-
10561
A Deployment Method of Middlebox Service Chain Based on Multi-Flow Table
Published 2015-08-01“…Aiming at the path cycle and source address binding problem in middlebox service chain deployment,a service chain deployment approach by combining the OpenFlow mechanism and NetFPGA was proposed.First of all,the OpenFlow multi-flow table was used for marking service chains and labeling service sequences so that data packets could be processed correctly according to desired service order;secondly,the service chain deployment algorithm was designed to achieve the mapping relationship between the service path and flow table rules;thirdly,a prototype system was implemented based on the hardware platforms of NetFPGA-10G.Finally,experimental results show that the proposed method have the advantage of feasibility and outperforms compared methods in the aspect of the flow table number and time overhead.…”
Get full text
Article -
10562
Distributed Continuous-Time Containment Control of Heterogeneous Multiagent Systems with Nonconvex Control Input Constraints
Published 2022-01-01“…A nonlinear projection algorithm is proposed to address the problem. We discuss the stability and containment control of the system with switching topologies and nonconvex control input constraints under three different conditions. …”
Get full text
Article -
10563
Kernelized correlation tracking based on point trajectories
Published 2018-06-01“…Visual tracking is one of the most important directions in computer vision.However,many state-of-the-art algorithms cannot track the interested object reliably due to occlusion during tracking process,which leads to deficiency of object information.In order to solve occlusion problem,a kernelized correlation tracking method based on point trajectories was proposed.Through analyzing long-term motion cues of the local information,point trajectories were labeled by spectral clustering.These labeled points were used to differentiate the foreground and background objects and thus detect whether the target was occluded or drifts.If drifting and occlusion occur,re-detection was used to detect the re-entering of the target.Experimental results show that the proposed algorithm can handle occlusion and drifting problems effectively.…”
Get full text
Article -
10564
Object detection and multimodal learning for product recommendations
Published 2025-01-01“…The proposed approach is an algorithm for recommending multiple products based on visual and textual features, ensuring compatibility with query items. …”
Get full text
Article -
10565
Cloud storage scheme based on closed-box encryption
Published 2017-07-01“…Aiming at protecting the confidentiality of data for cloud storage users,a scheme that encrypt data in cloud service providers was presented.The scheme constructed a closed-box computing environment by virtual machine isolation technique,improved algorithm of RSA to change keys without having to produce large prime numbers,transfer data and keys through SSL and encrypted data in the closed computing environment before storing to the distributed file system.Closed-box computing environment can prevent attacks from cloud administrators and malicious applications in the operating system.It also can guard against data leakage effectively.The result of experiment shows that the confidentiality of data improved and the performance loss is decreased considering to other cloud storage scheme that encrypt data in cloud.…”
Get full text
Article -
10566
L∞-error estimate for a system of elliptic quasivariational inequalities
Published 2003-01-01“…Under W2,p(Ω)-regularity of the continuous solution, a quasi-optimal L∞-convergence of a piecewise linear finite element method is established, involving a monotone algorithm of Bensoussan-Lions type and standard uniform error estimates known for elliptic variational inequalities (VIs).…”
Get full text
Article -
10567
Method of unknown protocol classification based on autoencoder
Published 2020-06-01“…Aiming at the problem that a large number of unknown protocols exist in the Internet,which makes it very difficult to manage and maintain the network security,a classification and identification method of unknown protocols was proposed.Combined with the autoencoder technology and the improved K-means clustering technology,the unknown protocol was classified and identified for the network traffic.The autoencoder was used to reduce dimensionality and select features of network traffic,clustering technology was used to classify the dimensionality reduction data unsupervised,and finally unsupervised recognition and classification of network traffic were realized.Experimental results show that the classification effect is better than the traditional K-means,DBSCAN,GMM algorithm,and has higher efficiency.…”
Get full text
Article -
10568
Semi-supervised dynamic community detection based on non-negative matrix factorization
Published 2016-02-01“…How to effectively combine the network structures on different time points was the key and difficulty to affect the performance of detection algorithms. Based on this, a semi-supervised dynamic community algorithm SDCD based on non-negative matrix factorization, which effectively extracted the historical stability structure unit firstly, and then use it as a regularization item supervision of nonnegative matrix decomposition, to guide the network community detection on current moment. …”
Get full text
Article -
10569
Adaptive Fuzzy PID Control System for Satellite Earth Station Antenna Group Factor Based on Edge Calculation
Published 2023-03-01“…The antenna tracking control system of satellite ground receiving station generally adopts PID control.Due to the infl uence of various uncertain factors, it is diffi cult to obtain the optimal control parameters for this kind of system, resulting in the PID control eff ect is not ideal.An adaptive fuzzy PID antenna tracking control system based on edge computing was designed.The parameters of PID controller were adjusted in time by fuzzy control algorithm, and the optimal calculation of fuzzy control input and output domain was realized in edge computing server.The simulation results showed that the adaptive fuzzy PID antenna tracking control system based on edge calculation could achieve good control eff ect.…”
Get full text
Article -
10570
3D Modeling of Mine Protection Complex Steel Structure Based on BIM Technology
Published 2023-01-01“…The vibration control algorithm of complex steel structure for mine protection is designed, and the boundary elastic constraint conditions are determined. …”
Get full text
Article -
10571
Crop Growth Monitoring System Based on Agricultural Internet of Things Technology
