Showing 11,361 - 11,380 results of 19,511 for search '"algorithm"', query time: 0.17s Refine Results
  1. 11361

    Optimal Planning of Distributed Sensor Layouts for Collaborative Surveillance by Thomas A. Wettergren, Russell Costa

    Published 2013-04-01
    “…In particular, we develop a genetic algorithm solution to find spatial sensor density functions that maximize effectiveness against moving targets, where the surveillance performance of individual sensors is dependent on their absolute position in the region as well as their relative position to both the expected target(s) and any asset that is being protected. …”
    Get full text
    Article
  2. 11362

    Multi-authority attribute-based encryption access control model for cloud storage by Zhi-tao GUAN, Ting-ting YANG, Ru-zhi XU, Zhu-xiao WANG

    Published 2015-06-01
    “…The existing attribute-based encryption access control studies are mostly based on single authority,and this scheme is apt to be under attack to cause exposure of secret keys.Thus,a multi-authority access control model PRM-CSAC is proposed.Based on CP-ABE method,a multi-authority attribute-based encryption scheme is designed to improve security level.Minimized attribute grouping algorithm is designed to distribute keys to users according to needs,which can reduce unnecessary attribute key distribution and decrease the amount of re-encryption attributes.The read and write attribute are added to strengthen the control of owners.The analysis shows that the proposed scheme can meet the security requirement of access control in cloud,and it also has less response time and system cost.…”
    Get full text
    Article
  3. 11363

    Erasure channel modelling–based secure bit allocation schemes for multipath routing in wireless sensor networks by Zhenhua Yuan, Chen Chen, Ye Jin

    Published 2016-12-01
    “…Simulation results are presented to illustrate the proposed algorithms.…”
    Get full text
    Article
  4. 11364

    Information extraction from massive Web pages based on node property and text content by Hai-yan WANG, Pan CAO

    Published 2016-10-01
    “…To address the problem of extracting valuable information from massive Web pages in big data environments,a novel information extraction method based on node property and text content for massive Web pages was put forward.Web pages were converted into a document object model (DOM) tree,and a pruning and fusion algorithm was introduced to simplify the DOM tree.For each node in the DOM tree,both density property and vision property was defined and Web pages were pretreated based on these property values.A MapReduce framework was employed to realize parallel information extraction from massive Web pages.Simulation and experimental results demonstrate that the proposed extraction method can not only achieve better performance but also have higher scalability compared with other methods.…”
    Get full text
    Article
  5. 11365

    Multidimensional detection and dynamic defense method for link flooding attack by Yang WANG, Guangming TANG, Cheng LEI, Dong HAN

    Published 2019-08-01
    “…Aiming at the shortcomings of the existing link flooding attack defense methods,a multi-dimensional index detection algorithm is proposed,which performs multi-dimensional detection on the abnormal forwarding links through the five-dimensional elements of connection length,low-speed ratio of data packets,uniformity of data packet distance,average low-speed ratio of data packets,and change rate of low-speed ratio of data packets,thus effectively solving the problem of high false alarm rate of the existing detection methods.Furthermore,a controller switch dynamic deployment method based on coloring theory is proposed,which solves the problem of difficult to be actually deployed in the actual environment with limited switch variant types existing in the existing defense mitigation mechanisms.Experimental analysis show the feasibility of the proposed method.…”
    Get full text
    Article
  6. 11366

    Analysis of Distributed Wireless Sensor Systems with a Switched Quantizer by Hui Sun, Xianyu Wang, Kaixin Yang, Tongrui Peng

    Published 2021-01-01
    “…The proposed estimator based on switched quantitative event-triggered Kalman consensus filtering (KCF) algorithm is used to monitor the aircraft cabin environmental parameters when suffering packet loss and path loss issues during the communication process for WSN. …”
    Get full text
    Article
  7. 11367

    Person re-identification using mid-level features with vertical global appearance constraint by Yadong WANG, Rong ZHANG, Huihui JIANG, Lijun GUO

