Showing 11,661 - 11,680 results of 19,511 for search '"Algorithm"', query time: 0.14s Refine Results
  1. 11661

    Novel identity-based fully homomorphic encryption scheme from lattice by Yong-li TANG, Ming-xing HU, Kun LIU, Qing YE, Xi-xi YAN

    Published 2017-05-01
    “…The previous identity-based homomorphic encryption schemes from lattice was analyzed.That the high complexity in previous schemes was mainly caused by trapdoor generation and preimage sampling was pointed out.A new solution was proposed.A novel identity-based encryption scheme from lattice by combining new trapdoor function and dual-LWE algorithm organically was constructed,and it was transformed to an identity-based fully homomorphic encryption scheme from lattice by employing the idea of eigenvector.Comparative analysis shows that the scheme’s complexity of trapdoor generation has a significant reduction,the complexity of preimage sampling has a nearly three-fold reduction,and the SIVP approximation factor has a <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mrow> <msqrt> <mi>m</mi> </msqrt> </mrow></math></inline-formula> times reduction.The security of the proposed scheme strictly reduces to the hardness of decisional learning with errors problem in the standard model.…”
    Get full text
    Article
  2. 11662

    Evaluation and protection of multi-level location privacy based on an information theoretic approach by Wenjing ZHANG, Qiao LIU, Hui ZHU

    Published 2019-12-01
    “…A privacy metric based on mutual information was proposed to measure the privacy leakage occurred when location data owner trust data users at different levels and need to publish the distorted location data to each user according to her trust level,based on which an location privacy protection mechanism (LPPM)was generated to protect user’s location privacy.In addition,based on mutual information,a metric was proposed to measure the privacy leakage caused by attackers obtaining different levels of distorted location data and then performing inference attack on the original location data more accurately.Another privacy metric was also proposed to quantify the information leakage occurred in the scenario based on mutual information.In particular,the proposed privacy mechanism was designed by modifying Blahut-Arimoto algorithm in rate-distortion theory.Experimental results show the superiority of the proposed LPPM over an existing LPPM in terms of location privacyutility tradeoff in both scenarios,which is more conspicuous when there are highly popular locations.…”
    Get full text
    Article
  3. 11663

    An Incremental-Hybrid-Yager’s Entropy Model for Dynamic Portfolio Selection with Fuzzy Variable by Yin Li, Jian Tao, Yazhi Song

    Published 2018-01-01
    “…At last, a compromised genetic algorithm is designed, and the numerical example shows that the proposed model achieves solid returns compared against the mean-variance model and Markov chain Monte Carlo method.…”
    Get full text
    Article
  4. 11664

    Cracks Detection Using Active Modal Damping and Piezoelectric Components by B. Chomette, A. Fernandes, J.-J. Sinou

    Published 2013-01-01
    “…This method uses the active damping variation identificated with the Rational Fraction Polynomial algorithm as an indicator of cracks detection. The efficiency of the proposed method is demonstrated through numerical simulations corresponding to different crack depth and locations in the case of a finite element model of a clamped-clamped beam including four piezoelectric transducers.…”
    Get full text
    Article
  5. 11665

    Economical heuristics for fully interval integer multi-objective fuzzy and non-fuzzy transportation problems by Baranwal Tarishi, Akilbasha A.

    Published 2024-01-01
    “…Our results show that the proposed algorithm hugely outperforms the best solution approaches.…”
    Get full text
    Article
  6. 11666

    Improved embedded wideband speech codec fitting EV-VBR standard by XIN Jie, BAO Chang-chun, JIA Mao-shen, LIU Xin

    Published 2010-01-01
    “…Based on the International Telecommunication Union Telecommunication Standardization Sector(ITU-T) recommendation for EV-VBR coding standard and the candidate codec designed by Speech and Audio Signal Processing Laboratory(SASPL) of Beijing University of Technology,an improved embedded variable bit rates wideband speech codec was proposed.In the improved codec,ACELP coding was implied to the first two coding layers.The middle sub-frame spectral parameters were computed and quantized.Three pulses depth first tree search algorithm was designed.On the higher three coding layers embedded TCX coding was reconstructed by accumulating frequency coefficients vectors.Addition-ally,VAD and DTX functions were implemented in the improved codec.Test results show that the improved codec achieves better speech quality and much lower coding complexity than the original codec.The speech quality and coding efficiency are comparable with G.718 of a new ITU-T speech coding standard and the low delay feature is retained.…”
    Get full text
    Article
  7. 11667

