Showing 12,681 - 12,700 results of 19,511 for search '"Algorithm"', query time: 0.12s Refine Results
  1. 12681

    Application of IoT and blockchain technology in the integration of innovation and industrial chains in high-tech manufacturing by Zepei Li, Peng Zheng, Yanjia Tian

    Published 2025-04-01
    “…This study introduces BD-IoTQNet, a novel framework designed to address these challenges by integrating data fusion, anomaly detection using the Isolation Forest algorithm, and blockchain-enabled DQM (Data Quality Management). …”
    Get full text
    Article
  2. 12682

    A Robust Method to Suppress Jamming for GNSS Array Antenna Based on Reconstruction of Sample Covariance Matrix by Yanyun Gong, Ling Wang, Rugui Yao, Zhaolin Zhang

    Published 2017-01-01
    “…In antijamming application of satellite navigation system, if active jamming is received from array antenna main-lobe, main-lobe distortion happens when the adaptive filtering algorithm forms main-lobe nulling. A robust method to suppress jamming for satellite navigation by reconstructing sample covariance matrix without main-lobe nulling is proposed in this paper. …”
    Get full text
    Article
  3. 12683

    Distributed high-dimensional similarity search approach for large-scale wireless sensor networks by Haifeng Hu, Jiefang He, Jianshen Wu, Kun Wang, Wei Zhuang

    Published 2017-03-01
    “…Extensive simulation results show that the proposed algorithms provide significant performance gains in terms of precision and energy efficiency compared with the existing algorithms.…”
    Get full text
    Article
  4. 12684

    Bayesian Network Approach to Customer Requirements to Customized Product Model by Qin Yang, Zhirui Li, Haisen Jiao, Zufang Zhang, Weijie Chang, Daozhu Wei

    Published 2019-01-01
    “…Then, we can accurately predict the final product model through the link tree algorithm, test the customer demand node to determine the focus of the customer's needs, and optimize the model. …”
    Get full text
    Article
  5. 12685

    ECMO: An Efficient and Confidential Outsourcing Protocol for Medical Data by Xiangyi Meng, Yuefeng Du, Cong Wang

    Published 2025-01-01
    “…To address these limitations in medical data outsourcing, we present ECMO, a novel protocol that combines an ordered additive secret sharing algorithm with a unique index permutation method. This approach efficiently outsources medical data while safeguarding both the data itself and access patterns from potential leakage. …”
    Get full text
    Article
  6. 12686

    CP-ABE based users collaborative privacy protection scheme for continuous query by Lei ZHANG, Chun-guang MA, Song-tao YANG, Zeng-peng LI

    Published 2017-09-01
    “…In location-based services (LBS),as the untrusted LBS server can be seen as an adversary,and it can utilize the attribute as background knowledge to correlate the real location of the user in the set of uncertain locations.Then the adversary can gain the location privacy when the user enjoys the snapshot and continuous query through the correlation inference attack.In order to cope with this attack,the main scheme in privacy protection is to generalize the attribute and achieve attribute anonymity.However,algorithms of this type usually assumes a trusted third party (TTP) which provides the service of similarity attribute finding and comparing,and it is unpractical in the real environment,as the TTP may become the point of attack or the bottleneck of service and it cannot be considered as the trusted one all the time.Thus,to cope with the correlation inference attack as well as the semi-trusted third party,ciphertext policy attribute based encryption (CP-ABE) and users collaboration based attribute anonymous scheme was proposed.In this scheme,the user coupled achieve location and attribute anonymity.Furthermore,this scheme could also provide security for attacks from the semi-trusted third party as well as semi-trusted collaborative users.At last,security analysis and the experiment results further verify the effectiveness of privacy protection and the efficiency of algorithm execution.…”
    Get full text
    Article
  7. 12687

    An Improved Fuzzy Neural Network Compound Control Scheme for Inertially Stabilized Platform for Aerial Remote Sensing Applications by Xiangyang Zhou, Yating Li, Yuan Jia, Libo Zhao

