-
61
A Novel Active Vibration Control Method for Helicopter Fuselages Based on Diffusion Cooperation
Published 2023-01-01“…The diffusion cooperative strategy is widely used in complex wireless sensor network (WSN) systems to efficiently reduce the computation amount during data aggregation. This distributed algorithm utilizes the advantages of the diffusion-cooperative strategy to reduce the computation amount and coupling relationship of the secondary path in a large-scale multichannel system. …”
Get full text
Article -
62
Optimal transmission for scalable video coded streaming in cellular wireless networks with the cooperation of local peer-to-peer network
Published 2017-04-01“…Furthermore, a primal-dual decomposition approach is developed and a distributed algorithm is proposed accordingly. Simulation results show that the proposed approach achieves a near-optimal solution.…”
Get full text
Article -
63
Replication-Based Query Management for Resource Allocation Using Hadoop and MapReduce over Big Data
Published 2023-12-01“…MapReduce model functionality is used for creating a cluster parallel, distributed algorithm, and large datasets. The MapReduce strategy from Hadoop helps develop a community of non-commercial use to offer a new algorithm for resolving such problems for commercial applications as expected from this working algorithm with insights as a result of disproportionate or discriminatory Hadoop cluster results. …”
Get full text
Article -
64
Privacy-preserving incentive mechanism for integrated demand response: A homomorphic encryption-based approach
Published 2025-03-01“…To further protect privacy and encourage participation, a fully distributed algorithm incorporating homomorphic encryption is employed. …”
Get full text
Article -
65
Virtual Force-Based Swarm Trajectory Design for Unmanned Aerial Vehicle-Assisted Data Collection Internet of Things Networks
Published 2025-01-01“…These forces guide UAVs toward sensors requiring data transmission while reducing communication overlap. The proposed distributed algorithm allows each UAV to independently design its trajectory, reducing redundancy and enhancing scalability. …”
Get full text
Article -
66
A Novel Coordinated Control System to Reactive Power Compensation of Photovoltaic Inverter Clusters
Published 2022-01-01“…Simulations verify the performance of the algorithm is better than the conventional static capacity distribute algorithm and dynamic residual margin distribute algorithm. …”
Get full text
Article -
67
Block Least Mean Squares Algorithm over Distributed Wireless Sensor Network
Published 2012-01-01“…Both these conventional distributed algorithms involve significant communication overheads and, consequently, defeat the basic purpose of wireless sensor networks. …”
Get full text
Article -
68
Survey on SSDF attack and defense for distributed cooperative cognitive radio
Published 2017-01-01“…Cooperative spectrum sensing (CSS) improves the reliability of spectrum sensing,however,it is susceptible to spectrum sensing data falsification (SSDF) due to the fusion mechanism.To insight into the current research and development trend of defense strategy against the SSDF attack,several typical distributed strategies were concluded and the types of distributed algorithms were analyzed in several aspects.Finally,the future research of SSDF distributed defense strategy was prospected based on the problems found in the current research.…”
Get full text
Article -
69
Modeling and maintaining the reliability of data replica service in cloud storage systems
Published 2014-10-01“…The reliability of data-nodes and the reliability of relevant network links were analyzed,and then the reliability model of replica service of cloud storage systems was constructed.According to the relationships among access reliability,the number of replicas and the number of user’s accesses,the reliability of data service and the trigger mechanism of replica generation were presented,and the storage node selection was aptly checked,then the replica distribution algorithm and replica deletion algorithm were proposed.Finally a series of experiments were conducted in the cloud storage system,named ERS-Cloud,and the results indicate that the approach can ensure the reliability of data service,and further decrease the number of replicas of the redundant storage.…”
Get full text
Article -
70
Clustered P2P based resource query and dissemination for multi-hop wireless mesh network
Published 2012-11-01“…According to the character of mesh topology and character of the different types of mesh nodes,the multi-hop wireless mesh network was modeled as clustered P2P.Moreover,in order to save the message bandwidth,the Bloom filter as the message to represent the resource list abstract was used,and the message was transmitted among the constructed P2P clusters.To minimize the downloading interruption due to mobility of clients,a resource-density-sensitive resource query and dissemination algorithm in which the query was transmitted to the cluster that had the maximum number of replica resources was proposed.The simulation results show that the proposed resource query and distribution algorithm can provide appealing resource downloading performance.…”
Get full text
Article -
71
Landscape Perspective Distance-Included Angle Shape Distribution Analysis Based on 3D CAD Model Retrieval Algorithm
Published 2022-01-01“…Finally, experimental research shows that the algorithm proposed in this paper is better than the overall shape distribution algorithm and the spherical harmonic algorithm in the search performance of the CAD model, and it can effectively improve the recognition ability of the local detailed features of the 3D CAD model.…”
Get full text
Article -
72
Adaptive federated learning secure aggregation scheme based on threshold homomorphic encryption
Published 2023-07-01“…Aiming at the communication bottleneck problem when the current federated learning security aggregation algorithm was applied in a complex network environment, an adaptive federated learning secure aggregation scheme based on threshold homomorphic encryption was proposed.While protecting gradient privacy, users adaptively compress gradients based on the current available bandwidth, greatly reduced communication overhead for federated users.Furthermore, the new dynamic decryption task distribution algorithm and gradient combination algorithm were designed in the phase of aggregation gradient decryption, which relieved the user’s uplink communication pressure.The experimental results show that the proposed scheme can sharply reduce the amount of communication to 4% compared with the existing federated learning scheme with a trivial model accuracy loss of 1%.…”
