Results 11 to 20 of about 335,663 (179)

VNE-HPSO: Virtual Network Embedding Algorithm Based on Hybrid Particle Swarm Optimization

open access: yesIEEE Access, 2020
Today, the 5G Internet era has arrived, and network virtualization technology has captured the attention of people. However, traditional single-domain virtual embedding technology generated huge overhead in embedding and caused a certain waste of ...
Peiying Zhang   +3 more
doaj   +3 more sources

A word embedding trained on South African news data

open access: yesThe African Journal of Information and Communication, 2022
This article presents results from a study that developed and tested a word embedding trained on a dataset of South African news articles. A word embedding is an algorithm-generated word representation that can be used to analyse the corpus of words ...
Martin Canaan Mafunda   +3 more
doaj   +1 more source

Averaging on Manifolds by Embedding Algorithm [PDF]

open access: yesJournal of Mathematical Imaging and Vision, 2013
We will propose a new algorithm for finding critical points of cost functions defined on a differential manifold. We will lift the initial cost function to a manifold that can be embedded in a Riemannian manifold (Euclidean space) and will construct a vector field defined on the ambient space whose restriction to the embedded manifold is the gradient ...
Birtea, Petre   +2 more
openaire   +3 more sources

A Link Stress-related Virtual Network Embedding Algorithm [PDF]

open access: yesJisuanji gongcheng, 2016
Aiming at the problem of high link stress in substrate network caused by traditional Virtual Network Embedding(VNE) algorithm,a new VNE algorithm is proposed.In the stage of node embedding,the importance degree of node in network is gotten by its ...
ZHANG Jingjing,ZHAO Chenggui,YUAN Jianming
doaj   +1 more source

Color Image Reversible Data Hiding With Double-Layer Embedding

open access: yesIEEE Access, 2020
Reversible data hiding (RDH) in color image is an important topic of data hiding. This paper presents an efficient RDH algorithm for color image via double-layer embedding.
Zhenjun Tang   +5 more
doaj   +1 more source

Parameterized Algorithms for Book Embedding Problems [PDF]

open access: yesJournal of Graph Algorithms and Applications, 2019
A $k$-page book embedding of a graph $G$ draws the vertices of $G$ on a line and the edges on $k$ half-planes (called pages) bounded by this line, such that no two edges on the same page cross. We study the problem of determining whether $G$ admits a $k$-page book embedding both when the linear order of the vertices is fixed, called ${\rm F{\small IXED}
Sujoy Bhore   +3 more
openaire   +3 more sources

Reversible data hiding for encrypted image based on adaptive prediction error coding

open access: yesIET Image Processing, 2021
Reversible data hiding (RDH) is a useful technique of data security. Embedding capacity is one of the most important performance of RDH for encrypted image.
Zhenjun Tang   +4 more
doaj   +1 more source

Embedding cube-connected cycles graphs into faulty hypercubes [PDF]

open access: yes, 1994
We consider the problem of embedding a cube-connected cycles graph (CCC) into a hypercube with edge faults. Our main result is an algorithm that, given a list of faulty edges, computes an embedding of the CCC that spans all of the nodes and avoids all of
Bruck, Jehoshua   +2 more
core   +1 more source

Local procrustes for manifold embedding: a measure of embedding quality and embedding algorithms [PDF]

open access: yesMachine Learning, 2009
We present the Procrustes measure, a novel measure based on Procrustes rotation that enables quantitative comparison of the output of manifold-based embedding algorithms (such as LLE (Roweis and Saul, 2000) and Isomap (Tenenbaum et al, 2000)). The measure also serves as a natural tool when choosing dimension-reduction parameters.
Goldberg, Yair, Ritov, Ya'acov
openaire   +2 more sources

An Improved Watermarking Technique for Copyright Protection Based on Tchebichef Moments

open access: yesIEEE Access, 2019
Watermarking technique is a method to protect ownership of digital multimedia. Most existing watermarking techniques achieve a good level of imperceptibility and robustness.
Ferda Ernawan, Muhammad Nomani Kabir
doaj   +1 more source

Home - About - Disclaimer - Privacy