Suggested Topics within your search.
Suggested Topics within your search.
-
1621
Improved meet-in-the-middle attack on reduced-round Kiasu-BC algorithm
Published 2022-07-01“…Kiasu-BC algorithm is an internal tweakable block cipher of authenticated encryption algorithm Kiasu as one of first-round candidates in the CAESAR competition.The precomputation complexity is reduced by utilizing the freedom of the tweak and the internal key restriction through the research on structural characteristics of Kiasu-BC algorithm based on AES-128 round function.Combined with the differential enumeration technique, a new 5-round meet-in-the-middle distinguisher was constructed to improve the meet-in-the-middle attack on 8-round Kiasu-BC algorithm.The improved attack requires the time complexity of 2<sup>114</sup>, the memory complexity of 2<sup>63</sup> and the data complexity of 2<sup>108</sup>.…”
Get full text
Article -
1622
Collision avoidance algorithm and validation based on V2P at intersection
Published 2017-12-01Get full text
Article -
1623
A survey on AI algorithms applied in communication and computation in Internet of vehicles
Published 2023-01-01“…In the 5G era, the development of communication and computing in the Internet of vehicles has been limited by the rapidly increasing amount of information.New breakthroughs in communication and computing in Internet of vehicles can be achieved by applying AI algorithms to the Internet of vehicles.Firstly, the application of AI algorithms in communication security, communication resource allocation, computation resource allocation, task offloading decision, server deployment, communication-computation integration were investigated.Secondly, the achievements and shortcomings of the present AI algorithms in different scenarios were analyzed.Finally, combined with the Internet of vehicle development trend, some future research directions for AI algorithms applied in the Internet of vehicles were discussed.…”
Get full text
Article -
1624
Collision avoidance algorithm and validation based on V2P at intersection
Published 2017-12-01Get full text
Article -
1625
Distributed energy efficient unequal clustering algorithm for wireless sensor networks
Published 2009-01-01“…A distributed energy-efficient unequal clustering (DEEUC) algorithm was proposed for wireless sensor net-works by research current routing algorithms. …”
Get full text
Article -
1626
ESYN:efficient synchronization clustering algorithm based on dynamic synchronization model
Published 2014-11-01“…Clustering is an important research field in data mining.Based on dynamical synchronization model,an efficient synchronization clustering algorithm ESYN is proposed.Firstly,based on local structure information of a non-vector network,a new concept vertex similarity is brought up to describe the link density between vertices.Secondly,the network is vectoried by OPTICS algorithm and turned into one-dimensional coordination sequence.Finally,global coupling analysis is applied to generalized Kuramoto synchronization model,synchronization radius is increased and the optimal clustering result is automatically selected.The experimental results on a large number of synthetic and real-world networks show that proposed algorithm achieves high accuracy.…”
Get full text
Article -
1627
Amazigh spell checker using Damerau-Levenshtein algorithm and N-gram
Published 2022-09-01“…Natural language processing (NLP) is a rapidly growing research field in computer science and cognitive science. …”
Get full text
Article -
1628
An Algorithm for Part Input Sequencing of Flexible Manufacturing Systems with Machine Disruption
Published 2024-10-01“…Evaluation is performed for the proposed algorithm by simulation experiments and result analyses. …”
Get full text
Article -
1629
Performance analysis and testing of personal influence algorithm in online social networks
Published 2018-10-01“…Social influence is the key factor to drive information propagation in online social networks and can be modeled and analyzed with social networking data.As a kind of classical personal influence algorithm,two parallel implementation versions of a PageRank based method were introduced.Furthermore,extensive experiments were conducted on a large-scale real dataset to test the performance of these parallel methods in a distributed environment.The results demonstrate that the computational efficiency of the personal influence algorithm can be improved significantly in massive data sets by virtue of existing big data processing framework,and provide an empirical reference for the future research and optimization of the algorithm as well.…”
Get full text
Article -
1630
ESYN:efficient synchronization clustering algorithm based on dynamic synchronization model
Published 2014-11-01“…Clustering is an important research field in data mining.Based on dynamical synchronization model,an efficient synchronization clustering algorithm ESYN is proposed.Firstly,based on local structure information of a non-vector network,a new concept vertex similarity is brought up to describe the link density between vertices.Secondly,the network is vectoried by OPTICS algorithm and turned into one-dimensional coordination sequence.Finally,global coupling analysis is applied to generalized Kuramoto synchronization model,synchronization radius is increased and the optimal clustering result is automatically selected.The experimental results on a large number of synthetic and real-world networks show that proposed algorithm achieves high accuracy.…”
Get full text
Article -
1631
Traffic identification of network business based on multi-layer cascade algorithm
Published 2015-12-01“…The contradiction between traffic demand and network bandwidth is the main problem of the current network.Traffic management is one of the effective solutions,at the same time it can improve the quality of service of the network,and network traffic identification is the basis of fine traffic management.The traffic identification method of network business based on multi-layer cascade algorithm was proposed,after the research of network traffic identification and machine learning techniques.This method can adapt to the situation of the complex network traffic flow,and can balance the contradiction between the time performance and the accuracy of the machine learning algorithm.Furthermore the cascade algorithm of this method takes the cost imbalance into account,and takes more attention to the identification of important business,so it can help enhance user experience.…”
Get full text
Article -
1632
AUV path planning method based on improved sparrow search algorithm
Published 2025-06-01Get full text
Article -
1633
Algorithm for Calculating Noise Immunity of Cognitive Dynamic Systems in the State Space
Published 2023-11-01“…The research method consists in applying the state space method, widely used in the study of automatic dynamical systems, to describe the behavior of cognitive systems. …”
Get full text
Article -
1634
Seven-parameter PEMFC model optimization using an battlefield optimization algorithm
Published 2025-10-01Get full text
Article -
1635
Speed and Power Consumption Comparison between DES and AES Algorithm in Arduino
Published 2019-05-01“…Besides that, the algorithm must be light, fast and use less power. In this study, a comparison of the Data Encryption Standard (DES) and Advanced Encryption Standard (AES) algorithms will be implemented in the encryption module. …”
Get full text
Article -
1636
Enhancement of the Moving Horizon Estimation Performance Based on an Adaptive Estimation Algorithm
Published 2021-01-01“…In this paper, using an adaptive estimation algorithm, we approximate and update the parameters of the arrival cost of the moving horizon estimator. …”
Get full text
Article -
1637
An Improved Algorithm of Wireless Sensor Networks Routing Protocol Based on LEACH
Published 2013-04-01“…One of the most popular research focuses of wireless sensor network is postponing the life cycle of sensor network as well as reducing energy consumption.An efficient clustering routing algorithm based on LEACH(low energy adaptive clustering hierarch)was presented,which is the representative of hierarchy based protocol in wireless sensor network.The residual energy,average energy and maximum energy are considered in this algorithm while electing the cluster header.It can also limit the number of members of each cluster.At the same time,it can produce the first cluster header among the cluster heads which will use the multi-hop mode to balance the load of network.The simulation results show that this improved algorithm can reduce the energy consumption,extend the network life cycle and ensure the load balance of the system.…”
Get full text
Article -
1638
Design and Implemented of an Algorithm for Covered Writing on a Video File (mov)
Published 2010-12-01“…In this research, video file type (mov) is used to hide an English text. …”
Get full text
Article -
1639
University Media Content Detection and Classification Based on Information Fusion Algorithm
Published 2022-01-01Get full text
Article -
1640
Simulation of film transmission path based on ant colony optimization algorithm
Published 2025-07-01“…The research results show that the effect of the optimized ACA is significantly better than the basic ACA. …”
Get full text
Article