-
16181
Fuzzy-Based Adaptive Countering Method against False Endorsement Insertion Attacks in Wireless Sensor Networks
Published 2015-07-01“…A major benefit of the proposed method is that the fuzzy systems can be optimized automatically by combining a genetic algorithm and a simulation. Thus, users only need to write a model of the WSN to apply the proposed method to a WSN. …”
Get full text
Article -
16182
Optimal Policies for the Pricing and Replenishment of Fashion Apparel considering the Effect of Fashion Level
Published 2019-01-01“…First, we provide a framework for fashion apparel by formulating a model that includes both price and demand at different fashion levels. We then provide an algorithm to derive the optimal dynamic pricing strategy and replenishment cycle. …”
Get full text
Article -
16183
An active detection of compromised nodes based on en-route trap in wireless sensor network
Published 2021-08-01“…A trust model is used to evaluate trust level of neighbor nodes with respect to their authentication behaviors. A detecting algorithm of compromised node is used to detect compromised nodes. …”
Get full text
Article -
16184
From Incoherence to Sustainability: Performance, Activism, and Social Media in the Most Recent Russian Poetry
Published 2024-10-01“…The central hypothesis of this article is that all of these poets react differently to the methods of discursive organization provided (and enforced) by social networks and strive in different ways to liberate themselves from the censorship of the algorithm: some emphasize the discursive incoherence of the platform, while others, on the contrary, seek to develop a sustainable manner of uniting private discourses into a new totality. …”
Get full text
Article -
16185
Key technologies of satellite communications aided by reconfigurable holographic surfaces
Published 2022-10-01“…Ultra-dense low earth orbit (LEO) satellite communication networks can overcome the scarcity of spectrum resources and the limited coverage of traditional terrestrial networks, and thus have the potential to provide high data rate services and global massive connectivity for terrestrial users.However, due to the high mobility of the satellites, LEO satellite networks put more stringent requirements on antenna technologies in terms of accurate beam steering and high antenna gain.Reconfigurable holographic surface (RHS), as a new type of metamaterial antenna, is investigated to assist LEO satellite communications.The RHS can electronically control the metamaterial units by leveraging the holographic principle to generate desired directional beams.Based on the hardware structure and holographic working principle of RHS, an RHS-assisted multi-satellite communication scheme was proposed, which considered both the LEO satellite tracking scheme and the data transmission scheme.A holographic beamforming optimization algorithm was also designed to maximize the sum rate.Simulation results verify the effectiveness of the proposed scheme and demonstrat that the RHS provids a more cost-effective way to support satellite communications than the conventional phased array antennas.…”
Get full text
Article -
16186
Human Position Detection Based on Depth Camera Image Information in Mechanical Safety
Published 2022-01-01“…Meanwhile, a human position detection method based on Intel RealSense depth camera and MobileNet-SSD algorithm is proposed and applied to robot safety protection. …”
Get full text
Article -
16187
Research on Dual Security Control for a Non-Linear CPS with Multi-Objective Constraints under DoS Attack and Actuator Fault: An Active-Passive Attack-Tolerant Approach
Published 2022-01-01“…Furthermore, a correction compensation algorithm of control quantity is proposed for high-energy DoS attack based on the PID idea to make active-passive attack tolerance more effective. …”
Get full text
Article -
16188
DECODING OF STRUCTURALLY AND LOGICAL CODES
Published 2016-07-01“…There are shown the basic points of the generalized algorithm of decoding SLC, which is based on the method of perfect matrix arrangement (PMA) of the n-dimensional cube vertices for adequate representation and transformation of boolean functions, which is based on the method of generating sequences of variables for building the maximum coverage of the cube vertices. …”
Get full text
Article -
16189
Distributed trust management scheme based on blockchain in Internet of vehicles
Published 2023-05-01“…Aiming at the security problems caused by the low efficiency and accuracy of malicious vehicle identification in Internet of vehicles, a distributed trust management scheme based on blockchain in Internet of vehicles was proposed.A false information identification strategy was designed by aggregating the scoring information of vehicles, combined with Bayesian inference model.A reputation value updating algorithm was designed by combining the historical interaction information of vehicles and traffic information, malicious vehicles were identified by the reputation threshold.A blockchain was constructed roadside units to realize the distributed storage of traffic data and vehicle reputation values.The traditional proof of work consensus mechanism was improved to dynamically change the difficulty of miner node generating a block through the event level and the number of vehicles involved in scoring, and the waiting mechanism was used to temporarily stop the nodes that had recently blocked from participating in the election process of miner nodes, thus reducing the resource consumption caused by repeated calculations.The simulation results show that the proposed scheme can effectively identify false information, resist the deceptive behavior of malicious vehicles, improve the identification efficiency of malicious vehicles, reduce resource consumption, and is effective and feasible in distributed trust management for Internet of vehicles.…”
Get full text
Article -
16190
TOPOLOGY OPTIMIZATION DESIGN METHOD FOR HINGE-FREE MULTI-INPUT MULTI-OUTPUT COMPLIANT MECHANISMS UNDER BUCKLING CONSTRAINTS (MT)
Published 2022-01-01“…Then, the sensitivities of the objective function and buckling constraints are derived, and the MMA algorithm is adopted to optimize the topology optimization model. …”
Get full text
Article -
16191
Proxy re-encryption based multi-factor access control scheme in cloud
