Showing 10,701 - 10,720 results of 19,511 for search '"algorithm"', query time: 0.08s Refine Results
  1. 10701

    Formation Control for Unmanned Aerial Vehicles with Directed and Switching Topologies by Yahui Qi, Shaolei Zhou, Yuhang Kang, Shi Yan

    Published 2016-01-01
    “…Sufficient conditions to achieve formation with directed and switching topologies are provided and an explicit expression of the formation reference function is given. Furthermore, an algorithm to design the gain matrices of the protocol is presented. …”
    Get full text
    Article
  2. 10702

    METHODOLOGICAL BASIS FOR ESTIMATING THE LIFE CYCLE COST OF AIRCRAFT ENGINE, TAKING INTO ACCOUNT THE ATTENDANT RISKS by E. A. Ozdoeva, O. A. Smolyakov

    Published 2020-03-01
    “…At this stage, it is necessary to describe clearly the algorithm that will be the basis for the risk assessment of the aircraft engine development.…”
    Get full text
    Article
  3. 10703

    Improvement and evaluation for algebraic fault attacks on PRESENT by Jing HUANG, Xin-jie ZHAO, Fan ZHANG, Shi-ze GUO, Ping ZHOU, Hao CHEN, Jian YANG

    Published 2016-08-01
    “…An enhanced algebraic fault analysis on PRESENT was proposed.Algebraic cryptanalysis was introduced to build the algebraic equations for both the target cipher and faults.The equation set of PRESENT was built reversely in order to accelerate the solving speed.An algorithm of estimating the reduced key entropy for given amount of fault injec-tions was proposed,which can evaluate the resistance of PRESENT against fault attacks under different fault models.Fi-nally,extensive glitch-based fault attacks were conducted on an 8-bit smart card PRESENT implemented on a smart card.The best results show that only one fault injection was required for the key recovery,this is the best result of fault attacks on PRESENT in terms of the data complexity.…”
    Get full text
    Article
  4. 10704

    Parallel Batch Scheduling of Deteriorating Jobs with Release Dates and Rejection by Juan Zou, Cuixia Miao

    Published 2014-01-01
    “…Furthermore, we provide an optimal O(nlog⁡n) time algorithm for the case where jobs have identical release dates.…”
    Get full text
    Article
  5. 10705

    An Overlapping Clustering Approach for Routing in Wireless Sensor Networks by Zhenquan Qin, Can Ma, Lei Wang, Jiaqi Xu, Bingxian Lu

    Published 2013-03-01
    “…The design and analysis of routing algorithm is an important issue in wireless sensor networks (WSNs). …”
    Get full text
    Article
  6. 10706

    Study of BGP secure scheme based on divide and conquer strategy by Bin WANG, Jin-liang AN, Chun-ming WU, Ju-long LAN

    Published 2012-05-01
    “…A new approach was studied for BGP security:SE-BGP.By analyzing the security of SE-BGP,was found it had some secure leaks which couldnt resist active attack.To solve these secure problems of SE-BGP,an AS-alliance-based secure BGP scheme :SA-BGP was proposed,which used the aggregate signatures algorithm based on RSA.The SA-BGP has strong ability of security that can effectively verify the propriety of IP prefix origination and verifies the validity of an AS to announce network layer reachability information (NLRI).SA-BGP can large-scale reduced the number of the used certificates.Performance evaluation results that SA-BGP can be implemented efficiently and the incurred overhead,in terms of time and space,ptable in practice.…”
    Get full text
    Article
  7. 10707

    Nonlinear Finite-Horizon Regulation and Tracking for Systems with Incomplete State Information Using Differential State Dependent Riccati Equation by Ahmed Khamis, D. Subbaram Naidu, Ahmed M. Kamel

    Published 2014-01-01
    “…This can be accomplished by the integration of the differential SDRE filter algorithm and the finite-horizon state dependent Riccati equation (SDRE) technique. …”
    Get full text
    Article
  8. 10708

    Multi-factor identity authentication scheme for trusted sharing of cultural resources by Miaomiao WANG, Lanlan RUI, Siya XU

