-
2021
Improved Population Intelligence Algorithm and BP Neural Network for Network Security Posture Prediction
Published 2023-01-01“…First, the adaptive adjustment of the two parameters with the increase of iterations is achieved by improving the inertia weights and learning factors in the particle swarm optimization (PSO) algorithm so that the PSO has a large search range and high speed at the initial stage and a strong and stable convergence capability at the later stage. …”
Get full text
Article -
2022
Off-grid DOA estimation algorithm based on unitary transform and sparse Bayesian learning
Published 2017-06-01“…A rapid off-grid DOA estimating method of RV-OGSBL was raised based on unitary transformation,against the problem of traditional sparse Bayesian learning (SBL) algorithm in solving effectiveness of signal’s DOA estimation under condition of lower signal noise ratio (SNR).Actual received signal of uniform linear array was generated through constructing augment matrix as the processing signal used by DOA estimation.Then,estimation model was transformed from complex value to real value by using unitary transformation.In the next step,off-grid model and sparse Bayesian learning algorithm were combined together to process the realization of DOA estimation iteratively.The accuracy of estimation could made relatively high.The simulation result demonstrates that the RV-OGSBL method not only maintains the performance of traditional SBL algorithm,but also reduces the computational complexity significantly.Under the situation of lower signal noise ratio (SNR) and low number of snapshots,the running time of algorithm is reduced about 50%.This shows the RV-OGSBL method is a rapid DOA estimation algorithm.…”
Get full text
Article -
2023
Cross-domain task offloading and computing resource allocation for edge computation in industrial Internet of things
Published 2020-06-01“…In the industrial Internet of things,limited by the computing capacity of field devices,the task offloading based on edge computing can effectively alleviate the computing burden of field devices and provide low-latency computing services.Moreover,because the load of edge servers are different in different areas of the network,it is necessary to reasonably arrange task offloading and allocate computing resources of edge servers,thereby reducing task completion delay and achieving load balance.Thus,the task offloading and resource allocation for edge computing in the industrial Internet of things was studied,a cross-domain offloading model for computing tasks in the industrial Internet of things was proposed,and a mixed integer nonlinear optimization problem that minimizes task completion time was formulated.The problem was decomposed it into two sub-problems of resource allocation and task offloading,based on the characteristics of the two sub-problems,the optimal solution of resource allocation and task offloading strategy were obtained through iterative and alternating solution.The experimental results show that compared with the non-cross-domain strategy,the load imbalance of the edge server and the task completion delay are reduced effectively by the proposed strategy.…”
Get full text
Article -
2024
Novel Algorithms for Solving a System of Absolute Value Variational Inequalities
Published 2022-01-01“…By utilizing an auxiliary principle and the existence result, we propose several new iterative algorithms for solving the system of absolute value auxiliary variational inequalities in the frame of four different operators. …”
Get full text
Article -
2025
Instantaneous Impact Point Guidance with Coast Arcs for Solid Rockets
Published 2021-01-01“…This paper proposed an analytical iterative guidance method with the desired instantaneous impact point constraint for solid rockets in “burn-coast-burn” trajectory mode. …”
Get full text
Article -
2026
Service Arms with Unconventional Robotic Parameters for Intricate Workstations: Optimal Number and Dimensional Synthesis
Published 2016-01-01“…These allowable redundant joints would help in providing solution for intricate workcells. For each iteration of the upper level, a constrained nonlinear problem is solved for dimensional synthesis of the manipulator. …”
Get full text
Article -
2027
Influence of Roughness on Isothermal Elastohydrodynamic Lubrication of Roller Enveloped Worm Drive
Published 2022-09-01“…According to the elastohydrodynamic lubrication theory, the Newton iteration method is used in Matlab. The Newton-Raphson method is used to solve its numerical calculation, the conjugate teeth of the new transmission pair are studied, and the analysis of the line contact between the conjugate teeth is completed. …”
Get full text
Article -
2028
Reshaping health care governance using pilot projects as public policy implementation instruments
Published 2020-12-01“…The analysis concerns the specific implementation modalities designed by the authorities, which consisted of the launch of pilot projects involving professionals in the field coming from different sectors in an iterative and incremental co-creation process. This choice caused new vertical interdependences to emerge between the levels of the health care system, transforming the roles of both the authorities and hands-on professionals involved; it also denoted a transition towards a more negotiated governance, in the course of which several types of knowledge and evidence have been mobilised.…”
Get full text
Article -
2029
An Improved Image Processing Based on Deep Learning Backpropagation Technique
Published 2022-01-01“…Variables of randomness are used as features for the deep learning system, with feedback during iteration. An ideal image processing encryption yields high messy images by keeping the quality. …”
Get full text
Article -
2030
Shuffled differential privacy protection method for K-Modes clustering data collection and publication
Published 2024-01-01“…Aiming at the current problem of insufficient security in clustering data collection and publication, in order to protect user privacy and improve data quality in clustering data, a privacy protection method for K-Modes clustering data collection and publication was proposed without trusted third parties based on the shuffled differential privacy model.K-Modes clustering data collection algorithm was used to sample the user data and add noise, and then the initial order of the sampled data was disturbed by filling in the value domain random arrangement publishing algorithm.The malicious attacker couldn’t identify the target user according to the relationship between the user and the data, and then to reduce the interference of noise as much as possible a new centroid was calculated by cyclic iteration to complete the clustering.Finally, the privacy, feasibility and complexity of the above three methods were analyzed from the theoretical level, and the accuracy and entropy of the three real data sets were compared with the authoritative similar algorithms KM, DPLM and LDPKM in recent years to verify the effectiveness of the proposed model.The experimental results show that the privacy protection and data quality of the proposed method are superior to the current similar algorithms.…”
