Showing 11,181 - 11,200 results of 19,511 for search '"algorithm"', query time: 0.14s Refine Results
  1. 11181

    Method to improve edge coverage in fuzzing by Chunfu JIA, Shengbo YAN, Zhi WANG, Chenlu WU, Hang LI

    Published 2019-11-01
    “…Aiming at the problems of incomplete edge coverage,insufficient uses of edge coverage information and valid bytes information in AFL (American fuzz lop),a novel method was proposed.Firstly,a new seed selection algorithm was introduced,which could completely cover all edges discovered in one cycle.Secondly,the paths were scored according to the frequency of edges,to adjust the number of tests for each seed.Finally,more mutations were crafted on the valid bytes of AFL.Based on the method above,a new fuzzing tool named efuzz was implemented.Experiment results demonstrate that efuzz outperforms AFL and AFLFast in the edge coverage,with the increases of 5% and 9% respectively.In the LAVA-M dataset,efuzz found more vulnerabilities than AFL.Moreever,in real world applications efuzz has found three new security bugs with CVEs assigned.The method can effectively improve the edge coverage and vulnerability detection ability of fuzzer.…”
    Get full text
    Article
  2. 11182

    Virtual reality compressing and transmitting system based on mobile edge computing by Bin TAN, Songyuan ZHAO, Jun WU, Wenru ZHANG

    Published 2020-04-01
    “…In order to solve the problem of the high requirements of data transmission rate and sensitivity to transmission delay in virtual reality (VR) based on cloud services,a Cloud VR system with MEC (mobile edge computing) was proposed,mainly including viewpoint-based VR processing and HDA (hybrid digital-analog) transmission optimization.Firstly,a dynamic streaming method based on user viewpoint and pyramid projection was used to implement a complete edge cloud VR system.Then,HDA transmission was introduced to optimize the transmission,and a heuristic algorithm for resource allocation was given.Finally,the base station protocol stack was transformed,and the MEC was integrated into the LTE (long term evolution) system to implement a complete mobile edge cloud VR system.Experimental results demonstrate that the proposed scheme has good robustness and efficient transmission by comparing with the existing schemes.…”
    Get full text
    Article
  3. 11183

    Orchestration mechanism for VNF hardware acceleration resources in SDN/NFV architecture by Tong DUAN, Julong LAN, Yuxiang HU, Hongwei FAN

    Published 2018-06-01
    “…The hardware acceleration mechanism for VNF (virtual network function) is recently a hot research topic in SDN/NFV architecture because of the low processing performance of VNF.Once hardware acceleration resources have been plugged into the network,how to optimally mange and orchestrate these resources under service requirements remains a question to be solved.Firstly,a unified management architecture based on separated control for hardware acceleration resources was proposed.Then,traditional network topology together with hardware acceleration resources were modeled into a unified network model and then the hardware acceleration resource orchestration problem was transferred into a multi-objective linear programming problem.Finally,a hardware-accelerator-card-prior’ heuristic algorithm was designed.Experimental results show that compared with existing methods,the proposed orchestration mechanism can efficiently manage hardware acceleration resources and reduce the processing latency by 30%.…”
    Get full text
    Article
  4. 11184

    Random 2D Composites and the Generalized Method of Schwarz by Vladimir Mityushev

    Published 2015-01-01
    “…The proposed method yields an algorithm which can be applied with symbolic computations. …”
    Get full text
    Article
  5. 11185

    A New Model for Reassignment of Tasks to Available Employees in Iraq’s Firms by Dhurgam Kalel Ibrahim Alsaad, Reza Ghanbari, Ali Akbar Sohrabi, Khatere Ghorbani Moghadam

    Published 2020-01-01
    “…Finally, a heuristic algorithm for solving reassignment tasks on laborers is introduced.…”
    Get full text
    Article
  6. 11186

    Stochastic Inversion Method for Concrete Dams on the Basis of Bayesian Back Analysis Theory by Chongshi Gu, Xin Cao, Bo Xu

