Showing 3,401 - 3,420 results of 21,030 for search '"multiplication"', query time: 0.10s Refine Results
  1. 3401

    Malicious domain name detection method based on associated information extraction by Bin ZHANG, Renjie LIAO

    Published 2021-10-01
    “…To improve the accuracy of malicious domain name detection based on the associated information, a detection method combining resolution information and query time was proposed.Firstly, the resolution information was mapped to nodes and edges in a heterogeneous information network, which improved the utilization rate.Secondly, considering the problem of high computational complexity in extracting associated information with matrix multiplication, an efficiency breadth-first network traversal algorithm based on meta-path was proposed.Then, the query time was used to detect the domain names lacking meta-path information, which improved the coverage rate.Finally, domain names were vectorized by representation learning with adaptive weight.The Euclidean distance between domain name feature vectors was used to quantify the correlation between domain names.Based on the vectors learned above, a supervised classifier was constructed to detect malicious domain names.Theoretical analysis and experimental results show that the proposed method preforms well in extraction domain name associated information.The coverage rate and F1 score are 97.7% and 0.951 respectively.…”
    Get full text
    Article
  2. 3402

    A low-rank approximation of tensors and the topological group structure of invertible matrices by R.N. Gumerov, A.S. Sharafutdinov

    Published 2018-12-01
    “…The multilinear matrix multiplication has been discussed from the viewpoint of transformation groups. …”
    Get full text
    Article
  3. 3403

    Lattice-based lightweight post quantum access authentication scheme for satellite network by WANG Shanshan, ZHAO Guofeng, XU Chuan, HAN Zhenzhen

    Published 2024-10-01
    “…In the authentication phase, a low dimensional modular multiplication modular addition mutual authentication algorithm was designed based on the bonsai tree algorithm, which reduced the algorithm complexity from the quadratic level to the linear level, further decreasing the communication costs during the authentication process and computational costs on satellite. …”
    Get full text
    Article
  4. 3404

    Calculation of the Neutron Parameters for Accelerator-Driven Subcritical Reactors by Tien Tran Minh, Dung Tran Quoc

    Published 2021-01-01
    “…The neutron parameters as neutron yield Yn/p, neutron multiplication factor k, the radial and axial distributions of the neutron flux in the core have been calculated by using MCNPX program. …”
    Get full text
    Article
  5. 3405

    Multi-Softcore Architecture on FPGA by Mouna Baklouti, Mohamed Abid

    Published 2014-01-01
    “…To meet the high performance demands of embedded multimedia applications, embedded systems are integrating multiple processing units. However, they are mostly based on custom-logic design methodology. …”
    Get full text
    Article
  6. 3406

    Galois Field Instructions in the Sandblaster 2.0 Architectrue by Mayan Moudgill, Andrei Iancu, Daniel Iancu

    Published 2009-01-01
    “…This paper presents a novel approach to implementing multiplication of Galois Fields with 2N. Elements of GF(2N) can be represented as polynomials of degree less than N over GF(2). …”
    Get full text
    Article
  7. 3407

    New construction of mutually orthogonal complementary sequence sets by LIU Kai, MENG Fanfei, PENG Peidong

    Published 2024-09-01
    “…The new concept of coefficient paraunitary (CPU) matrices was defined, and by employing matrix multiplication, Kronecker product, and matrix iteration techniques, three types of PU matrices with varying sizes were constructed. …”
    Get full text
    Article
  8. 3408

    Derivations on the matrix semirings of max-plus algebra by Suffi Nuralesa, Nikken Puspita

    Published 2024-12-01
    “…Let $(S,\oplus,\otimes)$ be a matrix semiring of max-plus algebra with the addition operation $\oplus$ and the multiplication operation $\otimes$, where the set \( S \) consists of matrices constructed from real numbers together with the element negative infinity. …”
    Get full text
    Article
  9. 3409

    Interference Analysis of Very Fast Transient Overvoltages in Gas-Insulated Substations Using a Hybrid Algorithm by Muhammad Bilal, Hafiz Muhammad Azib Khan, Abdul Mueed, Kamran Liaqat Bhatti, Syed Safdar Raza, Muhammad Siddique

    Published 2025-01-01
    “…Utilizing the matrix-vector multiplication product (MVX) to address compression and approximation challenges, the hybrid approach proves reliable and pragmatic. …”
    Get full text
    Article
  10. 3410

    Analysis of Kinematic Performance and Research of Dynamics Solution of New Type 4-DOF Parallel Mechanism by Wang Zongping, Zhao Dengfeng, Li Kuan, Zeng Guoying, Li Zhongyang, Yang Guiyang

    Published 2018-01-01
    “…A method to solve Lagrange equation with quickness is presented and combining with the equation characteristics,the part of second-order differential of equation will be simplified to the multiplication,and the first order partial differential will simplified solving through the similar method of differential quotient. …”
    Get full text
    Article
  11. 3411

    Énergies renouvelables et coopération transfrontalière : la gouvernance multi-niveaux du processus de planification énergétique by Melis Aras

    Published 2021-05-01
    “…However, cross-border cooperation in renewable energy requires a review of the energy planning process, as well as of the existing modes of governance due to the multiplication of actors in the decision-making process, and the emergence of new conditions and methods serving as coordination mechanisms between them. …”
    Get full text
    Article
  12. 3412

    Aggregatable Subvector Commitment with Efficient Updates by Qing Xu, Chenyang Gao, Yunling Wang

    Published 2025-01-01
    “…An aggregatable subvector commitment scheme extends a vector commitment scheme by enabling the aggregation of multiple proofs into a single compact subvector proof. …”
    Get full text
    Article
  13. 3413

