Showing 11,841 - 11,860 results of 19,511 for search '"Algorithm"', query time: 0.12s Refine Results
  1. 11841

    CFA-Based Splicing Forgery Localization Method via Statistical Analysis by Lei Liu, Peng Sun, Yubo Lang, Jingjiao Li

    Published 2024-01-01
    “…Most previous color filter array (CFA)-based forgery localization methods perform under the assumption that the interpolation algorithm is linear. However, interpolation algorithms commonly used in digital cameras are nonlinear, and their coefficients vary with content to enhance edge information. …”
    Get full text
    Article
  2. 11842

    EBS-based efficient and secure group key management in wireless sensor networks by WANG Wei1, ZHAO Wen-hong2, LI Feng-hua3.4, MA Jian-feng3

    Published 2009-01-01
    “…To achieve the secure group communication in wireless sensor networks(WSN), a EBS-based group key management scheme was presented.First, the network topology was simplified by combining the chain-clusters and the star-clusters.Next, to prevent the adversary uncover all the administrative keys by a few colluding sensors, the number of sensors needed to capture WSN was increased.Then, the sensors of key combinations distribution were sorted through a coloring algorithm.Based on all these operations, the presented scheme distributed the administrative keys based on the hamming distance and EBS.Furthermore, the approaches handling the join event and leave event were described.Two experiments were performed to study the potential for collusions and the influence of size of compromised nodes on the effectiveness against collusions.Simulation results demonstrate that the presented scheme boosts the WSN’ resilience to attacks.The performance evaluation on join event and leave event shows that the number of key-updating messages and storage of sensors in the proposed scheme are fewer than those of SHELL.…”
    Get full text
    Article
  3. 11843

    Considering the Carbon Penalty Rates to Optimize the Urban Distribution Model in Time-Varying Network by Yuanyuan Ji, Shoufeng Ji, Tingting Ji

    Published 2022-01-01
    “…An improved variable neighborhood search (VNS) heuristic algorithm is designed to solve the model. The numerical example demonstrates that the higher the carbon emission cost, the greater the carbon penalty rate. …”
    Get full text
    Article
  4. 11844

    Mobile Multi-Agent Evaluation Method for Wireless Sensor Networks-Based Large-Scale Structural Health Monitoring by Shenfang Yuan, Dong Liang, Lei Qiu, Menglong Liu

    Published 2012-11-01
    “…Mobile agent with the signal processing or evaluation algorithm is designed to migrate among different sensor nodes and perform network self-organization, data processing, information fusion, and damage estimation. …”
    Get full text
    Article
  5. 11845

    Efficient Midfrequency Analysis of Built-Up Structure Systems with Interval Parameters by Hui Yin, Dejie Yu, Shengwen Yin, Baizhan Xia

    Published 2015-01-01
    “…Extreme values of the expanded variables are searched by using efficient search algorithm. For large parameter intervals, the subinterval perturbation method is introduced. …”
    Get full text
    Article
  6. 11846

    Improvement of Student Weariness Emotion in English Classroom Based on Intelligent Internet of Things and Big Data Technology by Ya Pang

    Published 2022-01-01
    “…In addition, this paper proposes a Fast Point Feature Histogram, which uses an iterative closest point fine registration algorithm for image registration. Finally, this paper constructs an emotion recognition model of students’ weariness in English classroom. …”
    Get full text
    Article
  7. 11847

    A hybrid unsupervised machine learning model with spectral clustering and semi-supervised support vector machine for credit risk assessment. by Tao Yu, Wei Huang, Xin Tang, Duosi Zheng

    Published 2025-01-01
    “…The effectiveness, efficiency, and robustness of the proposed TSC-SVM model are demonstrated through various real-world applications. The proposed algorithm is anticipated to expand the customer base for financial institutions while reducing economic losses.…”
    Get full text
    Article
  8. 11848

    Fault Diagnosis of Gearbox Multi-channel Vibration Signal based on Improved Multivariate Multiscale Dispersion Entropy by Fuming Zhou, Jinxing Shen, Xiaoqiang Yang, Wuqiang Liu, Xiaolin Liu

    Published 2021-04-01
    “…Based on this,a new gearbox fault diagnosis method based on ensemble empirical mode decomposition (EEMD),IMMDE and genetic algorithm optimization support vector machine(GA-SVM) is proposed. …”
    Get full text
    Article
  9. 11849

