Showing 14,601 - 14,620 results of 19,511 for search '"algorithms"', query time: 0.08s Refine Results
  1. 14601

    Trajectory privacy protection mechanism of obfuscating paths based on vehicles cooperation by Ziwen ZHAO, Ayong YE, Junlin JIN, Lingyu MENG

    Published 2019-08-01
    “…Vehicles sent location information to third parties to obtain location-based services in the Internet of vehicles,which may lead to vehicle trajectory privacy leakage.To address the privacy problem,trajectory privacy protection mechanism of obfuscating paths based on vehicles cooperation was proposed.Firstly,after the vehicle trajectory entropy reaches the custom trajectory protection threshold,the overhead of paths confusion saves by reducing the number of vehicle paths confusion.Then,paths confusion algorithm was designed to increase chances of vehicle paths confusion at intersections,which can improve the degree of vehicle trajectory protection.Finally,the simulation experiment verified the validity and efficiency of the method from the trajectory entropy and trajectory tracking success rate.…”
    Get full text
    Article
  2. 14602

    Procedure for optimization calculation of structures of suspended electromagnetic separators by G. A. Koschuk, K. I. Nikitin, A. S. Tatevosyan, N. A. Tereshchenko

    Published 2020-06-01
    “…Based on the developed optimization methodology, an algorithm for calculating optimal structures of suspended electromagnetic separators has constructed.…”
    Get full text
    Article
  3. 14603

    Bandwidth extension method based on nonlinear audio characteristics classification by Li-yan ZHANG, Chang-chun BAO, Xin LIU, Xing-tao ZHANG

    Published 2013-08-01
    “…A bandwidth extension method based on audio classification was proposed.Time series of audio signals were classified into four types based on recurrence plot and recurrence quantification analysis,and the fine spectrums were recovered by taking advantage of four methods respectively.In addition,the spectrum envelope and energy gain were adjusted by Gaussian mixture model and codebook mapping on the basis of soft decision respectively.Subjective and objective testing results indicate that the proposed method has good quality compared with conventional blind bandwidth extension methods,and the performance of ITU-T G.722.1 codec with the proposed algorithm is better than that of G.722.1C codec at the same bit rate.…”
    Get full text
    Article
  4. 14604

    Pilot based channel estimation in amplify-and-forward MIMO relay networks by Jian ZHOU, Bao-yu ZHENG

    Published 2014-09-01
    “…A channel estimation method in two time slots for two-hop amplify-and-forward MIMO relay channels is pro-posed.An algorithm for computing the optimal pair of source pilot and relay amplify matrix is developed,which mini-mizes the mean square error of the source-to-relay channel estimation subject to both power constraints at the source and the relay.The signal matrices are decomposed into unitary components and diagonal components.Then the bisection method is used to obtain the optimal diagonal components of the source pilot and the relay amplified matrix.The simula-tion results show that the proposed method has no ambiguity in the channel estimates.The effects of the channel correla-tion and the number of antennas on the performance of channel estimation are also analyed.…”
    Get full text
    Article
  5. 14605

    Measurement study on abnormal changes in authoritative resource records of government and educational domains by SUN Junzhe, LU Chaoyi, LIU Baojun, DUAN Haixin, SUN Donghong

    Published 2024-11-01
    “…The system actively captured and continuously monitored 7.5 million important domains globally. An algorithm was developed to filter abnormal changes in resource records, identifying abnormal changes in 896 significant domains within a one-month analysis period. …”
    Get full text
    Article
  6. 14606

    Application of Constrained Robust Independent Component Analysis in the Fault Diagnosis of Rolling Element Bearing by Liao Qiang, Li Xunbo, Huang Bo

    Published 2015-01-01
    “…The method of independent component analysis is widely used in mechanical equipment fault diagnosis domain.A novel method named as constrained robust independent component analysis( cRobust ICA)based on Robust ICA algorithm is proposed which utilized prior information about the fault characteristic frequency.Firstly,how to create the reference signal is discussed.Then,the measurement function between reference signal and desired independent component( IC) is defined.At last,an enhanced contrast function is acquired by modifying a generally used kurtosis contrast function with closeness measurement.A contrastive study on the conventional Fast ICA is adopted to demonstrate the effectiveness and accuracy of the cRobust ICA by numerical simulations and experiments.…”
    Get full text
    Article
  7. 14607

