-
15361
Student study group break-even value and adjustment of the educational program portfolio
Published 2023-06-01“…The proposed answers to the questions are based on a marketing approach, which presents formulas for calculating the break-even value of a bachelor’s group, an algorithm for determining the structure of the group, recommendations for adjusting the portfolio of programs and calculating the total amount of university income from extra-budgetary admission, ensuring the planned university development.…”
Get full text
Article -
15362
Performance analysis of secrecy rate for SWIPT in massive antenna
Published 2017-09-01“…In the multi-drop broadcast system,the existing research is to optimize the single-user security rate in the complete channel state information.In fact,it’s impossible that there exists only one user in the system.The base station often receives incomplete channel state information.Aiming at this problem,a robust beamforming scheme was proposed.In the multi-user case,considering the influence of channel estimation error on the system security rate,the particle swarm optimization algorithm was used to optimize the emission beamforming vector,artificial noise covariance and power split ratio to ensure that the user collects a certain energy while maximizing the safe transmission rate.The simulation results show that the proposed scheme is slightly lower than the security rate in the ideal case,but it is meaningful to the actual system,taking into account the existence of eavesdropping users and the estimation error.…”
Get full text
Article -
15363
Vibration Optimization of Multi-gear Transmission System based on Mixed-discrete Method
Published 2017-01-01“…The best design variables are solved by compiling mixed- discrete optimization codes based on branch and bound algorithm. Then,the vibration response is recalculated,the results point out that the mean vibration acceleration and total mass are decreased by 33. 5 percent and 12. 96 percent respectively,which indicates the remarkable effect of vibration optimization.…”
Get full text
Article -
15364
On the existence of solutions of the system of nonlinear quasi-mixed equilibrium problems and their stability of the procedure scheme
Published 2025-01-01“…Moreover, we show that the stability analysis of the iterative algorithm proposed in their work (and in (J. Inequal. …”
Get full text
Article -
15365
Cooperative Communication in Cognitive Radio Networks under Asymmetric Information: A Contract-Theory Based Approach
Published 2015-10-01“…A sequential optimization algorithm is proposed to obtain the optimal relay-reward strategy. …”
Get full text
Article -
15366
Research and implementation on acquisition scheme of telecom big data based on Hadoop
Published 2017-01-01“…ETL is a very important step in the implementation process of data warehouse.A good ETL flow is important,which can effectively process the telecom big data and improve the acquisition efficiency of the operation platform.Firstly,the main data content of the big data platform was expounded.Secondly,in order to improve the efficiency of massive data collection,Hadoop and Oracle mashup solution was suggested.Subsequently,a dynamic triggered ETL scheduling flow and algorithm was proposed.Compared with timer start ETL scheduling method,it could effectively shorten waiting time and avoid the phenomenon of resources to seize and congestion.Finally,according to the running log of Hadoop platform and Oracle database,the relationship between acquisition efficiency and data quantity was analyzed comparatively.Furthermore,practice result shows that the hybrid data structure of the big data platform complement each other and can effectively enhance the timeliness of data collection and access better application effect.…”
Get full text
Article -
15367
Data management based on blockchain and edge computing for Internet of things
Published 2020-06-01“…The popularity of smart devices has driven the development of the application of Internet of things (IoT) technology,and the resulting massive amount of IoT data has brought challenges to traditional centralized data management methods,such as performance,privacy,and security.Therefore,a data management framework of IoT based on blockchain and edge computing was proposed to support the distributed IoT data management.The distributed storage and access control could be provided by the framework for the IoT data.At the same time,a set of the built-in encryption scheme was designed to protect the data security and privacy and safeguard the data ownership.By introducing edge computing,the scalability bottleneck of the blockchain the system was relieved.The processes of data storage and data access based on this framework were given,and the algorithm of the system implementation based on the smart contract technology was explained in detail.Experiments show that the IoT data management system based on this framework outperforms the traditional cloud-based data management systems.…”
Get full text
Article -
15368
Backdoor defense method in federated learning based on contrastive training
Published 2024-03-01“…In response to the inadequacy of existing defense methods for backdoor attacks in federated learning to effectively remove embedded backdoor features from models, while simultaneously reducing the accuracy of the primary task, a federated learning backdoor defense method called ContraFL was proposed, which utilized contrastive training to disrupt the clustering process of backdoor samples in the feature space, thereby rendering the global model classifications in federated learning independent of the backdoor trigger features.Specifically, on the server side, a trigger generation algorithm was developed to construct a generator pool to restore potential backdoor triggers in the training samples of the global model.Consequently, the trigger generator pool was distributed to the participants by the server, where each participant added the generated backdoor triggers to their local samples to achieve backdoor data augmentation.Experimental results demonstrate that ContraFL effectively defends against various backdoor attacks in federated learning, outperforming existing defense methods.…”
Get full text
Article -
15369
Crack simulation for the cover of the landfill � A seismic design
Published 2023-07-01“…Artificial Neural Networks (ANNs) based on Levenberg-Marquardt Algorithm and Abalone Rings Data Set mode were used to predict displacement in critical points of the model. …”
Get full text
Article -
15370
Green city: An efficient task joint execution strategy for mobile micro-learning
