-
14761
Research on intelligent computing offloading model based on reputation value in mobile edge computing
Published 2020-07-01“…Aiming at the problem of high-latency,high-energy-consumption,and low-reliability mobile caused by computing-intensive and delay-sensitive emerging mobile applications in the explosive growth of IoT smart mobile terminals in the mobile edge computing environment,an offload decision-making model where delay and energy consumption were comprehensively included,and a computing resource game allocation model based on reputation that took into account was proposed,then improved particle swarm algorithm and the method of Lagrange multipliers were used respectively to solve models.Simulation results show that the proposed method can meet the service requirements of emerging intelligent applications for low latency,low energy consumption and high reliability,and effectively implement the overall optimized allocation of computing offload resources.…”
Get full text
Article -
14762
Congestion control mechanism in VANET for safety messaging
Published 2014-05-01“…Firstly, a basic channel re-source allocation algorithm for periodic safety message (PSM) and event-driven safety message (EDSM) was proposed, which limits the beacon load level below a specific threshold and thus implicitly reserves enough bandwidth for EDSM. …”
Get full text
Article -
14763
Lightweight security architecture design for wireless sensor network
Published 2012-02-01“…Most previous security proposal did not consider key management or their authentication efficiency was very low.Lightweight security architecture and lightweight security algorithm were proposed for wireless sensor network,The problem of network encounters malicious nodes maybe occur in the procedure of backbone networks networking could be solved by threshold secret sharing mechanism.The lightweight ECC was proposed to optimize the CPK architecture based on normal ECC,authentication was efficient without the third-party CA,and could reduce the computational complexity,the key management could meet the resource limit in wireless sensor network,and the key security depended on the exponential computation complexity of the elliptic discrete logarithm decomposition.The scheme used the improved two-way authentication to ensure the communication security between common node and sink node,which could prevent man-in-the-middle attack.…”
Get full text
Article -
14764
Achieving resist against DHCP man-in-the-middle attack scheme based on key agreement
Published 2021-08-01“…In order to deal with the issue of the man-in-the-middle attack in the process of using dynamic host configuration protocol, a lightweight scheme was proposed.A new key agreement algorithm was developed based on public key cryptography to generate relevant keys, reducing the key storage burden.On the basis, a secure scheme was proposed, where two-way authentication of participants was designed to prevent the man-in-the-middle attack and digital signatures conforming to protocol specifications was constructed to ensure the legitimacy of the message source.By security analysis, the proposed scheme was demonstrated to be secure and valid against the man-in-the-middle attack and other common attacks.Experimental results show that the proposed scheme has the better performance compared with the related schemes, and can be compatible with both DHCPv4 and DHCPv6.…”
Get full text
Article -
14765
PM2.5 concentration prediction model based on random forest regression analysis
Published 2017-07-01“…The random foreat regression algorithm was introduced to solve the shortcomings of neural network in predicting the PM2.5 concentration,such as over-fitting,complex network structure,low learning efficiency.A novel PM2.5 concentration prediction model named RFRP was designed by analyzing the 22 characteristic factors including the meteorological conditions,the concentration of air pollutants and the season.The historical meteorological data of Xi’an in 2013—2016 were collected to verify the effectiveness of the model.The experimental results show that the proposed model can not only predict the PM2.5 concentration effectively,but also improve the operating efficiency of the model without affecting the prediction accuracy.The average run time of the proposed model is 0.281 s,which is about 5.58% of the neural network prediction model.…”
Get full text
Article -
14766
Simulation of plutonium-aerosol rise under chemical explosion conditions
Published 2025-01-01“…Based on the Chapman model and Levenberg–Marquardt algorithm, the simulation results of the plutonium aerosol-cloud height were fitted to obtain it as a function of time. …”
Get full text
Article -
14767
Adaptive traffic distributing based on dynamic topology for multipath routing in MANET
Published 2006-01-01“…By implementing the algorithm on the OPNET modeler, the results demonstrate that adaptive dynamic traffic distributing multipath routing is indeed a viable alternative to MANET routing approach.…”
Get full text
Article -
14768
Bayesian Estimation of the Stress-Strength Reliability Based on Generalized Order Statistics for Pareto Distribution
Published 2023-01-01“…To solve this problem, we propose an acceptance-rejection algorithm to generate a sample of the posterior distribution. …”
Get full text
Article -
14769
