-
10801
Partition detection for large scale ad hoc networks
Published 2008-01-01“…As the failure of a critical node will directly partition a network,a theorem for critical node identification was proved,which indicates that node degree Ni and elementary loop degree Mi of node i are two decisive factors for the exis-tence of a critical node and shows that Ni-Mi≥ 2 is the necessary and sufficient condition for node i being critical.Based on the theorem,a distributed topology partition detection algorithm(distributed partition detection protocol,DPDP) was presented for large scale networks,which achieves the goal of partition detection efficiently by detecting critical nodes in a local area.Theoretic analysis and experiment results show that DPDP has the advantages of low complexity,high accuracy,low cost as well as good scalability,and is superior to other algorithms.…”
Get full text
Article -
10802
Optimal cross-layer power allocation with channel and queue state information
Published 2007-01-01“…The optimal power allocation was investigated when both channel and queue state information was taken into account.By modeling the system from a cross-layer perspective,an optimization problem was formulated on power allo-cation where the maximal power requirement of a user was determined by the number of its backlog packets.The ana-lytical solution as well as its algorithm,which refer to as water filling in cellar(WFIC),were proposed.The proposed WFIC can be reduced to traditional water-filling(TWF) method as a special case where queue state was ignored.Simula-tion results show that the proposed method can achieve lower queuing delay compared to conventional methods.…”
Get full text
Article -
10803
WmFall: WiFi-based multistage fall detection with channel state information
Published 2018-10-01“…Considering that falling and sitting are very similar to each other, a special method is designed for distinguishing them with deep learning algorithm. Finally, the fall detection system is evaluated in a laboratory, which has 89% detection precision with false alarm rate of 8% on the average.…”
Get full text
Article -
10804
Coverage quality measuring and optimization for moving target in sensor networks
Published 2008-01-01“…Based on the idea of grid discretization, a graph-theory based algorithm was proposed to search minimal exposure path for the moving target barrier coverage problem using exposure as the performance metric. …”
Get full text
Article -
10805
Computational Tools for Cohomology of Toric Varieties
Published 2011-01-01“…After an introduction of the basic definitions and properties of toric geometry, we discuss a specific computational algorithm for the determination of the dimension of line-bundle-valued cohomology groups on toric varieties. …”
Get full text
Article -
10806
Survivability evaluation of network information system based on the cloud model and analytic hierarchy process
Published 2014-08-01“…Considering the problem of quantitative evaluation for qualitative survivability data and indexes of network information systems, the proposed method gives a multi-level survivability evaluation framework based on cloud model theory and AHP method. The algorithm builts a multi-level evaluation indexes system and compute the weight of each index using AHP method. …”
Get full text
Article -
10807
Optimal Allocation of Shared Manufacturing Resources Based on Bilevel Programming
Published 2021-01-01“…The weights of the upper indicators are determined by Analytic Hierarchy Process (AHP) and Improved Order Relation Analysis (Improved G1) combination weighting method and the bilevel programming model is solved by the Improved Fast Elitist Non-Dominated Sorting Genetic Algorithm (Improved NSGA-II). Finally, the effectiveness of the model is validated by a numerical example.…”
Get full text
Article -
10808
Evaluating MapReduce for seismic data processing using a practical application
Published 2012-11-01“…Huge amounts of seismic data undergo complex iterative processing in the oil industry to get knowledge of the earth’s subsurface structure to detect where oil can be found and recovered.To evaluate the suitability of MapReduce for seismic processing algorithms,the algorithm design and implementation of Fresnel tomography on Hadoop MapReduce was described.Experiments demonstrate that MapReduce is approximately 3 times slower than MPI,and tuning the performance of MapReduce is really hard.To expand its applicability to high performance computing for oil industry,MapReduce should be improved in the flexibility and provide the opportunity to exploit fine-grained thread-level parallelism.Finally,research ideas to achieve these objectives were presented.…”
Get full text
Article -
10809
Prediction and modeling of connectivity probability in vehicular Ad Hoc networks
Published 2016-03-01“…Recently,with the rapid development of vehicular communication technology,IoV(internet of vehicles)as one of the applications of IoT(internet of things),is attracting more and more attention as well as its basic applications.The algorithm of predicting the connectivity probability based on highway model was proposed.Also,the joint distribution of vehicles on highway was studied,and the equation calculating the boundaries of connectivity probability on one road segment was analyzed quantitatively.The diagram presenting the relationship between the connectivity probability on one road segment and the average number of vehicles in each tuple was depicted by Rstudio.As a consequence,the model of connectivity probability on one path was achieved by calculating the products of the connectivity probability on all road segments along one path.The analysis result shows that the connectivity probability on one path can be improved by increasing the communication range or the density of vehicles.…”
Get full text
Article -
10810
Two-layer threat analysis model integrating macro and micro
