-
14641
On coding over the spatial-temporal diversity for reliable transmission scheme in low-duty-cycle WSN
Published 2012-06-01“…A reliable data delivery scheme for low-duty-cycle wireless sensor networks(WSN)was proposed.Using this scheme,the unique spatial-temporal diversity in low-duty-cycle WSN was explored and exploited.Combining with coding schemes,the proposed scheme could achieve higher energy efficiency and lower delivery delay.The coding block allocation problem over multiple paths was formulated.As it was NP-hard,an approximate algorithm to tackle this difficulty was proposed.The impact of network parameters was further analyzed with experimental methods.Extensive simulations also show that,the coding over the spatial-temporal diversity scheme could achieve relatively reliable and low delay delivery with relatively less energy.…”
Get full text
Article -
14642
Two-Dimensional Fuzzy Spatial Relations: A New Way of Computing and Representation
Published 2012-01-01“…In this paper, we propose a method for combining fuzzy topological and directional relations. We also propose an algorithm for defuzzification of relations which provides us a binary topological and directional relation between a 2D object pair. …”
Get full text
Article -
14643
The use of artificial intelligence in counter-disinformation: a world wide (web) mapping
Published 2025-02-01“…Thus, there is a growing recognition of the need for benchmarking the various ongoing efforts to ensure greater efficacy and coordination in the use of AI and assure that this does not lead to forms of algorithmic censorship. Our goal is to provide a mapping of the projects that use AI to counter disinformation by means of their hyperlink network analysis to shed light on their aims, approaches, and challenges.…”
Get full text
Article -
14644
Research on caching strategy based on transmission delay in Cell-Free massive MIMO systems
Published 2021-12-01“…To meet the ultra-low latency and ultra-high reliability requirements of users in the future mobile Internet, the wireless caching technology was combined with Cell-Free massive MIMO systems.The caching model was designed based on AP cooperative caching and regional popularity evaluation.The transmission delay expression involving AP clustering, cooperative caching, and regional popularity was derived, and the content placement problem was expressed as total content transmission delay minimization.Through the demonstration of the NP-hard and submodular monotony of the optimization problem, the greedy algorithm-based optimization strategy was proposed.Simulation results show that the proposed strategy can effectively reduce the content transmission delay and improve the cache hit rate.…”
Get full text
Article -
14645
QUANTITATIVE STRUCTURE–ACTIVITY RELATIONSHIPS (QSAR) STUDY ON NOVEL 4-AMIDINOQUINOLINE AND 10-AMIDINOBENZONAPHTHYRIDINE DERIVATIVES AS POTENT ANTIMALARIA AGENT
Published 2019-06-01“…was used to optimize the compounds. Genetic Function Algorithm (GFA) was employed in selecting descriptors and building the model. …”
Get full text
Article -
14646
Radio tomographic imaging localization method based on the improved ellipse weight model
Published 2018-12-01“…Meanwhile, a foreground detection algorithm based on the cross model was proposed to reduce the impact of background noises and pseudo-targets, thereby further improving the imaging quality. …”
Get full text
Article -
14647
Research on dynamic traffic control strategy of IoT cloud service
Published 2018-12-01“…Flow control is very important to ensure quality of service in cloud service system.A dynamic two-level flow control strategy was proposed.Using the improved minimum connection number algorithm based on the actual cloud service system,the integrated load of the service node was calculated,load balancing was performed on each service node and the load was distributed reasonably.Within the service node,a dynamic hierarchical threshold adjustment strategy was proposed to control traffic dynamically.The actual cloud service system performance test shows that with the dynamic two-level flow control strategy,the RPS of the service node is significantly better than the RPS without the strategy,and the resource utilization of the service node is improved.…”
Get full text
Article -
14648
APPLICATION RESEARCH OF HIGH STRENGTH STEEL TO COMMERCIAL VEHICLE FRONTAL IMPACT SAFETY DESIGN
Published 2017-01-01“…Firstly the global sensitivity analysis was carried out to choose the prominent parts,then their material were changed into HSS,the optimization was conducted by employing NAGA- Ⅱ algorithm with their thickness chosen as design variables. …”
Get full text
Article -
14649
New concept for the value function of prospect theory
Published 2024-11-01“…Additionally, we have conducted empirical studies on algorithmic trading strategies that employ different value function specifications.…”
Get full text
Article -
14650
THE EEMD-RA-KU METHOD ON DIAGNOSIS OF BEARING FAULT
Published 2016-01-01“…Aiming at the impact feature in fault signals of the rolling bearings,The improved algorithm diagnosis method EEMD-RA-KU was proposed to capture the impact feature. …”
Get full text
Article -
14651
PHOTOEMISSION METHOD OF TEMPERATURE MEASURING IN THE PROCESS OF SPARK PLASMA SINTERING POWDERS OF REFRACTORY METALS
Published 2015-04-01“…Construction and algorithm of the photoemission pyrometer based on a photomultiplier are outlined; the calibration procedure is set out. …”
Get full text
Article -
14652
