-
14821
Low-latency networking:architecture,key scenarios and research prospect
Published 2019-08-01“…With the advent of delay-sensitive applications and ultra-low latency scenarios,research on low-latency networking is attracting attention from academia,industry,and standards organizations.Understanding the causes of latency and designing corresponding techniques to reduce latency enable the development of emerging applications.The sources of latency according to the layered architecture of the network was analyzed,and summarizes the techniques for reducing the latency.After that,three typical low-latency key scenarios and delay optimization techniques for data center network,5G and edge computing was analyzed.Finally,the opportunities and challenges that may be encountered in the development of low latency networks were presented from the perspectives of network architecture innovation,data-driven latency optimization algorithm and the design of new protocols.…”
Get full text
Article -
14822
A distributed expectation maximization-principal component analysis monitoring scheme for the large-scale industrial process with incomplete information
Published 2019-11-01“…Then, the missing information of variables is estimated by expectation maximization algorithm in the principal component analysis framework, then the expectation maximization-principal component analysis method is applied for fault detection to each sub-block. …”
Get full text
Article -
14823
Measurement Feedback Self-Tuning Weighted Measurement Fusion Kalman Filter for Systems with Correlated Noises
Published 2012-01-01“…The simulation result of radar-tracking system shows the effectiveness of the presented algorithm.…”
Get full text
Article -
14824
Distributed Filter with Consensus Strategies for Sensor Networks
Published 2013-01-01“…Consensus algorithm for networked dynamic systems is an important research problem for data fusion in sensor networks. …”
Get full text
Article -
14825
A method for synthetic speech detection using local phase quantization
Published 2024-02-01“…Due to the convenience of speech synthesis, synthesized disguised speech poses a great threat to the security of speaker verification systems.In order to further enhance the ability of detecting the camouflage to the speaker verification system, a method of synthetic speech detection was put forward using the information in spectral domain of the synthetic speech spectrogram.The method employed the local phase quantization (LPQ) algorithm to describe frequency domain information in the speech spectrogram.Firstly, the spectrogram was divided into several sub-blocks, and then the LPQ was performed on each sub-block.After the histogram statistical analysis, the LPQ feature vector was obtained and used as the input feature of the random forest classifier to realize the synthetic speech detection.The experimental results demonstrate that the proposed method further reduces tandem detection cost function (t-DCF) and has better generalization ability.…”
Get full text
Article -
14826
基于改进Kriging模型的主动学习可靠性分析方法
Published 2021-01-01“…,the differential evolution algorithm is introduced to explore the optimal parameter of Kriging model and improve the accuracy of Kriging prediction information.As a result,the training point in each iteration is guaranteed to be the global optimal one and the efficiency of ALK model is largely improved.…”
Get full text
Article -
14827
The municipalities’ environmental situation assessment as a basis for customizing strategies
Published 2022-12-01“…The article presents the author’s approach to assessing the tension of the ecological situation of the territories, which makes it possible to identify the most acute environmental problems. A multi-stage algorithm for calculating a complex and integral indicator of the intensity of the ecological situation of territories is proposed. …”
Get full text
Article -
14828
Vector Bond Graph Method of Kineto- static Analysis for 3SPS + 1PS Paralell Robot
Published 2015-01-01“…By the corresponding algorithm,the automatic modeling and kineto- static analysis of 3PS + 1PS parallel robot system on a computer is realized,its validity is illustrated.…”
Get full text
Article -
14829
Power Performance Simulation and analysis for PMSM Electric Vehicle based on Space Vector and Sliding Mode Variable Structure
Published 2017-01-01“…To study the power performance of electric vehicle with permanent magnet synchronous motor( PMSM),the integrated control algorithm based on the space vector and sliding mode variable structure is proposed. …”
Get full text
Article -
14830
Path Planning for Spider Biomimetic Robot Leg based on Cubic Polynomial Interpolation Function with Midpoints
Published 2017-01-01“…Based on Monte-Carlo method,the working space of the foot end is analyzed,and based on the cubic polynomial interpolation algorithm with midpoints for path planning of obstacle avoidance is simulated. …”
Get full text
Article -
14831
Face Recognition Method Based on Fuzzy 2DPCA
Published 2014-01-01“…In order to improve the recognition performance of the traditional 2DPCA, a new 2DPCA algorithm based on the fuzzy theory is proposed in this paper, namely, the fuzzy 2DPCA (F2DPCA). …”
Get full text
Article -
14832
Abel–Goncharov Type Multiquadric Quasi-Interpolation Operators with Higher Approximation Order
Published 2021-01-01“…Furthermore, the advantage of our method is that the associated algorithm is very simple and easy to implement.…”
Get full text
Article -
14833
On escape criterion of an orbit with s-convexity and illustrations of the behavior shifts in Mandelbrot and Julia set fractals.
