-
10601
Pulse engineering via projection of response functions
Published 2025-01-01“…We demonstrate this approach, and compare it to the standard GRAPE algorithm, for the example of a quantum gate on two qubits, demonstrating a clear improvement in convergence and optimal fidelity of the generated protocol.…”
Get full text
Article -
10602
A Fractional Trust Region Method for Linear Equality Constrained Optimization
Published 2016-01-01“…The global convergence of the proposed algorithm is established and proved. Numerical results for test problems show the efficiency of the trust region method with new fractional model. …”
Get full text
Article -
10603
Minimal coding cost and low delay multicast routing of wireless mesh networks
Published 2016-01-01“…MNCLDMR protocol introduces the concept of topology key nodes and network coding key nodes, serving as the routing metric whether the next hop nodes were network coding key nodes or topology key nodes, using MNCLD algorithm construct multicast tree. Simulation results show that MNCLDMR can achieve expectation goal, form reasonable network coding opportunity and achieve mini l network coding and low delay multicast routing.…”
Get full text
Article -
10604
Congestion control mechanism in VANET for safety messaging
Published 2014-05-01“…Firstly, a basic channel re-source allocation algorithm for periodic safety message (PSM) and event-driven safety message (EDSM) was proposed, which limits the beacon load level below a specific threshold and thus implicitly reserves enough bandwidth for EDSM. …”
Get full text
Article -
10605
Lightweight security architecture design for wireless sensor network
Published 2012-02-01“…Most previous security proposal did not consider key management or their authentication efficiency was very low.Lightweight security architecture and lightweight security algorithm were proposed for wireless sensor network,The problem of network encounters malicious nodes maybe occur in the procedure of backbone networks networking could be solved by threshold secret sharing mechanism.The lightweight ECC was proposed to optimize the CPK architecture based on normal ECC,authentication was efficient without the third-party CA,and could reduce the computational complexity,the key management could meet the resource limit in wireless sensor network,and the key security depended on the exponential computation complexity of the elliptic discrete logarithm decomposition.The scheme used the improved two-way authentication to ensure the communication security between common node and sink node,which could prevent man-in-the-middle attack.…”
Get full text
Article -
10606
Achieving resist against DHCP man-in-the-middle attack scheme based on key agreement
Published 2021-08-01“…In order to deal with the issue of the man-in-the-middle attack in the process of using dynamic host configuration protocol, a lightweight scheme was proposed.A new key agreement algorithm was developed based on public key cryptography to generate relevant keys, reducing the key storage burden.On the basis, a secure scheme was proposed, where two-way authentication of participants was designed to prevent the man-in-the-middle attack and digital signatures conforming to protocol specifications was constructed to ensure the legitimacy of the message source.By security analysis, the proposed scheme was demonstrated to be secure and valid against the man-in-the-middle attack and other common attacks.Experimental results show that the proposed scheme has the better performance compared with the related schemes, and can be compatible with both DHCPv4 and DHCPv6.…”
Get full text
Article -
10607
Analyzing the weights and its variation of the three delays in EPA network
Published 2012-11-01“…Three delay factors of EPA micro segment:queuing delay,node information processing delay and transmission and propagation delay was analied,and the weight influence of the three major factors of delay on the real-time performance was discussed,through the analysis of the number of nodes in the N and scheduling algorithm factor α on the effects of delay variation,reached two conclusions:1) N=8 is the inflection point of phenomenon of "two eight"between queue delay and node information processing delay;2)when α□0.32,queuing delay will be reduced to be the secondary factors for the influence of the delay.The conclusions provide EPA network reference directions for measures to improve the real-time performance.…”
Get full text
Article -
10608
PM2.5 concentration prediction model based on random forest regression analysis
Published 2017-07-01“…The random foreat regression algorithm was introduced to solve the shortcomings of neural network in predicting the PM2.5 concentration,such as over-fitting,complex network structure,low learning efficiency.A novel PM2.5 concentration prediction model named RFRP was designed by analyzing the 22 characteristic factors including the meteorological conditions,the concentration of air pollutants and the season.The historical meteorological data of Xi’an in 2013—2016 were collected to verify the effectiveness of the model.The experimental results show that the proposed model can not only predict the PM2.5 concentration effectively,but also improve the operating efficiency of the model without affecting the prediction accuracy.The average run time of the proposed model is 0.281 s,which is about 5.58% of the neural network prediction model.…”
Get full text
Article -
10609
Delayed Presentation of Tetralogy of Fallot with Isolated Cyanosis
Published 2018-01-01“…This case serves as an example of a missed diagnosis by screening efforts and reaffirms the resuscitation algorithm of a hypoxic pediatric patient that all emergency providers should be familiar with.…”
