-
10621
A Newton-Like Trust Region Method for Large-Scale Unconstrained Nonconvex Minimization
Published 2013-01-01“…The global convergence of the algorithm is proved. Numerical results indicate that the proposed method is competitive and efficient on some classical large-scale nonconvex test problems.…”
Get full text
Article -
10622
The Application of Immersive Interactive Technology in Animation Teaching
Published 2022-01-01“…In the light processing of animation teaching, this paper uses four-step phase shift and PCA algorithm to process the interference fringes with vibration effects collected by the CCD camera. …”
Get full text
Article -
10623
Estimation scheme for parameters of wireless channel model in OFDM communication systems
Published 2007-01-01“…The conventional channel estimator in OFDM system was designed to cope with the worst-case channel condi-tion,thus performance degradation can be induced due to the imperfect channel estimation.Though wiener filter based on the minimum mean-squared error(MMSE) is the optimal linear estimator,it requires the prior information of transmis-sion channel.In order to select the near optimal prestored channel interpolation filter coefficients,three channel parame-ters detecting methods including maximum multipath delay,Doppler frequency and SNR based on the time and fre-quency correlation functions of the channel,the Euclidean distance of hard-decision in pilots position respectively,were proposed.The method proposed with low complexity allows an efficient implementation for adaptive channel estimation algorithm as well as multi-user OFDM systems.…”
Get full text
Article -
10624
Security analysis and improvement of strongly secure certificate less signature scheme
Published 2014-05-01“…Aiming at this problem, the behavior of KGC was restrained by the change of traditional certificateless algorithm sequence KGC bulletin board where user public key make public, and verifiability of facticity of public key through the local private keys and public keys. …”
Get full text
Article -
10625
Tenant-Oriented Customized VM Networking Technology
Published 2015-10-01“…A tenant-oriented customized virtual machine networking system was designed and implemented based on OpenStack.By utilizing metadata definition and template based collaboration,the system implemented automated deployment and control of cloud infrastructures.Features such as unified graphical and draggable tenant interfaces,customized virtual machine networking orchestration,dynamic and batch resource configuration,quality of service control on network interfaces,and a connectivity based optimized mapping algorithm were included.The system provided users ability to configure networks,so that users can manage to conduct virtual machine networking swiftly and without knowledge of underlying technical details.It contributed to reduction of overall virtual networking latency,high efficiency matching of resources and increase in resource utilization.…”
Get full text
Article -
10626
ROUTE FIRST-CLUSTER SECOND METHOD FOR PERSONAL SERVICE ROUTING PROBLEM
Published 2019-06-01“…We used the Genetic Algorithm (GA) to improve the route and compared the results by creating different scenarios in clustering methods. …”
Get full text
Article -
10627
Exponential information’s extraction from power traces of modulo exponentiation implemented on FPGA
Published 2010-01-01“…A power analysis model on modulo exponentiation’s computation suitable for real environment was presented in the basis of analysis to the great amount of power traces in the rough.And a method of signal processing for extracting exponential information from the initial power traces was inferred too.Hereby,a power analysis platform was designed and implemented.The exponential information submerged in power traces of 32bit modulo exponentiation algorithms applied in a FPGA chip was successfully extracted where after.Meanwhile,a conclusion about SPA attack on RSA made by Messerges et al,such as the problem with an SPA attack was that the information about the secret key was difficult to directly observe,was proved to be incorrect.Finally,the static masking algorithm for modulo exponentiation of anti-SPA attack was also validated in this testing platform.…”
Get full text
Article -
10628
LTE D2D based vehicle networking communication architecture and data distributing strategy
Published 2016-07-01“…A LTE D2D was proposed based vehicle networks communication architecture and then a movement consistency based vehicle clustering algorithm was designed. The results show it increases sus-tained D2D communication time and improves the reliability of D2D communication. …”
Get full text
Article -
10629
Educational process improvement of oil and gas complex specialists training
Published 2016-06-01“…The mathematical model of the accounting of heatphysical parameters of products of combustion of fuel gas is created, the algorithm of thermodynamic calculation with the exact accounting of change of heatphysical parameters of a working body for any composition of fuel gas is offered. …”
Get full text
Article -
10630
Design of multi-key encryption method
Published 2020-11-01“…In order to improve the security in the process of information transmission,the current encryption methods were studied,and the research status was reported which increased the security of encryption by processing the key.According to the principle of segmenting and grouping data in the process of sending and encrypting,a method of multi-key encryption was designed:the segmenting key group and grouping key group were generated by the source key and random number,and the corresponding key was selected for each segmented and grouped data by its sequence number according to the matching algorithm.This method realized the encryption of multi-key in the process of information transmission.Finally,on the one hand,MATLAB was used to test and verify the encryption efficiency of this method.On the other hand,the security of this method was analyzed from the theoretical and mathematical perspective,comparing with the traditional method.It is concluded that this method can increase the security of the traditional method without too much cost much cost.…”
Get full text
Article -
10631
Algebraic Verification Method for SEREs Properties via Groebner Bases Approaches
Published 2013-01-01“…We then present a complete checking algorithm framework based on these algebraic representations by using Groebner bases. …”
Get full text
Article -
10632
Advantage estimator based on importance sampling
