Showing 5,681 - 5,700 results of 67,915 for search 'DASB~', query time: 3.08s Refine Results
  1. 5681

    Network resource pricing strategy based on SDN framework by Bin ZHUGE, Yihang QI, Hanwen FU, Weiming WANG

    Published 2018-07-01
    “…A network resource pricing strategy based on SDN framework was proposed to solve the problem of resource overload and network congestion caused by resource requests in the network.Firstly,the user’s needs and consumption patterns were analyzed,and the resource transaction model was determined.Secondly,combined with the spot consumption model and plan consumption,the reservation mechanism under the resource dynamic pricing strategy model was determined.Finally,according to the proposed resource pricing strategy,the resource price was simulated,the results show that by stimulating the user to reserve resources in advance and combining the trust degree and consumption habits of each user with corresponding preferential prices,it is possible to effectively avoid the users from obtaining network resources in a centralized manner.…”
    Get full text
    Article
  2. 5682

    On Clustering Detection Based on a Quadratic Program in Hypergraphs by Qingsong Tang

    Published 2022-01-01
    “…The determination of clustering structure within hypergraphs is a significant problem in the area of data mining. Various works of detecting clusters on graphs and uniform hypergraphs have been published in the past decades. …”
    Get full text
    Article
  3. 5683

    A New Fuzzy System Based on Rectangular Pyramid by Mingzuo Jiang, Xuehai Yuan, Hongxing Li, Jiaxia Wang

    Published 2015-01-01
    “…The novelty of the proposed system is mainly in the compound of the antecedents, which is based on the proposed rectangular pyramid membership function instead of t-norm. …”
    Get full text
    Article
  4. 5684

    Asymmetric watermarking based on Contourlet transform and subspace projection by HE Mi, CHENG Li-zhi

    Published 2009-01-01
    “…For the copyright protection of the digital image,a new asymmetric watermarking method of feature subspace projection based on Contourlet transform was presented.Embedding matrix(private key) and detecting matrix(public key) were constructed differently,where embedding matrix was kept secretly while detecting matrix was public.At the same time,the embedding matrix was independent on the host images.Robust subspace was obtained by Contourlet transformation.Using the embedding matrix,the arbitrary watermarking was embedded in the robust subspace.The de-tection function was constructed to detect whether an image had watermarking or not.The proposed method has good security,high detection probability and low false alarm probability.The stimulation shows that the proposed method is robust to many attacks.…”
    Get full text
    Article
  5. 5685

    Cookie based online tracing method for cyberlockers resource by Hai-lun LIN, Yan LI, Wei-ping WANG, Yin-liang YUE, Zheng LIN

    Published 2016-12-01
    “…An efficient and scalable cookie based online cyberlockers resource tracing method was proposed, called CookieTracing. …”
    Get full text
    Article
  6. 5686

    Boolean-chaos-based physical random number generator by Qiqi ZHANG, Jianguo ZHANG, Pu LI, Yanqiang GUO, Yuncai WANG

    Published 2019-01-01
    “…A novel method for generating physical random numbers using Boolean-chaos as the entropy source was proposed.An autonomous Boolean network (ABN) without self-feedback was constructed by using two-input logic gates,and its dynamic characteristics were analyzed.Based on this,a 15-node ABN circuit was implemented to successfully generate Boolean-chaos with a bandwidth of ~680 MHz and a min-entropy around 1.By implementing the entropy source and the entropy extraction circuit on a single FPGA,the physical random number generation with a real-time rate of 100 Mbit/s was finally achieved.The NIST SP800-22 and DIEHARD randomness test results demonstrate that the obtained random sequences by the method successfully pass all tests.This indicates the random numbers has good random statistical characteristics.…”
    Get full text
    Article
  7. 5687
  8. 5688

    A Lissajous Curve–Based Method for Busbar Protection by M. Sarlak

    Published 2024-01-01
    “…In this paper, a novel time-domain method based on the orientation analysis of the superimposed current component Lissajous curves is presented for busbar protection. …”
    Get full text
    Article
  9. 5689

    Security of the deployment of SDN-based IoT using blockchain by Ping XIE, Xiaosong LIU

    Published 2020-12-01
    “…Compared with the traditional internet,the SDN-based internet of things (IoT) has a wider coverage,more connected devices,more complex data transmission.There are many security technical challenges.The security challenges of SDN-based IoT deployment were firstly analyzed,and then the advantages of blockchain technology in solving those security issues were introduced.Finally,to add a blockchain-based security layer was proposed,which acted as a security gateway,data entering the IoT was verified accurately one time.Each security gateway was added to the blockchain system as an equal blockchain node,combined with the traceability and non-tampering of the blockchain system,the security performance and efficiency of SDN-based IoT deployments was improved.…”
    Get full text
    Article
  10. 5690

    Study on the RV Reducer based on Patent Map Technology by Chen Zhilan Chen Yunjie

    Published 2019-12-01
    “…Through the patent database of 5074 patent data, the patent map of technical progress of RV reducer in recent 74 years at home and abroad is studied. …”
    Get full text
    Article
  11. 5691

    Wireless indoor localization technology based on fingerprint algorithm by Mengdan ZHANG, Guangyue LU, Honggang WANG, Jiming LIU

    Published 2016-10-01
    “…As people's demand for location based service(LBS)is increasing, indoor localization has gradually becomes a hot research topic in the field of user location. …”
    Get full text
    Article
  12. 5692

    Design of video recommender system based on cloud computing by Ying-zhuang LI, Tuo GAO, Xian-yi LI

