-
181
Apply Block Ciphers Using Tiny Encryption Algorithm (TEA)
Published 2010-06-01“…The Aim of this paper is to Apply symmetric block ciphers algorithm which is called Tiny Encryption algorithm (TEA). …”
Get full text
Article -
182
A Survey on Deployment Algorithms in Underwater Acoustic Sensor Networks
Published 2013-12-01“…Node deployment for UASNs is an attractive research topic upon which a large number of algorithms have been proposed recently. This paper seeks to provide an overview of the most recent advances of deployment algorithms in UASNs while pointing out the open issues. …”
Get full text
Article -
183
Perioperative Management of Patients Receiving Antithrombotic Therapy in Schemes and Algorithms
Published 2023-01-01“…Currently, antithrombotic therapy is the basis of the pathogenetic treatment of many cardiovascular diseases, such as coronary heart disease, stroke, peripheral vascular disease, as well as mechanical heart valves, heart rhythm disturbances, venous thromboembolism. …”
Get full text
Article -
184
An Investigation on Prediction of Infrastructure Asset Defect with CNN and ViT Algorithms
Published 2025-05-01Get full text
Article -
185
Optimistic Algorithms for Safe Linear Bandits Under General Constraints
Published 2025-01-01“…However, most existing algorithms for safe linear bandits only consider <italic>linear constraints</italic>, making them inadequate for many real-world applications, which often have non-linear constraints. …”
Get full text
Article -
186
A Novel Data Encryption Algorithm To Ensure Database Security
Published 2023-06-01“…Many people apply technologies gradually, moving towards new progress and development. …”
Get full text
Article -
187
Karatsuba Algorithm Revisited for 2D Convolution Computation Optimization
Published 2025-05-01“…Convolutional computations consist of many dot-product operations (multiplication–accumulation, or MAC), for which the Winograd algorithm is currently the most widely used method to reduce the number of MACs. …”
Get full text
Article -
188
Development of six-degree of freedom strapdown terrestrial INS algorithm
Published 2005-03-01Get full text
Article -
189
Novel Global Harmony Search Algorithm for Least Absolute Deviation
Published 2014-01-01“…The method of least absolute deviation (LAD) finds applications in many areas, due to its robustness compared to the least squares regression (LSR) method. …”
Get full text
Article -
190
Adaptive fuzzy filter algorithm for LEO communication channel estimation
Published 2006-01-01“…A novel adaptive LMS filter algorithm based on fuzzy rules was proposed.Through building many fuzzy sets over the space of channel gained value and the increment value of channel gain,in addition to the setting of fuzzy rules,an adaptive algorithm incorporated with human experience was set up,which was adaptive to the time<sub>v</sub>aring character-istics of LEO satellite channel.The results of the simulation validate the algorithm.…”
Get full text
Article -
191
Virtual network embedding algorithm based on negotiation in distributed environment
Published 2014-12-01“…The network virtualization is able to offer various customized end-to-end services networks on a shared sub-strate network.However,the existing virtual network embedding algorithms present many problems in reliability and ap-plicability due to their dependence on a centralized manager node.Hence,a virtual network embedding algorithm in dis-tributed environment is proposed,which implements embedding process by the negotiation of several nodes.Moreover,this algorithm makes improvement in reducing communication cost and length of virtual links.Simulation experiments demonstrate that the proposed algorithm can achieve better performance on efficiency of resources utilization and com-munication cost.…”
Get full text
Article -
192
Optimization of Teaching Management System Based on Association Rules Algorithm
Published 2021-01-01“…A scientific, efficient, and complete teaching management system cannot only help the teaching management department improve work efficiency and quality but also greatly reduce many problems caused by manual labour risk. This paper designs and implements a teaching management system based on an improved association rule algorithm. …”
Get full text
Article -
193
Take Back the Algorithms! A Media Theory of Commonistic Affordance
Published 2019-08-01“… This essay critiques the ‘black-boxing’ of many computational processes, which are argued to result in a kind of ‘unaffordability’ of algorithms. …”
Get full text
Article -
194
Robust FCM Algorithm with Local and Gray Information for Image Segmentation
Published 2016-01-01“…The FCM (fuzzy c-mean) algorithm has been extended and modified in many ways in order to solve the image segmentation problem. …”
Get full text
Article -
195
Review and classification of trajectory summarisation algorithms: From compression to segmentation
Published 2021-10-01“…Finally, we outline the recent trends and best practices to continue the research in next summarisation algorithms.…”
Get full text
Article -
196
Symbolic algorithm for solving SLAEs with multi-diagonal coefficient matrices
Published 2025-06-01“…The algorithm is given in a pseudocode. A theorem which gives the condition for correctness of the algorithm is formulated and proven. …”
Get full text
Article -
197
Research on Classification of Rail Defects Based on Image Processing Algorithm
Published 2020-07-01“…There are many types and different shapes of rail defects. …”
Get full text
Article -
198
Dynamic Games Methods in Synthesis of Safe Ship Control Algorithms
Published 2018-01-01“…The paper presents application of dynamic games methods, multistage positional and multistep matrix games, to automate the process control of moving objects, on the example of safe control of own ship in collision situations when passing many ships encountered. Taking into consideration two types of ships cooperation, for each of the two types of games, positional and matrix, four control algorithms for determining a safe ship trajectory supporting the navigator’s maneuvering decision in a collision situation are presented. …”
Get full text
Article -
199
DNA Genetic Algorithm in Digital Intelligent Design of Environmental Art
Published 2022-01-01“…Unlike traditional design methods that generally only generate one design scheme, genetic algorithms can generate large-scale schemes and calculate the optimal scheme among many schemes. …”
Get full text
Article -
200
Policy-adaptive capability inheritance algorithm consistent with POSIX standard
Published 2006-01-01“…In order to support POSIX capability mechanism,many secure operating systems provided individual capability inheritable algorithms.These algorithms were only applicable to specified least privilege control policies,and had such defects as semantic conflicts and no defined security-objectives.So they couldn’t flexibly support for implementing diversified privilege policies for different requirements.Based on the analysis of some existing algorithms,a new capability inheritance algorithm was proposed,which introduced the policy-relevant capability control variable and the trusted application attribution.The implementation of the algorithm in ANSHENG secure operating system demonstrates that this algorithm provides such properties as policy-adaptability and usability,the formal analysis and verification of this algorithm proves that it supports a secure operating system to meet basic security theorems of the privilege policies enforced in it.…”
Get full text
Article