-
17301
Measuring Chern–Simons level k by braiding $$SU(2)_k$$ S U ( 2 ) k anyons
Published 2025-01-01“…However, most discussed are the questions of using materials with known parameters and building corresponding quantum gates and algorithms. In this paper we discuss opposite problem of finding Chern–Simons level k in the unknown material. …”
Get full text
Article -
17302
POI recommendation by incorporating trust-distrust relationship in LBSN
Published 2018-07-01“…POI (point of interest) recommendation is an important personalized service in the LBSN (location-based social network) which has wide applications such as popular sights recommendation and travel routes planning.Most existing collaborative filter algorithms make recommendation according to user similarity and location similarity,they don’t consider the trust relationship between users.And trust relationship is helpful to improve recommendation accuracy,robustness and user satisfaction.Firstly,the propagation property of trust and distrust relationship was analyzed.Then,the measurement and computation method of trust were given.Finally,a hybrid recommendation system which combined user similarity,geographical location similarity and trust relationship was proposed.The experiments results show that the hybrid recommendation is obviously superior to the traditional collaborative filtering in terms of results accuracy and user satisfaction.…”
Get full text
Article -
17303
Delay-Range-Dependent Stability Criteria for Takagi-Sugeno Fuzzy Systems with Fast Time-Varying Delays
Published 2012-01-01“…By developing delay decomposition approach, integral inequalities approach (IIA), and Leibniz-Newton formula, the information of the delayed plant states can be taken into full consideration, and new delay-dependent sufficient stability criteria are obtained in terms of linear matrix inequalities (LMIs) which can be easily solved by various optimization algorithms. Simulation examples show resulting criteria outperform all existing ones in the literature. …”
Get full text
Article -
17304
Internal risk assessment of development and implementation of the state programs
Published 2022-09-01“…The software implementation of the algorithms for the formation and evaluation of the program plan was carried out in the form of software developed by the author in the Python.…”
Get full text
Article -
17305
Clause complexing in research-article abstracts: Comparing human- and AI-generated texts
Published 2023-12-01“…Incorporating distinct grammatical features in the algorithms of AI-detection tools is crucially needed to enhance the reliability of their results. …”
Get full text
Article -
17306
TOC: Lightweight Event Tracing Using Online Compression for Networked Embedded Systems
Published 2015-11-01“…Existing tracing approaches employ compression algorithms to reduce the trace size. However, these approaches either are inapplicable or perform poorly. …”
Get full text
Article -
17307
Android malware detection method based on deep neural network
Published 2020-10-01“…Android is increasingly facing the threat of malware attacks.It is difficult to effectively detect large-sample and multi-class malware for traditional machine learning methods such as support vector machine,method for Android malware detection and family classification based on deep neural network was proposed.Based on the comprehensive extraction of application components,Intent Filter,permissions,and data flow,the method performed an effective feature selection to reduce dimensions,and conducted a large-sample detection and multi-class classification for malware based on deep neural network.The experimental results show that the method can conduct an effective detection and classification.The accuracy of binary classification between benign and malicious Apps is 97.73%,and the accuracy of family multi-class classification can reach 93.54%,which is higher than other machine learning algorithms.…”
Get full text
Article -
17308
Method of anti-confusion texture feature descriptor for malware images
Published 2018-11-01“…It is a new method that uses image processing and machine learning algorithms to classify malware samples in malware visualization field.The texture feature description method has great influence on the result.To solve this problem,a new method was presented that joints global feature of GIST with local features of LBP or dense SIFT in order to construct combinative descriptors of malware gray-scale images.Using those descriptors,the malware classification performance was greatly improved in contrast to traditional method,especially for those samples have higher similarity in the different families,or those have lower similarity in the same family.A lot of experiments show that new method is much more effective and general than traditional method.On the confusing dataset,the accuracy rate of classification has been greatly improved.…”
Get full text
Article -
17309
Social Media Use and Attitudes toward AI: The Mediating Roles of Perceived AI Fairness and Threat
Published 2024-01-01“…A nationally representative two-wave longitudinal survey (N=5110) examined the mediating roles of perceived AI fairness and threat concerning three AI technologies: algorithms, facial recognition technology, and driverless passenger vehicles. …”
Get full text
Article -
17310
Research and design of hybrid scheduling system of node operating system for cyber physical systems
Published 2013-12-01“…In accordance with the new characteristics of physical,internet and intelligence of CPS,a hybrid scheduling system was designed for CPS node operating system with real-time performance,flexibility,and adaptability.Based on the in-depth study of the intrinsic differences between event-driven scheduling mechanism and multithreaded one,a hybrid programming model was designed that combines collaborative multithread and hybrid stack management using adapter mechanism.A hybrid scheduling model was also designed that supports both event and thread task types.Reasonable real-time algorithms were implemented for verification.Experimental results show that the real-time per-formance of the scheduling system is obviously better than that of TinyOS,thus it is better suited for CPS than TinyOS does.…”