    Published 2017-04-01
    “…Mid-level features with the semantic information can provide stronger discrimination in the person re-identification than low-level features.But like the low-level features,the mid-level features also use local feature matching methods and easily leads mismatch problem when different pedestrians have similar appearance features in some local areas.Considering the same pedestrians are more similar than different pedestrians in the vertical direction since pedestrians are almost always in a standing position,global vertical appearance constraints was introduced.Furtherly,a method for person re-identification was proposed which fuses the low-level densely patch-matching and the mid-level features with the global vertical appearance constraints.Experimental results show that the proposed algorithm can achieve a higher hit rate than the existing methods on the most challenging public VIPeR database and CUHK01 database.…”
    Get full text
    Article
  8. 11368

    ROTOR FAULT FEATURE EXTRACTION METHOD USING MVMD AND IEDPE (MT) by WU YaoChun, GUO XiaoBo, DU ShaoHua, JU Hai, ZHAO Yan, WU Jie, JIA XiaoFeng

    Published 2023-01-01
    “…The parameters of the variational mode decomposition(VMD) decomposition layer are determined using correlation threshold strategy and the MVMD algorithm is designed. Then, the acquired vibration signals are input into the MVMD for decomposition and the instantaneous energy distribution of each mode component is calculated. …”
    Get full text
    Article
  9. 11369

    A flexible continuous-wave quantum cryptography scheme with zero-trust security for Internet of Things by Yong Shen, Xiaokang Tang, Xiang Zhang, Yongzhuang Zhou, Hongxin Zou

    Published 2022-11-01
    “…As quantum computing techniques develop rapidly, the security of classical communication, which is usually based on public key encryption algorithm, is under great threat. Therefore, a key establishment method with physics base is demanding, especially for Internet of Things devices, where energy and computational power is quite limited. …”
    Get full text
    Article
  10. 11370

    Container intrusion detection method based on host system call frequency by Yimu JI, Weidong YANG, Kui LI, Shangdong LIU, Qiang LIU, Sisi SHAO, Shuai YOU, Naijiao HUANG

    Published 2021-08-01
    “…Container technology has become a widely used virtualization technology in cloud platform due to its lightweight virtualization characteristics.However, it shares the kernel with the host, so it has poor security and isolation, and is vulnerable to flood, denial of service, and escape attacks.In order to effectively detect whether the container is attacked or not, an intrusion detection method based on host system call frequency was proposed.This method took advantage of the different frequency of system call between different attack behaviors, collected the system call generated when the container was running, extracted the system call features by combining the sliding window and TF-IDF algorithm, and classified by comparing the feature similarity.The experimental results show that the detection rate of this method can reach 97%, and the false alarm rate is less than 4%.…”
    Get full text
    Article
  11. 11371

    Stability Analysis and Design of Time-Varying Nonlinear Systems Based on Impulsive Fuzzy Model by Yuangan Wang, Honglin Yu, Xiaohong Zhang, Dong Li

    Published 2012-01-01
    “…Several criteria on general stability, asymptotic stability, and exponential stability are established, and a simple design algorithm is provided with stability of nonlinear time-invariant systems. …”
    Get full text
    Article
  12. 11372

    Researches on mobile IP position management based on multicast network collaboration by XUE Jian-sheng1, WAN Lin-yi1, WANG Guang-xing2

    Published 2007-01-01
    “…A method of mobile IP position management which uses group managing function in multicast was proposed.Mobile agent(MA) was set in each autonomous network to form a VPN that manage the position binding information of mobile nodes.By putting nodes together for communicating with mobile host to make a multicast tree,the position bind-ing information of mobile nodes was maintained through the collaborative work of each node in network.The storage structure of binding information table and the algorithm on how to manage mobile position binding information were de-signed.Simulation shown that the method proposed can make correspondent nodes understand mobile node’s care-of ad-dress(CoA) in real-time,decrease registration time and times,decrease transmission delay,for supporting real-time ser-vice wonderfully.At the same time,the loads of home agent and hosts are alleviated.The performance of mobile IP is op-timized.…”
    Get full text
    Article
  13. 11373

    Optimization of operational plans based on BWM-QFD method by YIN Xing, PENG Shaohui, FANG Bing

    Published 2025-02-01
    “…Secondly, this method uses BWM to calculate the weight of plan satisfaction requirement, builds the optimization framework of operational plans, and proposes the evaluation algorithm of plan satisfaction requirement. At last, through the case of optimization of operational plans, the effectiveness and the implementability of this method is numerically verified.…”
    Get full text
    Article
  14. 11374