    FAULT DIAGNOSIS NEW METHOD OF ROLLING BEARING BASED ON ADAPTIVE REDUNDANT LIFTING SCHEME PACKET by XIAO ShunGen, SONG MengMeng, LAI LianFeng

    Published 2015-01-01
    “…Aiming at feature identification of weak signal for rolling bearing fault,an adaptive redundant lifting scheme packet( ARLSP) diagnostic method of undecimated operation was proposed to solve the faults distortion that caused by traditional wavelet packet or lifting wavelet transform using sample operation.ARLSP was based on the principle of lifting scheme.Initial undecimated prediction and update operator were calculated by Lagrange interpolating subdivision,and then constructed an ARLSP decomposition and reconstruction algorithm.Simulation signals were tried out by denoising and anti frequency aliasing,results show that ARLSP method was superior to the traditional wavelet packet in denoising capabilities,and there are no frequency aliasing.Moreover,taking an experiment on an asynchronous motor,the vibration signals of the rolling bearings 6205 under conditions of no fault,the inner ring fault,outer ring fault and rolling fault were measured.ARLSP method has been successfully used to extract characteristic frequency and frequency multiplication for various faults,and has got a higher diagnostic accuracy than traditional wavelet packet.…”
    Get full text
    Article
  14. 3414

    Dynamique du couvert végétal et implications socio-environnementales à la périphérie du parc W/Burkina Faso by Raogo Noël Gansaonré

    Published 2018-05-01
    “…The socio-environmental implications concern the multiplication of conflicts and infractions in Park W. …”
    Get full text
    Article
  15. 3415

    Les aires marines protégées à l’épreuve du sous-développement en Afrique de l’Ouest by Bertrand Cazalet

    Published 2004-12-01
    “…The real legal applicability of these systems is very variable, and shows certain characteristics such as the putting into question of the legitimacy and the efficiency of public action, the difficulties in carrying out political reforms broad enough to improve the management of protected areas, the multiplication of those concerned, the tendency to a «privatizing» of the MPA through exterior interventions which claim a part of responsibility, and finally, the economic and commercial dimension which certainly constitutes the most important threat for the future of the MPA and its indigenous populations.…”
    Get full text
    Article
  16. 3416

    Fractional synchrosqueezing transform for enhanced multicomponent signal separation by Yangyang Li, Dzati Athiar Ramli

    Published 2024-08-01
    “…In the signal reconstruction process, chirp multiplication and energy rearrangement compensate for chirp bases’ effects, boosting energy concentration and reconstruction potential. …”
    Get full text
    Article
  17. 3417

    Algorithm study of digital HPA predistortion using one novel memory type BP neural network by Chun-hui HUANG, Yong-jie WEN

    Published 2014-01-01
    “…Based on the characteristic analysis of the high power amplifier (HPA) in wide-band CMMB repeater stations,a novel neural network was proposed which can respectively process the memory effect and the nonlinear of power amplifier.The novel model based on real-valued time-delay neural networks(RVTDNN) uses the Levenberg-Marquardt (LM) optimization to iteratively update the coefficients of the neural network.Due to the new parameters w<sup>0</sup>in the novel NN model,the modified formulas of LM algorithm were provided.Next,in order to eliminate the over-fitting of LM algorithm,the Bayesian regularization algorithm was applied to the predistortion system.Additionally,the predistorter of CMMB repeater stations based on the indirect learning method was constructed to simulate the nonlinearity and memory effect of HPA.Simulation results show that both the NN models can improve system performance and reduce ACEPR (adjacent channel error power ratio ) by about 30 dB.Moreover,with the mean square error less than 10<sup>−6</sup>,the coefficient of network for FIR-NLNNN is about half of that for RVTDNN.Similarly,the times of multiplication and addition in the iterative process of FIR-NLNNN are about 25% of that for RVTDNN.…”
    Get full text
    Article
  18. 3418

    An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs by Jing Wang, Xue Yuan, Yingjie Xu, Yudi Zhang

    Published 2024-01-01
    “…Our approach relies on discrete logarithmic zero-knowledge proofs and Feldman verifiable secret sharing, reducing complexity by forgoing multiplication triple protocols. When compared with some related schemes, this optimization speeds up both the key generation and signing phases with constant rounds while maintaining security against malicious adversaries.…”
    Get full text
    Article
  19. 3419

    Preserving data privacy in social recommendation by Shu-shu LIU, An LIU, Lei ZHAO, Guan-feng LIU, Zhi-xu LI, Kai ZHENG, Xiao-fang ZHOU

    Published 2015-12-01
    “…Social recommendation is a method which requires the participants of both user’s historical behavior data and social network,which generally belong to different parties,such as recommendation system service provider and social network service provider.Considering the fact that in order to maintain the value of their own data interests and user’s privacy,none of them will provide data information to the other,two privacy preserving protocols are proposed for efficient computation of social recommendation which needs the cooperation of two parties (recommendation system service provider and social network service provider).Both protocols enable two parties to compute the social recommendation without revealing their private data to each other.The protocol based on the well-known oblivious transfer multiplication has a low cost,and is suitable for the application of high efficiency requirements.And the one based on homomorphic cryptosystem has a better privacy preserving,and is more suitable for the application of higher data privacy requirements.Experimental results on the four real datasets show those two protocols are efficient and practical.Users are suggested to choose the appropriate protocol according to their own need.…”
    Get full text
    Article
  20. 3420

    A MICROPROPAGATION AND ACCLIMATIZATION OF LYCIUM BARBARUM L. MICROPLANTS TO EX VITRO CONDITIONS by Mihaela Cioloca, Andreea Tican, Monica Popa, Adrian Nicolae

    Published 2024-05-01
    “…An applicable and efficient protocol for sterilization, initiation, multiplication, rooting and acclimatization in goji was developed. …”
    Get full text
    Article