    Published 2019-01-01
    “…Fast Fourier transform algorithm is introduced to generate random fields for SFEM analysis. …”
    Get full text
    Article
  7. 11187

    Optimal Pricing of Spectrum Resources in Wireless Opportunistic Access by Hanna Bogucka

    Published 2012-01-01
    “…In the paper, we present mathematical formulation of the problem of finding the optimal taxation rate (common for all nodes) and propose a reduced-complexity algorithm for this optimization. Simulation results for these derived optimal values in various scenarios are also provided.…”
    Get full text
    Article
  8. 11188

    Error Modeling, Calibration, and Nonlinear Interpolation Compensation Method of Ring Laser Gyroscope Inertial Navigation System by Jianli Li, Yanhai Ma, Chen Xiyuan

    Published 2013-01-01
    “…According to the actual working environment, the temperature errors of RLG SINS are compensated by a nonlinear interpolation compensation algorithm. The experimental results show that the inertial navigation errors of the proposed method are reduced.…”
    Get full text
    Article
  9. 11189

    LSTM-Based Deep Model for Investment Portfolio Assessment and Analysis by Haohua Yang

    Published 2022-01-01
    “…The augury result of the neural reticulation was upgraded by coalesce attentional propose to the LSTM class, and a genetic algorithmic program product was formulated. Genetic algorithm (GA) updates the inalienable parameters to a higher generalization aptitude. …”
    Get full text
    Article
  10. 11190

    Program state optimal method based on variable symbolic relation analysis by Xi GUO, Pan WANG

    Published 2018-06-01
    “…Program analysis is the prime method to program property analysis,which is widely used in the domain of parameter dependent relation,path coverage and test case generation,and a lot of progress has been made.Current program analysis is based on the method of symbolic execution,but symbolic execution is usually tackled with the problems of logic expression generation of path condition and low efficiency of constrain solver,which will affect the results of program analysis.Aiming at enhancing the path analysis efficiency,the path conditions of different paths were collected,the common symbolic expression was extracted and the efficiency of symbolic analysis was enhanced,then the logic expression set was generated,the dependent relation algorithm was used to enhance the efficiency of symbolic analysis.Experimental results demonstrate that the proposed method has the advantages of accurate time complexity and better analysis efficiency compare to traditional program analysis method.…”
    Get full text
    Article
  11. 11191

    Existence Conditions for Bounded Solutions of Weakly Perturbed Linear Impulsive Systems by Alexander Boichuk, Martina Langerová, Jaroslava Škoríková

    Published 2011-01-01
    “…Under the assumption that the generating system (for ε=0) does not have solutions bounded on the entire real axis for some nonhomogeneities and using the Vishik-Lyusternik method, we establish conditions for the existence of solutions of these systems bounded on the entire real axis in the form of a Laurent series in powers of small parameter ε with finitely many terms with negative powers of ε, and we suggest an algorithm of construction of these solutions.…”
    Get full text
    Article
  12. 11192

    Research on Gear Modification and Simulation of Hybrid Transmission by Dai Jianhua, Chen Weiwei, Jiang Jibin, Chen Xuewen, Zhang Hui

    Published 2023-11-01
    “…To deal with the phenomenon of partial load of the hybrid transmission gear pair in the actual working process and to solve the eccentric load problems of a hybrid light transmission gear pair, the gear analysis software Romax is used for 3D modeling of the meshing helical gears; one gear pair is simulated and analyzed under the commonly used operating conditions of the hybrid transmission set for operation, and the second-generation genetic algorithm is used for gear modification. The modification results show that the transmission error value, contact load and maximum contact stress of the gear pair are reduced under different working conditions, the offset load of the gear face is improved, and the meshing performance and life of the gear pair are improved, which provides some reference for the modification of the hybrid transmission gear.…”
    Get full text
    Article
  13. 11193

    Practical aspects of forecasting the company’s financial performance by V. V. Kookueva, A. A. Aliev, R. I. Khavich