Published 2022-01-01“…After improving the fuzzy algorithm, this paper builds an intelligent model, builds the system structure framework according to the actual needs of crop growth monitoring, sets up and analyzes the environmental parameters, and builds the crop growth monitoring system from multiple perspectives. …”
Get full text
Article -
10572
Binary search on range of IPv6 prefix sets
Published 2013-06-01“…The general and special types of IPv6 routing algorithms were studied.Focusing on the imbalance problems in lookup and update process in routing algorithm,a novel method called BSRPS (binary search on range of prefix sets) was presented.By range-partition (K) and set-partition (M) on routing table (N),and self-recovery after updating,this method enhanced the lookup speed and reduced the impact of imbalance in updating.Time complexity in lookup and update process is O(log2N/K) and O(log2N/K+2M),and space complexity is O(K+2N) where N is the size of routing table.Experiment re-sults show that this method is efficient in lookup and reduces the impact of imbalance after updating effectively.…”
Get full text
Article -
10573
Correspondences between Czech and English Coreferential Expressions
Published 2015-09-01“…We designed an alignment-refining algorithm for English personal and possessive pronouns and Czech relative pronouns that improves the quality of alignment links not only for the classes it aimed at but also in general. …”
Get full text
Article -
10574
Dynamic Server Cluster Load Balancing in Virtualization Environment with OpenFlow
Published 2015-07-01“…Thus, we propose a load balancing algorithm based on server running state, which can calculate comprehensive loading according to the CPU utilization, memory utilization, and network traffic of the servers. …”
Get full text
Article -
10575
Location privacy preserving scheme against attack from friends in SNS
Published 2016-10-01“…In order to enrich the performance of the user's location information and to meet the diverse needs of users,a location privacy protection scheme based on attribute encryption was designed,which provided precise,more accurate,fuzzy and private four modes to manage the location information.The scheme was based on the algorithm of WT-CP-ABE.The location information was divided into three parts according to a close friend of grade,then the key infor-mation and position information was encrypted with attribute-based encryption and symmetric encryption method respec-tively and the ciphertext was published to the social network.The security of the scheme is analyzed,which shows that the scheme has the advantage of user attribute information confidentiality,data confidentiality and can resist the collusion attack.…”
Get full text
Article -
10576
Random access for massive Internet of things:current status, challenges and opportunities
Published 2021-04-01“…In conventional communication systems, the random access (RA) is a necessary procedure for a user equipment (UE) to establish wireless connection to the network before actual data transmission.Focusing on the massive IoT with large number of nodes, the fundamental characteristics and limitations of conventional grant-based RA were firstly discussed.Then, the grant-free RA, semi-grant-free RA and unsourced RA for massive IoT were addressed in details from multiple perspectives, including their system models, protocol frameworks, algorithm procedures, system performance, related pros and cons, as well as critical challenges and potential opportunities.Finally, some highlights on the related key techniques and common issues in random access for massive IoT were concluded.…”
Get full text
Article -
10577
Novel construction of forward-secure public-key encryption in the standard model
Published 2014-02-01“…In the proposed scheme, the running time of decryption algorithm and the size of ciphertext are both independent on the total number of the time periods. …”
Get full text
Article -
10578
Survey of video behavior recognition
Published 2018-06-01“…Behavior recognition is developing rapidly,and a number of behavior recognition algorithms based on deep network automatic learning features have been proposed.The deep learning method requires a large number of data to train,and requires higher computer storage and computing power.After a brief review of the current popular behavior recognition method based on deep network,it focused on the traditional behavior recognition methods.Traditional behavior recognition methods usually followed the processes of video feature extraction,modeling of features and classification.Following the basic process,the recognition process was overviewed according to the following steps,feature sampling,feature descriptors,feature processing,descriptor aggregation and vector coding.At the same time,the benchmark data set commonly used for evaluating the algorithm performance was also summarized.…”
Get full text
Article -
10579
Pilot interference mitigation for TDD cell-free massive MIMO systems
Published 2022-05-01“…To alleviate the pilot interference for cell-free massive multi-input multi-output (MIMO) system and improve system’s performance, a comprehensive approach including the pilot reuse, access point (AP) selection and power allocation was proposed.Firstly, to alleviate the pilot contamination, the pilot assignment based on the order of user distance was proposed, in which the pilot sharing was only allowed when the distance between two users is large enough to reduce the impact of pilot reuse.Then, by AP selection, only the APs which have main impact on the macro diversity gain were selected as the user’s serving APs.Finally, a modified max-min power control algorithm was proposed to improve the system’s average throughput.Simulation results show that the pilot interference mitigation strategy proposed improves the performance of the system significantly.…”
Get full text
Article -
10580
Adaptive SDN switch migration mechanism based on coalitional game
Published 2020-08-01“…The problem of poor control plane performance causes in software-defined Networking due to the unreasonable mapping relationship between controllers and switches.To address this issue,an adaptive switch migration mechanism based on coalitional game was proposed.First,comprehensively considering the controller resource utilization,control overhead,and flow establishment time,the switch migration problem was modeled as a combination optimization problem.Then,a game theory was introduced to design a distributed algorithm,where each controller ran control logic independently and implemented coalitional game between controllers to achieve an adaptive switch migration mechanism that adapted to traffic characteristics.The simulation results show that the proposed mechanism can better adapt to the flow characteristics,reduce the control traffic overhead by about 19% and the average flow settling time by 30%,and improve the controller resource utilization.…”
Get full text
Article