    Generalized Mixed Equilibrium Problems and Fixed Point Problem for a Countable Family of Total Quasi-ϕ-Asymptotically Nonexpansive Mappings in Banach Spaces by Jinhua Zhu, Shih-Sen Chang, Min Liu

    Published 2012-01-01
    “…The purpose of this paper is first to introduce the concept of total quasi-ϕ-asymptotically nonexpansive mapping which contains many kinds of mappings as its special cases and then to use a hybrid algorithm to introduce a new iterative scheme for finding a common element of the set of solutions for a system of generalized mixed equilibrium problems and the set of common fixed points for a countable family of total quasi-ϕ-asymptotically nonexpansive mappings. …”
    Get full text
    Article
  15. 11375

    Single image defogging based on fusion strategy by OFan GU, Jin TANG, Zi-xing CAI

    Published 2014-07-01
    “…To effectively enhance the degraded foggy image, a single image defogging algorithm based on fusion strategy was proposed. The strategy does not require the atmospheric scattering model or scene structure, only needs the original degraded image to derive the inputs and weight maps. …”
    Get full text
    Article
  16. 11376

    Communication between nodes in backscatter-assisted wireless powered communication network by Jie TAO, Haijiang GE, Minyuan WU, Qike SHAO, Kaikai CHI

    Published 2021-06-01
    “…At present, there is almost no design on information transmission between the nodes in wireless powered communication network.The high-throughput information transmission between the nodes in backscatter assisted wireless powered communication network was studied.A scheme was proposed which consisted of backscattering/energy transmission phase and active communication phase.The maximum throughput was modeled as a convex optimization problem.Then, based on the relationship between the total backscatter communication duration and the threshold of node energy capture duration, the problem was decomposed into several sub problems that only need to optimize two backscatter durations.An efficient two-level golden section search algorithm was designed to solve the sub problems, and the optimal solution of the original problem was obtained from the optimal solutions of the sub problems.Simulation results show that, compared with pure active communication scheme and pure backscatter communication scheme, the proposed scheme can effectively improve the throughput.…”
    Get full text
    Article
  17. 11377

    Three-Dimensional Path Planning of Constant Thrust Unmanned Aerial Vehicle Based on Artificial Fluid Method by Yongqiang Qi, Shuai Li, Yi Ke

    Published 2020-01-01
    “…In particular, this paper addresses a novel algorithm of constant thrust fitting which is proposed through the impulse compensation, and then the constant thrust switching control scheme based on the isochronous interpolation method is given. …”
    Get full text
    Article
  18. 11378

    Service priority-aware network traffic scheduling mechanism by Huahui LV, Zhida LIN, Hongcong HUANG

    Published 2017-07-01
    “…In view of the problem that network congestion which caused by the uneven distribution in large traffic data,a priority-aware dynamic network traffic scheduling mechanism was proposed.By using the token bucket algorithm,different buckets of different rates were assigned to different services according to the service priorities.The priorities of the service and the remaining buffer space of the user nodes was taken into account to deal with different services.At the same time,the traffic arrival factor,service factor and node cache were regarded as target to define a network traffic scheduling mechanism performance indicator:packet loss rate.The numerical results show that the proposed mechanism can rationally divide the service priorities in the network,effectively utilize the network resources,prevent the network congestion,enhance the network performance,and provide the users with more stable and reliable network service.…”
    Get full text
    Article
  19. 11379

    Robotic Arm Motion Planning Based on an Improved PRM by You Dazhang, Zhao Hengyi, Song Luwen

    Published 2024-12-01
    “…Sobol sequence sampling method was used to improve the connectivity of probabilistic road map and the success rate of the algorithm. Redundant node pruning and progressive route pruning based on dichotomous interpolation were adopted to make the path more approximate to the optimal solution. …”
    Get full text
    Article
  20. 11380

    Data Aggregation Scbeme Based on Multi-Resolution and Compressive Sensing in Wireless Sensor Network by Jianjun Zhao, Huaiyu Wang, Zeyang Zhao, Shengchang Chen

    Published 2014-09-01
    “…When parent collecting clusters receive random measurements, they use inverse DCT and DCT model based CoSaMP algorithm to recover the original data. The proposed scheme was implemented on a SIDnet-SWANS simulation platform and test different sizes of two-dimensional randomly deployed sensor network. …”
    Get full text
    Article