    POSITIVE, NEGATIVE RULE AND APPLICATION by Nguyễn Đức Thuần, Phạm Quang Tùng, Hồ Thị Thu Sa

    Published 2018-09-01
    “…In this paper, we introduce the concepts of extended negative rule, minimal rule and their properties. Then, an algorithm to generate all minimal positive and minimal negative rules is introduced. …”
    Get full text
    Article
  8. 11668

    Fast Image Search with Locality-Sensitive Hashing and Homogeneous Kernels Map by Jun-yi Li, Jian-hua Li

    Published 2015-01-01
    “…As to hold the kernel functions, recent work has probed methods to create locality-sensitive hashing, which guarantee our approach’s linear time; however existing methods still do not solve the problem of locality-sensitive hashing (LSH) algorithm and indirectly sacrifice the loss in accuracy of search results in order to allow fast queries. …”
    Get full text
    Article
  9. 11669

    Design and Optimization of the Master Manipulator of Minimally Invasive Surgery Robots by Liu Fen, Song Liqiang, Huang Fang, Han Rui, Sang Hongqiang

    Published 2024-05-01
    “…The Jacobian matrix of the master manipulator is solved, the comprehensive performance index of the master manipulator is defined based on the global performance dexterity index and the workspace utilization ratio, and the key link scale parameters are optimized by the genetic algorithm. The results show that the comprehensive performance index of the master manipulator after optimization is 18.41% higher than that before optimization, and the master manipulator is more compact, has better performance besides meeting the design requirements of the workspace.…”
    Get full text
    Article
  10. 11670

    Approximate Solutions of the Generalized Abel’s Integral Equations Using the Extension Khan’s Homotopy Analysis Transformation Method by Mohamed S. Mohamed, Khaled A. Gepreel, Faisal A. Al-Malki, Maha Al-Humyani

    Published 2015-01-01
    “…User friendly algorithm based on the optimal homotopy analysis transform method (OHATM) is proposed to find the approximate solutions to generalized Abel’s integral equations. …”
    Get full text
    Article
  11. 11671

    Influence of Concrete Creep on the Bending of a Prestressed Bridge Beam by Petr P. Gaidzhurov, Elvira R. Iskhakova, Nina A. Saveleva

    Published 2023-07-01
    “…Therefore, the problem of developing a finite-element algorithm and corresponding software allowing the modelling of the volumetric stress-strain state of large-span prestressed reinforced concrete structures within the framework of the theory of hereditary aging is relevant.…”
    Get full text
    Article
  12. 11672

    An Asymmetrical Mixed Higher-Order Discontinuous Galerkin Time Domain Method for Electromagnetic Scattering from the Plasma Sheath around a Hypersonic Vehicle by Jirong Guo, Yiping Han

    Published 2023-01-01
    “…In order to calculate the numerical flux between the two types of grids in the discontinuous Galerkin time domain (DGTD) algorithm, an asymmetric high-order element is constructed as a transition unit. …”
    Get full text
    Article
  13. 11673

    New Application’s Approach to Unified Power Quality Conditioners for Mitigation of Surge Voltages by Yeison Alberto Garcés Gomez, Nicolás Toro García, Fredy E. Hoyos

    Published 2016-01-01
    “…Also a new compensation algorithm is proposed through the application of the theory of generalized reactive power; this is then compared with the theory of active and reactive instantaneous power, or pq theory. …”
    Get full text
    Article
  14. 11674

    On the Distance Pattern Distinguishing Number of a Graph by Sona Jose, Germina K. Augustine

    Published 2014-01-01
    “…Further, this paper provides an algorithm to determine whether a graph is a distance pattern distinguishing graph or not and hence to determine the distance pattern distinguishing number of that graph.…”
    Get full text
    Article
  15. 11675

