-
13041
Time-Delayed Acceleration Feedback Control of a Single-Link Flexible Manipulator Using Kalman Filter
Published 2021-01-01“…In light of the estimated augmented states, a hybrid controller that combines a feedback control algorithm and a feedforward control algorithm is designed according to optimal control theory and Moore–Penrose theory. …”
Get full text
Article -
13042
Cloud data secure deduplication scheme via role-based symmetric encryption
Published 2018-05-01“…The rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as well as the increasing management overhead bring a big challenge to the cloud storage space.Meanwhile,some serious issues such as the privacy disclosure,authorized access,secure deduplication,rekeying and permission revocation should also be taken into account.In order to address these problems,a role-based symmetric encryption algorithm was proposed,which established a mapping relation between roles and role keys.Moreover,a secure deduplication scheme was proposed via role-based symmetric encryption to achieve both the privacy protection and the authorized deduplication under the hierarchical architecture in the cloud computing environment.Furthermore,in the proposed scheme,the group key agreement protocol was utilized to achieve rekeying and permission revocation.Finally,the security analysis shows that the proposed role-based symmetric encryption algorithm is provably secure under the standard model,and the deduplication scheme can meet the security requirements.The performance analysis and experimental results indicate that the proposed scheme is effective and efficient.…”
Get full text
Article -
13043
Random k conditional nearest neighbor for high-dimensional data
Published 2025-01-01“…The k nearest neighbor (kNN) approach is a simple and effective algorithm for classification and a number of variants have been proposed based on the kNN algorithm. …”
Get full text
Article -
13044
Recognition of Damage Degree of Tooth Root Crack based on PCA and Grey Relational
Published 2020-09-01“…The relational degree of PCA and GRA combined algorithm is larger and the discrimination degree is more obvious than that of direct GRA calculation. …”
Get full text
Article -
13045
Generalized Equilibrium Problems Related to Ky Fan Inequalities
Published 2014-01-01“…As an application, we present a fixed point type algorithm inspired by a model from Tada and Takahashi (2007).…”
Get full text
Article -
13046
Hamiltonian-connected graphs and their strong closures
Published 1997-01-01“…We also give an efficient algorithm to compute the strong closure of G.…”
Get full text
Article -
13047
Downregulation of FXYD2 Is Associated with Poor Prognosis and Increased Regulatory T Cell Infiltration in Clear Cell Renal Cell Carcinoma
Published 2022-01-01“…Through the ESTIMATE algorithm, ssGSEA algorithm, CIBERSORT algorithm, TIMER database, and our laboratory experiment, FXYD2 was found to correlate with the immune landscape, especially regulatory T cells (Treg), in ccRCC. …”
Get full text
Article -
13048
Predictive Forwarding Rule Caching for Latency Reduction in Dynamic SDN
Published 2024-12-01“…This paper introduces a caching technique for forwarding rules based on predicted link states in SDN, which was named the CRIMSON (Cashing Routing Information in Mobile SDN Network) algorithm. The CRIMSON algorithm detects network link state changes caused by node mobility and caches new forwarding rules based on predicted topology changes. …”
Get full text
Article -
13049
Optimized Design of 3D Spatial Images Based on Kalman Filter Equation
Published 2021-01-01“…The algorithm takes the first row of the matrix image as the initial parameter of the Kalman filter prediction equation and then takes the first row of the recovered image as the initial parameter of the second Kalman filter prediction equation. …”
Get full text
Article -
13050
Reliability of spatial rod metal structures of high level of responsibility
Published 2024-05-01“…As a result of the research work for the considered structures, a 2-stage algorithm for assessing reliability was developed, which differs from the previously developed ones by the possibility of assessing the development of progressive collapse. …”
Get full text
Article -
13051
Penerapan Metode K-Means Berbasis Jarak untuk Deteksi Kendaraan Bergerak
Published 2022-08-01“…In this paper, the K-Means algorithm applies Euclidean distance, Manhattan distance, Canberra distance, Chebyshev distance and Braycurtis distance. …”
Get full text
Article -
13052
Implementing Two Dimensions Decentralized Carrier Phase Shift Method for Multicell Serial-Parallel Inverters
Published 2025-01-01“…This paper proposes and verifies an algorithm to ensure that the carrier phase angles of cells in the 2D structure are evenly alternating, thereby improving the algorithm to balance the alternating current between parallel branches connecting the load. …”
Get full text
Article -
13053
Bidimensionally partitioned online sequential broad learning system for large-scale data stream modeling
Published 2024-12-01“…Theoretical analyses and simulation experiments demonstrate the effectiveness and superiority of the proposed algorithm.…”
Get full text
Article -
13054
Issues of diagnostics and treatment of abdominal pain at irritable bowel syndrome at outpatient stage of the healthcare
Published 2015-12-01“…Implementation of diagnostic algorithm allows to distinguish the organic disease or to establishthe diagnosis of functional disease. …”
Get full text
Article -
13055
Enhanced photovoltaic panel diagnostics through AI integration with experimental DC to DC Buck Boost converter implementation
Published 2025-01-01“…The HHO algorithm is combined with an advanced machine learning model, XGBoost, to accurately detect faults within the PV system. …”
Get full text
Article -
13056
Analisis Seleksi Atribut Dalam Memprediksi Kegagalan Skripsi Mahasiswa Menggunakan Algoritme Naïve Bayes pada Jurusan Sistem Informasi Universitas Brawijaya
Published 2023-04-01“…One of them is the failure in completing the thesis using the naïve Bayes algorithm. The stages of this research started from data collection, data preprocessing, implementation of the Naïve Bayes algorithm, testing, and analysis of the results. …”
Get full text
Article -
13057
Research on Innovative Apple Grading Technology Driven by Intelligent Vision and Machine Learning
Published 2025-01-01“…An improved DPC-AWKNN segmentation algorithm is proposed for segmenting the apple body. …”
Get full text
Article -
13058
Three-Dimensional Inversion of Borehole-Surface Resistivity Method Based on the Unstructured Finite Element
Published 2021-01-01“…The comprehensive application of the above methods makes the 3D inversion algorithm efficient, accurate, and stable. The three-dimensional inversion test is performed on the synthetic data of multiple theoretical geoelectric models with topography (a single anomaly model under valley and a single anomaly model under mountain) to verify the effectiveness of the proposed algorithm.…”
Get full text
Article -
13059
Tangential Human Posture Recognition with Sequential Images Based on MIMO Radar
Published 2025-02-01“…First, a Constant False Alarm Rate (CFAR) algorithm is applied to locate the human target. A sliding window along the slow time axis is then utilized to divide the received signal into sequential frames. …”
Get full text
Article -
13060
All-Weather Retrieval of Total Column Water Vapor From Aura OMI Visible Observations
Published 2025-01-01“…We propose a practical machine learning-based TCWV retrieval algorithm to derive TCWV over land from OMI visible observations under all weather conditions, considering multiple dependable factors linked with OMI TCWV and air mass factor. …”
Get full text
Article