-
10861
Multi-FPGA Partitioning Method Based on Topological Levelization
Published 2010-01-01“…The second approach is a recursive algorithm based on the Fiduccia and Mattheyses bipartitioning heuristic (RP). …”
Get full text
Article -
10862
Improvement of the Nonparametric Estimation of Functional Stationary Time Series Using Yeo-Johnson Transformation with Application to Temperature Curves
Published 2021-01-01“…In this article, Box-Cox and Yeo-Johnson transformation models are applied to two time series datasets of monthly temperature averages to improve the forecast ability. An application algorithm was proposed to transform the positive original responses using the first model and the stationary responses using the second model to improve the nonparametric estimation of the functional time series. …”
Get full text
Article -
10863
Improved segmented CRC assisted puncturing Polar decoding
Published 2019-03-01“…A segmented cyclic redundancy check (CRC) assisted decoding algorithm was proposed.This method makes use of the high parallelism of BP decoding and the high reliability of CRC verification,and uniformly or proportionally disperses CRC verification bits into the original information bits.Simulation results show that when the code length N is 1 024 and the SNR is 3.5 dB,the average iterations of segmented CRC(2,16×2)and CRC (2,24+8) are 2.7 and 2.8 times less than those of G matrix based decoding.When the code length M is 896,the two segmented methods with a bit error rate of 10<sup>-5</sup>obtained about 0.7 dB gain compared with the non-CRC assisted BP puncturing decoding.…”
Get full text
Article -
10864
Delay-aware cross-layer optimization method for FANET
Published 2018-04-01“…An asynchronous distributed cross-layer optimization (ADCO) method was proposed to solve the problem of jointly considering real-time routing,rate allocation and power control in FANET (flying ad hoc network).And a delay-constrained cross-layer optimization framework was designed to formally represent proposed problem.Then Lagrangian relaxation and dual decomposition methods was used to divide joint optimization problem into several sub-problems.ADCO allowed each relay node to perform the optimization operation for different sub-problems with local information,and the relay nodes could update the dual variables based on asynchronous update mechanism.The simulation results show that the proposed algorithm can improve the network performance effectively in terms of energy efficiency,packet timeout ratio and network throughput.…”
Get full text
Article -
10865
Network slicing with spectrum sharing strategy in cognitive capacity harvesting network
Published 2021-07-01“…To realizing the network slice with spectrum sharing in cognitive capacity harvesting network, a spectrum sharing strategy was proposed based on 4D conflict graph and opportunistic capacity.Firstly, a 4D conflict graph model for mesh network was built and a method to achieve the node sets with conflict free was proposed.Then, the opportunistic capacity model of spectrum sharing was established and the opportunistic capacity of the unlicensed channel was derived.Finally, the spectrum sharing strategy based on 4D conflict graph and opportunistic capacity was proposed for cognitive capacity harvesting network.The simulation results show that compared with existing algorithms, the proposed algorithm can effectively utilize opportunistic spectrum resources and further improve channel utilization.…”
Get full text
Article -
10866
Kinematics Analysis of 3T1R 4-PRP<sub>a</sub>U Parallel Mechanism
Published 2020-11-01“…In accordance with the condition of rod length, the model of positional forward solution is established, then it is transformed into an unconstrained optimization problem and solved by differential evolution algorithm. The analytical expression of the inverse solution of mechanism position is derived and the correctness of the forward displacement of mechanism position is verified by using the inverse solution of mechanism position. …”
Get full text
Article -
10867
RS regenerating codes for cloud storage fault-tolerant system
Published 2016-10-01“…RS(Reed-Solomon) regenerating erasure codes was proposed for cloud storage fault-tolerant system,which not only inherited the reliability of the RS encoding,but also achieved the high efficiency of tolerance three faults.Hybrid recovery method of the single fault node based on RS regenerating erasure codes was introduced.And the theoretical lower bound of the number of accessing disks was computed.In theory,the performance evaluation of the storage overhead,decoding efficiency,and repair bandwidth of the RS regenerating erasure codes was carried out.Experiments results show that the repair performance of RS regenerating erasure codes is improved greatly than the similar erasure codes,and the total recovery time of the system is reduced by 20.8%~28.2% using hybrid recovery algorithm in the case of single fault.…”
Get full text
Article -
10868
SSDHT:social network-based secure DHT mechanism
Published 2018-11-01“…P2P systems have been widely used in the field of file sharing,etc.However,DHT (distributed hash table) networks have no center,no authentication,and lack of node authentication mechanism,making existing DHT-based P2P systems vulnerable to external attacks such as Sybil attacks.A DHT security enhancement mechanism based on social network was proposed,which introduced the trust relationship of nodes in the social network into the DHT network to improve the recognition ability of Sybil nodes.The KAD (Kademlia) algorithm was used as an example to verify the experiment.Experimental results based on Facebook and Twitter datasets show that the proposed security mechanism is suitable for large-scale dynamic networks and can effectively defend against Sybil attacks.…”
Get full text
Article -
10869
Optimization Analysis of Large Workspace/Rod Length of 8-SPU Redundant Mechanism
Published 2018-01-01“…Finally,the ratio of the volume with stroke of the rod is taken as the objective function,and particle swarm optimization algorithm is used to get the maximum function value. …”
Get full text
Article -
10870
Vector Bond Graph Method of Kineto-static Analysis for Planar Multi-body System with Gear Pair
Published 2015-01-01“…In order to increase the reliability and efficiency of the kineto-static analysis of complex planar multi-body system,the corresponding vector bond graph method is proposed.According to the kinematic constraint condition,the vector bond graph model of a gear pair with arbitrary tooth profile of tooth is built.Based on this,the theoretical method to build the planar multi-body systems model with gear pair by vector bond graph is given.For the algebraic difficulties brought by differential causality and nonlinear junction structure in modeling and kineto-static analysis of planar multi-body systems with gear pair,the effective bond graph augment method is proposed.By the corresponding algorithm,the computer aided modeling and kineto-static analysis of planar multi-body system with gear pair on a computer is realized,the validity of this method is illustrated.…”