Position Tracking Control for Permanent Magnet Linear Motor via Continuous-Time Fast Terminal Sliding Mode Control
Published 2018-01-01“…For the position tracking control problem of permanent magnet linear motor, an improved fast continuous-time nonsingular terminal sliding mode control algorithm based on terminal sliding mode control method is proposed. …”
Get full text
Article -
14653
Multiuser computation offloading for edge-cloud collaboration using submodular optimization
Published 2020-10-01“…A computation offloading scheme based on edge-cloud computing was proposed to improve the system utility of multiuser computation offloading.This scheme improved the system utility while considering the optimization of edge-cloud resources.In order to tackle the problems of computation offloading mode selection and edge-cloud resource allocation,a greedy algorithm based on submodular theory was developed by fully exploiting the computing and communication resources of cloud and edge.The simulation results demonstrate that the proposed scheme effectively reduces the delay and energy consumption of computing tasks.Additionally,when computing tasks are offloaded to edge and cloud from devices,the proposed scheme still maintains stable system utilities under ultra-limited resources.…”
Get full text
Article -
14654
AI in enhancing cultural sensitivity
Published 2024-12-01“…However, challenges such as algorithmic bias and unequal access persist, underscoring the need for ethical frameworks and culturally responsive pedagogies. …”
Get full text
Article -
14655
METHODOLOGICAL BASIS FOR ESTIMATING THE LIFE CYCLE COST OF AIRCRAFT ENGINE, TAKING INTO ACCOUNT THE ATTENDANT RISKS
Published 2020-03-01“…At this stage, it is necessary to describe clearly the algorithm that will be the basis for the risk assessment of the aircraft engine development.…”
Get full text
Article -
14656
Multi-factor identity authentication scheme for trusted sharing of cultural resources
Published 2023-10-01“…To solve the problems of data leakage and identity impersonation caused by traditional single factor authentication, a multi-factor identity authentication scheme based on blockchain was proposed for the trusted sharing of cultural resources.Considering a variety of identity factors, a heterogeneous digital identity model was constructed using the tamper resistance and distribution of the blockchain distributed ledger.Through asymmetric encryption algorithm and exclusive OR (XOR) operation, the trusted reuse of heterogeneous digital identity and fast authentication of multi-agent access were realized.Security analysis and simulation results show that the proposed scheme outperforms existing multi-factor authentication schemes in terms of security and efficiency, and can effectively reduce the cost of identity authentication.…”
Get full text
Article -
14657
Development of a GPU-enhanced time-dependent Monte Carlo neutron transport version of McCARD
Published 2024-01-01“…This version introduces an MC neutron tracking module that employs an event-based algorithm and features a generalized lattice geometry treatment module. …”
Get full text
Article -
14658
Design of a Small Quadruped Robot with Parallel Legs
Published 2022-01-01“…The rotation angle of each actuator for the quadruped robot is analyzed by the inverse kinematics algorithm. Moreover, the trajectory of the foot-end, including support and swing phases, is planned to reduce the impact between the foot-end and the ground. …”
Get full text
Article -
14659
Optimal strategy selection method for moving target defense based on signaling game
Published 2019-06-01“…To solve the problem of the optimal strategy selection for moving target defense,the defense strategy was defined formally,the defense principle from the perspective of attack surface shifting and exploration surface enlarging was taken into account.Then,network attack-defense behaviors were analyzed from the sight of dynamic confrontation and bounded information.According to the analysis of attack-defense game types and confrontation process,the moving target defense model based on signaling game was constructed.Meanwhile,the method to quantify strategies was improved and the solution of perfect Bayesian equilibrium was proposed.Furthermore,the optimal defense strategy selection algorithm was designed by the equilibrium analysis.Finally,the simulation demonstrates the effectiveness and feasibility of the proposed optimal strategy and selection method.…”
Get full text
Article -
14660
Defense decision-making method based on incomplete information stochastic game and Q-learning
Published 2018-08-01“…Most of the existing stochastic games are based on the assumption of complete information,which are not consistent with the fact of network attack and defense.Aiming at this problem,the uncertainty of the attacker’s revenue was transformed to the uncertainty of the attacker type,and then a stochastic game model with incomplete information was constructed.The probability of network state transition is difficult to determine,which makes it impossible to determine the parameter needed to solve the equilibrium.Aiming at this problem,the Q-learning was introduced into stochastic game,which allowed defender to get the relevant parameter by learning in network attack and defense and to solve Bayesian Nash equilibrium.Based on the above,a defense decision algorithm that could learn online was designed.The simulation experiment proves the effectiveness of the proposed method.…”
Get full text
Article