    A New Finite-Time Bounded Control of Stochastic Itô Systems with (x,u,v)-Dependent Noise: Different Quadratic Function Approach by Zhiguo Yan, Zhongwei Lin

    Published 2014-01-01
    “…Moreover, the finite-time bounded controller design problem is studied and two sufficient conditions for the existence of state and output feedback controllers are presented in terms of nonlinear matrix inequalities. An algorithm is given for solving the obtained nonlinear matrix inequalities. …”
    Get full text
    Article
  10. 11850

    Fast two dimensional to three dimensional registration of fluoroscopy and CT-scans using Octrees on segmentation maps by Luca Bertelli, Frédéric Gibou

    Published 2012-06-01
    “…We introduce a computationally efficient approach to the generation of Digital Reconstructed Radiographs (DRRs) needed to perform three dimensional to two dimensional medical image registration and apply this algorithm to virtual surgery. The DRR generation process is the bottleneck of any three dimensional to two dimensional registration system, since its computational complexity scales with the number of voxels in the Computed Tomography Data, which can be of the order of tens to hundreds of millions. …”
    Get full text
    Article
  11. 11851

    Fault Diagnosis of Gearbox based on Multi-fractal and PSO-SVM by Li Sha, Pan Hongxia, Zhang Jundong, Zhao Weiwei

    Published 2015-01-01
    “…Aiming at the non-stationary and nonlinear of gearbox vibration signals,a fault diagnosis method based on the multi-fractal and particle swarm optimization support vector machine(PSO-SVM)is put forward.Firstly,the fractal filter with short-time fractal dimension as fuzzy control parameters is used to filtering noise reduction the gearbox vibration signals with bigger background noises.Secondly,the multi-fractal spectrum algorithm is applied to analyze the signal after filtering,the results show that the characteristic parameters:Δa(q)、f(a(q))maxand box dimensions Dbcan give a good presentation for gearbox working condition.Finally,the particle swarm optimization(PSO)is applied to optimize the parameters of support vector machine(SVM).Taking the multi-fractal characteristic vectors as input parameters of PSO-SVM and SVM to recognize the fault types of the gearbox.The results show that SVM based on particle swarm optimization can improve the classification accuracy.Meanwhile,the validity of gearbox fault diagnosis based on muti-fractal and PSO-SVM is proved.…”
    Get full text
    Article
  12. 11852

    Privacy-preserving photo sharing framework cross different social network by Fenghua LI, Zhe SUN, Ben NIU, Jin CAO, Hui LI

    Published 2019-07-01
    “…With rapid developments of digital photography and social networks,users of photo-sharing-supported social networking applications can easily forward photos across different social networks at the cost of their growing privacy concerns.To address this problem,a privacy-preserving photo sharing framework was proposed,which could apply to extended control and privacy invasion tracing.In extended control scheme,the following users on a dissemination chain was restrained by each user’s privacy policy.Then several privacy areas of photos were encrypted and the access control polices were bound to the uploaded photos,so that any privacy areas on the photos could be hidden away from unwanted viewers even across different social networks.On this basis,the behaviors of users were record by tracing scheme of privacy invasion,the integrality of records was protected by using nested signature algorithm.The correctness,security and performance of overhead of the scheme are then thoroughly analyzed and evaluated via detailed simulations.…”
    Get full text
    Article
  13. 11853

    An Efficient Hybrid Method for 3D Scattering from Inhomogeneous Object Buried beneath a Dielectric Randomly Rough Surface by Hong-jie He, Li-xin Guo, Wei Liu

    Published 2017-01-01
    “…Several numerical simulations are considered to demonstrate the algorithm’s ability to deal with the scattering from the inhomogeneous target buried beneath a dielectric rough surface, and the effectiveness of our proposed method is also illustrated.…”
    Get full text
    Article
  14. 11854

    Adversarial training driven malicious code detection enhancement method by Yanhua LIU, Jiaqi LI, Zhengui OU, Xiaoling GAO, Ximeng LIU, Weizhi MENG, Baoxu LIU

