Showing 16,541 - 16,560 results of 19,511 for search '"algorithms"', query time: 0.07s Refine Results
  1. 16541

    Load-to-store: exploit the time leakage of store buffer transient window by Ming TANG, Yifan HU

    Published 2023-04-01
    “…To research the vulnerability of modern microarchitecture and consider the mitigation, memory order buffer which was responsible for managing the execution order of memory access instructions was analyzed and found that load forward would directly bypass the data of dependent store instructions to load instructions, and speculative load would execute independent load instructions in advance.While bring efficiency optimizations, it might also lead to errors and corresponding blocking.The existing optimization mechanisms on the Intel Coffee Lake microarchitecture, and the leak attack scheme by using them were analyzed.Using the four execution modes of MOB and the corresponding duration, a variety of attacks were constructed including transient attack, covert channel, and recovery of the private key of the cryptographic algorithm.The time difference caused by MOB was used to leak the address of memory instructions, and the implementation of AES T table was attacked.Key recovery experiments were conducted on AES-128 with OpenSSL 3.0.0 on an Intel i5-9400 processor.The experimental results show that 30 000 sets of samples can recover a key byte with a probability of 63.6%.Due to the characteristics of memory order buffer, the concealment of the exploit is better than traditional cache time leaks.…”
    Get full text
    Article
  2. 16542

    An Investigation of the Feasibility of Feedstock to Support the UK’s Sustainable Aviation Fuel Goals by Rebecca J. Chapman, Anton Hettiarachchige Don

    Published 2025-01-01
    “…These findings are fed into a novel weighting algorithm that is designed to assess a number of factors, including various technical characteristics and feasibility studies, as well as produce a detailed outlook of the future potential of each fuel blend. …”
    Get full text
    Article
  3. 16543

    Modeling and Dynamical Analysis of the Water Resources Supply-Demand System: A Case Study in Haihe River Basin by Chongli Di, Xiaohua Yang

    Published 2014-01-01
    “…Then, the gray code hybrid accelerating genetic algorithm (GHAGA) is adopted to identify the unknown parameters of the system based on the statistic data (1998–2009). …”
    Get full text
    Article
  4. 16544

    Cognitive Optimization in Assistive Living System Development by Alan Bowling, Fillia Makedon

    Published 2012-01-01
    “…Support for this approach stems from the artificial intelligence field where optimization is considered to be a critical aspect of cognition, and from the similarity between the performance metrics for the two problem domains. A search algorithm is developed using the bracketing and gradient methods as inherited knowledge. …”
    Get full text
    Article
  5. 16545

    Gear Fault Diagnosis Based on APIT-SA-MEMD and FLLE by Ji Haofei, Liu Huiling, Dong Jiaqiang

    Published 2022-11-01
    “…To solve this problem, an intelligent fault diagnosis method based on adaptive projection intrinsically transformation sine-assisted multivariate empirical mode decomposition (APIT-SA-MEMD) and Floyd local linear embedding (FLLE) algorithm is proposed. Multivariate empirical mode decomposition of adaptive projection intrinsically transformation has modal aliasing phenomenon, so APIT-SA-MEMD is proposed to reduce the modal aliasing phenomenon existing in traditional empirical mode decomposition. …”
    Get full text
    Article
  6. 16546

    Using rule association to generate data collection policies by Pei CHEN, Fenghua LI, Zifu LI, Yunchuan GUO, Lin CHENG

    Published 2021-10-01
    “…Collecting security-related data of devices effectively is the foundation of analyzing network threats accurately.Existing data collection methods (full data collection, sampling based data collection and adaptive data collection) do not consider the validity of the collected data and their correlation, which will consume too much collection resources, resulting in low collection yield.To address this problem, considering the factors (relationship between node attributes, network topology relationship, threat status, node resource and node similarity) that impact collection costs and benefits, a rule association method to generate collection policies was designed.In the method, two types of association rules (inter-node association rules and inter-event association rules) were adopted to generate candidate data collection items and reduced the scope of data collection.Then, a multi-objective program was designed to maximize collection benefits and minimize collection costs.Further, a genetic algorithm was designed to solve this program.Proposed method was compared with existing data collection methods.The experimental results show that the number of the collected data records of proposed method is 1 000~3 000 less than that of others per 12 hours, and the validity of the collected data of proposed method is about 4%~10% higher than others, which proves the effectiveness of the proposed method.…”
    Get full text
    Article
  7. 16547

    Enhanced Modeling and Control of Organic Rankine Cycle Systems via AM‐LSTM Networks Based Nonlinear MPC by Yang Sun, Ming Du, Xiao Qi

    Published 2025-01-01
    “…Furthermore, a multi‐objective optimization approach that integrates nonlinear model predictive control (NMPC) with the multiverse optimizer (MVO) algorithm is implemented to ensure effective control under varying operating conditions and constraints. …”
    Get full text
    Article
  8. 16548

    Internal Leakage Diagnosis of a Hydraulic Cylinder Based on Optimization DBN Using the CEEMDAN Technique by Peng Zhang, Xinyuan Chen

    Published 2021-01-01
    “…The reconstructed signals are regarded as the input of the optimization DBN, and the particle swarm optimization simulated annealing (PSOSA) algorithm is adopted to identify the four internal leakage levels. …”
    Get full text
    Article
  9. 16549

    Solving linear Fredholm-Stieltjes integral equations of the second kind by using the generalized Simpson’s rule by A. Asanov, S. Yanık

    Published 2016-05-01
    “…The graph of these results is plotted. An algorithm of this application is given by using Maple. …”
    Get full text
    Article
  10. 16550

