Showing 14,821 - 14,840 results of 19,511 for search '"algorithms"', query time: 0.10s Refine Results
  1. 14821

    Low-latency networking:architecture,key scenarios and research prospect by Xutong ZUO, Mowei WANG, Yong CUI

    Published 2019-08-01
    “…With the advent of delay-sensitive applications and ultra-low latency scenarios,research on low-latency networking is attracting attention from academia,industry,and standards organizations.Understanding the causes of latency and designing corresponding techniques to reduce latency enable the development of emerging applications.The sources of latency according to the layered architecture of the network was analyzed,and summarizes the techniques for reducing the latency.After that,three typical low-latency key scenarios and delay optimization techniques for data center network,5G and edge computing was analyzed.Finally,the opportunities and challenges that may be encountered in the development of low latency networks were presented from the perspectives of network architecture innovation,data-driven latency optimization algorithm and the design of new protocols.…”
    Get full text
    Article
  2. 14822

    A distributed expectation maximization-principal component analysis monitoring scheme for the large-scale industrial process with incomplete information by Xuanyue Wang, Xu Yang, Jian Huang, Xianzhong Chen

    Published 2019-11-01
    “…Then, the missing information of variables is estimated by expectation maximization algorithm in the principal component analysis framework, then the expectation maximization-principal component analysis method is applied for fault detection to each sub-block. …”
    Get full text
    Article
  3. 14823

    Measurement Feedback Self-Tuning Weighted Measurement Fusion Kalman Filter for Systems with Correlated Noises by Xin Wang, Shu-Li Sun

    Published 2012-01-01
    “…The simulation result of radar-tracking system shows the effectiveness of the presented algorithm.…”
    Get full text
    Article
  4. 14824

    Distributed Filter with Consensus Strategies for Sensor Networks by Xie Li, Huang Caimou, Hu Haoji

    Published 2013-01-01
    “…Consensus algorithm for networked dynamic systems is an important research problem for data fusion in sensor networks. …”
    Get full text
    Article
  5. 14825

    A method for synthetic speech detection using local phase quantization by Jia XU, Zhihua JIAN, Honghui JIN, Man YANG

    Published 2024-02-01
    “…Due to the convenience of speech synthesis, synthesized disguised speech poses a great threat to the security of speaker verification systems.In order to further enhance the ability of detecting the camouflage to the speaker verification system, a method of synthetic speech detection was put forward using the information in spectral domain of the synthetic speech spectrogram.The method employed the local phase quantization (LPQ) algorithm to describe frequency domain information in the speech spectrogram.Firstly, the spectrogram was divided into several sub-blocks, and then the LPQ was performed on each sub-block.After the histogram statistical analysis, the LPQ feature vector was obtained and used as the input feature of the random forest classifier to realize the synthetic speech detection.The experimental results demonstrate that the proposed method further reduces tandem detection cost function (t-DCF) and has better generalization ability.…”
    Get full text
    Article
  6. 14826

    基于改进Kriging模型的主动学习可靠性分析方法 by 陈哲, 杨旭锋, 程鑫

    Published 2021-01-01
    “…,the differential evolution algorithm is introduced to explore the optimal parameter of Kriging model and improve the accuracy of Kriging prediction information.As a result,the training point in each iteration is guaranteed to be the global optimal one and the efficiency of ALK model is largely improved.…”
    Get full text
    Article
  7. 14827

    The municipalities’ environmental situation assessment as a basis for customizing strategies by P. S. Trifonova

    Published 2022-12-01
    “…The article presents the author’s approach to assessing the tension of the ecological situation of the territories, which makes it possible to identify the most acute environmental problems. A multi-stage algorithm for calculating a complex and integral indicator of the intensity of the ecological situation of territories is proposed. …”
    Get full text
    Article
  8. 14828

    Vector Bond Graph Method of Kineto- static Analysis for 3SPS + 1PS Paralell Robot by Wang Zhongshuang, Tao Yangyang, Liu Shang, Chen Ji

