Showing 5,261 - 5,280 results of 67,915 for search 'DASB~', query time: 2.40s Refine Results
  1. 5261

    TempoGRAPHer: Aggregation-Based Temporal Graph Exploration by Evangelia Tsoukanara, Georgia Koloniari, Evaggelia Pitoura

    Published 2025-01-01
    “…Temporal exploration is supported by two complementary strategies, namely <i>skyline-</i> and <i>interaction</i>-based exploration. Skyline-based exploration provides insights into the overall trends in the evolution, while interaction-based exploration offers a closer look at specific parts of the graph evolution history where significant changes occurred. …”
    Get full text
    Article
  2. 5262

    Flow scheduling technology based on BGP extended protocol by Yujia LUO, Liang OU, Zhiwei MO, Hong TANG

    Published 2016-03-01
    “…A novel centralized flow scheduling scheme based on software defined networking(SDN)was proposed.The existing problems of current flow scheduling method based on BGP were analyzed,and a new scheme was proposed.In the scheme,the BGP Flowspec was enhanced to avoid reconfiguring the related routers one by one,and hence the network management was simplified and a more flexible flow scheduling method was provided.The proposed scheduling scheme is compatible with the traditional BGP,which matches the trend of current industry and solves some of the problems in traditional BGP scheme.…”
    Get full text
    Article
  3. 5263

    Response Surface Optimization of Flexspline based on Parameter Sensitivity by Shijie Chen, Jiahao Li, Baisheng Wu

    Published 2022-05-01
    “…The stress concentration effect can be reduced and the fatigue life of flexspline can be improved by reasonably selecting the structural parameters of flexspline. Based on the sensitivity analysis of parameters,the key parameters affecting the stress of the flexspline are screened out. …”
    Get full text
    Article
  4. 5264

    Decoupling Suspension Controller Based on Magnetic Flux Feedback by Wenqing Zhang, Jie Li, Kun Zhang, Peng Cui

    Published 2013-01-01
    “…The suspension module control system model has been established based on MIMO (multiple input and multiple output) state feedback linearization. …”
    Get full text
    Article
  5. 5265

    ALBERTA: ALgorithm-Based Error Resilience in Transformer Architectures by Haoxuan Liu, Vasu Singh, Michal Filipiuk, Siva Kumar Sastry Hari

    Published 2025-01-01
    “…We propose a novel algorithm-based resilience framework called ALBERTA that allows us to perform end-to-end resilience analysis and protection of transformer-based architectures. …”
    Get full text
    Article
  6. 5266

    Privacy cloud storage scheme based on fog computing by Jiyuan ZHOU, Hao LUO, Lei QIU, Tian WANG

    Published 2019-03-01
    “…As one of the core applications in cloud computing field,cloud storage attracts a large number of users depending on its powerful storage capacity.However,in this storage schema,users’ data is stored completely in cloud server.In other word,users’ right of control on data is lost and users are facing privacy leakage risk.Traditional privacy protection scheme is usually based on encryption technology,but the attack from the inside of cloud server can’t be resisted effectively by these kinds of methods.Once the password gets compromised,users’ data will be stolen.In order to solve this problem,a three-level secure cloud storage scheme based on fog computing was proposed and a Hash-Solomon code algorithm was designed.A small part of data was stored in local machine and fog server,which can take full advantage of cloud storage and protect the privacy of data.Through the theoretical safety analysis and experimental test,the feasibility of our scheme is proved,and it is really a powerful supplement to existing cloud storage scheme.…”
    Get full text
    Article
  7. 5267

    Escape method of malicious traffic based on backdoor attack by MA Bowen, GUO Yuanbo, MA Jun, ZHANG Qi, FANG Chen

    Published 2024-04-01
    “…Launching backdoor attacks against deep learning (DL)-based network traffic classifiers, and a method of malicious traffic escape was proposed based on the backdoor attack. …”
    Get full text
    Article
  8. 5268
  9. 5269

