Suggested Topics within your search.
Suggested Topics within your search.
-
181
Efficient i-DFA construction algorithm based on state grouping
Published 2013-08-01“…Regular expression matching plays an important role in many network and security applications.DFA is the preferred representation to perform regular expression matching in high-speed network,because of its high and stable matching efficiency.However,DFA may experience state explosion,and thus consume huge memory space.As a classical solution for the problem of state explosion,i-DFA can reduce the memory consumption significantly and guarantee the worst matching performance at the same time.However,prior methods are inefficient in both time and space during the construction of i-DFA.An efficient i-DFA construction algorithm based on the idea of state grouping was proposed.Furthermore,a formal description for the problem of state grouping was given,and it was proved that it was NP-hard to get the best state grouping result.Thus,based on local search strategy,a near-optimal algorithm was introduced to divide states into different groups.Compared with the classical construction method,the significant improvement in both time and space is achieved; the i-DFA of the proposed method may have 2/3 states as that of prior method and the proposed i-DFA is constructed with only 1/16 time of it.…”
Get full text
Article -
182
An Aeromagnetic Compensation Algorithm Based on a Temporal Convolutional Network
Published 2025-03-01Get full text
Article -
183
FORMATION ALGORITHM OF DYNAMIC TURN FOR UNMANNED AERIAL VEHICLES ON APPROACH
Published 2017-09-01“…Great interest in using unmanned aerial vehicles has recently been shown, both from economic entities, and from national security, defense and law enforcement agencies. …”
Get full text
Article -
184
Hare escape optimization algorithm with applications in engineering and deep learning
Published 2025-07-01“…Abstract The Hare Escape Optimization (HEO) algorithm is a novel metaheuristic inspired by the evasive movement strategies of hares when pursued by predators. …”
Get full text
Article -
185
Evolutionary Algorithms and Quantum Computing: Recent Advances, Opportunities, and Challenges
Published 2025-01-01“…In this paper, we discuss both of these potential directions at the intersection of evolutionary computing and quantum computing while surveying some of the most promising advancements in these directions. …”
Get full text
Article -
186
Efficient algorithms for electric vehicles’ min-max routing problem
Published 2024-01-01“…We propose an efficient branch and cut framework and a three-phase hybrid heuristic algorithm that can efficiently solve a variety of instances. …”
Get full text
Article -
187
Comparative analysis of dehazing algorithms on real-world hazy images
Published 2025-03-01“…Neural augmentation algorithms, however, effectively combine the strengths of both approaches, offering a better overall solution. …”
Get full text
Article -
188
Developing an Algorithm for Robotic Precision Application of Crop Protection Products
Published 2022-10-01“…(Research purpose) To develop an algorithm for crop plant recognition by a robotic device using a state-of-the-art convolutional neural network (R-CNN) and deep learning technology. …”
Get full text
Article -
189
Wireless packet dropping algorithm considering fairness and channel condition
Published 2005-01-01“…The algorithm considered both channel condition and fairness so as to achieve tradeoff between throughput and fair services. …”
Get full text
Article -
190
The method of rating committee vote algorithms in classification problems with teacher
Published 2013-02-01“…The algorithm of method of voting of committee of classifiers is offered in the task of construction of decision rules of discrimination of objects on не-сколько classes, based on the calculation of rating of belonging of the classified standard to every class, the calculation of that takes into account both exactness of algorithms of mixture on separate classes and their errors on other classes.…”
Get full text
Article -
191
ALGORITHM OF TAKING DECISION ON PROCEDURE TO BE FOLLOWED IN A BANKRUPTCY CASE
Published 2016-12-01Get full text
Article -
192
THE AVALANCHE EFFECT IN ENCRYPTION ALGORITHMS BASED ON THE DISCRETE CHAOTIC MAPS
Published 2019-06-01“…The avalance effect has been investigated in an encryption algorithm being developed on the basis of the discrete chaotic maps. …”
Get full text
Article -
193
Application of the metaheuristic algorithms to quantify the GSI based on the RMR classification
Published 2025-08-01“…According to this evaluation, the best-performing equation from each algorithm was selected as the optimum and further evaluated using both graphical and statistical analyses, including comparisons with conventional empirical relationships. …”
Get full text
Article -
194
The clinical and laboratory algorithm for the diagnosis of acute cytomegalovirus infection in children
Published 2019-12-01Get full text
Article -
195
Cloud removal from satellite imagery based on SUSAN algorithm
Published 2006-01-01“…A new image fusion scheme that could automate remove the cloud covers in the main image was proposed based on SUSAN algorithm.First,the corners were found both in the main image and the reference image based on SUSAN algorithm,and then the matched corners were found using probabilistic relaxation algorithm to register the ref-erence image to the main image.Finally,a cloud-removed image was obtained by fusion.The performance of the pro-posed scheme is demonstrated experimentally.…”
Get full text
Article -
196
The Ball-Relaxed Gradient-Projection Algorithm for Split Feasibility Problem
Published 2022-01-01“…By applying Gradient-projection algorithm which is used to solve constrained convex minimization problem of a real valued convex function, we construct two new algorithms for the split feasibility problem and prove that both of them are convergent weakly to a solution of the feasibility problem. …”
Get full text
Article -
197
EM Algorithm for Estimating the Parameters of Quasi-Lindley Model with Application
Published 2022-01-01“…Simulation studies show that the estimates of EM perform better than maximum likelihood estimates (MLEs) for both uncensored and censored data. In an illustrative example, the waiting times of a bank’s customers are analyzed and the estimator of the EM algorithm is compared with the MLE. …”
Get full text
Article -
198
Time series data aggregation algorithm with synchronous prediction for WBAN
Published 2015-06-01“…Due to the nonlinearity and nonstationarity of the physiological data sensed by WBAN,data aggregation cannot be effectively achieved according to the time-domain trend of data.Therefore,a novel time series data aggregation algorithm with synchronous prediction was proposed.By preprocessing the original sensing data with the multi-resolution analysis,the inherent characteristics of the physiological data can be obtained to establish a light-weight synchronous prediction model at both the sensor and sink.Numerical results show that the proposed aggregation algorithm can achieve a favorable prediction precision and a low energy consumption rate by eliminating the in-network data redundancy.…”
Get full text
Article -
199
Deloading Algorithm for Highly Effective Suppressing Locomotive Slip and Slide
Published 2015-01-01Get full text
Article -
200
Computation task offloading algorithm and system level simulation for vehicles
Published 2019-09-01“…With the development of autonomous driving and vehicular network,more and more vehicles will have powerful computing capabilities and connection with each other via wireless network.These computing resources can not only be applied to automatic driving,but also provide a wide range of edge computing services.Aiming at the task offloading among vehicles,a distributed task offloading algorithm based on online learning was proposed to minimize the average offloading delay.Furthermore,a system-level simulation platform was built to evaluate the impact of vehicle density and number of tasks on the average offloading delay in both highway and urban scenarios.The results provide a reference for the resource allocation and deployment of task offloading in different traffic situations.…”
Get full text
Article