Showing 14,861 - 14,880 results of 19,511 for search '"algorithms"', query time: 0.09s Refine Results
  1. 14861

    Method for detecting collusion attack node in road condition information sharing based on reputation point by Shichang XUAN, Hao TANG, Wu YANG

    Published 2021-04-01
    “…Aiming at the problem that on occasion of the release of false road condition information by collusion nodes in the Internet of vehicles collaboratively, message authenticity could not be guaranteed in the process of road condition information sharing, a method for detecting collusion attack nodes in road condition information sharing based on reputation points was proposed.In the process of road condition information aggregation, a malicious information detection algorithm was designed to detect false messages issued by colluding nodes, which could ensure the authenticity and accuracy of messages delivered in the system.Experimental results show that the proposed method has higher detection efficiency for collusion nodes and adaption to a proportion of collusion nodes through security evaluation and experiments in comparison with the existing schemes.…”
    Get full text
    Article
  2. 14862

    Analysis of the System Composition and the Obstacle Ability of Hexapod Spider Crawling Robot by Ziyue Wu, Yanliang Song, Zhifeng Wu

    Published 2019-03-01
    “…The robot is composed of six mechanical legs and robot bodies,based on the Stm32f407 chip as the main controller,and uses the PID algorithm to control the whole robot to keep the balance,and completes the real-time response to the operation instruction through the image acquisition system. …”
    Get full text
    Article
  3. 14863

    Obfuscation of combination circuits of digital devices from unauthorized access by L. A. Zolotorevich

    Published 2019-09-01
    “…We consider the formation of a common approach to solving problems of control and verification in the design of modern integrated circuits based on the analysis of fault models of structural realizations of digital devices, errors arising in the design process, as well as deliberate distortions during the design and manufacturing stages, i. e. creation and development of taxonomy of possible deviations in the project. The algorithm of logical obfuscation and coding of digital structures based on the use of methods and means of test diagnostics is proposed.…”
    Get full text
    Article
  4. 14864

    Reliable transmission mechanism with differentiated protection in virtualized fiber-wireless access network by Ruyan WANG, Yishuang GAO, Xiao CHEN

    Published 2019-03-01
    “…In view of the different reliability requirements of network service,a reliable transmission mechanism with differentiated protection was proposed in virtualized fiber-wireless access network.The quality of protection required by users and the fees that can be paid were used as a prerequisite.The backup protection resources were flexibly allocated by quantifying the multi-level protection quality with the probability of recovery.Then,for reducing traffic congestion and the unprotected services,the level service differentiation algorithm was used to choose protection link which was satisfied with the level of protection quality.The results show the proposed mechanism has more advantages in terms of long-term benefit-to-cost ratio and underlying network resource overhead,and provides users with a more flexible virtual network transmission while satisfying users’ reliability requirements.…”
    Get full text
    Article
  5. 14865

    Extending the Root-Locus Method to Fractional-Order Systems by Farshad Merrikh-Bayat, Mahdi Afshar

    Published 2008-01-01
    “…Three illustrative examples are presented to confirm the effectiveness of the proposed algorithm.…”
    Get full text
    Article
  6. 14866

    Robust secure design for relay wireless sensor networks with simultaneous wireless information and power transfer by Hehao Niu, Bangning Zhang, Daoxing Guo, Mingyue Lu

    Published 2017-06-01
    “…By studying the hidden convexity of the problem, we propose an iterative algorithm combining semi-definite relaxation and a gradient-based method. …”
    Get full text
    Article
  7. 14867

    Doppler Positioning Performance of LEO Mega Constellation by Yulu ZHANG, Zhen LI, Chuang SHI, Guifei JING

