-
11241
A load balanced and energy efficient underwater clustering protocol for UWSN
Published 2016-11-01“…Focused on the low energy efficiency and short lifetime of underwater wireless sensor network(UWSN),a load balanced and energy efficient underwater clustering(LBEEUC)protocol for UWSN was proposed.For cluster head settings,due to the consideration of load balanced,the proportion of cluster heads based on experience-load was set.The area with high experience-load could obtain more cluster heads than other areas to process data forwarding.And then,for intra-cluster communication,some relay nodes were set to save energy of long range data transmission between cluster head and nodes.Relay nodes also could be used to eliminate redundant information by advance data fusion.Finally,for inter-cluster routing,Q-learning algorithm was used to implement optimal path planning based on the criterion of least energy consuming.The simulation results demonstrate that the LBEEUC protocol can efficiently improve the energy utilization,prolong the network lifetime and balance the energy consumption of the network.…”
Get full text
Article -
11242
Noise robust chi-square generative adversarial network
Published 2020-03-01“…Aiming at the obvious difference of image quality generated by generative adversarial network under different noises,a chi-square generative adversarial network (CSGAN) was proposed.Combing the advantages of quantification sensitivity and sparse invariance,the chi-square divergence was introduced to calculate the distance between the generated samples and the original samples,which could reduce the influence of different noises on the generated samples and the quality requirement of original samples.Meanwhile,the network architecture was built and the global optimization objective function was constructed to enhance the adversarial performance.Experimental results show that the quality of the images generated by the proposed algorithm has little difference,and the network is more robust to different noises than the state-of-the-art networks.The application of chi-square divergence not only improves the quality of generated images,but also increases the robustness of the network under different noises.…”
Get full text
Article -
11243
ID-based ring signature on prime order group from asymmetric pairing
Published 2021-09-01“…For the problem that the security proof was difficult to be realized under the standard model in the existing ID-based ring signature schemes, an ID-based ring signature scheme proven secure in the standard model was proposed.Firstly, the formal definitions of security model and adversary model of ID-based ring signature were given.Then, a specific ID-based ring signature scheme was constructed on the prime order groups from asymmetric pairings.Finally, the security analysis and performance analysis were given.The results of security analysis show that the proven security of the proposed scheme is achieved under the standard model by using the dual system encryption technique.The results of performance analysis show that the operation efficiency of each algorithm in the proposed scheme is improved effectively, compared with existing ID-based ring signature schemes from dual system, it is shorter to take the time in generating and verifying signature.…”
Get full text
Article -
11244
A Fixed-Time Hierarchical Formation Control Strategy for Multiquadrotors
Published 2021-01-01“…This paper deals with the problem of multiquadrotor collaborative control by developing and analyzing a new type of fixed-time formation control algorithm. The control strategy proposes a hierarchical control framework, which consists of two layers: a coordinating control layer and a tracking control layer. …”
Get full text
Article -
11245
Synchronization Measure Based on a Geometric Approach to Attractor Embedding Using Finite Observation Windows
Published 2018-01-01“…A simple and effective algorithm for the identification of optimal time delays based on the geometrical properties of the embedded attractor is presented in this paper. …”
Get full text
Article -
11246
Service substitution method based on composition context
Published 2014-09-01“…With the variety of requirements from service requesters and the increasing complexity of network environ-ments,service composition has become more and more complicated.In order to decrease redundant information of the substituted service and improve the accuracy of service substitution,the composition context was regarded as the match-ing criteria and tried to substitute failed service with the following two steps.First,a composition context information collecting algorithm (CCICA) was proposed based on the color petri net model of the service workflow,and regarded the composition context as the collecting source of service information.Second,a levenshtein distance-based service substi-tution method (LDBSSM) was given,which was integrated with dependencies between service interfaces.Simulation re-sults show that the proposed LDBSSM method is practical because it can not only reduce redundancy of substituted ser-vice information but also effectively improve the accuracy of service substitution.…”
Get full text
Article -
11247
Multilevel access control for video database
Published 2012-08-01“…In regards to the critical issues of classification protecting sensitive information of the data stored in video database,a multilevel access control model for the video database was proposed.A series of algorithms was designed and developed in the model where a method of distinguishing user identity and an algorithm to ensure good identity strength were presented.The result of them was then used as the input to user's security level membership function.The user's security level membership degree was subsequently acquired from the result of this function,and it is then,together with the security level membership degree of video data,used as input to the comparison function of security level membership degree in authorization rule.As a result,the multilevel access control can be implemented neatly through combining the result of the comparison function with time element.Compared with the existing access control models,the most outstanding characteristics of the proposed model are realizations of dynamic authorization and video data classification protection.…”
Get full text
Article -
11248
Nonlinear seismic analysis of a reinforced concrete building for Brazilian conditions and standards
Published 2025-02-01“…The implicit time integration algorithm ensures the equilibrium conditions at the end of each time step. …”
Get full text
Article -
11249
STATIC ANALYSIS AND STRUCTUREOPTIMIZATION OF THE 18 m~3 CONCRETEMIXING TRUCKSUBFRAME
