-
1041
Research on weakly conservative passive fault-tolerant control method considering the fault distribution
Published 2025-01-01“…Compared to the fault parameter uncertainty domain with high probability, the corresponding upper limit constraint of the performance index is increased for the fault parameter uncertainty domain with low probability. …”
Get full text
Article -
1042
Application of Random Dynamic Grouping Simulation Algorithm in PE Teaching Evaluation
Published 2021-01-01“…The probability ranking conclusion is an extension of the absolute form evaluation conclusion. …”
Get full text
Article -
1043
Log-Driven Behavior Discrimination of Process Robots Using Entropy Similarity
Published 2025-01-01“…Specifically, using the concept of log entropy, event logs are transformed to probability distributions of trace multisets and activity pairs multisets, respectively. …”
Get full text
Article -
1044
Migration and mutation (MeTa) hybrid trained ANN for dynamic spectrum access in wireless body area network
Published 2025-03-01“…Numerical results demonstrate the superiority of the MeTa hybrid NN in terms of detection probability, false alarm probability, and convergence rate compared to existing conventional spectrum sensing schemes. …”
Get full text
Article -
1045
A Sensor Positioning Scheme with High Accuracy in Nonuniform Wireless Sensor Networks
Published 2013-06-01“…The density probability scheme estimates 1-hop distance by using communication between nodes. …”
Get full text
Article -
1046
Adaptive Constant False Alarm Detector Based on Composite Fuzzy Fusion Rules
Published 2025-01-01“…The average detection probability of CFVI-CFAR is 3.66% higher than that of the variability index heterogeneous clutter estimate modified ordered statistics CFAR (VIHCEMOS-CFAR) in a multiple-target environment, while in a clutter edge environment, the average false alarm probability of CFVI-CFAR is only 1.65% of that of VIHCEMOS-CFAR. …”
Get full text
Article -
1047
A Holistic Approach to the Efficient Estimation of Operational Flexibility From Distributed Resources
Published 2024-01-01“…The scenarios are derived through sampling from a probability distribution of the renewable energy forecasts. …”
Get full text
Article -
1048
An Experimental Study on the Microstructures of Cemented Paste Backfill during Its Developing Process
Published 2018-01-01“…The porosity, fractal dimension, and probability entropy were characterized using the Particles and Pore Recognition and Analysis System (PPRAS). …”
Get full text
Article -
1049
GSA: node failures tolerent spatial window query processing algorithm in wireless sensor networks
Published 2008-01-01“…Finally, the influence of node density, the probability of node failure, query region size on the success rate of a query and the influence of node density, query message size, sensed data size, query region size, the probability of node failure on energy consumption were analysed. …”
Get full text
Article -
1050
Time slot-based RED algorithm on self-similar flows:SFRED
Published 2010-01-01“…Based on fractional Brownian motion(FBM),one calculation of the packet drop probability in the RED algorithm was derived under self-similar flows.Based on the self-similarity and the long-range dependence characteristics of Internet network traffics,a time slot-based RED algorithm on self-similar flows(SFRED) was proposed to the router queue management.The packet drop probability is calculated in every time-slot so that the burden is greatly reduced.It is simulated by NS2 and the experimental results show that the algorithm SFRED outperforms RED.SFRED can control the queue length under adaptive flows with a good throughput.…”
Get full text
Article -
1051
Hish speed deep packet inspection method with low power dissipation
Published 2011-01-01“…Hish speed deep packet inspection using TCAM faces the problem of high power dissipation.A 2-phase DPI method BF-TCAM was proposed.The first phase used parallel Bloom filters to exclude the normal packets not including attack signatures.The second phase used TCAM to inspect suspicious packets including real attack packets and false positive packets of the first phase.The Bloom filters’ false negative probability is zero and false positive probability is very low.Since most of the network data traffic does not include attack signatures,the method can get high speed deep packet inspection with low power dissipation.…”
Get full text
Article -
1052
Simulation analysis of probabilistic covert channels based on probabilistic interference
Published 2009-01-01“…Bandwidth and transmission error rate has received much attention in fields of covert channels.If a system does not satisfy BSPNI,PBNDC or SPBNDC property,then probabilistic covert channels will be formed.A simulation system was built to analyze their bandwidth and transmission error rate about covert channels.For every results of simulation,detail theoretical explanations were given.The results show the bandwidth is closely related to software/hardware configuration,probability pa-rameter and scheduling times,when configurations and probability parameter are fixed,the bandwidth is inversely propor-tional to scheduling times.For the same process,the greater is scheduling times,the smaller is transmission error rate.…”
Get full text
Article -
1053
Improving achievable traffic load of cognitive wireless networks under GoS constraints
