Showing 15,701 - 15,720 results of 19,511 for search '"algorithms"', query time: 0.09s Refine Results
  1. 15701

    Shape similarity differential privacy trajectory protection mechanism based on relative entropy and K-means by Suxia ZHU, Shulun LIU, Guanglu SUN

    Published 2021-02-01
    “…To solve the problem that most studies had not fully considered the sensitivity of location to privacy budget and the influence of trajectory shape, which made the usability of published trajectory poor, a shape similarity differential privacy trajectory protection mechanism based on relative entropy and K-means was proposed.Firstly, according to the topological relationship of geographic space, relative entropy was used to calculate the sensitivity of real location to privacy budget, a real-time calculation method of location sensitive privacy level was designed, and a new privacy model was built in combination with differential privacy budget.Secondly, K-means algorithm was used to cluster the release position to obtain the release position set that was most similar to the real position direction, and Fréchet distance was introduced to measure the similarity between the release track and the real track, so as to improve the availability of the release track.Experiments on real data sets show that the proposed trajectory protection mechanism has obvious advantages in trajectory availability compared with others.…”
    Get full text
    Article
  2. 15702

    Restoration Strategy Based on Optimal Relay Node Placement in Wireless Sensor Networks by Xiaoding Wang, Li Xu, Shuming Zhou

    Published 2015-07-01
    “…In this paper, we propose a distributed restoration algorithm based on optimal relay node placement (simply, ORNP). …”
    Get full text
    Article
  3. 15703

    Multi-objective Optimal Design of RV-550E Reducer Cycloid Gear Profile Modification by Wang Quan, Qin Zhengzheng, Zhao Daxing, Wang Jun, Chen Zhilong, Yan Zicheng

    Published 2018-01-01
    “…A multiobjective optimization model with considering the meshing characteristics of the cycloidal gear and the contact force of the tooth surface is established. The NSGA-Ⅱ algorithm is used to solve the multi-objective optimal problem,and compared with the optimal method of the least contact force of the tooth surface of the cycloidal gear. …”
    Get full text
    Article
  4. 15704

    Layout and Optimization of Urban Stormwater Management Measure: A Review by LIU Jie, SHANG Yuchang, ZHANG Xiang, GUI Haijiao

    Published 2024-10-01
    “…By analyzing the relevant literature at home and abroad, this paper clarifies the relevant definition and content scope of the layout optimization of urban stormwater management measures, constructs the whole process structure including pre-preparation, model algorithm, post-evaluation and decision-making of the layout optimization of stormwater management measures, systematically analyzes relevant information of each step of layout optimization, explores current research status and gaps of each part of the framework, and puts forward suggestions for more scientific layout optimization. …”
    Get full text
    Article
  5. 15705

    Design and Motion Control of a Novel Weak-coupling Parallel Hip-joint Rehabilitation Mechanism by Xing Jiyuan, Xu Jilong, Liu Fucai

    Published 2024-06-01
    “…The parameters of controllers are adaptively adjusted online using the fuzzy algorithm. The simulation and experiment results show that the fuzzy adaptive PD controller has fast response speed and good tracking effect.…”
    Get full text
    Article
  6. 15706

    APPLICATION OF SEMI SUPERVISED LAPLACE SCORE IN ROLLING BEARING FAULT DIAGNOSIS (MT) by LIANG Chuang, CHEN ChangZheng, LIU Ye, JIA XinYing

    Published 2023-01-01
    “…At the same time, particle swarm optimization-based support vector machine(PSO-SVM) algorithm is used for fault classification. Finally, the model is applied to the process of experimental data analysis. …”
    Get full text
    Article
  7. 15707

    Matching and Optimization for the Parameter of Electric City Vehicle Powertrain by Li Wenwen, Sun Houhuan, Xu Xiaowen

    Published 2017-01-01
    “…Under the double pressures of energy crisis and environmental problems,the governments and the automobile enterprises have paid much attention to the pure electric vehicle which has advantages of zero emission,low noise and wide range of energy sources.Electric car is not very different from conventional cars,whether in the main structure or in the appearance.The main change is made in terms of drivetrain.Taking the pure electric city car as our research target,the power transmission system parameter is analyzed and designed,according to the vehicle parameters,power and economy requirements,the vehicle power system parameter is matched.The matched parameters of power system preliminarily is optimized from improving the transmission efficiency,taking the shortest time of acceleration and working conditions driving range maximum as optimization goal.The fitness function of transmission speed ratio is constituted of objective function and constraints condition by using a penalty function.The optimization is carried out by genetic algorithm,the optimal parameters of power system are obtained.…”
    Get full text
    Article
  8. 15708

