-
401
Dynamic Analysis of Traffic State and Congestion Propagation on Bidirectional Grid Network
Published 2013-01-01“…Many traffic problems in China such as traffic jams and air pollutions are mainly caused by the increasing traffic volume. …”
Get full text
Article -
402
Adaptive packet selection scheme and selective retransmission algorithm for Bluetooth
Published 2011-01-01“…To improve the anti-jamming capability and transmission efficiency of Bluetooth,the retransmission mecha-nism was worked out for baseband layer and L2CAP layer.In baseband layer,the adaptive packet selection strategy was presented,which utilized the times of retransmission to evaluate the channel quality.The packet that satisfied the biggest throughput of the current channel was chosen dynamically according to the times of retransmission.In L2CAP layer,in view of the shortcomings that data frames successfully received need to be transmitted once more,the selective retrans-mission algorithm was proposed,depending on the unique characteristic that Bluetooth could support a number of logical channels.The algorithm combines the retransmission mode and flow control mode,with no redundancy varieties of the protocol.Simulations and performance analysis indicate that system throughput and transmission efficiency get promoted with decrease of communication delay.It is easy to implement the algorithm.…”
Get full text
Article -
403
Designing Unimodular Waveform with Low Range Sidelobes and Stopband for Cognitive Radar via Relaxed Alternating Projection
Published 2016-01-01“…Cognitive radar could adapt the spectrum of waveforms in response to information regarding the changing environment, so as to avoid narrowband interference or electronic jamming. Besides stopband constraints, low range sidelobes and unimodular property are also desired. …”
Get full text
Article -
404
A New Modified Three-Term Conjugate Gradient Method with Sufficient Descent Property and Its Global Convergence
Published 2017-01-01“…As the numerator of PRP plays a vital role in numerical result and not having the jamming issue, PRP method is not globally convergent. …”
Get full text
Article -
405
Demand-Driven Resilient Control for Generation Unit of Local Power Plant Under Unreliable Communication
Published 2025-01-01“…The resilient control issue for the generation unit (GU) in a local power plant with unreliable communication is addressed in this article, where the communication may be jammed by denial-of-service (DoS) attacks. Based on the GU model of voltage and current at the point of common coupling, a demand-driven network communication protocol is proposed to decrease the number of scheduling signal transmissions, and an observer-based prediction method is provided to replenish the lack of dispatching data during transmission intervals when the demand has not changed. …”
Get full text
Article -
406
Secrecy analysis for orthogonal time frequency space technique based LEO satellite communication
Published 2021-08-01“…In order to improve the security performance of low earth orbit (LEO) satellite downlink communication system, a cooperative UAV was employed to send jamming signals against the eavesdroppers.In particular, the downlink transmission was based on the orthogonal time frequency space (OTFS) technique to combat the severe Doppler effect caused by the high mobility of the LEO satellite.The closed form expression for the security outage probability (SOP) was derived at the legitimate receiver, where a novel moment matching approach was used for finding a summed probability distribution function (PDF) of the shadowed-Rician (SR) distributed terms.Simulation results prove that the SOP performance advantage of the downlink LEO satellite communication achieved by OTFS over OFDM scheme, and show the effectiveness of employing unmanned aerial vehicle (UAV) jammer in terms of enhancing secrecy transmission.…”
Get full text
Article -
407
Real-time predication and navigation on traffic congestion model with equilibrium Markov chain
Published 2018-04-01“…In contrast to the traditional shortest path algorithms, focused on the static network, the first part of our guiding method considered the potential traffic jams and was developed to provide the optimal driving advice for the distinct periods of a day. …”
Get full text
Article -
408
A Spread Spectrum Sequence for MC-CDMA System
Published 2015-11-01“…The MC-CDMA system takes the advantages of the OFDM system and the CDMA system.The MC-CDMA system is a kind of wireless communication aroused an ongoing and growing research interests,which has the characteristics of high bit transmission rate,high bandwidth efficiency,anti-jamming,and a large system capacity.Since the MC-CDMA system includes the multi-carrier modulation,it is difficult to design a spread spectrum sequence performing not only a high level of self-correlation and cross-correlation but also a low peak-to-average power ratio in the MC-CDMA system.To solve this problem,a spread spectrum sequence which was modulated by Golay code and m sequence was proposed.The spread spectrum sequence proposed owned a good performance in self-correlation,cross-correlation and peak-to-average power ratio.The simulation results show the effectiveness and the superiority of the proposed spread spectrum sequence.…”
Get full text
Article -
409
Beamforming Algorithm of LEO Satellite Communication System
Published 2022-06-01“…The rapid development of broadband satellite internet has brought satellite communication into a new era.The establishment of large-scale low-orbit satellite constellations has gradually saturated spectrum resources, and the high overlap in frequency use has led to serious interference problems between satellite communication systems.Satellite payloads typically communicate using phased-array antennas, which reduce interference by beamforming at the receiving and transmitting ends.The adaptive beamforming algorithm was used at the receiving end to suppressed interference by adaptive zeroing; The low sidelobe beamforming algorithm was used at the transmitting end, which reduced the interference by imposing specifi c constraints on the sidelobes to suppressed the sidelobe level.Three anti-jamming beamforming algorithms were introduced for the ground receiving end and the satellite sending end respectively, which provided a beamlevel method for reduced the interference between satellite communication systems.…”
Get full text
Article -
410
Secure data offloading strategy for multi-UAV wireless networks based on minimum energy consumption
