-
1761
Two-hop cover-based access control scheme for wireless sensor networks
Published 2010-01-01“…In order to support randomly moving users,a THC(two-hop cover) algorithm and a two-hop cover-based ac-cess control scheme were proposed.The proposed algorithm made two-hop nodes be able to retrieve access control in-formation of user’s in time through diffusing the information periodically.The scheme based on THC algorithm,the se-curity mechanisms of Merkle hash tree and one way chain,as well as distributed access control mode,its main contribu-tion was it supports randomly moving users for the first time.The analyses and experiments have shown that the pro-posed scheme can be applied to both mobile and stationary user and have several advantages over the current access con-trol methods of low cost in computation,communication and storage,and resistance to node capture,query replay and DoS attacks.…”
Get full text
Article -
1762
Detection of Sentence Boundaries in Polish Based on Acoustic Cues
Published 2016-01-01“…In this article the authors investigated and presented the experiments on the sentence boundaries annotation from Polish speech using acoustic cues as a source of information. The main result of the investigation is an algorithm for detection of the syntactic boundaries appearing in the places of punctuation marks. …”
Get full text
Article -
1763
Generative Target Tracking Method with Improved Generative Adversarial Network
Published 2023-01-01“…In this paper, we proposed a target tracking algorithm based on the conditional adversarial generative twin networks, using the improved you only look once multitarget association algorithm to classify and detect the position of the target to be detected in the current frame, constructing a feature extraction model using generative adversarial networks (GANs) to learn the main features and subtle features of the target, and then using GANs to generate the motion trajectories of multiple targets, finally fuzing the motion and appearance information of the target to obtain the optimal match. …”
Get full text
Article -
1764
Singular wavelets on a finite interval
Published 2018-12-01“…The method includes a numerical algorithm based on the summation of a recurrent sequence of functions. …”
Get full text
Article -
1765
State regulation of the market of collective investments
Published 2020-01-01“…The essence, algorithm, main goals and tasks of state regulation of the market of collective investments in the Russian Federation at the present stage are specified. …”
Get full text
Article -
1766
Security-Constrained Multi-Stage Robust Dynamic Economic Dispatch with Bulk Storage
Published 2025-02-01“…Compared to the traditional SDDP algorithm and RDDP algorithm, the proposed RA-RDDP algorithm uses the inner relaxed approximation and outer approximation methods to approximate the upper and lower bounds of the future cost-to-go function, which overcomes the convergence issue of the traditional SDDP algorithm and solution efficiency of the RDDP algorithm. …”
Get full text
Article -
1767
Retracted: Study on Modeling Method of Forest Tree Image Recognition Based on CCD and Theodolite
Published 2020-01-01“…The image processing algorithm is designed for the image processing module, and the flow chart of the image processing algorithm is given. …”
Get full text
Article -
1768
Parameter identification of unmanned surface vehicle MMG model based on an improved extended Kalman filter
Published 2025-02-01“…ObjectivesTo construct an accurate MMG (mathematical model group) model for a water-jet propulsion unmanned surface vehicle, the traditional extended Kalman filter algorithm and improved extended Kalman filter algorithm are combined with the real-world boat data for parameter identification. …”
Get full text
Article -
1769
Analysis of complications after living-related kidney transplantation: a single-center experience
Published 2021-03-01“…The original authors' algorithm developed for the diagnosis and treatment of complications after kidney transplantation covers all postoperative complications that lead to renal transplant dysfunction. …”
Get full text
Article -
1770
-
1771
Correlation of Tracks from Different Radars in Information Processing by Attraction Method
Published 2019-06-01“…One of the main problems in the processing of tracks from different radars is the correct correlation of tracks (especially groups of tracks). …”
Get full text
Article -
1772
Numerical Simulation of Wind-Induced Vibration Response Characteristics of High-Rise Buildings with Podiums
Published 2025-04-01“…This article proposes a process algorithm based on the AR (autoregression) method to solve the time history of fluctuating wind speed and determine fluctuating wind load. …”
Get full text
Article -
1773
Rolling Force Prediction of Hot Rolling Based on GA-MELM
Published 2019-01-01“…In the hot continuous rolling process, the main factor affecting the actual thickness of strip is the rolling force. …”
Get full text
Article -
1774
Parallel Tracking and Mapping for Controlling VTOL Airframe
Published 2011-01-01“…Proposed modifications provide the position measurements necessary for the navigation solution on a UAV. The main contributions of this work include: (1) extension of the map building algorithm to enable it to be used realistically while controlling a UAV and simultaneously building the map; (2) improved performance of the SLAM algorithm for lower camera frame rates; and (3) the first known demonstration of a monocular SLAM algorithm successfully controlling a UAV while simultaneously building the map. …”
Get full text
Article -
1775
Method for Changepoint Detection With Sample Size Accumulation During Radio Equipment Operation
Published 2020-01-01“…The main element for monitoring is technical condition of radio equipment. …”
Get full text
Article -
1776
A Novel Method for Target Navigation and Mapping Based on Laser Ranging and MEMS/GPS Navigation
Published 2014-01-01“…The detailed error analysis shows that attitude error of MEMS/GPS is the main error source which dominated the accuracy of the algorithm. …”
Get full text
Article -
1777
ECCT: An Efficient-Cooperative ADHOC MAC for Cluster-Based TDMA System in VANETs
Published 2015-08-01“…In addition, they also increase spatial reuse in VANETs and efficient control for the network topology. The main concern in the clustering algorithm is the cluster stability. …”
Get full text
Article -
1778
-
1779
On the study of one way to detect anomalous program execution
Published 2024-06-01“…The paper examines an algorithm for detecting the execution of malicious code in the process of a protected program. …”
Get full text
Article -
1780
ASSESSMENT AND ANALYSIS OF DIGITAL TRANSFORMATION OF REGIONAL ECONOMIC SYSTEMS OF THE RUSSIAN FEDERATION: METHODOLOGICAL APPROACHES AND THEIR APPROBATION
Published 2020-02-01“…A distinctive aspect of the proposed algorithm is the orientation of the developed tools to study the five main directions of digitalization, defined by the Order of the Government of the Russian Federation of July 28, 2017 (No. 1632-r): regulatory regulation, personnel for the digital economy, formation of research competencies and technological foundations, information infrastructure, information security. …”
Get full text
Article