-
15381
C3S:research of CI-based concurrent transmission strategy for intelligent sensing system
Published 2019-01-01“…Concurrent transmission technology has important sense for Intelligent Sensing System (ISS).The C3S strategy based with constructive interference (CI) was proposed.C3S was composed of intelligent clock synchronization layer,intelligent energy consumption allocation layer and intelligent parallel pipeline layer.The intelligent clock synchronization layer designed ICCA,a CI-based intelligent clock calibration algorithm.The intelligent energy allocation layer designed CIES,a energy adaptive scheduling scheme for CI,Moreover,a CI-based parallel pipeline CI2P was implemented in the intelligent parallel pipeline layer.The experimental results show that the C3S strategy can effectively improve the packet receiving rate of the concurrent transmission in ISS.It can also reduce the energy consumption of ISS and improve the channel utilization rate of ISS.…”
Get full text
Article -
15382
Novel DOA estimation method for coherent wideband LFM signals
Published 2012-03-01“…A novel direction of arrival (DOA) estimation method for coherent wideband linear frequency modulation (LFM) signals was proposed.Based on the dechirping property of LFM signal in fractional Fourier domain,a new array data model was constructed,then the matrix reconstruction and MUSIC algorithm were used to estimate the DOA of coherent LFM signals.If there were multiple groups of coherent LFM signals incident,separated them in different energy-concentrated domains first,then carried the DOA estimation on each of the groups.Owing to fully excavating the time-frequency information included in observed signals,this method has good resolution ability and anti-noise performance,and the number of DOA that can be resolved is also increased.In addition,this method has no array redundancy and aperture loss,and can be applied to arbitrary array manifold.Simulation results show that this method can obtain nearly 8dB signal-to-noise ratio gain compared with the conventional method.…”
Get full text
Article -
15383
EFFECT OF RANDOM FIBER DISTRIBUTION ON LONGITUDINAL COMPRESSIVE BEHAVIOR OF COMPOSITE MATERIALS
Published 2018-01-01“…Random fiber distribution may lead to randomness of longitudinal compressive behavior of fiber reinforced plastics(FRP).To mimic random fiber distribution over the cross-section,a new algorithm named Latin Hypercube Sampling based on Random Sequential Expansion(LHS-RSE) is proposed,which can simulate the random fiber distribution of FRP with fiber volume ratio as high as 70%.Then,3 D FE model with random fiber distribution of unidirectional fiber reinforced plastic T300/914 is developed in Abaqus/Standard to investigate the influence of random fiber distribution on the compressive behavior.It is shown that random fiber distribution over cross section greatly compromises the longitudinal compressive strength of FRP.Random distribution of longitudinal compressive strength resulted by random fiber distribution tends to follow normal or lognormal distribution.…”
Get full text
Article -
15384
Coordinated Control of Slip Ratio for Wheeled Mobile Robots Climbing Loose Sloped Terrain
Published 2014-01-01“…First, a slope-based wheel-soil interaction terramechanics model is built, and an online slip coordinated algorithm is designed based on the goal of optimal drive efficiency. …”
Get full text
Article -
15385
Retracted: Content-Based E-Commerce Image Classification Research
Published 2020-01-01“…Aiming at the problems of insufficient classification accuracy and long classification training time in e-commerce image classification, an adaptive momentum learning rate based LBP-DBN training algorithm–AML-LBP-DBN and commodity image classification method based on image local feature multi-level clustering and image-class nearest neighbor classifier are proposed. …”
Get full text
Article -
15386
Research and prospect of standard for biometric multi-modal fusion used with mobile devices
Published 2021-01-01“…Aiming at the problem of inconsistent biometric multi-modal fusion technology framework for mobile devices and lack of standards, a unified technical framework of multi-modal fusion standards was proposed.Firstly, the current status of standardization related to biometric used with mobile device was analyzed.Secondly, the local recognition and remote recognition application modes of mobile device biometrics standards were studied, and then four sub-multimodal fusion classification methods of multi-feature, multi-algorithm, multi-instance, and multi-sensor were analyzed and proposed.Then, four levels of multi-modal fusion were researched and proposed: sample-level fusion, feature-level fusion, score-level fusion, and decision-level fusion, and a standard technical framework for biometric multi-modal fusion for mobile devices was proposed.Finally, prospects for the application of biometric multi-modal fusion technology were given.…”
Get full text
