Showing 10,561 - 10,580 results of 19,511 for search '"algorithm"', query time: 0.10s Refine Results
  1. 10561

    A Deployment Method of Middlebox Service Chain Based on Multi-Flow Table by Shiran Liu, Julong Lan, Yuxiang Hu, Tong Duan

    Published 2015-08-01
    “…Aiming at the path cycle and source address binding problem in middlebox service chain deployment,a service chain deployment approach by combining the OpenFlow mechanism and NetFPGA was proposed.First of all,the OpenFlow multi-flow table was used for marking service chains and labeling service sequences so that data packets could be processed correctly according to desired service order;secondly,the service chain deployment algorithm was designed to achieve the mapping relationship between the service path and flow table rules;thirdly,a prototype system was implemented based on the hardware platforms of NetFPGA-10G.Finally,experimental results show that the proposed method have the advantage of feasibility and outperforms compared methods in the aspect of the flow table number and time overhead.…”
    Get full text
    Article
  2. 10562

    Distributed Continuous-Time Containment Control of Heterogeneous Multiagent Systems with Nonconvex Control Input Constraints by Xue Li, Lulu Wang, Yinsen Zhang

    Published 2022-01-01
    “…A nonlinear projection algorithm is proposed to address the problem. We discuss the stability and containment control of the system with switching topologies and nonconvex control input constraints under three different conditions. …”
    Get full text
    Article
  3. 10563

    Kernelized correlation tracking based on point trajectories by Yunqiu LYU, Kai LIU, Fei CHENG

    Published 2018-06-01
    “…Visual tracking is one of the most important directions in computer vision.However,many state-of-the-art algorithms cannot track the interested object reliably due to occlusion during tracking process,which leads to deficiency of object information.In order to solve occlusion problem,a kernelized correlation tracking method based on point trajectories was proposed.Through analyzing long-term motion cues of the local information,point trajectories were labeled by spectral clustering.These labeled points were used to differentiate the foreground and background objects and thus detect whether the target was occluded or drifts.If drifting and occlusion occur,re-detection was used to detect the re-entering of the target.Experimental results show that the proposed algorithm can handle occlusion and drifting problems effectively.…”
    Get full text
    Article
  4. 10564

    Object detection and multimodal learning for product recommendations by Karolina Selwon, Paweł Wnuk

    Published 2025-01-01
    “…The proposed approach is an algorithm for recommending multiple products based on visual and textual features, ensuring compatibility with query items. …”
    Get full text
    Article
  5. 10565

    Cloud storage scheme based on closed-box encryption by Rui-zhong DU, Shao-xuan WANG, Jun-feng TIAN

    Published 2017-07-01
    “…Aiming at protecting the confidentiality of data for cloud storage users,a scheme that encrypt data in cloud service providers was presented.The scheme constructed a closed-box computing environment by virtual machine isolation technique,improved algorithm of RSA to change keys without having to produce large prime numbers,transfer data and keys through SSL and encrypted data in the closed computing environment before storing to the distributed file system.Closed-box computing environment can prevent attacks from cloud administrators and malicious applications in the operating system.It also can guard against data leakage effectively.The result of experiment shows that the confidentiality of data improved and the performance loss is decreased considering to other cloud storage scheme that encrypt data in cloud.…”
    Get full text
    Article
  6. 10566

    L∞-error estimate for a system of elliptic quasivariational inequalities by M. Boulbrachene, M. Haiour, S. Saadi

    Published 2003-01-01
    “…Under W2,p(Ω)-regularity of the continuous solution, a quasi-optimal L∞-convergence of a piecewise linear finite element method is established, involving a monotone algorithm of Bensoussan-Lions type and standard uniform error estimates known for elliptic variational inequalities (VIs).…”
    Get full text
    Article
  7. 10567

    Method of unknown protocol classification based on autoencoder by Chunxiang GU, Weisen WU, Ya’nan SHI, Guangsong LI

    Published 2020-06-01
    “…Aiming at the problem that a large number of unknown protocols exist in the Internet,which makes it very difficult to manage and maintain the network security,a classification and identification method of unknown protocols was proposed.Combined with the autoencoder technology and the improved K-means clustering technology,the unknown protocol was classified and identified for the network traffic.The autoencoder was used to reduce dimensionality and select features of network traffic,clustering technology was used to classify the dimensionality reduction data unsupervised,and finally unsupervised recognition and classification of network traffic were realized.Experimental results show that the classification effect is better than the traditional K-means,DBSCAN,GMM algorithm,and has higher efficiency.…”
    Get full text
    Article
  8. 10568