Get full text
Article -
10610
Integrity verification protocol based on privacy homomorphism data aggregation
Published 2014-11-01“…Secure data aggregation in wireless sensor networks can effectively prevent privacy leakage,data tampering and other issues,it also achieves efficient data transmission.An integrity verification protocol based on privacy homomorphism data aggregation (IV-PHDA) was presented.The protocol uses homomorphism encryption to ensure data privacy,then it used random detection nodes to detect the integrity of the aggregated results to verify whether the aggregation node faithfully transmit each data packet.The theoretical analysis and simulation comparison verify the performance of the algorithm,the results show that this protocol can detect data integrity through transmission,and achieve better privacy protection and higher data accuracy.…”
Get full text
Article -
10611
Simulation of plutonium-aerosol rise under chemical explosion conditions
Published 2025-01-01“…Based on the Chapman model and Levenberg–Marquardt algorithm, the simulation results of the plutonium aerosol-cloud height were fitted to obtain it as a function of time. …”
Get full text
Article -
10612
An improvement on the efficiency bounds and efficiency classifications in DEA with imprecise data
Published 2024-12-01“…To overcome the problems, we propose a simple, practical algorithm to estimate the expected value of efficiencies, which is inspired by considering the DEA axioms to the imprecise data.…”
Get full text
Article -
10613
Permutation Flowshop Scheduling in ED Aluminium Using Metaheuristic Approaches
Published 2024-01-01“…Experiments are performed in this research to evaluate the three algorithms. The result using the simulated annealing algorithm is considered better because it has a shorter makespan. …”
Get full text
Article -
10614
Adaptive traffic distributing based on dynamic topology for multipath routing in MANET
Published 2006-01-01“…By implementing the algorithm on the OPNET modeler, the results demonstrate that adaptive dynamic traffic distributing multipath routing is indeed a viable alternative to MANET routing approach.…”
Get full text
Article -
10615
An Improved Backward/Forward Sweep Power Flow Method Based on a New Network Information Organization for Radial Distribution Systems
Published 2020-01-01“…This paper presents a load flow algorithm based on the backward/forward sweep principle, flexible with network topology changes, with an improvement in ensuring a minimum number of searching for connections between nodes in the calculation sequence in the forward and the backward sweep, by organizing the radial distribution system information into a main line and its derivations. …”
Get full text
Article -
10616
UAV Path Prediction for CD&R to Manned Aircraft in a Confined Airspace for Cooperative Mission
Published 2018-01-01“…In this paper, a new path prediction approach for unmanned aerial vehicles (UAVs) for conflict detection and resolution (CD&R) to manned aircraft in cooperative mission in a confined airspace is proposed. Path prediction algorithm is established to estimate UAV flight trajectory to predict conflict threat to manned aircraft in time advances (front-end process of CD&R system). …”
Get full text
Article -
10617
Bayesian Estimation of the Stress-Strength Reliability Based on Generalized Order Statistics for Pareto Distribution
Published 2023-01-01“…To solve this problem, we propose an acceptance-rejection algorithm to generate a sample of the posterior distribution. …”
Get full text
Article -
10618
Large-scale resource state monitoring strategy in network function virtualization environment
Published 2019-12-01“…In order to improve the utilization of the infrastructure resource and efficiently deploy the service function chain dynamically in network function virtualization,the orchestration management domain needs to monitor the network resources and virtual network function status in real time,but real-time monitoring will bring large communication overhead.An intelligent distributed monitoring strategy with minimal network communication overhead was proposed.The improved label propagation algorithm intelligently subnets and selects agent monitoring nodes to achieve efficient monitoring of resource and virtual function status and minimize monitoring information communication overhead.The simulation results show that the monitoring strategy proposed reduces the monitoring information communication overhead in the network by about 13%.…”
Get full text
Article -
10619
XOR-FREE Implementation of Convolutional Encoder for Reconfigurable Hardware
Published 2016-01-01“…This paper presents a novel XOR-FREE algorithm to implement the convolutional encoder using reconfigurable hardware. …”
Get full text
Article -
10620
Particle filtering based semi-blind estimation for MIMO-OFDM time-varying channel
Published 2007-01-01“…A semi-blind channel estimation method based on the particle filtering was proposed for the MIMO-OFDM wireless communication system.By optimizing the particles distribution locally,the traditional particle filtering algorithm was modified,and a local optimized particle filtering was proposed.This local optimized particle filtering can achieve the low MSE,and improve the precision of the MIMO-OFDM time-varying channel estimation.Since this method was per-formed in frequency domain,it was not necessary to know(or estimate) the length of the channel.Compared with exist-ing approaches,the proposed method was more robust to the non-gauss distribution noise and the detection performance is nearly optimal.The simulation results show the effectiveness of the proposed method.…”
Get full text
Article