Article -
15387
La chasse aux fantômes sur YouTube. Approche ethnographique et quali-quantitative des commentaires des vidéos
Published 2019-12-01“…Drawing on public data from four YouTube channels featuring paranormal investigations in haunted places, the analysis highlights the social and technical injunctions (social expectations, algorithm), the common contributors to several chains, and the social function of the comments. …”
Get full text
Article -
15388
Understanding the Person through Narrative
Published 2011-01-01“…A narrative approach stands in contrast to a yes/no algorithmic process in conversing with clients. Eliciting stories illustrates the social context of events, and implicitly provides answers to questions of feeling and meaning. …”
Get full text
Article -
15389
Optimal approach of suppressing WSN malware propagation based on cloud computing and dynamic Bayesian game
Published 2018-09-01“…To apply intrusion detection system (IDS) efficiently so as to suppress WSN malware propagation,a cloud-based network infrastructure for realizing functions of WSN IDS was presented,considering the real basis that the resources of WSN nodes were limited whilst the resources of cloud computing platform were almost unlimited.Based on the analysis of the game process between a sensor node and the corresponding WSN IDS agent,a WSN-malware-propagation-suppression game model was constructed by employing the dynamic Bayesian game,and the requirements of energy consumption in sending monitored data and privacy protection for sensor nodes were satisfied.According to the proposed game type and refined Bayesian equilibrium,the optimal strategie for suppressing WSN malware was proposed as well the algorithm for actual application was given.The factors that influence WSN IDS agents to select their optimal strategies were analyzed,and the experimental foundation was provided for the application of the proposed approach.…”
Get full text
Article -
15390
Designing a Fresh Food Supply Chain Network: An Application of Nonlinear Programming
Published 2013-01-01“…This paper develops an algorithm to solve the nonlinear problem, provides numerical analysis to illustrate the proposed solution procedure, and discusses the effects of various system parameters on the decisions and total profits. …”
Get full text
Article -
15391
Spatiotemporal Correlation Representation based Precise Resource Management in Space-Air-Ground Integrated Network
Published 2024-06-01“…In the space-air-ground integrated network, resources are unevenly distributed and dynamically change over time.Traditional optimization scheduling methods based on static resource representation only optimize scheduling within a single time slot, leading to low resource utilization.Moreover, frequent strategy adjustments are required when the network changes, resulting in significant migration costs.To address this issue, this paper proposed a method for spatiotemporal correlation representation of resources in the space-air-ground integrated network.This method computed node attention representations in both structural neighborhoods and chronological neighborhoods, enabled precise modeling of spatiotemporal resource correlations in the space-air-ground integrated network.Based on this, this paper proposed a resource precise embedding method based on spatiotemporal correlation representation, and introduced the trust region policy optimization method to adaptively learn and optimize algorithm parameters.…”
Get full text
Article -
15392
Two-step ranging based on energy detection for IR-UWB sensor networks
Published 2009-01-01“…In order to design a low computational and cost ranging method for the IR-UWB (impulse radio ultra wideband) wireless sensor network, a two-step DP (direct path) component TOA (time of arrival) estimation algorithm based on energy detection was proposed. The first step was to determine DP energy block in which located by GLRT (generalized likelihood ratio test). …”
Get full text
Article -
15393
Heterogeneous multi-layer mobile edge computing for 6G
Published 2020-03-01“…With the development of the Internet of things,multiple real-time applications will emerge in future 6G communication network.Driven by demands on low-latency services of multiple real-time applications,mobile edge computing (MEC) will become an important technology to improve the user experience and reduce the network cost.However,the computing capacity of a single MEC server is limited,which induces that it is difficult to meet the low-latency requirement of data processing for the computation-intensive applications.A heterogeneous multi-layer mobile edge computing (HetMEC) network architecture was proposed to jointly utilize the computing and transmission resources of both the cloud computing center and multi-layer MEC servers.By reasonably dividing and offloading computing tasks,reliable and efficient computing services were provided for edge applications.Simulation results show that the proposed algorithm could effectively reduce the processing latency,improve the network processing rate and robustness.…”
