-
11901
A GenEO Domain Decomposition method for Saddle Point problems
Published 2023-03-01“…We introduce an adaptive element-based domain decomposition (DD) method for solving saddle point problems defined as a block two by two matrix. The algorithm does not require any knowledge of the constrained space. …”
Get full text
Article -
11902
H∞ Estimation for a Class of Lipschitz Nonlinear Discrete-Time Systems with Time Delay
Published 2011-01-01“…Finally, through guaranteeing the positivity of the minimum, a sufficient condition for the existence of the H∞ estimator is proposed and the estimator is derived in terms of Riccati-like difference equations. The proposed algorithm is proved to be effective by a numerical example.…”
Get full text
Article -
11903
Fault Diagnosis of Rolling Bearings based on VMD and Symmetric Difference Energy Operator Demodulation
Published 2017-01-01“…First of all,the rolling bearing vibration signals are decomposed by VMD algorithm,a number of modal components are got. Secondly,according to the maximum kurtosis criterion,the modal component demodulated by symmetric difference energy operator is selected. …”
Get full text
Article -
11904
Imbalanced Data Sets Classification Based on SVM for Sand-Dust Storm Warning
Published 2015-01-01“…In view of the SVM classification for the imbalanced sand-dust storm data sets, this paper proposes a hybrid self-adaptive sampling method named SRU-AIBSMOTE algorithm. This method can adaptively adjust neighboring selection strategy based on the internal distribution of sample sets. …”
Get full text
Article -
11905
Limited Incisional Drainage and Negative-Pressure Wound Therapy in an Acute Morel-Lavallée Lesion
Published 2021-03-01“…However, there is no clearly established treatment algorithm. In the acute stage, it is mainly treated with aspiration, simple compression, and incisional drainage. …”
Get full text
Article -
11906
Design of Reverse Curves Adapted to the Satellite Measurements
Published 2016-01-01“…This is a sequential operation involving successive parts of the mentioned layout. This universal algorithm can be easily applied to the computer software which will allow generating, in an automatic way, other geometrical layouts. …”
Get full text
Article -
11907
Theory and Application of Vessel Speed Dynamic Control considering Safety and Environmental Factors
Published 2022-01-01“…In the second stage, the speed dynamic control model considering safety and environmental factors is established by combining multisource data and particle swarm optimisation algorithm. The model’s superiority and advantage are validated by experiments conducted on an ocean-going ship. …”
Get full text
Article -
11908
Earth Pressure on Retaining Wall with Surface-Inclined Cohesive Fill Based on Principal Stress Rotation
Published 2021-01-01“…The proposed method is compared with the existing algorithm, and the influences of the inclination and the cohesion of the fill are analyzed. …”
Get full text
Article -
11909
Multi-sensor image fusion based on contrast and directional features optimization
Published 2018-12-01“…Then, we compute the decomposition coefficients of visible and infrared images using a low-pass filter on the decomposed data; and finally, we introduce the whale optimization algorithm to search optimal coefficients to reconstruct the final fusion image. …”
Get full text
Article -
11910
State Companies as Claimants Under the 1965 Washington Convention on Investment Disputes Between States and Foreign Persons
Published 2023-03-01“…In addition, the author proposes an algorithm for determining whether a state-owned company, which is authorized to exercise elements of state power, has the right of action.…”
Get full text
Article -
11911
Research on P2P security overlay network model
Published 2009-01-01“…To enhance the security of P2P software and the convenience in the use of trust mechanism, simple vector distance classifications and kademlia algorithm were adopted on the basis of the global trust model. …”
Get full text
Article -
11912
User behavior pattern mining method based on multi-dimension and multi-granularity analysis in telecom networks
Published 2018-10-01“…In order to better understand the behavior of users in telecom networks,it takes CDR (call detail record) data of large-scale telecom network as the research object.By using the mixed probability model and feature engineering method,the multi-dimension characteristics of the call time,call frequency and connections are analyzed from the perspective of user groups and individuals.It is further refined from different time granularities such as hour,day,and week to realize effective discovery of call behavior patterns for different user groups.The distribution characteristics of user behavior are modeled by mixed probability model,which solves the problem of describing the distribution characteristics such as user's call time and frequency.Based on the dataset of a regional telecom network,the performance of decision tree,naive Bayes and SVM classification algorithm are compared.It proves the validity and computational feasibility of the proposed method.The differences in communication behavior patterns of different groups are also compared by taking the service numbers like express,flight and bank as examples.…”
Get full text
Article -
11913
Planning approach of survivable fiber-wireless broadband access network