Published 2018-06-01“…Finally, the genetic algorithm is used to find the optimal executive strategy. …”
Get full text
Article -
15371
Detecting P2P botnet based on the role of flows
Published 2012-09-01“…Towards the weaknesses of the existing detection methods of P2P botnet,a novel real-time detection model based on the role of flows was proposed,which was named as RF.According to the characteristics of flows,the model made the flows play the different roles in the detection of the P2P botnet to detect the essential abnormality and the attacking abnormality.And the model considered the influence on the detection of the P2P botnet which the Web applications generated,especially the applications based on the P2P protocols.To minimize the false positive rate and false negative rate,a real-time method based on the sliding window to estimate the Hurst parameter was proposed,and the Kaufman algorithm was applied to adjust the threshold dynamically.The experiments showed that the model was able to detect the new P2P botnet with a relatively high precision.…”
Get full text
Article -
15372
One-way hash function construction based on Chen-type hyper-chaotic system and key-stream
Published 2009-01-01“…Theoretical analysis and experimental results indicate that the proposed algorithm can satisfy the required security performance, such as data compression function, irreversibility, initial value sensitivity forgery resistance and collision resistance. …”
Get full text
Article -
15373
Blockchain-based distributed EHR fine-grained traceability scheme
Published 2021-05-01“…Aiming at the key management of electronic health records (EHR) in a distributed system and user identity tracing issues, a distributed EHR fine-grained traceability scheme based on blockchain was proposed.Combining chameleon hash and zero-knowledge proof technology, the registration of nodes on the blockchain and the generation of identity certificates were realized, and the traceability of malicious users on the blockchain was realized.Besides, given the single point of failure problem of key management, the attribute-based encryption scheme of distributed ciphertext strategy was designed to achieve secure and fine-grained data access control, and multiple decryption agency blockchain nodes were set up to jointly distribute the attribute private keys of user nodes.The security analysis shows that the traceable distributed key generation attribute-based encryption algorithm based on the blockchain is adaptively secure under the random oracle model, and through experiments, the feasibility and practicability of the proposed scheme are shown.…”
Get full text
Article -
15374
Application of New Media Big Data in Visual Performance of Axonometric Illustration
Published 2022-01-01“…On the basis of analyzing related theories at home and abroad, the literature research method and algorithm-driven method are used comprehensively. It can not only effectively improve the visual effect of axonometric illustration by 12.3% but also solve the problems and challenges faced by the current China’s axonometric illustration industry.…”
Get full text
Article -
15375
METHOD FOR MODIFYING PROFILE OF CYCLOIDAL WHEEL CONSIDERING COMPENSATION FOR ELASTIC DEFORMATION
Published 2020-01-01“…And the mathematical model of the profile modification of the cycloid with elastic deformation characteristics was established,which was solved by genetic algorithm and compared with the modification method without considering elastic deformation.The results show that compared with the modification method without considering elastic deformation,the fitting degree of the actual working tooth profile and the angle modification tooth profile is improved to 1. 52 times,and the contact force of the tooth surface is reduced to8. 27%,thus verifying the rationality and feasibility of the method.…”
Get full text
Article -
15376
CONTACT STRESS ANALYSIS AND OPTIMIZATION OF DOUBLE SHOCK SLEEVE MOVABLE TOOTH
Published 2021-01-01“…In this paper,the logarithmic generatrix modification method and genetic optimization algorithm are used to optimize the structure of sleeve movable teeth. …”
Get full text
Article -
15377
Multicell adaptive power allocation scheme based on game theory in OFDMA systems
Published 2008-01-01“…The existence and uniqueness of Nash equilibrium of this game framework was analyzed, and a distributed algorithm for this game was proposed. The performance of the proposed scheme is verified by simulation in the single cell and multiple cell scenario respectively, as well as the influence of pricing factor on system performance. …”
Get full text
Article -
15378
Function argument number identification in stripped binary under PPC and MIPS instruction set
Published 2020-08-01“…The identification of the number of function argument contributes to the recovery of the function prototype and is the basis for data flow analysis and other security analysis.In order to improve the accuracy of the recognition of the number of function parameters,an algorithm (Findargs) which determines the number of parameters of the function according to the voting mechanism of the function call relationship was proposed.Findargs starts from the function call characteristics of PPC and MIPS instruction set,and uses function call relationship combined with argument pass analysis to identify the number of function arguments,which can help to recover function prototype.In order to evaluate the recognition effect of Findargs,a large binary file was selected and tested it with radare2.The experiments results show that Findargs has higher accuracy,and the accuracy rate for PPC instruction set reaches 90.3%.For MIPS instruction set,the accuracy rate is 86%.…”
Get full text
Article -
15379
Bezrefleksyjna codzienność refleksyjnych uczniów, czyli polska edukacja wczesnoszkolna z podręcznikiem w tle
Published 2018-05-01“…Everyday work with the textbook forces children to make often anti-developmental tasks and to resign from divergent and creative thinking in favor of acting according to the designated algorithm. The modern school with the textbook on the pedestal is changing into a space with growing restrictions. …”
Get full text
Article -
15380
Research of Gear Position Decision of Dual Motor Multiple Speed AMT based on BP and Its Optimization Neural Network
Published 2020-01-01“…By using the three-parameter shift law, the algorithm and parameter optimization are carried out to overcome the shortcomings of traditional BP neural network in optimized BP neural network of gear position decision, and then the optimized BP neural network is obtained. …”
Get full text
Article