    Conditional Analysis for Mixed Covariates, with Application to Feed Intake of Lactating Sows by S. Y. Park, C. Li, S. M. Mendoza Benavides, E. van Heugten, A. M. Staicu

    Published 2019-01-01
    “…The methodology accommodates flexible model structure, allows for joint estimation of the quantiles at all levels, and provides a computationally efficient estimation algorithm. Extensive numerical investigation confirms good performance of the proposed method. …”
    Get full text
    Article
  16. 11676

    Optimized design of sensing transmission and computing collaborative industrial Internet by Jingbo LI, Li MA, Yang LI, Yingxun FU, Dongchao MA

    Published 2023-06-01
    “…In view of the new scenario and time-sensitive requirements of sensing-transmission end to computing end in the industrial Internet, and to solve the problem of end-to-end delay in applications that were not up to standard, a network optimized design scheme for sensing-transmission cooperative computing was proposed.First, the sensing-transmission computing cooperative network architecture based on cloud-edge-end was proposed to promote the deep integration of multidimensional systems and heterogeneous resources.Secondly, the network topology construction mode was optimized to reduce the average path length of the network, shorten the propagation distance, and offset the problem of signal decay due to the use of higher frequencies.Finally, the routing method was improved, and an integrated algorithm of topology optimization and routing strategy was designed to reduce the queuing delay in the network, control the end-to-end delay within a bounded range, and weaken the “long tail phenomenon”.The experimental results show that the scheme reduces the end-to-end delay and ensures the real-time and reliability of the network by optimizing the network topology and routing strategy and integrating the design.…”
    Get full text
    Article
  17. 11677

    Practical Hybrid Machine Learning Approach for Estimation of Ultimate Load of Elliptical Concrete-Filled Steel Tubular Columns under Axial Loading by Tien-Thinh Le

    Published 2020-01-01
    “…The proposed model was Adaptive Neurofuzzy Inference System (ANFIS) combined with Real Coded Genetic Algorithm (RCGA), denoted as RCGA-ANFIS. The evaluation of the model was performed using the coefficient of determination (R2) and root mean square error (RMSE). …”
    Get full text
    Article
  18. 11678

    APPLICATION OF IMPROVED GWO-SVM IN WIND TURBINE GEARBOX FAULT DIAGNOSIS by HU Xuan, LI Chun, YE KeHua, ZHANG WanFu

    Published 2021-01-01
    “…The improved gray wolf algorithm is used to optimize the support vector machine to diagnose the gearbox fault feature set after dimensionality reduction. …”
    Get full text
    Article
  19. 11679

    A frequency offset compensation method based on all phase FFT amplitude by Yingjie ZHU, Wuxiong ZHANG, Huiyue YI, Hui XU

    Published 2022-06-01
    “…Distance measurement is an important part of the wireless location technology.The ranging accuracy of millimeter wave based distance measurement depends on the frequency estimation accuracy of beat signals from the targets, but the existing frequency estimation algorithms have the shortcomings of either high complexity or low accuracy.In order to improve the ranging accuracy, the frequency compensation value and frequency estimation method based on all phase FFT amplitude was proposed to improve the performance of frequency estimation.Firstly, the signal amplitude was estimated based on the relationship between its all phase FFT and its conventional FFT spectrum.Moreover, using the relationship between the estimated signal amplitude, the signal spectrum amplitude and frequency compensation value, the frequency compensation value was solved by Newton iterative algorithm.Then, the frequency compensation value was used to shift the frequency of the signal, and the frequency compensation value was estimated again to obtain the final estimation value of the signal frequency, from which the distance of the target was calculated.Finally, simulation results were presented to show that the proposed method has higher distance measurement accuracy than the existing methods.…”
    Get full text
    Article
  20. 11680

    Fracture toughness of rough and frictional cracks emanating from a re-entrant corner by Andrea Carpinteri, Andrea Spagnoli, Michele Terzano, Sabrina Vantadori

    Published 2017-06-01
    “…The solution is found using the distributed dislocation method, and an iterative algorithm is needed due to the non-linearity of the model. …”
    Get full text
    Article