Showing 8,121 - 8,140 results of 10,865 for search '(may OR main) algorithm', query time: 0.20s Refine Results
  1. 8121

    Efficient and safe software defined network topology discovery protocol by Dong LI, Junqing YU, Yongpu GU, Pengcheng ZHAO

    Published 2023-12-01
    “…The network topology discovery in OpenFlow-based software-defined networks is mainly achieved by utilizing the OpenFlow discovery protocol (OFDP).However, it has been observed in existing research that OFDP exhibits low updating efficiency and is susceptible to network topology pollution attacks.To address the efficiency and safety concerns of the network topology discovery protocol, an in-depth investigation was conducted on the mechanism and safety of OFDP network topology discovery.The characteristics of network topology establishment and updating in OFDP were analyzed, and an improved protocol named Im-OFDP (improved OpenFlow discovery protocol) based on the minimum vertex covering problem in graph theory was proposed.In Im-OFDP, the switch port table and network link table were initially established using prior information obtained from OFDP network topology discovery.Subsequently, a graph model of the network topology was constructed, and the minimum vertex covering algorithm in graph theory was employed to select specific switches for the reception and forwarding of topology discovery link layer discovery protocol (LLDP) packets.Multi-level flow tables were designed based on the network topology structure, and these flow entries were installed on the selected switches by the controller to process LLDP packets.To address security issues, dynamic check code verification in LLDP packets was employed to ensure the safety of network links.Additionally, a network equipment information maintenance mechanism was established based on known network topologies to ensure the safety of the network equipment.Experimental results demonstrate a significant reduction in the number of network topology discovery messages, bandwidth overhead, and CPU overhead through the deployment of Im-OFDP.Moreover, the response time for node failures and link recovery time after mode failure is substantially reduced.Im-OFDP also effectively mitigates various network topology pollution attacks, such as link fabrication and switch forgery attacks.Overall, Im-OFDP has the capability to enhance the efficiency and safety of SDN topology discovery.…”
    Get full text
    Article
  2. 8122

    Prospects of integrative and hybrid approaches to assessing undeclared work by Cymbal О. І., Ostafiichuk Ya. V.

    Published 2024-12-01
    “…It is concluded that today there is no generally accepted methodology for studying undeclared work that would allow for a comprehensive and reliable assessment of the wide range of manifestations of this phenomenon. Common methods mainly focus on measuring individual types of it or the overall scale of the informal economy. …”
    Get full text
    Article
  3. 8123

    Integrated energy, environmental, and economic optimization for energy management systems in PHEVs considering traffic conditions by Morteza Montazeri-Gh, Ehsan Alimohammadi

    Published 2025-07-01
    “…To achieve this, a plug-in hybrid electric vehicle is modeled based on the Samand vehicle using experimental data. A genetic algorithm is then employed to perform sizing optimization of the components. …”
    Get full text
    Article
  4. 8124

    Comprehensive analysis of cuproptosis-related genes in immune infiltration and development of a novel diagnostic model for acute kidney injury by Yajing Li, Yingxue Ding

    Published 2024-12-01
    “…Background Acute kidney injury (AKI) represents a diverse range of conditions characterized by high incidence and mortality rates, and it is mainly associated with immune-mediated mechanisms and mitochondrial metabolism dysfunction. …”
    Get full text
    Article
  5. 8125

    Equatorial convection controls boreal summer intraseasonal oscillations in the present and future climates by Aditya Kottapalli, P. N. Vinayachandran

    Published 2025-02-01
    “…The weaker wind and moisture perturbations in the BAPM mainly cause this difference in the horizontal moisture advection between AAPM and BAPM. …”
    Get full text
    Article
  6. 8126

    A Robust Adaptive Strategy for Diesel Particulate Filter Health Monitoring Using Soot Sensor Data by Bilal Youssef

    Published 2025-04-01
    “…The transportation sector mainly relied on fossil fuel and is one of the major causes of climate change and environmental pollution. …”
    Get full text
    Article
  7. 8127

    A Distributed RF Threat Sensing Architecture by Georgios Michalis, Andreas Rousias, Loizos Kanaris, Akis Kokkinis , Pantelis Kanaris , Stavros Stavrou

    Published 2024-11-01
    “…The incorporation of the centralized SOC in the overall architecture allows also the centralized application of machine learning algorithms on all the received data.…”
    Get full text
    Article
  8. 8128

    Analysis of Tire-Pavement Contact Morphology Characteristics during the Virtual Track Train Maneuvering by Chengping Wang, Jimin Zhang, Hechao Zhou

    Published 2022-01-01
    “…Then, the tire-pavement contact model was developed according to the Euler–Lagrange algorithm and validated. Contact area and stress distribution under uniform, braking, and cornering conditions are explored with the dynamic tire force of the virtual track train as the external load. …”
    Get full text
    Article
  9. 8129

    Synchronous Control of a Dual-Motor Driving Rack and Pinion Module for Steer-by-Wire System by Insu Chung, Sehoon Oh, Kanghyun Nam

    Published 2024-01-01
    “…In order to improve these two goals, the existing synchronous control structures mainly designed controllers in the case of command tracking, and synchronization between motors used a compensation method using synchronous error. …”
    Get full text
    Article
  10. 8130

    Edge Artificial Intelligence: Real-Time Noninvasive Technique for Vital Signs of Myocardial Infarction Recognition Using Jetson Nano by H. M. Mohan, S. Anitha, Rifai Chai, Sai Ho Ling

    Published 2021-01-01
    “…The research mainly pivots on two key factors in creating and training a CNN model to detect the vital signs and evaluate its performance metrics. …”
    Get full text
    Article
  11. 8131

