-
14601
Trajectory privacy protection mechanism of obfuscating paths based on vehicles cooperation
Published 2019-08-01“…Vehicles sent location information to third parties to obtain location-based services in the Internet of vehicles,which may lead to vehicle trajectory privacy leakage.To address the privacy problem,trajectory privacy protection mechanism of obfuscating paths based on vehicles cooperation was proposed.Firstly,after the vehicle trajectory entropy reaches the custom trajectory protection threshold,the overhead of paths confusion saves by reducing the number of vehicle paths confusion.Then,paths confusion algorithm was designed to increase chances of vehicle paths confusion at intersections,which can improve the degree of vehicle trajectory protection.Finally,the simulation experiment verified the validity and efficiency of the method from the trajectory entropy and trajectory tracking success rate.…”
Get full text
Article -
14602
Procedure for optimization calculation of structures of suspended electromagnetic separators
Published 2020-06-01“…Based on the developed optimization methodology, an algorithm for calculating optimal structures of suspended electromagnetic separators has constructed.…”
Get full text
Article -
14603
Bandwidth extension method based on nonlinear audio characteristics classification
Published 2013-08-01“…A bandwidth extension method based on audio classification was proposed.Time series of audio signals were classified into four types based on recurrence plot and recurrence quantification analysis,and the fine spectrums were recovered by taking advantage of four methods respectively.In addition,the spectrum envelope and energy gain were adjusted by Gaussian mixture model and codebook mapping on the basis of soft decision respectively.Subjective and objective testing results indicate that the proposed method has good quality compared with conventional blind bandwidth extension methods,and the performance of ITU-T G.722.1 codec with the proposed algorithm is better than that of G.722.1C codec at the same bit rate.…”
Get full text
Article -
14604
Pilot based channel estimation in amplify-and-forward MIMO relay networks
Published 2014-09-01“…A channel estimation method in two time slots for two-hop amplify-and-forward MIMO relay channels is pro-posed.An algorithm for computing the optimal pair of source pilot and relay amplify matrix is developed,which mini-mizes the mean square error of the source-to-relay channel estimation subject to both power constraints at the source and the relay.The signal matrices are decomposed into unitary components and diagonal components.Then the bisection method is used to obtain the optimal diagonal components of the source pilot and the relay amplified matrix.The simula-tion results show that the proposed method has no ambiguity in the channel estimates.The effects of the channel correla-tion and the number of antennas on the performance of channel estimation are also analyed.…”
Get full text
Article -
14605
Measurement study on abnormal changes in authoritative resource records of government and educational domains
Published 2024-11-01“…The system actively captured and continuously monitored 7.5 million important domains globally. An algorithm was developed to filter abnormal changes in resource records, identifying abnormal changes in 896 significant domains within a one-month analysis period. …”
Get full text
Article -
14606
Application of Constrained Robust Independent Component Analysis in the Fault Diagnosis of Rolling Element Bearing
Published 2015-01-01“…The method of independent component analysis is widely used in mechanical equipment fault diagnosis domain.A novel method named as constrained robust independent component analysis( cRobust ICA)based on Robust ICA algorithm is proposed which utilized prior information about the fault characteristic frequency.Firstly,how to create the reference signal is discussed.Then,the measurement function between reference signal and desired independent component( IC) is defined.At last,an enhanced contrast function is acquired by modifying a generally used kurtosis contrast function with closeness measurement.A contrastive study on the conventional Fast ICA is adopted to demonstrate the effectiveness and accuracy of the cRobust ICA by numerical simulations and experiments.…”
Get full text
Article -
14607
Early-warning schemes for alarm mutation in networks based on control chart
Published 2016-03-01“…The amount of various network elements and alarms trigged is pretty startling with the expansion of the network.The traditional network operation and maintenance,that is,passively processed worksheet after the occurrence of network failure one by one,has been unable to adapt to the complex network management today.The various types of important service-related network alarm titles were sorted out,and the fluctuation under control for kinds of important alarms by control chart,establishes the graded early-warning model and algorithm for alarm mutation in networks combining with the service-related analysis,were analyzed.At last,a dynamic closed-loop control mechanism,which was preceded by fault occurred and actively digs into hidden troubles,was proposed.…”
Get full text
Article -
14608
A Population-Based Optimization Method Using Newton Fractal
Published 2019-01-01“…We propose a deterministic population-based method for a global optimization, a Newton particle optimizer (NPO). The algorithm uses the Newton method with a guiding function and drives particles toward the current best positions. …”
Get full text
Article -
14609
Structure Design and Finite Element Analysis of a Rope Traction Upper Limb Rehabilitation Robot
Published 2018-01-01“…To ensure the safety and stability of the rehabilitation robot,the static strength analysis and modal analysis of the structure of the upper limb rehabilitative robot is carried out by using ANSYS Workbench.Moreover,the multi-objective genetic algorithm is applied to the lightweight optimization design of the support frame. …”
Get full text
Article -
14610
Coupled bidirectional flow for adaptive image interpolation
