-
1
Machining Scheme Selection of Features Based on Process Knowledge Graph and Improved Cosine Similarity Matching
Published 2025-02-01Subjects: “…machining scheme selection…”
Get full text
Article -
2
Joint vibrotactile coding for machine recognition and human perception
Published 2023-05-01“…In order to accurately transmit the content meaning of vibrotactile signals and achieve intelligent recognition and signal reconstruction, a joint vibrotactile coding scheme for machine recognition and human perception was proposed.At the encoding end, the original three-dimensional vibrotactile signals were converted into one-dimensional signals.Then the semantic information of the signals was extracted using a short-time Fourier transform before being effectively compressed and transmitted.At the decoding end, a fully convolutional neural network was used to intelligently recognize based on the semantic information.The difference between the original signals and the reconstructed signals based on semantic information was used as compensation for the semantic information, and the quality of the reconstructed signals was gradually improved to meet human perceptual needs.The experimental results show that the proposed scheme achieve tactile recognition with semantic information at a lower bit rate while improving the compression efficiency of tactile data, thus satisfying human perceptual needs.…”
Get full text
Article -
3
AMC With a BP-ANN Scheme for 5G Enhanced Mobile Broadband
Published 2025-01-01“…AMC technologies use channel state information to select the optimal modulation or coding scheme as well as transmission parameters to improve the transmission speed, transmission quality, and spectrum efficiency of links. …”
Get full text
Article -
4
Tradeoff between compression ratio and decoding delay of distributed source coding for uplink transmissions in machine-type communication
Published 2018-07-01“…We analyze how the decoding delay and storage consumption scale with the number of users and prove that the average decoding delay grows linearly with the user number under some assumptions. A machine-type communications uplink transmission scheme adopting clustered distributed source coding is proposed to balance the compression ratio and decoding delay of distributed source coding where users are divided into independently encoded and decoded clusters. …”
Get full text
Article -
5
-
6
-
7
X-SPIDE: An eXplainable Machine Learning Pipeline for Detecting Smart Ponzi Contracts in Ethereum
Published 2025-01-01Get full text
Article -
8
QoS-Aware Link Adaptation for Beyond 5G Networks: A Deep Reinforcement Learning Approach
Published 2025-01-01Subjects: Get full text
Article -
9
-
10
Generation Method for HVAC Systems Design Schemes in Office Buildings Based on Deep Graph Generative Models
Published 2024-10-01Get full text
Article -
11
FPGA implementation of high throughput encoder and decoder design of lossless canonical Huffman machine
Published 2025-06-01“…Traditional compression and decompression schemes suffer from data loss, low throughput, and high encoding time. …”
Get full text
Article -
12
Privacy cloud storage scheme based on fog computing
Published 2019-03-01“…As one of the core applications in cloud computing field,cloud storage attracts a large number of users depending on its powerful storage capacity.However,in this storage schema,users’ data is stored completely in cloud server.In other word,users’ right of control on data is lost and users are facing privacy leakage risk.Traditional privacy protection scheme is usually based on encryption technology,but the attack from the inside of cloud server can’t be resisted effectively by these kinds of methods.Once the password gets compromised,users’ data will be stolen.In order to solve this problem,a three-level secure cloud storage scheme based on fog computing was proposed and a Hash-Solomon code algorithm was designed.A small part of data was stored in local machine and fog server,which can take full advantage of cloud storage and protect the privacy of data.Through the theoretical safety analysis and experimental test,the feasibility of our scheme is proved,and it is really a powerful supplement to existing cloud storage scheme.…”
Get full text
Article -
13
Defense scheme for the world state based attack in Ethereum
Published 2022-04-01“…Ethereum is taken as the representative platform of the second generation of blockchain system.Ethereum can support development of different distributed applications by running smart contracts.Local database is used to store the account state (named world state) for efficient validation of transactions, and the state root is stored in the block header to guarantee the integrity of the state.However, some researches revealed that the local database could be easily tempered with, and attackers can issue illegal transactions based on the modified account state to obtain illegitimate benefits.This world-state based security problem was introduced, and the preconditions for attack were analyzed.Compared with the two common security threats under the PoW (proof of work) consensus, it was found that when the attacker controls the same mining computing power, the world-state based attack brought higher risk, and the success rate approached 100%.In order to deal with this threat, a practical scheme for attack detection and defense was proposed accordingly.The secondary verification and data recovery process were added to the Ethereum source code.The feasibility and complexity of the proposed scheme was evaluated with single-machine multi-threading experiments.The proposed scheme improves Ethereum’s tolerance to malicious tampering of account state, and is applicable to other blockchain platforms applying local database for transaction validation, such as Hyperledger Fabric.In addition, the time and computational overhead brought by the proposed scheme are not prominent, so it has good applicability and induces acceptable impact on the performance of original system.…”
Get full text
Article -
14
EFFECTIVE MODELS AND SCHEMES OF CYCLIC ACTION DIGITAL DEVICES
Published 2018-06-01“…The work considersmodels and schemes of widespread digital devices of cyclic action. …”
Get full text
Article -
15
On the Achievable User Number of the Downlinks in Cellular-Based Machine-to-Machine Communications
Published 2012-09-01“…In cellular-based machine-to-machine (M2M) networks, supporting large number of machine-type communications (MTC) users (devices) has become a critical challenge in both the uplink and downlink channels. …”
Get full text
Article -
16
Successive Refinement for Lossy Compression of Individual Sequences
Published 2025-03-01“…The matching achievability scheme is conceptually straightforward. We also consider the more general multiple description coding problem on a similar footing and propose achievability schemes that are analogous to the well-known El Gamal–Cover and the Zhang–Berger achievability schemes of memoryless sources and additive distortion measures.…”
Get full text
Article -
17
Deep Joint Source Channel Coding for Privacy-Aware End-to-End Image Transmission
Published 2025-01-01Get full text
Article -
18
NeuralMag: an open-source nodal finite-difference code for inverse micromagnetics
Published 2025-06-01“…The library implements a novel nodal finite-difference discretization scheme that provides improved accuracy over traditional finite-difference methods without increasing computational complexity. …”
Get full text
Article -
19
A Radar-Based Fast Code for Rainfall Nowcasting over the Tuscany Region
Published 2025-07-01Get full text
Article -
20
Comparative Analysis of SEC DED, EVEN-ODD, and Pyramid Codes for Distributed Storage Systems: A MATLAB-Based Study
Published 2025-01-01“…The study concludes with recommendations for enhancing erasure coding effectiveness in distributed environments and suggests areas for future research, including hybrid coding schemes and machine learning optimizations.…”
Get full text
Article