    Semi-supervised dynamic community detection based on non-negative matrix factorization by Zhen-chao CHANG, Hong-chang CHEN, Rui-yang HUANG, Hong-tao YU, Yang LIU

    Published 2016-02-01
    “…How to effectively combine the network structures on different time points was the key and difficulty to affect the performance of detection algorithms. Based on this, a semi-supervised dynamic community algorithm SDCD based on non-negative matrix factorization, which effectively extracted the historical stability structure unit firstly, and then use it as a regularization item supervision of nonnegative matrix decomposition, to guide the network community detection on current moment. …”
    Get full text
    Article
  9. 10569

    Adaptive Fuzzy PID Control System for Satellite Earth Station Antenna Group Factor Based on Edge Calculation by Haibin SHAN, Yanjun SHI, Zijing LIU, Yuanhong LI, Wenhua ZHAO, Muquan HE, Chuzhou LI

    Published 2023-03-01
    “…The antenna tracking control system of satellite ground receiving station generally adopts PID control.Due to the infl uence of various uncertain factors, it is diffi cult to obtain the optimal control parameters for this kind of system, resulting in the PID control eff ect is not ideal.An adaptive fuzzy PID antenna tracking control system based on edge computing was designed.The parameters of PID controller were adjusted in time by fuzzy control algorithm, and the optimal calculation of fuzzy control input and output domain was realized in edge computing server.The simulation results showed that the adaptive fuzzy PID antenna tracking control system based on edge calculation could achieve good control eff ect.…”
    Get full text
    Article
  10. 10570

    3D Modeling of Mine Protection Complex Steel Structure Based on BIM Technology by Fenhong Li, Zaisheng Wang, Chongan Pang, Haiping Yang

    Published 2023-01-01
    “…The vibration control algorithm of complex steel structure for mine protection is designed, and the boundary elastic constraint conditions are determined. …”
    Get full text
    Article
  11. 10571

    Crop Growth Monitoring System Based on Agricultural Internet of Things Technology by Jienan Wu

    Published 2022-01-01
    “…After improving the fuzzy algorithm, this paper builds an intelligent model, builds the system structure framework according to the actual needs of crop growth monitoring, sets up and analyzes the environmental parameters, and builds the crop growth monitoring system from multiple perspectives. …”
    Get full text
    Article
  12. 10572

    Binary search on range of IPv6 prefix sets by Yu CUI, Zhi-hong TIAN, GHong-li ZHAN, Bin-xing FANG

    Published 2013-06-01
    “…The general and special types of IPv6 routing algorithms were studied.Focusing on the imbalance problems in lookup and update process in routing algorithm,a novel method called BSRPS (binary search on range of prefix sets) was presented.By range-partition (K) and set-partition (M) on routing table (N),and self-recovery after updating,this method enhanced the lookup speed and reduced the impact of imbalance in updating.Time complexity in lookup and update process is O(log2N/K) and O(log2N/K+2M),and space complexity is O(K+2N) where N is the size of routing table.Experiment re-sults show that this method is efficient in lookup and reduces the impact of imbalance after updating effectively.…”
    Get full text
    Article
  13. 10573

    Correspondences between Czech and English Coreferential Expressions by Michal Novák, Anna Nedoluzhko

    Published 2015-09-01
    “…We designed an alignment-refining algorithm for English personal and possessive pronouns and Czech relative pronouns that improves the quality of alignment links not only for the classes it aimed at but also in general. …”
    Get full text
    Article
  14. 10574

    Dynamic Server Cluster Load Balancing in Virtualization Environment with OpenFlow by Wenbo Chen, Zhihao Shang, Xinning Tian, Hui Li

    Published 2015-07-01
    “…Thus, we propose a load balancing algorithm based on server running state, which can calculate comprehensive loading according to the CPU utilization, memory utilization, and network traffic of the servers. …”
    Get full text
    Article
  15. 10575

    Location privacy preserving scheme against attack from friends in SNS by Xi LIN, Yi-liang HAN, Yan KE, Xiao-yuan YANG

