Search alternatives:
many » may (Expand Search)
Showing 601 - 620 results of 9,662 for search '(many OR main) algorithm', query time: 0.19s Refine Results
  1. 601

    Deduplication algorithm based on condensed nearest neighbor rule for deduplication metadata by Wen-bin YAO, Peng-di YE, Xiao-yong LI, Jing-kun CHANG

    Published 2015-08-01
    “…Building effective deduplication index in the memory could reduce disk access times and enhance chunk fingerprint lookup speed,which was a big challenge for deduplication algorithms in massive data environments.As deduplication data set had many samples with high similarity,a deduplication algorithm based on condensed nearest neighbor rule,which was called Dedup<sup>2</sup>,was proposed.Dedup<sup>2</sup>uses clustering algorithm to divide the original deduplication metadata into several categories.According to these categories,it employs condensed nearest neighbor rule to remove the highest similar data in the deduplication metadata.After that it can get the subset of deduplication metadata.Based on this subset,new data objects will be deduplicated based on the principle of data similarity.The results of experiments show that Dedup<sup>2</sup>can reduce the size of deduplication data set more than 50% effectively while maintain similar deduplication ratio.…”
    Get full text
    Article
  2. 602

    Optimization of Consignment-Store-Based Supply Chain with Black Hole Algorithm by Ágota Bányai, Tamás Bányai, Béla Illés

    Published 2017-01-01
    “…Next, an enhanced black hole algorithm dealing with multiobjective supply chain model is presented. …”
    Get full text
    Article
  3. 603

    A Closer Look at Invalid Action Masking in Policy Gradient Algorithms by Shengyi Huang, Santiago Ontañón

    Published 2022-05-01
    “…In recent years, Deep Reinforcement Learning (DRL) algorithms have achieved state-of-the-art performance in many challenging strategy games. …”
    Get full text
    Article
  4. 604
  5. 605

    ALGORITHMS FOR IDENTIFICATION OF CUES WITH AUTHORS’ TEXT INSERTIONS IN BELARUSIAN ELECTRONIC BOOKS by Y. S. Hetsevich, T,. I. Okrut, B. M. Lobanov

    Published 2016-10-01
    “…The main stages of algorithms for characters’ gender identification in Belarusian electronic texts are described. …”
    Get full text
    Article
  6. 606
  7. 607

    Seismic Inversion Problem Using a Multioperator Whale Optimization Algorithm by Rui Ni, Xiaodan Liang

    Published 2022-01-01
    “…The whale optimization algorithm (WOA) is a metaheuristic algorithm based on swarm intelligence and it mimics the hunting behavior of whales. …”
    Get full text
    Article
  8. 608

    Application of computer vision algorithm in ceramic surface texture analysis and prediction by Yao Tian, Feifei Zhu

    Published 2025-03-01
    “…In order to improve the surface quality of ceramic products, this paper proposes a ceramic surface texture recognition analysis and texture generation prediction method based on computer vision algorithm. In this method, laser lines are used to scan along the radial direction of ceramic, and the position of laser stripe is located by straight line detection algorithm. …”
    Get full text
    Article
  9. 609

    A Simple and Efficient Local Search Algorithm for the Machine Reassignment Problem by Darío Canales, María-Cristina Riff, Elizabeth Montero

    Published 2025-07-01
    “…In this work, we propose an efficient collaborative local search algorithm to solve the Machine Reassignment Problem. …”
    Get full text
    Article
  10. 610

    Conjugate Gradient Algorithm Based on Aitken's Process for Training Neural Networks by Khalil Abbo, Hind Mohammed

    Published 2014-07-01
    “…In particular, various algorithms motivated from numerical optimization theory have been applied for accelerating neural network training. …”
    Get full text
    Article
  11. 611

    Identification for Active Vibration Control of Flexible Structure Based on Prony Algorithm by Xianjun Sheng, Yuanli Kong, Fengyun Zhang, Rui Yang

    Published 2016-01-01
    “…Flexible structures have been widely used in many fields due to the advantages of light quality, small damping, and strong flexibility. …”
    Get full text
    Article
  12. 612
  13. 613

    Research on algorithms of data encryption scheme that supports homomorphic arithmetical operations by ANGPan Y, UIXiao-lin G, AOJing Y, INJian-cai L, IANFeng T, HANGXue-jun Z

    Published 2015-01-01
    “…An efficient homomorphic encryption scheme called CESIL was proposed to meet the requirements of operating on encrypted data when protecting users' privacy in computing services.CESIL included key generation algorithm,encryption algorithm,decryption algorithm and calculation algorithm.In CESIL,a polynomial coefficient vector ring was established by defining addition and multiplication using polynomial ring; by using ideal lattice,the vector ring was partitioned into many residue classes to produce a quotient ring and its representative set; the plaintext was encrypted by mapping it to a representative and replacing the representative with another element in the same residue class.The features of operations in quotient ring ensured CESIL operate on encrypted data.Furthermore,the fast Fourier transform (FFT) algorithm was used to increase the efficiency and decrease the length of key.Theoretical analysis and experimental results show that CESIL is semantically secure,and can do addition and multiplication operations on encrypted data homomorphically in a specific scope.Comparing to some existing homomorphic encryption schemes,the CESIL runs efficiently,and has shorter length in key and ciphertext.Thus,the CESIL fits the practical applications better.…”
    Get full text
    Article
  14. 614

    Vessel Trajectory Data Compression Algorithm considering Critical Region Identification by Xinliang Zhang, Shibo Zhou

    Published 2023-01-01
    “…Additionally, the algorithm utilizes a sliding window approach to process the initial trajectory to improve the quality of the compressed vessel trajectories and retain as many spatiotemporal characteristics of the original trajectories as possible. …”
    Get full text
    Article
  15. 615

    Ship’s Trajectory Planning Based on Improved Multiobjective Algorithm for Collision Avoidance by Jinxin Li, Hongbo Wang, Wei Zhao, Yuanyuan Xue

    Published 2019-01-01
    “…With vigorous development of the maritime trade, many intelligent algorithms have been proposed to avoid collisions due to resulting casualties and increased costs. …”
    Get full text
    Article
  16. 616

    Application of Genetic Algorithms for Finding Edit Distance between Process Models by Anna A. Kalenkova, Danil A. Kolesnikov

    Published 2018-12-01
    “…Finding graph-edit distance (graph similarity) is an important task in many computer science areas, such as image analysis, machine learning, chemicalinformatics. …”
    Get full text
    Article
  17. 617

    Engineering and Optimization of Quasi-Nondiffracting Helicon-Like Beams With an Evolutionary Algorithm by Bryce Schroeder, Zhen H. Zhu, Changliang Guo, Shu Jia

    Published 2017-01-01
    “…However, the nonlocalized intensity distribution of nondiffracting beams is restrictive for many practical applications. Thus, strategies to optimize the beam profiles remain much in demand. …”
    Get full text
    Article
  18. 618
  19. 619

    Metaheuristics in Logistics: Increasing the Efficiency of Algorithms by Defining Appropriate Parameter Settings by Tamara J. Bíró, Péter Németh

    Published 2024-12-01
    “…In many cases, when applying a metaheuristic, it works properly with the variables of a given task and there is no specific interval where a given algorithm can still be effective. …”
    Get full text
    Article
  20. 620

    An Efficient Algorithm for Maximizing Range Sum Queries in a Road Network by Tien-Khoi Phan, HaRim Jung, Ung-Mo Kim

    Published 2014-01-01
    “…Through simulations, we evaluate the performance of the proposed algorithm.…”
    Get full text
    Article