-
14741
Dependable-cooperative channel resource allocation scheme in wireless mesh network
Published 2017-05-01“…For improving utilization of channel resources and service quality effectively in wireless mesh network,a dependable-cooperative channel resource allocation scheme was proposed.According to the adaptive features of mesh node,engaging game theory and establishing reputation mechanism to achieve dependable-cooperative of nodes,and channel resource allocation result was utilized.The comparison of this experiment proves the situation of service level and network utility of cooperative service.The result of it shows that networks benefit will be optimal when the cooperative service level is 3 and node hops synergies with the service level.Comparing with classic syn-ergetic algorithm,with the same context of network topology,dependable-cooperative channel allocation strategy is clearly dominated with 1.04 on UACRR and 1.069.…”
Get full text
Article -
14742
Analysis of Power Coupling Device with Dual Planetary Gear Set based on Dynamic Programming
Published 2019-06-01“…By introducing dynamic programming algorithm, taking the battery SOC as state variable and engine torque and speed as control variable, the fuel consumption of the vehicle is set as the objective function for global optimization. …”
Get full text
Article -
14743
Spectral Element Method for Fractional Klein–Gordon Equations Using Interpolating Scaling Functions
Published 2023-01-01“…The focus of this paper is on utilizing the spectral element method to find the numerical solution of the fractional Klein–Gordon equation. The algorithm employs interpolating scaling functions (ISFs) that meet specific properties and satisfy the multiresolution analysis. …”
Get full text
Article -
14744
Security analysis and improvement of a certificateless signcryption scheme
Published 2015-03-01“…Furthermore, the efficiency of the proposed scheme is very high since only four modular exponentiations and five modular exponentiations are needed in the signcryption algoriahm and unsigncryption algorithm separately.…”
Get full text
Article -
14745
A Deployment Method of Middlebox Service Chain Based on Multi-Flow Table
Published 2015-08-01“…Aiming at the path cycle and source address binding problem in middlebox service chain deployment,a service chain deployment approach by combining the OpenFlow mechanism and NetFPGA was proposed.First of all,the OpenFlow multi-flow table was used for marking service chains and labeling service sequences so that data packets could be processed correctly according to desired service order;secondly,the service chain deployment algorithm was designed to achieve the mapping relationship between the service path and flow table rules;thirdly,a prototype system was implemented based on the hardware platforms of NetFPGA-10G.Finally,experimental results show that the proposed method have the advantage of feasibility and outperforms compared methods in the aspect of the flow table number and time overhead.…”
Get full text
Article -
14746
Object detection and multimodal learning for product recommendations
Published 2025-01-01“…The proposed approach is an algorithm for recommending multiple products based on visual and textual features, ensuring compatibility with query items. …”
Get full text
Article -
14747
Cloud storage scheme based on closed-box encryption
Published 2017-07-01“…Aiming at protecting the confidentiality of data for cloud storage users,a scheme that encrypt data in cloud service providers was presented.The scheme constructed a closed-box computing environment by virtual machine isolation technique,improved algorithm of RSA to change keys without having to produce large prime numbers,transfer data and keys through SSL and encrypted data in the closed computing environment before storing to the distributed file system.Closed-box computing environment can prevent attacks from cloud administrators and malicious applications in the operating system.It also can guard against data leakage effectively.The result of experiment shows that the confidentiality of data improved and the performance loss is decreased considering to other cloud storage scheme that encrypt data in cloud.…”
Get full text
Article -
14748
Crop Growth Monitoring System Based on Agricultural Internet of Things Technology
Published 2022-01-01“…After improving the fuzzy algorithm, this paper builds an intelligent model, builds the system structure framework according to the actual needs of crop growth monitoring, sets up and analyzes the environmental parameters, and builds the crop growth monitoring system from multiple perspectives. …”
Get full text
Article -
14749
Correspondences between Czech and English Coreferential Expressions
Published 2015-09-01“…We designed an alignment-refining algorithm for English personal and possessive pronouns and Czech relative pronouns that improves the quality of alignment links not only for the classes it aimed at but also in general. …”
Get full text
Article -
14750
Dynamic Server Cluster Load Balancing in Virtualization Environment with OpenFlow
Published 2015-07-01“…Thus, we propose a load balancing algorithm based on server running state, which can calculate comprehensive loading according to the CPU utilization, memory utilization, and network traffic of the servers. …”
Get full text
Article -
14751
Random access for massive Internet of things:current status, challenges and opportunities
Published 2021-04-01“…In conventional communication systems, the random access (RA) is a necessary procedure for a user equipment (UE) to establish wireless connection to the network before actual data transmission.Focusing on the massive IoT with large number of nodes, the fundamental characteristics and limitations of conventional grant-based RA were firstly discussed.Then, the grant-free RA, semi-grant-free RA and unsourced RA for massive IoT were addressed in details from multiple perspectives, including their system models, protocol frameworks, algorithm procedures, system performance, related pros and cons, as well as critical challenges and potential opportunities.Finally, some highlights on the related key techniques and common issues in random access for massive IoT were concluded.…”
Get full text
Article -
14752
Pilot interference mitigation for TDD cell-free massive MIMO systems