    Published 2023-10-01
    “…To solve the problems of data leakage and identity impersonation caused by traditional single factor authentication, a multi-factor identity authentication scheme based on blockchain was proposed for the trusted sharing of cultural resources.Considering a variety of identity factors, a heterogeneous digital identity model was constructed using the tamper resistance and distribution of the blockchain distributed ledger.Through asymmetric encryption algorithm and exclusive OR (XOR) operation, the trusted reuse of heterogeneous digital identity and fast authentication of multi-agent access were realized.Security analysis and simulation results show that the proposed scheme outperforms existing multi-factor authentication schemes in terms of security and efficiency, and can effectively reduce the cost of identity authentication.…”
    Get full text
    Article
  9. 10709

    Impulsive noise mitigation based on iteration adaptive approach in underwater acoustic communication by Guili ZHOU, Youming LI, Mingchen YU, Xiaoli WANG

    Published 2017-11-01
    “…Focusing on the impulsive noise mitigation in underwater acoustic communication,an impulsive noise mitigation method based on iteration adaptive approach was proposed.Firstly,by utilizing the orthogonality of the subcarriers in OFDM system,both the impulsive noise and background noise were separated from the signals.Then null tones matrix was used to construct a steering matrix and get the impulsive noise interference covariance matrix.Furthermore,a cost function based on weighted least squares approach was proposed and a close form expression for the impulsive noise was derived.Finally,the impulsive noise was mitigated by substracting the estimation of the impulse noise in the received signal.Simulation results show that the proposed algorithm can reduce the bit error rate (BER) efficiently and provide better performance,especially in high signal to impulsive noise ratio (SINR) case.…”
    Get full text
    Article
  10. 10710

    Channel modeling of molecular communication via free diffusion with multiple receiver by Zhuo SUN, Xu BAO, Jie LIN, Wence ZHANG

    Published 2021-07-01
    “…A coexistence scenario with a point source, a pair of absorbing and transparent receiver was considered, an interference factor was introduced in the proposed channel model based on the receiving molecular probability in the transparent receiver considering the influences of the absorbing receiver on the transparent one.Furthermore, the channel model of point source and transparent receiver had been proposed by using Levenberg-Marquardt algorithm combined with artificial neural network to study and predict channel model parameters.The simulation results not only verify the effectiveness of the proposed channel model, but also show that the peak time of any point in the environment is directly proportional to the square of the distance from the point source to the receiver, and inversely proportional to the molecular diffusion coefficient, and the peak time is not affected by the absorbing receiver in the environment.…”
    Get full text
    Article
  11. 10711

    Research on system log anomaly detection based on deep learning by Yidong WANG, Peishun LIU, Gbin WAN

    Published 2019-10-01
    “…The system log reflects the running status of the system and records the activity information of specific events in the system.Therefore,the rapid and accurate detection of the system abnormal log is important to the security and stability of the system.A log anomaly detection algorithm based on GRU neural network is proposed.Log parsing is implemented based on log key technology.Log anomaly detection is realized by using anomaly detection model of execution path and anomaly detection model of parameter value.The system has the advantages of less parameters and faster training.It improves the running speed while achieving higher detection accuracy,and is suitable for log analysis of large information systems.…”
    Get full text
    Article
  12. 10712

    Performance of 256QAM in LTE-Hi indoor scenario by Shan LIU, Cheng TAO, Liu LIU

    Published 2016-01-01
    “…In order to solve the traffic explosion of indoor and hotspots,LTE-Hi was put forward by 3GPP organization in Release12.Due to the coverage particularity of indoor and hotspots scenarios,the organization introduced 256QAM to improve system performance.According to the 256QAM constellation given in the standard,a soft demodulation algorithm based on border distance decision was deduced.Through a simulation of the UE SINR distribution in the LTE-Hi scenario,the feasibility of the 256QAM was proved and according to the CQI/MCS/TBS signaling table changed for 256QAM,link level simulation showed the 256QAM and 64QAM throughput in comparison under different EVM index.Finally,the system performance with and without the introduction of 256QAM under different scenarios was evaluated.…”
    Get full text
    Article
  13. 10713

    A Proposed Method for Solving Fuzzy System of Linear Equations by Reza Kargar, Tofigh Allahviranloo, Mohsen Rostami-Malkhalifeh, Gholam Reza Jahanshaloo

