Authentication email has already been sent, please check your email box: and activate it as soon as possible.
You can login to My Profile and manage your email alerts.
If you haven’t received the email, please:
|
|
There are 27 papers published in subject: > since this site started. |
Select Subject |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
1. Calculation of Lightning Electromagnetic Pulse Based on Neural Network Boundary | |||
Di Wang,Jianghai Wang | |||
Computer Science and Technology 02 January 2024 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:In this paper, a LSTM network based boundary model is investigated to compute the propagation of lightning electromagnetic pulsed fields (LEMP) in space. A LSTM neural network is introduced in place of the traditional Perfectly Matched Layer (PML) absorbing boundary conditions in solving the value of LEMP using the FDTD algorithm.The data on the PML boundary is utilized for model training. Compared with the traditional PML boundary model, the computational complexity and computation are greatly reduced because the neural network needs only one cell layer as the boundary. Meanwhile, in order to enhance the generalization ability of the model, the Random Forest (RF) algorithm is used to screen the features of the data on the PML boundary. The experimental results show that the new model calculates the EMF values at each position in the space with good accuracy. | |||
TO cite this article:Di Wang,Jianghai Wang. Calculation of Lightning Electromagnetic Pulse Based on Neural Network Boundary[OL].[ 2 January 2024] http://en.paper.edu.cn/en_releasepaper/content/4761839 |
2. An SDN-Based Flow Table Encoding Approach for Resource and Efficiency Optimization in Topic-based Pub/Sub Systems | |||
Zhou Yu,Zhang Yang | |||
Computer Science and Technology 03 December 2023 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:With the rapid development of software-defined networking (SDN), SDN-Based multi-level flow table architectures are always employed to address issues such as QoS, security policies, and matching efficiency. The rise of semantic communication has also sparked researchers\' interest in semantic information and its utilization. Many studies on semantic representation and semantic summarization have emerged. This study takes a new perspective to reduce the number of table entries by utilizing the semantic relationships implied in the topic tree in the topic-based pub/sub systems and introduces the concept of semantic aggregation. Semantic aggregation of table entries can work with multi-level flow table architecture to reduce the number of table entries while ensuring the correct delivery of streams. We propose a semantic-based table entry encoding algorithm to implement our idea and conduct several experiments to examine its performance. The experiment results demonstrate that our algorithm can achieve high space and efficiency optimization rate in a short encoding time. | |||
TO cite this article:Zhou Yu,Zhang Yang. An SDN-Based Flow Table Encoding Approach for Resource and Efficiency Optimization in Topic-based Pub/Sub Systems[OL].[ 3 December 2023] http://en.paper.edu.cn/en_releasepaper/content/4761615 |
3. Design and Implementation of Web-based Code Breaker Crossword Game | |||
Zhao Yifan | |||
Computer Science and Technology 17 February 2023 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Code breaker crosswords is a kind puzzle game for active thinking. Players need to break the code and complete all the words in a given grid. This kind of game often appears in the paper material of the journal. As the paper material decreases, the online code breaker crossword game becomes feasible. The paper designs a crossword generation algorithm, the generation algorithm creates a scoring matrix for each letter of each word, compares and calculates the optimal position of each possible word, and sorts the word length and creates randomness to increase the diversity of results. Ultimately solves the problem of computing an optimal crossword puzzle given a list of words. The experimental results show that the algorithm can freely set the word list, grid size, and calculation time, and get the optimal result within the specified time. Based on the algorithm, this paper implements an online crossword puzzle website to provide users with a multi-faceted gaming experience. | |||
TO cite this article:Zhao Yifan. Design and Implementation of Web-based Code Breaker Crossword Game[OL].[17 February 2023] http://en.paper.edu.cn/en_releasepaper/content/4759175 |
4. A Holistic Timing Analysis with Low Pessimism and Low Time Complexity for Rate-Constrained Traffic in TTEthernet | |||
Ran Li,Bin Fu,Guoqi Xie,Fei Peng,Renfa Li | |||