    Published 2013-09-01
    “…Through the survey and research of the existing video sites,some video sites face the problem of information overload.So it is necessary for the video sites to have a recommender system.Through the study of the existing video recommender system,using open source cloud computing technologies—Hadoop,and some of its related components such as Hive and Hbase,a personalized video recommendation system based on cloud platform was designed.The system is only applicable to professional video-based website.…”
    Get full text
    Article
  13. 5693

    TD algorithm based on double-layer fuzzy partitioning by Xiang MU, Quan LIU, Qi-ming FU, Hong-kun SUN, Xin ZHOU

    Published 2013-10-01
    “…When dealing with the continuous space problems,the traditional Q-iteration algorithms based on lookup-table or function approximation converge slowly and are diff lt to get a continuous policy.To overcome the above weak-nesses,an on-policy TD algorithm named DFP-OPTD was proposed based on double-layer fuzzy partitioning and its convergence was proved.The first layer of fuzzy partitioning was applied for state space,the second layer of fuzzy parti-tioning was applied for action space,and Q-value functions were computed by the combination of the two layer fuzzy partitioning.Based on the Q-value function,the consequent parameters of fuzzy rules were updated by gradient descent method.Applying DFP-OPTD on two classical reinforcement learning problems,experimental results show that the algo-rithm not only can be used to get a continuous action policy,but also has a better convergence performance.…”
    Get full text
    Article
  14. 5694

    Construction of quantum BCH code based on cyclotomic coset by Lijuan XING, Zhuo LI

    Published 2021-10-01
    “…Quantum-error-correcting code can overcome quantum decoherence efficiently, which is the key technology to realize quantum computers.A series of quantum BCH code was proposed based on classical codes.First, a general way of well-chosen cyclotomic coset was introduced.A sufficient condition was given to calculate the number of elements in cyclotomic coset.Then, a series of quantum BCH (Bose-Chaudhuri-Hocquenghem) code over finite field F<sub>q</sub> was constructed by CSS (Calderbank-Shor-Steane) construction and Steane construction.The results were extended to finite field F<sub>q</sub><sup>2</sup> with Hermitian construction.Compared with the results in literature,the range of introduced cyclotomic coset is more wide, and the new quantum BCH code has higher dimensions and better lower bounds on minimum distances.Furthermore, a family of quantum maximum distance separable (quantum MDS) code over any finite fields is constructed.…”
    Get full text
    Article
  15. 5695

    Cache prefetching strategy based on selective Markov model by CAI Wei-hong1, XIAO Shui2, WEI Gang1, XIONG Zhi2, HUANG Min-hua2

    Published 2010-01-01
    “…Through analyzing the existing streaming media cache management algorithm and user’s watching behavior characteristics,a new cache prefetching strategy based on selective Markov model was presented.The strategy,by mod-eling the user’s VCR action of choosing the merging sequence method,applied the FP<sub>V</sub>like method to get the selective Markov model FPMM<sub>V</sub>like and built a streaming media proxy cache prefetching mechanism FP<sub>V</sub>like-LRU-2 by com-bining the replacement algorithm LRU-2.The experimental results show that,FP<sub>V</sub>like-LRU-2 is 10%、12%、17% higher than FP<sub>L</sub>RU-2,SP<sub>L</sub>RU-2 and LRU-2 respectively in reducing latency experienced by users,and this value is able to reach over 60% in the ideal situation.…”
    Get full text
    Article
  16. 5696

    Solar flare forecasting based on a Fusion Model by YiYang Li, ShiYong Huang, SiBo Xu, ZhiGang Yuan, Kui Jiang, QiYang Xiong, RenTong Lin

    Published 2025-01-01
    “…We collected samples of magnetograms from May 1, 2010 to September 13, 2018 from Space-weather Helioseismic and Magnetic Imager (HMI) Active Region Patches and then used a cross-validation method to obtain seven independent data sets. We then utilized five metrics to evaluate our fusion model, based on intermediate-output extracted by ResNet and SVM using the Gaussian kernel function. …”
    Get full text
    Article
  17. 5697

    Application of digital twin model based industrial internet by Bin LIU, Yunyong ZHANG

    Published 2019-05-01
    “…Industrial internet is an important engine for manufacturing enterprises to provide intelligent products and services in China.From manufacturing enterprises’ point of view,the definition and data sources of industrial internet were introduced,and the five-layer function architecture of industrial internet was proposed.The industrial data analysis model represented by digital twin played a crucial role in developing industrial internet for manufacturing enterprises,whose definition,characteristics,key technologies and applications in the whole product lifecycle were elaborated.Finally,the problems and solutions of carrying forward industrial internet in China were addressed.…”
    Get full text
    Article
  18. 5698

    Interactive trajectory prediction for autonomous driving based on Transformer by R. Xu, J. Li, S. Zhang, L. Li, H. Li, G. Ren, X. Tang

    Published 2025-02-01
    “…In this paper, we propose a novel trajectory prediction algorithm based on Transformer networks, a data-driven method that ingeniously harnesses dual-input channels. …”
    Get full text
    Article
  19. 5699

    An Entropy Based Anomaly Traffic Detection Approach in SDN by Mingxin Wang, Huachun Zhou, Jia Chen, Hongke Zhang

    Published 2015-09-01
    “…SDN(software defined networking)is a novel network infrastructure which separate the control plane from the data plane. Taking advantage of the idea of SDN, a central security center was built which collected traffic from the SDN data plane entity for analyzing. …”
    Get full text
    Article
  20. 5700