-
10821
Research on consensus mechanism optimization for IoT blockchain
Published 2020-02-01“…The essence of the blockchain is a decentralized distributed ledger system.The Internet of things is interconnected by massive heterogeneous terminals and has natural distributed characteristics.Therefore,the combinedIoT blockchain is widely optimistic.At the same time,due to the heterogeneity of the IoT-aware terminal,the limited computing capacity and the ability of data transmission,the IoT blockchain faces great challenges.The password consensus technology has become a key issue.On the basis of summarizing the current blockchain consensus algorithm,its applicability to the IoT blockchain was analyzed,the current application status of several IoT blockchain platforms and consensus mechanisms was introduced,and the optimization research progress of the consensus mechanismin IoT blockchain was described.Finally,the optimization technology of the IoT blockchain and the potential research directions were summarized.…”
Get full text
Article -
10822
HIGH-PERFORMANCE EMBEDDING IN DUAL IMAGES BASED ON PIXEL VALUE ORDERING METHOD
Published 2024-12-01“…This paper improves the Pixel Value Ordering (PVO) algorithm to enhance embedding capacity in dual images. …”
Get full text
Article -
10823
OPTIMIZATION OF HYDRAULIC EXCAVATOR WORKING DEVICE (MT)
Published 2023-01-01“…Based on different optimization parts, optimization objectives and optimization algorithms, the optimization design of excavators working device has diversity and complexity. …”
Get full text
Article -
10824
On the Approximate Analytical Solution to Non-Linear Oscillation Systems
Published 2013-01-01“…In the end, numerical comparisons are conducted between the results obtained by the Variational Approach and numerical solution using Runge-Kutta's [RK] algorithm to illustrate the effectiveness and convenience of the proposed methods.…”
Get full text
Article -
10825
Method for quality assessment of image mosaic
Published 2013-08-01“…On the basis of the theory of existing methods for image quality assessment,a novel method for quality assessment of mosaicked image based on the information of image edge was presented.The method was in accordance with the features of mosaicked image.Firstly,the edges of image were detected.Then according to the information of image edges,the information of pixel error and structure was considered.The mean value and variance of the difference of edge map were related with the misplacement and the brightness mutation,which influenced the quality of mosaicked image.Lastly,the evaluate procedure was done based on the relationship.The new method was more consistent with the subjective feeling to the mosaicked image quality.This method accurately reflects the real quality of mosaicked image and the performance of the algorithm of image mosaic.…”
Get full text
Article -
10826
VNE-AFS:virtual network embedding based on artificial fish swarm
Published 2012-09-01“…Recently virtual network embedding problem had been proposed as a research challenge in the cloud computing environment.In order to reduce the costs,a virtual network embedding algorithms based on artificial fish swarm(VNE-AFS)was proposed.A binary combinatorial optimization model was built according to the constraints on nodes and links between virtual network and substrate network,and the artificial fish swarm algorithm was used to achieve the approximate optimal mapping.The simulation results indicate that the costs of substrate network and computation time are reduced and the success rate,average revenue of embedding and average usage of links are increased compared with the existing virtual network embedding algorithms.…”
Get full text
Article -
10827
Comparison of Quadratic– and Median-Based Roughness Penalties for Penalized-Likelihood Sinogram Restoration in Computed Tomography
Published 2006-01-01“…Since the quadratic penalty allows for derivation of an algorithm that is guaranteed to monotonically increase the penalized-likelihood objective function, we find it to be preferable to the median-based penalty.…”
Get full text
Article -
10828
Method for detecting collusion attack node in road condition information sharing based on reputation point
Published 2021-04-01“…Aiming at the problem that on occasion of the release of false road condition information by collusion nodes in the Internet of vehicles collaboratively, message authenticity could not be guaranteed in the process of road condition information sharing, a method for detecting collusion attack nodes in road condition information sharing based on reputation points was proposed.In the process of road condition information aggregation, a malicious information detection algorithm was designed to detect false messages issued by colluding nodes, which could ensure the authenticity and accuracy of messages delivered in the system.Experimental results show that the proposed method has higher detection efficiency for collusion nodes and adaption to a proportion of collusion nodes through security evaluation and experiments in comparison with the existing schemes.…”
Get full text
Article -
10829
Analysis of the System Composition and the Obstacle Ability of Hexapod Spider Crawling Robot
Published 2019-03-01“…The robot is composed of six mechanical legs and robot bodies,based on the Stm32f407 chip as the main controller,and uses the PID algorithm to control the whole robot to keep the balance,and completes the real-time response to the operation instruction through the image acquisition system. …”
Get full text
Article -
10830
Obfuscation of combination circuits of digital devices from unauthorized access