    Early-warning schemes for alarm mutation in networks based on control chart by Xing SU, Lu ZHANG

    Published 2016-03-01
    “…The amount of various network elements and alarms trigged is pretty startling with the expansion of the network.The traditional network operation and maintenance,that is,passively processed worksheet after the occurrence of network failure one by one,has been unable to adapt to the complex network management today.The various types of important service-related network alarm titles were sorted out,and the fluctuation under control for kinds of important alarms by control chart,establishes the graded early-warning model and algorithm for alarm mutation in networks combining with the service-related analysis,were analyzed.At last,a dynamic closed-loop control mechanism,which was preceded by fault occurred and actively digs into hidden troubles,was proposed.…”
    Get full text
    Article
  8. 14608

    A Population-Based Optimization Method Using Newton Fractal by Soyeong Jeong, Pilwon Kim

    Published 2019-01-01
    “…We propose a deterministic population-based method for a global optimization, a Newton particle optimizer (NPO). The algorithm uses the Newton method with a guiding function and drives particles toward the current best positions. …”
    Get full text
    Article
  9. 14609

    Structure Design and Finite Element Analysis of a Rope Traction Upper Limb Rehabilitation Robot by Yu Junwei, Xu Hongbin, Xu Taojin, Zheng Chengjie, Lu Shiqing

    Published 2018-01-01
    “…To ensure the safety and stability of the rehabilitation robot,the static strength analysis and modal analysis of the structure of the upper limb rehabilitative robot is carried out by using ANSYS Workbench.Moreover,the multi-objective genetic algorithm is applied to the lightweight optimization design of the support frame. …”
    Get full text
    Article
  10. 14610

    Coupled bidirectional flow for adaptive image interpolation by FU Shu-jun 1, RUAN Qiu-qi 2, MU Cheng-po 3, WANG Wen-qia 1

    Published 2007-01-01
    “…An adaptive coupled bidirectional flow process was presenfed,where an inverse diffusion was performed to enhance edges along the normal directions to the isophote lines(edges),while a normal diffusion was done to remove ar-tifacts(“jaggies”) along the tangent directions.The two converse diffusion forces were splitted into a coupled form to stop the cancellation between each other.In order to preserve image features,the nonlinear diffusion coefficients were locally adjusted according to the directional derivatives of the image.And then the above process was applied to image interpolation.Experimental results demonstrate that our interpolation algorithm substantially improves the subjective quality of the interpolated images over conventional interpolations and relative equations.…”
    Get full text
    Article
  11. 14611

    Homology analysis of malware based on graph by Bing-lin ZHAO, Xi MENG, Jin HAN, Jing WANG, Fu-dong LIU

    Published 2017-11-01
    “…Malware detection and homology analysis has been the hotspot of malware analysis.API call graph of malware can represent the behavior of it.Because of the subgraph isomorphism algorithm has high complexity,the analysis of malware based on the graph structure with low efficiency.Therefore,this studies a homology analysis method of API graph of malware that use convolutional neural network.By selecting the key nodes,and construct neighborhood receptive field,the convolution neural network can handle graph structure data.Experimental results on 8 real-world malware family,shows that the accuracy rate of homology malware analysis achieves 93%,and the accuracy rate of the detection of malicious code to 96%.…”
    Get full text
    Article
  12. 14612

    Strong Convergence Theorems for Zeros of Bounded Maximal Monotone Nonlinear Operators by C. E. Chidume, N. Djitté

    Published 2012-01-01
    “…The iteration process does not involve the computation of the resolvent at any step of the process and does not involve the projection of an initial vector onto the intersection of two convex subsets of E, setbacks associated with the classical proximal point algorithm of Martinet 1970, Rockafellar 1976 and its modifications by various authors for approximating of a solution of this equation. …”
    Get full text
    Article
  13. 14613

    Integrated Project Scheduling and Staff Assignment with Controllable Processing Times by Victor Fernandez-Viagas, Jose M. Framinan

