-
14801
Energy-saving scheme supporting ONU modularization with independent-discontinuous transceiving
Published 2015-07-01“…To effectively solve the contradiction between energy-saving and packet delay performance in green passive optical network,an energy-saving scheme supporting ONU modularization with independent-discontinuous transceiving is proposed.Utilizing the technology of optical network unit modularization,each module could switch to sleep or awake mode independently and transmit data in specified time slots discontinuously.Simultaneously,to enhance the quality of service of the overall network,the real-time packets are transmitted in the first sub-cycle based on the sub-cycle division strategy.Furthermore,an independent bandwidth allocation algorithm is proposed,which makes the scheme have more advantages in the asymmetric network traffic scenarios.Simulation results verify that the proposed scheme further reduce the network energy consumption on the premise of guarantee the packet delay.…”
Get full text
Article -
14802
Approximate Analytical Solution for a Coupled System of Fractional Nonlinear Integrodifferential Equations by the RPS Method
Published 2020-01-01“…In this work, a modified residual power series method is implemented for providing efficient analytical and approximate solutions for a class of coupled system of nonlinear fractional integrodifferential equations. The proposed algorithm is based on the concept of residual error functions and generalized power series formula. …”
Get full text
Article -
14803
Improvement and evaluation for algebraic fault attacks on PRESENT
Published 2016-08-01“…An enhanced algebraic fault analysis on PRESENT was proposed.Algebraic cryptanalysis was introduced to build the algebraic equations for both the target cipher and faults.The equation set of PRESENT was built reversely in order to accelerate the solving speed.An algorithm of estimating the reduced key entropy for given amount of fault injec-tions was proposed,which can evaluate the resistance of PRESENT against fault attacks under different fault models.Fi-nally,extensive glitch-based fault attacks were conducted on an 8-bit smart card PRESENT implemented on a smart card.The best results show that only one fault injection was required for the key recovery,this is the best result of fault attacks on PRESENT in terms of the data complexity.…”
Get full text
Article -
14804
Study of BGP secure scheme based on divide and conquer strategy
Published 2012-05-01“…A new approach was studied for BGP security:SE-BGP.By analyzing the security of SE-BGP,was found it had some secure leaks which couldnt resist active attack.To solve these secure problems of SE-BGP,an AS-alliance-based secure BGP scheme :SA-BGP was proposed,which used the aggregate signatures algorithm based on RSA.The SA-BGP has strong ability of security that can effectively verify the propriety of IP prefix origination and verifies the validity of an AS to announce network layer reachability information (NLRI).SA-BGP can large-scale reduced the number of the used certificates.Performance evaluation results that SA-BGP can be implemented efficiently and the incurred overhead,in terms of time and space,ptable in practice.…”
Get full text
Article -
14805
Impulsive noise mitigation based on iteration adaptive approach in underwater acoustic communication
Published 2017-11-01“…Focusing on the impulsive noise mitigation in underwater acoustic communication,an impulsive noise mitigation method based on iteration adaptive approach was proposed.Firstly,by utilizing the orthogonality of the subcarriers in OFDM system,both the impulsive noise and background noise were separated from the signals.Then null tones matrix was used to construct a steering matrix and get the impulsive noise interference covariance matrix.Furthermore,a cost function based on weighted least squares approach was proposed and a close form expression for the impulsive noise was derived.Finally,the impulsive noise was mitigated by substracting the estimation of the impulse noise in the received signal.Simulation results show that the proposed algorithm can reduce the bit error rate (BER) efficiently and provide better performance,especially in high signal to impulsive noise ratio (SINR) case.…”
Get full text
Article -
14806
Channel modeling of molecular communication via free diffusion with multiple receiver
Published 2021-07-01“…A coexistence scenario with a point source, a pair of absorbing and transparent receiver was considered, an interference factor was introduced in the proposed channel model based on the receiving molecular probability in the transparent receiver considering the influences of the absorbing receiver on the transparent one.Furthermore, the channel model of point source and transparent receiver had been proposed by using Levenberg-Marquardt algorithm combined with artificial neural network to study and predict channel model parameters.The simulation results not only verify the effectiveness of the proposed channel model, but also show that the peak time of any point in the environment is directly proportional to the square of the distance from the point source to the receiver, and inversely proportional to the molecular diffusion coefficient, and the peak time is not affected by the absorbing receiver in the environment.…”
