-
11861
Continuous User Verification in Cloud Storage Services using Deep Learning
Published 2025-01-01“…The best experimental result achieved an EER of 3.6% based on applying a deep learning algorithm (CNN). This result indicates and encourages the feasibility of using behavioral profiling to protect cloud users from misuse. …”
Get full text
Article -
11862
A Jacobi Collocation Method for Solving Nonlinear Burgers-Type Equations
Published 2013-01-01“…Also the results demonstrate that the proposed method is a powerful algorithm to solve the nonlinear partial differential equations.…”
Get full text
Article -
11863
Evidence-Based Multidisciplinary Design Optimization with the Active Global Kriging Model
Published 2019-01-01“…The numerical results show that the proposed algorithm is effective and valuable, which is valuable in engineering application.…”
Get full text
Article -
11864
A Traction Control Strategy with an Efficiency Model in a Distributed Driving Electric Vehicle
Published 2014-01-01“…In emergency situation, a sliding mode control algorithm was employed to achieve antislip control through keeping the wheels’ slip ratios below 20%. …”
Get full text
Article -
11865
SENSITIVITY ANALYSIS ON STRESS OF FLEXIBLE HINGES TO DESIGN PARAMETERS BASED ON TAGUCHI METHOD
Published 2016-01-01“…This method does not depend on optimization algorithm,can be employed for sensitivity analysis of discrete,non-differential or implicit-expression structures,and provides favorable reference to the robust design of the flexible hinges by improving its fatigue life.…”
Get full text
Article -
11866
A novel chaotic system with one absolute term: stability, ultimate boundedness, and image encryption
Published 2025-01-01“…The system is combined with the 4×4 Toeplitz matrix to generate an encryption algorithm, validated using security and performance analysis. …”
Get full text
Article -
11867
A New Type-2 Soft Set: Type-2 Soft Graphs and Their Applications
Published 2017-01-01“…Finally, we describe an application of type-2 soft graphs in communication networks and present procedure as an algorithm.…”
Get full text
Article -
11868
SBT Approach towards Analog Electronic Circuit Fault Diagnosis
Published 2007-01-01“…A comparison of the proposed work with the previous works which also employ preprocessing techniques, reveals that our algorithm performs significantly better in fault diagnosis of analog circuits due to our proposed preprocessing techniques.…”
Get full text
Article -
11869
Federated edge learning with reconfigurable intelligent surface and its application in Internet of vehicles
Published 2023-10-01“…Aiming at the problem that it is difficult to achieve an optimal trade-off between wireless communication and model accuracy in FEEL training caused by the heterogeneity of wireless links and data distribution, a reconfigurable intelligent surface (RIS) enabled federated edge learning system was proposed, which exploited the channel reconfigurability of RIS to adaptively manipulate the signal propagation environment, and utilized the over-the-air computation (Aircomp) to achieve fast model aggregation.Specifically, the convergence behavior of the FEEL algorithm under the influence of wireless channels and data heterogeneity was rigorously derived, and accordingly, an unified wireless resources optimization problem was constructed with the goal of minimizing the learning loss by jointly designing the transceiver design and the RIS phase shift.Simulation results demonstrate that the proposed scheme achieves substantial performance improvement compared against several baselines, and prove that RIS can play an important role in improving the accuracy of Aircomp enabled FEEL systems under data heterogeneity.Finally, the probability of applying it into Internet of vehicles is discussed.…”
Get full text
Article -
11870
HEVC information hiding approach based on intra prediction modes modulation
Published 2016-09-01“…For further improving the embedding efficiency in the processing of HEVC information hiding,a method for HEVC information hiding based on intra prediction models modulation was proposed.The space lattice dimen-sion N(N = 2,3,4)of each CTU was generated according to the key.The selection rule of intra prediction mode was utilized to select N modes which were located at vertex angle.The N modes were mapped to the value F through the space lattice mapping algorithm.Then N bits secret information were read from the bit file and converted to a deci-mal number D.In this way,N secret information bits were embedded in N intra prediction modes by modifying at most one mode.The experimental results approve that the proposed method has high embedding efficiency,small rate increase and minimal influence on the video quality and the anti-steganalysis experiment confirms that the pro-posed method has high concealment.…”
Get full text
Article -
11871
A Multi-Robot Collaborative Exploration Method Based on Deep Reinforcement Learning and Knowledge Distillation
Published 2025-01-01“…To this end, we propose to view the robot team as an agent and obtain a policy network that can be centrally executed by training with an improved SAC deep reinforcement learning algorithm. In addition, we transform the obtained policy network into distributed networks that can be adapted to communication-constrained scenarios using knowledge distillation. …”
Get full text
Article -
11872
Multi-camera video collaborative analysis method based on edge computing