Published 2007-01-01“…An adaptive coupled bidirectional flow process was presenfed,where an inverse diffusion was performed to enhance edges along the normal directions to the isophote lines(edges),while a normal diffusion was done to remove ar-tifacts(“jaggies”) along the tangent directions.The two converse diffusion forces were splitted into a coupled form to stop the cancellation between each other.In order to preserve image features,the nonlinear diffusion coefficients were locally adjusted according to the directional derivatives of the image.And then the above process was applied to image interpolation.Experimental results demonstrate that our interpolation algorithm substantially improves the subjective quality of the interpolated images over conventional interpolations and relative equations.…”
Get full text
Article -
14611
Homology analysis of malware based on graph
Published 2017-11-01“…Malware detection and homology analysis has been the hotspot of malware analysis.API call graph of malware can represent the behavior of it.Because of the subgraph isomorphism algorithm has high complexity,the analysis of malware based on the graph structure with low efficiency.Therefore,this studies a homology analysis method of API graph of malware that use convolutional neural network.By selecting the key nodes,and construct neighborhood receptive field,the convolution neural network can handle graph structure data.Experimental results on 8 real-world malware family,shows that the accuracy rate of homology malware analysis achieves 93%,and the accuracy rate of the detection of malicious code to 96%.…”
Get full text
Article -
14612
Strong Convergence Theorems for Zeros of Bounded Maximal Monotone Nonlinear Operators
Published 2012-01-01“…The iteration process does not involve the computation of the resolvent at any step of the process and does not involve the projection of an initial vector onto the intersection of two convex subsets of E, setbacks associated with the classical proximal point algorithm of Martinet 1970, Rockafellar 1976 and its modifications by various authors for approximating of a solution of this equation. …”
Get full text
Article -
14613
Integrated Project Scheduling and Staff Assignment with Controllable Processing Times
Published 2014-01-01“…Due to the complexity of the integrated model, a simple GRASP algorithm is implemented in order to obtain good, approximate solutions in short computation times.…”
Get full text
Article -
14614
Sleep Disruption and Proprioceptive Delirium due to Acetaminophen in a Pediatric Patient
Published 2013-01-01“…Potential alternative explanations were excluded, and analysis with the Naranjo algorithm indicated a “probable” relationship between acetaminophen and this adverse reaction. …”
Get full text
Article -
14615
Adaptive Fuzzy PID Control System for Satellite Earth Station Antenna Group Factor Based on Edge Calculation
Published 2023-03-01“…The antenna tracking control system of satellite ground receiving station generally adopts PID control.Due to the infl uence of various uncertain factors, it is diffi cult to obtain the optimal control parameters for this kind of system, resulting in the PID control eff ect is not ideal.An adaptive fuzzy PID antenna tracking control system based on edge computing was designed.The parameters of PID controller were adjusted in time by fuzzy control algorithm, and the optimal calculation of fuzzy control input and output domain was realized in edge computing server.The simulation results showed that the adaptive fuzzy PID antenna tracking control system based on edge calculation could achieve good control eff ect.…”
Get full text
Article -
14616
Performance Analysis for Cooperative Communication System with QC-LDPC Codes Constructed with Integer Sequences
Published 2015-01-01“…Four different integer sequences constructing QC-LDPC code are compared with LDPC codes by using PEG algorithm, array codes, and the Mackey codes, respectively. …”
Get full text
Article -
14617
Location privacy preserving scheme against attack from friends in SNS
Published 2016-10-01“…In order to enrich the performance of the user's location information and to meet the diverse needs of users,a location privacy protection scheme based on attribute encryption was designed,which provided precise,more accurate,fuzzy and private four modes to manage the location information.The scheme was based on the algorithm of WT-CP-ABE.The location information was divided into three parts according to a close friend of grade,then the key infor-mation and position information was encrypted with attribute-based encryption and symmetric encryption method respec-tively and the ciphertext was published to the social network.The security of the scheme is analyzed,which shows that the scheme has the advantage of user attribute information confidentiality,data confidentiality and can resist the collusion attack.…”
Get full text
Article -
14618
Novel construction of forward-secure public-key encryption in the standard model
Published 2014-02-01“…In the proposed scheme, the running time of decryption algorithm and the size of ciphertext are both independent on the total number of the time periods. …”
Get full text
Article -
14619
Mechanism for green unicast routing protection in multi-granularity transport networks
Published 2014-10-01“…The mechanism for green unicast routing protection is designed with the constraint of quality of service (QoS),energy consumption and the survivability of single link or node failure considered.The path is calculated under the constraint of QoS based on K-shortest path algorithm.The resource allocation is done on multi-layer auxiliary graph considering the minimum times of wavelength conversion.Three protection levels are provided according to the service demands.The mechanism is implemented over EON (Europe optical network) topology by simulation.Performance evaluation has been done on the blocking probability,the protecting/working resource ratio and the load balance degree by comparing with certain existent mechanism.It has been shown that the proposed mechanism is both feasible and effective.…”
Get full text
Article -
14620
Dynamic Combined-Mode Traffic Network Model considering Transfer Behaviors
Published 2020-01-01“…Finally, a numerical example is given to illustrate the effectiveness of the proposed heuristic algorithm and model.…”
Get full text
Article