    Privacy cloud storage scheme based on fog computing by Jiyuan ZHOU, Hao LUO, Lei QIU, Tian WANG

    Published 2019-03-01
    “…As one of the core applications in cloud computing field,cloud storage attracts a large number of users depending on its powerful storage capacity.However,in this storage schema,users’ data is stored completely in cloud server.In other word,users’ right of control on data is lost and users are facing privacy leakage risk.Traditional privacy protection scheme is usually based on encryption technology,but the attack from the inside of cloud server can’t be resisted effectively by these kinds of methods.Once the password gets compromised,users’ data will be stolen.In order to solve this problem,a three-level secure cloud storage scheme based on fog computing was proposed and a Hash-Solomon code algorithm was designed.A small part of data was stored in local machine and fog server,which can take full advantage of cloud storage and protect the privacy of data.Through the theoretical safety analysis and experimental test,the feasibility of our scheme is proved,and it is really a powerful supplement to existing cloud storage scheme.…”
    Get full text
    Article
  9. 15709

    Finite Element Analysis of Automobile Axle Housing based on Internet-driven Collaborative Design Theory by Zhu Jianliu

    Published 2015-01-01
    “…In order to solve the problems of traditional automobile axle housing design and analysis of wide object space distribution,difficult collaborative design and poor interaction performance,a multiple analytic encoded method based on discrete wavelet transform algorithm to the compress axle housing data is used,and then a shared network drive collaborative hybrid system architecture to share and protect the axle housing analyze compressed data is created,a finite element analysis system of network drive cooperative automobile axle housing is combined with JSP.Servlet technology with secondary development of finite element and the numerical computing systems is built.Taking the Dongfeng hercules series axle dump truck as the research object,the model strength,deformation and life characteristics are studied.The results show that the finite element method and technical route based on network collaborative design theory has certain feasibility,which can overcome wide distribution,difficult collaborative design and interaction and poor performance,and the product into production efficiency can be improved and the production cost can be reduced.…”
    Get full text
    Article
  10. 15710

    Novel Feature Selection Method for Nonlinear Support Vector Regression by Kejia Xu, Ying Xu, Yafen Ye, Weijie Chen

    Published 2022-01-01
    “…FS-NSVR is a challenging mixed-integer programming problem that is solved efficiently by using an alternate iterative greedy algorithm. Experimental results on three artificial datasets and five real-world datasets confirm that FS-NSVR effectively selects representative features and discards redundant features in a nonlinear system. …”
    Get full text
    Article
  11. 15711

    Design of nodes importance assessment method for complex network based on neighborhood information by Xing LI, Jie ZHAN, Baoquan REN, Siqi ZHU

    Published 2024-03-01
    “…Accurate identification of influential nodes in complex networks is crucial for network management and network security.The local centrality method is concise and easy to use, but ignores the topological relationship between neighboring nodes and cannot provide globally optimal results.A node importance assessment method was proposed to correlate the node edge relationship and topology, which firstly applied the H-index and information entropy to assess the nodes, then combined the structural holes of the nodes with the structural characteristics of the nodes, and took into account the attribute of “bridging” while focusing on the node’s own quality and the amount of information about the neighboring nodes.The algorithm was validated by simulating the propagation process using the SIR model, and the Kendall correlation coefficient, complementary cumulative distribution function and propagation influence were applied to validate the validity and applicability of the method.Comparison of the experimental results on six real network datasets shows that the proposed method is more accurate than the traditional centrality methods in identifying and ordering the key nodes in the network.…”
    Get full text
    Article
  12. 15712

    Problems of bias and discrimination of human capital in artificial intelligence systems by E. V. Kashtanova, A. S. Lobacheva

    Published 2024-05-01
    “…The main purpose of writing this work is to study the question of how the use of AI and algorithmic solutions aggravates the problem of bias and discrimination of human capital which is inevitably associated with the emergence of AI. …”
    Get full text
    Article
  13. 15713

    Mathematical Modeling of Static Data Attribute Encryption Based on Big Data Technology by Yutang Liu, Qin Zhang

    Published 2022-01-01
    “…The big data redundancy elimination algorithm based on similarity calculation is analyzed. …”
    Get full text
    Article
  14. 15714

    Decoupling design and kinematic analysis of rope driven flexible wheelchair manipulators by WANG Lu, ZHAO Dongjie, ZHANG Weitao, WANG Yini, ZHANG Kun