Get full text
Article -
2031
Survey of evolutionary kernel fuzzing
Published 2024-02-01“…Fuzzing is a technique that was used to detect potential vulnerabilities and errors in software or systems by generating random, abnormal, or invalid test cases.When applying fuzzing to the kernel, more complex and challenging obstacles were encountered compared to user-space applications.The kernel, being a highly intricate software system, consists of numerous interconnected modules, subsystems, and device drivers, which presented challenges such as a massive codebase, complex interfaces, and runtime uncertainty.Traditional fuzzing methods could only generate inputs that simply satisfied interface specifications and explicit call dependencies, making it difficult to thoroughly explore the kernel.In contrast, evolutionary kernel fuzzing employed heuristic evolutionary strategies to dynamically adjust the generation and selection of test cases, guided by feedback mechanisms.This iterative process aimed to generate higher-quality test cases.Existing work on evolutionary kernel fuzzing was examined.The concept of evolutionary kernel fuzzing was explained, and its general framework was summarized.The existing work on evolutionary kernel fuzzing was classified and compared based on the type of feedback mechanism utilized.The principles of how feedback mechanisms guided evolution were analyzed from the perspectives of collecting, analyzing, and utilizing runtime information.Additionally, the development direction of evolutionary kernel fuzzing was discussed.…”
Get full text
Article -
2032
A two-loop four-point form factor at function level
Published 2025-01-01“…Here we lift the two-loop form factor from symbol level to function level. We provide an iterated representation of the function’s derivatives (coproducts). …”
Get full text
Article -
2033
L’après-tourisme revisité
Published 2018-09-01“…Cette démarche est nourrie par l’engagement au sein de collectifs positionnés à différentes échelles géographiques et temporelles. Elle procède d’une itération constante entre d’une part des registres normatif et non normatif, et d’autre part des ancrages géographiques et thématiques, scientifiques et pédagogiques.…”
Get full text
Article -
2034
Evaluation Method of Advanced Mathematics Teaching Reform Effect Based on Big Data Analysis Technology
Published 2022-01-01“…The experimental results show that the 530 sample data of the course are submitted to the RBF network for the training, and the network converges after 3385 iterations. Among all 100 test samples, the maximum test error is 0.0513, of which 92 samples are judged correct, 7 samples are judged as excellent, and 3 samples are judged as medium. …”
Get full text
Article -
2035
Research on Energy-Efficient Building Design Using Target Function Optimization and Genetic Neural Networks
Published 2025-01-01“…The genetic neural network algorithm iteratively modifies design parameters (e.g., building orientation, insulation levels etc) and evaluates the resulting energy performance using EnergyPlus. …”
Get full text
Article -
2036
Adaptive wavelet base selection for deep learning-based ECG diagnosis: A reinforcement learning approach.
Published 2025-01-01“…In this framework, a reinforcement learning (RL) agent iteratively optimizes its wavelet base selection (WBS) strategy based on successive feedback of classification performance, aiming to achieve progressively optimized feature extraction. …”
Get full text
Article -
2037
Morphological Accuracy Data Clustering: A Novel Algorithm for Enhanced Cluster Analysis
Published 2024-01-01“…The empirical results demonstrate that the proposed algorithm achieves a stable clustering outcome in fewer iterations compared to several existing centroid-based clustering algorithms. …”
Get full text
Article -
2038
Data poisoning attack detection approach for quality of service aware cloud API recommender system
Published 2023-08-01“…To solve the problem that existing studies usually assumed that the QoS data of cloud API recommender system was reliable, ignoring the data poisoning attack on cloud API recommender system by malicious users in open network environment, a data poisoning attack detection approach based on multi-feature fusion was proposed.Firstly, a user connected network graph was constructed based on the designed similarity function, and users’ neighborhood features were captured using Node2vec.Secondly, sparse auto-encoder was used to mine user QoS deep feature, and user interpretation feature based on QoS data weighted average deviation was designed.Furthermore, a fake user detection model based on support vector machine was established by integrating user neighborhood feature, QoS deep feature, and interpretation feature, the model parameters were learned using grid search and alternating iterative optimization strategy to complete fake user detection.Finally, the effectiveness and superiority of the proposed approach were verified through extensive experiments, realizing the poison attack defense against QoS aware cloud API recommender system at the data side.…”
Get full text
Article -
2039
Processus de qualification et construction d’un compromis institutionnel territorialisé. La gestion intégrée de l’eau par bassin dans le canton de Fribourg (Suisse)
Published 2016-12-01“…This article aims at understanding the qualification of natural resources as an endogenous and iterative normative process involving actors with different interests, often conflicting. …”
Get full text
Article -
2040
NURBS Reconstruction and Optimization Method for the Tooth Surface after Simulation Process of Spiral Bevel Gear
Published 2016-01-01“…Finally,the reconstruction of tooth surface as the base surface,a variety of tooth surface optimization schemes based on Newton iteration and the least squares method are proposed,so as to complete the precise fitting of the tooth surfaces. …”
Get full text
Article