Showing 16,181 - 16,200 results of 19,511 for search '"algorithms"', query time: 0.09s Refine Results
  1. 16181

    Fuzzy-Based Adaptive Countering Method against False Endorsement Insertion Attacks in Wireless Sensor Networks by Hae Young Lee

    Published 2015-07-01
    “…A major benefit of the proposed method is that the fuzzy systems can be optimized automatically by combining a genetic algorithm and a simulation. Thus, users only need to write a model of the WSN to apply the proposed method to a WSN. …”
    Get full text
    Article
  2. 16182

    Optimal Policies for the Pricing and Replenishment of Fashion Apparel considering the Effect of Fashion Level by Qi Chen, Qi Xu, Wenjie Wang

    Published 2019-01-01
    “…First, we provide a framework for fashion apparel by formulating a model that includes both price and demand at different fashion levels. We then provide an algorithm to derive the optimal dynamic pricing strategy and replenishment cycle. …”
    Get full text
    Article
  3. 16183

    An active detection of compromised nodes based on en-route trap in wireless sensor network by Jiang-Tao Wang, Zhi-Xiong Liu

    Published 2021-08-01
    “…A trust model is used to evaluate trust level of neighbor nodes with respect to their authentication behaviors. A detecting algorithm of compromised node is used to detect compromised nodes. …”
    Get full text
    Article
  4. 16184

    From Incoherence to Sustainability: Performance, Activism, and Social Media in the Most Recent Russian Poetry by Kirill Korchagin

    Published 2024-10-01
    “…The central hypothesis of this article is that all of these poets react differently to the methods of discursive organization provided (and enforced) by social networks and strive in different ways to liberate themselves from the censorship of the algorithm: some emphasize the discursive incoherence of the platform, while others, on the contrary, seek to develop a sustainable manner of uniting private discourses into a new totality. …”
    Get full text
    Article
  5. 16185

    Key technologies of satellite communications aided by reconfigurable holographic surfaces by Xinyuan HU, Ruoqi DENG, Boya DI, Hongliang ZHANG, Lingyang SONG

    Published 2022-10-01
    “…Ultra-dense low earth orbit (LEO) satellite communication networks can overcome the scarcity of spectrum resources and the limited coverage of traditional terrestrial networks, and thus have the potential to provide high data rate services and global massive connectivity for terrestrial users.However, due to the high mobility of the satellites, LEO satellite networks put more stringent requirements on antenna technologies in terms of accurate beam steering and high antenna gain.Reconfigurable holographic surface (RHS), as a new type of metamaterial antenna, is investigated to assist LEO satellite communications.The RHS can electronically control the metamaterial units by leveraging the holographic principle to generate desired directional beams.Based on the hardware structure and holographic working principle of RHS, an RHS-assisted multi-satellite communication scheme was proposed, which considered both the LEO satellite tracking scheme and the data transmission scheme.A holographic beamforming optimization algorithm was also designed to maximize the sum rate.Simulation results verify the effectiveness of the proposed scheme and demonstrat that the RHS provids a more cost-effective way to support satellite communications than the conventional phased array antennas.…”
    Get full text
    Article
  6. 16186

    Human Position Detection Based on Depth Camera Image Information in Mechanical Safety by Cheng Zhou, Dacong Ren, Xiangyan Zhang, Cungui Yu, Likai Ju

    Published 2022-01-01
    “…Meanwhile, a human position detection method based on Intel RealSense depth camera and MobileNet-SSD algorithm is proposed and applied to robot safety protection. …”
    Get full text
    Article
  7. 16187

    Research on Dual Security Control for a Non-Linear CPS with Multi-Objective Constraints under DoS Attack and Actuator Fault: An Active-Passive Attack-Tolerant Approach by Li Zhao, Wei Li, Yajie Li

    Published 2022-01-01
    “…Furthermore, a correction compensation algorithm of control quantity is proposed for high-energy DoS attack based on the PID idea to make active-passive attack tolerance more effective. …”
    Get full text
    Article
  8. 16188

    DECODING OF STRUCTURALLY AND LOGICAL CODES by Yu. D. Ivanov, I. N. Nikolov, B. V. Lozka

    Published 2016-07-01
    “…There are shown the basic points of the generalized algorithm of decoding SLC, which is based on the method of perfect matrix arrangement (PMA) of the n-dimensional cube vertices for adequate representation and transformation of boolean functions, which is based on the method of generating sequences of variables for building the maximum coverage of the cube vertices. …”
    Get full text
    Article
  9. 16189

