This paper briefly reviews other people’s works on negative selection algorithm and their shortcomings. With a view to the real problem to be solved, authors bring forward two assumptions, based on which a new immune...
详细信息
This paper briefly reviews other people’s works on negative selection algorithm and their shortcomings. With a view to the real problem to be solved, authors bring forward two assumptions, based on which a new immune algorithm, multi-level negative selection algorithm, is developed. In essence, compared with Forrest’s negative selection algorithm, it enhances detector generation efficiency. This algorithm integrates clonal selection process into negative selection process for the first time. After careful analyses, this algorithm was applied to network intrusion detection and achieved good results.
Summary form only given. A new scheme for transmitting sensitive data is proposed, the proposed scheme depends on partitioning the output of a block encryption module using the Chinese Remainder Theorem among a set of...
详细信息
Summary form only given. A new scheme for transmitting sensitive data is proposed, the proposed scheme depends on partitioning the output of a block encryption module using the Chinese Remainder Theorem among a set of channels. The purpose of using the Chinese Remainder Theorem is to hide the cipher text in order to increase the difficulty of attacking the cipher. The proposed scheme assumes the existence of a set of transmission channels between the sender and the receiver parties from which S channels are chosen using some selection criteria. The message is divided into as set of blocks of a size that is a multiple of the size of the underlying block cipher block size. The resulting N bit encrypted block is used as an N-bits integer. This integer remainders with respect to S selected relatively prime numbers are sent over the S selected channels. On the receiver side the inverse Chinese remainder is applied to get the encrypted blocks followed by a decryption operation to construct the original message. The theory, implementation and the security of this scheme are described in the paper.
This paper focuses on the design of autonomous and collaborative control strategies to govern the relative distances among multiple spacecraft in formation with no ground intervention. A coordinate load-sharing contro...
详细信息
This paper presents the architecture and several applications of a system aimed at developing mobile device-based courses in an easy and graphical way, without requiring knowledge and programming skills. The proposed ...
详细信息
This paper presents the architecture and several applications of a system aimed at developing mobile device-based courses in an easy and graphical way, without requiring knowledge and programming skills. The proposed system is used to create a remote course about greenhouse climatic control, as well as the necessary steps to build the mobile-based application.
In this paper, using the fuzzy theory and gray theory, a concept of the degree of fuzzy infection and a new reliability analysis method based on the relation of fuzzy infection were proposed, and the mathematical mode...
详细信息
The rapid development of Internet and multimedia technologies has made copyright protection and multimedia retrieval be the two most important issues in the digital world. To solve these problems simultaneously, this ...
详细信息
作者:
M. NiedzwieckiFaculty of Electronics
Telecommunications and Computer Science Department of Automatic Control Gdańsk University of Technology GdaDsk Poland
The paper presents results of local performance analysis of a generalized adaptive notch filter (GANF). Generalized adaptive notch filters are used for identification/tracking of quasi-periodically varying dynamic sys...
详细信息
The paper presents results of local performance analysis of a generalized adaptive notch filter (GANF). Generalized adaptive notch filters are used for identification/tracking of quasi-periodically varying dynamic systems and can be considered extension, to the system case, of classical adaptive notch filters. The frequency tracking properties of the algorithm are studied analytically using a direct averaging approach and an approximating linear filter (ALF) technique. Even though restricted to a single frequency case, the presented analysis provides valuable insights into the tracking mechanisms of GANF, including the associated speed/accuracy tradeoffs, the achievable performance bounds, and tracking limitations. Additionally, it allows one to formulate some useful rules of thumb for choosing design parameters. We show that under the conditions of the ALF approximation, the optimally tuned GANF is a statistically efficient estimator of a slowly drifting system frequency.
Generalized adaptive notch filters (GANF) are used for identification/tracking of quasi-periodically varying dynamic systems and can be considered extension, to the system case, of classical adaptive notch filters. We...
详细信息
Generalized adaptive notch filters (GANF) are used for identification/tracking of quasi-periodically varying dynamic systems and can be considered extension, to the system case, of classical adaptive notch filters. We analyze the enhanced GANF algorithm, proposed in the literature, which incorporates gradient smoothing. We show, both analytically and by means of computer simulation, that gradient smoothing does not improve tracking performance of generalized adaptive notch filters.
Differential linear repetitive processes are characterized by a series of sweeps, or passes, through a set of dynamics defined over a finite interval or duration with interaction between successive passes. They are di...
详细信息
暂无评论