-
401
Research on a combining algorithm for harassing calls to identify
Published 2017-07-01Subjects: Get full text
Article -
402
ALBERTA: ALgorithm-Based Error Resilience in Transformer Architectures
Published 2025-01-01“…Ensuring the correct execution of these models in GPUs is critical, despite the potential for transient hardware errors. We propose a novel algorithm-based resilience framework called ALBERTA that allows us to perform end-to-end resilience analysis and protection of transformer-based architectures. …”
Get full text
Article -
403
Power services scheduling algorithm based on quantum communication
Published 2019-11-01“…Quantum communication could effectively improve the transmission’s reliability and security of power system services.However,limited by the generating rate of quantum key,it was difficult to meet the encryption requirements of important services.Therefore,a queue scheduling algorithm was required to legitimately schedule the power system services which need to be encrypted in quantum communication.An improved weighted fair queuing (weighted fair queuing,WFQ) algorithm LD-WFQ was proposed.By estimating the expected delay of the data packets to be encrypted,sending the packets that would soon be timeout,the proposed algorithm effectively reduced the timeout ratio of the packets and improved the effective utilization of quantum keys,while maintaining the timeout ratio of the packets in high priority queue at a low level.Compared with the WFQ algorithm,the simulation result proves the superiority of LD-WFQ algorithm.…”
Get full text
Article -
404
GMM-based localization algorithm under NLOS conditions
Published 2014-01-01Subjects: Get full text
Article -
405
Dynamical resource allocation algorithm research in network virtualization
Published 2011-01-01“…Aim to the problem of resource allocation,a dynamical algorithm of allocating resource was proposed.The algorithm dynamical migrates virtual node,which based on the average load discrepant degree of physical nodes and the tolerant load discrepant degree of substrate network.It will choose a proper host according to the values of synthetically impact factor,that reduce impact on the delay of virtual link and the bandwidth of physical link.Simulation result shows that the algorithm can improve load balance on physical nodes,and reduce negative impact on delay and bandwidth.…”
Get full text
Article -
406
An Algorithm Using DBSCAN to Solve the Velocity Dealiasing Problem
Published 2021-01-01“…The results of the case study also show that the 4DD algorithm filters out many observation gates close to the missing data or radar center, whereas the proposed algorithm tends to retain and correct these gates.…”
Get full text
Article -
407
IMPROVEMENT OF CUCKOO ALGORITHM FOR ASSOCIATION RULE HIDING PROBLEM
Published 2018-07-01“…Recently, a meta-heuristic algorithm is relatively effective for this purpose, which is cuckoo optimization algorithm (COA4ARH). …”
Get full text
Article -
408
Routing algorithm for MPLS traffic engineering in satellite network
Published 2011-01-01Subjects: Get full text
Article -
409
Algorithm of NAF scalar multiplication on ECC against SPA
Published 2012-09-01“…Against the problem that non-adjacent form(NAF)scalar multiplication on Elliptic curve cryptography(ECC) were not well resist the simple power attack(SPA),the implementation of NAF scalar multiplication and the mechanism of SPA attack were analyzed.Then a new algorithm,named equal power NAF scalar multiplication was presented.It was verified that equal power NAF scalar multiplication was efficient countermeasure against SPA attack by experimental analysis on power traces of the smartcard collected from the power analysis platform.…”
Get full text
Article -
410
Learning Based Genetic Algorithm for Task Graph Scheduling
Published 2019-01-01“…An effective scheduling algorithm attempts to minimize the makespan and an efficient algorithm, in addition to that, tries to reduce the complexity of the optimization process. …”
Get full text
Article -
411
Intuitionistic Fuzzy Possibilistic C Means Clustering Algorithms
Published 2015-01-01“…The clustering algorithm has membership and nonmembership degrees as intervals. …”
Get full text
Article -
412
Research progress of mimic multi-execution scheduling algorithm
Published 2021-05-01“…Mimic defense is the new active defense technology based on the dynamic heterogeneous redundant architecture.With inherent uncertainty, heterogeneous, redundant and negative feedback features, it can significantly improve the robustness and security of system.Among them, the scheduling algorithm is the key to mimic defense technology, which advantages and disadvantages directly affect the ability of system to resist attacks based on known or unknown vulnerabilities.Based on this, the principle and goal of mimic scheduling algorithm were firstly introduced.Then the state-of-the-art of mimic scheduling algorithms were analyzed and summarized from three aspects, such as scheduling object, scheduling quantity and scheduling timing.Finally, the future research direction and trend of mimic scheduling algorithms were prospected.…”
Get full text
Article -
413
A novel perturbation attack on SVM by greedy algorithm
Published 2019-01-01Subjects: Get full text