    Small cell discovery based on TOA fingerprint database by Yang CHEN, Zhenzhu LEI, Bin SHEN

    Published 2017-09-01
    “…In the scenario that a large number of small cells are deployed in the mobile communication network,the number of carriers to be detected by the user equipment (UE) in inter-frequency scanning is considerably larger than that in the conventional network deployment scenarios.This procedure may consume tremendous amounts of UEs’ energy.In order to solve this problem,a small cell discovery (SCD) scheme based on TOA fingerprint database to alleviate intensive energy consumption was proposed when the UEs try to find their potential serving small cells.The proposed scheme reduces the energy consumption of the UE by decreasing the number of unnecessary inter-frequency detection.The simulation results verifiy that the proposed scheme,compared with the existing SCD strategy using received signal strength (RSSI) based radio maps,has better anti-noise performance and higher accuracy.In addition,it can effectively help the high-speed UE avoid performing inter-frequency detection,and hence increase the rate of the UE being successfully connected to the appropriate small cell.…”
    Get full text
    Article
  10. 5270
  11. 5271

    Load forecasting based on knowledge flow and transfer learning by Wenjun ZHU, Sining WANG, Xiaoxin GAO, Qian ZHENG

    Published 2022-05-01
    “…In all things connected, comprehensive perception, intelligent decision-making information era of big data, in the information acquisition of big data and a large amount of signal processing, there are still large amount of data redundancy, calculation and the shortcoming of high cost, not in time, and no marked.The transfer learning was applied, and the knowledge flow system based on the weight impact factor for information fusion was integrated to assist the analysis and simplify the calculation for the IoT sensing system.The knowledge flow mode of transfer learning and data fusion was adopted in the IoT sensing system, and the simulation calculation of short-term load prediction was made based on the partial data of regional power consumption.The influencing factors of users’ electricity consumption behavior were analyzed, and the optimal weight distribution of influencing factors was obtained through training, so as to predict the power consumption rate.The results show that in this way, it can clearly identify the characteristics of electricity consumption behavior, and predict the energy consumption according to the characteristics of electricity consumption.…”
    Get full text
    Article
  12. 5272

    Power services scheduling algorithm based on quantum communication by Zhuozhi YU, Yefeng ZHANG, Bingyang HAN, Wenwei CHEN, Dong WANG

    Published 2019-11-01
    “…Quantum communication could effectively improve the transmission’s reliability and security of power system services.However,limited by the generating rate of quantum key,it was difficult to meet the encryption requirements of important services.Therefore,a queue scheduling algorithm was required to legitimately schedule the power system services which need to be encrypted in quantum communication.An improved weighted fair queuing (weighted fair queuing,WFQ) algorithm LD-WFQ was proposed.By estimating the expected delay of the data packets to be encrypted,sending the packets that would soon be timeout,the proposed algorithm effectively reduced the timeout ratio of the packets and improved the effective utilization of quantum keys,while maintaining the timeout ratio of the packets in high priority queue at a low level.Compared with the WFQ algorithm,the simulation result proves the superiority of LD-WFQ algorithm.…”
    Get full text
    Article
  13. 5273

    ENERGY SAVING TECHNOLOGY OF LIGATURES PRODUCTION ON THE BASIS OF MOLYBDENUM by A. G. Slutsky, A. S. Kalinichenko, V. A. Sheynert

    Published 2014-03-01
    “…Data on development of technology of the molybdenum-containing addition alloy production by method of aluminothermic restoration is provided in the article. …”
    Get full text
    Article
  14. 5274

    Non-coding parts of genomes as the basis of epigenetic heredity by R. N. Mustafin, E. K. Khusnutdinova

    Published 2017-11-01
    “…We hypothesized that the basis of epigenetic regulation of genomes in ontogenesis is the specificity of the distribution, number and composition of transposons. …”
    Get full text
    Article
  15. 5275