Published 2025-01-01“…We also demonstrate the impact of the parameters on the formatted fractals with numerical examples and graphical illustrations using the MATHEMATICA software, algorithm, and colormap. Moreover, we observe that the Julia set appears when we widen the Mandelbrot set at its petal edges, suggesting that each Mandelbrot set point contains a sizable quantity of Julia set picture data. …”
Get full text
Article -
14834
Estimation of fatigue strength under multiaxial cyclic loading by varying the critical plane orientation
Published 2016-06-01“…The main purpose of this paper is to examine the influence of the critical plane orientation on the estimated fatigue strength of metals under multiaxial loading. The algorithm employed to evaluate fatigue strength implements the criterion of maximum normal and shear stress on a suitable damage plane (critical plane). …”
Get full text
Article -
14835
Detection of malicious domain name based on a classifier combination
Published 2020-05-01“…As a fundamental service on the internet,domain name system (DNS) can inevitably be abused by malicious activities.Based on the studies of Botnets and other malwares which made use of the domain generation algorithm (DGA),and researches on current major techniques of malicious domain detection,a malicious domain detection framework based on a classifier combination was proposed.The framework applied the support vector machine (SVM) as its main classifier and combined the naive Bayes classifier (NBC) supportively with some statistical characteristics.Experiment result demonstrates that the framework outperformes current techniques in the offline-training time and the capability of detecting unknow malicious domain families,which satisfies the requirement of internet service provider (ISP) to detect and analyze malicious domainson the internet.…”
Get full text
Article -
14836
5-pass zero-knowledge identity authentication scheme based on matrix completion problem
Published 2021-11-01“…To solve the problem that most identity authentication schemes are vulnerable to quantum-computing attacks and low efficiency, a new 5-pass zero-knowledge identity authentication scheme was designed based on the matrix completion problem (MCP).Since the MCP is NP-complete, the proposed scheme has the potential to avoid quantum-computing attacks.Compared with the existing similar protocols, the proposed scheme reduced the fraud probability from 2/3 to 1/2 by adding a single round of interaction, and had the advantages of easy implementation and small key size.Moreover, based on the proposed zero-knowledge authentication scheme and Fiat-Shamir standard transformation method, a secure and efficient digital signature algorithm against quantum-computing can be obtained.…”
Get full text
Article -
14837
Transceiver design and performance analysis for uplink SCMA based on CP-free OFDM
Published 2021-06-01“…A typical sparse code multiple access (SCMA) system utilizes orthogonal frequency division multiplexing (OFDM) technology with cyclic prefix (CP) to combat multipath fading in wireless channels.Therefore, its capacity is reduced by the CP-insertion.To address this issue, the SCMA scheme based on CP-free OFDM using the time domain precoding (TDP) algorithm was proposed and the proposed scheme was termed as TDP-OFDM SCMA.The transceiver structure was designed, and the capacity plus the bit error rate (BER) performances under various channels with different overload rates and with channel estimation errors were evaluated via the simulations.Also, the power consumption problem in TDP-OFDM SCMA was discussed.The simulation results show that under the same overload rate, the capacity of TDP-OFDM SCMA can be increased by up to 25% if compared with the SCMA based on CP-OFDM.…”
Get full text
Article -
14838
Quasi-orthogonal polarization space time block codes with signal constellations rotation and performance analysis
Published 2010-01-01“…The pair-wise decoding algorithm was adopted at the receiver. The simulation and comparison among polarization quasi-orthogonal, rotational polarization quasi-orthogonal, quasi-orthogonal and rotational quasi-orthogonal were given respectively. …”
Get full text
Article -
14839
Digital multi-signature scheme based on bilinear pairing
Published 2016-06-01“…Based on bilinear pairing and three complicated problems,a new digital multi-signature scheme was pro-posed.In the new scheme,the advantage of fast signature in broadcasting digital multi-signature was applied to se-quential digital multi-signature.By changing the general mechanism of signature,signing could be done simultane-ously by the signers.Then,the signature was sent to verifier after it was verified by trusted third party.The trans-formation from concurrent signature to sequential signature was finally realized by the verifier.The security capa-bilities in three complicated problems,anti-fake attack and anti-conspiracy attack from some members of the new scheme were analyzed.Proposed scheme has many advantages over the old ones,such as fewer calculation,simpler algorithm,faster signing,higher security.…”
Get full text
Article -
14840
Random routing defense method based on deep deterministic policy gradient
Published 2021-06-01“…To solve the problem of the existing routing shuffling defenses, such as too coarse data flow splitting granularity, poor protection effect on legitimate QoS and the security against eavesdropping attacks needed to be improved, a random routing defense method based on DDPG was proposed.INT was used to monitor and obtain the network state in real time, DDPG algorithm was used to generate random routing scheme considering both security and QoS requirements, random routing scheme was implemented with programmable switch under P4 framework to realize real-time routing shuffling with packet level granularity.Experiment results show that compared with other typical routing shuffling defense methods, the security and QoS protection effect of the proposed method are improved.…”
Get full text
Article