Computer Science and Technology 18 May 2022 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Reviews: please describe the background, status and application of the research with 150-300 words. I and we can not be used as the subject, and the abstract must not the same as the sentences of the main text. General research paper: please extracts the key points of the paper, give the main research achievements with object, methods, results and conclusion with 200-400 words. I and we can not be used as the subject, and the abstract must not the same as the sentences of the main text. | |||
TO cite this article:Ran Li,Bin Fu,Guoqi Xie, et al. A Holistic Timing Analysis with Low Pessimism and Low Time Complexity for Rate-Constrained Traffic in TTEthernet[OL].[18 May 2022] http://en.paper.edu.cn/en_releasepaper/content/4757804 |
5. In-Vehicle Network Intrusion Detection using Deep Transfer Learning and SVM | |||
YANG Jun-Fang,FU Bin,LI Ren-Fa | |||
Computer Science and Technology 18 May 2022 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:With the rapid development of intelligent driving technology and in-vehicle infotainment systems, the number of communication interfaces to the outside world has increased, and the architecture of the in-vehicle network has become highly complex. As a result, the Controller Area Network (CAN), which lacks security features, is more vulnerable to external attacks. Deep learning models are widely used in intrusion detection techniques, but it requires a large amount of data. However, accurate CAN attack data is not readily available in large quantities. To solve this problem, we propose an intrusion detection system (IDS) for in-vehicle CAN bus using deep transfer learning and support vector machines (SVM). In our IDS, the deep transfer learning model extracts the features of CAN messages; the SVM uses these features to identify if the CAN bus has been hacked. Experimental results show that with a limited amount of datasets, the proposed IDS still has a good detection performance with an accuracy of up to 99.1\%. | |||
TO cite this article:YANG Jun-Fang,FU Bin,LI Ren-Fa. In-Vehicle Network Intrusion Detection using Deep Transfer Learning and SVM[OL].[18 May 2022] http://en.paper.edu.cn/en_releasepaper/content/4757805 |
6. Feature selection scheme based on firefly algorithm | |||
Meng Hao-tian,Peng Hai-peng | |||
Computer Science and Technology 07 March 2022 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:In intrusion detection, processing high-dimensional data is often an important step. High-dimensional data brings higher computing cost and more difficult to process. Therefore, it is essential to set up dimensionality reduction scheme. Aiming at the problems of easy convergence and high computational cost of the traditional firefly algorithm, this paper proposes a feature selection scheme based on the firefly algorithm by improving the firefly algorithm. The specific improvement methods are as follows: for the initial population, define a vector composed of 0-1 for a single firefly individual, and set a one-to-one correspondence for discrete features; For the step size, the dynamic update step size mechanism is introduced, and the initial step size is set to a higher value, which can better global search in the early stage of the algorithm iteration. After a certain number of iterations, the step size gradually decreases, and then quickly converges to the optimal solution; For the brightness function and selection mode, the distance between classes is introduced as the brightness function to redefine the selection mode. The improved firefly algorithm selects the features of KDDCUP99 data set and obtains 10 optimal features, which are \{3,4,5,6,8,10,13,23,24,37\}. After training the 10 features, the accuracy is 99.48\%. | |||
TO cite this article:Meng Hao-tian,Peng Hai-peng. Feature selection scheme based on firefly algorithm[OL].[ 7 March 2022] http://en.paper.edu.cn/en_releasepaper/content/4756684 |
7. A Long-Distance Respiratory Monitoring Based on Milimeter Wave Sensing | |||
YU Shuhui,ZHOU Anfu | |||
Computer Science and Technology 18 February 2022 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Vital sign monitoring is a key technology to ensure human health. Respiration, as an important sign of human health, has become an important research direction. Current breathing monitoring methods are generally divided into contact monitoring based on wearable devices and non-contact monitoring based on wireless signal measurement. The former requires the user to actively wear it, which is not suitable for long-term monitoring; the latter can only achieve breathing monitoring within a close range of 1-1.5m due to signal attenuation . To solve this problem, this paper proposes a long- distance breathing monitoring system based on multi-channel millimeter wave signals . When realizing long-distance breathing monitoring, for the two major challenges of the significant energy attenuation and directivity reduction of millimeter wave signals when they propagate over long distances, we targeted the use of a multi-channel antenna array to enhance the energy of the effective signal, and use the smallest Variance-free distortion response (MVDR) adaptively accurately locates the thoracic cavity from multiple signal sources. Subsequently, the principal component analysis ( PCA) was used to extract the principal components of the chest motion, and finally the respiratory rate was calculated based on the phase slope. We evaluate the accuracy of sitting and lying in different postures in daily life. Experimental results show that we can achieve an average error of 0.6 BPM in the 2.5m. | |||