    Published 2018-01-01
    “…An improved fuzzy neural network (FNN)/proportion integration differentiation (PID) compound control scheme based on variable universe and back-propagation (BP) algorithms is proposed to improve the ability of disturbance rejection of a three-axis inertially stabilized platform (ISP) for aerial remote sensing applications. …”
    Get full text
    Article
  8. 12688

    Optimal transmission strategy of diamond channel with limited battery capacity of source node by Taoshen LI, Li SUN, Zhe WANG

    Published 2021-06-01
    “…In order to solve the problem that the energy harvesting uncertainty of node in wireless energy harvesting network makes it difficult for the system to design a reasonable transmission strategy, a diamond channel with limited battery capacity of the source node were constructed.The goal was to maximize the end-to-end throughput of the system.Under the conditions of meeting the constraints of energy and data causality between transmission nodes and no battery energy overflow, a model to maximize the end-to-end throughput of the system was built, and an optimal offline transmission power and rate allocation strategy was proposed.Firstly, based on theoretical analysis and formula derivation, the strategy transformed the optimal transmission problem into the optimal transmission problem on the side of the broadcast channel, and used the water-filling algorithm to solve the optimal total power from the source node to the relay node.Then, the throughput of the source node to each relay node was analyzed based on the cutoff power level in the broadcast channel throughput maximization problem.Finally, according to the data arrival of the relay node, the iterative water-filling method was used to solve the optimal transmission power from the relay node to the destination node, and the optimal rate was solved by extending the optimal rate of the multiple access channel.Simulation results demonstrate the feasibility and correctness of the proposed optimization policies.…”
    Get full text
    Article
  9. 12689

    Signal Control Strategy for Supersaturated Traffic at Urban Road Intersections with a Large Technical Grade Gap by Baiqun Ding, Liu Yang, He Xu, Yongming He

    Published 2021-01-01
    “…To reduce the risk of queuing overflow on the urban minor road at the intersection under supersaturation where the capacity of the arterial and minor roads shows extreme disparity, reduce the adverse effects caused by long queues of vehicles on the minor road, and comprehensively balance the multiobjective requirements such as priority of the main road, queuing restrictions, and delay on the minor road, the minor road queue model at the end of red, a road remaining capacity model, and multiparameter coordinated signal control model were established, and a multiobjective genetic algorithm was used to optimize this solution. As an example, the multiparameter coordinated control strategy decreased the delay per vehicle by approximately 17% and the queue length by approximately 30%–50% on the minor road and slightly increased the delay per vehicle at the intersection and the length on the main road queue. …”
    Get full text
    Article
  10. 12690

    Construction of advanced persistent threat attack detection model based on provenance graph and attention mechanism by Yuancheng LI, Hao LUO, Xinyu WANG, Jiexuan YUAN

    Published 2024-03-01
    “…In response to the difficulty of existing attack detection methods in dealing with advanced persistent threat (APT) with longer durations, complex and covert attack methods, a model for APT attack detection based on attention mechanisms and provenance graphs was proposed.Firstly, provenance graphs that described system behavior based on system audit logs were constructed.Then, an optimization algorithm was designed to reduce the scale of provenance graphs without sacrificing key semantics.Afterward, a deep neural network (DNN) was utilized to convert the original attack sequence into a semantically enhanced feature vector sequence.Finally, an APT attack detection model named DAGCN was designed.An attention mechanism was applied to the traceback graph sequence.By allocating different weights to different positions in the input sequence and performing weight calculations, sequence feature information of sustained attacks could be extracted over a longer period of time, which effectively identified malicious nodes and reconstructs the attack process.The proposed model outperforms existing models in terms of recognition accuracy and other metrics.Experimental results on public APT attack datasets show that, compared with existing APT attack detection models, the accuracy of the proposed model in APT attack detection reaches 93.18%.…”
    Get full text
    Article
  11. 12691

    Multiobjective Optimization of Sustainable WCO for Biodiesel Supply Chain Network Design by Nana Geng, Yixiang Sun