Published 2022-05-01“…To alleviate the pilot interference for cell-free massive multi-input multi-output (MIMO) system and improve system’s performance, a comprehensive approach including the pilot reuse, access point (AP) selection and power allocation was proposed.Firstly, to alleviate the pilot contamination, the pilot assignment based on the order of user distance was proposed, in which the pilot sharing was only allowed when the distance between two users is large enough to reduce the impact of pilot reuse.Then, by AP selection, only the APs which have main impact on the macro diversity gain were selected as the user’s serving APs.Finally, a modified max-min power control algorithm was proposed to improve the system’s average throughput.Simulation results show that the pilot interference mitigation strategy proposed improves the performance of the system significantly.…”
Get full text
Article -
14753
Adaptive SDN switch migration mechanism based on coalitional game
Published 2020-08-01“…The problem of poor control plane performance causes in software-defined Networking due to the unreasonable mapping relationship between controllers and switches.To address this issue,an adaptive switch migration mechanism based on coalitional game was proposed.First,comprehensively considering the controller resource utilization,control overhead,and flow establishment time,the switch migration problem was modeled as a combination optimization problem.Then,a game theory was introduced to design a distributed algorithm,where each controller ran control logic independently and implemented coalitional game between controllers to achieve an adaptive switch migration mechanism that adapted to traffic characteristics.The simulation results show that the proposed mechanism can better adapt to the flow characteristics,reduce the control traffic overhead by about 19% and the average flow settling time by 30%,and improve the controller resource utilization.…”
Get full text
Article -
14754
Construction of Target Controllable Image Segmentation Model Based on Homotopy Perturbation Technology
Published 2013-01-01“…So, the bottleneck of the variational model on image segmentation is the lower efficiency of the algorithm. Combining the multiscale wavelet interpolation operator and HPM, a semianalytical numerical method can be obtained, which can improve the computational efficiency and accuracy greatly. …”
Get full text
Article -
14755
Optimum Design of Load Capacity of Cycloidal Pin Wheel
Published 2022-08-01“…Matlab is used to call the genetic algorithm in its optimization toolbox for solution. …”
Get full text
Article -
14756
Operation Optimization of Microgrid System Based on Intelligent System Model
Published 2022-01-01“…In addition, this paper adopts the method of extracting the harmonic current command in the synchronous coordinate system based on the band-pass filter composed of SOGI and combines the RDFT algorithm to determine the number of harmonics that can be compensated and the degree of compensation for the harmonic number. …”
Get full text
Article -
14757
Defense-enhanced dynamic heterogeneous redundancy architecture based on executor partition
Published 2021-03-01“…Aiming at the security problem when servants are faced with common vulnerabilities, an improved DHR architecture called IDHR was proposed.On the basis of DHR, an executor-partition module that divided the executor-set to several executor pools by the heterogeneity among the executors was introduced to improve the heterogeneity among the executor pools.Moreover, the scheduling algorithm was improved by choosing executor pools randomly at first, and then choosing the executors from these pools randomly.Finally, through two experimental schemes of random simulation and Web server emulation, the security evaluation of the proposed IDHR architecture was carried out from two aspects of attack success rate and control rate.Experimental results show that the security of the IDHR architecture, especially when the common vulnerability is unknown, is significantly better than the traditional DHR architecture.…”
Get full text
Article -
14758
Calculating the feature method of short text based on analytic hierarchy process
Published 2016-12-01“…Furthermore, this method was also implemented in the traditional clustering algorithm. Experimental results show that, compared with the traditional tf-idf method, the improved approach has a better clustering effect on the average scattering for clusters and the total separation between clusters.…”
Get full text
Article -
14759
Link prediction method based on the similarity of high path
Published 2021-07-01“…For the problem that the existing link prediction method has many problems, including low accuracy and low efficiency, a method of high-order path similarity link prediction was proposed.Firstly, the path was used as the judging feature to predict missing links in complex networks, which could make resource allocation more effective and restricts information leakage by punishing public neighbor pairs.Secondly, by using high order paths as judging features, the available long paths between seed nodes would be punished.Finally, several real complex network datasets were used for numerical examples calculation.Experimental results show that the proposed algorithm is more accurate and efficient than other baseline methods.…”
Get full text
Article -
14760
Collaborative Recommendation for Online Social Networks Based on User Behavior Cognitive
Published 2015-10-01“…Recently,online social network(OSN)has become essential tools for information sharing and communication in people’s work and life.How to cognitive massive,complex,large-area and spatiotemporal association user behavior information and provide personalized re1commendation services have become problems need special attention in development of OSN.Thus,a frame of collaborative recommendation for OSN based on user behavior cognitive was proposed which used collaborative filtering algorithm to provide personalized recommendation services on the basis of analysis of behavior of user characteristics,text information and interest preferences,etc.Experimental results verify that the proposed collaborative recommendation strategy based on user behavior cognitive has good stability and actual application effect.…”
Get full text
Article