    Published 2021-10-01
    “…The article considers the methodological problems of forecasting key financial indicators related to forecasting the final results of the company. The algorithm for creating refined factor predictive models of financial indicators has been presented and tested. …”
    Get full text
    Article
  14. 11194

    Resource management in blockchain-enabled heterogeneous edge computing system by Ping ZHANG, Shilin LI, Yiming LIU, Xiaoqi QIN, Xiaodong XU

    Published 2020-10-01
    “…In blockchain-enabled mobile edge computing (BMEC) systems,a new class of blockchain application related computation tasks was introduced to the system.Due to the differences of parallelism among computation tasks,heterogenous computing framework was introduced to suitably split various computation tasks on processors with vastly different processing power to achieve efficient task execution.Under the limited computation and communication resources,a system-wide utility maximization problem by jointly considering heterogeneous processor scheduling,computation and bandwidth resource allocation was formulated as a mixed-integer nonlinear programming problem.To solve the problem efficiently,the formulated problem was transformed into two sub-problems,namely application-driven heterogeneous processor scheduling and joint resource allocation,and a Lagrange-dual based algorithm was proposed.Simulation results show that the proposed scheme can effectively improve the system-wide utility of the BMEC system.…”
    Get full text
    Article
  15. 11195

    Diagnosis of a Bleeding Dieulafoy Lesion on Computed Tomography and Its Subsequent Embolization by Robert M Penner, Richard J Owen, C Noel Williams

    Published 2004-01-01
    “…CT scans are now widely used in the diagnostic algorithm for acute gastrointestinal hemorrhage, and the present case illustrates that with fortuitous timing, they can provide critical information and an opportunity for selected angiography and coil embolization.…”
    Get full text
    Article
  16. 11196

    Survey of encrypted malicious traffic detection based on deep learning by Mingfang ZHAI, Xingming ZHANG, Bo ZHAO

    Published 2020-06-01
    “…With the increasing awareness of network security,encrypted communication dominates and encrypted traffic grows rapidly.Traffic encryption,while protecting privacy,also masks illegal attempts and changes the form of threats.As one of the most important branch of machine learning,deep learning performs well in traffic classification.For several years,research on deep-learning based intrusion detection has been deepened and achieved good results.The steps of encrypted malicious traffic detection were introduced to be a general detection framework model named “six-step method”.Then,discussion and induction of data processing and detection algorithms were carried out combined with this model.Both advantages and disadvantages of various algorithm models were given as well.Finally,future research directions were pointed out with a view to providing assistance for further research.…”
    Get full text
    Article
  17. 11197

    Consensus of High-Order Nonlinear Multiagent Systems with Constrained Switching Topologies by Junwei Wang, Kairui Chen, Yun Zhang

    Published 2017-01-01
    “…Finally, simulation examples are delineated to substantiate the effectiveness of the proposed algorithms.…”
    Get full text
    Article
  18. 11198

    Research on Distribution and Inventory Cooperation of Agricultural Means Supply Chain by Yanxin Zhu, Jiajing Wang, Lixian Liu

    Published 2021-01-01
    “…By the features of the model, the biobjective genetic algorithm was improved based on elitism selection, aiming to improve the quality of noninferior solution in biobjective model. …”
    Get full text
    Article
  19. 11199

    Optimized Sample Adaptive Offset Filter in HEVC by N. Archana, R. Menaka, P. T. Vasanth Raj, G. Keerthivasan, N. Kumar

    Published 2022-01-01
    “…The previous existing technique employs 32 bands in band offset (BO) calculation to determine the proper offset value to minimize the distortion in the SAO estimate algorithm for statistics collection and parametric determination procedure. …”
    Get full text
    Article
  20. 11200

    Application of random forest in big data completion by Zheng WANG, Hua REN, Yanping FANG

    Published 2016-12-01
    “…Relying on the country's existing log retention system, template library design data integrity, authentication could not meet the quality requirements of the data, using the random forest algorithm, the same data with or related data was found, data was completed and data quality was improved, and the template library was extended by optimization of feedback. …”
    Get full text
    Article