-
17481
Solving combinatorial optimization problems through stochastic Landau-Lifshitz-Gilbert dynamical systems
Published 2025-02-01“…Our method produces solutions that compare favorably with those obtained using state-of-the-art minimization algorithms (such as simulated annealing) while offering the advantage of being physically realizable by means of arrays of stochastic magnetic tunnel-junction devices.…”
Get full text
Article -
17482
Applying a Probabilistic Network Method to Solve Business-Related Few-Shot Classification Problems
Published 2021-01-01“…It can be challenging to learn algorithms due to the research of business-related few-shot classification problems. …”
Get full text
Article -
17483
Study on the Trajectory Planning Method for High Bearing Capacity of Joint Manipulator
Published 2020-07-01“…The torque peak of the manipulator is suppressed to lowest by using genetic algorithms to optimize the motion parameters of the curve. …”
Get full text
Article -
17484
A lightweight privacy-preserving truth discovery mechanism for IoT
Published 2021-05-01“…In order to solve diverse quality and privacy leakage of perceived data in fog-cloud integrated internet of things (IoT), a streaming encryption-based privacy-preserving truth discovery mechanism for IoT was proposed.Firstly, by utilizing shuffling and streaming encryption algorithms, the ground truths and the weights were anonymously updated on the cloud server and fog server, respectively, so that the collusion attacks between malicious attackers and cloud or fog servers could be resisted to defend against privacy leakage of IoT devices.Secondly, by adopting the Softmax function, the device weights were calculated on fog server, which reduces the error rate for calculating the ground truths.Finally, the theoretical analysis proved that the mechanism could protect privacy of the devices.And, the experimental results demonstrate that the proposed mechanism is an effective privacy-preserving trust discovery mechanism for large-scale IoT devices, which can outperform existing ones in computing efficiency.…”
Get full text
Article -
17485
Modeling and verifying based on timed automata of Internet of things gateway security system
Published 2018-03-01“…The Internet of things (IoT) is a multiple heterogeneous network,and its perception layer is often faced with various security threats.As the bridge between the perception layer and the network layer,the IoT gateway should have the security management function to prevent the security issue from spreading to the upper layer.According to the current security deficiencies in IoT gateway,a universal IoT gateway security system was proposed based on the IoT gateway middleware technology.Various security protocols or algorithms can be embedded in IoT gateway security system,and the modeling and analysis can help the design and implementation of IoT gateway.The formal modeling and verification of the IoT gateway security system was performed by timed automata.The results show that the IoT gateway security system satisfies the security properties of confidentiality,availability,authenticity,robustness,integrity and freshness.…”
Get full text
Article -
17486
Research on Architecture of LEO Satellite Internet of Things and Key Technologies
Published 2021-12-01“…First, we analyzed the composition and demand characteristics of LEO satellite IoTs, and designed an architecture of LEO satellite IoTs.Second, to extracted characteristics of electromagnetic environment and channel, we studied electromagnetic environment and channel sensing methods through constructing neural network model.Then, we investigated an active terminal-identifi cation method for detecting active terminals.Finally, considered multiple-input multiple-output as the main approach to improved the capacity of terrestrial mobile communication systems, we explored a pair of algorithms of mining satellite spatial resources for realizing the collision mitigation and capacity improvement of LEO IoT terminals.Simulation results showed that the designed method sofmining spatial-domain resources could mitigated eff ectively signal collisions among IoT terminals, and improved signifi cantly the concurrent accessing number of LEO satellite IoT terminals.…”
Get full text
Article -
17487
Keyword spotting system for broadcast news
Published 2007-01-01“…A two-step keyword spotting strategy was presented.This strategy allowed to change keyword list conven-iently.Different from the previous systems,search space was generated based on all Chinese syllables,not specifically for keywords.Phoneme recognition was performed without any lexical constraints.With 1-best phoneme sequence and keyword list,which generated keyword hypotheses.At last,two confidence measures were introduced adopted in the sys-tem: one based on acoustic model and the other based on phoneme lattice.For a decoded speech frame aligned to an HMM state,the acoustic confidence was calculated.The lattice confidence made use of phoneme lattices generated by a phoneme recognizer.These two confidence measures were combined using a weighting factor to obtain a hybrid confi-dence as they had different dynamic scales.Experiments show that the proposed algorithms significantly improve the system performance on the broadcast news task.…”