    Published 2024-03-01
    “…This paper proposed a Doppler-only point-solution algorithm and analyzed the Doppler positioning performance based on the Starlink constellation.The Doppler positioning accuracy was about 3~6 m.To achieve the meter-level positioning accuracy, the satellite position and velocity errors should be within several meters and several centimeters per second, respectively.The ionospheric delay rates of C-band signal would cause about 2 m error in Doppler positioning.The positioning error would increase by dozens of meters if there were no corrections for the tropospheric errors.To ensure convergence in the LEO-based Doppler positioning, the initial receiver position error should be less than 300 km when the satellites orbit at an altitude of 550 km.…”
    Get full text
    Article
  8. 14868

    Botnet detection based on generative adversarial network by Futai ZOU, Yue TAN, Lin WANG, Yongkang JIANG

    Published 2021-07-01
    “…In order to solve the problems of botnets’ strong concealment and difficulty in identification, and improve the detection accuracy of botnets, a botnet detection method based on generative adversarial networks was proposed.By reorganizing the data packets in the botnet traffic into streams, the traffic statistics characteristics in the time dimension and the traffic image characteristics in the space dimension were extracted respectively.Then with the botnet traffic feature generation algorithm based on generative adversarial network, botnet feature samples were produced in the two dimensions.Finally combined with the application of deep learning in botnet detection scenarios, a botnet detection model based on DCGAN and a botnet detection model based on BiLSTM-GAN were proposed.Experiments show that the proposed model improves the botnet detection ability and generalization ability.…”
    Get full text
    Article
  9. 14869

    Research on Green Transport Mode of Chinese Bulk Cargo Based on Fourth-Party Logistics by Jixiao Wu, Yinghui Wang, Wenlu Li, Haixia Wu

    Published 2021-01-01
    “…This paper improves the particle swarm optimization algorithm to compare the integrated cost and carbon emissions of different bulk fourth-party transport networks to verify the benefits of the fourth-party logistics on bulk cargo transport networks’ cost reduction and emission reduction. …”
    Get full text
    Article
  10. 14870

    Research on deep differential fault analysis against MIBS by ZHAO Xin-jie1, WANG Tao 1, WANG Su-zhen2, WU Yang1

    Published 2010-01-01
    “…The MIBS algorithm and its differential fault analysis principle were presented,then three differential fault analysis methods against MIBS were proposed based on different depth of fault model and verified through experiments.Experiment results demonstrate that due to its Feistel structure and S-box differential feature,MIBS is vulnerable to deep differential fault attack.The best result is that after injecting one 4-bit fault into the 30th round left register,both the fault location and fault differential are unknown,the 64-bit MIBS master key searching space can be reduced to 224 and be re-covered after one minute brute-force-search.Moreover,the fault analysis method can provide some ideas on differential fault analysis against other block ciphers using S-box.…”
    Get full text
    Article
  11. 14871

    Location Strategy for Traffic Emission Remote Sensing Monitors to Capture the Violated Emissions by Mahmoud Owais

    Published 2019-01-01
    “…The problem is formulated into a graph theory problem, and then a novel adapted metaheuristic algorithm is used to solve the problem. The methodology, using a benchmark problem, has managed to solve the problem to the optimality. …”
    Get full text
    Article
  12. 14872

    MND for Helping People with Different Disabilities by Wael Hosny Fouad Aly

    Published 2014-07-01
    “…Smart phones are used to communicate with the sensor nodes to take instructions to navigate through the appropriate path. Dijkstra's algorithm is used for navigation. MND WSN also monitors the disabled person while navigating. …”
    Get full text
    Article
  13. 14873

    Fault diagnosis of nonlinear analog circuits using generalized frequency response function and LSSVM. by Jialiang Zhang, Yaowang Yang

    Published 2024-01-01
    “…In order to improve the training speed and reduces storage, a simplified LSSVM model is used to construct the classifier, and the conjugate gradient algorithm is used for training. The fault diagnosis simulation experiment is conducted on a biquad filter circuit to verify the proposed method. …”
    Get full text
    Article
  14. 14874

    Research of Real Time Optimization of Gear for DCT Vehicle Under the Ramp by Ding Hua, Xu Cong