    Published 2025-01-01
    “…A simulation model based on Adams virtual prototype was established.ResultsBy comparing with the numerical simulation results of Matlab software, the accuracy of the kinematic algorithm is verified, which provides a basis for the subsequent motion control of the manipulator.…”
    Get full text
    Article
  15. 15715

    Investigation of traffic adaptation based interference alignment for cognitive radio networks by Heng DONG, Rong-fang SONG

    Published 2014-04-01
    “…To effec-tively construct the beam-forming and interference suppression matrix for IA, then not only derive an adaptive closed-form algorithm, but its average degrees of freedom (d.o.f) were also analyzed with random traffic load model and a lower bound is given as well. …”
    Get full text
    Article
  16. 15716

    Two Iterative Methods for Solving Linear Interval Systems by Esmaeil Siahlooei, Seyed Abolfazl Shahzadeh Fazeli

    Published 2018-01-01
    “…Our method is based on conjugate gradient algorithm in the context view of interval numbers. …”
    Get full text
    Article
  17. 15717

    Task domain independent speech keyword detection system by HAN Jiang, LIU Xiao-xing, YAN Yong-hong, ZHANG Peng-yuan

    Published 2006-01-01
    “…A multiple scale acoustic modeling framework for task-domain independent keyword spotting was proposed.A large-scale phoneme set was obtained automatically through decision-tree based phoneme clustering,and a large-scale phoneme acoustic context dependent background model was trained accordingly through using standard HMM training framework.The modeling accuracy for filler speech is improved.Under the framework,an efficient searching space construction through using shared HMM state was also described.Experimental results showed that in average absolute 6.9% improvement of keyword recognition accuracy could be obtained.Furthermore an acoustic context neighbor algorithm to measure acoustic confidence and a method of computing candidate keyword likelihood based on proposed multiple-scale acoustic model were proposed and a fusing method based on FLDA was adopted.The effectiveness of acoustic confidence measure is improved significantly.Experimental results showed that absolute 3.0% reduction of equal error rate could be obtained.…”
    Get full text
    Article
  18. 15718

    CCA-secure verifiable Mix-Net protocol by Long-hai LI, Cheng-qiang HUANG, Shang-mei XU, Shao-feng FU

    Published 2015-10-01
    “…A CCA-secure verifiable Mix-Net protocol with provable security was proposed.The protocol was based on Wikström’s Mix-Net and improves its security by introducing an improved key generation algorithm and a new method for constructing proof of secret shuffling.Without revealing the correspondence between inputs and outputs,proposed protocol enables everyone to verify the correctness of output plaintexts through checking evidences broadcasted by each server.Thus,it satisfies public verifiability.Any sender can trace and examine the processing procedure of its ciphertext.Thus,proposed protocol satisfies sender verifiability.It is prored to be CCA-secure under the assumption of random oracle.Compared with previous mix-net schemes which are CCA-secure,proposed protocol does not require any trusted center,and incurs fewer interactions between servers which also resulting in a lower computation and communication complexity.Hence,the protocol is an ideal cryptographic tool for constructing secure electronic election protocol.…”
    Get full text
    Article
  19. 15719

    Differential privacy protection scheme based on edge betweenness model by Haiping HUANG, Kai WANG, Xiong TANG, Dongjun ZHANG

    Published 2019-05-01
    “…With the continuous development of social network application,user’s personal social data is so sensitive that the problem of privacy protection needs to be solved urgently.In order to reduce the network data sensitivity,a differential privacy protection scheme BCPA based on edge betweenness model was proposed.The 2K sequence corresponding to the graph structure based on the dK model was captured,and 2K sequences based on the edge betweenness centrality were reordered.According to the result of reordering,the 2K sequence was grouped into several sub-sequences,and each sub-sequence was respectively added with noise by a dK perturbation algorithm.Finally,a social network graph satisfying differential privacy was generated according to the new 2K sequences after integration.Based on the real datasets,the scheme was compared with the classical schemes through simulation experiments.The results demonstrate that it improves the accuracy and usability of data while ensuring desired privacy protection level.…”
    Get full text
    Article
  20. 15720

    Integrability, Variational Principle, Bifurcation, and New Wave Solutions for the Ivancevic Option Pricing Model by A. A. Elmandouh, M. E. Elbrolosy

    Published 2022-01-01
    “…By using the well-known ARS algorithm, it is demonstrated that this model is not integrable in the Painlevé sense. …”
    Get full text
    Article