-
15701
Shape similarity differential privacy trajectory protection mechanism based on relative entropy and K-means
Published 2021-02-01“…To solve the problem that most studies had not fully considered the sensitivity of location to privacy budget and the influence of trajectory shape, which made the usability of published trajectory poor, a shape similarity differential privacy trajectory protection mechanism based on relative entropy and K-means was proposed.Firstly, according to the topological relationship of geographic space, relative entropy was used to calculate the sensitivity of real location to privacy budget, a real-time calculation method of location sensitive privacy level was designed, and a new privacy model was built in combination with differential privacy budget.Secondly, K-means algorithm was used to cluster the release position to obtain the release position set that was most similar to the real position direction, and Fréchet distance was introduced to measure the similarity between the release track and the real track, so as to improve the availability of the release track.Experiments on real data sets show that the proposed trajectory protection mechanism has obvious advantages in trajectory availability compared with others.…”
Get full text
Article -
15702
Restoration Strategy Based on Optimal Relay Node Placement in Wireless Sensor Networks
Published 2015-07-01“…In this paper, we propose a distributed restoration algorithm based on optimal relay node placement (simply, ORNP). …”
Get full text
Article -
15703
Multi-objective Optimal Design of RV-550E Reducer Cycloid Gear Profile Modification
Published 2018-01-01“…A multiobjective optimization model with considering the meshing characteristics of the cycloidal gear and the contact force of the tooth surface is established. The NSGA-Ⅱ algorithm is used to solve the multi-objective optimal problem,and compared with the optimal method of the least contact force of the tooth surface of the cycloidal gear. …”
Get full text
Article -
15704
Layout and Optimization of Urban Stormwater Management Measure: A Review
Published 2024-10-01“…By analyzing the relevant literature at home and abroad, this paper clarifies the relevant definition and content scope of the layout optimization of urban stormwater management measures, constructs the whole process structure including pre-preparation, model algorithm, post-evaluation and decision-making of the layout optimization of stormwater management measures, systematically analyzes relevant information of each step of layout optimization, explores current research status and gaps of each part of the framework, and puts forward suggestions for more scientific layout optimization. …”
Get full text
Article -
15705
Design and Motion Control of a Novel Weak-coupling Parallel Hip-joint Rehabilitation Mechanism
Published 2024-06-01“…The parameters of controllers are adaptively adjusted online using the fuzzy algorithm. The simulation and experiment results show that the fuzzy adaptive PD controller has fast response speed and good tracking effect.…”
Get full text
Article -
15706
APPLICATION OF SEMI SUPERVISED LAPLACE SCORE IN ROLLING BEARING FAULT DIAGNOSIS (MT)
Published 2023-01-01“…At the same time, particle swarm optimization-based support vector machine(PSO-SVM) algorithm is used for fault classification. Finally, the model is applied to the process of experimental data analysis. …”
Get full text
Article -
15707
Matching and Optimization for the Parameter of Electric City Vehicle Powertrain
Published 2017-01-01“…Under the double pressures of energy crisis and environmental problems,the governments and the automobile enterprises have paid much attention to the pure electric vehicle which has advantages of zero emission,low noise and wide range of energy sources.Electric car is not very different from conventional cars,whether in the main structure or in the appearance.The main change is made in terms of drivetrain.Taking the pure electric city car as our research target,the power transmission system parameter is analyzed and designed,according to the vehicle parameters,power and economy requirements,the vehicle power system parameter is matched.The matched parameters of power system preliminarily is optimized from improving the transmission efficiency,taking the shortest time of acceleration and working conditions driving range maximum as optimization goal.The fitness function of transmission speed ratio is constituted of objective function and constraints condition by using a penalty function.The optimization is carried out by genetic algorithm,the optimal parameters of power system are obtained.…”
Get full text
Article -
15708
Privacy cloud storage scheme based on fog computing
Published 2019-03-01“…As one of the core applications in cloud computing field,cloud storage attracts a large number of users depending on its powerful storage capacity.However,in this storage schema,users’ data is stored completely in cloud server.In other word,users’ right of control on data is lost and users are facing privacy leakage risk.Traditional privacy protection scheme is usually based on encryption technology,but the attack from the inside of cloud server can’t be resisted effectively by these kinds of methods.Once the password gets compromised,users’ data will be stolen.In order to solve this problem,a three-level secure cloud storage scheme based on fog computing was proposed and a Hash-Solomon code algorithm was designed.A small part of data was stored in local machine and fog server,which can take full advantage of cloud storage and protect the privacy of data.Through the theoretical safety analysis and experimental test,the feasibility of our scheme is proved,and it is really a powerful supplement to existing cloud storage scheme.…”
Get full text
Article -
15709
Finite Element Analysis of Automobile Axle Housing based on Internet-driven Collaborative Design Theory
Published 2015-01-01“…In order to solve the problems of traditional automobile axle housing design and analysis of wide object space distribution,difficult collaborative design and poor interaction performance,a multiple analytic encoded method based on discrete wavelet transform algorithm to the compress axle housing data is used,and then a shared network drive collaborative hybrid system architecture to share and protect the axle housing analyze compressed data is created,a finite element analysis system of network drive cooperative automobile axle housing is combined with JSP.Servlet technology with secondary development of finite element and the numerical computing systems is built.Taking the Dongfeng hercules series axle dump truck as the research object,the model strength,deformation and life characteristics are studied.The results show that the finite element method and technical route based on network collaborative design theory has certain feasibility,which can overcome wide distribution,difficult collaborative design and interaction and poor performance,and the product into production efficiency can be improved and the production cost can be reduced.…”
Get full text
Article -
