Showing 11,601 - 11,620 results of 18,898 for search '"algorithm"', query time: 0.11s Refine Results
  1. 11601

    Research on P2P security overlay network model by SUN Zhi-xin1, ZHANG Zhen-wei1, GONG Jing2

    Published 2009-01-01
    “…To enhance the security of P2P software and the convenience in the use of trust mechanism, simple vector distance classifications and kademlia algorithm were adopted on the basis of the global trust model. …”
    Get full text
    Article
  2. 11602

    User behavior pattern mining method based on multi-dimension and multi-granularity analysis in telecom networks by Xiaotao CHENG, Lixin JI, Ruiyang HUANG, Hongtao YU, Yizhuo YANG

    Published 2018-10-01
    “…In order to better understand the behavior of users in telecom networks,it takes CDR (call detail record) data of large-scale telecom network as the research object.By using the mixed probability model and feature engineering method,the multi-dimension characteristics of the call time,call frequency and connections are analyzed from the perspective of user groups and individuals.It is further refined from different time granularities such as hour,day,and week to realize effective discovery of call behavior patterns for different user groups.The distribution characteristics of user behavior are modeled by mixed probability model,which solves the problem of describing the distribution characteristics such as user's call time and frequency.Based on the dataset of a regional telecom network,the performance of decision tree,naive Bayes and SVM classification algorithm are compared.It proves the validity and computational feasibility of the proposed method.The differences in communication behavior patterns of different groups are also compared by taking the service numbers like express,flight and bank as examples.…”
    Get full text
    Article
  3. 11603

    Planning approach of survivable fiber-wireless broadband access network by Hongjun TAN, Yamin XIE, Yejun LIU

    Published 2016-05-01
    “…The emerging fiber-wireless(FiWi)broadband access network provides not only the new technological references for flexible broadband access anywhere and anytime,but also the research opportunities for the cost-efficient design of survivable broadband access network.The study of survivable FiWi access network planning was focused on,and an approach of survivable network planning based on wireless-rerouting protection was proposed.When any fiber link cuts,the failed optical network unit(ONU)can transfer its traffic into other normal ONUs.Solving the joint optimization problem of wireless routers placement,backup radios configuration and ONU capacity allocation was put more importance on,aiming to fully protect all traffic with the minimum deployment cost.The method of integer linear programming was employed to obtain the optimal solution for small-scale network planning.The heuristic algorithm was also proposed for the large-scale network planning.Simulation results demonstrate the effectiveness of the proposed approach in reducing network deployment cost.…”
    Get full text
    Article
  4. 11604

    Cooperative game based bandwidth allocation mechanism live migration of multiple virtual machines by Yong CUI, Yu-song LIN, Run-zhi LI, Zong-min WANG

    Published 2016-04-01
    “…Under many scenarios, multiple virtual machines in the same server need to be moved online concurrently.Since live migration algorithm utilizes bandwidth as more as possible to send data, there is a bandwidth competition among the concurrent migration processes, which cannot guarantee the optimal allocation for the bandwidth and finally degrades the overall performance of the parallel live migration. …”
    Get full text
    Article
  5. 11605

    Research on multidimensional dynamic defense strategy for microservice based on deep reinforcement learning by Dacheng ZHOU, Hongchang CHEN, Weizhen HE, Guozhen CHENG, Hongchao HU

    Published 2023-04-01
    “…Aiming at the problem that it is hard for security defense strategies in cloud native to guarantee the quality of service under dynamic requests, a multidimensional dynamic defense strategy for microservice based on deep reinforcement learning, named D2RA strategy, was proposed to provide dynamic configuration schemes that ensure security defense performance and quality of service for microservices under dynamical requests.Firstly, based on the characteristics of multiple replicas and invocation chains of microservices, a microservices state graph was established to depict the maps between requests, system configuration and security performance, quality of service, and resource overhead of microservices.Secondly, the D2RA framework was designed and a dynamic strategy optimization algorithm based on deep Q-network was proposed for microservices to provide fast and optimal system configurations update scheme under dynamic requests.The simulation results show that D2RA effectively allocate resources under dynamic requests, and achieve 19.07% more defense effectiveness and 42.31% higher quality of service as compared to the existing methods.…”
    Get full text
    Article
  6. 11606