    Published 2015-01-01
    “…By the corresponding algorithm,the automatic modeling and kineto- static analysis of 3PS + 1PS parallel robot system on a computer is realized,its validity is illustrated.…”
    Get full text
    Article
  9. 14829

    Power Performance Simulation and analysis for PMSM Electric Vehicle based on Space Vector and Sliding Mode Variable Structure by Deng Tao, Li Junying, Luo Junlin, Wang Mingming

    Published 2017-01-01
    “…To study the power performance of electric vehicle with permanent magnet synchronous motor( PMSM),the integrated control algorithm based on the space vector and sliding mode variable structure is proposed. …”
    Get full text
    Article
  10. 14830

    Path Planning for Spider Biomimetic Robot Leg based on Cubic Polynomial Interpolation Function with Midpoints by Luo Tianhong, Ma Li

    Published 2017-01-01
    “…Based on Monte-Carlo method,the working space of the foot end is analyzed,and based on the cubic polynomial interpolation algorithm with midpoints for path planning of obstacle avoidance is simulated. …”
    Get full text
    Article
  11. 14831

    Face Recognition Method Based on Fuzzy 2DPCA by Xiaodong Li

    Published 2014-01-01
    “…In order to improve the recognition performance of the traditional 2DPCA, a new 2DPCA algorithm based on the fuzzy theory is proposed in this paper, namely, the fuzzy 2DPCA (F2DPCA). …”
    Get full text
    Article
  12. 14832

    Abel–Goncharov Type Multiquadric Quasi-Interpolation Operators with Higher Approximation Order by Ruifeng Wu

    Published 2021-01-01
    “…Furthermore, the advantage of our method is that the associated algorithm is very simple and easy to implement.…”
    Get full text
    Article
  13. 14833

    On escape criterion of an orbit with s-convexity and illustrations of the behavior shifts in Mandelbrot and Julia set fractals. by Khairul Habib Alam, Yumnam Rohen, Naeem Saleem, Maggie Aphane, Asima Razzaque

    Published 2025-01-01
    “…We also demonstrate the impact of the parameters on the formatted fractals with numerical examples and graphical illustrations using the MATHEMATICA software, algorithm, and colormap. Moreover, we observe that the Julia set appears when we widen the Mandelbrot set at its petal edges, suggesting that each Mandelbrot set point contains a sizable quantity of Julia set picture data. …”
    Get full text
    Article
  14. 14834

    Estimation of fatigue strength under multiaxial cyclic loading by varying the critical plane orientation by Marta Kurek, Tadeusz ?agoda, Andrea Carpinteri, Sabrina Vantadori

    Published 2016-06-01
    “…The main purpose of this paper is to examine the influence of the critical plane orientation on the estimated fatigue strength of metals under multiaxial loading. The algorithm employed to evaluate fatigue strength implements the criterion of maximum normal and shear stress on a suitable damage plane (critical plane). …”
    Get full text
    Article
  15. 14835

    Detection of malicious domain name based on a classifier combination by Jiantao SHENG, Maofei CHEN, Dongxin LIU, Laifu WANG, Guoshui SHI, Huamin JIN

    Published 2020-05-01
    “…As a fundamental service on the internet,domain name system (DNS) can inevitably be abused by malicious activities.Based on the studies of Botnets and other malwares which made use of the domain generation algorithm (DGA),and researches on current major techniques of malicious domain detection,a malicious domain detection framework based on a classifier combination was proposed.The framework applied the support vector machine (SVM) as its main classifier and combined the naive Bayes classifier (NBC) supportively with some statistical characteristics.Experiment result demonstrates that the framework outperformes current techniques in the offline-training time and the capability of detecting unknow malicious domain families,which satisfies the requirement of internet service provider (ISP) to detect and analyze malicious domainson the internet.…”
    Get full text
    Article
  16. 14836