Published 2021-02-01“…The existing threat analysis models failed to comprehensively analyze the propagation of advanced security threats integrating the threat development trend and propagation path.In order to solve the problem, a two-layer threat analysis model named TL-TAM was established.The upper layer of the model depicted the threat development trend.The lower layer depicted the threat propagation path considering social engineering and networks can.Based on the model, prediction algorithm of threat development was proposed.The experimental result shows that the model can comprehensively analyze the threat propagation at multiple levels, overcome the defect that the threat analysis model based on attack graph is limited to technical vulnerability attack, and is more suitable for dynamic tracking analysis of advanced security threats.…”
Get full text
Article -
10811
Video Genre Classification Using Weighted Kernel Logistic Regression
Published 2013-01-01“…In this paper, Weighted Kernel Logistic Regression (WKLR) algorithm is implemented for video genre classification to obtain significant accuracy, and it shows accurate and faster good results.…”
Get full text
Article -
10812
METHOD OF FAULT FEATURE EXTRATION BASED ON CEEMD AND FASTICA
Published 2018-01-01“…First,analyze the CEEMD vibration signals,decompose them into intrinsic mode function( IMF) components signal of different scales; then through the sensitivity evaluation algorithm,decompose and recombine the signals,and use Fast ICA to reduce their noise; in the end,conduct Hilbert envelope spectrum analysis to the signals separated by the Fast ICA,to obtain the fault feature information. …”
Get full text
Article -
10813
Fuzzy-Approximation-Based Novel Back-Stepping Control of Flexible Air-Breathing Hypersonic Vehicles with Nonaffine Models
Published 2019-01-01“…For the unknown functions and uncertainties in each subsystem, fuzzy approximators are used to approximate the total uncertainties, and norm estimation approach is introduced to reduce the computational complexity of the algorithm. Aiming at the saturation problem of actuator, a saturation auxiliary system is designed to transform the original control problem with input constraints into a new control problem without input constraints. …”
Get full text
Article -
10814
SOCIAL TECHNOLOGY OF UNIVERSITY INTERACTION MANAGEMENT WITH STAKEHOLDERS AS A TOOL FOR INCREASING COMPETITIVENESS
Published 2019-06-01“…As an experiment, an experience in the development and implementation of social technology for the organization of interaction of Lipetsk State Technical University with stakeholders has been adduced. The algorithm, principles and tasks of interaction of the educational organization with stakeholders and its place in the strategic management of the University have been described. …”
Get full text
Article -
10815
Determination of symmetry plane on human brain CT images
Published 2023-11-01“… A method of automatic detection of human brain symmetry plain in computed tomography (CT) images is described. An algorithm consists of four steps: region of interest, symmetry curve detection, symmetry axis evaluation and calculation of symmetry plane. …”
Get full text
Article -
10816
Application of Circuit Model for Photovoltaic Energy Conversion System
Published 2012-01-01“…The developed model is integrated with DC-DC boost converter with closed-loop control of maximum power point tracking (MPPT) algorithm. Simulation results are validated with the experimental setup.…”
Get full text
Article -
10817
Similarity Property and Slide Attack of Block Cipher FESH
Published 2023-01-01“…Taking FESH, an award-winning block cipher of the National Cryptographic Algorithm Design Competition 2019, as an example, similarity properties of the encryption and key transformation are found, owing to the similar structures that the encryption and key transformation adopted, and the constants generation. …”
Get full text
Article -
10818
Fault Diagnosis of Vehicle Gearbox based on Support Vector Machine Optimized by Improved Beetle Antennae Search
Published 2022-05-01“…Compared with BAS,IBAS modified the step size formula and added Gaussian variation behavior,so that the search ability of the algorithm in the early and late period is balanced and has the ability to jump out of the local optimal,and better SVM parameters could be obtained. …”
Get full text
Article -
10819
Using random subcarrier weighting for multi-carrier systems physical layer security
Published 2012-10-01“…An OFDM security model and a physical layer security transmission scheme were proposed for multi-carrier systems to achieve low probability of interception.In contrast to the resource allocation algorithm which would be disabled at the low SNR,this method designed the subcarrier transmission weighting vectors to randomize the eavesdropper’s signals but not the authorized receiver’s signals.The channel state information was the only character to distinguish authorized receivers and eavesdroppers,which was conducted to guide the weighting vectors design.Simulation results show that the proposed method guarantees that authorized receiver performs transmitted reference demodulation successfully,while the eavesdroppers can not detect the transmitted symbols.…”
Get full text
Article -
10820
Development of the conceptual and terminological apparatus of warehousing logistics in the works of Russian and foreign authors
Published 2022-07-01“…The main approaches to the basic concepts of warehousing logistics in the works of russian and foreign authors are considered. the peculiarities of understanding the terms “warehouse”, “warehousing”, “warehousing system” are revealed. the main historical stages of the development of warehouses and storage facilities are reflected. based on the information provided, the following key features are highlighted: the warehouse is a complex system with its own interconnections and internal processes; a modern warehouse economy should be formed according to an optimized logistics system, of which it is a part, and be able to adapt to the slightest fluctuations and changes in this system; difficulties arising in the field of building a warehousing system can be solved with the help of a competently and clearly developed warehouse model based on the application of a logistics approach and the development of an adaptive warehouse management algorithm.…”
Get full text
Article