-
14861
Method for detecting collusion attack node in road condition information sharing based on reputation point
Published 2021-04-01“…Aiming at the problem that on occasion of the release of false road condition information by collusion nodes in the Internet of vehicles collaboratively, message authenticity could not be guaranteed in the process of road condition information sharing, a method for detecting collusion attack nodes in road condition information sharing based on reputation points was proposed.In the process of road condition information aggregation, a malicious information detection algorithm was designed to detect false messages issued by colluding nodes, which could ensure the authenticity and accuracy of messages delivered in the system.Experimental results show that the proposed method has higher detection efficiency for collusion nodes and adaption to a proportion of collusion nodes through security evaluation and experiments in comparison with the existing schemes.…”
Get full text
Article -
14862
Analysis of the System Composition and the Obstacle Ability of Hexapod Spider Crawling Robot
Published 2019-03-01“…The robot is composed of six mechanical legs and robot bodies,based on the Stm32f407 chip as the main controller,and uses the PID algorithm to control the whole robot to keep the balance,and completes the real-time response to the operation instruction through the image acquisition system. …”
Get full text
Article -
14863
Obfuscation of combination circuits of digital devices from unauthorized access
Published 2019-09-01“…We consider the formation of a common approach to solving problems of control and verification in the design of modern integrated circuits based on the analysis of fault models of structural realizations of digital devices, errors arising in the design process, as well as deliberate distortions during the design and manufacturing stages, i. e. creation and development of taxonomy of possible deviations in the project. The algorithm of logical obfuscation and coding of digital structures based on the use of methods and means of test diagnostics is proposed.…”
Get full text
Article -
14864
Reliable transmission mechanism with differentiated protection in virtualized fiber-wireless access network
Published 2019-03-01“…In view of the different reliability requirements of network service,a reliable transmission mechanism with differentiated protection was proposed in virtualized fiber-wireless access network.The quality of protection required by users and the fees that can be paid were used as a prerequisite.The backup protection resources were flexibly allocated by quantifying the multi-level protection quality with the probability of recovery.Then,for reducing traffic congestion and the unprotected services,the level service differentiation algorithm was used to choose protection link which was satisfied with the level of protection quality.The results show the proposed mechanism has more advantages in terms of long-term benefit-to-cost ratio and underlying network resource overhead,and provides users with a more flexible virtual network transmission while satisfying users’ reliability requirements.…”
Get full text
Article -
14865
Extending the Root-Locus Method to Fractional-Order Systems
Published 2008-01-01“…Three illustrative examples are presented to confirm the effectiveness of the proposed algorithm.…”
Get full text
Article -
14866
Robust secure design for relay wireless sensor networks with simultaneous wireless information and power transfer
Published 2017-06-01“…By studying the hidden convexity of the problem, we propose an iterative algorithm combining semi-definite relaxation and a gradient-based method. …”
Get full text
Article -
14867
Doppler Positioning Performance of LEO Mega Constellation
Published 2024-03-01“…This paper proposed a Doppler-only point-solution algorithm and analyzed the Doppler positioning performance based on the Starlink constellation.The Doppler positioning accuracy was about 3~6 m.To achieve the meter-level positioning accuracy, the satellite position and velocity errors should be within several meters and several centimeters per second, respectively.The ionospheric delay rates of C-band signal would cause about 2 m error in Doppler positioning.The positioning error would increase by dozens of meters if there were no corrections for the tropospheric errors.To ensure convergence in the LEO-based Doppler positioning, the initial receiver position error should be less than 300 km when the satellites orbit at an altitude of 550 km.…”
Get full text
Article -
14868
Botnet detection based on generative adversarial network
Published 2021-07-01“…In order to solve the problems of botnets’ strong concealment and difficulty in identification, and improve the detection accuracy of botnets, a botnet detection method based on generative adversarial networks was proposed.By reorganizing the data packets in the botnet traffic into streams, the traffic statistics characteristics in the time dimension and the traffic image characteristics in the space dimension were extracted respectively.Then with the botnet traffic feature generation algorithm based on generative adversarial network, botnet feature samples were produced in the two dimensions.Finally combined with the application of deep learning in botnet detection scenarios, a botnet detection model based on DCGAN and a botnet detection model based on BiLSTM-GAN were proposed.Experiments show that the proposed model improves the botnet detection ability and generalization ability.…”
Get full text
Article -
14869
Research on Green Transport Mode of Chinese Bulk Cargo Based on Fourth-Party Logistics
Published 2021-01-01“…This paper improves the particle swarm optimization algorithm to compare the integrated cost and carbon emissions of different bulk fourth-party transport networks to verify the benefits of the fourth-party logistics on bulk cargo transport networks’ cost reduction and emission reduction. …”
Get full text
Article -
14870
Research on deep differential fault analysis against MIBS
Published 2010-01-01“…The MIBS algorithm and its differential fault analysis principle were presented,then three differential fault analysis methods against MIBS were proposed based on different depth of fault model and verified through experiments.Experiment results demonstrate that due to its Feistel structure and S-box differential feature,MIBS is vulnerable to deep differential fault attack.The best result is that after injecting one 4-bit fault into the 30th round left register,both the fault location and fault differential are unknown,the 64-bit MIBS master key searching space can be reduced to 224 and be re-covered after one minute brute-force-search.Moreover,the fault analysis method can provide some ideas on differential fault analysis against other block ciphers using S-box.…”
Get full text
Article -
14871
Location Strategy for Traffic Emission Remote Sensing Monitors to Capture the Violated Emissions
Published 2019-01-01“…The problem is formulated into a graph theory problem, and then a novel adapted metaheuristic algorithm is used to solve the problem. The methodology, using a benchmark problem, has managed to solve the problem to the optimality. …”
Get full text
Article -
14872
MND for Helping People with Different Disabilities
Published 2014-07-01“…Smart phones are used to communicate with the sensor nodes to take instructions to navigate through the appropriate path. Dijkstra's algorithm is used for navigation. MND WSN also monitors the disabled person while navigating. …”
Get full text
Article -
14873
Fault diagnosis of nonlinear analog circuits using generalized frequency response function and LSSVM.