    5-pass zero-knowledge identity authentication scheme based on matrix completion problem by Houzhen WANG, Xinwei CAI, Yan GUO, Huanguo ZHANG

    Published 2021-11-01
    “…To solve the problem that most identity authentication schemes are vulnerable to quantum-computing attacks and low efficiency, a new 5-pass zero-knowledge identity authentication scheme was designed based on the matrix completion problem (MCP).Since the MCP is NP-complete, the proposed scheme has the potential to avoid quantum-computing attacks.Compared with the existing similar protocols, the proposed scheme reduced the fraud probability from 2/3 to 1/2 by adding a single round of interaction, and had the advantages of easy implementation and small key size.Moreover, based on the proposed zero-knowledge authentication scheme and Fiat-Shamir standard transformation method, a secure and efficient digital signature algorithm against quantum-computing can be obtained.…”
    Get full text
    Article
  17. 14837

    Transceiver design and performance analysis for uplink SCMA based on CP-free OFDM by Li ZHOU, Xiqing LIU

    Published 2021-06-01
    “…A typical sparse code multiple access (SCMA) system utilizes orthogonal frequency division multiplexing (OFDM) technology with cyclic prefix (CP) to combat multipath fading in wireless channels.Therefore, its capacity is reduced by the CP-insertion.To address this issue, the SCMA scheme based on CP-free OFDM using the time domain precoding (TDP) algorithm was proposed and the proposed scheme was termed as TDP-OFDM SCMA.The transceiver structure was designed, and the capacity plus the bit error rate (BER) performances under various channels with different overload rates and with channel estimation errors were evaluated via the simulations.Also, the power consumption problem in TDP-OFDM SCMA was discussed.The simulation results show that under the same overload rate, the capacity of TDP-OFDM SCMA can be increased by up to 25% if compared with the SCMA based on CP-OFDM.…”
    Get full text
    Article
  18. 14838

    Quasi-orthogonal polarization space time block codes with signal constellations rotation and performance analysis by LI Zheng-quan1, 2, SHEN Lian-feng1

    Published 2010-01-01
    “…The pair-wise decoding algorithm was adopted at the receiver. The simulation and comparison among polarization quasi-orthogonal, rotational polarization quasi-orthogonal, quasi-orthogonal and rotational quasi-orthogonal were given respectively. …”
    Get full text
    Article
  19. 14839

    Digital multi-signature scheme based on bilinear pairing by Cai-juan ZHANG, Lin YOU

    Published 2016-06-01
    “…Based on bilinear pairing and three complicated problems,a new digital multi-signature scheme was pro-posed.In the new scheme,the advantage of fast signature in broadcasting digital multi-signature was applied to se-quential digital multi-signature.By changing the general mechanism of signature,signing could be done simultane-ously by the signers.Then,the signature was sent to verifier after it was verified by trusted third party.The trans-formation from concurrent signature to sequential signature was finally realized by the verifier.The security capa-bilities in three complicated problems,anti-fake attack and anti-conspiracy attack from some members of the new scheme were analyzed.Proposed scheme has many advantages over the old ones,such as fewer calculation,simpler algorithm,faster signing,higher security.…”
    Get full text
    Article
  20. 14840

    Random routing defense method based on deep deterministic policy gradient by Xiaoyu XU, Hao HU, Hongqi ZHANG, Yuling LIU

    Published 2021-06-01
    “…To solve the problem of the existing routing shuffling defenses, such as too coarse data flow splitting granularity, poor protection effect on legitimate QoS and the security against eavesdropping attacks needed to be improved, a random routing defense method based on DDPG was proposed.INT was used to monitor and obtain the network state in real time, DDPG algorithm was used to generate random routing scheme considering both security and QoS requirements, random routing scheme was implemented with programmable switch under P4 framework to realize real-time routing shuffling with packet level granularity.Experiment results show that compared with other typical routing shuffling defense methods, the security and QoS protection effect of the proposed method are improved.…”
    Get full text
    Article