Showing 281 - 300 results of 6,037 for search 'main algorithm', query time: 0.09s Refine Results
  1. 281

    Implementation of SM3 algorithm based on SoPC component by Meng-li SHAO, Xin-chun YIN, Yan-mei LI

    Published 2017-05-01
    “…Firstly the realization of SM3 on SoC was given.The structure of the algorithm was analyzed mainly,and the algorithm was realized by the Verilog hardware description language,in order to simulate this algorithm,the Altera simulation software ModelSim was chosen,SoPC Builder was used for interface package,and finally it was implemented in the Cyclone IV EP4CE22F17C8N.Its operation frequency can reach 165 MHz and its throughput rate is 1 184.8 Mbit/s.…”
    Get full text
    Article
  2. 282

    Comparative Analysis Of Integer Factorization Algorithms Using Cpu And Gpu by Rita Ismailova, Rayimbek Sultanov, Gulida Kimsanova

    Published 2017-05-01
    “…In this work we have evaluated the running time of four integer factorization algorithms, namely, trial division algorithm, Fermat algorithm, Pollard rho and Brent algorithms. …”
    Get full text
    Article
  3. 283

    Algorithmic literacy and media practices among young people in Brussels by Sylvain Malcorps, Arnaud Claes, Thibault Philippette, Marie Dufrasne

    Published 2023-07-01
    “…Recommendation algorithms play an undeniable role in the access to information, and are aimed at making browsing easier for users by recommending the most "relevant" content according to a series of criteria selected by their designers. …”
    Get full text
    Article
  4. 284

    A Novel Hybrid Self-Organizing Clustering Routing Algorithm by Peng Zhu, Fei Jia

    Published 2012-09-01
    “…This paper discusses the distributed routing algorithm of wireless self-organized network and puts forward a new type of hybrid self-organizing clustering routing protocol by combining energy sense and maximum connectedness. …”
    Get full text
    Article
  5. 285

    Spatiotemporal data modeling and prediction algorithms in intelligent management systems by Xin Cao, Chunxiao Mei, Zhiyong Song, Hao Li, Jingtao Chang, Zhihao Feng

    Published 2025-02-01
    “…In order to solve the problem of difficulty in learning semantic pattern representations between user dynamic interest sequences using path based and knowledge graph based entity embedding methods, the author proposes research on spatiotemporal data modeling and prediction algorithms in intelligent management systems. The author first makes a preliminary analysis of the wireless network data (mainly the data of cellular mobile networks) obtained by Internet service providers, reveals that the data of adjacent base stations have temporal and spatial correlations, then establishes a hybrid deep learning model for spatio-temporal prediction, and proposes a new spatial model training algorithm. …”
    Get full text
    Article
  6. 286

    Analysis of Brand Visual Design Based on Collaborative Filtering Algorithm by Gao Chaomeng, Wang Yonggang

    Published 2022-01-01
    “…Finally, the collaborative filtering algorithm is optimized to improve the consumer similarity based on the original algorithm. …”
    Get full text
    Article
  7. 287
  8. 288

    Translation Mechanism of Neural Machine Algorithm for Online English Resources by Yanping Ye

    Published 2021-01-01
    “…Specifically, this article uses the word alignment structure of statistical machine translation as the external vocabulary alignment information and introduces it into the decoding step of neural machine translation. The model is mainly based on neural machine translation, and the statistical machine translation vocabulary alignment structure is integrated on the basis of neural networks and continuous expression of words. …”
    Get full text
    Article
  9. 289

    Posture detection of athletes in sports based on posture solving algorithms by Huan Zhang

    Published 2024-12-01
    “…However, the current attitude solving algorithm has the limitation of low precision and low efficiency. …”
    Get full text
    Article
  10. 290

    Abnormal link detection algorithm based on semi-local structure by Haoran SHI, Lixin JI, Shuxin LIU, Gengrun WANG