Get full text
Article -
73
Resource allocation mechanism in the TWDM-PON and C-RAN joint architecture with hybrid energy supply
Published 2018-09-01“…Aiming at the problems of low resource utilization rate,high energy consumption and poor user service quality in the existing virtualized Cloud Radio Access Network,an energy-aware virtualized resource allocation mechanism with hybrid energy supply was proposed.According to the energy sources and energy consumption of different network devices,energy arrival and energy consumption models were established.Furthermore,under the premise of guaranteeing the quality of user services,considering proportional fairness and energy consumption optimization,distributed algorithms based on asynchronous update were used to allocate resources and harvested energy for different types of virtual cloud radio access networks and user virtual base stations to effectively improve the energy efficiency of network.The simulation results show that the proposed resource allocation mechanism can reduce energy consumption while effectively reducing the latency and improving the throughput.…”
Get full text
Article -
74
An Adaptive Subspace Similarity Search Approach
Published 2015-07-01“…In recent years,such database fields as multimedia information retrieval,similarity join and time series matching,where similarity search has attracted much attention.Existing researches mostly compute nearest neighbor to solve problems about search target set,such as kNN and kNNJ,by metric distance functions in the Euclidean space.But some studies showed that high dissimilarity dimensions had got great effect on the accuracy of answer and flexibility and robustness still were lacked in corresponding solutions.Thus centralized dynamic subspace or partial dimensions similarity search problem and algorithms were proposed at first.Furthermore,with the emerge of very large dataset,centralized algorithms can,t extend very well.Finally,the distributed ones under hadoop framework were proposed.Experiments prove that distributed algorithms outperform centralized ones in the performance without accuracy loss.…”
Get full text
Article -
75
Cross-Layer Optimization Scheme Using Cooperative Diversity for Reliable Data Transfer in Wireless Sensor Networks
Published 2014-03-01“…By utilizing a cross-layer optimization scheme, distributive algorithms which jointly consider routing, relay selection, and power allocation strategies are proposed for the reliability constraint wireless sensor networks. …”
Get full text
Article -
76
CT-TDMA:efficient TDMA protocol for underwater sensor networks
Published 2012-02-01“…Aimed at underwater acoustic sensor networks(UWSN),a novel sender based conflict model with the schemes of allocating continuous time was presented,including local conflict graph(LCG)and a distribute algorithm to generate LCG.Moreover,CT-TDMA,an efficient TDMA protocol based on the conflict model was also proposed,which used heuristic priority rules to allocate transmitting moments for all nodes.CT-TDMA exploits the diversity of propagation delay of different links in UWSN to decrease the idle time between packets at the same receiving node,which helps in improving the throughput.And a heuristic schedule algorithm is applied to shorten the process of allocating continuous time for each node.Simulation results show that,compared with traditional TDMA protocols such as ST-MAC,network throughput of CT-TDMA has increased 20% and end to end delay has decreased 18%;compared to the theoretically optimal scheme with global knowledge,CT-TDMA has achieved 80% network throughput and the end to end delay is only 12% longer.…”
Get full text
Article -
77
Anomaly detection and location of malicious node for IoT based on smart contract in blockchain network
Published 2020-06-01“…With the explosive growth of the number of distributed devices in the Internet of things (IoT) network,the security of decentralized multi-agent optimization algorithm has become the forefront problem.The distributed algorithms in the IoT network are vulnerable to data injection attacks from internal malicious node because each agent locally estimates its state without any supervision.In general,the detection methods for malicious node run independently in each agent,inducing issues such as closed data,single points of failure,opaque detection processes,and so on.The proposed strategy considered detecting via an aid of blockchain technology and smart contracts in Ethereum to detect malicious node in the network.Based on the decentralized and multiple backup features of blockchain technology,the multi-site backup features of the blockchain technology enabled data sharing and avoided single point failure.In addition,the contract code,execution process and result of the smart contract were open and transparent,and the contract code and result could not be tampered to ensure that the detection process could be traced and verified.Finally,the average consensus algorithm was adopted as an example,and the proposed strategy was verified on a simplified IoT network implemented by Raspberry Pi.…”
Get full text
Article -
78
Decentralized Optimization Algorithms for Variable Speed Pumps Operation Based on Local Interaction Game
Published 2018-01-01“…And a decentralized optimization method that is decentralized estimation of distribution algorithm (DEDA) under local interaction games framework has been transplanted to the proposed structure to optimize the pumps working in parallel mode. …”
Get full text
Article -
79
Metodologías para el desarrollo de Interfaces Visuales de Recuperación de Información: análisis y comparación
Published 2006-01-01“…The methods are classified on the basis of the stage of the process in which they take part: data analysis and transformation, application of classification and visual distribution algorithms, and application of visual transformation techniques. …”
Get full text
Article -
80
Robust fully distributed file caching for delay-tolerant networks: A reward-based incentive mechanism
Published 2017-04-01“…Then, we propose three fully distributed algorithms to ensure convergence to the Nash equilibria (for both pure equilibrium and mixed equilibrium). …”
Get full text
Article