-
1741
Research on sybil attack in defense blockchain based on improved PBFT algorithm
Published 2020-09-01Subjects: Get full text
Article -
1742
Truss Structure Optimization Based on Improved Chicken Swarm Optimization Algorithm
Published 2019-01-01“…Finally, the overall individual position of the algorithm was optimized by the differential evolution algorithm. …”
Get full text
Article -
1743
Statistical modeling based fast rate distortion estimation algorithm for HEVC
Published 2021-01-01“…To reduce the coding computational complexity of the rate and distortion calculations in HEVC, a fast TU level rate model with higher accuracy was proposed.The contribution percentages of different syntax elements in entropy coding were evaluated, and syntax element-wise accurate rate models were individually developed to construct the whole TU level model.In addition, coefficient levels were weighted adaptively to distinguish the nonuniform contributions of different coefficients in terms of rate profiling.Moreover, position-wise parameter was defined to depict the distribution patterns for possible non-zero coefficients within one block.The final linear rate model was developed by fine-tuning the model parameters from great amounts of samples in a statistical way.Finally, the transform domain distortion model was also established to bypass unnecessary reconstruction process.Experimental results show that the proposed algorithm can achieve 49.76% complexity reduction with 1.74% BD-BR increase for RA configuration.…”
Get full text
Article -
1744
A low-complexity detection algorithm for quadrature spatial modulation systems
Published 2017-05-01“…To tackle the issues of the uncertainty number of the activated antennas and high computational complexity of maximum likelihood (ML) detection algorithm in quadrature spatial modulation (QSM),a low-complexity detec-tion algorithm was proposed.Firstly,the system model was reconstructed into a new model suitable for low-complexity detection algorithms in fixed active antennas systems based on compressed sensing (CS) signal re-construction theory.Then,based on the idea of orthogonal matching pursuit (OMP) algorithm and reconstructed model,a candidate set of activated antennas was obtained.Lastly,using ML algorithm to search the candidate,the index of activated antennas and the modulation symbol were selected.Simulation results show that the proposed de-tector is capable of achieving about 90% reduction in complexity with low performance loss compared with ML al-gorithm.…”
Get full text
Article -
1745
Climate Regionalization of Asphalt Pavement Based on the K-Means Clustering Algorithm
Published 2020-01-01“…The research region was divided into the following four asphalt pavement climate zones via the K-means clustering algorithm. Those zones are affected by the climate comprehensively: an inland zone with high temperatures, little rainfall, and radiation, a coastal zone with high temperatures, and a rainy mountainous zone. …”
Get full text
Article -
1746
A Close Multi-Target Tracking Algorithm Based on Weight Correction
Published 2025-01-01“… When multiple targets are close to each other and intersect, the Gaussian mixture probability hypothesis density (GM-PHD) filtering algorithm experiences degraded tracking performance. …”
Get full text
Article -
1747
Power Resource Allocation Algorithm for Dual-Function Radar–Communication System
Published 2024-01-01“…Finally, the optimal value is combined with the original model and transformed into a single objective optimization model, and the optimal power is obtained by solving the model through the iterative optimization algorithm. Simulation results show that, compared with other power allocation algorithms, the proposed algorithm can achieve better radar-communication integration performance under the same transmit power.…”
Get full text
Article -
1748
SDN based network resource selection multi-objective optimization algorithm
Published 2019-02-01“…For the problem of coexistence of different resource utility objectives and mutual influence of resource selection strategies in the complex structure of software-defined network (SDN),an SDN based network resource selection multi-objective optimization algorithm was proposed.The optimization goals of resource providers and clients were taken into account in the algorithm,and a resource selection multi-objective optimization model was constructed.The model was further solved by the reference vector based multi-objective optimization algorithm.Simulation results show that compared with other algorithms,the proposed algorithm could quickly converge to the uniformly distributed non-inferior solution set,and balance the optimization objects of multi-party in SDN based resource access management.…”
Get full text
Article -
1749
Reduction algorithm based on supervised discriminant projection for network security data
Published 2021-06-01“…In response to the problem that for dimensionality reduction, traditional manifold learning algorithm did not consider the raw data category information, and the degree of clustering was generally at a low level, a manifold learning dimensionality reduction algorithm with supervised discriminant projection (SDP) was proposed to improve the dimensionality reduction effects of network security data.On the basis of the nearest neighbor matrix, the label information of the raw data category was exploited to construct a supervised discriminant matrix in order to translate unsupervised popular learning into supervised learning.The target was to find a low dimensional projective space with both maximum global divergence matrix and minimum local divergence matrix, ensuring that the same kind of data was concentrated and heterogeneous data was scattered after dimensionality reduction projection.The experimental results show that the SDP algorithm, compared with the traditional dimensionality reduction algorithms, can effectively remove redundant data with low time complexity.Meanwhile the data after dimensionality reduction is more concentrated, and the heterogeneous samples are more dispersed, suitable for the actual network security data analysis model.…”