    Option Pricing under Two-Factor Stochastic Volatility Jump-Diffusion Model by Guohe Deng

    Published 2020-01-01
    “…We derive a semianalytical formula for European vanilla option and develop a fast and accurate numerical algorithm for the computation of the option prices using the fast Fourier transform (FFT) technique. …”
    Get full text
    Article
  7. 11607

    A MRAC Principle for a Single-Link Electrically Driven Robot with Parameter Uncertainties by Carlos Aguilar-Avelar, Javier Moreno-Valenzuela

    Published 2017-01-01
    “…With the aim of performing experimental comparisons, two control schemes are also revisited theoretically and experimentally: one is an algorithm previously reported in the literature and the other is an adaptive controller derived under the assumption that the electrical dynamics of the actuator are negligible. …”
    Get full text
    Article
  8. 11608

    Research on flood defense mechanism of SDN control layer:detection and mitigation by Qizhao ZHOU, Junqing YU, Dong LI

    Published 2021-11-01
    “…Aiming at the problem of spoofing flood defense in the control layer of SDN, a controller defense mechanism (CDM)was proposed, including a flood detection mechanism based on key features multi-classification and a flood mitigation mechanism based on SAVI.The flood feature analysis module of the control layer was designed for flood detection, and boosting algorithm was used to overlay each feature weak classifier to form an enhanced classifier, which can achieve more accurate classification spoofing flooding attack effect by continuously reducing the residual in the calculation.In CDM, a flood mitigation mechanism based on SAVI was deployed to realize flood mitigation, which performed flood packet path filtering based on binding-verification mode, and updated the flood features of access layer switches with dynamic polling mode to reduce redundant model update load.The experimental results show that the proposed method has the characteristics of low overhead and high precision.CDM effectively increases the security of the control layer, and reduces the time of host classification of spoofing flood attack and the CPU consumption of corresponding controller.…”
    Get full text
    Article
  9. 11609

    Bounded Model Checking of ETL Cooperating with Finite and Looping Automata Connectives by Rui Wang, Wanwei Liu, Tun Li, Xiaoguang Mao, Ji Wang

    Published 2013-01-01
    “…Since such kind of temporal logic involves both finite and looping automata as connectives, all regular properties can be succinctly specified with it. The presented algorithm is integrated into the model checker ENuSMV, and the approach is evaluated via conducting a series of imperial experiments.…”
    Get full text
    Article
  10. 11610

    A Novel Partial Sequence Alignment Tool for Finding Large Deletions by Taner Aruk, Duran Ustek, Olcay Kursun

    Published 2012-01-01
    “…For BinaryPartialAlign, we make use of the Smith-Waterman (SW) algorithm with a binary-search-based approach for alignment with large gaps that we called partial alignment. …”
    Get full text
    Article
  11. 11611

    Gene Coexpression Network Comparison via Persistent Homology by Ali Nabi Duman, Harun Pirim

    Published 2018-01-01
    “…We quantify multiscale topological features of each network using persistent homology and apply a hierarchical clustering algorithm to the distance matrix whose entries are pairwise bottleneck distance between the networks. …”
    Get full text
    Article
  12. 11612

    Light-weighted vehicle detection network based on improved YOLOv3-tiny by Pingshu Ge, Lie Guo, Danni He, Liang Huang

    Published 2022-03-01
    “…Based on YOLOv3-tiny, the feature extraction was realized using light-weighted networks such as DarkNet-19 and ResNet-18 to improve accuracy. The K -means algorithm was used to cluster nine anchor boxes to achieve multi-scale prediction, especially for small targets. …”
    Get full text
    Article
  13. 11613

    Gradient Based Multipath Reliable Transmission Strategy with Fault Tolerance for Wireless Sensor Networks by Hongbing Li, Qingyu Xiong, Weiren Shi, Cheng Zeng, Min Fan

    Published 2014-04-01
    “…Firstly nonuniform clustering topology is established in nonequal clustering probability based on twice K -means algorithm. Then it calculates the comprehensive measurements (CM) of cluster heads by the quality evaluation function and establishes the contour lines. …”
    Get full text
    Article
  14. 11614

