Showing 14,721 - 14,740 results of 19,511 for search '"algorithms"', query time: 0.10s Refine Results
  1. 14721

    Hadoop cloud platform user dynamic access control model by Hong-yu YANG, Ling-xian MENG

    Published 2017-09-01
    “…In order to solve the problem that Hadoop cloud platform could not dynamically control user access request,a Hadoop cloud dynamic access control model based on user behavior assessment (DACUBA) was proposed.The model first collected the user instruction sequence in real time and the user behavior contour was obtained by parallel command sequence learning (PCSL).Then the global K model was established by using the forward profile,the subsequent sequence was classified and the classification results were evaluated.The evaluation results were combined with the improved Hadoop access control mechanism to make the cloud platform users’ access rights change dynamically with their own behaviors.Experimental results demonstrate that the model algorithm is effective and the dynamic access control mechanism is feasible.…”
    Get full text
    Article
  2. 14722

    Attribute-based revocable collaborative access control scheme by Changgen PENG, Zongfeng PENG, Hongfa DING, Youliang TIAN, Rongfei LIU

    Published 2021-05-01
    “…To solve the dynamic update of access rights in attribute-based collaborative access control, a novel scheme was proposed with the revocation of attribute, user and collaborative policy.A formal definition and a security model were presented, the group-based attribute group were changed to reflect the update of rights, and further, an efficient re-encryption algorithm was used to realize the immediate revocation of attributes and users.The translation value was used to achieve the revocation of collaborative policy by update corresponding ciphertext.The security analysis shows the scheme can guarantee data confidentiality, forward/backward security, and resist collusion attack under chosen plaintext attack.Compared with the related works, the proposal achieved more complete and efficient revocation scheme.…”
    Get full text
    Article
  3. 14723

    Breaking novel and lightweight digital <sub>s</sub> ignature scheme by Chun-sheng GU

    Published 2013-07-01
    “…In order to design a scheme for small computing devices with limited computing capacity, Wang et al. proposed a novel lightweight digital signature scheme based on the hash authentication technology. A polynomial time algorithm, which found an equivalent signing secret key from the public key, was presented or this novel lightweight digital signature scheme. …”
    Get full text
    Article
  4. 14724

    Adaptive-clustered image-block hierarchical DCT hybrid digital-analog wireless transmission method by Shu TANG, Peng YANG, Xianzhong XIE, Guangyi ZHOU, Jiaqing LI, Yu ZHAO

    Published 2024-01-01
    “…In order to achieve high quality image transmission, a novel hybrid digital-analog (HDA) wireless transmission method was proposed.Firstly, the image residual layer was constructed by subtracting the downsampled and upsampled images from the original image respectively.Secondly, an adaptive-clustered block-level discrete cosine transform (DCT) algorithm was proposed to efficiently remove the correlation between image pixels in the residual layer.Finally, an image block level-based unequal power allocation strategy for further boosting the quality of received images was proposed.Extensive experiments results demonstrate that the proposed method is significantly superior to existing successful hybrid digital analog image wireless transmission methods in both qualitative evaluation and quantitative measurement.…”
    Get full text
    Article
  5. 14725

    Message forwarding based on periodically evolving social characteristics in opportunistic mobile networks by Yong-feng HUANG, Yong-qiang DONG, San-feng ZHANG, Guo-xin WU

    Published 2015-03-01
    “…Moreover, a social-aware routing algorithm, PerEvo, was then designed based on them. …”
    Get full text
    Article
  6. 14726

    Optimization of the Forcing Term for the Solution of Two-Point Boundary Value Problems by Gianni Arioli

    Published 2013-01-01
    “…We provide an application of this algorithm to the planar restricted three body problem in order to study the planning of low-thrust transfer orbits.…”
    Get full text
    Article
  7. 14727

    Parametric Variant Design of Reducer based on Case Based Reasoning by Zhuang Qianyu, Wang Zongyan, Qin Huibin, Dong Hao, Yan Shuai

    Published 2016-01-01
    “…A reducer 3D design system is developed by taking Solid Works as a development platform and VB as the development tool,combining the key technology of three dimensional modeling method that combine the feature modeling and parametric design,the nearest neighbor algorithm for computing similarity,and the parametric variant design based on layout sketch.The automatic retrieval,design calculation,model- driven and plot for the reducer is realized,it provides an effective way for the fast intelligent design of the reducer.…”
    Get full text
    Article
  8. 14728

