-
13001
DPM-based method for tracking maneuvering targets in wireless sensor networks
Published 2010-01-01“…Focused on energy efficiency issues under tracking targets within WSN,a new dynamic power management(DPM) method for tracking distributed targets was proposed combining with the network energy consumption model and wake-up mechanism.With precedent location information of maneuvering target,the algorithm involved both cancelling noise by wavelet filter and predicting target state by autoregressive transformation is introduced to awaken wireless sensor nodes so that their sleep time is prolonged and energy consumption is reduced.According to the current location of maneuvering target,related nodes in an appointed cluster of WSN constitute a distributed dynamic tracking unit,and the cluster head is responsible for collecting the measurement information from the nodes in the tracking unit.A locating algorithm based on the relative posi-tion of two circulars formed on the bases of measurement information is adopted to simplify the process of locatiny and tracking target.Simulation results show that the DPM-based method can reduce the nodes’ energy consumption,meet the locating and tracking accuracy,and can be applied to locate and track the maneuvering targets on the earth surface.…”
Get full text
Article -
13002
Resource allocation strategy for ultra-dense Internet of things based on graph convolutional neural network
Published 2024-10-01“…Simulation results demonstrated that the proposed algorithm achieved higher resource reuse rates and throughput compared to existing methods, providing superior performance in ultra-dense IoT.…”
Get full text
Article -
13003
High order DPA with profiling
Published 2018-09-01“…In side channel attack,the masking implementation is one of the most popular counter measures again first order DPA.Presently,high order DPA and high order template attack are often used to attack against masking counter measures.High order DPA,however,targets joint leakage of multiple types of information and therefore needs cross combination of powers at corresponding positions,which is the root of the inefficiency of high order DPA.High order template attack,on the other hand,has to know the random mask in each encrypting at its learning phase,which is rarely satisfied for most adversaries.Be aware of these shortcomings and limitations,the algorithm of high order DPA with profiling used neural network to establish the model of fitting the combination of un-masked intermediate values.Attacking was based on the correlation coefficient between the fitted combination intermediate value and the guessing combination intermediate value.This method eliminated the requirement of knowing the masks at the learning phase of template attack and the requirement of cross combination of powers for high order DPA,and therefore lowered the requirement of learning as well as improved attacking efficiency.Experiments have confirmed the feasibility of this algorithm,as well as its efficiency.…”
Get full text
Article -
13004
An English Online Homework Tutoring System Supported by Internet Database
Published 2021-01-01“…Therefore, this paper designs an Internet-based online tutoring platform for college English teaching, which is accelerated by using the K-means clustering algorithm. The data processing efficiency and processing methods to improve user satisfaction require more practical experience to summarize. …”
Get full text
Article -
13005
Reliability modeling and planning of energy harvesting based on uncertainty theory
Published 2018-05-01“…Energy harvesting network is a new form of computer networks.It can convert the environmental energy into usable electric energy,and supply the electrical energy as a primary or secondary power source to the electronic device for network communication.However,the energy harvesting process has great volatility and uncertainty,the traditional analytical method based on probability distribution function to describe the energy collection process can not accurately simulate the actual situation,resulting in higher depletion probability of nodes,then the reliability cannot be guaranteed as a result.For this,the energy harvesting reliability of energy harvesting nodes was defined,represented with the degree of normal operation,respectively set up the node reliability models with no battery and infinite battery.As an example for maximum node achievable rate,the uncertain multilevel programming model based on node reliability was put forward,then the network efficiency was improved under the premise of ensuring node reliability.An energy average allocation (EAA) algorithm was proposed and the upper bound of competitive ratio of the algorithm was proved theoretically.Finally,the actual wind power data was taken as an example to verify the feasibility and effectiveness of the proposed model and method.…”
Get full text
Article -
13006
Virtual machine scheduling strategy based on dual-speed and work vacation mode and its parameter optimization