Published 2019-05-01“…In continuous action tasks,deep reinforcement learning usually uses Gaussian distribution as a policy function.Aiming at the problem that the Gaussian distribution policy function slows down due to the clipped action,an importance sampling advantage estimator was proposed.Based on the general advantage estimator,an importance sampling mechanism was introduced by the estimator to improve the convergence speed of the algorithm and correct the deviation of the value function caused by calculating the target strategy and action strategy ratio of the boundary action.In addition,the L parameter was introduced by ISAE which improved the reliability of the sample and limited the stability of the network parameters by limiting the range of the importance sampling rate.In order to verify the effectiveness of the ISAE,applying it to proximal policy optimization and comparing it with other algorithms on the MuJoCo platform.Experimental results show that ISAE has a faster convergence rate.…”
Get full text
Article -
10633
Data security for internet plus in public cloud
Published 2017-10-01“…“Internet plus” has given birth to many new economic forms and business models,the public cloud faces a serious security challenges.The security of public cloud data was studied and the research ideas were put forward.Firstly,the concept of homomorphic encryption,the characteristics of additive homomorphic encryption and multiplicative homomorphic encryption,and the current research results and difficult problems to be solved were analyzed.Then,based on the multiplicative homomorphic encryption algorithm,hash table and similarity theory,a data security protection scheme was proposed,and the concrete realization process was described.The similarity and completeness of the encrypted data in the public cloud were tested by Euclidean distance.Finally,the correctness and security of the scheme were analyzed by theory.The simulation results verify the feasibility and validity of the scheme.…”
Get full text
Article -
10634
Simulated annealing on uncorrelated energy landscapes
Published 1994-01-01“…A recurrence relation expressing the effectiveness of the algorithm in terms of the function G is derived. Surprising numerical results are obtained, to the effect that for certain parametrized families of functions {Gc, c∈R}, where c represents the steepness of the curve G′(u), the effectiveness of simulated annealing increases steadily with c These results suggest that on the average annealing is effective whenever most points have very small objective function values, but a few points have very large objective function values.…”
Get full text
Article -
10635
WIDE-RANGE GROUND/BOARD-BASED SPECTRAL METHOD FOR DETERMINING THE CHLOROPHYLL а CONCENTRATION IN SEAWATER
Published 2020-06-01“…The author has developed an operational algorithm of the above system functioning and has analyzed the issues of the optimal structuring of the system.…”
Article -
10636
Analysis on traveling time of Internet
Published 2007-01-01“…Based on the giant data samples authorized by CAIDA,it found that the Internet traveling time was typically distributed by multi-modal and heavy-tailed when the Internet traveling time was statistically analyzed.Furthermore,a research on the relationship between the traveling diameter and the traveling time from the whole and local data samples supposed that link delay was the leading cause for the great variance of the traveling time,and a revising algorithm was proposed to process the raw data samples to obtain link delay.The statistical analysis of link delay presented that the ratio of the biggest link delay to the traveling time in more than 90% of paths was over 1/4.Then a definition of dominant delay was put forward.The traveling time is affected greatly by dominant delay,which makes the similar diameter’s traveling time distinct.…”
Get full text
Article -
10637
Quantum Key Relay Scheme Based on Trusted Control Center
Published 2014-06-01“…A transmit quantum key relay scheme based on trusted control center and trusted quantum relay server was proposed.The quantum key one-time pad encryption algorithm was used in the design of trusted relay protocol.Upon the establishment of trusted relay network,the trusted control center was used to ensure the credibility and security of access relay,and the user's IP address was hidden in the quantum information data that had been encrypted only for the legal user to decrypt and transmit credible information.The security analysis shows,users who do not connect with the quantum channel can still use the trusted relay network to transmit quantum key securely in a long-distance transmission while attackers can not obtain useful quantum key information from the network.…”
Get full text
Article -
10638
Pole Placement-Based NMPC of Hammerstein Systems and Its Application to Grade Transition Control of Polypropylene
Published 2012-01-01“…This paper presents a new nonlinear model predictive control (MPC) algorithm for Hammerstein systems subject to constraints on the state, input, and intermediate variable. …”
Get full text
Article -
10639
Method for constructing function correspondence between firmware based on candidate function group
Published 2021-04-01“…Due to the characteristics of firmware, traditional binary comparison methods are prone to mismatches during the propagation of the matching function.Aiming at the problem that the matching function propagation algorithm is not ideal, a method for constructing function correspondence based on candidate function groups was designed, and the concept of function matching in n layer local network is supplemented.Then, three candidate function group construction strategies and candidate function group matching methods are proposed, and the time overhead were analyzed.Finally, a prototype system was implemented based on the method and compared with Bindiff.Through random sampling and manual check, 86.04% of the matching results of the proposed method are consistent with Bindiff matching results, while 11.3% can correct Bindiff matching errors.…”
Get full text
Article -
10640
Risk assessment model based on fuzzy Petri nets
Published 2013-08-01“…The concept of credibility was introduced, and the security risk assessment model and fuzzy reasoning algorithm based on fuzzy Petri net were also proposed, making use of fuzzy Petri nets method joined together with the AHP to analyze the question, and combining qualitative analysis and quantitative analysis together. …”
Get full text
Article