-
10761
Path Planning for Spider Biomimetic Robot Leg based on Cubic Polynomial Interpolation Function with Midpoints
Published 2017-01-01“…Based on Monte-Carlo method,the working space of the foot end is analyzed,and based on the cubic polynomial interpolation algorithm with midpoints for path planning of obstacle avoidance is simulated. …”
Get full text
Article -
10762
Backward Surface Wave Propagation and Radiation along a One-Dimensional Folded Cylindrical Helix Array
Published 2015-01-01“…Both the propagation constant and the mode distribution of the dominant wave mechanism are extracted by ESPRIT algorithm, which indicates that a backward propagating surface wave is supported by the array structure. …”
Get full text
Article -
10763
Face Recognition Method Based on Fuzzy 2DPCA
Published 2014-01-01“…In order to improve the recognition performance of the traditional 2DPCA, a new 2DPCA algorithm based on the fuzzy theory is proposed in this paper, namely, the fuzzy 2DPCA (F2DPCA). …”
Get full text
Article -
10764
Abel–Goncharov Type Multiquadric Quasi-Interpolation Operators with Higher Approximation Order
Published 2021-01-01“…Furthermore, the advantage of our method is that the associated algorithm is very simple and easy to implement.…”
Get full text
Article -
10765
Static-analysis-based event input generation approach for Android application
Published 2017-06-01“…A static-analysis-based event input generation approach for Android applications was proposed.Based on the inter-component call graph and the system dependence graph of single component,the event inputs that security-related callbacks depend on were extracted.Furthermore,an event input algorithm was designed to automatically generate event inputs according to Android application runtime.The experimental results show that the proposed method can achieve higher coverage of permission methods and basic components,which can cover more security-related execution paths and help to collect more security-related runtime behaviors during the process of dynamic analysis.…”
Get full text
Article -
10766
On escape criterion of an orbit with s-convexity and illustrations of the behavior shifts in Mandelbrot and Julia set fractals.
Published 2025-01-01“…We also demonstrate the impact of the parameters on the formatted fractals with numerical examples and graphical illustrations using the MATHEMATICA software, algorithm, and colormap. Moreover, we observe that the Julia set appears when we widen the Mandelbrot set at its petal edges, suggesting that each Mandelbrot set point contains a sizable quantity of Julia set picture data. …”
Get full text
Article -
10767
Research of the Operational Modal Parameter Identification Technology and Application based on QICA
Published 2015-01-01“…Aiming at the major difficulties of OMA method based on vibration signals such as low noise-robust ability,high subjective experience and poor accuracy in identifying parameters and more complex recognition method,a new method of OMA on the basis of QICA is studied.Through the LMS modal experimental data algorithm analysis,the QICA modal parameter identification technology operates simply,and can effectively eliminate noise interference.Finally,regards taking of gearbox modal frequency of the five kinds of working condition recognized by the QICA as characteristic parameter of fault diagnosis,the changes of any kind of model frequency on gearbox fault working condition are compared and analyzed,and the goal of the fault identification is achieved.…”
Get full text
Article -
10768
Estimation of fatigue strength under multiaxial cyclic loading by varying the critical plane orientation
Published 2016-06-01“…The main purpose of this paper is to examine the influence of the critical plane orientation on the estimated fatigue strength of metals under multiaxial loading. The algorithm employed to evaluate fatigue strength implements the criterion of maximum normal and shear stress on a suitable damage plane (critical plane). …”
Get full text
Article -
10769
Cooperative service caching and peer offloading in Internet of vehicles based on multi-agent meta-reinforcement learning
Published 2021-06-01“…In order to reduce computation complexity, a two-layer mutli-RSU (road side unit) service caching and peer offloading algorithm (MPO) was proposed to decouple the optimization problem.In the designed MPO, the outer layer utilized multi-agent meta-reinforcement learning, which established long short-term memory (LSTM) network as the meta-agent to balance decisions of local agents and accelerate learning progress.The inner layer utilized lagrange multiplier method to achieve optimal decision for RSU peer offloading.Experimental results based on real traffic data in Hangzhou demonstrate that the proposed method outperforms other methods and remains robust under large-scale workloads.…”
Get full text
Article -
10770
Detection of malicious domain name based on a classifier combination
Published 2020-05-01“…As a fundamental service on the internet,domain name system (DNS) can inevitably be abused by malicious activities.Based on the studies of Botnets and other malwares which made use of the domain generation algorithm (DGA),and researches on current major techniques of malicious domain detection,a malicious domain detection framework based on a classifier combination was proposed.The framework applied the support vector machine (SVM) as its main classifier and combined the naive Bayes classifier (NBC) supportively with some statistical characteristics.Experiment result demonstrates that the framework outperformes current techniques in the offline-training time and the capability of detecting unknow malicious domain families,which satisfies the requirement of internet service provider (ISP) to detect and analyze malicious domainson the internet.…”
Get full text
Article -
10771
5-pass zero-knowledge identity authentication scheme based on matrix completion problem
Published 2021-11-01“…To solve the problem that most identity authentication schemes are vulnerable to quantum-computing attacks and low efficiency, a new 5-pass zero-knowledge identity authentication scheme was designed based on the matrix completion problem (MCP).Since the MCP is NP-complete, the proposed scheme has the potential to avoid quantum-computing attacks.Compared with the existing similar protocols, the proposed scheme reduced the fraud probability from 2/3 to 1/2 by adding a single round of interaction, and had the advantages of easy implementation and small key size.Moreover, based on the proposed zero-knowledge authentication scheme and Fiat-Shamir standard transformation method, a secure and efficient digital signature algorithm against quantum-computing can be obtained.…”
Get full text
Article -
10772
Finding Global Minima with a Filled Function Approach for Non-Smooth Global Optimization
Published 2010-01-01“…Then, a novel filled function is proposed for non-smooth the global optimization and a corresponding non-smooth algorithm based on the filled function is designed. …”
Get full text
Article -
10773
Transceiver design and performance analysis for uplink SCMA based on CP-free OFDM
Published 2021-06-01“…A typical sparse code multiple access (SCMA) system utilizes orthogonal frequency division multiplexing (OFDM) technology with cyclic prefix (CP) to combat multipath fading in wireless channels.Therefore, its capacity is reduced by the CP-insertion.To address this issue, the SCMA scheme based on CP-free OFDM using the time domain precoding (TDP) algorithm was proposed and the proposed scheme was termed as TDP-OFDM SCMA.The transceiver structure was designed, and the capacity plus the bit error rate (BER) performances under various channels with different overload rates and with channel estimation errors were evaluated via the simulations.Also, the power consumption problem in TDP-OFDM SCMA was discussed.The simulation results show that under the same overload rate, the capacity of TDP-OFDM SCMA can be increased by up to 25% if compared with the SCMA based on CP-OFDM.…”
Get full text
Article -
10774
Quasi-orthogonal polarization space time block codes with signal constellations rotation and performance analysis
Published 2010-01-01“…The pair-wise decoding algorithm was adopted at the receiver. The simulation and comparison among polarization quasi-orthogonal, rotational polarization quasi-orthogonal, quasi-orthogonal and rotational quasi-orthogonal were given respectively. …”
Get full text
Article -
10775
Protocol to enhance the security of Early data in TLS 1.3
Published 2017-12-01“…The new 0-RTT Internet key exchange was drawn on the TLS 1.3 session resumption phase,the rFSOPKE protocol was constructed,and the Early data encryption and transmission process were improved.The rFSOPKE protocol can protect the forward security of Early data and protect it from replay attacks during the validity period of the Ticket.Compared with the previous Early data transmission process,rFSOPKE greatly enhanced the security of Early data.Due to the increase in the calculation and transmission overhead of this protocol when sending Early data,the efficiency of the protocol is reduced.However,rFSOPKE can embed the appropriate algorithm according to the different application environment,so more efficient algorithms should be chosen to improve the protocol implementation speed.…”
Get full text
Article -
10776
Research on university email analysis based on SVM-RFE and Transformer-TBAM
Published 2024-11-01“…The experiment shows that the algorithm achieves an accuracy of 94.67% in the classification of university email datasets, which is 1.2% higher than traditional algorithms.…”
Get full text
Article -
10777
Digital multi-signature scheme based on bilinear pairing
Published 2016-06-01“…Based on bilinear pairing and three complicated problems,a new digital multi-signature scheme was pro-posed.In the new scheme,the advantage of fast signature in broadcasting digital multi-signature was applied to se-quential digital multi-signature.By changing the general mechanism of signature,signing could be done simultane-ously by the signers.Then,the signature was sent to verifier after it was verified by trusted third party.The trans-formation from concurrent signature to sequential signature was finally realized by the verifier.The security capa-bilities in three complicated problems,anti-fake attack and anti-conspiracy attack from some members of the new scheme were analyzed.Proposed scheme has many advantages over the old ones,such as fewer calculation,simpler algorithm,faster signing,higher security.…”
Get full text
Article -
10778
Carrier frequency estimation method of time-frequency overlapped signals based on cyclic correntropy spectrum
Published 2018-06-01“…According to the performance degradation problem of the carrier frequency estimation method of time-frequency overlapped BPSK signals in Alpha-stable distribution noise,a novel carrier frequency estimation algorithm of the time-frequency overlapped BPSK signals based on the cyclic correntropy spectrum was proposed.The relationship between cyclic frequency and carrier frequency on the zero frequency section of the cyclic correntropy spectrum was deduced,which could be utilized for carrier frequency estimation.The proposed method can suppress the impulse noise and has better estimation performance than that of the contrastive methods.Simulation results are presented to demonstrate the effectiveness and robustness of the proposed method.…”
Get full text
Article -
10779
Random routing defense method based on deep deterministic policy gradient
Published 2021-06-01“…To solve the problem of the existing routing shuffling defenses, such as too coarse data flow splitting granularity, poor protection effect on legitimate QoS and the security against eavesdropping attacks needed to be improved, a random routing defense method based on DDPG was proposed.INT was used to monitor and obtain the network state in real time, DDPG algorithm was used to generate random routing scheme considering both security and QoS requirements, random routing scheme was implemented with programmable switch under P4 framework to realize real-time routing shuffling with packet level granularity.Experiment results show that compared with other typical routing shuffling defense methods, the security and QoS protection effect of the proposed method are improved.…”
Get full text
Article -
10780
Sensitivity Analysis of the Locus Reliability of Linear Motion Mechanism
Published 2016-01-01“…To improve the locus accuracy of linear motion mechanism with uncertainty factor,the analytical algorithm of locus reliability sensitivity analysis for linear motion mechanism is presented. …”
Get full text
Article