    Published 2014-01-01
    “…Some conditions for the existence of a fuzzy or interval solution of m×n linear system are derived and also a practical algorithm is introduced in detail. The method is based on linear programming problem. …”
    Get full text
    Article
  14. 10714

    Optimization method through topology reconfiguration for mobile underwater wireless sensor networks by Ming HE, Wen-hui LIANG, Qiu-li CHEN, Xi-liang CHEN, Jian CHEN

    Published 2015-06-01
    “…The topology of mobile underwater wireless sensor networks (MUWSN) evolves dynamically with ocean currents,which will have great impact on network performance.To solve this problem,a topology optimization method for MUWSNs is proposed based on topology reconfiguration.Firstly,the proposed method optimizes the coverage rate of MUWSNs by adjusting the location of sensor nodes through simulating fish behaviors.Secondly,to optimize the connectivity of MUWSNs,the proposed method repairs disconnected positions and eliminates key nodes in MUWSN through using redundant nodes.Finally,simulation results verify the rationality and validity of the proposed method.Experimental results show that the algorithm can guarantee the network coverage is maintained at about 97%,connectivity rate above 89%,with lower energy consumption.…”
    Get full text
    Article
  15. 10715

    Joint optimization of edge computing and caching in NDN by Yu ZHANG, Min CHENG

    Published 2022-08-01
    “…Named data networking (NDN) is architecturally easier to integrate with edge computing as its routing is based on content names and its nodes have caching capabilities.Firstly, an integrated framework was proposed for implementing dynamic coordination of networking, computing and caching in NDN.Then, considering the variability of content popularity in different regions, a matrix factorization-based algorithm was proposed to predict local content popularity, and deep reinforcement learning was used to solve the the problem of joint optimization for computing and caching resource allocation and cache placement policy with the goal of maximizing system operating profit.Finally, the simulation environment was built in ndnSIM.The simulation results show that the proposed scheme has significant advantages in improving cache hit rate, reducing the average delay and the load on the remote servers.…”
    Get full text
    Article
  16. 10716

    Dynamic Combined Optimal Scheduling of Electric Energy and Natural Gas Energy Consumption in Data Center by Xuehui Liu, Guisheng Hou, Lei Yang

    Published 2022-01-01
    “…Then the particle swarm algorithm is used to simulate the schedule. The results show that using natural gas as supplementary energy supply can effectively reduce the overall energy consumption of data center in considering the service delay level of data center.…”
    Get full text
    Article
  17. 10717

    Design of a Small Quadruped Robot with Parallel Legs by Ming Lu, Baorui Jing, Hao Duan, Guanbin Gao

    Published 2022-01-01
    “…The rotation angle of each actuator for the quadruped robot is analyzed by the inverse kinematics algorithm. Moreover, the trajectory of the foot-end, including support and swing phases, is planned to reduce the impact between the foot-end and the ground. …”
    Get full text
    Article
  18. 10718

    A Bayesian approach to discrete multiple outcome network meta-analysis. by Rebecca Graziani, Sergio Venturini

    Published 2020-01-01
    “…An adaptive Markov Chain Monte Carlo algorithm is devised for running posterior inference. …”
    Get full text
    Article
  19. 10719

    A SVM Based Spectrum Prediction Scheme for Cognitive Radio by Yuan Xu, Huaxiang Lu, Xu Chen

    Published 2014-11-01
    “…The results show that by avoiding invalid prediction, the spectrum utilization can also be improved, and the forecasting accuracy is better than model based on back propagation(BP), thus the proposed algorithm is practicable and flexible for spectrum prediction in cognitive radio.…”
    Get full text
    Article
  20. 10720

    EUS in children with eosinophilic oesophagitis – a new method of measuring oesophageal total wall thickness area. An artificial intelligence application feasibility study. A pilot... by Wozniak Slawomir, Kempinski Radoslaw, Akutko Katarzyna, Pytrus Tomasz, Zaleska-Dorobisz Urszula

    Published 2024-11-01
    “…In the study, we aimed to introduce a formula for measuring the oesophageal total wall thickness area, which could be used for developing an artificial intelligence-based algorithm for the detection of patients whose total wall thickness area exceeds the norms.…”
    Get full text
    Article