Estimation scheme for parameters of wireless channel model in OFDM communication systems
Published 2007-01-01“…The conventional channel estimator in OFDM system was designed to cope with the worst-case channel condi-tion,thus performance degradation can be induced due to the imperfect channel estimation.Though wiener filter based on the minimum mean-squared error(MMSE) is the optimal linear estimator,it requires the prior information of transmis-sion channel.In order to select the near optimal prestored channel interpolation filter coefficients,three channel parame-ters detecting methods including maximum multipath delay,Doppler frequency and SNR based on the time and fre-quency correlation functions of the channel,the Euclidean distance of hard-decision in pilots position respectively,were proposed.The method proposed with low complexity allows an efficient implementation for adaptive channel estimation algorithm as well as multi-user OFDM systems.…”
Get full text
Article -
14770
Tenant-Oriented Customized VM Networking Technology
Published 2015-10-01“…A tenant-oriented customized virtual machine networking system was designed and implemented based on OpenStack.By utilizing metadata definition and template based collaboration,the system implemented automated deployment and control of cloud infrastructures.Features such as unified graphical and draggable tenant interfaces,customized virtual machine networking orchestration,dynamic and batch resource configuration,quality of service control on network interfaces,and a connectivity based optimized mapping algorithm were included.The system provided users ability to configure networks,so that users can manage to conduct virtual machine networking swiftly and without knowledge of underlying technical details.It contributed to reduction of overall virtual networking latency,high efficiency matching of resources and increase in resource utilization.…”
Get full text
Article -
14771
Design of multi-key encryption method
Published 2020-11-01“…In order to improve the security in the process of information transmission,the current encryption methods were studied,and the research status was reported which increased the security of encryption by processing the key.According to the principle of segmenting and grouping data in the process of sending and encrypting,a method of multi-key encryption was designed:the segmenting key group and grouping key group were generated by the source key and random number,and the corresponding key was selected for each segmented and grouped data by its sequence number according to the matching algorithm.This method realized the encryption of multi-key in the process of information transmission.Finally,on the one hand,MATLAB was used to test and verify the encryption efficiency of this method.On the other hand,the security of this method was analyzed from the theoretical and mathematical perspective,comparing with the traditional method.It is concluded that this method can increase the security of the traditional method without too much cost much cost.…”
Get full text
Article -
14772
Data security for internet plus in public cloud
Published 2017-10-01“…“Internet plus” has given birth to many new economic forms and business models,the public cloud faces a serious security challenges.The security of public cloud data was studied and the research ideas were put forward.Firstly,the concept of homomorphic encryption,the characteristics of additive homomorphic encryption and multiplicative homomorphic encryption,and the current research results and difficult problems to be solved were analyzed.Then,based on the multiplicative homomorphic encryption algorithm,hash table and similarity theory,a data security protection scheme was proposed,and the concrete realization process was described.The similarity and completeness of the encrypted data in the public cloud were tested by Euclidean distance.Finally,the correctness and security of the scheme were analyzed by theory.The simulation results verify the feasibility and validity of the scheme.…”
Get full text
Article -
14773
Simulated annealing on uncorrelated energy landscapes
Published 1994-01-01“…A recurrence relation expressing the effectiveness of the algorithm in terms of the function G is derived. Surprising numerical results are obtained, to the effect that for certain parametrized families of functions {Gc, c∈R}, where c represents the steepness of the curve G′(u), the effectiveness of simulated annealing increases steadily with c These results suggest that on the average annealing is effective whenever most points have very small objective function values, but a few points have very large objective function values.…”
Get full text
Article -
14774
Analysis on traveling time of Internet
Published 2007-01-01“…Based on the giant data samples authorized by CAIDA,it found that the Internet traveling time was typically distributed by multi-modal and heavy-tailed when the Internet traveling time was statistically analyzed.Furthermore,a research on the relationship between the traveling diameter and the traveling time from the whole and local data samples supposed that link delay was the leading cause for the great variance of the traveling time,and a revising algorithm was proposed to process the raw data samples to obtain link delay.The statistical analysis of link delay presented that the ratio of the biggest link delay to the traveling time in more than 90% of paths was over 1/4.Then a definition of dominant delay was put forward.The traveling time is affected greatly by dominant delay,which makes the similar diameter’s traveling time distinct.…”
