the highest similar data in the deduplication metadata.After that it can get the subset of deduplication metadata.Based on this subset,new data objects will be deduplicated based on the principle of data similarity.The results of experiments show that Dedup<sup>2</sup>can reduce the size of deduplication data set more than 50% effectively while maintain similar deduplication ratio.…”
Get full text
Article -
602
Optimization of Consignment-Store-Based Supply Chain with Black Hole Algorithm
Published 2017-01-01“…Next, an enhanced black hole algorithm dealing with multiobjective supply chain model is presented. …”
Get full text
Article -
603
A Closer Look at Invalid Action Masking in Policy Gradient Algorithms
Published 2022-05-01“…In recent years, Deep Reinforcement Learning (DRL) algorithms have achieved state-of-the-art performance in many challenging strategy games. …”
Get full text
Article -
604
Designing of 2-DOF PID control algorithm for magnetic levitation systems
Published 2018-02-01Get full text
Article -
605
ALGORITHMS FOR IDENTIFICATION OF CUES WITH AUTHORS’ TEXT INSERTIONS IN BELARUSIAN ELECTRONIC BOOKS
Published 2016-10-01“…The main stages of algorithms for characters’ gender identification in Belarusian electronic texts are described. …”
Get full text
Article -
606
A Novel Acceleration Estimation Algorithm Based on Least Square Method
Published 2018-01-01Get full text
Article -
607
Seismic Inversion Problem Using a Multioperator Whale Optimization Algorithm
Published 2022-01-01“…The whale optimization algorithm (WOA) is a metaheuristic algorithm based on swarm intelligence and it mimics the hunting behavior of whales. …”
Get full text
Article -
608
Application of computer vision algorithm in ceramic surface texture analysis and prediction
Published 2025-03-01“…In order to improve the surface quality of ceramic products, this paper proposes a ceramic surface texture recognition analysis and texture generation prediction method based on computer vision algorithm. In this method, laser lines are used to scan along the radial direction of ceramic, and the position of laser stripe is located by straight line detection algorithm. …”
Get full text
Article -
609
A Simple and Efficient Local Search Algorithm for the Machine Reassignment Problem
Published 2025-07-01“…In this work, we propose an efficient collaborative local search algorithm to solve the Machine Reassignment Problem. …”
Get full text
Article -
610
Conjugate Gradient Algorithm Based on Aitken's Process for Training Neural Networks
Published 2014-07-01“…In particular, various algorithms motivated from numerical optimization theory have been applied for accelerating neural network training. …”
Get full text
Article -
611
Identification for Active Vibration Control of Flexible Structure Based on Prony Algorithm
Published 2016-01-01“…Flexible structures have been widely used in many fields due to the advantages of light quality, small damping, and strong flexibility. …”
Get full text
Article -
612
-
613
Research on algorithms of data encryption scheme that supports homomorphic arithmetical operations
Published 2015-01-01“…An efficient homomorphic encryption scheme called CESIL was proposed to meet the requirements of operating on encrypted data when protecting users' privacy in computing services.CESIL included key generation algorithm,encryption algorithm,decryption algorithm and calculation algorithm.In CESIL,a polynomial coefficient vector ring was established by defining addition and multiplication using polynomial ring; by using ideal lattice,the vector ring was partitioned into many residue classes to produce a quotient ring and its representative set; the plaintext was encrypted by mapping it to a representative and replacing the representative with another element in the same residue class.The features of operations in quotient ring ensured CESIL operate on encrypted data.Furthermore,the fast Fourier transform (FFT) algorithm was used to increase the efficiency and decrease the length of key.Theoretical analysis and experimental results show that CESIL is semantically secure,and can do addition and multiplication operations on encrypted data homomorphically in a specific scope.Comparing to some existing homomorphic encryption schemes,the CESIL runs efficiently,and has shorter length in key and ciphertext.Thus,the CESIL fits the practical applications better.…”
Get full text
Article -
614
Vessel Trajectory Data Compression Algorithm considering Critical Region Identification
Published 2023-01-01“…Additionally, the algorithm utilizes a sliding window approach to process the initial trajectory to improve the quality of the compressed vessel trajectories and retain as many spatiotemporal characteristics of the original trajectories as possible. …”
Get full text
Article -
615
Ship’s Trajectory Planning Based on Improved Multiobjective Algorithm for Collision Avoidance
Published 2019-01-01“…With vigorous development of the maritime trade, many intelligent algorithms have been proposed to avoid collisions due to resulting casualties and increased costs. …”
Get full text
Article -
616
Application of Genetic Algorithms for Finding Edit Distance between Process Models
Published 2018-12-01“…Finding graph-edit distance (graph similarity) is an important task in many computer science areas, such as image analysis, machine learning, chemicalinformatics. …”
Get full text
Article -
617
Engineering and Optimization of Quasi-Nondiffracting Helicon-Like Beams With an Evolutionary Algorithm
Published 2017-01-01“…However, the nonlocalized intensity distribution of nondiffracting beams is restrictive for many practical applications. Thus, strategies to optimize the beam profiles remain much in demand. …”
Get full text
Article -
618
Efficient Machine Learning Algorithms in Hybrid Filtering Based Recommendation System
Published 2023-08-01Get full text
Article -
619
Metaheuristics in Logistics: Increasing the Efficiency of Algorithms by Defining Appropriate Parameter Settings
Published 2024-12-01“…In many cases, when applying a metaheuristic, it works properly with the variables of a given task and there is no specific interval where a given algorithm can still be effective. …”
Get full text
Article -
620
An Efficient Algorithm for Maximizing Range Sum Queries in a Road Network
Published 2014-01-01“…Through simulations, we evaluate the performance of the proposed algorithm.…”
Get full text
Article