    Fault Prediction of Centrifugal Pump Based on Improved KNN by YunFei Chen, Jianping Yuan, Yin Luo, Wenqi Zhang

    Published 2021-01-01
    “…The results show that this method can effectively distinguish the specific fault types of centrifugal pumps based on vibration signals, and the fault prediction accuracy of the off-balance condition is up to 82%. …”
    Get full text
    Article
  16. 5276

    GMM-based localization algorithm under NLOS conditions by Wei CUI, Cheng-dong WU, Yun-zhou ZHANG, Zi-xi JIA, Long CHENG

    Published 2014-01-01
    “…Aiming at indoor node localizations of WSN,a node localization algorithm,where priori-knowledge is not necessary,was proposed.on basis of analyzing the error model,combined with Gaussian mixture model (GMM).By training the distance measurements containing NLOS errors,the more accurate range estimations can be obtained.For higher localization accuracy,the particle swarm optimization (PSO) was introduced to optimize the expectation-maximization (EM)algorithm.Finally,by using the residual weighting algorithm to estimate the distance,the estimation coordinates of target nodes can be determined.The proposed algorithm was proved to be effective through simulation experiments.…”
    Get full text
    Article
  17. 5277

    Analysis of Driving Characteristic of Bistable Mechanism based on Dynamics by Meng Qingguo, Zhang Lili, Yang Xuefeng, Li Wei, Lu En, Dong Shi

    Published 2017-01-01
    “…A new method for the steady state analysis of four bar mechanism based on dynamics is presented to analyze the driving characteristic of four bar mechanism with only a compliant joint.And according to the drive characteristic curve,the steady state characteristics of the flexible mechanism are judged. …”
    Get full text
    Article
  18. 5278

    ANTI-FREEZING ADHESIVE EXPERIMENTAL STUDY BASED ON BIONICS by WANG ChunHua, XU HanWen, WANG ZhongXian, QU Hui

    Published 2017-01-01
    “…In order to solve the freezing adhesive problem on roller and belt during coal transportation process in winter,on the basis of referring to relevant freezing adhesive theory,inspired by bionics,we did the theoretical analysis and experimental research about the application of bionic convex hull geometry structure on the roller and belt. …”
    Get full text
    Article
  19. 5279

    Rumor detection in social media based on eahanced Transformer by Honghao ZHENG, Yinuo HAO, Hongtao YU, Shaomei LI, Yiteng WU

    Published 2022-08-01
    “…With the rapid development of the Internet, social media is increasingly integrated into all aspects of people’s daily life.Social media has gradually become a tool and even a platform for people to share opinions, insights, experiences and viewpoints.It is the main method for people to obtain and share information as well as express and exchange opinions.Currently, social media mainly includes social networking sites, Weibo, Twitter, blogs, forums, podcasts and so on.Due to the openness of social media, the user scale is large and the sources are complex and numerous, then all kinds of rumors and false information may be generated easily.Rumors on social media influence netizens’ understanding of events and shake the stability of society.Therefore, how to accurately and efficiently detect rumors has become an urgent problem to be solved.Existing Transformer based social media rumor detection models ignored the text location information.To effectively extract text location information and make full use of text potential information, a rumor detection model in social media was proposed and it was based on the enhanced Transformer.This model enhanced the traditional Transformer from two aspects of relative position and absolute position.It captured the direction information and distance information of the text using learnable relative position coding and mapped words from different positions to different feature spaces using absolute position coding.Experimental results show that, compared with the best benchmark model, the accuracy of the proposed model on Twitter15, Twitter16 and Weibo datasets is enhanced by 0.9%, 0.6% and 1.4%, respectively.Experimental results verify the effectiveness of the proposed location coding.And the enhanced Transformer based on location coding can significantly improve the effects of social media rumor detection.…”
    Get full text
    Article
  20. 5280