Identification scheme
View article
En-ABC: An ensemble artificial bee colony based anomaly detection scheme for cloud environment Open
With an exponential increase in the usage of different types of services and applications in cloud computing environment, the identification of malicious behavior of different nodes becomes challenging due to the diversity of traffic patte…
View article
Floor Identification Using Magnetic Field Data with Smartphone Sensors Open
Floor identification plays a key role in multi-story indoor positioning and localization systems. Current floor identification systems rely primarily on Wi-Fi signals and barometric pressure data. Barometric systems require installation of…
View article
Switch Status Identification in Distribution Networks Using Harmonic Synchrophasor Measurements Open
Topology identification (TI) in distribution networks is a challenging task\ndue to the limited measurement resources and therefore the inevitable need to\nuse pseudo-measurements that are often inaccurate. To address this issue, a new\nme…
View article
Secure Identification Under Passive Eavesdroppers and Active Jamming Attacks Open
In next-generation connectivity systems, which rely on robust and low-latency information exchange, there exists communication tasks in which the Ahlswede/Dueck identification scheme is much more efficient than Shannon's transmission schem…
View article
Data-Driven Hybrid Neural Fuzzy Network and ARX Modeling Approach to Practical Industrial Process Identification Open
Dear editor, This letter presents a practical industrial process identification scheme. More specifically, to improve the identification accuracy of practical process, a decoupled identification scheme is developed based on neural fuzzy ne…
View article
Duhem Model-Based Hysteresis Identification in Piezo-Actuated Nano-Stage Using Modified Particle Swarm Optimization Open
This paper presents modeling and parameter identification of the Duhem model to describe the hysteresis in the Piezoelectric actuated nano-stage. First, the parameter identification problem of the Duhem model is modeled into an optimizatio…
View article
Secure Identification for Gaussian Channels Open
New applications in modern communications are demanding robust and ultra-reliable low latency information exchange such as machine-to-machine and human-to-machine communications. For many of these applications, the identification approach …
View article
Joint and Accurate OSNR Estimation and Modulation Format Identification Scheme Using the Feature-Based ANN Open
A joint and accurate optical signal-to-noise ratio (OSNR) estimation and modulation formats identification (MFI) scheme based on the artificial neural network (ANN) is proposed and demonstrated via both simulation and the experiment system…
View article
Development of a Front Identification Scheme for Compiling a Cold Front Climatology of the Mediterranean Open
The objective of this work is the development of an automated and objective identification scheme of cold fronts in order to produce a comprehensive climatology of Mediterranean cold fronts. The scheme is a modified version of The Universi…
View article
An improved high-impedance fault identification scheme for distribution networks based on kernel extreme learning machine Open
In distribution networks, high-impedance faults (HIFs) occur frequently and have a harmful impact on the distribution network. However, fault detection and fault phase selection of HIFs are challenging due to weak fault characteristics. Th…
View article
Research on non-intrusive unknown load identification technology based on deep learning Open
With the development of smart grid technology, optimization of energy structure, improvement of power efficiency and reduction of power consumption have become the major development trends. As a key process of power structure analysis, loa…
View article
SOFIA: $$\mathcal {MQ}$$-Based Signatures in the QROM Open
\n Contains fulltext :\n 195408.pdf (Publisher’s version ) (Open Access)\n
View article
Twin‐Schnorr: A Security Upgrade for the Schnorr Identity‐Based Identification Scheme Open
Most identity‐based identification (IBI) schemes proposed in recent literature are built using pairing operations. This decreases efficiency due to the high operation costs of pairings. Furthermore, most of these IBI schemes are proven to …
View article
A novel 3-pass identification scheme and signature scheme based on multivariate quadratic polynomials Open
Identification schemes are used to verify identities of parties and signatures. Recently, systems based on multivariate polynomials have been preferred in identification schemes due to their resistance against quantum attacks. In this pape…
View article
Newly Designed Identification Scheme for Ice Thickness on Power Transmission Lines Monitoring Open
Overhead power transmission line icing (PTLI) disasters are one of the most severe dangers to power grid safety. Automatic iced transmission line identification is critical in various fields. However, existing methods primarily focus on th…
View article
Modulation Format Identification Based on Signal Constellation Diagrams and Support Vector Machine Open