Get full text
Article -
14807
Performance of 256QAM in LTE-Hi indoor scenario
Published 2016-01-01“…In order to solve the traffic explosion of indoor and hotspots,LTE-Hi was put forward by 3GPP organization in Release12.Due to the coverage particularity of indoor and hotspots scenarios,the organization introduced 256QAM to improve system performance.According to the 256QAM constellation given in the standard,a soft demodulation algorithm based on border distance decision was deduced.Through a simulation of the UE SINR distribution in the LTE-Hi scenario,the feasibility of the 256QAM was proved and according to the CQI/MCS/TBS signaling table changed for 256QAM,link level simulation showed the 256QAM and 64QAM throughput in comparison under different EVM index.Finally,the system performance with and without the introduction of 256QAM under different scenarios was evaluated.…”
Get full text
Article -
14808
Optimization method through topology reconfiguration for mobile underwater wireless sensor networks
Published 2015-06-01“…The topology of mobile underwater wireless sensor networks (MUWSN) evolves dynamically with ocean currents,which will have great impact on network performance.To solve this problem,a topology optimization method for MUWSNs is proposed based on topology reconfiguration.Firstly,the proposed method optimizes the coverage rate of MUWSNs by adjusting the location of sensor nodes through simulating fish behaviors.Secondly,to optimize the connectivity of MUWSNs,the proposed method repairs disconnected positions and eliminates key nodes in MUWSN through using redundant nodes.Finally,simulation results verify the rationality and validity of the proposed method.Experimental results show that the algorithm can guarantee the network coverage is maintained at about 97%,connectivity rate above 89%,with lower energy consumption.…”
Get full text
Article -
14809
Joint optimization of edge computing and caching in NDN
Published 2022-08-01“…Named data networking (NDN) is architecturally easier to integrate with edge computing as its routing is based on content names and its nodes have caching capabilities.Firstly, an integrated framework was proposed for implementing dynamic coordination of networking, computing and caching in NDN.Then, considering the variability of content popularity in different regions, a matrix factorization-based algorithm was proposed to predict local content popularity, and deep reinforcement learning was used to solve the the problem of joint optimization for computing and caching resource allocation and cache placement policy with the goal of maximizing system operating profit.Finally, the simulation environment was built in ndnSIM.The simulation results show that the proposed scheme has significant advantages in improving cache hit rate, reducing the average delay and the load on the remote servers.…”
Get full text
Article -
14810
A Bayesian approach to discrete multiple outcome network meta-analysis.
Published 2020-01-01“…An adaptive Markov Chain Monte Carlo algorithm is devised for running posterior inference. …”
Get full text
Article -
14811
A SVM Based Spectrum Prediction Scheme for Cognitive Radio
Published 2014-11-01“…The results show that by avoiding invalid prediction, the spectrum utilization can also be improved, and the forecasting accuracy is better than model based on back propagation(BP), thus the proposed algorithm is practicable and flexible for spectrum prediction in cognitive radio.…”
Get full text
Article -
14812
Financial production marketing prediction based on optimization GA-BP neural network
Published 2014-11-01“…The traditional BP neural network has some application problems.For example,the network structure parameter is too dependent on experience and easy to fall into local solution.In order to improve the application defects of BP neural network model,the optimization GA-BP algorithm to optimize BP neural network topology and the selection process of network initial parameter value is proposed.In order to verify the feasibility of the model,marketing customer historical data of a bank short-term financial products as the research object is used to validate the model which could more accurately predict the customer compared with BP neural network model.The test results show that the model could be applied to analysis financial product marketing data and more accurately predict the future marketing results.…”
Get full text
Article -
14813
Research on spectrum sensing technologies based on goodness of fit
