-
1221
Challenges in Clock Synchronization for On-Site Coding Digital Beamformer
Published 2017-01-01“…In this article, we present a clock synchronization topology for a multichannel on-site coding receiver (OSCR) using the FPGA as a master clock to drive all RF blocks. …”
Get full text
Article -
1222
Iterative Learning Consensus Control for Nonlinear Partial Difference Multiagent Systems with Time Delay
Published 2021-01-01“…Based on the system’s own fixed topology and the method of generating the desired trajectory by introducing virtual leader, using the consensus tracking error between the agent and the virtual leader agent and neighbor agents in the last iteration, an iterative learning algorithm is proposed. …”
Get full text
Article -
1223
Vertical handover policy for cyber-physical systems aided by SAGIN based on deep reinforcement learning
Published 2024-08-01“…The vertical handover policy of space-air-ground integrated cyber-physical systems based on deep reinforcement learning was studied, in which the challenges of complicated network model and difficulties in acquiring prior knowledge for network topology and model were addressed. By jointly taking the system stability, handover cost and network-using cost into account, the vertical handover policy problem was modeled as a constraint Markov decision process (CMDP), and a sufficient condition to ensure the existence of a feasible solution was derived.Furthermore, a constraint-proximal policy optimization (CPPO) algorithm was proposed to solve the CMDP, and also the distributed learning scheme at base station sides was introduced to accelerate the speed of converging. …”
Get full text
Article -
1224
Air Turbines for Wave Energy Conversion
Published 2012-01-01“…Moreover, as the current challenge on turbine technology, the authors explain a twin-impulse turbine topology for wave energy conversion.…”
Get full text
Article -
1225
Internet source address verification method based on synchronization and dynamic filtering in address domain
Published 2020-10-01“…At the beginning of the design of the Internet architecture,it assumed that all network members were trusted,and did not fully consider the security threat brought by the untrusted network members.For a long time,routers only forward packets based on the destination IP address of the packet,and do not carry out any verification on the source IP address of the packet.The lack of packet level authenticity on the Internet results in the header being maliciously altered.A real source address verification mechanism with routing synchronization and dynamic filtering were proposed.This mechanism constructs the filter table based on the prefix-topology mapping synchronization,the problem of inconsistent state between the filter table and the route caused by routing asymmetry were solved,false positives and false negatives was avoided,and a low-overhead and low-latency source address verification of the IP address prefix level granularity in the address domain were realized.…”
Get full text
Article -
1226
Dual-Contrast Cellular Magnetic Resonance Imaging
Published 2009-09-01“…Here we report on a MRI method for cellular imaging that generates a new contrast with a distinct topology for identifying labeled cells that has the potential to significantly improve both the sensitivity and the specificity. …”
Get full text
Article -
1227
Development of APP about Cylindrical Gear Loaded Tooth Contact Analysis based on Industrial Internet Platform
Published 2020-12-01“…For this,based on SYSWARE.IDE industrial internet platform,the meshing information of tooth surface is analyzed by Ease-off difference tooth surface topology,and the cylindrical gear LTCA industrial APP is developed. …”
Get full text
Article -
1228
Power allocation satisfying user fairness for integrated sensing and communication system based on orthogonal time frequency space modulation
Published 2022-09-01“…By sharing resources for radar sensing and communications, integrated sensing and communication (ISAC) has promising applications in diverse scenarios, such as human-machine interface, vehicle-to-everything (V2X), remote sensing, and environment surveillance.In order to resolve the frequency resource conflict in high-speed V2X networks, based on the modulation orthogonal time frequency (OTFS), the OTFS-ISAC system was proposed, where the base station receives reflected echoes to obtain sensing parameters of vehicle motion and then establish the vehicle’s mobile topology.Additionally, in terms of the multi-vehicle network, the design of OTFS-ISAC with NOMAsatisfying the fairness and the algorithm of power allocation were proposed.Simulations show that compared with the NOMA without radar sensing system, the proposed design improves the system data rate by 25%.…”
Get full text
Article -
1229
Development and Prospect of Satellite 5G Technology
Published 2021-03-01“…With the development of new broadband satellite communication constellation, the fusion of satellite communication and 5G has become a hot spot in the communication industry.The current status of the development of satellite 5G was summarized, and the work achievements of 3GPP, ITU, SaT5G and other international standard development organizations were introduced.On the basis, the overall architecture of satellite 5G network was proposed, the research and development were introduced such as networking under the condition of satellite dynamic topology, multi band satellite ground integration waveform design, multiple access to satellite IoT terminal, radio resource management and interference coordination.In addition, the feasibility of new technologies such as OTFS, nonorthogonal multiple access and interference coordination of NGSO and GSO based on spectrum sensing were explored.Finally, the development of the 6G phase of integrated satellite and terrestrial networks was presented.…”
Get full text
Article -
1230
A method of CCN centralized control cache decision based on SDN
Published 2017-05-01“…In the software defined networking and content centric networking integration framework,a cache optimi-zation scheme of centralized control was proposed to make full use of global awareness of the control layer for net-work topology and cache resources,and achieve the optimal use of caching resources in the entire network.In this scheme,the particle swarm optimization (PSO) was applied for centralized cache decision-making depending on node edge degree,node importance degree and content popularity.Therefore,the contents were cached in different nodes reasonably.Simulation result shows that the proposed PSO caching scheme achieves larger cache hit rate and lower path stretch than that of LCE scheme,PROB scheme by evaluating the impact of cache size and content popularity on the caching performance.It also shows that PSO scheme significantly reduces the number of cache nodes to replace the cache,making the cache to achieve the overall cache optimization.…”