In coherent optical communication systems, where multiple modulation formats are mixed and variable, the correct identification of signal modulation formats provides the foundation for subsequent performance improvement using digital algor…
View article
Gradient-Enhanced Modelling of Damage for Rate-Dependent Material Behaviour—A Parameter Identification Framework Open
The simulation of complex engineering components and structures under loads requires the formulation and adequate calibration of appropriate material models. This work introduces an optimisation-based scheme for the calibration of viscoela…
View article
A Time-efficient Multi-Protocol Probe Scheme for Fine-grain IoT Device Identification Open
Internet of Things (IoT) devices connected to the Internet are exploding, which poses a significant threat for their management and security protection. IoT device identification is a prerequisite for discovering, monitoring, and protectin…
View article
Damage Quantification and Identification in Structural Joints through Ultrasonic Guided Wave-Based Features and an Inverse Bayesian Scheme Open
In this paper, defect detection and identification in aluminium joints is investigated based on guided wave monitoring. Guided wave testing is first performed on the selected damage feature from experiments, namely, the scattering coeffici…
View article
A Statistical Inference Attack on Privacy-Preserving Biometric Identification Scheme Open
Biometric identification allows people to be identified by their unique physical characteristics. Among such schemes, fingerprinting is well-known for biometric identification. Many studies related to fingerprint-based biometric identifica…
View article
Time-dependent source identification problem for the Schrödinger equation with nonlocal boundary conditions Open
In the present study, a source identification problem for a one-dimensional Schrödinger equation with nonlocal boundary conditions is investigated. Stability estimates for the solution of the source identification problem are established. …
View article
You Can Act Locally With Efficiency: Influential User Identification in Mobile Social Networks Open
As mobile social networks grow rapidly, influential user identification has attracted much more attention. Previous studies either need large message overhead to achieve global maxima in influence computation or focus on relatively stable …
View article
Relay‐based identification of Wiener model Open
Wiener model belongs to a broad class of non‐linear model structures called the block‐oriented models. Various chemical, biological and electrical processes can be represented as a Wiener structure. There are vast numbers of approaches to …
View article
Unknown pattern extraction for statistical network protocol identification Open
The past decade has seen a lot of research on statistics-based network protocol identification using machine learning techniques. Prior studies have shown promising results in terms of high accuracy and fast classification speed. However, …
View article
Network-based Type-2 Fuzzy System with Water Flow Like Algorithm for System Identification and Signal Processing Open
This paper introduces a network-based interval type-2 fuzzy inference system (NT2FIS) with a dynamic solution agent algorithm water flow like algorithm (WFA), for nonlinear system identification and blind source separation (BSS) problem. T…
View article
Online System Identification and Optimal Control for Mission-Critical IoT Systems Over MIMO Fading Channels Open
With the rapid development of mobile computing, mission-critical internet-of-things (IoT) systems have become popular. Typical mission-critical IoT systems may contain complicated unknown and unstable elements and it is of particular impor…
View article
Adaptive Control and Synchronization of Sprott J System With Estimation Of Fully Unknown Parameters Open
This communication develops an adaptive scheme for control and synchronization of Sprott J system with fully unknown parameters. The scheme provides an elegant strategy of designing estimators for identification of the unknown parameters o…
View article
Efficient authentication scheme with tag-identity protection for EPC Class 2 Generation 2 version 2 standards Open
Various radio-frequency identification standards and products have been designed to meet various market needs. To satisfy various requirements and integrate important features of existent standards, EPCglobal (2013/11) announced the new Ge…
View article
Efficient fault identification scheme of compensated transmission grid based on correlated reactive power measurements and discrete wavelet transform Open
The early fault identification in high-voltage power systems is a substantial aspect not only to minimize equipment failure but also to increase both the reliability and stability in power system. Subsequently, the aim of this paper is to …
View article
Robust Image Identification without Visible Information for JPEG Images Open
A robust identification scheme for JPEG images is proposed in this paper. The aim is to robustly identify JPEG images that are generated from the same original image, under various compression conditions such as differences in compression …