Showing 16,241 - 16,260 results of 19,511 for search '"algorithms"', query time: 0.10s Refine Results
  1. 16241

    Secure and collaborative spectrum sensing scheme based on audit game by Yuntao WANG, Zhou SU, Qichao XU, Yiliang LIU, Haixia PENG, Hao LUAN

    Published 2023-12-01
    “…To defend against poisoning attacks and free-riding attacks conducted by malicious sensing terminals in crowd sensing-based collaborative spectrum sensing (CCSS), a novel audit game-based defense scheme was proposed, which combined the pre-deterrence and post-punishment mechanisms.Firstly, considering the audit budget constraint, a mixed-strategy audit game model under incomplete information was designed, which set a penalty strategy to deter malicious collaborators before spectrum sensing, and audited and punished them after the fusion of sensing data.Then, a lightweight audit chain model with on-chain and off-chain collaboration was designed, in which audit evidence was stored in an off-chain data warehouse and its metadata was publicly published on the blockchain.Furthermore, a distributed and intelligent audit algorithm based on reinforcement learning was devised to adaptively seek the approximate mix-strategy equilibrium of the audit game.Simulation results demonstrate that the proposed scheme can quickly obtain the stable and approximately optimal audit strategies and actively suppress the poisoning and free-riding behaviors of malicious collaborators, in comparison with conventional schemes.…”
    Get full text
    Article
  2. 16242

    Elliptic-Curve Cryptography Implementation on RISC-V Processors for Internet of Things Applications by Preethi Preethi, Mohammed Mujeer Ulla, G. Praveen Kumar Yadav, Kumar Sekhar Roy, Ruhul Amin Hazarika, Kuldeep Saxena K.

    Published 2024-01-01
    “…In this study, the implementation and analyze the Elliptic Curve Digital Signature Algorithm (ECDSA) with NIST-256 on MicroBlaze processors based on RISC-V architecture. …”
    Get full text
    Article
  3. 16243

    Establishment and performance analysis of RIS-assisted coded relay cooperation system based on LDPC product codes by Shunwai ZHANG, Jin WANG

    Published 2023-11-01
    “…To pursue the ultra-reliable information transmission, the system which combined the reconfigurable intelligent surface (RIS) technology and coded relay cooperation technology was investigated.The RIS-assisted coded relay cooperation system model based on low density parity check (LDPC) product codes was established.Based on LDPC product codes, the information matrix was row-encoded by the source node and column-encoded by the relay node, respectively.An efficient joint iterative decoding algorithm was proposed.The two received signals at the destination were row-decoded and column-decoded iteratively to update the logarithmic likelihood ratios of information bits, and then the decoding decision was made.The closed-form solutions of the outage probability and the channel capacity with finite codelength were theoretically derived.Theoretical analysis and simulation results show that the proposed system obviously outperforms the traditional coded relay cooperation.The more number of RIS elements, the more significant advantage can be obtained.Simulation results also demonstrate that the channel capacity with finite codelength approaches the ideal channel capacity with the codelength of LDPC product codes increasing.…”
    Get full text
    Article
  4. 16244

    Application of Variational Mode Decomposition and Multiscale Permutation Entropy in Rolling Bearing Failure Analysis by Haorui Liu, Haijun Li, Rongyan Wang, Hengwei Zhu, Jianchen Zhang

    Published 2022-01-01
    “…The training samples and test samples of each IMF are constructed, and then the support vector machine (SVM) and the K-nearest neighbor algorithm (KNN) are used to identify the faults. The test results of the IMF components are used to determine the classification results combined with the maximum attribution index. …”
    Get full text
    Article
  5. 16245

    Study on multi-satellite cooperative spectrum cognitive method integrating Stackelberg game and federated learning by Xiaojin DING, Yehui XU, Wen BAO, Gengxin ZHANG

    Published 2024-02-01
    “…To solve the problem of the weak spectrum-cognitive ability caused by monitoring angle, direction resolution, limited processing ability and peak power for a low-earth-orbit (LEO) satellite, a multi-satellite cooperative spectrum cognitive method integrating Stackelberg game and federated learning was proposed.Firstly, considering the available computing resource, cognitive performance, processing and transmission delay of each spectrum cognitive satellite, a cooperative-satellite selection and computing-resource allocation algorithm was built for multiple spectrum-cognitive tasks.Secondly, based on the selected satellites and the allocated computing resources, a low-complexity multi-satellite cooperative spectrum cognitive strategy was further designed, which could automatically sense the spectrum holes, and detect interference as well as identify the modulation mode.Simulation results demonstrate that compared to the single-node cognitive method, the designed multi-satellite cooperative spectrum cognitive strategy can obtain a better cognitive performance.Moreover, comparing with the existing model, the model utilized in the designed strategy can effectively achieve 96.69% and 93.32% lower number of parameters and required floating point operations per second, whilst maintaining the performance.…”
    Get full text
    Article
  6. 16246

