-
14881
Delay-aware cross-layer optimization method for FANET
Published 2018-04-01“…An asynchronous distributed cross-layer optimization (ADCO) method was proposed to solve the problem of jointly considering real-time routing,rate allocation and power control in FANET (flying ad hoc network).And a delay-constrained cross-layer optimization framework was designed to formally represent proposed problem.Then Lagrangian relaxation and dual decomposition methods was used to divide joint optimization problem into several sub-problems.ADCO allowed each relay node to perform the optimization operation for different sub-problems with local information,and the relay nodes could update the dual variables based on asynchronous update mechanism.The simulation results show that the proposed algorithm can improve the network performance effectively in terms of energy efficiency,packet timeout ratio and network throughput.…”
Get full text
Article -
14882
Kinematics Analysis of 3T1R 4-PRP<sub>a</sub>U Parallel Mechanism
Published 2020-11-01“…In accordance with the condition of rod length, the model of positional forward solution is established, then it is transformed into an unconstrained optimization problem and solved by differential evolution algorithm. The analytical expression of the inverse solution of mechanism position is derived and the correctness of the forward displacement of mechanism position is verified by using the inverse solution of mechanism position. …”
Get full text
Article -
14883
RS regenerating codes for cloud storage fault-tolerant system
Published 2016-10-01“…RS(Reed-Solomon) regenerating erasure codes was proposed for cloud storage fault-tolerant system,which not only inherited the reliability of the RS encoding,but also achieved the high efficiency of tolerance three faults.Hybrid recovery method of the single fault node based on RS regenerating erasure codes was introduced.And the theoretical lower bound of the number of accessing disks was computed.In theory,the performance evaluation of the storage overhead,decoding efficiency,and repair bandwidth of the RS regenerating erasure codes was carried out.Experiments results show that the repair performance of RS regenerating erasure codes is improved greatly than the similar erasure codes,and the total recovery time of the system is reduced by 20.8%~28.2% using hybrid recovery algorithm in the case of single fault.…”
Get full text
Article -
14884
SSDHT:social network-based secure DHT mechanism
Published 2018-11-01“…P2P systems have been widely used in the field of file sharing,etc.However,DHT (distributed hash table) networks have no center,no authentication,and lack of node authentication mechanism,making existing DHT-based P2P systems vulnerable to external attacks such as Sybil attacks.A DHT security enhancement mechanism based on social network was proposed,which introduced the trust relationship of nodes in the social network into the DHT network to improve the recognition ability of Sybil nodes.The KAD (Kademlia) algorithm was used as an example to verify the experiment.Experimental results based on Facebook and Twitter datasets show that the proposed security mechanism is suitable for large-scale dynamic networks and can effectively defend against Sybil attacks.…”
Get full text
Article -
14885
Optimization Analysis of Large Workspace/Rod Length of 8-SPU Redundant Mechanism
Published 2018-01-01“…Finally,the ratio of the volume with stroke of the rod is taken as the objective function,and particle swarm optimization algorithm is used to get the maximum function value. …”
Get full text
Article -
14886
Vector Bond Graph Method of Kineto-static Analysis for Planar Multi-body System with Gear Pair
Published 2015-01-01“…In order to increase the reliability and efficiency of the kineto-static analysis of complex planar multi-body system,the corresponding vector bond graph method is proposed.According to the kinematic constraint condition,the vector bond graph model of a gear pair with arbitrary tooth profile of tooth is built.Based on this,the theoretical method to build the planar multi-body systems model with gear pair by vector bond graph is given.For the algebraic difficulties brought by differential causality and nonlinear junction structure in modeling and kineto-static analysis of planar multi-body systems with gear pair,the effective bond graph augment method is proposed.By the corresponding algorithm,the computer aided modeling and kineto-static analysis of planar multi-body system with gear pair on a computer is realized,the validity of this method is illustrated.…”
Get full text
Article -
14887
Channel estimation of UFMC system in multipath channel
Published 2018-04-01“…As a candidate waveform of 5G,universal filter multi-carrier (UFMC) technology could inhibit out-of-band radiation,achieve loose synchronization and well support the short bursts of things in the transmission.However,in the UFMC transmission without cyclic prefix (CP),inter-symbol interference (ISI) and subcarrier interference (ICI) are generated in the multipath fading channel,which will affect the estimation accuracy in channel estimation.The interference of the UFMC system in multipath channel was firstly analyzed.After using the feedback equalization suppression ISI,the self-elimination algorithm was used to suppress the ICI according to the similarity between adjacent carriers,and the pilot coefficients were designed according to the UFMC system.Finally,the simulation results show that the proposed method applied to the UFMC can suppress the interference,improve the accuracy and reduce the bit error rate.…”
Get full text
Article -
14888
Human Activity Recognition Based on the Hierarchical Feature Selection and Classification Framework
Published 2015-01-01“…Every classifier used the Least Squares Support Vector Machine (LS-SVM) and Naive Bayes (NB) algorithm to distinguish different activity classes. …”
Get full text
Article -
14889
Link prediction methods based on generalized common neighbor in directed network