Published 2012-11-01“…To improve the achievable traffic load of secondary user(SU) under grade of service (GoS) constraints in cognitive wireless networks with heterogeneous traffic,a novel spectrum sharing scheme was proposed.The key idea of the proposed scheme was to introduce preemptive priority and buffering mechanism for real-time traffic and non-real-time traffic,respectively,according to their different delay characteristics.The proposed scheme could reduce the forced termination probability and the blocking probability for heterogeneous calls simultaneously.Numerical results show that the proposed scheme can effectively improve the achievable traffic load of SUs under GoS constraints.…”
Get full text
Article -
1054
Multi-layered based network security defense system
Published 2007-01-01“…A multi-layered based network security defense system(MNSDS) was presented.MNSDS adopts multi-layered detection technology: for the detection of IP layer,aggregate-based congestion control algorithm(ABCC) was adopted,narrowing the congestion signature,and thus minimizing collateral damage;then,it employs the detection technology based on the artificial immune principle in TCP and UDP layers AIPT,and detects intrusion by creating a rule database and matching the appropriate rule.The simulation results indicate that the system not only can provide relief from DoS/DDoS attacks equally,but also resolve problems existing in the current defense systems such as low speed high false positive probability and high false positive probability,poor real-time and more artificial interventions.…”
Get full text
Article -
1055
Asymmetric watermarking based on Contourlet transform and subspace projection
Published 2009-01-01“…For the copyright protection of the digital image,a new asymmetric watermarking method of feature subspace projection based on Contourlet transform was presented.Embedding matrix(private key) and detecting matrix(public key) were constructed differently,where embedding matrix was kept secretly while detecting matrix was public.At the same time,the embedding matrix was independent on the host images.Robust subspace was obtained by Contourlet transformation.Using the embedding matrix,the arbitrary watermarking was embedded in the robust subspace.The de-tection function was constructed to detect whether an image had watermarking or not.The proposed method has good security,high detection probability and low false alarm probability.The stimulation shows that the proposed method is robust to many attacks.…”
Get full text
Article -
1056
Electronic Angular Tunneling Effect
Published 2022-05-01“… In this article we show that the probability for an electron tunneling a rectangular potential barrier depends on its angle of incidence measured with respect to the normal line. …”
Get full text
Article -
1057
VS-split load balancing algorithm in DHT-based P2P systems
Published 2013-12-01“…The method using virtual servers for balancing the load in DHT-Based P2P systems was studied.The load distribution in DHT-based overlay network using virtual servers were modeled,the occurrence probability of single vir-tual server problem (SVSP) was analyzed and computed in details,and a novel VS-split load balancing algorithm (VSSLBA) was proposed to deal with the SVSP by splitting virtual server into small ones.Simulations verify the cor-rectness of probability analysis and the performance of VSSLBA.…”
Get full text
Article -
1058
Traffic measurement algorithm based on least recent used and Bloom filter
Published 2013-01-01“…Aiming at the naïve algorithm’s deficiency of high false negative probability,a novel scheme called LRU-BF(least recent used &Bloom filter) was presented.In order to achieve high accuracy,the algorithm adopted mechanisms of LRU eliminating and Bloom filter representation to separate the process of heavy-hitter fliteration from the heavy-hitter recognition.Based on statistical theory,analytical expressions about upper-bound error probability were deduced.Simulated results indicate that LRU-BF can achieve space saving and lower error probabilit compared with Naïve-LRU algorithm.Meanwhile,it can also support the 10Gbit/s line-speed processing.…”
Get full text
Article -
1059
Q-learning based handoff algorithm for satellite system with ancillary terrestrial component
Published 2015-09-01“…,mobile satellite system with ancillary terres-trial component (MSS-ATC),the long transmission delay of satellite link was a huge challenge which may lead to high handoff dropping probability.In order to address this problem,a novel handoff decision strategy was proposed based on the predictive RSS and Q-learning algorithm.Extensive simulation results demonstrate that the proposed scheme can de-crease the handoff dropping probability,reduce the unnecessary handoff times and maximize the network reward.In ad-dition,the proposed scheme can also adapt to the situation of high-speed movement very well.…”
Get full text
Article -
1060
Efficacy and safety of neoadjuvant immunotherapy combined with chemotherapy for stage II–IVa esophageal cancer: a network meta-analysis
Published 2025-01-01“…Results The cumulative ranked probability results indicated that Camrelizumab + TN had the highest probability of achieving pCR, Camrelizumab + TP of achieving MPR, and Sintilimab + TP of achieving DCR and ORR. …”
Get full text
Article