    Active Learning for Constrained Document Clustering with Uncertainty Region by M. A. Balafar, R. Hazratgholizadeh, M. R. F. Derakhshi

    Published 2020-01-01
    “…In this paper, a new constrained clustering algorithm is proposed and some of the informative data pairs are selected during an iterative process. …”
    Get full text
    Article
  7. 16247

    Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage by ZHANG Kejun, WANG Wenbin, XU Shaofei, YU Xinying, WANG Jun, LI Pengcheng, QIAN Rong

    Published 2024-09-01
    “…A blockchain-based verification algorithm was designed to detect tampering of third-party data. …”
    Get full text
    Article
  8. 16248

    Credit Index Screening Model of Family Farms and Family Ranches Based on Fuzzy Bayesian Theory of Depth Weighting by Zhanjiang Li, Qinjin Zhang

    Published 2022-01-01
    “…In this paper, based on the depth-weighted Bayesian theory and fuzzy mathematics, the improved depth-weighted fuzzy Bayesian hybrid algorithm model is proposed to solve the unbalanced problem of default status of family farm and pasture and to build the index system with the ability of three categories of default identification. …”
    Get full text
    Article
  9. 16249

    MM-LoRa-Mod: A non-coherent LoRa modulation scheme for underwater acoustic communications by YU Xiao, XU Weikai, SUN Haixin, LIU Qi

    Published 2024-09-01
    “…Additionally, for underwater acoustic communication scenarios, a low-complexity non-coherent detection algorithm for MM-LoRa-Mod was introduced. Through the evaluation of MM-LoRa-Mod’s bit error rate performance in multipath channels, Watermark underwater acoustic channels, and shallow water acoustic channels, excellent anti-multipath fading and anti-Doppler frequency shift capabilities were demonstrated, indicating the high reliability of MM-LoRa-Mod in underwater acoustic communication scenarios.…”
    Get full text
    Article
  10. 16250

    Passive forensic based on spatio-temporal localization of video object removal tampering by Linqiang CHEN, Quanxin YANG, Lifeng YUAN, Ye YAO, Zhen ZHANG, Guohua WU

    Published 2020-07-01
    “…To address the problem of identification of authenticity and integrity of video content and the location of video tampering area,a deep learning detection algorithm based on video noise flow was proposed.Firstly,based on SRM (spatial rich model) and C3D (3D convolution) neural network,a feature extractor,a frame discriminator and a RPN (region proposal network) based spatial locator were constructed.Secondly,the feature extractor was combined with the frame discriminator and the spatial locator respectively,and then two neural networks were built.Finally,two kinds of deep learning models were trained by the enhanced data,which were used to locate the tampered area in temporal domain and spatial domain respectively.The test results show that the accuracy of temporal-domain location is increased to 98.5%,and the average intersection over union of spatial localization and tamper area labeling is 49%,which can effectively locate the tamper area in temporal domain and spatial domain.…”
    Get full text
    Article
  11. 16251

    Control of Temperature and Aluminum Fluoride Concentration Based on Model Prediction in Aluminum Electrolysis by Zeng Shuiping, Wang Shasha, Qu Yaxing

    Published 2014-01-01
    “…This paper developed a new kind of algorithm to control the temperature and AlF3 concentration of electrolyte for 300 kA prebake aluminum production cells by altering the setting cell voltage and the AlF3 adding rate. …”
    Get full text
    Article
  12. 16252

    SDFMUCR: Software-defined and fuzzy-based multi-hop unequal cluster routing by Lu Sixu, Wu Muqing, Zhao Min

    Published 2020-10-01
    “…Researchers give more and more attention to the design of the routing algorithm. Cluster routing is the most popular routing protocol in wireless sensor networks. …”
    Get full text
    Article
  13. 16253

    FAULT DIAGNOSIS OF GEARBOX BASED ON ADAPTIVE EEMD AND FAST KURTOGRAM by XIANG Wei, LI RuYu, WANG Hui, TIAN LiYong, YU Ning

    Published 2022-01-01
    “…To solve the problem that the amplitude of the added white noise and the number of ensemble trials to the ensemble empirical mode decomposition algorithm depend too much on subjective experience or multiple attempts, which is more subjective and blind, a fault diagnosis method based on adaptive EEMD and Fast Kurtogram is proposed. …”
    Get full text
    Article
  14. 16254

    Topology aggregation model based on focus folding for network simulation by Zhao-xin ZHANG, Yue-jin DU, Ke WANG, Zhen-quan DING, Zhi-yu HAO

    Published 2012-07-01
    “…High resource consumption is the main problem of large-scale network simulation,to solve this problem,the topology aggregation model based on focus folding for network simulation was put forward.According to the abstract coefficients,the terminal node abstract,tree shrinking,and cut-edge abstract algorithm was adopt to abstract the topology.The test results show that,this technology can reduce the router node about 30 percent,the link between routers about 13.74 percent,total node about 98.48 percent,and total link about 96.1 percent.Simulating DDoS on the topology with 2.5 million nodes only need 400s time and 2 710MB memory.Take Shandong topology as an example to simulate DDoS,after abstracted,simulation memory and time have been reduced about 75.34 percent and 91.76 percent respectively.Take Beijing topology as an example to simulate worm,after abstracted,simulation memory and time have been reduced about 68.84 percent and 38.64 percent respectively,which prove that this mode can improve the simulation scale and efficiency and decrease the resource consumption and running time of simulation.…”
    Get full text
    Article
  15. 16255