Published 2016-05-01“…The emerging fiber-wireless(FiWi)broadband access network provides not only the new technological references for flexible broadband access anywhere and anytime,but also the research opportunities for the cost-efficient design of survivable broadband access network.The study of survivable FiWi access network planning was focused on,and an approach of survivable network planning based on wireless-rerouting protection was proposed.When any fiber link cuts,the failed optical network unit(ONU)can transfer its traffic into other normal ONUs.Solving the joint optimization problem of wireless routers placement,backup radios configuration and ONU capacity allocation was put more importance on,aiming to fully protect all traffic with the minimum deployment cost.The method of integer linear programming was employed to obtain the optimal solution for small-scale network planning.The heuristic algorithm was also proposed for the large-scale network planning.Simulation results demonstrate the effectiveness of the proposed approach in reducing network deployment cost.…”
Get full text
Article -
11914
Cooperative game based bandwidth allocation mechanism live migration of multiple virtual machines
Published 2016-04-01“…Under many scenarios, multiple virtual machines in the same server need to be moved online concurrently.Since live migration algorithm utilizes bandwidth as more as possible to send data, there is a bandwidth competition among the concurrent migration processes, which cannot guarantee the optimal allocation for the bandwidth and finally degrades the overall performance of the parallel live migration. …”
Get full text
Article -
11915
Research on multidimensional dynamic defense strategy for microservice based on deep reinforcement learning
Published 2023-04-01“…Aiming at the problem that it is hard for security defense strategies in cloud native to guarantee the quality of service under dynamic requests, a multidimensional dynamic defense strategy for microservice based on deep reinforcement learning, named D2RA strategy, was proposed to provide dynamic configuration schemes that ensure security defense performance and quality of service for microservices under dynamical requests.Firstly, based on the characteristics of multiple replicas and invocation chains of microservices, a microservices state graph was established to depict the maps between requests, system configuration and security performance, quality of service, and resource overhead of microservices.Secondly, the D2RA framework was designed and a dynamic strategy optimization algorithm based on deep Q-network was proposed for microservices to provide fast and optimal system configurations update scheme under dynamic requests.The simulation results show that D2RA effectively allocate resources under dynamic requests, and achieve 19.07% more defense effectiveness and 42.31% higher quality of service as compared to the existing methods.…”
Get full text
Article -
11916
Option Pricing under Two-Factor Stochastic Volatility Jump-Diffusion Model
Published 2020-01-01“…We derive a semianalytical formula for European vanilla option and develop a fast and accurate numerical algorithm for the computation of the option prices using the fast Fourier transform (FFT) technique. …”
Get full text
Article -
11917
A MRAC Principle for a Single-Link Electrically Driven Robot with Parameter Uncertainties
Published 2017-01-01“…With the aim of performing experimental comparisons, two control schemes are also revisited theoretically and experimentally: one is an algorithm previously reported in the literature and the other is an adaptive controller derived under the assumption that the electrical dynamics of the actuator are negligible. …”
Get full text
Article -
11918
Research on flood defense mechanism of SDN control layer:detection and mitigation
Published 2021-11-01“…Aiming at the problem of spoofing flood defense in the control layer of SDN, a controller defense mechanism (CDM)was proposed, including a flood detection mechanism based on key features multi-classification and a flood mitigation mechanism based on SAVI.The flood feature analysis module of the control layer was designed for flood detection, and boosting algorithm was used to overlay each feature weak classifier to form an enhanced classifier, which can achieve more accurate classification spoofing flooding attack effect by continuously reducing the residual in the calculation.In CDM, a flood mitigation mechanism based on SAVI was deployed to realize flood mitigation, which performed flood packet path filtering based on binding-verification mode, and updated the flood features of access layer switches with dynamic polling mode to reduce redundant model update load.The experimental results show that the proposed method has the characteristics of low overhead and high precision.CDM effectively increases the security of the control layer, and reduces the time of host classification of spoofing flood attack and the CPU consumption of corresponding controller.…”
Get full text
Article -
11919
Bounded Model Checking of ETL Cooperating with Finite and Looping Automata Connectives
Published 2013-01-01“…Since such kind of temporal logic involves both finite and looping automata as connectives, all regular properties can be succinctly specified with it. The presented algorithm is integrated into the model checker ENuSMV, and the approach is evaluated via conducting a series of imperial experiments.…”
Get full text
Article -
11920
A Novel Partial Sequence Alignment Tool for Finding Large Deletions
Published 2012-01-01“…For BinaryPartialAlign, we make use of the Smith-Waterman (SW) algorithm with a binary-search-based approach for alignment with large gaps that we called partial alignment. …”
Get full text
Article