    Published 2022-02-01
    “…With the research in network science, real networks involved are becoming more and more extensive.Redundant error relationships in complex systems, or behaviors that occur deliberately for unusual purposes, such as wrong clicks on webpages, telecommunication network spying calls, have a significant impact on the analysis work based on network structure.As an important branch of graph anomaly detection, anomalous edge recognition in complex networks aims to identify abnormal edges in network structures caused by human fabrication or data collection errors.Existing methods mainly start from the perspective of structural similarity, and use the connected structure between nodes to evaluate the abnormal degree of edge connection, which easily leads to the decomposition of the network structure, and the detection accuracy is greatly affected by the network type.In response to this problem, a CNSCL algorithm was proposed, which calculated the node importance at the semi-local structure scale, analyzed different types of local structures, and quantified the contribution of edges to the overall network connectivity according to the semi-local centrality in different structures, and quantified the reliability of the edge connection by combining with the difference of node structure similarity.Since the connected edges need to be removed in the calculation process to measure the impact on the overall connectivity of the network, there was a problem that the importance of nodes needed to be repeatedly calculated.Therefore, in the calculation process, the proposed algorithm also designs a dynamic update method to reduce the computational complexity of the algorithm, so that it could be applied to large-scale networks.Compared with the existing methods on 7 real networks with different structural tightness, the experimental results show that the method has higher detection accuracy than the benchmark method under the AUC measure, and under the condition of network sparse or missing, It can still maintain a relatively stable recognition accuracy.…”
    Get full text
    Article
  11. 291

    Self-Supervised Social Recommendation Algorithm Fusing Residual Networks by WANG Yujie, YANG Zhe

    Published 2024-12-01
    “…However, the existing algorithms mainly utilize the static social graph structure, which is unable to mine the potential linking relationship between users, and at the same time do not solve the noise problem in the user-item interaction behavior. …”
    Get full text
    Article
  12. 292

    Demonstration of Grover’s algorithm for retrieving secret keys in a basic SPN block cipher by Minh Thang Vu, Van Nghi Nguyen, Quoc Dat Le, Quang Trung Do

    Published 2024-10-01
    “…The main goal of the paper is to clarify the construction of the quantum circuit and the operation phases of Grover's algorithm to find the secret key with the condition of knowing at least 1 pair of plaintext-ciphertext. …”
    Get full text
    Article
  13. 293

    Demonstration of Grover’s algorithm for retrieving secret keys in a basic SPN block cipher by Minh Thang Vu, Van Nghi Nguyen, Quoc Dat Le, Quang Trung Do

    Published 2024-10-01
    “…The main goal of the paper is to clarify the construction of the quantum circuit and the operation phases of Grover's algorithm to find the secret key with the condition of knowing at least 1 pair of plaintext-ciphertext. …”
    Get full text
    Article
  14. 294

    Mining privacy-preserving association rules using transaction hewer allocator and facile hash algorithm in multi-cloud environments by D. Dhinakaran, S. Gopalakrishnan, D. Selvaraj, M.S. Girija, G. Prabaharan

    Published 2025-06-01
    “…First, this paper proposes a new multi-cloud approach to preserve privacy, which includes two main components, named the Transaction Hewer and Allocator module and the Facile Hash Algorithm (FHA), in extracting the frequent itemset. …”
    Get full text
    Article
  15. 295

    Spectroscopic Ages for 4 Million Main-sequence Dwarf Stars from LAMOST DR10 Estimated with a Data-driven Approach by Jia-Hui Wang, Maosheng Xiang, Meng Zhang, Ji-Wei Xie, Jian Ge, Jinghua Zhang, Lanya Mou, Ji-Feng Liu

    Published 2025-01-01
    “…While precise stellar ages for evolved stars have been derived from large ground- and space-based stellar surveys, reliable age determination for cool main-sequence dwarf stars remains a challenge. In this work, we set out to estimate the age of dwarf stars from the LAMOST spectra with a data-driven approach. …”
    Get full text
    Article
  16. 296
  17. 297

    Co-evolutionary algorithm with a region-based diversity enhancement strategy by Kangshun Li, RuoLin Ruan, Shumin Xie, Hui Wang

    Published 2025-03-01
    “…The proposed algorithm consists of two populations: a main population dedicated to exploring the constrained Pareto front and an auxiliary population tasked with exploring the unconstrained Pareto front. …”
    Get full text
    Article
  18. 298

    Design Secured Smart Door Lock Based on Jaro Winkler Algorithm by Sura Mahmood Abdullah

    Published 2023-02-01
    “…The main purpose of design smart door lock, using Jaro Winkler algorithm is to compare the registered password security with each entered password which may contain some wrong or swapped characters. …”
    Get full text
    Article
  19. 299

    Optimization of data allocation in hierarchical memory for blocked shortest paths algorithms by A. A. Prihozhy

    Published 2021-10-01
    “…This paper is devoted to the reduction of data transfer between the main memory and direct mapped cache for blocked shortest paths algorithms (BSPA), which represent data by a D[M×M] matrix of blocks. …”
    Get full text
    Article
  20. 300