    Distributed trust management scheme based on blockchain in Internet of vehicles by Haibo ZHANG, Yukun CAO, Kaijian LIU, Ruyan WANG

    Published 2023-05-01
    “…Aiming at the security problems caused by the low efficiency and accuracy of malicious vehicle identification in Internet of vehicles, a distributed trust management scheme based on blockchain in Internet of vehicles was proposed.A false information identification strategy was designed by aggregating the scoring information of vehicles, combined with Bayesian inference model.A reputation value updating algorithm was designed by combining the historical interaction information of vehicles and traffic information, malicious vehicles were identified by the reputation threshold.A blockchain was constructed roadside units to realize the distributed storage of traffic data and vehicle reputation values.The traditional proof of work consensus mechanism was improved to dynamically change the difficulty of miner node generating a block through the event level and the number of vehicles involved in scoring, and the waiting mechanism was used to temporarily stop the nodes that had recently blocked from participating in the election process of miner nodes, thus reducing the resource consumption caused by repeated calculations.The simulation results show that the proposed scheme can effectively identify false information, resist the deceptive behavior of malicious vehicles, improve the identification efficiency of malicious vehicles, reduce resource consumption, and is effective and feasible in distributed trust management for Internet of vehicles.…”
    Get full text
    Article
  10. 16190

    TOPOLOGY OPTIMIZATION DESIGN METHOD FOR HINGE-FREE MULTI-INPUT MULTI-OUTPUT COMPLIANT MECHANISMS UNDER BUCKLING CONSTRAINTS (MT) by GAN Wei, RONG JianHua, ZHAO Lei, HE YiFan, LI ZhengWei, ZHOU Quan

    Published 2022-01-01
    “…Then, the sensitivities of the objective function and buckling constraints are derived, and the MMA algorithm is adopted to optimize the topology optimization model. …”
    Get full text
    Article
  11. 16191

    Proxy re-encryption based multi-factor access control scheme in cloud by Mang SU, Guozhen SHI, Anmin FU, Yan YU, Wei JIN

    Published 2018-02-01
    “…Cloud computing is one of the space-ground integration information network applications.Users can access data and retrieve service easily and quickly in cloud.The confidentiality and integrity of the data cloud have a direct correspondence to data security of the space-ground integration information network.Thus the data in cloud is transferred with encrypted form to protect the information.As an important technology of cloud security,access control should take account of multi-factor and cipher text to satisfy the complex requirement for cloud data protection.Based on this,a proxy re-encryption based multi-factor access control (PRE-MFAC) scheme was proposed.Firstly,the aims and assumptions of PRE-MFAC were given.Secondly,the system model and algorithm was defined.Finally,the security and properties of PRE-MFAC were analyzed.The proposed scheme has combined the PRE and multi-factor access control together and realized the multi-factor permission management of cipher text in cloud.Meanwhile,it can make the best possible use of cloud in computing and storing,then reduce the difficulty of personal user in cryptographic computing and key managing.…”
    Get full text
    Article
  12. 16192

    Optimal Design and Analysis of Traction Steering Mechanism for Loading Transport Vehicle by Ruochao Wang, Zhikuan Yin, Zisheng Liu, Zijue Wang, Taiming Zhang, Jiantao Yao

    Published 2021-05-01
    “…A trapezoidal traction steering mechanism based on Ackerman principle is designed, and uses the sequential quadratic programming genetic algorithm in multivariate nonlinear programming to optimize the specific dimensions of the trapezoidal traction steering mechanism, the size parameters which more satisfy the Ackerman principle are obtained. …”
    Get full text
    Article
  13. 16193

    Robotic Vision with the Conformal Camera: Modeling Perisaccadic Perception by Jacek Turski

    Published 2010-01-01
    “…Here, the related neuroscience background is presented, effectiveness of the conformal camera's non-Euclidean geometry in intermediate-level vision is discussed, and the algorithmic steps in modeling perisaccadic perception with PFT are proposed. …”
    Get full text
    Article
  14. 16194

    DFDA-AD: An Approach with Dual Feature Extraction Architecture and Dual Attention Mechanism for Image Anomaly Detection by Babak Masoudi

    Published 2024-12-01
    “…Two attention mechanisms are improved and developed in this paper, which provide more important feature maps for clustering by K-means algorithm. The evaluation of the model's performance was done on the MVTec AD data set, and the results of the evaluations for anomaly detection and localization were satisfactory compared to several other approaches that have been recently proposed.…”
    Get full text
    Article
  15. 16195

