-
281
Implementation of SM3 algorithm based on SoPC component
Published 2017-05-01“…Firstly the realization of SM3 on SoC was given.The structure of the algorithm was analyzed mainly,and the algorithm was realized by the Verilog hardware description language,in order to simulate this algorithm,the Altera simulation software ModelSim was chosen,SoPC Builder was used for interface package,and finally it was implemented in the Cyclone IV EP4CE22F17C8N.Its operation frequency can reach 165 MHz and its throughput rate is 1 184.8 Mbit/s.…”
Get full text
Article -
282
Comparative Analysis Of Integer Factorization Algorithms Using Cpu And Gpu
Published 2017-05-01“…In this work we have evaluated the running time of four integer factorization algorithms, namely, trial division algorithm, Fermat algorithm, Pollard rho and Brent algorithms. …”
Get full text
Article -
283
Algorithmic literacy and media practices among young people in Brussels
Published 2023-07-01“…Recommendation algorithms play an undeniable role in the access to information, and are aimed at making browsing easier for users by recommending the most "relevant" content according to a series of criteria selected by their designers. …”
Get full text
Article -
284
A Novel Hybrid Self-Organizing Clustering Routing Algorithm
Published 2012-09-01“…This paper discusses the distributed routing algorithm of wireless self-organized network and puts forward a new type of hybrid self-organizing clustering routing protocol by combining energy sense and maximum connectedness. …”
Get full text
Article -
285
Spatiotemporal data modeling and prediction algorithms in intelligent management systems
Published 2025-02-01“…In order to solve the problem of difficulty in learning semantic pattern representations between user dynamic interest sequences using path based and knowledge graph based entity embedding methods, the author proposes research on spatiotemporal data modeling and prediction algorithms in intelligent management systems. The author first makes a preliminary analysis of the wireless network data (mainly the data of cellular mobile networks) obtained by Internet service providers, reveals that the data of adjacent base stations have temporal and spatial correlations, then establishes a hybrid deep learning model for spatio-temporal prediction, and proposes a new spatial model training algorithm. …”
Get full text
Article -
286
Analysis of Brand Visual Design Based on Collaborative Filtering Algorithm
Published 2022-01-01“…Finally, the collaborative filtering algorithm is optimized to improve the consumer similarity based on the original algorithm. …”
Get full text
Article -
287
Bioresource collections: algorithms for development and functioning; basic and applied significance
Published 2023-12-01Get full text
Article -
288
Translation Mechanism of Neural Machine Algorithm for Online English Resources
Published 2021-01-01“…Specifically, this article uses the word alignment structure of statistical machine translation as the external vocabulary alignment information and introduces it into the decoding step of neural machine translation. The model is mainly based on neural machine translation, and the statistical machine translation vocabulary alignment structure is integrated on the basis of neural networks and continuous expression of words. …”
Get full text
Article -
289
Posture detection of athletes in sports based on posture solving algorithms
Published 2024-12-01“…However, the current attitude solving algorithm has the limitation of low precision and low efficiency. …”
Get full text
Article -
290
Abnormal link detection algorithm based on semi-local structure
Published 2022-02-01“…With the research in network science, real networks involved are becoming more and more extensive.Redundant error relationships in complex systems, or behaviors that occur deliberately for unusual purposes, such as wrong clicks on webpages, telecommunication network spying calls, have a significant impact on the analysis work based on network structure.As an important branch of graph anomaly detection, anomalous edge recognition in complex networks aims to identify abnormal edges in network structures caused by human fabrication or data collection errors.Existing methods mainly start from the perspective of structural similarity, and use the connected structure between nodes to evaluate the abnormal degree of edge connection, which easily leads to the decomposition of the network structure, and the detection accuracy is greatly affected by the network type.In response to this problem, a CNSCL algorithm was proposed, which calculated the node importance at the semi-local structure scale, analyzed different types of local structures, and quantified the contribution of edges to the overall network connectivity according to the semi-local centrality in different structures, and quantified the reliability of the edge connection by combining with the difference of node structure similarity.Since the connected edges need to be removed in the calculation process to measure the impact on the overall connectivity of the network, there was a problem that the importance of nodes needed to be repeatedly calculated.Therefore, in the calculation process, the proposed algorithm also designs a dynamic update method to reduce the computational complexity of the algorithm, so that it could be applied to large-scale networks.Compared with the existing methods on 7 real networks with different structural tightness, the experimental results show that the method has higher detection accuracy than the benchmark method under the AUC measure, and under the condition of network sparse or missing, It can still maintain a relatively stable recognition accuracy.…”
Get full text
Article -
291
Self-Supervised Social Recommendation Algorithm Fusing Residual Networks
Published 2024-12-01“…However, the existing algorithms mainly utilize the static social graph structure, which is unable to mine the potential linking relationship between users, and at the same time do not solve the noise problem in the user-item interaction behavior. …”
Get full text
Article -
292
Demonstration of Grover’s algorithm for retrieving secret keys in a basic SPN block cipher
Published 2024-10-01“…The main goal of the paper is to clarify the construction of the quantum circuit and the operation phases of Grover's algorithm to find the secret key with the condition of knowing at least 1 pair of plaintext-ciphertext. …”
Get full text
Article -
293
Demonstration of Grover’s algorithm for retrieving secret keys in a basic SPN block cipher
Published 2024-10-01“…The main goal of the paper is to clarify the construction of the quantum circuit and the operation phases of Grover's algorithm to find the secret key with the condition of knowing at least 1 pair of plaintext-ciphertext. …”
Get full text
Article -
294
Mining privacy-preserving association rules using transaction hewer allocator and facile hash algorithm in multi-cloud environments
Published 2025-06-01“…First, this paper proposes a new multi-cloud approach to preserve privacy, which includes two main components, named the Transaction Hewer and Allocator module and the Facile Hash Algorithm (FHA), in extracting the frequent itemset. …”
Get full text
Article -
295
Spectroscopic Ages for 4 Million Main-sequence Dwarf Stars from LAMOST DR10 Estimated with a Data-driven Approach
Published 2025-01-01“…While precise stellar ages for evolved stars have been derived from large ground- and space-based stellar surveys, reliable age determination for cool main-sequence dwarf stars remains a challenge. In this work, we set out to estimate the age of dwarf stars from the LAMOST spectra with a data-driven approach. …”
Get full text
Article -
296
A simple and efficient algorithm for genome‐wide homozygosity analysis in disease
Published 2009-09-01Get full text
Article -
297
Co-evolutionary algorithm with a region-based diversity enhancement strategy
Published 2025-03-01“…The proposed algorithm consists of two populations: a main population dedicated to exploring the constrained Pareto front and an auxiliary population tasked with exploring the unconstrained Pareto front. …”
Get full text
Article -
298
Design Secured Smart Door Lock Based on Jaro Winkler Algorithm
Published 2023-02-01“…The main purpose of design smart door lock, using Jaro Winkler algorithm is to compare the registered password security with each entered password which may contain some wrong or swapped characters. …”
Get full text
Article -
299
Optimization of data allocation in hierarchical memory for blocked shortest paths algorithms
Published 2021-10-01“…This paper is devoted to the reduction of data transfer between the main memory and direct mapped cache for blocked shortest paths algorithms (BSPA), which represent data by a D[M×M] matrix of blocks. …”
Get full text
Article -
300
Features of modern algorithm of examination and treatment patients with endo-perio lesions
Published 2020-04-01Get full text
Article