TO cite this article:YU Shuhui,ZHOU Anfu. A Long-Distance Respiratory Monitoring Based on Milimeter Wave Sensing[OL].[18 February 2022] http://en.paper.edu.cn/en_releasepaper/content/4756246 |
8. Design and Experiment of Reconstructing NANO Grid System by Java | |||
Huang Mengyan,Zhang Yuyan | |||
Computer Science and Technology 18 March 2021 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:In recent years, blockchain technology has developed rapidly. Not only Bitcoin is widely known, but also Ethereum and Hyperledger technology are gradually being applied to life. However, the current technology has problems with high time delay and low throughput. The Nano block grid structure solves the above problems by virtue of its concurrent transactions and account transactions. However, the Nano blockchain project is too redundant and large, and it is not easy to learn. In order to make the project easier to support the development of application and test its performance in lab environment, we choose Java to reconstruct the Nano block grid system, using Socket communication technology, JDBC Database and other technologies. The system includes start-up block chain, construction block, socket communication, system transaction, account information display, and block content display. The experiment results show that the reconstructing system works well. | |||
TO cite this article:Huang Mengyan,Zhang Yuyan. Design and Experiment of Reconstructing NANO Grid System by Java[OL].[18 March 2021] http://en.paper.edu.cn/en_releasepaper/content/4754061 |
9. Multi-dimensional social relationship analysis model based on LDA | |||
Ming Xuyang,Zhang Siyang | |||
Computer Science and Technology 18 March 2021 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:The development of location service technology provides the premise for the emergence of location-based social network (LBSN).At present, the research on community discovery and social relations in LBSN still has some problems, such as insufficient model dimension, difficulty in parameter estimation and low accuracy of model results, which are still challenges for researchers.In order to solve the problem of poor model fitting effect, this paper designs a multi-dimensional social relationship analysis model (MSRAM) from two aspects of social relationship and user check-in behavior by introducing dynamic interaction relationship between nodes.Then, according to the hidden variable sampling rules and parameter iteration rules, a new Gibbs sampling algorithm based on model is proposed, and the experimental parameters are estimated according to the cross-entropy reality.By comparing with the spectral clustering algorithm and the TGSC-PMF algorithm based on the topic model, it is verified that the cross-entropy of the proposed model is increased by about 7.93%, the modularity is increased by 5.6%-8.8%, and the similarity within the community is increased by 12%-23%.The results show that this model can achieve more accurate community division for the whole experimental data network. | |||
TO cite this article:Ming Xuyang,Zhang Siyang. Multi-dimensional social relationship analysis model based on LDA[OL].[18 March 2021] http://en.paper.edu.cn/en_releasepaper/content/4754200 |
10. Risk Quantification Contributes To Service Stability | |||
Liu Funiu | |||
Computer Science and Technology 07 August 2020 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:This article shows the design and implementation of a system called risk quantification platform. On the whole, the risk quantification platform is designed to standardize the changes in the product line from the perspective of prevention. We use the quantified data to conduct a risk assessment and combine the case improvement module to drive the business side to optimize the stability of online services, achieving the goal of reducing the occurrence of the online cases. By automatically collecting user platform operation and maintenance data, and automatically calculating and quantifying the operation and maintenance risks, each bussiness line gets risk scores of various dimentions. Finally, a ranking and competition mechanism is formed to achieve the purpose of promoting long-term implementation of standards and assisting in the construction of service stability. | |||
TO cite this article:Liu Funiu. Risk Quantification Contributes To Service Stability[OL].[ 7 August 2020] http://en.paper.edu.cn/en_releasepaper/content/4752636 |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
About Sciencepaper Online | Privacy Policy | Terms & Conditions | Contact Us
© 2003-2012 Sciencepaper Online. unless otherwise stated