Get full text
Article -
17488
COMPRESSION OF HIGH DYNAMIC RANGE OF SAR IMAGES
Published 2018-06-01“…Objectives of study were comparison of known approaches to compression of the high dynamic range images; selection of optimal parameters for compression algorithms, and selection of a no-reference measure for image quality assessment after compression. …”
Get full text
Article -
17489
GAN-based channel estimation for massive MIMO system
Published 2021-06-01“…As a key technology of 5G, massive MIMO system can significantly improve spectrum efficiency and energy efficiency by equipping a large number of antennas in base stations.However, in massive MIMO system, accurate channel estimation faces severe challenges.In order to estimate the channel accurately when the pilot sequence length is smaller than the number of transmitting antennas and the channel noise is strong, the estimation method N2N-GAN was proposed.N2N-GAN firstly denoised the pilot channel at the receiving end, and then used the conditional generative adversarial network to estimate the channel matrix according to the denoised pilot signal.Simulation experiments show that N2N-GAN achieves better robustness against noise compared with traditional channel estimation algorithms and deep learning-based methods.Meanwhile, it can adapt to scenarios with fewer pilot symbols and more antennas.…”
Get full text
Article -
17490
Real-Time Multichannel Imaging Framework for Endoscopy, Catheters, and Fixed Geometry Intraoperative Systems
Published 2007-05-01“…The capabilities include acquisition and visualization algorithms that perform registration, segmentation, and histogram-based autoexposure of two imaging channels (full-spectrum white light and near-infrared fluorescence), all in real time. …”
Get full text
Article -
17491
THE USE OF ARTIFICIAL INTELLIGENCE IN FINANCIAL ADVISORY
Published 2024-12-01“…However, respondents also expressed concerns regarding data security, the need for more reliability, and the transparency of AI algorithms, which could limit the broader adoption of these technologies. …”
Article -
17492
Understanding the Person through Narrative
Published 2011-01-01“…A narrative approach stands in contrast to a yes/no algorithmic process in conversing with clients. Eliciting stories illustrates the social context of events, and implicitly provides answers to questions of feeling and meaning. …”
Get full text
Article -
17493
Modified α-Parameterized Differential Transform Method for Solving Nonlinear Generalized Gardner Equation
Published 2023-01-01“…The proposed method is applied to solve the generalized Gardner equation by utilizing genetic algorithms to obtain optimal parameter values. Our proposed approach extends the general differential transformation method, allowing for the use of various values for the coefficient α. …”
Get full text
Article -
17494
Challenges and innovative solutions of space-ground integrated network security
Published 2024-06-01“…By leveraging the unconditional security of quantum communication and the advantages of post-quantum cryptographic algorithms, end-to-end secure communication protection for the space-ground integrated network was provided. …”
Get full text
Article -
17495
The Dynamical Behavior of a Rigid Body Relative Equilibrium Position
Published 2017-01-01“…The numerical solutions are investigated using the fourth-order Runge-Kutta algorithms through Matlab packages. These solutions are represented graphically in order to describe and discuss the behavior of the body at any instant for different values of the physical parameters of the body. …”
Get full text
Article -
17496
Effect of Energy Tax Reduction on Fuel Prices
Published 2022-09-01“…For a detailed analysis the German antitrust authority should look into the pricing algorithms of all 14,000 filling stations in Germany.…”
Get full text
Article -
17497
Existence of Solution and Self-Exciting Attractor in the Fractional-Order Gyrostat Dynamical System
Published 2022-01-01“…Moreover, this iterative scheme is injected into algorithms for a system of integer order dynamical systems to observe Lyapunov exponents and a bifurcation diagram for our proposed fractional-order dynamical model. …”
Get full text
Article -
17498
Platform work and labour legislation in India: Women’s engagement and the role of gender
Published 2024-12-01“…We find that most workers face issues such as algorithmic control, insufficient technical support, feedback mechanism, safety protocols, and cost concerns. …”
Get full text
Article -
17499
Challenges and opportunities for agricultural development in West Africa
Published 2023-01-01“…The task is to find, identify, develop and implement the most effective methods and algorithms for realising the above aim, and the challenges and obstacles along the way. …”
Get full text
Article -
17500
Exploring Artificial Intelligence for Enhanced Endodontic Practice: Applications, Challenges, and Future Directions
Published 2024-01-01“…However, challenges such as data privacy issues, algorithmic biases, and integration barriers must be addressed to enable broader adoption. …”
Get full text
Article