    A novel fuzzy vault scheme based on the feature level fusion of fingerprint and face features by Xun LI, Lin YOU, Jiahao LIANG, Chunhui YAN

    Published 2018-10-01
    “…Aiming at the problem that the biometric feature-based fuzzy vault is vulnerable to correlation attack and the loss of key and biometric template,and the authentication performance of fuzzy vault based on single biometric feature is unreliable,a novel fuzzy vault scheme based on the feature level fusion of fingerprint and face features was proposed.This scheme carried out irreversible transformation of fingerprint features and face features,and based on the Diffie-Hellman algorithm,the transformed fingerprints and face features were fused into a template at the feature level.Finally,the fusion template was used to construct the fuzzy vault.By updating the random matrix,the vault could be revoked,which could effectively resist the correlation attacks and achieve reliable authentication.Experimental results show that the proposed scheme improves the reliability of the system and the security of multiple biometric templates.…”
    Get full text
    Article
  9. 14729

    Compressive sensing based channel estimation for NC-OFDM systems in cognitive radio context by Xue-yun HE, Rong-fang SONG, Ke-qin ZHOU

    Published 2011-11-01
    “…A new channel estimation based on compressive sensing(CS)in non-contiguous orthogonal frequency division multiplexing(NC-OFDM)system was proposed.As for NC-OFDM systems in cognitive radio context,the infrastructure of CS-based channel estimation,the design of pilot patterns and the algorithm of channel estimation were explored.Especially,a criterion of optimizing pilot pattern in the CS-based channel estimation was proposed by minimizing the mutual coherence of the measurement matrix in CS theory.Simulations show that,under many patterns of deactivated subcarriers,CS-based channel estimation obtains much better performance than existing NC-OFDM channel estimation methods in terms of the mean square error of the channel estimate as well as the bit error rate of the system.…”
    Get full text
    Article
  10. 14730

    Physics-guided actor-critic reinforcement learning for swimming in turbulence by Christopher Koh, Laurent Pagnier, Michael Chertkov

    Published 2025-01-01
    “…Our scheme, coined the actor-physicist, is an adaptation of the actor-critic algorithm in which the neural network parameterized critic is replaced with an analytically derived physical heuristic function, the physicist. …”
    Get full text
    Article
  11. 14731

    AONT-and-NTRU-based rekeying scheme for encrypted deduplication by Chunfu JIA, Guanxiong HA, Shaoqiang WU, Hang CHEN, Ruiqi LI

    Published 2021-10-01
    “…Rekeying is a good way to protect against key exposure.Most of the existing encrypted deduplication systems are implemented based on message-locked-encryption, in which multiple users with the identical data share the same encryption key.When a user updates keys, that update must be followed by all other data owners, which will incur large computational and communicational overheads.To solve this problem, an AONT-and-NTRU-based rekeying scheme was proposed, a variant of AONT was designed to solve the synchronization problem of multi-user rekeying, and a proxy re-encryption algorithm based on NTRU was introduced to reduce the communicational overhead for the system and computational overhead for clients during rekeying.The efficiency analysis and experimental results show that the proposed scheme has better encryption and decryption efficiency than existing schemes and the time cost of rekeying is significantly reduced.…”
    Get full text
    Article
  12. 14732

    Research on active defense based on multi-stage cyber deception game by Yongjin HU, Jun MA, Yuanbo GUO, Han ZHANG

    Published 2020-08-01
    “…In view of the characteristic that attacker depended on the detected information to decide the next actions,the non-cooperative signal game theory was applied to analyze cyber attack and defense.The signal deception mechanism in the process of cyber attack and defense was considered deeply by constructing a multi-stage cyber deception game model,and the dynamic analysis and deduction of the multi-stage cyber attack and defense was realized by considering the attenuation of cyber deception signals.A solution for multi-stage cyber deception game equilibrium was improved based on analysis of cyber attack and defense,and an optimal algorithm for selecting cyber deception defense strategies was designed.The effectiveness of the model is verified by simulations.The rules of multi-stage cyber deception games are summarized based on the results,which can provide effective guidance for the research on cyber active defense.…”
    Get full text
    Article
  13. 14733