Published 2019-09-01“…We consider the formation of a common approach to solving problems of control and verification in the design of modern integrated circuits based on the analysis of fault models of structural realizations of digital devices, errors arising in the design process, as well as deliberate distortions during the design and manufacturing stages, i. e. creation and development of taxonomy of possible deviations in the project. The algorithm of logical obfuscation and coding of digital structures based on the use of methods and means of test diagnostics is proposed.…”
Get full text
Article -
10831
Event-Based H∞ Filter Design for Sensor Networks with Missing Measurements
Published 2014-01-01“…By using the Lyapunov stability theory and the stochastic analysis theory, sufficient criteria are derived for the existence of a solution to the algorithm of the event-based filter design. Finally, an example is exploited to illustrate the effectiveness of the proposed method.…”
Get full text
Article -
10832
Structural Damage Detection Based on Modal Parameters Using Continuous Ant Colony Optimization
Published 2014-01-01“…An inverse problem is formulated to minimize the objective function, defined in terms of discrepancy between the vibration data identified by modal testing and those computed from analytical model, which then solved to locate and assess the structural damage using continuous ant colony optimization algorithm. The damage is formulated as stiffness reduction factor. …”
Get full text
Article -
10833
Effects of Wind on Virtual Plants in Animation
Published 2013-01-01“…The Growth-Flow method incorporates all these effects on growth and motion due to wind in one algorithm.…”
Get full text
Article -
10834
Reliable transmission mechanism with differentiated protection in virtualized fiber-wireless access network
Published 2019-03-01“…In view of the different reliability requirements of network service,a reliable transmission mechanism with differentiated protection was proposed in virtualized fiber-wireless access network.The quality of protection required by users and the fees that can be paid were used as a prerequisite.The backup protection resources were flexibly allocated by quantifying the multi-level protection quality with the probability of recovery.Then,for reducing traffic congestion and the unprotected services,the level service differentiation algorithm was used to choose protection link which was satisfied with the level of protection quality.The results show the proposed mechanism has more advantages in terms of long-term benefit-to-cost ratio and underlying network resource overhead,and provides users with a more flexible virtual network transmission while satisfying users’ reliability requirements.…”
Get full text
Article -
10835
Extending the Root-Locus Method to Fractional-Order Systems
Published 2008-01-01“…Three illustrative examples are presented to confirm the effectiveness of the proposed algorithm.…”
Get full text
Article -
10836
A FAULT DIAGNOSIS METHOD BASED ON IMPROVED ARTIFICAL BEE COLONY OPTIMIZE SUPPORT VECTOR MACHINE
Published 2018-01-01“…In order to improve search ability of ABC,Levy flight strategy was introduced and improved the original ABC algorithm. Use the IABC to optimize SVM parameters can effectively improve the classification performance of SVM. …”
Get full text
Article -
10837
Robust secure design for relay wireless sensor networks with simultaneous wireless information and power transfer
Published 2017-06-01“…By studying the hidden convexity of the problem, we propose an iterative algorithm combining semi-definite relaxation and a gradient-based method. …”
Get full text
Article -
10838
Doppler Positioning Performance of LEO Mega Constellation
Published 2024-03-01“…This paper proposed a Doppler-only point-solution algorithm and analyzed the Doppler positioning performance based on the Starlink constellation.The Doppler positioning accuracy was about 3~6 m.To achieve the meter-level positioning accuracy, the satellite position and velocity errors should be within several meters and several centimeters per second, respectively.The ionospheric delay rates of C-band signal would cause about 2 m error in Doppler positioning.The positioning error would increase by dozens of meters if there were no corrections for the tropospheric errors.To ensure convergence in the LEO-based Doppler positioning, the initial receiver position error should be less than 300 km when the satellites orbit at an altitude of 550 km.…”
Get full text
Article -
10839
Botnet detection based on generative adversarial network
Published 2021-07-01“…In order to solve the problems of botnets’ strong concealment and difficulty in identification, and improve the detection accuracy of botnets, a botnet detection method based on generative adversarial networks was proposed.By reorganizing the data packets in the botnet traffic into streams, the traffic statistics characteristics in the time dimension and the traffic image characteristics in the space dimension were extracted respectively.Then with the botnet traffic feature generation algorithm based on generative adversarial network, botnet feature samples were produced in the two dimensions.Finally combined with the application of deep learning in botnet detection scenarios, a botnet detection model based on DCGAN and a botnet detection model based on BiLSTM-GAN were proposed.Experiments show that the proposed model improves the botnet detection ability and generalization ability.…”
Get full text
Article -
10840
RESEARCH ON DYNAMIC SYSTEM RELIABILITY MODEL OF HIGH DIMENSIONAL COPULA FUNCTION
Published 2022-01-01“…The optimal R-Vine structure is selected by using MST algorithm. The time-varying parameters in the model are described by nonparametric kernel density estimation(KDE). …”
Get full text
Article