Published 2017-12-01“…Due to the increasingly strict environmental standards,high pollution and high energy consumption have become the significant factors restricting the development of cloud data centers (CDC).Under the premise of guaranteeing the quality of service (QoS) of CDC,dynamic power management (DPM) technology was applied,synchronous multiple working sleep mode was introduced,and a novel virtual machine (VM) scheduling strategy was proposed.By establishing a two-dimensional continuous-time Markov stochastic model with adaptive service rate and synchronous multiple work vacations,and using the method of a matrix geometric solution,the performance of the VM scheduling strategy was evaluated in terms of energy saving level and average delay of requests.Numerical results with analysis and simulation verify the energy saving effectiveness of the VM scheduling strategy.In order to achieve a reasonable balance between the response performance and the energy-saving effect,a system utility function was constructed from the perspective of economics and design a researching algorithm of the sleep parameter based on the firefly algorithm(FA).…”
Get full text
Article -
13007
Non-orthogonal multiple-access system SC-FDMA-IDMA with iterative block equalization
Published 2014-08-01“…So the it-erative block decision feedback equalization (IB-DFE) algorithm applied to the SC-FDMA-IDMA system is derived in order to enhance the ability of anti-frequency selective fading. …”
Get full text
Article -
13008
Computation offloading scheme for RIS-empowered UAV edge network
Published 2022-10-01“…In order to address the challenge of low offloading rate caused by the obstacles blocking in the links between unmanned aerial vehicle (UAV) and ground users (GU) in urban scene, a partial task offloading scheme for UAV-enabled mobile edge computing with the aid of reconfigurable intelligence surface was proposed.A nonconvex and multivariable coupling stochastic optimization problem was formulated by the joint design of the computation task allocation, the transmit power of GU, the phase shift of RIS, UAV computation resource, and UAV trajectory, aiming at maximizing the minimum average data throughput of GU.By leveraging the properties of mathematical expectation, the stochastic optimization problem was transformed into a deterministic optimization problem.Then, the deterministic optimization problem was decomposed into three subproblems by using the block coordinate descent (BCD) algorithm.By introducing auxiliary variables, the nonconvex problems were transformed into convex optimization problems via the successive convex approximation and semidefinite relaxation, and then the approximate suboptimal solution of the original problem was obtained.The simulation results show that the proposed algorithm has good convergence performance and effectively improves the average data throughput of GU.…”
Get full text
Article -
13009
Effect of Location of Delamination on Free Vibration of Cross-Ply Conical Shells
Published 2012-01-01“…Multi-point constraint algorithm is utilized to ensure the compatibility of deformation and equilibrium of resultant forces and moments at the delamination crack front. …”
Get full text
Article -
13010
NEW STRATEGY THE FOR DESIGNATION OF THE INTEGRITY PARAMETER IN SBAS POSITIONING IN AIR TRANSPORT
Published 2024-03-01“…To this end, a modified algorithm was developed to determine the HPL and VPL protection levels from a common aircraft position navigation solution based on EGNOS and SDCM augmentation systems. …”
Get full text
Article -
13011
Design and Implementation of Attention-Based CR System in the Context of Big Data
Published 2024-01-01“…Therefore, an improved deep factor decomposition machine algorithm combining adaptive regularization and attention mechanisms is proposed, and big data components are integrated to enable the algorithm to support more data input types. …”
Get full text
Article -
13012
Detect material volume by fusing heterogeneous camera target detection and depth estimation information
Published 2025-01-01“…The visual measurement algorithm is the mainstream solution for the volume measurement. …”
Get full text
Article -
13013
Comparative Analysis of YOLO Variants Based on Performance Evaluation for Object Detection
Published 2025-01-01“…This study focuses on analysing and exploring the You Only Look Once (YOLO) algorithm. Specifically, this article analyses the evolution and performance of three versions (YOLOv1, YOLOv5, and YOLOv8) in object detection. …”
Get full text
Article -
13014
A Probabilistic Protocol for Multihop Routing in VANETs
Published 2010-01-01“…We see much improved performances over GPSR after the algorithm is refined for some practical issues.…”
Get full text
Article -
13015
Secure beamforming design for IRS-assisted SWIPT Internet of things system
