期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
A Binary Images Watermarking Algorithm Based on Adaptable Matrix 被引量:1
1
作者 ZHANG Fan ZHANG Junliang 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期595-599,共5页
A watermarking algorithm of binary images using adaptable matrix is presented. An adaptable matrix is designed to evaluate the smoothness and the connectivity of binary images. The watermark is embedded according to t... A watermarking algorithm of binary images using adaptable matrix is presented. An adaptable matrix is designed to evaluate the smoothness and the connectivity of binary images. The watermark is embedded according to the adaptable matrix in this algorithm. In the proposed watermarking algorithm, each image block implements a XOR operation with the binary adaptable matrix, which has the same size with the image block, and in order to embed the watermark data, a multiplication operation are also implemented with the weight matrix. The experimental results show that proposed scheme has a good performance. 展开更多
关键词 WATERMARKING binary image adaptable matrix
下载PDF
Range walk and array rotation in space-time adaptive processing:effects and compensations 被引量:2
2
作者 Jinping Sun Guohua Wang Shiyi Mao 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第4期537-543,共7页
This paper proposes a unified clutter model incorporating the effects of range walk and array rotation for space-time adaptive processing(STAP) in airborne multi-channel early-warning radar.Based on this clutter mod... This paper proposes a unified clutter model incorporating the effects of range walk and array rotation for space-time adaptive processing(STAP) in airborne multi-channel early-warning radar.Based on this clutter model,STAP performance is then analyzed from the perspective of covariance matrix tapering(CMT).For STAP performance degradation due to array rotation,a determinate compensation method is proposed based on the CMT method.Numerical examples are provided to verify the analysis and the proposed compensation method. 展开更多
关键词 radar space-time adaptive processing clutter covariance matrix tapering.
下载PDF
A KIND OF URN MODEL FOR ADAPTIVE SEQUENTIAL DESIGN
3
作者 白志东 陈桂景 胡飞芳 《Acta Mathematica Scientia》 SCIE CSCD 2001年第2期224-228,共5页
This paper proposes a new kind of generalized Friendman's urn model,which with adaptive nonhomogeneous generating matrix.This model may be applied in sequential medical experiment.In this model some limit theorems... This paper proposes a new kind of generalized Friendman's urn model,which with adaptive nonhomogeneous generating matrix.This model may be applied in sequential medical experiment.In this model some limit theorems (strong consistency and asymptot- ical normality) have been obtained. 展开更多
关键词 Generalized Friedman's urn adaptive sequetial design generating matrix strong consistency asymptotical normality
下载PDF
A New Model for Network Security Situation Assessment of the Industrial Internet
4
作者 Ming Cheng Shiming Li +3 位作者 Yuhe Wang Guohui Zhou Peng Han Yan Zhao 《Computers, Materials & Continua》 SCIE EI 2023年第5期2527-2555,共29页
To address the problem of network security situation assessment in the Industrial Internet,this paper adopts the evidential reasoning(ER)algorithm and belief rule base(BRB)method to establish an assessment model.First... To address the problem of network security situation assessment in the Industrial Internet,this paper adopts the evidential reasoning(ER)algorithm and belief rule base(BRB)method to establish an assessment model.First,this paper analyzes the influencing factors of the Industrial Internet and selects evaluation indicators that contain not only quantitative data but also qualitative knowledge.Second,the evaluation indicators are fused with expert knowledge and the ER algorithm.According to the fusion results,a network security situation assessment model of the Industrial Internet based on the ER and BRB method is established,and the projection covariance matrix adaptive evolution strategy(P-CMA-ES)is used to optimize the model parameters.This method can not only utilize semiquantitative information effectively but also use more uncertain information and prevent the problem of combinatorial explosion.Moreover,it solves the problem of the uncertainty of expert knowledge and overcomes the problem of low modeling accuracy caused by insufficient data.Finally,a network security situation assessment case of the Industrial Internet is analyzed to verify the effectiveness and superiority of the method.The research results showthat this method has strong applicability to the network security situation assessment of complex Industrial Internet systems.It can accurately reflect the actual network security situation of Industrial Internet systems and provide safe and reliable suggestions for network administrators to take timely countermeasures,thereby improving the risk monitoring and emergency response capabilities of the Industrial Internet. 展开更多
