Results 21 to 30 of about 335,663 (179)

An Uniform Embedding Steganography Algorithm Based on Block Entropy [PDF]

open access: yesJisuanji gongcheng, 2017
In Uniform Embedding Revisited Distortion(UERD) algorithm,the distortion function only considers the number of nonzero coefficients and does not take into account the influence of the statistical distribution on the embedding position,so this paper ...
WEI Weiyi,YANG Yang
doaj   +1 more source

Large-scale wave-front reconstruction for adaptive optics systems by use of a recursive filtering algorithm [PDF]

open access: yes, 2005
We propose a new recursive filtering algorithm for wave-front reconstruction in a large-scale adaptive optics system. An embedding step is used in this recursive filtering algorithm to permit fast methods to be used for wave-front reconstruction on an ...
Britton, Matthew   +2 more
core   +1 more source

Semantic embedding for quantum algorithms

open access: yesJournal of Mathematical Physics, 2023
The study of classical algorithms is supported by an immense understructure, founded in logic, type, and category theory, that allows an algorithmist to reason about the sequential manipulation of data irrespective of a computation’s realizing dynamics.
Zane M. Rossi, Isaac L. Chuang
openaire   +3 more sources

Virtual Network Mapping Mechanism Based on k Shortest Path Algorithm Optimization and Load Balance [PDF]

open access: yesJisuanji gongcheng, 2018
As the existing nodes and links of local areas are overweight,the phenomenon of packet jitter and resource waste generates when packets transmits between nodes and adjacent links.A virtual network embedding algorithm is designed for load balancing of the
GAO Fei,CHEN Deli,HONG Jiajun,YU Zhi,TIAN Tian
doaj   +1 more source

A Quasi-Isometric Embedding Algorithm [PDF]

open access: yesPattern Recognition and Image Analysis, 2019
The Whitney embedding theorem gives an upper bound on the smallest embedding dimension of a manifold. If a data set lies on a manifold, a random projection into this reduced dimension will retain the manifold structure. Here we present an algorithm to find a projection that distorts the data as little as possible.
openaire   +2 more sources

Virtual network embedding algorithm based on consultant guided search

open access: yes物联网学报, 2020
Considering at the problem of virtual network embedding,a virtual network embedding algorithm based on consultant guided search was proposed.The CPU of node,node degree and adjacent bandwidth were considered comprehensively,and the virtual network ...
Wentan LIU   +5 more
doaj   +2 more sources

Memetic Multi-Objective Particle Swarm Optimization-Based Energy-Aware Virtual Network Embedding [PDF]

open access: yes, 2015
In cloud infrastructure, accommodating multiple virtual networks on a single physical network reduces power consumed by physical resources and minimizes cost of operating cloud data centers. However, mapping multiple virtual network resources to physical
Shahin, Ashraf A.
core   +1 more source

Chaos embedded particle swarm optimization algorithms

open access: yesChaos, Solitons & Fractals, 2009
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Alatas, Bilal   +2 more
openaire   +3 more sources

An algorithm for fragment-aware virtual network reconfiguration. [PDF]

open access: yesPLoS ONE, 2018
In view of the fact that the current online virtual network embedding algorithms do not consider the fragment resources generated in the embedding process deeply enough, resulting in the problem that the acceptance ratio and the revenue to cost ratio are
Xinbo Liu, Buhong Wang
doaj   +1 more source

Extending Multi-MSB Prediction and Huffman Coding for Reversible Data Hiding in Encrypted HDR Images

open access: yesIEEE Access, 2022
Reversible data hiding in encrypted images can simultaneously enhance the image privacy and preserve the message security for the purpose of covert communication and cloud data management. The algorithm extends the multi-MSB prediction and Huffman coding
Yuan-Yu Tsai   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy