Showing 10,821 - 10,840 results of 19,511 for search '"algorithm"', query time: 0.10s Refine Results
  1. 10821

    Research on consensus mechanism optimization for IoT blockchain by Qijie SONG, Tieming CHEN, Yuan CHEN, Dongjie MA, Zhengqiu WENG

    Published 2020-02-01
    “…The essence of the blockchain is a decentralized distributed ledger system.The Internet of things is interconnected by massive heterogeneous terminals and has natural distributed characteristics.Therefore,the combinedIoT blockchain is widely optimistic.At the same time,due to the heterogeneity of the IoT-aware terminal,the limited computing capacity and the ability of data transmission,the IoT blockchain faces great challenges.The password consensus technology has become a key issue.On the basis of summarizing the current blockchain consensus algorithm,its applicability to the IoT blockchain was analyzed,the current application status of several IoT blockchain platforms and consensus mechanisms was introduced,and the optimization research progress of the consensus mechanismin IoT blockchain was described.Finally,the optimization technology of the IoT blockchain and the potential research directions were summarized.…”
    Get full text
    Article
  2. 10822

    HIGH-PERFORMANCE EMBEDDING IN DUAL IMAGES BASED ON PIXEL VALUE ORDERING METHOD by Cao Thị Luyen, Pham Minh Thai

    Published 2024-12-01
    “…This paper improves the Pixel Value Ordering (PVO) algorithm to enhance embedding capacity in dual images. …”
    Get full text
    Article
  3. 10823

    OPTIMIZATION OF HYDRAULIC EXCAVATOR WORKING DEVICE (MT) by LI ZhanLong, ZHU XiaoWu, GAO ShanTie, SHI QingLu, CHEN Wei

    Published 2023-01-01
    “…Based on different optimization parts, optimization objectives and optimization algorithms, the optimization design of excavators working device has diversity and complexity. …”
    Get full text
    Article
  4. 10824

    On the Approximate Analytical Solution to Non-Linear Oscillation Systems by Mahmoud Bayat, Iman Pakar

    Published 2013-01-01
    “…In the end, numerical comparisons are conducted between the results obtained by the Variational Approach and numerical solution using Runge-Kutta's [RK] algorithm to illustrate the effectiveness and convenience of the proposed methods.…”
    Get full text
    Article
  5. 10825

    Method for quality assessment of image mosaic by Guo-ting WAN, Jun-ping WANG, Jin LI, Hong-hua CAO, Song WANG, Le WANG, IYA-ning L, Rong WEI

    Published 2013-08-01
    “…On the basis of the theory of existing methods for image quality assessment,a novel method for quality assessment of mosaicked image based on the information of image edge was presented.The method was in accordance with the features of mosaicked image.Firstly,the edges of image were detected.Then according to the information of image edges,the information of pixel error and structure was considered.The mean value and variance of the difference of edge map were related with the misplacement and the brightness mutation,which influenced the quality of mosaicked image.Lastly,the evaluate procedure was done based on the relationship.The new method was more consistent with the subjective feeling to the mosaicked image quality.This method accurately reflects the real quality of mosaicked image and the performance of the algorithm of image mosaic.…”
    Get full text
    Article
  6. 10826

    VNE-AFS:virtual network embedding based on artificial fish swarm by Qiang ZHU, Hui-qiang WANG, Hong-wu LV, Zhen-dong WANG

    Published 2012-09-01
    “…Recently virtual network embedding problem had been proposed as a research challenge in the cloud computing environment.In order to reduce the costs,a virtual network embedding algorithms based on artificial fish swarm(VNE-AFS)was proposed.A binary combinatorial optimization model was built according to the constraints on nodes and links between virtual network and substrate network,and the artificial fish swarm algorithm was used to achieve the approximate optimal mapping.The simulation results indicate that the costs of substrate network and computation time are reduced and the success rate,average revenue of embedding and average usage of links are increased compared with the existing virtual network embedding algorithms.…”
    Get full text
    Article
  7. 10827

    Comparison of Quadratic– and Median-Based Roughness Penalties for Penalized-Likelihood Sinogram Restoration in Computed Tomography

    Published 2006-01-01
    “…Since the quadratic penalty allows for derivation of an algorithm that is guaranteed to monotonically increase the penalized-likelihood objective function, we find it to be preferable to the median-based penalty.…”
    Get full text
    Article
  8. 10828

    Method for detecting collusion attack node in road condition information sharing based on reputation point by Shichang XUAN, Hao TANG, Wu YANG

    Published 2021-04-01
    “…Aiming at the problem that on occasion of the release of false road condition information by collusion nodes in the Internet of vehicles collaboratively, message authenticity could not be guaranteed in the process of road condition information sharing, a method for detecting collusion attack nodes in road condition information sharing based on reputation points was proposed.In the process of road condition information aggregation, a malicious information detection algorithm was designed to detect false messages issued by colluding nodes, which could ensure the authenticity and accuracy of messages delivered in the system.Experimental results show that the proposed method has higher detection efficiency for collusion nodes and adaption to a proportion of collusion nodes through security evaluation and experiments in comparison with the existing schemes.…”
    Get full text
    Article
  9. 10829

    Analysis of the System Composition and the Obstacle Ability of Hexapod Spider Crawling Robot by Ziyue Wu, Yanliang Song, Zhifeng Wu

    Published 2019-03-01
    “…The robot is composed of six mechanical legs and robot bodies,based on the Stm32f407 chip as the main controller,and uses the PID algorithm to control the whole robot to keep the balance,and completes the real-time response to the operation instruction through the image acquisition system. …”
    Get full text
    Article
  10. 10830

    Obfuscation of combination circuits of digital devices from unauthorized access by L. A. Zolotorevich

    Published 2019-09-01
    “…We consider the formation of a common approach to solving problems of control and verification in the design of modern integrated circuits based on the analysis of fault models of structural realizations of digital devices, errors arising in the design process, as well as deliberate distortions during the design and manufacturing stages, i. e. creation and development of taxonomy of possible deviations in the project. The algorithm of logical obfuscation and coding of digital structures based on the use of methods and means of test diagnostics is proposed.…”
    Get full text
    Article
  11. 10831

    Event-Based H∞ Filter Design for Sensor Networks with Missing Measurements by Jinliang Liu, Shumin Fei, Engang Tian

    Published 2014-01-01
    “…By using the Lyapunov stability theory and the stochastic analysis theory, sufficient criteria are derived for the existence of a solution to the algorithm of the event-based filter design. Finally, an example is exploited to illustrate the effectiveness of the proposed method.…”
    Get full text
    Article
  12. 10832

    Structural Damage Detection Based on Modal Parameters Using Continuous Ant Colony Optimization by Aditi Majumdar, Bharadwaj Nanda, Dipak Kumar Maiti, Damodar Maity

    Published 2014-01-01
    “…An inverse problem is formulated to minimize the objective function, defined in terms of discrepancy between the vibration data identified by modal testing and those computed from analytical model, which then solved to locate and assess the structural damage using continuous ant colony optimization algorithm. The damage is formulated as stiffness reduction factor. …”
    Get full text
    Article
  13. 10833

    Effects of Wind on Virtual Plants in Animation by Tina L. M. Derzaph, Howard J. Hamilton

    Published 2013-01-01
    “…The Growth-Flow method incorporates all these effects on growth and motion due to wind in one algorithm.…”
    Get full text
    Article
  14. 10834

    Reliable transmission mechanism with differentiated protection in virtualized fiber-wireless access network by Ruyan WANG, Yishuang GAO, Xiao CHEN

    Published 2019-03-01
    “…In view of the different reliability requirements of network service,a reliable transmission mechanism with differentiated protection was proposed in virtualized fiber-wireless access network.The quality of protection required by users and the fees that can be paid were used as a prerequisite.The backup protection resources were flexibly allocated by quantifying the multi-level protection quality with the probability of recovery.Then,for reducing traffic congestion and the unprotected services,the level service differentiation algorithm was used to choose protection link which was satisfied with the level of protection quality.The results show the proposed mechanism has more advantages in terms of long-term benefit-to-cost ratio and underlying network resource overhead,and provides users with a more flexible virtual network transmission while satisfying users’ reliability requirements.…”
    Get full text
    Article
  15. 10835

    Extending the Root-Locus Method to Fractional-Order Systems by Farshad Merrikh-Bayat, Mahdi Afshar

    Published 2008-01-01
    “…Three illustrative examples are presented to confirm the effectiveness of the proposed algorithm.…”
    Get full text
    Article
  16. 10836

    A FAULT DIAGNOSIS METHOD BASED ON IMPROVED ARTIFICAL BEE COLONY OPTIMIZE SUPPORT VECTOR MACHINE by WU YinHua, XU QiongYan

    Published 2018-01-01
    “…In order to improve search ability of ABC,Levy flight strategy was introduced and improved the original ABC algorithm. Use the IABC to optimize SVM parameters can effectively improve the classification performance of SVM. …”
    Get full text
    Article
  17. 10837

    Robust secure design for relay wireless sensor networks with simultaneous wireless information and power transfer by Hehao Niu, Bangning Zhang, Daoxing Guo, Mingyue Lu

    Published 2017-06-01
    “…By studying the hidden convexity of the problem, we propose an iterative algorithm combining semi-definite relaxation and a gradient-based method. …”
    Get full text
    Article
  18. 10838

    Doppler Positioning Performance of LEO Mega Constellation by Yulu ZHANG, Zhen LI, Chuang SHI, Guifei JING

    Published 2024-03-01
    “…This paper proposed a Doppler-only point-solution algorithm and analyzed the Doppler positioning performance based on the Starlink constellation.The Doppler positioning accuracy was about 3~6 m.To achieve the meter-level positioning accuracy, the satellite position and velocity errors should be within several meters and several centimeters per second, respectively.The ionospheric delay rates of C-band signal would cause about 2 m error in Doppler positioning.The positioning error would increase by dozens of meters if there were no corrections for the tropospheric errors.To ensure convergence in the LEO-based Doppler positioning, the initial receiver position error should be less than 300 km when the satellites orbit at an altitude of 550 km.…”
    Get full text
    Article
  19. 10839

    Botnet detection based on generative adversarial network by Futai ZOU, Yue TAN, Lin WANG, Yongkang JIANG

    Published 2021-07-01
    “…In order to solve the problems of botnets’ strong concealment and difficulty in identification, and improve the detection accuracy of botnets, a botnet detection method based on generative adversarial networks was proposed.By reorganizing the data packets in the botnet traffic into streams, the traffic statistics characteristics in the time dimension and the traffic image characteristics in the space dimension were extracted respectively.Then with the botnet traffic feature generation algorithm based on generative adversarial network, botnet feature samples were produced in the two dimensions.Finally combined with the application of deep learning in botnet detection scenarios, a botnet detection model based on DCGAN and a botnet detection model based on BiLSTM-GAN were proposed.Experiments show that the proposed model improves the botnet detection ability and generalization ability.…”
    Get full text
    Article
  20. 10840

    RESEARCH ON DYNAMIC SYSTEM RELIABILITY MODEL OF HIGH DIMENSIONAL COPULA FUNCTION by FENG Jun, LIU Wei, TAN Long, LI Yi

    Published 2022-01-01
    “…The optimal R-Vine structure is selected by using MST algorithm. The time-varying parameters in the model are described by nonparametric kernel density estimation(KDE). …”
    Get full text
    Article