Article -
414
Secure key-sharing algorithm based on smart grid
Published 2021-08-01“…Most of establishment-key protocols suffer from both session-specific temporary information attack and private key leakage issue.Therefore, a novel public key sharing-based symmetric encryption algorithm (PKS-SE) was proposed, in order to maintain the security of communication between smart meter and service providers.Based on bilinear mapping and super-singular curve, PKS-SE algorithm constructed the communication key between intelligent electricity meter and service provider, in order to avoid the key escrow problem.At the same time, PKS-SE algorithm reduced the number of required messages during the mutual authentication to only two messages, thus controlling the communication cost and operation cost of PKS-SE algorithm.Simulation results show that the proposed PKS-SE algorithm can effectively realize public key-sharing…”
Get full text
Article -
415
Hierarchical Sliding Mode Algorithm for Athlete Robot Walking
Published 2017-01-01“…A new method based on hierarchical sliding mode for controlling postures is also introduced. Genetic algorithm is applied to design the oscillator for robot motion. …”
Get full text
Article -
416
Geometrically synchronous watermarking algorithm based on the corner feature
Published 2011-01-01“…Simple geometric attacks could destroy watermark or its position,causing the failure of most watermarking algorithm.A geometrically synchronous watermarking algorithm robust based on the corner feature was proposed.In this paper,the feature point was detected on the normalization of the image to resist geometric attack;the combination of Harris and MIC corner detected algorithm was utilized to extract steady corner based on analyzing the advantages and disadvantages of the two algorithm;the watermarking information was statistic embed in the shape of rings instead of changing the simply one pixel.Sufficient experiments demonstrate the robustness of this approach,especially in resisting geometry attack such as RST(rotation,scaling and translation).…”
Get full text
Article -
417
Algorithm of grid reliability assessment and reconstruction optimization system
Published 2017-12-01“…Based on the research of the reliability of distribution network and the reconstruction of network,a new method was put forward to reconstruct the power grid reliability.Firstly,the evaluation index system was proposed,which included the active network LOSS (LOSS),lack of system power supply (ENS) and the average power supply availability (ASAI).A multi-objective model of distribution network was constructed by normalization,and the multi-objective function was transformed into a new single objective function by using the judgment matrix method,which realized fast calculation of power distribution network reconstruction and optimization.Through IEEE69 example verification,the optimization algorithm can obtain the global optimal solution and reduce the computational time at the same time,effectively solve the problem of the reconstruction of the complex network optimization.…”
Get full text
Article -
418
Efficient top-k string similarity query algorithms
Published 2014-12-01“…,given a query string σ and string set S,finding k similar strings to σ based on edit distance from S.Firstly,two adaptive filter strategies based on length-skip index are proposed,such that to reduce the times of edit distance computation between two strings.Then the lower bound of edit distance between query string and unmatched string set is proposed,such that to further reduce the times of edit dis-tance computation when processing strings that do not have common signatures with the query string.Finally efficient algorithms to return top-k similar strings are proposed.Experimental results on three real datasets verify the benefits over the state-of-the-art algorithm.…”
Get full text
Article -
419
Federated learning optimization algorithm based on incentive mechanism
Published 2023-05-01“…Federated learning optimization algorithm based on incentive mechanism was proposed to address the issues of multiple iterations, long training time and low efficiency in the training process of federated learning.Firstly, the reputation value related to time and model loss was designed.Based on the reputation value, an incentive mechanism was designed to encourage clients with high-quality data to join the training.Secondly, the auction mechanism was designed based on the auction theory.By auctioning local training tasks to the fog node, the client entrusted the high-performance fog node to train local data, so as to improve the efficiency of local training and solve the problem of performance imbalance between clients.Finally, the global gradient aggregation strategy was designed to increase the weight of high-precision local gradient in the global gradient and eliminate malicious clients, so as to reduce the number of model training.…”
Get full text
Article -
420
Algorithms for Computing Wiener Indices of Acyclic and Unicyclic Graphs
Published 2021-01-01“…In this paper, we described a linear time algorithm (LTA) that computes the Wiener index for acyclic graphs and extended this algorithm for unicyclic graphs. …”
Get full text
Article