Get full text
Article -
10871
Design and Construction of Hybrid Music Recommendation System Integrating Music Gene
Published 2022-01-01“…From the analysis of the complexity of each joint inference algorithm, GP + RKF has the highest complexity compared with the other three joint inference algorithms. …”
Get full text
Article -
10872
Channel estimation of UFMC system in multipath channel
Published 2018-04-01“…As a candidate waveform of 5G,universal filter multi-carrier (UFMC) technology could inhibit out-of-band radiation,achieve loose synchronization and well support the short bursts of things in the transmission.However,in the UFMC transmission without cyclic prefix (CP),inter-symbol interference (ISI) and subcarrier interference (ICI) are generated in the multipath fading channel,which will affect the estimation accuracy in channel estimation.The interference of the UFMC system in multipath channel was firstly analyzed.After using the feedback equalization suppression ISI,the self-elimination algorithm was used to suppress the ICI according to the similarity between adjacent carriers,and the pilot coefficients were designed according to the UFMC system.Finally,the simulation results show that the proposed method applied to the UFMC can suppress the interference,improve the accuracy and reduce the bit error rate.…”
Get full text
Article -
10873
Mining behavior pattern of mobile malware with convolutional neural network
Published 2020-12-01“…The features extracted by existing malicious Android application detection methods are redundant and too abstract to reflect the behavior patterns of malicious applications in high-level semantics.In order to solve this problem,an interpretable detection method was proposed.Suspicious system call combinations clustering by social network analysis was converted to a single channel image.Convolution neural network was applied to classify Android application.The model trained was used to find the most suspicious system call combinations by convolution layer gradient weight classification activation mapping algorithm,thus mining and understanding malicious application behavior.The experimental results show that the method can correctly discover the behavior patterns of malicious applications on the basis of efficient detection.…”
Get full text
Article -
10874
Human Activity Recognition Based on the Hierarchical Feature Selection and Classification Framework
Published 2015-01-01“…Every classifier used the Least Squares Support Vector Machine (LS-SVM) and Naive Bayes (NB) algorithm to distinguish different activity classes. …”
Get full text
Article -
10875
Link prediction methods based on generalized common neighbor in directed network
Published 2020-10-01“…Link prediction aims to predict missing or future links through currently observed information of network.Existing mainstream methods are mostly applied to undirected network,and some methods designed for directed network ignored the diverse heterogeneous features of common neighbor.For this problem,a generalized common neighbor algorithm was proposed.Firstly,a generalized common neighbor was defined for the directed network.Then the degree of contribution of different structures was measured by the joint edge probability of the directed neighbor isomers,and the existing undirected local similarity index is improved by the new definition,redefining eight kinds of directed similarity indicators based on generalized common neighbor.Experiments on 12 datasets show that proposed method generally improves the performance of existing predictive indicators under two metrics.…”
Get full text
Article -
10876
Channel estimation method based on compressive sensing for FBMC/OQAM system
Published 2019-12-01“…In mobile-to-mobile sensor networks,the channel estimation for FBMC/OQAM system can be investigated as a compressive sensing problem to raise frequency spectrum efficiency by exploiting the sparse nature of wireless channels.Firstly,a novel orthogonal matching pursuit algorithm with selection weak strategy and regularization based on Tanimoto coefficient (T-SWROMP) was proposed to improve the accuracy of LS channel estimation.Then,T-SWROMP methods with auxiliary pilot and coding were used to estimate channel frequency response for FBMC/OQAM system.The experimental results demonstrate the proposed method has lower complexity than the traditional SWOMP method.In addition,it achieve best performance among the traditional OMP,SWOMP and ROMP methods under dual-selective channels.…”
Get full text
Article -
10877
Provable Data Recoverability and Hide-Able Access Pattern Based ORAM
Published 2013-12-01“…The data possession was verified to utilize homomorphic hash algorithm. The adversary can not obtain useful information from the client access data pattern, and the data privacy is guaranteed.…”
Get full text
Article -
10878
Research on Anti-Trojan Malware Mechanism Based on Characteristic Behavior
Published 2014-11-01“…Once the application was considered as Trojan malware, the system would dispatch the appropriate algorithm for processing. The mechanism triggered by sensitive behaviors, and had the active prevention function and self-learning function. …”
Get full text
Article -
10879
An efficient cooperative message authentication based on reputation mechanism in vehicular ad hoc networks
Published 2019-06-01“…In the proposed scheme, reputation model is used to assess authentication efforts of vehicles, which enhances initiative for cooperative message authentication and inhabits selfish behavior; sequence optimization algorithm solves messages overflowing on condition limited computation of onboard unit and improves the speed of message authentication at the premise of ensuring the reliability of message authentication. …”
Get full text
Article -
10880
Research and implementation on college students internet addiction disorder and anti-addict system
Published 2014-10-01“…Based on the traffic analysis on Cernet2,a new discovery mechanism of games service provider IP address is proposed,including Boilerpipe text extraction algorithm and Stanford Chinese NLP,realize this new general method and computing architecture of college student internet addiction.Three kinds of Internet addiction behaviors-online games,video viewing and social networking sites visit,including the total hours spend,length of continuous addiction,frequency,selected time of addiction are analyzed.Concept of Internet addiction disorder index is proposed with quantization on the internet addiction disorder made through AHP.Finally,Internet addiction prevention system is designed and implemented.…”
Get full text
Article