    Published 2014-01-01
    “…Due to the complexity of the integrated model, a simple GRASP algorithm is implemented in order to obtain good, approximate solutions in short computation times.…”
    Get full text
    Article
  14. 14614

    Sleep Disruption and Proprioceptive Delirium due to Acetaminophen in a Pediatric Patient by Carla Carnovale, Marco Pozzi, Andrea Angelo Nisic, Elisa Scrofani, Valentina Perrone, Stefania Antoniazzi, Emilio Clementi, Sonia Radice

    Published 2013-01-01
    “…Potential alternative explanations were excluded, and analysis with the Naranjo algorithm indicated a “probable” relationship between acetaminophen and this adverse reaction. …”
    Get full text
    Article
  15. 14615

    Adaptive Fuzzy PID Control System for Satellite Earth Station Antenna Group Factor Based on Edge Calculation by Haibin SHAN, Yanjun SHI, Zijing LIU, Yuanhong LI, Wenhua ZHAO, Muquan HE, Chuzhou LI

    Published 2023-03-01
    “…The antenna tracking control system of satellite ground receiving station generally adopts PID control.Due to the infl uence of various uncertain factors, it is diffi cult to obtain the optimal control parameters for this kind of system, resulting in the PID control eff ect is not ideal.An adaptive fuzzy PID antenna tracking control system based on edge computing was designed.The parameters of PID controller were adjusted in time by fuzzy control algorithm, and the optimal calculation of fuzzy control input and output domain was realized in edge computing server.The simulation results showed that the adaptive fuzzy PID antenna tracking control system based on edge calculation could achieve good control eff ect.…”
    Get full text
    Article
  16. 14616

    Performance Analysis for Cooperative Communication System with QC-LDPC Codes Constructed with Integer Sequences by Yan Zhang, Feng-fan Yang, Weijun Song

    Published 2015-01-01
    “…Four different integer sequences constructing QC-LDPC code are compared with LDPC codes by using PEG algorithm, array codes, and the Mackey codes, respectively. …”
    Get full text
    Article
  17. 14617

    Location privacy preserving scheme against attack from friends in SNS by Xi LIN, Yi-liang HAN, Yan KE, Xiao-yuan YANG

    Published 2016-10-01
    “…In order to enrich the performance of the user's location information and to meet the diverse needs of users,a location privacy protection scheme based on attribute encryption was designed,which provided precise,more accurate,fuzzy and private four modes to manage the location information.The scheme was based on the algorithm of WT-CP-ABE.The location information was divided into three parts according to a close friend of grade,then the key infor-mation and position information was encrypted with attribute-based encryption and symmetric encryption method respec-tively and the ciphertext was published to the social network.The security of the scheme is analyzed,which shows that the scheme has the advantage of user attribute information confidentiality,data confidentiality and can resist the collusion attack.…”
    Get full text
    Article
  18. 14618

    Novel construction of forward-secure public-key encryption in the standard model by Yang LU, Ji-guo LI

    Published 2014-02-01
    “…In the proposed scheme, the running time of decryption algorithm and the size of ciphertext are both independent on the total number of the time periods. …”
    Get full text
    Article
  19. 14619

    Mechanism for green unicast routing protection in multi-granularity transport networks by Jun-ling SHI, Xing-wei WANG, Min HUANG

    Published 2014-10-01
    “…The mechanism for green unicast routing protection is designed with the constraint of quality of service (QoS),energy consumption and the survivability of single link or node failure considered.The path is calculated under the constraint of QoS based on K-shortest path algorithm.The resource allocation is done on multi-layer auxiliary graph considering the minimum times of wavelength conversion.Three protection levels are provided according to the service demands.The mechanism is implemented over EON (Europe optical network) topology by simulation.Performance evaluation has been done on the blocking probability,the protecting/working resource ratio and the load balance degree by comparing with certain existent mechanism.It has been shown that the proposed mechanism is both feasible and effective.…”
    Get full text
    Article
  20. 14620

    Dynamic Combined-Mode Traffic Network Model considering Transfer Behaviors by ShuGuang Li, QingHua Zhou

    Published 2020-01-01
    “…Finally, a numerical example is given to illustrate the effectiveness of the proposed heuristic algorithm and model.…”
    Get full text
    Article