15710
Novel Feature Selection Method for Nonlinear Support Vector Regression
Published 2022-01-01“…FS-NSVR is a challenging mixed-integer programming problem that is solved efficiently by using an alternate iterative greedy algorithm. Experimental results on three artificial datasets and five real-world datasets confirm that FS-NSVR effectively selects representative features and discards redundant features in a nonlinear system. …”
Get full text
Article -
15711
Design of nodes importance assessment method for complex network based on neighborhood information
Published 2024-03-01“…Accurate identification of influential nodes in complex networks is crucial for network management and network security.The local centrality method is concise and easy to use, but ignores the topological relationship between neighboring nodes and cannot provide globally optimal results.A node importance assessment method was proposed to correlate the node edge relationship and topology, which firstly applied the H-index and information entropy to assess the nodes, then combined the structural holes of the nodes with the structural characteristics of the nodes, and took into account the attribute of “bridging” while focusing on the node’s own quality and the amount of information about the neighboring nodes.The algorithm was validated by simulating the propagation process using the SIR model, and the Kendall correlation coefficient, complementary cumulative distribution function and propagation influence were applied to validate the validity and applicability of the method.Comparison of the experimental results on six real network datasets shows that the proposed method is more accurate than the traditional centrality methods in identifying and ordering the key nodes in the network.…”
Get full text
Article -
15712
Problems of bias and discrimination of human capital in artificial intelligence systems
Published 2024-05-01“…The main purpose of writing this work is to study the question of how the use of AI and algorithmic solutions aggravates the problem of bias and discrimination of human capital which is inevitably associated with the emergence of AI. …”
Get full text
Article -
15713
Mathematical Modeling of Static Data Attribute Encryption Based on Big Data Technology
Published 2022-01-01“…The big data redundancy elimination algorithm based on similarity calculation is analyzed. …”
Get full text
Article -
15714
Decoupling design and kinematic analysis of rope driven flexible wheelchair manipulators
Published 2025-01-01“…A simulation model based on Adams virtual prototype was established.ResultsBy comparing with the numerical simulation results of Matlab software, the accuracy of the kinematic algorithm is verified, which provides a basis for the subsequent motion control of the manipulator.…”
Get full text
Article -
15715
Investigation of traffic adaptation based interference alignment for cognitive radio networks
Published 2014-04-01“…To effec-tively construct the beam-forming and interference suppression matrix for IA, then not only derive an adaptive closed-form algorithm, but its average degrees of freedom (d.o.f) were also analyzed with random traffic load model and a lower bound is given as well. …”
Get full text
Article -
15716
Two Iterative Methods for Solving Linear Interval Systems
Published 2018-01-01“…Our method is based on conjugate gradient algorithm in the context view of interval numbers. …”
Get full text
Article -
15717
Task domain independent speech keyword detection system
Published 2006-01-01“…A multiple scale acoustic modeling framework for task-domain independent keyword spotting was proposed.A large-scale phoneme set was obtained automatically through decision-tree based phoneme clustering,and a large-scale phoneme acoustic context dependent background model was trained accordingly through using standard HMM training framework.The modeling accuracy for filler speech is improved.Under the framework,an efficient searching space construction through using shared HMM state was also described.Experimental results showed that in average absolute 6.9% improvement of keyword recognition accuracy could be obtained.Furthermore an acoustic context neighbor algorithm to measure acoustic confidence and a method of computing candidate keyword likelihood based on proposed multiple-scale acoustic model were proposed and a fusing method based on FLDA was adopted.The effectiveness of acoustic confidence measure is improved significantly.Experimental results showed that absolute 3.0% reduction of equal error rate could be obtained.…”
Get full text
Article -
15718
CCA-secure verifiable Mix-Net protocol
Published 2015-10-01“…A CCA-secure verifiable Mix-Net protocol with provable security was proposed.The protocol was based on Wikström’s Mix-Net and improves its security by introducing an improved key generation algorithm and a new method for constructing proof of secret shuffling.Without revealing the correspondence between inputs and outputs,proposed protocol enables everyone to verify the correctness of output plaintexts through checking evidences broadcasted by each server.Thus,it satisfies public verifiability.Any sender can trace and examine the processing procedure of its ciphertext.Thus,proposed protocol satisfies sender verifiability.It is prored to be CCA-secure under the assumption of random oracle.Compared with previous mix-net schemes which are CCA-secure,proposed protocol does not require any trusted center,and incurs fewer interactions between servers which also resulting in a lower computation and communication complexity.Hence,the protocol is an ideal cryptographic tool for constructing secure electronic election protocol.…”
Get full text
Article -
15719
Differential privacy protection scheme based on edge betweenness model
Published 2019-05-01“…With the continuous development of social network application,user’s personal social data is so sensitive that the problem of privacy protection needs to be solved urgently.In order to reduce the network data sensitivity,a differential privacy protection scheme BCPA based on edge betweenness model was proposed.The 2K sequence corresponding to the graph structure based on the dK model was captured,and 2K sequences based on the edge betweenness centrality were reordered.According to the result of reordering,the 2K sequence was grouped into several sub-sequences,and each sub-sequence was respectively added with noise by a dK perturbation algorithm.Finally,a social network graph satisfying differential privacy was generated according to the new 2K sequences after integration.Based on the real datasets,the scheme was compared with the classical schemes through simulation experiments.The results demonstrate that it improves the accuracy and usability of data while ensuring desired privacy protection level.…”
Get full text
Article -
15720
Integrability, Variational Principle, Bifurcation, and New Wave Solutions for the Ivancevic Option Pricing Model
Published 2022-01-01“…By using the well-known ARS algorithm, it is demonstrated that this model is not integrable in the Painlevé sense. …”
Get full text
Article