    DYNAMIC LOAD SIMULATION OF 4WD SUV AND FATIGUE LIFE ANALYSIS OF FRAME by GE WenTao, LIU Zhou, DUAN LongYang, JIA HuiFang, GONG ChunHui

    Published 2019-01-01
    “…The fatigue life of frame has been predicted by applying Miner Counting Algorithm for Acuminated Fatigue Analysis,the analysis result has shown that the fatigue life can satisfy the target,and the vehicle has ultimately passed the durability validation of proving ground,which has shown that the analysis result is accorded with the test.…”
    Get full text
    Article
  16. 16196

    Adaptive channel status based access class barring scheme for traffic emergency communication by Jiao WANG, Gongan QIU, Shibing ZHANG

    Published 2022-01-01
    “…In high-density cellular vehicle-to-everything (C-V2X), effective massive access method of cluster communications is the basis to assure the performance index for different services and enhance the spectrum efficiency under limited resource.An improved access class barring (ACB) scheme was proposed using channel status information based on computing power of communication terminal in C-V2X.The base station estimated the communication density within its cover range, generated the ACB factor using the communication density, and broadcasted the ACB.According to signal to interference plus noise ratio (SINR) and ACB factor of the received broadcast signal, the vehicular communication terminal computed the access probability, and compared with ACB factor.When the access probability was more than the ACB factor, the terminal selected a preamble randomly from the preamble pool with the probability which equal to the access probability or one.The terminal transmited the selected preamble to the base station for finishing the access program.The simulation results show that the scheme proposed has 5%~20% advantage over S-Aloha and machine to machine opportunistic splitting algorithm (M2M-OSA) schemes in average access collision probability.It reduces the average access delay effectively.…”
    Get full text
    Article
  17. 16197

    Privacy protection scheme for internet of vehicles based on homomorphic encryption and block chain technology by Ruijin WANG, Yucheng TANG, Weiqi ZHANG, Fengli ZHANG

    Published 2020-02-01
    “…In order to solve the problem that the security of traditional internet of vehicles devices is relatively low,which may threaten the privacy of users,a privacy protection scheme based on homomorphic encryption and block chain technology was proposed.This scheme added the authentication service composed of two level nodes to the proposed model to realize the permission control of roles in the model.In order to record the information of the internet of vehicles devices,a new block data structure based on homomorphic encryption (HEBDS) was proposed,which enabled the privacy data to be written into the block after being processed by the Paillier encryption algorithm,and then written into the blockchain network by the gateway node obtaining the accounting right.This scheme realized the data processing in ciphertext state,and made up for the shortage of all data disclosure in blockchain network.Through the analysis of the security of the scheme,it is proved that the scheme has the characteristics of unforgeability and privacy data security.Through homomorphic encryption of privacy data and upload to blockchain network,the scheme can distribute,share and calculate privacy data in ciphertext state,which can protect customer privacy more effectively than traditional internet of vehicles model.…”
    Get full text
    Article
  18. 16198

    Smolyak-Grid-Based Flutter Analysis with the Stochastic Aerodynamic Uncertainty by Yuting Dai, Chao Yang

    Published 2014-01-01
    “…In order to enhance the computational efficiency, the integration algorithm, namely, Smolyak sparse grids, was employed to calculate the coefficients of the stochastic polynomial basis. …”
    Get full text
    Article
  19. 16199

    Faster-than-Clifford simulations of entanglement purification circuits and their full-stack optimization by Vaishnavi L. Addala, Shu Ge, Stefan Krastanov

    Published 2025-01-01
    “…We develop a simulation algorithm for distillation circuits with per-gate complexity of $${\mathcal{O}}(1)$$ O ( 1 ) , drastically faster than $${\mathcal{O}}(N)$$ O ( N ) Clifford simulators or $${\mathcal{O}}({2}^{N})$$ O ( 2 N ) wavefunction simulators over N qubits. …”
    Get full text
    Article
  20. 16200

    Task-dependent Optimal Weight Combinations for Static Embeddings by Nathaniel Robinson, Nathaniel Carlson, David Mortensen, Elizabeth Vargas, Thomas Fackrell, Nancy Fulda

    Published 2022-11-01
    “…We provide a theoretical basis for weighting one set of embeddings more than the other according to the algorithm and task. We apply our findings to improve accuracy in applications of cross-lingual alignment and navigational knowledge by up to 15.2%. …”
    Get full text
    Article