Get full text
Article -
1750
Task distribution offloading algorithm of vehicle edge network based on DQN
Published 2020-10-01“…In order to achieve the best balance between latency,computational rate and energy consumption,for a edge access network of IoV,a distribution offloading algorithm based on deep Q network (DQN) was considered.Firstly,these tasks of different vehicles were prioritized according to the analytic hierarchy process (AHP),so as to give different weights to the task processing rate to establish a relationship model.Secondly,by introducing edge computing based on DQN,the task offloading model was established by making weighted sum of task processing rate as optimization goal,which realized the long-term utility of strategies for offloading decisions.The performance evaluation results show that,compared with the Q-learning algorithm,the average task processing delay of the proposed method can effectively improve the task offload efficiency.…”
Get full text
Article -
1751
Target counting algorithm via local signal recovery in sensor networks
Published 2012-09-01“…In view of the deficiencies of existing targets counting algorithms in sensor networks,a local signal recovery based target counting algorithm(LSR)was proposed.LSR firstly searched for the possible local area where targets may exist,and then established a local signal recover model according to signal attenuation characteristic and nodes' distribu-tion.Finally,LSR sought the best target distribution estimation in each possible local area through the established model and obtained the target counting result by summarizing the estimations.Simulation results demonstrate that LSR pos-sesses good merits in counting precision,noise tolerance and energy consumption.…”
Get full text
Article -
1752
A new cooperation spectrum sensing algorithm based on energy detection
Published 2016-09-01“…To improve the reliability of spectrum sensing in cognitive radio system,a new cooperation spectrum sensing algorithm was proposed.In this algorithm,the property of the low probability between adjacent frames of the states change was used and then the decision was made by combing the energy value of the current sensing frame with that of the neighboring frame.Therefore,the proposed algorithm could decrease the miss detection probability in case of the instantaneous signal energy dropping when primary user used the licensed spectrum.Furthermore,theoretical expressions for detection probability and false alarm probability were derived.Finally,theoretical analysis and simulation results verify that the detection performance of the proposed algorithm is better than that of cooperative spectrum sensing which is based on the classical energy detection.…”
Get full text
Article -
1753
Digital Image Automatic Recognition and Tracking Based on Electronic Derotation Algorithm
Published 2021-01-01“…The simulation experiment results show that the electronic derotation algorithm is effective and can support the automatic recognition and tracking of digital images.…”
Get full text
Article -
1754
3D Self-Deployment Algorithm in Mobile Wireless Sensor Networks
Published 2015-04-01“…Aimed at the problem of sensor deployment in three-dimensional spaces, the 3D self-deployment (3DSD) algorithm in mobile sensor networks is proposed. A 3D virtual force model is utilized in the 3DSD method. …”
Get full text
Article -
1755
Trust transitivity algorithm based on multiple influencing factors for grid environment
Published 2011-01-01“…A trust deployment scheme based on layered idea was given for grid environment,which reduced the man-agement costs of system.The fine-grain trust model was proposed which was based on interaction capability and honesty ability.It enhanced the rationality of the model.At the same time,4 influencing factors about trust transitivity were dis-cussed,such as cycle path,path length threshold,node honesty threshold and further trust information.On this condition,the trust transitivity algorithm for grid was studied which was based on depth-first traversal.Example and experimental results show that the model and algorithm are feasible and correct.…”
Get full text
Article -
1756
A Branch and Bound Algorithm for Agile Earth Observation Satellite Scheduling
Published 2017-01-01“…The results showed that the proposed algorithm is efficient enough for engineering application. …”
Get full text
Article -
1757
Fund Performance Evaluation Based on Bayesian Model and Machine Learning Algorithm
Published 2022-01-01“…Based on Bayesian method, this paper constructs a model for estimating fund performance evaluation, and uses machine learning algorithm to construct a sampler that can sample on the basis of conditional distribution. …”
Get full text
Article -
1758
Power Prioritization and Load Shedding in an Island with RESs Using ABC Algorithm
Published 2020-01-01“…In this study, an islanded microgrid with high penetration of Renewable Energy Sources (RESs) is analyzed, and then Artificial Bee Colony (ABC) algorithm is applied for optimal load shedding. The results are then compared with those of Genetic Algorithm (GA), Particle Swarm Optimization (PSO), and GA-PSO hybrid. …”
Get full text
Article -
1759
Time synchronization algorithm based on mobility model for underwater sensor networks
Published 2016-01-01“…Thus, based on the equation, a time synchronization algorithm (MM-sync) was proposed. The experiment results show that MM-sync can reduce the consumption of energy, and can get higher accuracy than state-of-art solutions in high density underwater sensor networks with rapid movement.…”
Get full text
Article -
1760
Fingerprint localization algorithm based on linear spatial dependence of WLAN RSS
Published 2017-03-01Subjects: Get full text
Article