Published 2024-01-01“…In order to improve the training speed and reduces storage, a simplified LSSVM model is used to construct the classifier, and the conjugate gradient algorithm is used for training. The fault diagnosis simulation experiment is conducted on a biquad filter circuit to verify the proposed method. …”
Get full text
Article -
14874
Research of Real Time Optimization of Gear for DCT Vehicle Under the Ramp
Published 2018-01-01“…The value of slope is identified based on the EKF algorithm and the dynamics model of ramp. On the basis of ramp identification model and traditional shift schedule,a real time online optimization of dual clutch transmission( DCT) gear is presented based on fuzzy control method. …”
Get full text
Article -
14875
Robust H∞ Control of DC Motor in the Presence of Input Delay and Disturbance by the Predictor-Based Method
Published 2022-01-01“…The first-order model of a DC motor has been studied previously using PID and STA (super twisting algorithm) methods. However, in this paper, the delay-dependent robust H∞ controller is used on both the first and second orders of the DC motor. …”
Get full text
Article -
14876
Optimization of [C]Raclopride Positron Emission Tomographic Rat Studies: Comparison of Methods for Image Quantification
Published 2013-06-01“…In addition, filtered backprojection is recommended as a reconstruction algorithm, although iterative methods may be more sensitive to detect within-group differences.…”
Get full text
Article -
14877
Buffer-aided cooperative NOMA with power transfer
Published 2023-06-01“…To improve the throughput of multiuser simultaneous wireless information and power transfer systems, a buffer-aided cooperative non-orthogonal multiple access scheme with power transfer was designed to maximize the average throughput under the constraints of average/peak power, user’s rate, and the buffer stability.To reduce the optimization complexity, the Lyapunov’s method was introduced to convert the long-term average optimization problem into a series of time-discrete subproblems, and an adaptive transmission and resource allocation optimization algorithm was proposed, where the working mode, the user scheduling and the power allocation were dynamically optimized according to the time-varying channel/buffer state.Simulation results demonstrate that compared with the existing schemes, the proposed scheme can significantly enhance the average throughput whilst achieving the tradeoff between the delay and throughput.…”
Get full text
Article -
14878
An Intelligent Traffic Flow Control System Based on Radio Frequency Identification and Wireless Sensor Networks
Published 2014-05-01“…At the same time, the sensor analyzes and judges the information using an extension algorithm designed to achieve the objective of controlling the flow of traffic. …”
Get full text
Article -
14879
PROFILING OF THE HOB TOOL FOR WORM SHAFTS DEFORMATION
Published 2023-02-01“… The paper presents an algorithm for profiling the hob tool designed to generate by plastic deformation the worm shafts from the composition of worm-wheel gear type, used in the seat adjustment mechanisms of some Audi and Mercedes cars. …”
Get full text
Article -
14880
Improved segmented CRC assisted puncturing Polar decoding
Published 2019-03-01“…A segmented cyclic redundancy check (CRC) assisted decoding algorithm was proposed.This method makes use of the high parallelism of BP decoding and the high reliability of CRC verification,and uniformly or proportionally disperses CRC verification bits into the original information bits.Simulation results show that when the code length N is 1 024 and the SNR is 3.5 dB,the average iterations of segmented CRC(2,16×2)and CRC (2,24+8) are 2.7 and 2.8 times less than those of G matrix based decoding.When the code length M is 896,the two segmented methods with a bit error rate of 10<sup>-5</sup>obtained about 0.7 dB gain compared with the non-CRC assisted BP puncturing decoding.…”
Get full text
Article