Get full text
Article -
15394
Self-adaptive price adjustment strategy based on market mechanism in distributed environment
Published 2016-02-01“…The theoretical ana is proved the effectiveness of the pricing strategy, and the algorithm of the pricing strategy was designed. Resources information in the real distributed systems was used as the performance parameters of experimental node in the sim lation experiments, and the performance of the adaptive pricing strategy was tested in a large-scale grid mission. …”
Get full text
Article -
15395
Hiss noise reduction method used for audio signals based on AAC bit-stream
Published 2013-05-01“…A hiss noise reduction method used for audio signals based on AAC bit-stream in compressed domain was proposed.The input was AAC bit-stream derived from noisy audio signals,and the output was the enhanced AAC bit-stream used for decoder.First,Hiss noise was estimated by modified median absolute deviation (MMAD).Second,the auditory masking threshold and the masking parameters were calculated by modified discrete Flourier transform (MDFT).Finally,the parametric soft-thresholding method was employed to obtain the enhanced AAC bit-stream which was used to get the enhanced audio signals at AAC decoder.The objective and subjective quality testing results indicate that the proposed algorithm can effectively remove the Hiss noise derived from AAC bit-stream of audio signals and ob-viously outperforms the existing hiss noise reduction methods.…”
Get full text
Article -
15396
Elementi di interfaccia per l’analisi di strutture murarie
Published 2013-04-01“…Some numerical applications are performed in order to assess the performances of the proposed model and algorithm in reproducing the nonlinear response of masonry material due to damage localization. …”
Get full text
Article -
15397
Optimal Planning of Distributed Sensor Layouts for Collaborative Surveillance
Published 2013-04-01“…In particular, we develop a genetic algorithm solution to find spatial sensor density functions that maximize effectiveness against moving targets, where the surveillance performance of individual sensors is dependent on their absolute position in the region as well as their relative position to both the expected target(s) and any asset that is being protected. …”
Get full text
Article -
15398
Multidimensional detection and dynamic defense method for link flooding attack
Published 2019-08-01“…Aiming at the shortcomings of the existing link flooding attack defense methods,a multi-dimensional index detection algorithm is proposed,which performs multi-dimensional detection on the abnormal forwarding links through the five-dimensional elements of connection length,low-speed ratio of data packets,uniformity of data packet distance,average low-speed ratio of data packets,and change rate of low-speed ratio of data packets,thus effectively solving the problem of high false alarm rate of the existing detection methods.Furthermore,a controller switch dynamic deployment method based on coloring theory is proposed,which solves the problem of difficult to be actually deployed in the actual environment with limited switch variant types existing in the existing defense mitigation mechanisms.Experimental analysis show the feasibility of the proposed method.…”
Get full text
Article -
15399
Person re-identification using mid-level features with vertical global appearance constraint
Published 2017-04-01“…Mid-level features with the semantic information can provide stronger discrimination in the person re-identification than low-level features.But like the low-level features,the mid-level features also use local feature matching methods and easily leads mismatch problem when different pedestrians have similar appearance features in some local areas.Considering the same pedestrians are more similar than different pedestrians in the vertical direction since pedestrians are almost always in a standing position,global vertical appearance constraints was introduced.Furtherly,a method for person re-identification was proposed which fuses the low-level densely patch-matching and the mid-level features with the global vertical appearance constraints.Experimental results show that the proposed algorithm can achieve a higher hit rate than the existing methods on the most challenging public VIPeR database and CUHK01 database.…”
Get full text
Article -
15400
A flexible continuous-wave quantum cryptography scheme with zero-trust security for Internet of Things
Published 2022-11-01“…As quantum computing techniques develop rapidly, the security of classical communication, which is usually based on public key encryption algorithm, is under great threat. Therefore, a key establishment method with physics base is demanding, especially for Internet of Things devices, where energy and computational power is quite limited. …”
Get full text
Article