Get full text
Article -
1231
Stability in Mean of Partial Variables for Coupled Stochastic Reaction-Diffusion Systems on Networks: A Graph Approach
Published 2014-01-01“…These stability principles have a close relation with the topology property of the network. We also provide a systematic method for constructing global Lyapunov function for these CSRDSNs by using graph theory. …”
Get full text
Article -
1232
SPN planning and networking architecture in townships for 5G services
Published 2021-09-01“…slicing packet network (SPN) has become one of the technologies of the mainstream transmission bearer network for 5G services with its technical advantages.Along with the rapid development of 5G services in towns and rural areas and the higher and broader demand for 5G services from various 5G vertical industries, the SPN deployed in urban and county areas in the early stage could no longer fully meet the service demand.To meet the demand for 5G service development in townships and rural areas, SPN need to be considered down to the township level.Based on the development trend of 5G services in townships, the SPN construction conditions were comprehensively considered in townships, combined with SPN architecture, network topology and other conditions, a township SPN architecture model was built and an in-depth analysis of the actual application scenario construction plan was obtained in a local city, providing reference and ideas for the later township SPN construction.…”
Get full text
Article -
1233
Finite-Time Cooperative Tracking Control Algorithm for Multiple Surface Vessels
Published 2014-01-01“…Specifically, the proposed algorithm only requires the communication topology among the surface vessels to be a directed graph with a directed spanning tree. …”
Get full text
Article -
1234
Differentiated protection strategy with dynamic traffic grooming based on clustering
Published 2015-10-01“…To make dynamic traffic grooming faster and more efficient,and achieve an intelligent differentiated protection,a differentiated protection strategy with dynamic traffic grooming based on clustering(DPS-DTGC)was proposed.The whole network topology was allocated some clusters based on maximal independent set,in order to reduce the routing time consumption.Meanwhile,by the cooperation of layered auxiliary graph,residual capacity matrix and cluster aggregation layer,the traffic in inter- and intra- clusters would been groomed to realize the reasonable planning of resources and the higher efficiency of grooming.Furthermore,according to the proportion of different priority traffic in one wavelength ,the link importance was evaluated and a smart P-cycle was designed to give differentiated protection to the link.The simulation results show this strategy can make a better utilization of network resource.And with the increase of network load,it will gain a good performance in blocking rate.…”
Get full text
Article -
1235
Robust K nearest neighbor query processing algorithm in wireless sensor networks
Published 2010-01-01“…A robust K nearest neighbor query processing algorithm called ROC-KNN was proposed.It divides the query region into several sub-regions according the network topology.Each sub-region has a cluster node which collects the sensory data in it,sends it to the cluster node in the next sub-region until traversing all the sub-regions.Two distributed heuristic sub-region size setting and cluster node election algorithms were proposed to reduce the energy consumption.A query processing recovery algorithm using the non-cluster nodes in each sub-region was designed to reduce the outage probability caused by cluster node failures.The experimental results show that the ROC-KNN outperforms the existing algorithms in terms of energy consumption and query success rate.…”
Get full text
Article -
1236
Research on control strategy of bidirectional DC-DC converter based on improved genetic algorithm
Published 2024-05-01“…Based on the connection topology of energy storage and consumption components in the hybrid energy storage system, power demand indicators were determined for different energy flow directions, and the parameters of the main converter components and appropriate circuit components were established. …”
Get full text
Article -
1237
Blütenmeere jenseits naturalisierender Literaturgeschichte
Published 2024-07-01“…The article examines how Hocke’s cyclic conception differs from Friedrich’s understanding of epochs, the links both have to Curtius’s topology and whether the three approaches can be understood as naturalizations of literary history.…”
Get full text
Article -
1238
Interacting Urns Processes for Clustering of Large-Scale Networks of Tiny Artifacts
Published 2010-07-01“…Moreover, the rate of convergence of the process at a given node depends on the global topology of the network. In particular, the same ratio appears for the case of complete communication graphs. …”
Get full text
Article -
1239
Attack Analysis Framework of Space-Integrated-Ground Information Network Based on Cybersecurity Knowledge Graph
Published 2021-09-01“…While realizing global coverage, random access, on-demand service, security and credibility, the space-integrated-ground information network(SGIN) is confronted with more complex and variable security threats.Compared with the internet, satellite network has a lot of diff erences, such as highly dynamic changes of topology, transfer protocol and data format.In terms of these questions, it was necessary to integrated the rule of satellite network attacks into the rules of APT attacks, developed the cybersecurity knowledge graph and the attack rules library to analyzed the attacks of the SGIN.The pattern of attack rules was expressed based on time-space data model, which was used to completed the attack chain when there were non-continuous missed data or false positives data.The attack analysis framework proposed in this paper could accurately perceived the security status of the SGIN in real time , and provided decision support for the SGIN.…”
Get full text
Article -
1240
Universal Mathematical Model and Tooth Flank Comparison of Spiral Bevel Gear and Cycloid Bevel Gear
Published 2016-01-01“…On basis of solving the tooth flank,the tooth flank comparison for spiral bevel gears and cycloid bevel gears is carried out from aspect of tooth line spiral angle and tooth flank topology. This will provide theoretical guide for cycloid bevel gears rough cut by use of spiral bevel gear cutter.…”
Get full text
Article