Published 2020-10-01“…Link prediction aims to predict missing or future links through currently observed information of network.Existing mainstream methods are mostly applied to undirected network,and some methods designed for directed network ignored the diverse heterogeneous features of common neighbor.For this problem,a generalized common neighbor algorithm was proposed.Firstly,a generalized common neighbor was defined for the directed network.Then the degree of contribution of different structures was measured by the joint edge probability of the directed neighbor isomers,and the existing undirected local similarity index is improved by the new definition,redefining eight kinds of directed similarity indicators based on generalized common neighbor.Experiments on 12 datasets show that proposed method generally improves the performance of existing predictive indicators under two metrics.…”
Get full text
Article -
14890
Channel estimation method based on compressive sensing for FBMC/OQAM system
Published 2019-12-01“…In mobile-to-mobile sensor networks,the channel estimation for FBMC/OQAM system can be investigated as a compressive sensing problem to raise frequency spectrum efficiency by exploiting the sparse nature of wireless channels.Firstly,a novel orthogonal matching pursuit algorithm with selection weak strategy and regularization based on Tanimoto coefficient (T-SWROMP) was proposed to improve the accuracy of LS channel estimation.Then,T-SWROMP methods with auxiliary pilot and coding were used to estimate channel frequency response for FBMC/OQAM system.The experimental results demonstrate the proposed method has lower complexity than the traditional SWOMP method.In addition,it achieve best performance among the traditional OMP,SWOMP and ROMP methods under dual-selective channels.…”
Get full text
Article -
14891
Provable Data Recoverability and Hide-Able Access Pattern Based ORAM
Published 2013-12-01“…The data possession was verified to utilize homomorphic hash algorithm. The adversary can not obtain useful information from the client access data pattern, and the data privacy is guaranteed.…”
Get full text
Article -
14892
Liouville Theorem for Some Elliptic Equations with Weights and Finite Morse Indices
Published 2016-01-01Get full text
Article -
14893
Research on Anti-Trojan Malware Mechanism Based on Characteristic Behavior
Published 2014-11-01“…Once the application was considered as Trojan malware, the system would dispatch the appropriate algorithm for processing. The mechanism triggered by sensitive behaviors, and had the active prevention function and self-learning function. …”
Get full text
Article -
14894
An efficient cooperative message authentication based on reputation mechanism in vehicular ad hoc networks
Published 2019-06-01“…In the proposed scheme, reputation model is used to assess authentication efforts of vehicles, which enhances initiative for cooperative message authentication and inhabits selfish behavior; sequence optimization algorithm solves messages overflowing on condition limited computation of onboard unit and improves the speed of message authentication at the premise of ensuring the reliability of message authentication. …”
Get full text
Article -
14895
The Approximate Solution of Some Plane Boundary Value Problems of the Moment Theory of Elasticity
Published 2016-01-01“…Based on the general solution, an algorithm of constructing approximate solutions of boundary value problems is developed. …”
Get full text
Article -
14896
MAXGDDP:decision data release with differential privacy
Published 2018-03-01“…Specialization-based private decision data release has attracted considerable research attention in recent years.The relation among hierarchical node,taxonomy tree,and budget allocation directly constrains the accuracy of data release and classification.Most existing methods based on hierarchical specialization cannot efficiently address the above problems.An effective method was proposed,called MAXGDDP to publish decision data with specialization.MAXGDDP employed MAX index attribute selection algorithm to select the highlight concept for furthering specialization in each hierarchy.Besides,for making more rational use of privacy budget,MAXGDDP relied on geometric strategy to allocate the privacy budget in each hierarchy.Compared with existing methods such as DiffGen on the real datasets,MAXGDDP outperforms its competitors,achieves data privacy and the better result of classification simultaneously.…”
Get full text
Article -
14897
The Genetic Landscape of Human Glioblastoma and Matched Primary Cancer Stem Cells Reveals Intratumour Similarity and Intertumour Heterogeneity
Published 2019-01-01“…Pearson correlation and K-means algorithm were exploited to compare genetic alterations and to group similar genetic profiles in matched pairs of GBM and derived GSCs. …”
Get full text
Article -
14898
Are Suggested Hiking Times Accurate? A Validation of Hiking Time Estimations for Preventive Measures in Mountains
Published 2025-01-01“…Real-world hiking times were compared with estimations from Komoot, Outdooractive, mountain signage, and the MOVE algorithm, which incorporates individualized biological and trail characteristics. …”
Get full text
Article -
14899
An autonomous navigation method for orchard mobile robots based on octree 3D point cloud optimization
Published 2025-01-01“…According to the sparsity and density of the point cloud, the 3D orchard map is adaptively divided and the key information of the orchard is retained. 2) In terms of path planning, by using octree nodes as the unit nodes for RRT* random tree expansion, an improved RRT* algorithm based on octree is proposed. Field experiments were conducted in a pear orchard based on this method. …”
Get full text
Article -
14900
Intelligent Control Using Metaheuristic Optimization for Buck-Boost Converter
Published 2020-01-01“…PI controller is developed using metaheuristic optimization, an artificial fish-swarm algorithm (AFSA). In testing, the buck-boost converter is controlled by the PI controller at a reference voltage of 14 V and supplied with an input voltage Vin in the range of 5–100V. …”
Get full text
Article