    Development of a standardized data collection and intelligent fabric quality prediction system for the weaving department by Ning Dai, Lunjun Li, Kaixin Xu, Zhehao Lu, Xudong Hu, Yanhong Yuan

    Published 2025-01-01
    “…This study leverages the standardization and interoperability features of open platform communications unified architecture technology to facilitate data acquisition within the weaving department, establishing a reliable Internet of Things framework that supports subsequent fabric quality prediction, and optimizing the back propagation neural network through the K-means clustering algorithm and particle swarm optimization to predict the type and number of fabric defects. …”
    Get full text
    Article
  11. 16551

    Using Statistical Model to Study the Daily Closing Price Index in the Kingdom of Saudi Arabia (KSA) by Hassan M. Aljohani, Azhari A. Elhag

    Published 2021-01-01
    “…The expectation-maximization (EM) algorithm converged in 2 repetitions. The data source is from Tadawul KSA.…”
    Get full text
    Article
  12. 16552

    Dynamic Sign Guidance Optimization for Crowd Evacuation considering Flow Equilibrium by Minghua Li, Chengyong Xu, Yan Xu, Li Ma, Yun Wei

    Published 2022-01-01
    “…A method based on the fundamental diagram, the cell transmission model, and the point-queuing theory is developed to estimate evacuation travel time considering congestion and queuing. A heuristic algorithm is extended to solve the bi-level program. …”
    Get full text
    Article
  13. 16553

    Complexity of Deep Convolutional Neural Networks in Mobile Computing by Saad Naeem, Noreen Jamil, Habib Ullah Khan, Shah Nazir

    Published 2020-01-01
    “…Finally, at the third stage, it employs Huffman encoding algorithm to deal with the storage issue of the remaining weights.…”
    Get full text
    Article
  14. 16554

    Coordinated Control for Driving Mode Switching of Hybrid Electric Vehicles by Yanyan Zuo, Rui Sun, Jiuyu Zang, Mingyin Zheng

    Published 2020-01-01
    “…Taking a hybrid electric vehicle using double-row planetary gear power coupling mechanism as a research object, this study proposes a coordinated control algorithm of “torque distribution, engine torque monitoring, and motor torque compensation” in an attempt to realize coordinated control for driving mode switching. …”
    Get full text
    Article
  15. 16555

    Designing and Manufacturing of Industrial Robots with Dual-Angle Sensors Taking into Account Vibration Signal Fusion by Jinshun Yan, Haiqing Cheng

    Published 2023-01-01
    “…The overall optimization of the system algorithm enhances the accuracy and reliability of the measurement.…”
    Get full text
    Article
  16. 16556

    Lie Detection Technology of Bimodal Feature Fusion Based on Domain Adversarial Neural Networks by Yan Zhou, Feng Bu

    Published 2024-01-01
    “…Simulations conducted on two professional lying databases with different distributions show the superiority of the detection rate of the proposed method compared to an unimodal feature detection algorithm. The maximum improvement in detection rate was 23.3% compared to the traditional neural network-based detection method. …”
    Get full text
    Article
  17. 16557

    STUDY ON ENERGY ABSORPTION CHARACTERISTICS OF CIRCULAR TUBE WITH RECTANGULAR GROOVE BASED ON REGRESSION ANALYSIS by LEI Cheng, LI FuSheng, MIAO DeXiang, ZHU Tao

    Published 2024-04-01
    “…Finally, the energy absorption performance index was introduced and the structure of the circular tube was optimized by genetic algorithm. The optimization results show that when the diameter and the groove end distance are the smallest. the wall ess and the groove width are the largest, and the groove depth is the shallowest, the circular tube has the best energy absorption performance in the range of research.…”
    Get full text
    Article
  18. 16558

    Recent advances in the management of chronic ankle instability by Yimeng Yang, Yang Wu, Wenhui Zhu

    Published 2025-01-01
    “…Treatment of CAI requires a multifaceted algorithm, involving historical analysis, clinical evaluations, and diagnostic imaging. …”
    Get full text
    Article
  19. 16559

    The Comparison of Lately Proposed Harris Hawks Optimization and Jaya Optimization in Solving Directional Overcurrent Relays Coordination Problem by Jiangtao Yu, Chang-Hwan Kim, Sang-Bong Rhee

    Published 2020-01-01
    “…Meanwhile, another lately proposed optimization algorithm named Jaya is also adopted to solve the same problem, and the results are compared with HHO in aspects of objective function value, convergence rate, robustness, and computation efficiency. …”
    Get full text
    Article
  20. 16560

    Analysis of communication data of mobile terminal based on protocol reversal by Mingyuan ZHANG, Xinyu QI, Yubo SONG, Rongrong GU, Aiqun HU, Zhenchao ZHU

    Published 2018-12-01
    “…The most problem in analysis of communication protocols and communication data for mobile terminals is that many mobile applications do not have the relevant public technical documents,and it is difficult to know the type of communication protocol it adopts.The instruction execution sequence analysis technique takes the instruction sequence executed by the program as a research object,and inversely infers the message format and the state machine to obtain the communication protocol.However,due to the incomplete collection of sequence information,the state machine infers that the inference is incomplete and cannot be effective.A novel protocol reverse scheme based on state machine comparison is proposed,which can be used for the forensics of mobile terminal communication data.The scheme first uses PIN for dynamical identification of the taint,and track it and analyzes the trajectory to obtain the message format.Secondly,the message clustering is performed on the basis of the message format to infer the protocol state machine.Finally,the LCS algorithm is used to compare the state machines to get a complete protocol state machine.This article tests and evaluates the scheme based on two types of application design experiments on the Android platform.The experimental results show that the results are both complete and real-time,and have practical value.…”
    Get full text
    Article