Get full text
Article -
17311
On the Use of Weighted Least Squares for Time Domain Modal Parameter Identification
Published 2004-01-01“…A series of simulated tests demonstrate how the performance of conventional time domain algorithms can be improved significantly with little extra computational effort though the use of a Weighted Least Squares scheme.…”
Get full text
Article -
17312
Ant based approach to the optimal deployment in wireless sensor networks
Published 2009-01-01“…The most attractive ability of Easidesign is that it not only consider the different sink position but also guarantee the wholly connectivity between sink node and deployed sensor nodes. The algorithms key choice and pa-rameters setting to meet different practical requirements for certain applications are also studied through largely simulations. …”
Get full text
Article -
17313
Multi-scale crack closure measurements with digital image correlation on Haynes 230
Published 2015-06-01“…Initially, full field regression algorithms were applied to extract the effective stress intensity factor ranges from the singular displacement field measured at crack tips. …”
Get full text
Article -
17314
SLSB-forest:approximate k nearest neighbors searching on high dimensional data
Published 2017-09-01“…The study of approximate k nearest neighbors query has attracted broad attention.Local sensitive hash is one of the mainstream ways to solve this problem.Local sensitive hash and its varients have noted the following problems:the uneven distribution of hashed data in the buckets,it cannot calculate the appropriate query range (for the parameter k) to build index.To tackle the above problem,a new data struct which called SLSB-forest was presented.The SLSB-forest combined the LSH and the B-tree to maintain the amount of bucket’s data in reasonable range.Two query algorithms were proposed:fast and accurate priority search.Theory and experimental results prove that query range can dynamic change during searching approximate k nearest neighbors.…”
Get full text
Article -
17315
Evaluation of Texture and Shape Features for Classification of Four Paddy Varieties
Published 2014-01-01“…An evaluation of the classification accuracy of texture and shape features and neural network was done to classify four Paddy (rice) grains, namely, Karjat-6(K6), Ratnagiri-2(R2), Ratnagiri-4(R4), and Ratnagiri-24(R24). Algorithms were written to extract the features from the high-resolution images of kernels of four grain types and used as input features for classification. …”
Get full text
Article -
17316
Optical fiber eavesdropping detection method based on machine learning
Published 2020-11-01“…Optical fiber eavesdropping is one of the major hidden dangers of power grid information security,but detection is difficult due to its high concealment.Aiming at the eavesdropping problems faced by communication networks,an optical fiber eavesdropping detection method based on machine learning was proposed.Firstly,seven-dimensions feature vector extraction method was designed based on the influence of eavesdropping on the physical layer of transmission.Then eavesdropping was simulated and experimental feature vectors were collected.Finally,two machine learning algorithms were used for classification detection and model optimization.Experiments show that the performance of the neural network classification is better than the K-nearest neighbor classification,and it can achieve 98.1% eavesdropping recognition rate in 10% splitting ratio eavesdropping.…”
Get full text
Article -
17317
A QoS-based network planning method for power fiber to the home
Published 2019-06-01“…A QoS-based network planning method for power fiber to the home was proposed.Firstly,the distribution structure of different buildings was combined to carry out targeted ODN line path design.Secondly,in the ONU packet cluster planning stage,in order to meet the QoS requirements of multi-service differentiation,the communication cost as the optimization goal was uesd,and the optimization problem model was established with the constraints of access capacity,reliability and delay.At the same time,intelligent algorithms were used to solve the optimization problem model.Finally,the optical path attenuation of the planned network was calculated to meet the actual application needs.The simulation results show that the proposed QoS-based network planning method for power fiber to the home can save network construction cost while ensuring service reliability and delay requirements.…”
Get full text
Article -
17318
Quantum-based wireless sensor networks: A review and open questions
Published 2021-10-01“…Applications of quantum computing are growing at a very fast pace, for example, from quantum computers to quantum algorithms and even to the development of the quantum Internet. …”
Get full text
Article -
17319
Synthesis of Digital Automatic Control System for Non-Transformer Step-Up Converter of Constant Voltage
Published 2008-04-01“…The paper is devoted to investigation of semi-conductor pulse step-up converter of constant voltage which is operating in the boundary-continuous current mode of a choke with digital control. The algorithms that have been developed make it possible to calculate the given value of coke current and sustain its saw-shape form with the help of digital control device. …”
Get full text
Article -
17320
Tail Bounds for ℓ1 Norm of Gaussian Random Matrices with Applications
Published 2022-01-01“…Finally, we study the tail bounds for the parameter vector of some existing regularization algorithms.…”
Get full text
Article