    Dynamic P2P trust model based on context factors by Yi-chun LIU, Ying-hong LIANG

    Published 2016-08-01
    “…A multi-dimensional trust model was constructed based on the context factors.The direct trust of the interac-tive entities was estimated by integrating the time-decay factor,the transaction impact factor and the participation fre-quency.The trust similarity algorithm was designed based on the Dice similarity and the feedback credibility was aggre-gated from multiple trust chains.The direct interaction,the evaluation similarity and the trust chain was integrated for calculating the recommendation trust.The peer's trust was evaluated by combing the direct trust and the recommendation trust.A new mechanisam was proposed for the trust's update,incentive or punishment according to the peer's behavior on the interaction.The practical example analysis shows that the proposed model can effectively explain the effect of the transaction contextual factors on the entity trust,and can improve the trust sensitivity to the context transaction factors.…”
    Get full text
    Article
  14. 14734

    Music Emotion Research Based on Reinforcement Learning and Multimodal Information by Yue Hu

    Published 2022-01-01
    “…In this paper, a multimodal fusion algorithm for music emotion analysis is proposed, and a dynamic model based on reinforcement learning is constructed to improve the analysis accuracy. …”
    Get full text
    Article
  15. 14735

    Dynamics of substrate resource selection in network virtualization environment——an evolutionary game approach by Yu YANG, Shan-zhi CHEN, Xin LI

    Published 2012-11-01
    “…The substrate network path selection problem of virtual network was modeled as an evolutionary game.In the process of evolutionary game,virtual networks adjusted the strategies through the iterated game.The replicator dynamics were leveraged equation to analyze the dynamic variation of strategies selection and demonstrates that this dynamics equation is the admissible dynamic to the evolutionary game.The potential game theory was used to analyze the evolutionary process and demonstrates the evolutionary result will converge to the evolutionary equilibrium.At the evolutionary equilibrium,all the virtual networks could get the best selection strategies.Finally,an evolutionary algorithm based on replicator dynamics was proposed.The experiments simulate the process of virtual network selecting the substrate paths in different initial state and reach the evolutionary equilibrium.Simulation results are coincided with the theoretical analysis results.…”
    Get full text
    Article
  16. 14736

    Non-invasive eye tracking technology based on corneal reflex by Di GAO, Gui-sheng YIN, Chun-guang MA

    Published 2012-12-01
    “…For the deficiencies that existing eye tracking devices are complex,have too many restrictions on the position,need to wear special equipment.A novel method of eye tracking technology using the five near-infrared light as the source of corneal reflex was put forward.This method did not need any wearing equipment,and could adapt to the natural head movement,the algorithm designed calculates the position of sight in high accuracy.A novel method of pupil edge fitting was put forward:fitted circularly and removed false points to get accurate position of pupil center,improved mapping accuracy.Used the GrayScale of image to initialize eye position quickly and accurately.Using the theory of cross-ratio invariance to make coordinate mapping,finally calculated the attention coordinate accurately.…”
    Get full text
    Article
  17. 14737

    Intelligent adaptive edge systems:exploration and open issues by Xu WANG, Nanxi CHEN, Roujia ZHANG

    Published 2021-03-01
    “…Edge intelligence has emerged as a promising trend of the new generation of Internet of things.Edge computing devices are widely distributed, with various diverse end devices and services, delay sensitive, and serve mobile terminals.Therefore, the edge system needs to provide flexible, diverse, reconfigurable and scalable services.From the application fields of adaptive edge computing, the application requirements of intelligent adaptive edge systems were explored, the existing adaptive edge systems and their basic framework were analyzed and summarized, and the application of artificial intelligence technologies was discussed, such as deep learning and reinforcement learning.Then, how to design a special intelligent algorithm in specific application fields was introduced.Finally, the research status and future challenges in this field were discussed.…”
    Get full text
    Article
  18. 14738

    Economic Development Trend Prediction Model Based on Unsupervised Learning in the Internet of Things Environment by Min Kuang

    Published 2021-01-01
    “…In order to explore the economic development trend under the environment of the Internet of Things, this paper improves the chaotic algorithm of the Internet of Things and constructs an economic development trend analysis system based on big data technology. …”
    Get full text
    Article
  19. 14739

    Modified Newtonian Dynamics: A Falsification of Cold Dark Matter by R. H. Sanders

    Published 2009-01-01
    “…MOND may be viewed as an algorithm for calculating the distribution of force in an astronomical object from the observed distribution of baryonic matter. …”
    Get full text
    Article
  20. 14740

    Health Promotion Effects of Sports Training Based on HMM Theory and Big Data by Haiyan Song, Yao Ma, Hongwei Chen

    Published 2022-01-01
    “…Firstly, the characteristic information of human health status after sports training is collected based on big data technology, and the evaluation index and evaluation algorithm of human health status after sports training are constructed. …”
    Get full text
    Article