Published 2018-01-01“…Aimed at reducing stress and weight,it designed topological Optimization algorithm for optimizing the subframe structure,analyzed the light weighting result and stress statics characteristic of optimized subframe,the result indicated that the stress and weight of the optimized subframe lower than before,the failure problem of maximum stress areahas been solved,the optimized subframe can satisfy the enterprise design requirements.…”
Get full text
Article -
11250
Multiweight Cross-Multimedia Logistics Optimal Path Exploration by Integrating High-Dimensional Deep Learning
Published 2021-01-01“…Starting from the total amount of logistics, regional layout, enterprise scale, and high-dimensional deep learning algorithm, this paper analyzes the current situation of China’s logistic development through multiweight analysis and explores the best path for multimedia logistics.…”
Get full text
Article -
11251
Active stabilization of a chaotic urban system
Published 1997-01-01“…Therefore, the system and its parameters are changed during the control process only. The algorithm is applied to an urban system within a metropolitan area obeying a Lorenz-type dynamics as well as to the Hénon attractor as an example for a discrete scenario.…”
Get full text
Article -
11252
LTE resource-aware dynamic adaptive wireless multimedia streaming system
Published 2021-01-01“…The quality of user experience in adaptive video streaming, to a large extent, depends on the accuracy of the end-to-end bandwidth estimation.However, bandwidth estimation is very challenging in highly dynamic LTE network.LTE resource-aware dynamic adaptive wireless multimedia streaming system was designed and implemented in which the LTE resource block monitor module keeps monitoring the cell-wide physical layer resource utility.The rate scaling mechanism mapped the throughput to an estimation of available bandwidth and the rate adaption algorithm selected the most appropriate representation combining current available bandwidth with buffer state and played a trade-off between video quality and the risk of stalling.The experimental results on the prototype system show that comparing with the two baseline algorithms, the proposed system achieves the highest average video bitrate while maintaining a fairly low stalling rate, and effectively enhances the quality of experience.…”
Get full text
Article -
11253
Optimization of Urban Cold Chain Transport Routes under Time-Varying Network Conditions
Published 2021-01-01“…An optimization model of urban cold chain transportation with the objective function as the minimum total cost is constructed under the premise of service reliability, and an artificial immune particle swarm optimization algorithm is designed to solve the model. For an empirical analysis of Xiamen’s cold chain transportation, a two-stage solution involving “static optimization and dynamic optimization” is used to verify the effectiveness of the model and the practical value of this research. …”
Get full text
Article -
11254
Hybrid TOA/AOA Approximate Maximum Likelihood Mobile Localization
Published 2010-01-01“…This letter deals with a hybrid time-of-arrival/angle-of-arrival (TOA/AOA) approximate maximum likelihood (AML) wireless location algorithm. Thanks to the use of both TOA/AOA measurements, the proposed technique can rely on two base stations (BS) only and achieves better performance compared to the original approximate maximum likelihood (AML) method. …”
Get full text
Article -
11255
Iterative GA Optimization Scheme for Synthesis of Radiation Pattern of Linear Array Antenna
Published 2016-01-01“…This research has proposed the iterative genetic algorithm (GA) optimization scheme to synthesize the radiation pattern of an aperiodic (nonuniform) linear array antenna. …”
Get full text
Article -
11256
Privacy-preserving indoor localization scheme based on Wi-Fi fingerprint with outsourced computing
Published 2024-02-01“…To solve the privacy-preserving problem of both the user and the server in indoor positioning, outsourcing part of the calculation to cloud server in the process of using Paillier encryption was considered.The scheme not only protected the privacy of the user and the positioning server, but also avoided excessive computing and communication overhead.The main idea of the scheme was that the fingerprint database in the offline stage was established by the server firstly.The k-anonymity algorithm was combined with Paillier encryption in the online stage by the user, and the encrypted Wi-Fi fingerprints were sent to the positioning server.An aggregation of the received Wi-Fi fingerprints and database fingerprints were performed by the server.Then they were outsourced to the cloud server for decryption and distance calculation by the positioning server.Finally, the positioning result was obtained.Theoretical analysis and experimental results show that the proposed scheme is safe, effective and practical.…”
Get full text
Article -
11257
Fault diagnosis and auto dispatchin of power communication network based on unsupervised clustering and frequent subgraph mining
Published 2021-11-01“…Fault diagnosis is one of the most challenging tasks in power communication.The fault diagnosis based on rules can no longer meet the demand of massive alarms processing.The existing approaches based on the supervised learning need large sets of the labeled data and sufficient time to train models for processing continuous data instead of alarms, which are far behind the feasibility of deployment.As for alarm correlation and fault pattern discovery, a self-learning algorithm based on the density-based clustering and frequent subgraph mining was proposed.A novel approach for automatic fault diagnosis and dispatch were also introduced, which provided the scalable and self-renewing ability and had been deployed to the automatic fault dispatch system.Experiments in the real-world datasets authorized the effectiveness for timely fault discovery and targeted fault dispatch.…”
Get full text
Article -
11258
Results of research on the formation of students readiness to keep the professional ethics
Published 2016-06-01“…The article suggests the algorithm formation of professionally significant qualities of students in different activities.…”
Get full text
Article -
11259
Structural Synthesis and Isomorphism Identification of Multi-DOF AT Planetary Gear Trains
Published 2023-02-01“…By analyzing the characteristics of the brake links and interconnection links in the planetary gear set string, and using the combination principle to design a reasonable string synthesis algorithm, the isomorphism identification of the PGTs and the AT structures are realized respectively. …”
Get full text
Article -
11260
Robotic Measurement and Control for Chiropractic Research
Published 2006-01-01“…A parallel robot manipulator is used to reproduce chiropractic manipulations on animal subjects using a 3-D vision system. An algorithm for calibrating the system is proposed and tested on the robot. …”
Get full text
Article