    Published 2022-09-01
    “…To solve the deficiency of the malicious code detector’s ability to detect adversarial input, an adversarial training driven malicious code detection enhancement method was proposed.Firstly, the applications were preprocessed by a decompiler tool to extract API call features and map them into binary feature vectors.Secondly, the Wasserstein generative adversarial network was introduced to build a benign sample library to provide a richer combination of perturbations for malicious sample evasion detectors.Then, a perturbation reduction algorithm based on logarithmic backtracking was proposed.The benign samples were added to the malicious code in the form of perturbations, and the added benign perturbations were culled dichotomously to reduce the number of perturbations with fewer queries.Finally, the adversarial malicious code samples were marked as malicious and the detector was retrained to improve its accuracy and robustness of the detector.The experimental results show that the generated malicious code adversarial samples can evade the detector well.Additionally, the adversarial training increases the target detector’s accuracy and robustness.…”
    Get full text
    Article
  15. 11855

    Research on Dry Coupling Technology in the Ultrasonic Non-Destructive Testing of Concrete by Jun Li, Zeyu Chen

    Published 2025-01-01
    “…By combining an array imaging system with a total focusing algorithm, this study not only significantly enhances the convenience and signal-to-noise ratio (SNR) of concrete ultrasonic imaging, but also opens new pathways for ultrasonic NDT technology in concrete.…”
    Get full text
    Article
  16. 11856

    Research of Kinematics and Workspace of 2-SPR/(U+UPR)P(vA) Reconfigurable Parallel Mechanism by Chunsheng Ma, Wenbo Mi, Xiaoqin Yin, Zhendong Ma

    Published 2021-06-01
    “…Secondly,the closed-loop vector method is used to solve the two sets of inverse kinematic solutions of the mechanism and verification,and the particle swarm optimization algorithm is used to study and establish the positive solution model of the mechanism under the R phase and verify. …”
    Get full text
    Article
  17. 11857

    RIS-assisted terahertz frequency band vehicle network capacity optimization by Fatang CHEN, Xiaoling LIU, Dan WANG, Ruofan ZHANG

    Published 2023-10-01
    “…In order to alleviate the spectrum scarcity and capacity limitation of the current wireless system, the terahertz frequency band was introduced and the reconfigurable intelligent surface (RIS) was used for auxiliary communication to construct a downlink vehicle network.Considering the constraints of limited total system power, QoS constraints of cellular mobile users, and randomness constraints of vehicle and user locations, a hybrid optimization model was established for optimal power allocation and optimal deployment of RIS with the aim of maximizing the total rate of vehicle users.Based on the balance method, linear transformation method, and element elimination method, the original NP-hard problem was transformed into a convex optimization problem with complex correlation constraints and multivariate coupling.The inner layer iteration was based on the Lagrange multiplier method to solve the optimal power allocation, and the outer layer iteratively solved the optimal deployment of RIS based on a improved genetic algorithm.The simulation results show that rationally deploying the number and distribution density of RIS nodes based on optimal power allocation can save costs while achieving a higher target total capacity.…”
    Get full text
    Article
  18. 11858

    Application of Optimized BP Neural Network In Financial Alert System by Qiaoyi Gao

    Published 2022-01-01
    “…Considering the shortcomings of BP neural network, genetic algorithm is used to optimize the specification. Finally, a new reference scheme is provided for economic early warning. …”
    Get full text
    Article
  19. 11859

    Review on Social Media and Digital Security by Amar Yahya Hussien

    Published 2022-07-01
    “…The available studies mainly aim at both social media content and user security, including model, protocol, mechanism and algorithm. Unfortunately, there is a lack of investigating on effective and efficient evaluations and measurements for security and trustworthiness of various social media tools, platforms and applications, thus has effect on their further improvement and evolution. …”
    Get full text
    Article
  20. 11860

    Monitoring Method for Road Waterlogging Based on Improved YOLOv8 by ZHANG Zheng, ZUO Xiangyang, LONG Yan, HUANG Haocheng, HE Lixin, LEI Xiaohui, WANG Mengqian

    Published 2024-10-01
    “…Therefore, this article proposed a real-time monitoring method for road waterlogging based on improved YOLOv8. Through the YOLOv8 algorithm, a convolutional block attention module (CBAM) attention mechanism was added to the neck structure network to enhance the important features of waterlogging areas, suppress general features, and improve the accuracy of identifying road waterlogging. …”
    Get full text
    Article