    Ranking Influential Nodes in Complex Networks with Information Entropy Method by Nan Zhao, Jingjing Bao, Nan Chen

    Published 2020-01-01
    “…However, these methods offer a limited improvement in algorithm performance because diversity between different attributes is not properly considered. …”
    Get full text
    Article
  16. 16256

    Distributed IOS-SM transmission scheme with joint antenna and IOS unit selection for high-speed railway scenario by Qingfeng DING, Song WANG

    Published 2023-04-01
    “…A distributed intelligent omni-surface (IOS) -assisted spatial modulation (SM) transmission scheme was proposed to address the problem of transmission rate degradation caused by the high signal penetration loss in closed carriages in the high-speed railway scenarios.Firstly, SM technology was utilized to ensure that the indexed information section was not affected by penetration loss.Then, to reduce the high path loss and power loss of the long-range IOS windows, the distributed IOS was selected by traversal algorithm according to the principle of maximizing the received signal-to-noise ratio, and the best IOS window was activated to transmit the SM modulated information.Finally, to reduce the impact of the missing direct view path gain on the overall system performance, the antenna removal principle and the sequential selection method were used to dynamically and selectively activate the receiving antenna and IOS unit under the power consumption model.The simulation results show that the proposed scheme is more suitable for the high-speed railway wireless communication scenario than the conventional relay-forwarding and reconfigurable intelligence surface -SM (RIS-SM) schemes.And with the power loss model, the distributed IOS-SM scheme chosen by the combined antenna and IOS unit is still able to guarantee high performance transmission of the system.…”
    Get full text
    Article
  17. 16257

    Feature Extraction for Evaluating the Complexity of Electromagnetic Environment Based on Adaptive Multiscale Morphological Gradient and Nonnegative Matrix Factorization by Hua-Chen Xi, Bing Li, Wen-Hui Mai, Xiong Xu, Ya Wang

    Published 2022-01-01
    “…In this paper, a feature extraction method for electromagnetic environmental signals based on adaptive multiscale morphological gradient filtering and a nonnegative matrix factorization algorithm is proposed. First, the electromagnetic environment signal is filtered by AMMG, and then the filtered signal is processed by NMF for feature extraction. …”
    Get full text
    Article
  18. 16258

    Development and Performance Analysis of Pneumatic Soft-Bodied Bionic Actuator by Wenchuan Zhao, Yu Zhang, Ning Wang

    Published 2021-01-01
    “…Based on Yeoh’s second-order constitutive model of silica gel, the deformation analysis model of the actuator is established, and the rationality of the structure design and motion forms of the actuator and the accuracy of the deformation analysis model are verified by using the numerical simulation algorithm. According to the physical model of the pneumatic soft-bodied bionic actuator, the motion and dynamic characteristics of the actuator are tested and analyzed, the curves of motion and dynamic characteristics of the actuator are obtained, and the empirical formula of the bending angle and driving torque of the actuator is fitted out. …”
    Get full text
    Article
  19. 16259

    Feature enhancement and bilinear feature vector fusion for text detection of mobile industrial containers by Haiyang HU, Zepin LI, Zhongjin LI

    Published 2022-07-01
    “…In the real factory environment, due to factors such as dim light, irregular text, and limited equipment, text detection becomes a challenging task.Aiming at this problem, a feature vector fusion module based on bilinear operation was designed and combined with feature enhancement and semi-convolution to form a lightweight text detection network RGFFD (ResNet18 + Ghost Module + FPEM(feature pyramid enhancement module)) + FFM(feature fusion module) + DB (differentiable binarization)).Among them, the Ghost module was embedded with a feature enhancement module to improve the feature extraction capability, the bilinear feature vector fusion module fused multi-scale information, and an adaptive threshold segmentation algorithm was added to improve the segmentation capability of the DB module.In the real industrial environment, the RGFFD detection speed reached 6.5 f/s, when using the embedded device UP2 board for text detection of container numbers.At the same time, the detection speed on the public datasets ICDAR2015 and Total-text reached 39.6 f/s and 49.6 f/s, respectively.The accuracy rate on the custom dataset reached 88.9%, and the detection speed was 30.7 f/s.…”
    Get full text
    Article
  20. 16260

    Obstacle Avoidance Path Planning for Double Manipulator based on Improved Artificial Potential Field Method by Xue Yang, Yu Zhicheng, Wu Haidong, Zhang Ning, Sun Yue

    Published 2020-03-01
    “…An obstacle avoidance path planning algorithm based on improved artificial potential field method is proposed for dual 6-DOF manipulator. …”
    Get full text
    Article