    COMMUNITY-ACQUIRED PNEUMONIA COMPLICATED BY SEPSIS CAUSED BY KLEBSIELLA PNEUMONIAE: A CASE REPORT by A.V. Lavrenko

    Published 2017-12-01
    “…Shown the diagnostic algorithm, which is acceptable both in the presence and in the absence of laboratory verification of the disease. …”
    Get full text
    Article
  15. 11615

    Application of artificial neural network in the modeling and optimization of volatile acid from anaerobic digestion of biomass by Noohi Ali

    Published 2024-01-01
    “…Artificial neural networks (ANNs) and Brute Force algorithms (BF) are two of the most common and simplest techniques for modeling non-linear problems and linear search for an element. …”
    Get full text
    Article
  16. 11616

    Effective Method for Analysis of Electrothermally Coupled Fields by Jacek Korytkowski, Stanisław Wincenciak

    Published 1995-01-01
    “…The main idea of the proposed method is the use of an automatic time step selection algorithm to solve heat conduction equations. The influence of the assumed accuracy value on the final result of the nonlinear calculation is discussed. …”
    Get full text
    Article
  17. 11617

    Visual Localization of an Internal Inspection Robot for the Oil-Immersed Transformer by Yingbin Feng, Yahui Kou, Yanju Liu

    Published 2023-01-01
    “…First, in order to solve the problem of blur, distortion, and low contrast of the image obtained by the camera in the deteriorated and discolored transformer oil, an image enhancement algorithm based on multiscale fusion is developed to provide a reliable data source for robot localization. …”
    Get full text
    Article
  18. 11618

    Appropriateness of Liver Biopsy by Thierry Poynard, Vlad Ratziu, Pierre Bedossa

    Published 2000-01-01
    “…Therefore, further evaluation of the appropriateness of liver biopsy in the practical algorithm of such diseases is needed.…”
    Get full text
    Article
  19. 11619

    Research on intrusion detection method of marine meteorological sensor network based on anomalous behaviors by Xin SU, Tian TIAN, Gong Ziyang, Yiqing ZHOU

    Published 2023-07-01
    “…To deal with the abnormal data flow attacks faced by the marine meteorological sensor network (MMSN), analyze the security mechanism, and aim at the complex and huge network structure and the extremely imbalanced data flow in the nodes, the intrusion detection method of marine meteorological sensor network based on anomalous behaviors was studied, and intrusion detection system (IDS) was built.The imbalance of dataset was considered emphatically, and the effective data generation was realized by using depth generation network CVAE-GAN to learn the distribution of minority classes in the dataset.OPTICS-based denoising algorithm was used to remove the noise points in majority classes and clarify the category boundaries.From the data perspective, the imbalance rate of dataset was reduced, the influence of imbalanced dataset on IDS was reduced, and the ability of classifier to identify minority classes of abnormal traffic was improved.The simulation results show that the proposed system can effectively identify all kinds of abnormal traffic, especially minority classes of them, and the imbalanced dataset processing method can significantly improve the detection ability of the classifier.…”
    Get full text
    Article
  20. 11620

    Optimization strategies in NOMA-based vehicle edge computing network by Jianbo DU, Nana XUE, Yan SUN, Jing JIANG, Shulei LI, Guangyue LU

    Published 2021-03-01
    “…Nowadays, vehicular network is confronting the challenges to support ubiquitous connections and vast computation-intensive and delay-sensitive smart service for numerous vehicles.To address these issues, non-orthogonal multiple access (NOMA) and mobile edge computing (MEC) are considered as two promising technologies by letting multiple vehicles to share the same wireless resources, and the powerful edge computing resources were adopted at the edge of vehicular wireless access network respectively.A NOMA-based vehicular edge computing network was studied.Under the condition of guaranteeing task processing delay, the joint optimization problem of task offloading, user clustering, computing resource allocation and transmission power control was proposed to minimize the task processing cost.Since the proposed problem was difficult to solve, it was divided into sub-problems, and a low-complexity and easy-to-implement method was proposed to solve it.The simulation results show that compared with other benchmark algorithms, the proposed algorithm performs well in minimizing costs.…”
    Get full text
    Article