Published 2021-05-01“…To solve the problems of ground passive eavesdropping when ground users offload data to the multi-UAV(unmanned aerial vehicle) edge computing network, a secure data offloading strategy that minimized system energy consumption by jointly optimizing user matching and resource allocation was proposed.Considering the constraints of system delay, communication resources and computing resources, the probability of security interruption was used to restrict the security performance of the data offload process.By using block coordinate descent and successive convex approximation algorithm, the user transmission power, offload factor, UAV computing resource allocation and jamming power were jointly optimized.A pair-wise stable user matching algorithm was proposed to minimize the total energy consumption of UAV system.Simulation results demonstrate that the algorithm can realize the safe offloading of data, and has good performance in energy consumption and delay by comparing with the conventional strategies.…”
Get full text
Article -
411
Quantum secure communication algorithm based on cyclic code and information compression
Published 2020-03-01“…For the problem that the classical secure communication was challenging to transmit information,a quantum secure communication algorithm based on cyclic code and information compression was proposed.First,the data was encoded into two sets of data with different lengths by the sender,one set of data was used for cycling coding and the other one was used to compress coding.Second,single-photon sequence was transmitted to the receiver on the quantum channel by the sender.The error number was used as the basis of channel security detection.If the channel was secure,quantum states were encoded for the data,and segment transmitted by quantum stabilizer codes.The error caused by the environment can be overcome according to characteristic of the stable code.Finally,the information was decoded after receiving the quantum information,then recirculated and decompressed to obtain data.The security analysis shows that the quantum secure communication algorithm can resist the attack of jamming and spoofing attacked.The simulation results show that good results can be obtained to 5 segments for data compression.…”
Get full text
Article -
412
Dynamic Path Optimization in Sharing Mode to Relieve Urban Traffic Congestion
Published 2021-01-01“…The results show that both the model and algorithm are reliable and effective; thus, travel efficiency can be effectively improved and traffic jams can be alleviated.…”
Get full text
Article -
413
Numerical Simulation and Experimental Study on Flow of Polymer Aqueous Solution in Porous Jet Nozzle
Published 2020-01-01“…In this paper, a self-propelled porous jet bit with a support plate is designed, which can prevent the drill bit from jamming due to the jet nozzle against the bottom of the well during the drilling process. …”
Get full text
Article -
414
Joint Power Allocation at the Base Station and the Relay for Untrusted Relay Cooperation OFDMA Network
Published 2015-01-01“…Specifically, with the destination-based jamming (DBJ) scheme and fixed MS transmission power assumption, our focus is on the joint BS and US power allocation to maximize system sum secrecy rate. …”
Get full text
Article -
415
Les TIC et la surveillance des zones maritimes sensibles. Penser globalement, agir localement
Published 2012-10-01“…Even if in recent decades information systems have modified the geographical space and allowed the acceleration of decision making, the role of the information in a conflict is not new (alert, deciphering, jamming, damaging the enemy’s infrastructures, destabilization etc.). …”
Get full text
Article -
416
Joint power control for untrusted relay cooperation-based confidential communication
Published 2014-11-01“…The scenario that multiple cell-edge mobile stations (MS) all without direct-links to the base station (BS) but have confidential messages in the uplink in the presence of untrusted relay (UR) cooperation was considered.In order to implement the secure communication between BS and multiple MS,destination-based jamming (DBJ) scheme was adopted.With the assumption that all MS had fixed transmit power,the joint UR and BS power control which aims at maximizing system sum secrecy rate was discussed.For this problem,analysis indicated that it was equivalent to joint access control and power allocation problem thus its NP-hard.Through problem relaxation,a suboptimal MS access control and alternatively power allocation algorithm was provided.This algorithm is proved to have polynomial complexity and can converge to at least a suboptimal solution for original problem.Simulation results show that compared with the benchmark algorithms,the proposed suboptimal algorithm is better in the achievable secrecy rate performance.…”
Get full text
Article -
417
Emergency Evacuation of Hazardous Chemical Accidents Based on Diffusion Simulation
Published 2017-01-01“…Due to the toxicity and diffusion of hazardous chemicals, these accidents often lead to not only severe consequences and economic losses, but also traffic jams at the same time. Emergency evacuation after hazardous chemical accidents is an effective means to reduce the loss of life and property and to smoothly resume the transport network as soon as possible. …”
Get full text
Article -
418
A Survey of Secure Communications for Satellite Internet Based on Cryptography and Physical Layer Security
Published 2023-01-01“…The former includes classical encryption-based and quantum encryption-based secure communication, and the latter is further divided into precoding-based, cooperative jamming-based, relay selection-based, and physical-layer authentication-based secure communication depending on the applied techniques. …”
Get full text
Article -
419
Adaptive Trajectory Tracking Algorithm of a Quadrotor with Sliding Mode Control and Multilayer Neural Network
Published 2022-01-01“…To improve the trajectory tracking accuracy, the anti-jamming performance, and the environment adaptability of a quadrotor, the paper proposes a new adaptive trajectory tracking algorithm with multilayer neural network and sliding mode control method. …”
Get full text
Article -
420
Fractional-Order Sliding Mode with Active Disturbance Rejection Control for UAVs
Published 2025-01-01“…Through the inner and outer loop design, the jitter of the sliding mode controller (SMC) is effectively suppressed, and fast response and strong anti-jamming ability are achieved, which, in turn, improves the control accuracy. …”
Get full text
Article