-
321
HitIct:Chinese corpus for the evaluation of lossless compression algorithms
Published 2009-01-01“…HitIct, a Chinese corpus for the evaluation of lossless compression algorithms based on ANSI code, was proposed.In accordance with the principle of application representativeness, Complementary principle and openness principle, a large number of candidate files were obtained from the Internet, and then average compression ratio, average correlation coefficient, compression ratio correlation coefficient and standard deviation were used to select the files that give the most accurate indication of the overall performance of compression algorithms.Experimental results show that this collection has a good representativeness and stability, and can be used as the supplementary test set of the main benchmark for comparing compression methods.…”
Get full text
Article -
322
High accuracy and octave error immune pitch detection algorithms
Published 2004-01-01“…Experiments were performed on a variety of musical instrument sounds and sample results exemplifying main issues of both engineered algorithms are shown. …”
Get full text
Article -
323
AN ONBOARD IMAGE RECOGNITION MODULE FOR MONITORING SYSTEMS: METHODS AND ALGORITHMS
Published 2019-06-01“…The methods and algorithms of a compact on-board image recognition module to be used as a part of monitoring systems is presented. …”
Get full text
Article -
324
Algorithm for Non-Contact Monitoring of the Performance of Electronic Equipment Elements
Published 2024-02-01“…The research, described in the article, relates to the field of technical diagnostics – one of the componentsof the process of repairing electronic equipment. The main reasons that influence the correct operation of radioelectronic equipment are identified, and the types of technical malfunctions that arise during its operationare identified. …”
Get full text
Article -
325
A Reliable Numerical Algorithm for the Fractional Klein-Gordon Equation
Published 2019-02-01“…The main advantage of the numerical algorithm is that it reduces the FKGE into Sylvester form of algebraic equations which significantly simplify the problem. …”
Get full text
Article -
326
Treatment algorithm for patients with gum recession and dento-alveolar abnormalities
Published 2020-04-01“…Gingival recession is a non-inflamatory periodontal disease with tooth root exposure. The main role in gingival recession pathogenesis play anatomical cortical bone defects. …”
Get full text
Article -
327
HitIct:Chinese corpus for the evaluation of lossless compression algorithms
Published 2009-01-01“…HitIct, a Chinese corpus for the evaluation of lossless compression algorithms based on ANSI code, was proposed.In accordance with the principle of application representativeness, Complementary principle and openness principle, a large number of candidate files were obtained from the Internet, and then average compression ratio, average correlation coefficient, compression ratio correlation coefficient and standard deviation were used to select the files that give the most accurate indication of the overall performance of compression algorithms.Experimental results show that this collection has a good representativeness and stability, and can be used as the supplementary test set of the main benchmark for comparing compression methods.…”
Get full text
Article -
328
SDN hypervisor oriented vSDN controller placement algorithm
Published 2017-04-01“…With the development of the future internet technology,the future network architecture which utilizes network virtualization as a tool to solve the rigidity of traditional network becomes the main stream.As a new network architecture,software defined networking provides an effective network virtualization solution.Firstly,related technology of network virtualization in SDN was concluded,distinguished differences between deploying virtual network in SDN and traditional network was compared,and aiming at the virtual network mapping problem in SDN virtualization platform,a latency sensitive SDN virtualization controller placement algorithm.At last,experiment results show that the algorithm not only can assure the delay between SDN controllers and switches in an acceptable range,but also improve the utilization efficiency of network resources.…”
Get full text
Article -
329
Symmetric Encryption Algorithms in a Polynomial Residue Number System
Published 2024-01-01“…In this paper, we develop the theoretical provisions of symmetric cryptographic algorithms based on the polynomial residue number system for the first time. …”
Get full text
Article -
330
SDN hypervisor oriented vSDN controller placement algorithm
Published 2017-04-01“…With the development of the future internet technology,the future network architecture which utilizes network virtualization as a tool to solve the rigidity of traditional network becomes the main stream.As a new network architecture,software defined networking provides an effective network virtualization solution.Firstly,related technology of network virtualization in SDN was concluded,distinguished differences between deploying virtual network in SDN and traditional network was compared,and aiming at the virtual network mapping problem in SDN virtualization platform,a latency sensitive SDN virtualization controller placement algorithm.At last,experiment results show that the algorithm not only can assure the delay between SDN controllers and switches in an acceptable range,but also improve the utilization efficiency of network resources.…”
Get full text
Article -
331
Efficient i-DFA construction algorithm based on state grouping
Published 2013-08-01“…Regular expression matching plays an important role in many network and security applications.DFA is the preferred representation to perform regular expression matching in high-speed network,because of its high and stable matching efficiency.However,DFA may experience state explosion,and thus consume huge memory space.As a classical solution for the problem of state explosion,i-DFA can reduce the memory consumption significantly and guarantee the worst matching performance at the same time.However,prior methods are inefficient in both time and space during the construction of i-DFA.An efficient i-DFA construction algorithm based on the idea of state grouping was proposed.Furthermore,a formal description for the problem of state grouping was given,and it was proved that it was NP-hard to get the best state grouping result.Thus,based on local search strategy,a near-optimal algorithm was introduced to divide states into different groups.Compared with the classical construction method,the significant improvement in both time and space is achieved; the i-DFA of the proposed method may have 2/3 states as that of prior method and the proposed i-DFA is constructed with only 1/16 time of it.…”
Get full text
Article -
332
The green algorithm: can sustainability define the winner in the AI race?