    Published 2018-01-01
    “…The value of slope is identified based on the EKF algorithm and the dynamics model of ramp. On the basis of ramp identification model and traditional shift schedule,a real time online optimization of dual clutch transmission( DCT) gear is presented based on fuzzy control method. …”
    Get full text
    Article
  15. 14875

    Robust H∞ Control of DC Motor in the Presence of Input Delay and Disturbance by the Predictor-Based Method by Nima Maleki, Elahe Moradi

    Published 2022-01-01
    “…The first-order model of a DC motor has been studied previously using PID and STA (super twisting algorithm) methods. However, in this paper, the delay-dependent robust H∞  controller is used on both the first and second orders of the DC motor. …”
    Get full text
    Article
  16. 14876

    Optimization of [C]Raclopride Positron Emission Tomographic Rat Studies: Comparison of Methods for Image Quantification by Èlia Torrent, Magí Farré, Ibane Abasolo, Olga Millan, Jordi LLop, Juan Domingo Gispert, Alba Ruiz, Deborah Pareto

    Published 2013-06-01
    “…In addition, filtered backprojection is recommended as a reconstruction algorithm, although iterative methods may be more sensitive to detect within-group differences.…”
    Get full text
    Article
  17. 14877

    Buffer-aided cooperative NOMA with power transfer by Long YANG, Li ZHAO, Yuchen ZHOU, Bingtao HE, Jian CHEN

    Published 2023-06-01
    “…To improve the throughput of multiuser simultaneous wireless information and power transfer systems, a buffer-aided cooperative non-orthogonal multiple access scheme with power transfer was designed to maximize the average throughput under the constraints of average/peak power, user’s rate, and the buffer stability.To reduce the optimization complexity, the Lyapunov’s method was introduced to convert the long-term average optimization problem into a series of time-discrete subproblems, and an adaptive transmission and resource allocation optimization algorithm was proposed, where the working mode, the user scheduling and the power allocation were dynamically optimized according to the time-varying channel/buffer state.Simulation results demonstrate that compared with the existing schemes, the proposed scheme can significantly enhance the average throughput whilst achieving the tradeoff between the delay and throughput.…”
    Get full text
    Article
  18. 14878

    An Intelligent Traffic Flow Control System Based on Radio Frequency Identification and Wireless Sensor Networks by Kuei-Hsiang Chao, Pi-Yun Chen

    Published 2014-05-01
    “…At the same time, the sensor analyzes and judges the information using an extension algorithm designed to achieve the objective of controlling the flow of traffic. …”
    Get full text
    Article
  19. 14879

    PROFILING OF THE HOB TOOL FOR WORM SHAFTS DEFORMATION by VIRGIL GABRIEL TEODOR, GEORGIANA-ALEXANDRA MOROSANU, NICUSOR BAROIU, RAZVAN SEBASTIAN CRACIUN, VIOREL PAUNOIU

    Published 2023-02-01
    “… The paper presents an algorithm for profiling the hob tool designed to generate by plastic deformation the worm shafts from the composition of worm-wheel gear type, used in the seat adjustment mechanisms of some Audi and Mercedes cars. …”
    Get full text
    Article
  20. 14880

    Improved segmented CRC assisted puncturing Polar decoding by Yanhong NI, Xiangxiong LOU, Jianrong BAO

    Published 2019-03-01
    “…A segmented cyclic redundancy check (CRC) assisted decoding algorithm was proposed.This method makes use of the high parallelism of BP decoding and the high reliability of CRC verification,and uniformly or proportionally disperses CRC verification bits into the original information bits.Simulation results show that when the code length N is 1 024 and the SNR is 3.5 dB,the average iterations of segmented CRC(2,16×2)and CRC (2,24+8) are 2.7 and 2.8 times less than those of G matrix based decoding.When the code length M is 896,the two segmented methods with a bit error rate of 10<sup>-5</sup>obtained about 0.7 dB gain compared with the non-CRC assisted BP puncturing decoding.…”
    Get full text
    Article