    Published 2016-10-01
    “…In order to enrich the performance of the user's location information and to meet the diverse needs of users,a location privacy protection scheme based on attribute encryption was designed,which provided precise,more accurate,fuzzy and private four modes to manage the location information.The scheme was based on the algorithm of WT-CP-ABE.The location information was divided into three parts according to a close friend of grade,then the key infor-mation and position information was encrypted with attribute-based encryption and symmetric encryption method respec-tively and the ciphertext was published to the social network.The security of the scheme is analyzed,which shows that the scheme has the advantage of user attribute information confidentiality,data confidentiality and can resist the collusion attack.…”
    Get full text
    Article
  16. 10576

    Random access for massive Internet of things:current status, challenges and opportunities by Pingzhi FAN, Li LI, Huan CHEN, Gaofeng CHENG, Linjie YANG, Xiaobo TANG

    Published 2021-04-01
    “…In conventional communication systems, the random access (RA) is a necessary procedure for a user equipment (UE) to establish wireless connection to the network before actual data transmission.Focusing on the massive IoT with large number of nodes, the fundamental characteristics and limitations of conventional grant-based RA were firstly discussed.Then, the grant-free RA, semi-grant-free RA and unsourced RA for massive IoT were addressed in details from multiple perspectives, including their system models, protocol frameworks, algorithm procedures, system performance, related pros and cons, as well as critical challenges and potential opportunities.Finally, some highlights on the related key techniques and common issues in random access for massive IoT were concluded.…”
    Get full text
    Article
  17. 10577

    Novel construction of forward-secure public-key encryption in the standard model by Yang LU, Ji-guo LI

    Published 2014-02-01
    “…In the proposed scheme, the running time of decryption algorithm and the size of ciphertext are both independent on the total number of the time periods. …”
    Get full text
    Article
  18. 10578

    Survey of video behavior recognition by Huilan LUO, Chanjuan WANG, Fei LU

    Published 2018-06-01
    “…Behavior recognition is developing rapidly,and a number of behavior recognition algorithms based on deep network automatic learning features have been proposed.The deep learning method requires a large number of data to train,and requires higher computer storage and computing power.After a brief review of the current popular behavior recognition method based on deep network,it focused on the traditional behavior recognition methods.Traditional behavior recognition methods usually followed the processes of video feature extraction,modeling of features and classification.Following the basic process,the recognition process was overviewed according to the following steps,feature sampling,feature descriptors,feature processing,descriptor aggregation and vector coding.At the same time,the benchmark data set commonly used for evaluating the algorithm performance was also summarized.…”
    Get full text
    Article
  19. 10579

    Pilot interference mitigation for TDD cell-free massive MIMO systems by Yue WANG, Fangmin XU, Haiyan CAO

    Published 2022-05-01
    “…To alleviate the pilot interference for cell-free massive multi-input multi-output (MIMO) system and improve system’s performance, a comprehensive approach including the pilot reuse, access point (AP) selection and power allocation was proposed.Firstly, to alleviate the pilot contamination, the pilot assignment based on the order of user distance was proposed, in which the pilot sharing was only allowed when the distance between two users is large enough to reduce the impact of pilot reuse.Then, by AP selection, only the APs which have main impact on the macro diversity gain were selected as the user’s serving APs.Finally, a modified max-min power control algorithm was proposed to improve the system’s average throughput.Simulation results show that the pilot interference mitigation strategy proposed improves the performance of the system significantly.…”
    Get full text
    Article
  20. 10580

    Adaptive SDN switch migration mechanism based on coalitional game by Lan YAO, Julong LAN

    Published 2020-08-01
    “…The problem of poor control plane performance causes in software-defined Networking due to the unreasonable mapping relationship between controllers and switches.To address this issue,an adaptive switch migration mechanism based on coalitional game was proposed.First,comprehensively considering the controller resource utilization,control overhead,and flow establishment time,the switch migration problem was modeled as a combination optimization problem.Then,a game theory was introduced to design a distributed algorithm,where each controller ran control logic independently and implemented coalitional game between controllers to achieve an adaptive switch migration mechanism that adapted to traffic characteristics.The simulation results show that the proposed mechanism can better adapt to the flow characteristics,reduce the control traffic overhead by about 19% and the average flow settling time by 30%,and improve the controller resource utilization.…”
    Get full text
    Article