Published 2025-07-01Get full text
Article -
333
Analytical MPC Algorithm Using Steady-State Process Model
Published 2025-02-01“…., large time delay or inverse response), the PID controllers may offer unsatisfactory results; on the other hand, a Model Predictive Control (MPC) algorithm based on a linear model may offer insufficient control quality when applied to nonlinear control plants. …”
Get full text
Article -
334
DEVELOPMENT OF ALGORITHM OF PLANNING OF INCREASE OF COMPETITIVENESS OF AUTO REPAIR BUSINESSES
Published 2022-03-01Get full text
Article -
335
A Method for Adapting Stereo Matching Algorithms to Real Environments
Published 2025-04-01“…One of the main problems is that the poor quality of the results is either blamed on an inappropriate stereo camera calibration or a bad stereo matching algorithm. …”
Get full text
Article -
336
Analysis of algorithms performing basic arithmetic operations in the quadratic RNS
Published 2022-09-01“…In this paper we explore the question of representing complex numbers in a residue number system and build algorithms for the operations of addition and multiplication. …”
Get full text
Article -
337
GPU Accelerating Algorithms for Three-Layered Heat Conduction Simulations
Published 2024-11-01Get full text
Article -
338
Modification of the Clarke and Wright Algorithm with a Dynamic Savings Matrix
Published 2024-01-01“…Similarly, the destination of the request may be the depot or another customer. Unlike the original version of the Clarke and Wright algorithm, the initial routes are created to satisfy delivery orders, and therefore, the same customer can occur in multiple routes. …”
Get full text
Article -
339
Adaptor signature scheme based on ISRSAC digital signature algorithm
Published 2023-03-01“…The adapter signature scheme can provide good properties of atomic exchange in the block chain, and has been widely used in practice.A new adapter signature scheme was constructed based on a digital signature algorithm for improved security of RSA cryptosystem (ISRSAC).After proving that the proposed scheme satisfied the correctness of the pre-signature, unforgeability, adaptability of the pre-signature, extractability of the evidence and the security of the signature scheme, it was compared with the adapter signature scheme based on the SM2 digital signature algorithm, the Schnorr-based adapter signature scheme and the ECDSA-based adapter signature scheme.And these schemes were analyzed in terms of time overhead and main calculation amount.The analysis results show that the proposed scheme is similar to other schemes in terms of time overhead, but the proposed scheme expands the application scenarios of ISRSAC algorithm in the current environment, and through the combination of ISRSAC algorithm and adapter signature technology, the selection of adapter signature is more flexible and can have a wider range of applications.…”
Get full text
Article -
340
Associative Parallel Algorithm for Dynamic Update of the Shortest Paths Tree
Published 2013-04-01“…To this end, we provide the data structure and its building along with the STAR–machine that simulates the run of associative (content–addressable) parallel systems with simple single–bit processing elements and vertical processing. The associative algorithm is represented on the STAR–machine as the main procedure DeleteArcSPT that uses some auxiliary procedures. …”
Get full text
Article