Published 2021-04-01“…In order to meet the new requirements of intelligent signal processing deployment and physical layer security for green interconnection of things, a design method of secure beamforming was proposed to solve the problem of the shortage of sustainable energy supply in the information and energy transmission at the same time Internet of things (IoT) system assisted by intelligent reflecting surface (IRS).Considering the constraints of secrecy rate, transmit power and IRS reflection phase shift, the optimization problem was modeled as a non-convex quadratic programming problem with quadratic constraints, aiming at maximizing the acquisition power of energy collector, and jointly optimizing the base station transmit beamforming matrix, jammer covariance matrix and IRS phase shift.The non-convex quadratic problem was transformed into an equivalent convex problem by using the relaxation variable, semidefinite relaxation method, auxiliary variable and sequence parameter convex approximation method, and an alternative iterative optimization algorithm was proposed to obtain the feasible solution of the original problem.Simulation results show that the proposed algorithm can converge quickly and improve performance effectively compared with the benchmark scheme.…”
Get full text
Article -
13016
Truthful incentive mechanism for “digital currency”based on privacy protection
Published 2019-04-01“…Many national central banks have conducted legal digital currency research based on distributed ledger technology,but only the UK has disclosed the accounting structure of the legal digital currency framework RSCoin,and the incentive mechanisms was proposed to encourage mintettes to provide honest collaborative accounting services.However,this mechanism does not take into account the differential service costs of mintettes,nor does it give a definite compensation distribution.The privacy costs of the mintettes were fully considered,the incentive model of the central bank and mintettes were established,and the methods were clarified to compensate mintettes.In the legal digital currency research area,an incentive mechanism POPTIM was proposed firstly,that not only protects the private cost of the mintettes,but also guarantees the mintettes report their truthful bidding prices to the central banks.POPTIM first encrypts the biddings of mintettes by coding hash encryption method,then adopts privacy-preserving sorting algorithm to select the winner mintettes,and finally calculates the reward of mintettes based on the homomorphic addition algorithm.The analysis shows that the mechanism is privacy security,computationally efficient,individually rational and truthful simultaneously.…”
Get full text
Article -
13017
Research on Integrated Guidance and Control of Distributed Cooperation of Multi-Interceptor with State Coupling
Published 2018-01-01“…With the aim of achieving cooperative target interception by using multi-interceptor, a distributed cooperative control algorithm of the multi-interceptor with state coupling is proposed based on the IGC (integrated guidance and control) method. …”
Get full text
Article -
13018
An efficient numerical method for 2D elliptic singularly perturbed systems with different magnitude parameters in the diffusion and the convection terms, part Ⅱ
Published 2024-12-01“…To see in practice the efficiency of the numerical method, we show the numerical results obtained with our algorithm for a test problem, when the cases analyzed in this work are fixed; from those results, the uniform convergence of the numerical algorithm follows, in agreement with the theoretical results.…”
Get full text
Article -
13019
Mode selection and resource optimization for UAV-assisted cellular networks
Published 2024-03-01“…The resource allocation and optimization scheme was studied in a coexistence scenario of unmanned aerial vehicle (UAV) and cellular communication network.To improve spectrum efficiency of the system, UAV users could reuse the cellular spectrum resources to access the network through full duplex or half duplex device-to-device technique.Additionally, a joint access control, mode selection, power control and resource allocation optimization problem was formulated to maximize the overall throughput of the network while ensuring quality of service requirements for both UAV users and ground cellular users.Specifically, the phase 1 method in the convex optimization was adopted for access control and feasibility check, and then the convex and concave procedure (CCCP) iterative algorithm was used to solve the power control problem for feasible UAV user pairs.By using this local optimum value, the original optimization problem can be simplified into a weighted maximization problem.Finally, the Kuhn-Munkres (KM) algorithm was used to match the optimal channel resources and obtain the global optimal throughput value of the system.Numerical results show that the proposed scheme can significantly improve the performance of system.…”
Get full text
Article -
13020
Analysis of Network Information Retrieval Method Based on Metadata Ontology
Published 2022-01-01“…The experimental results in this paper show that the text feature extraction of the network information retrieval method based on the metadata ontology calculation has a good performance in terms of accuracy, and the accuracy of the extraction and clustering results is as high as about 90%. The improved CCA algorithm used is better than the traditional CCA and the accuracy is improved by 23%, which is 12% higher than the LDA-CCA algorithm.…”
Get full text
Article