Published 2023-08-01“…In order to reduce the processing volume of multi-camera real-time video data in smart city scenarios, a video collaborative analysis method based on machine learning algorithms at the edge was proposed.Firstly, for the important objects detected by each camera, different key windows were designed to filter the region of interest (RoI) in the video, reduce the video data volume and extract its features.Then, based on the extracted data features, the same objects in the videos from different cameras were annotated, and a strategy for calculating the association degree value between cameras was designed for further reducing the video data volume.Finally, the GC-ReID algorithm based on graph convolutional network (GCN) and re-identification (ReID) was proposed, aiming at achieving the collaborative analysis of multi-camera videos.The experimental results show that proposed method can effectively reduce the system latency and improve the video compression rate while ensuring the high accuracy, compared with the existing video analysis methods.…”
Get full text
Article -
11873
Cultivation of Innovative Ability of College Physical Education Students Based on the Internet of Things Multimedia Environment
Published 2022-01-01“…In this paper, a terminal collaborative indoor positioning algorithm based on RSSI fingerprint optimization was proposed to study the innovation ability of physical education students in colleges and universities. …”
Get full text
Article -
11874
Low-power transmission method for uplink millimeter-wave massive MIMO-NOMA system based on GSIC
Published 2023-01-01“…The combination of non-orthogonal multiple access (NOMA) and millimeter-wave (mmWave) massive multiple-input multiple-output (MIMO) can meet the requirements for huge throughput and massive connectivity in future wireless communication network.The total system power minimization for uplink mmWave massive MIMO-NOMA was studied, and a novel framework for a hybrid beamforming mmWave massive MIMO-NOMA uplink transmission system was proposed based on group-level successive interference cancellation (GSIC).Specifically, users were grouped according to channel gain, intergroup users being served by NOMA and intra group users being served by space division multiple access.By designing analog beamforming matrices for different groups and performing joint optimization for digital beamforming and power control, a parallel iterative algorithm was proposed to solve the optimization problem.Simulation results show that the proposed method outperforms the conventional mmWave massive MIMO-NOMA based on clustering and user-level SIC in terms of total power consumption.…”
Get full text
Article -
11875
Using wavelet denoising and mathematical morphology in the segmentation technique applied to blood cells images
Published 2012-12-01“…Finally, theproposed algorithm made in MatLab environment is verified for a selected blood cells.…”
Get full text
Article -
11876
Characterization and Evaluation of Rotation Accuracy of Hydrostatic Spindle under the Influence of Unbalance
Published 2020-01-01“…Finally, the least squares evaluation algorithm is used to evaluate the rotation error of the hydrostatic spindle, and a method for evaluating the rotation accuracy of the hydrostatic spindle with high calculation accuracy and calculation efficiency is proposed.…”
Get full text
Article -
11877
Service clustering method based on description context feature words and improved GSDMM model
Published 2021-08-01“…To address the problem that current service clustering methods usually faced low quality of service representation vectors, a service clustering method based on description context feature words and improved GSDMM model was proposed.Firstly, a feature word extraction method based on context weight was constructed.The words that fit well with the context of service description were extracted as the set of feature words for each service.Then, an improved GSDMM model with topic distribution probability correction factor was established to generate service representation vectors and achieve distribution probability correction for non-critical topic items.Finally, K-means++ algorithm was employed to cluster Web services based on these service representation vectors.Experiments were conducted on real Web services in Web site of Programmable Web.Experiment results show that the quality of service representation vectors generated by the proposed method is higher than of other topic models.Further, the performance of our clustering method is significantly better than other service clustering methods.…”
Get full text
Article -
11878
Multiobjective-Optimized Design of a New UWB Antenna for UWB Applications
Published 2013-01-01“…A multiobjective genetic algorithm has been applied to design a new printed, bow-tie antenna for ultrawideband applications, that is, ground penetrating radar, short range and high data rate communications, and so forth. …”
Get full text
Article -
11879
Towards load adaptive routing based on link critical degree for delay-sensitive traffic in IP networks
Published 2015-03-01“…A load adaptive routing algorithm (LARA) was presented which could avoid the link to be congested to reduce the end-to-end delay. …”
Get full text
Article -
11880
Dynamic switching based real-time routing in low-duty-cycle wireless sensor networks
Published 2015-10-01“…The dynamic switching based real-time(DSRT)routing protocol was proposed to handle the arbitrary end-to-end(E2E)real-time communication in the low-duty-cycle wireless sensor networks.Firstly,the concept of available speed was designed to compensate for the big sleep latency and facilitate discovering the routes with less latency based on two-hop neighbors’ information(at lease about 20% routing path with less latency was discovered by DRST in the experiments).Moreover,it was noticed that the congestion extent in the low-duty-cycle network was determined not only by the number of packets in the network output queue,but also the destination of the packets.However,the traditional method with one-hop neighbors’ information cannot differentiate this kind of congestion.Therefore,combined with the dynamic switching mechanism,the DSRT proposed a congestion avoiding algorithm by classifying the packets in the queue.Through comprehensive experiments,the efficiency of routing discovering and congestion avoiding of the DSRT protocol is demonstrated,and the E2E delay is decreased by at least 200% when the traffic was high.…”
Get full text
Article