    Published 2021-01-01
    “…In order to effectively solve the model, a Pareto optimal NSGAII heuristic algorithm is proposed and applied to a practical case study of restaurants in Jiangsu Province. …”
    Get full text
    Article
  12. 12692

    Neural network analysis for hotel service design in Madrid: the 3Ps methodology and the frontline staff by Javier De Esteban Curiel, Mª Luisa Delgado Jalón, Sandra Flores Ureba, José Ángel Rivero Menéndez

    Published 2018-01-01
    “…A more discriminating distinction is proposed in this research, based on the neural network algorithm (the Multilayer Perceptron) in order to achieve more efficiency. …”
    Get full text
    Article
  13. 12693

    Guaranteed Stability of Sparse Recovery in Distributed Compressive Sensing MIMO Radar by Yu Tao, Gong Zhang, Jindong Zhang

    Published 2015-01-01
    “…Joint orthogonal matching pursuit (JOMP) algorithm is proposed to recover sparse targets scene. …”
    Get full text
    Article
  14. 12694

    Comprehensive Analysis of Fault Diagnosis Methods for Aluminum Electrolytic Control System by Jie-jia Li, Xiao-yan Han, Peng Zhou, Xiao-yu Sun, Na Chang

    Published 2014-01-01
    “…Decision fusion neural network verifies the diagnosis result of the subneural network by the information transferring over the network and gives the decision of fault synthetically. EMD algorithm is used for data preprocessing of current signal in stator of the fault subsystem. …”
    Get full text
    Article
  15. 12695

    Client-Driven Joint Cache Management and Rate Adaptation for Dynamic Adaptive Streaming over HTTP by Chenghao Liu, Miska M. Hannuksela, Moncef Gabbouj

    Published 2013-01-01
    “…Based on the philosophy of CLICRA, this paper proposes a rate adaptation algorithm, which selects bitrates for the next media segments to be requested by using the predicted buffered media time in the client. …”
    Get full text
    Article
  16. 12696

    An Empirical Analysis of the Role of Piano Performance in Alleviating Psychological Trauma in People with Psychological Isolation Disorder by Xia Cao

    Published 2022-01-01
    “…Finally, the support vector machine with optimized parameters of the genetic algorithm was used to classify the positive, neutral, and negative samples with 89.23% accuracy. …”
    Get full text
    Article
  17. 12697

    Detection of Lungs Status Using Morphological Complexities of Respiratory Sounds by Ashok Mondal, Parthasarathi Bhattacharya, Goutam Saha

    Published 2014-01-01
    “…The performance of the proposed method is compared with a wavelet analysis based method. The developed algorithm gives a better accuracy of 92.86% and sensitivity of 86.30% and specificity of 86.90% for a composite feature vector of four morphological indices.…”
    Get full text
    Article
  18. 12698

    Image Hashing for Tamper Detection with Multiview Embedding and Perceptual Saliency by Ling Du, Zhen Chen, Yongzhen Ke

    Published 2018-01-01
    “…In this paper, we propose a Multi-View Semi-supervised Hashing algorithm with Perceptual Saliency (MV-SHPS), which explores supervised information and multiple features into hashing learning simultaneously. …”
    Get full text
    Article
  19. 12699

    Balancing mitigation strategies for viral outbreaks by Hamed Karami, Pejman Sanaei, Alexandra Smirnova

    Published 2024-12-01
    “…Our innovative approach to modeling the cost of control gave rise to a robust computational algorithm for solving optimal control problems associated with different public health regulations. …”
    Get full text
    Article
  20. 12700

    Novel 2D strain-rate-dependent lamina-based and RVE/phase-based progressive fatigue damage criteria for randomly loaded multi-layer fiber-reinforced composites by M. Shariyat

    Published 2022-01-01
    “…A fatigue life assessment algorithm that incorporates the strain-rate-dependence of the fatigue strengths and stiffnesses, and random and asynchronous changes of the stress components, distinct mean values, and phase shifts of the stress components is employed. …”
    Get full text
    Article