    Design and Improvement of Routing Protocol for Field Observation Instrument Networking Based on LEACH Protocol by Jiuyuan Huo, Xingyue Deng, Hamzah Murad Mohammed Al-Neshmi

    Published 2020-01-01
    “…Firstly, the FOI-LEACH was proposed to mainly improve the LEACH protocol in three aspects: (1) the network nodes are heterogeneous and combined with the characteristics of field observation instrument networking. …”
    Get full text
    Article
  12. 8132

    Reversible data hiding scheme based on enhanced image smoothness by Jinghan WANG, Hui ZHU, Helin LI, Hui LI, Xiaopeng YANG

    Published 2022-06-01
    “…With the prosperity of Internet technology and the popularity of social networks, reversible data hiding technology has been widely adopted in concealed information transmission of medical and military fields with its advantages on secret information recovery.Traditional reversible data hiding schemes mainly focus on the enhancement of embedding capacity and the reduction of the distortion rate of stego image, but pay less attention to the understanding of image details with the human eyes.Thus, it is difficult to resist hidden information detection methods.To solve the above challenge, a reversible data hiding algorithm was proposed, which ensured the visual quality of the stego image in the process of data hiding through the image visual smoothness enhancement.Specifically, the original image was divided into reference area and non-reference area.The secret data was embedded through the translation of the difference, which was calculated according to the predicted pixel value and the original pixel value of the non-reference area.To guarantee the visual quality of the image, smoothing mechanism was constructed, in which a Gaussian filter was utilized as a template to filter the predicted value and to add the filter difference into the cover image without loss.The pixel value of the reference region was used as edge information for lossless restoration of the original image.The filtering coefficient in Gaussian function was exploited as the embedded key to ensure the security of secret information.Simulation results regarding a large number of classical image data sets illustrated that the visual smoothness of stego image processed by this scheme was effectively enhanced with lower distortion rate, higher embedding rate, and higher embedding and extraction efficiency.In a typical circumstance, the similarity between the generated stego image and the Gaussian filter image can reach 0.9963.The PSNR and the embedded capacity can be up to 37.346 and 0.3289 BPP, respectively.…”
    Get full text
    Article
  13. 8133

    TEACHING COMPUTATIONAL THINKING IN SAUDI ARABIAN SCHOOLS USING SMARTPHONE APPS by Abdullah Alenezi

    Published 2024-10-01
    “…Computational thinking, encompassing problem-solving, computational logic, and algorithmic thinking, is an essential skill in the modern world. …”
    Get full text
    Article
  14. 8134

    Landslide Segmentation in High-Resolution Remote Sensing Images: The Van–UPerAttnSeg Framework with Multi-Scale Feature Enhancement by Chang Li, Quan Zou, Guoqing Li, Wenyang Yu

    Published 2025-04-01
    “…However, traditional methods of landslide recognition mainly rely on visual interpretation and manual recognition of remote sensing images, which are time-consuming and susceptible to subjective factors, thereby limiting the accuracy and efficiency of recognition. …”
    Get full text
    Article
  15. 8135

    Outlier Traffic Flow Detection and Pattern Analysis Under Unplanned Disruptions: A Low-Rank Robust Decomposition Model by Zhipeng Duan

    Published 2025-01-01
    “…The accelerated proximal gradient solution algorithm is applied to obtain the decomposition results. …”
    Get full text
    Article
  16. 8136

    Signal mining and risk analysis of tisotumab vedotin adverse events based on the FAERS database by JuanJuan Li, Yang Zhao, Xueqin Yang, Juan Zheng, Ting Yuan, Qian Tang, Mei Guo

    Published 2025-08-01
    “…However, its adverse events (AE) are mainly recorded in clinical trials, lacking of real-world data. …”
    Get full text
    Article
  17. 8137

    Two-stage deep reinforcement learning method for agile optical satellite scheduling problem by Zheng Liu, Wei Xiong, Zhuoya Jia, Chi Han

    Published 2024-11-01
    “…A neural network is designed as the observation scheduling network to determine observation actions for the sequenced tasks, which is well trained by the soft actor-critic algorithm. Finally, extensive experiments show that the proposed method, along with the designed mechanisms and strategy, is superior to comparison algorithms in terms of solution quality, generalization performance, and computation efficiency.…”
    Get full text
    Article
  18. 8138

    MIMO-OFDM/OCDM low-complexity equalization under a doubly dispersive channel in wireless sensor networks by Ahmad AA Solyman, Hani Attar, Mohammad R Khosravi, Baki Koyuncu

    Published 2020-06-01
    “…Moreover, the proposed work is applied over multiple-input multiple-output systems rather than the conventional single-antenna orthogonal chirp division multiplexing systems, based on the discrete fractional cosine transform orthogonal chirp division multiplexing system to mitigate the effect of frequency-selective and time-varying channels, using low-complexity equalizers, specifically by ignoring the intercarrier interference coming from faraway subcarriers and using the LSMR iteration algorithm to decrease the equalization complexity, mainly with long orthogonal chirp division multiplexing symbols, such as the TV symbols. …”
    Get full text
    Article
  19. 8139

    Describing Pulmonary Nodules Using 3D Clustering by Amera Al-Funjan, Farid Meziane, Rob Aspin

    Published 2022-10-01
    “…This paper combines algorithms to cluster and define nodule’s features in 3D visualization. …”
    Get full text
    Article
  20. 8140

    Learning Rates for -Regularized Kernel Classifiers by Hongzhi Tong, Di-Rong Chen, Fenghong Yang

    Published 2013-01-01
    “…We consider a family of classification algorithms generated from a regularization kernel scheme associated with -regularizer and convex loss function. …”
    Get full text
    Article