关键词 Industrial internet network security situation assessment evidential reasoning belief rule base projection covariance matrix adaptive evolution strategy
下载PDF
Secured Cloud Data Migration Technique by Competent Probabilistic Public Key Encryption 被引量:1
5
作者 M.G.Aruna K.G.Mohan 《China Communications》 SCIE CSCD 2020年第5期168-190,共23页
Cloud computing, a recently emerged paradigm faces major challenges in achieving the privacy of migrated data, network security, etc. Too many cryptographic technologies are raised to solve these issues based on ident... Cloud computing, a recently emerged paradigm faces major challenges in achieving the privacy of migrated data, network security, etc. Too many cryptographic technologies are raised to solve these issues based on identity, attributes and prediction algorithms yet;these techniques are highly prone to attackers. This would raise a need of an effective encryption technique, which would ensure secure data migration. With this scenario, our proposed methodology Efficient Probabilistic Public Key Encryption(EPPKE) is optimized with Covariance Matrix Adaptation Evolution Strategies(CMA-ES). It ensures data integrity through the Luhn algorithm with BLAKE 2b encapsulation. This enables an optimized security to the data which is migrated through cloud. The proposed methodology is implemented in Open Stack with Java Language. It achieves better results by providing security compared to other existing techniques like RSA, IBA, ABE, PBE, etc. 展开更多
关键词 Luhn algorithm ENCRYPTION efficient probabilistic public key encryption(EPPKE) covariance matrix adaptation evolution strategies(CMA-ES) trusted third party(TTP)
下载PDF
Frequency-invariant robust adaptive beamforming based on interference covariance matrix reconstruction 被引量:5
6
作者 FAN Zhan LIANG Guolong 《Chinese Journal of Acoustics》 2014年第4期359-368,共10页
Consider the problems of frequency-invariant beampattern optimization and robustness in broadband beamforming.Firstly,a global optimization algorithm,which is based on phase compensation of the array manifolds,is used... Consider the problems of frequency-invariant beampattern optimization and robustness in broadband beamforming.Firstly,a global optimization algorithm,which is based on phase compensation of the array manifolds,is used to construct the frequency-invariant beampattern.Compared with some methods presented recently,the proposed algorithm is not only available to get the global optimal solution,but also simple for physical realization.Meanwhile,a robust adaptive broadband beamforming algorithm is also derived by reconstructing the covariance matrix.The essence of the proposed algorithm is to estimate the space-frequency spectrum using Capon estimator firstly,then integrate over a region separated from the desired signal direction to reconstruct the interference-plus-noise covariance matrix,and finally caleulate the adaptive beamformer weights with the reconstructed matrix.The design of beamformer is formulated as a convex optimization problem to be solved.Simulation results show that the performance of the proposed algorithm is almost always close to the optimal value across a wide range of signal to noise ratios. 展开更多
关键词 Frequency-invariant robust adaptive beamforming based on interference covariance matrix reconstruction
原文传递
Aberration correction for multiphoton microscopy using covariance matrix adaptation evolution strategy
7
作者 王科 郑磊 +8 位作者 秦梦圆 张万剑 邓想全 仝申 程慧 黄杰 钟金成 张颖娴 邱娉 《Chinese Optics Letters》 SCIE EI CAS CSCD 2023年第5期88-93,共6页
Multiphoton microscopy is the enabling tool for biomedical research,but the aberrations of biological tissues have limited its imaging performance.Adaptive optics(AO)has been developed to partially overcome aberration... Multiphoton microscopy is the enabling tool for biomedical research,but the aberrations of biological tissues have limited its imaging performance.Adaptive optics(AO)has been developed to partially overcome aberration to restore imaging performance.For indirect AO,algorithm is the key to its successful implementation.Here,based on the fact that indirect AO has an analogy to the black-box optimization problem,we successfully apply the covariance matrix adaptation evolution strategy(CMA-ES)used in the latter,to indirect AO in multiphoton microscopy(MPM).Compared with the traditional genetic algorithm(GA),our algorithm has a greater improvement in convergence speed and convergence accuracy,which provides the possibility of realizing real-time dynamic aberration correction for deep in vivo biological tissues. 展开更多