Get full text
Article -
14775
Quantum Key Relay Scheme Based on Trusted Control Center
Published 2014-06-01“…A transmit quantum key relay scheme based on trusted control center and trusted quantum relay server was proposed.The quantum key one-time pad encryption algorithm was used in the design of trusted relay protocol.Upon the establishment of trusted relay network,the trusted control center was used to ensure the credibility and security of access relay,and the user's IP address was hidden in the quantum information data that had been encrypted only for the legal user to decrypt and transmit credible information.The security analysis shows,users who do not connect with the quantum channel can still use the trusted relay network to transmit quantum key securely in a long-distance transmission while attackers can not obtain useful quantum key information from the network.…”
Get full text
Article -
14776
Method for constructing function correspondence between firmware based on candidate function group
Published 2021-04-01“…Due to the characteristics of firmware, traditional binary comparison methods are prone to mismatches during the propagation of the matching function.Aiming at the problem that the matching function propagation algorithm is not ideal, a method for constructing function correspondence based on candidate function groups was designed, and the concept of function matching in n layer local network is supplemented.Then, three candidate function group construction strategies and candidate function group matching methods are proposed, and the time overhead were analyzed.Finally, a prototype system was implemented based on the method and compared with Bindiff.Through random sampling and manual check, 86.04% of the matching results of the proposed method are consistent with Bindiff matching results, while 11.3% can correct Bindiff matching errors.…”
Get full text
Article -
14777
Video steganalysis scheme based on weighted undirected graph
Published 2014-10-01“…A new steganalysis scheme based on taking the inter-frame correlation as the undirected graph weights was proposed utilizing the temporal correlation among video frames.First,getting the eigenvector of every video frame brightness by calculating its gray-level co-occurrence matrix,the eigenvector is an eight-dimensional vector.Then,computing the weights of each video frame by using the euclide distance algorithm.The weighted undirected graph which representing the correlations between each frame is constructed.Finally,according to the change of correlations between the frames after embedding information determine whether the video is embedded confidential information.Experimental results show that the method using weighted undirected graph can quickly discriminate stego video and the original video,and have a high accuracy rate.…”
Get full text
Article -
14778
Cooperative MIMO transmission scheme for clustered ad hoc networks
Published 2012-03-01“…The potential of cooperative multiple-input multiple-output (CMIMO) transmission was explored.An according CMIMO transmission scheme was proposed for clustered ad hoc networks,including two critical aspects.The first was weighted cooperative node selection algorithm,which synthesized the asymmetrical bi-directional channel state information (CSI) between nodes,as well as the nodes’ residual energy and connectivity.Consequently,a set of optimal nodes was selected to develop the CMIMO system mentioned above.The second was the mechanism of establishing and maintaining virtual link between two virtual nodes.Simulation shows that the proposed CMIMO transmission scheme affords higher capacity against SISO,and the scheme with node selection is more energy-efficient than that without node selection for the 70% energy saved.…”
Get full text
Article -
14779
New Exact Traveling Wave Solutions of Fractional Time Coupled Nerve Fibers via Two New Approaches
Published 2021-01-01“…In this paper, we obtain new soliton solutions of one of the most important equations in biology (fractional time coupled nerve fibers) using two algorithm schemes, namely, exp−ψξ expansion function method and θ′ξ/θ2ξ expansion methods. …”
Get full text
Article -
14780
Data processing based on the privacy-preserving vector for wireless sensor networks
Published 2015-09-01“…To solve the privacy disclosing problem during the data processing phase of wireless sensor networks,a dis-tributed mechanism was proposed.Privacy-preserving vector (vector for short) was constructed.Moreover,lightweight method for vector generation and novel method for using the vector were also presented.Thus,the methods were able to solve the privacy-preserving problem for various data processing funtions such as max/min and data compression effi-ciently.An algorithm based on data hiding and slice was given and then the vector was able to be generated securely and dynamically.Extensive analyses and experiments show that the mechanism is more robust to node compromise attack and thus can preserve privacy more efficiently.Moreover,the mechanism consumes less power.…”
Get full text
Article