Published 2016-05-01“…Cognitive radio technology has achieved the dynamic allocation of spectrum resources,and improves the utilization rate of spectrum resources.Accurate and efficient spectrum sensing is the key step in cognitive radio.Developing a fast and high-performance spectrum sensing method has become an urgent problem to be solved.In recent years,goodness of fit(GOF)theory has been applied widely in the field of spectrum sensing and the effective spectrum sensing technology under small sample point has been implemented.Therefore,the research on spectrum sensing technology based on GOF has very significant value.The development process of GOF in areas of cognitive radio spectrum sensing was summarized,its basic principle common fitting criterion and fitting object were introduced.The simulation comparison of the algorithm was carried under the Gaussian channel and its prospects of further research was forecasted finally.…”
Get full text
Article -
14814
Efficient signcryption scheme based on Cocks’ identity cryptosystem
Published 2020-12-01“…Most of the existing identity-based signcryption schemes are based on bilinear or multilinear pairing operations construction.To solve the problem of low efficiency caused by complex pair operation, a new efficient signcryption scheme based on the identity cryptosystem of Cocks was proposed.Firstly, the security model of the proposed scheme was formalized, and the definition of confidentiality and unforgeability was given.Secondly, the quadratic residue problem was used to realize the concrete construction of the proposed scheme, and the signature algorithm was designed in a logical step by combining Jacobi symbol operation.Finally, the security proofed that the scheme satisfied the confidentiality and unforgeability was given under the random prediction model.The efficiency analysis shows that compared with the existing identity-based signcryption scheme, the proposed scheme greatly improves the computing efficiency and has good characteristics of identity-based cryptosystem.…”
Get full text
Article -
14815
Cooperative spectrum sensing scheme against SSDF attack based on ESD test in radio network
Published 2016-10-01“…Firstly, the differential evolution algorithm and weighted gain combining soft decision scheme were combined to form an efficient node decision fusion mechanism. …”
Get full text
Article -
14816
Research on resource management and service mapping method for reconfigurable flexible network
Published 2012-08-01“…Reconfigurable flexible network (RFNet) based on resource re-composition was proposed.The network service in RFNet was composed of special components,and could construct the new network service to satisfy a coming traffic demand by component composition technology in both software and hardware area.After introducing the architecture of RFNet,a process flow mechanism of resource management,carraying network mapping and network service mapping was proposed.By simulation evaluation,the mechanism was confirmed to provide the support of heterogeneous networks construction and coexistence,and especially the reconfigurable service carrying network mapping(RSCNM)algorithm based on load balance had an advantage over network successful construction ratio(SCR),maximum node stress,average link utilization rate and average revenue.…”
Get full text
Article -
14817
AUTOMATIC DESIGNING OF POWER SUPPLY SYSTEMS
Published 2005-08-01“…Methodology and software correspond to the requirements of the up-to-date designing, describe a general algorithm of program process and also reveals properties of automatic designing system objects. …”
Get full text
Article -
14818
Complexity control method of random forest based HEVC
Published 2019-02-01“…High efficiency video coding (HEVC) has high computational complexity,and fast algorithm cannot perform video coding under restricted coding time.Therefore,a complexity control method of HEVC based on random forest was proposed.Firstly,three random forest classifiers with different prediction accuracy were trained to provide various coding configurations for coding tree unit (CTU).Then,an average depth-complexity model was built to allocate CTU complexity.Finally,the CTU coding configuration,determined by the smoothness,average depth,bit,and CTU-level accumulated coding error,was used to complete complexity control.The experimental results show that the proposed method has better complexity control precision,and outperforms the state-of-the-art method in terms of video quality.…”
Get full text
Article -
14819
Discretization Envelope Design Modeling Method of Rack and Pinion with Variable Ratio
Published 2019-01-01“…Based on this, a new numerical algorithm for tooth profile point extraction is proposed. …”
Get full text
Article -
14820
Strategy of routing based on layered for underwater wireless sensor networks
Published 2014-06-01“…Compared with DBR and Flooding by simulation, the layered-DBR algorithm can control the network redundancy, re-duce the network energy consumption, and prolong the network lifetime.…”
Get full text
Article