Published 2018-02-01“…Cloud computing is one of the space-ground integration information network applications.Users can access data and retrieve service easily and quickly in cloud.The confidentiality and integrity of the data cloud have a direct correspondence to data security of the space-ground integration information network.Thus the data in cloud is transferred with encrypted form to protect the information.As an important technology of cloud security,access control should take account of multi-factor and cipher text to satisfy the complex requirement for cloud data protection.Based on this,a proxy re-encryption based multi-factor access control (PRE-MFAC) scheme was proposed.Firstly,the aims and assumptions of PRE-MFAC were given.Secondly,the system model and algorithm was defined.Finally,the security and properties of PRE-MFAC were analyzed.The proposed scheme has combined the PRE and multi-factor access control together and realized the multi-factor permission management of cipher text in cloud.Meanwhile,it can make the best possible use of cloud in computing and storing,then reduce the difficulty of personal user in cryptographic computing and key managing.…”
Get full text
Article -
16192
Optimal Design and Analysis of Traction Steering Mechanism for Loading Transport Vehicle
Published 2021-05-01“…A trapezoidal traction steering mechanism based on Ackerman principle is designed, and uses the sequential quadratic programming genetic algorithm in multivariate nonlinear programming to optimize the specific dimensions of the trapezoidal traction steering mechanism, the size parameters which more satisfy the Ackerman principle are obtained. …”
Get full text
Article -
16193
Robotic Vision with the Conformal Camera: Modeling Perisaccadic Perception
Published 2010-01-01“…Here, the related neuroscience background is presented, effectiveness of the conformal camera's non-Euclidean geometry in intermediate-level vision is discussed, and the algorithmic steps in modeling perisaccadic perception with PFT are proposed. …”
Get full text
Article -
16194
DFDA-AD: An Approach with Dual Feature Extraction Architecture and Dual Attention Mechanism for Image Anomaly Detection
Published 2024-12-01“…Two attention mechanisms are improved and developed in this paper, which provide more important feature maps for clustering by K-means algorithm. The evaluation of the model's performance was done on the MVTec AD data set, and the results of the evaluations for anomaly detection and localization were satisfactory compared to several other approaches that have been recently proposed.…”
Get full text
Article -
16195
DYNAMIC LOAD SIMULATION OF 4WD SUV AND FATIGUE LIFE ANALYSIS OF FRAME
Published 2019-01-01“…The fatigue life of frame has been predicted by applying Miner Counting Algorithm for Acuminated Fatigue Analysis,the analysis result has shown that the fatigue life can satisfy the target,and the vehicle has ultimately passed the durability validation of proving ground,which has shown that the analysis result is accorded with the test.…”
Get full text
Article -
16196
Adaptive channel status based access class barring scheme for traffic emergency communication
Published 2022-01-01“…In high-density cellular vehicle-to-everything (C-V2X), effective massive access method of cluster communications is the basis to assure the performance index for different services and enhance the spectrum efficiency under limited resource.An improved access class barring (ACB) scheme was proposed using channel status information based on computing power of communication terminal in C-V2X.The base station estimated the communication density within its cover range, generated the ACB factor using the communication density, and broadcasted the ACB.According to signal to interference plus noise ratio (SINR) and ACB factor of the received broadcast signal, the vehicular communication terminal computed the access probability, and compared with ACB factor.When the access probability was more than the ACB factor, the terminal selected a preamble randomly from the preamble pool with the probability which equal to the access probability or one.The terminal transmited the selected preamble to the base station for finishing the access program.The simulation results show that the scheme proposed has 5%~20% advantage over S-Aloha and machine to machine opportunistic splitting algorithm (M2M-OSA) schemes in average access collision probability.It reduces the average access delay effectively.…”
Get full text
Article -
16197
Privacy protection scheme for internet of vehicles based on homomorphic encryption and block chain technology
Published 2020-02-01“…In order to solve the problem that the security of traditional internet of vehicles devices is relatively low,which may threaten the privacy of users,a privacy protection scheme based on homomorphic encryption and block chain technology was proposed.This scheme added the authentication service composed of two level nodes to the proposed model to realize the permission control of roles in the model.In order to record the information of the internet of vehicles devices,a new block data structure based on homomorphic encryption (HEBDS) was proposed,which enabled the privacy data to be written into the block after being processed by the Paillier encryption algorithm,and then written into the blockchain network by the gateway node obtaining the accounting right.This scheme realized the data processing in ciphertext state,and made up for the shortage of all data disclosure in blockchain network.Through the analysis of the security of the scheme,it is proved that the scheme has the characteristics of unforgeability and privacy data security.Through homomorphic encryption of privacy data and upload to blockchain network,the scheme can distribute,share and calculate privacy data in ciphertext state,which can protect customer privacy more effectively than traditional internet of vehicles model.…”
Get full text
Article -
16198
Smolyak-Grid-Based Flutter Analysis with the Stochastic Aerodynamic Uncertainty
Published 2014-01-01“…In order to enhance the computational efficiency, the integration algorithm, namely, Smolyak sparse grids, was employed to calculate the coefficients of the stochastic polynomial basis. …”
Get full text
Article -
16199
Faster-than-Clifford simulations of entanglement purification circuits and their full-stack optimization
Published 2025-01-01“…We develop a simulation algorithm for distillation circuits with per-gate complexity of $${\mathcal{O}}(1)$$ O ( 1 ) , drastically faster than $${\mathcal{O}}(N)$$ O ( N ) Clifford simulators or $${\mathcal{O}}({2}^{N})$$ O ( 2 N ) wavefunction simulators over N qubits. …”
Get full text
Article -
16200
Task-dependent Optimal Weight Combinations for Static Embeddings
Published 2022-11-01“…We provide a theoretical basis for weighting one set of embeddings more than the other according to the algorithm and task. We apply our findings to improve accuracy in applications of cross-lingual alignment and navigational knowledge by up to 15.2%. …”
Get full text
Article