关键词 multiphoton microscopy 1700-nm window adaptive optics covariance matrix adaptation evolution strategy
原文传递
Adaptive Tracking Control of an Autonomous Underwater Vehicle 被引量:6
8
作者 Basant Kumar Sahu Bidyadhar Subudhi 《International Journal of Automation and computing》 EI CSCD 2014年第3期299-307,共9页
This paper presents the trajectory tracking control of an autonomous underwater vehicle(AUV). To cope with parametric uncertainties owing to the hydrodynamic effect, an adaptive control law is developed for the AUV to... This paper presents the trajectory tracking control of an autonomous underwater vehicle(AUV). To cope with parametric uncertainties owing to the hydrodynamic effect, an adaptive control law is developed for the AUV to track the desired trajectory. This desired state-dependent regressor matrix-based controller provides consistent results under hydrodynamic parametric uncertainties.Stability of the developed controller is verified using the Lyapunov s direct method. Numerical simulations are carried out to study the efficacy of the proposed adaptive controller. 展开更多
关键词 Autonomous underwater vehicle(AUV) adaptive control law regressor matrix Lyapunovs stability path following
原文传递
Efficient multi-objective CMA-ES algorithm assisted by knowledge-extraction-based variable-fidelity surrogate model
9
作者 Zengcong LI Kuo TIAN +1 位作者 Shu ZHANG Bo WANG 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2023年第6期213-232,共20页
To accelerate the multi-objective optimization for expensive engineering cases, a Knowledge-Extraction-based Variable-Fidelity Surrogate-assisted Covariance Matrix Adaptation Evolution Strategy(KE-VFS-CMA-ES) is prese... To accelerate the multi-objective optimization for expensive engineering cases, a Knowledge-Extraction-based Variable-Fidelity Surrogate-assisted Covariance Matrix Adaptation Evolution Strategy(KE-VFS-CMA-ES) is presented. In the first part, the KE-VFS model is established. Firstly, the optimization is performed using the low-fidelity surrogate model to obtain the Low-Fidelity Non-Dominated Solutions(LF-NDS). Secondly, aiming to obtain the High-Fidelity(HF) sample points located in promising areas, the K-means clustering algorithm and the space-filling strategy are used to extract knowledge from the LF-NDS to the HF space. Finally,the KE-VFS model is established by means of the obtained HF and LF sample points. In the second part, a novel model management based on the Modified Hypervolume Improvement(MHVI) criterion and pre-screening strategy is proposed. In each generation of KE-VFS-CMA-ES, excessive candidate points are firstly generated and then calculated by the MHVI criterion to find out a few potential points, which will be evaluated by the HF model. Through the above two parts,the promising areas can be detected and the potential points can be screened out, which contributes to speeding up the optimization process twofold. Three classic benchmark functions and a time-consuming engineering case of the aerospace integrally stiffened shell are studied, and results illustrate the excellent efficiency, robustness and applicability of KE-VFS-CMA-ES compared with other four known multi-objective optimization algorithms. 展开更多
关键词 Covariance matrix adaptation evolution strategy Model management Multi-objective optimization Surrogate-assisted evolutionary algorithm Variable-fidelity surrogate model
原文传递
Network security situation automatic prediction model based on accumulative CMA-ES optimization
10
作者 Wang Jian Li Ke Zhao Guosheng 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2017年第3期33-43,共11页
To improve the accuracy of the network security situation, a security situation automatic prediction model based on accumulative data preprocess and support vector machine (SVM) optimized by covariance matrix adapti... To improve the accuracy of the network security situation, a security situation automatic prediction model based on accumulative data preprocess and support vector machine (SVM) optimized by covariance matrix adaptive evolutionary strategy (CMA-ES) is proposed. The proposed model adopts SVM which has strong nonlinear ability. Also, the hyper parameters for SVM are optimized through the CMA-ES which owns good performance in finding optimization automatically. Considering the irregularity of network security situation values, we accumulate the original sequence, so that the internal rules of discrete data can be revealed and it is easy to model. Simulation experiments show that the proposed model has faster convergence-speed and higher prediction accuracy than other extant prediction models. 展开更多
关键词 security situation automatic prediction covariance matrix adaptive evolution strategy support vector machine
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部