-
16241
Secure and collaborative spectrum sensing scheme based on audit game
Published 2023-12-01“…To defend against poisoning attacks and free-riding attacks conducted by malicious sensing terminals in crowd sensing-based collaborative spectrum sensing (CCSS), a novel audit game-based defense scheme was proposed, which combined the pre-deterrence and post-punishment mechanisms.Firstly, considering the audit budget constraint, a mixed-strategy audit game model under incomplete information was designed, which set a penalty strategy to deter malicious collaborators before spectrum sensing, and audited and punished them after the fusion of sensing data.Then, a lightweight audit chain model with on-chain and off-chain collaboration was designed, in which audit evidence was stored in an off-chain data warehouse and its metadata was publicly published on the blockchain.Furthermore, a distributed and intelligent audit algorithm based on reinforcement learning was devised to adaptively seek the approximate mix-strategy equilibrium of the audit game.Simulation results demonstrate that the proposed scheme can quickly obtain the stable and approximately optimal audit strategies and actively suppress the poisoning and free-riding behaviors of malicious collaborators, in comparison with conventional schemes.…”
Get full text
Article -
16242
Elliptic-Curve Cryptography Implementation on RISC-V Processors for Internet of Things Applications
Published 2024-01-01“…In this study, the implementation and analyze the Elliptic Curve Digital Signature Algorithm (ECDSA) with NIST-256 on MicroBlaze processors based on RISC-V architecture. …”
Get full text
Article -
16243
Establishment and performance analysis of RIS-assisted coded relay cooperation system based on LDPC product codes
Published 2023-11-01“…To pursue the ultra-reliable information transmission, the system which combined the reconfigurable intelligent surface (RIS) technology and coded relay cooperation technology was investigated.The RIS-assisted coded relay cooperation system model based on low density parity check (LDPC) product codes was established.Based on LDPC product codes, the information matrix was row-encoded by the source node and column-encoded by the relay node, respectively.An efficient joint iterative decoding algorithm was proposed.The two received signals at the destination were row-decoded and column-decoded iteratively to update the logarithmic likelihood ratios of information bits, and then the decoding decision was made.The closed-form solutions of the outage probability and the channel capacity with finite codelength were theoretically derived.Theoretical analysis and simulation results show that the proposed system obviously outperforms the traditional coded relay cooperation.The more number of RIS elements, the more significant advantage can be obtained.Simulation results also demonstrate that the channel capacity with finite codelength approaches the ideal channel capacity with the codelength of LDPC product codes increasing.…”
Get full text
Article -
16244
Application of Variational Mode Decomposition and Multiscale Permutation Entropy in Rolling Bearing Failure Analysis
Published 2022-01-01“…The training samples and test samples of each IMF are constructed, and then the support vector machine (SVM) and the K-nearest neighbor algorithm (KNN) are used to identify the faults. The test results of the IMF components are used to determine the classification results combined with the maximum attribution index. …”
Get full text
Article -
16245
Study on multi-satellite cooperative spectrum cognitive method integrating Stackelberg game and federated learning
Published 2024-02-01“…To solve the problem of the weak spectrum-cognitive ability caused by monitoring angle, direction resolution, limited processing ability and peak power for a low-earth-orbit (LEO) satellite, a multi-satellite cooperative spectrum cognitive method integrating Stackelberg game and federated learning was proposed.Firstly, considering the available computing resource, cognitive performance, processing and transmission delay of each spectrum cognitive satellite, a cooperative-satellite selection and computing-resource allocation algorithm was built for multiple spectrum-cognitive tasks.Secondly, based on the selected satellites and the allocated computing resources, a low-complexity multi-satellite cooperative spectrum cognitive strategy was further designed, which could automatically sense the spectrum holes, and detect interference as well as identify the modulation mode.Simulation results demonstrate that compared to the single-node cognitive method, the designed multi-satellite cooperative spectrum cognitive strategy can obtain a better cognitive performance.Moreover, comparing with the existing model, the model utilized in the designed strategy can effectively achieve 96.69% and 93.32% lower number of parameters and required floating point operations per second, whilst maintaining the performance.…”
Get full text
Article -
16246
Active Learning for Constrained Document Clustering with Uncertainty Region
Published 2020-01-01“…In this paper, a new constrained clustering algorithm is proposed and some of the informative data pairs are selected during an iterative process. …”
Get full text
Article -
16247
Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage
Published 2024-09-01“…A blockchain-based verification algorithm was designed to detect tampering of third-party data. …”
Get full text
Article -
16248
Credit Index Screening Model of Family Farms and Family Ranches Based on Fuzzy Bayesian Theory of Depth Weighting
Published 2022-01-01“…In this paper, based on the depth-weighted Bayesian theory and fuzzy mathematics, the improved depth-weighted fuzzy Bayesian hybrid algorithm model is proposed to solve the unbalanced problem of default status of family farm and pasture and to build the index system with the ability of three categories of default identification. …”
Get full text
Article -
16249
MM-LoRa-Mod: A non-coherent LoRa modulation scheme for underwater acoustic communications
Published 2024-09-01“…Additionally, for underwater acoustic communication scenarios, a low-complexity non-coherent detection algorithm for MM-LoRa-Mod was introduced. Through the evaluation of MM-LoRa-Mod’s bit error rate performance in multipath channels, Watermark underwater acoustic channels, and shallow water acoustic channels, excellent anti-multipath fading and anti-Doppler frequency shift capabilities were demonstrated, indicating the high reliability of MM-LoRa-Mod in underwater acoustic communication scenarios.…”
Get full text
Article -
16250
Passive forensic based on spatio-temporal localization of video object removal tampering
Published 2020-07-01“…To address the problem of identification of authenticity and integrity of video content and the location of video tampering area,a deep learning detection algorithm based on video noise flow was proposed.Firstly,based on SRM (spatial rich model) and C3D (3D convolution) neural network,a feature extractor,a frame discriminator and a RPN (region proposal network) based spatial locator were constructed.Secondly,the feature extractor was combined with the frame discriminator and the spatial locator respectively,and then two neural networks were built.Finally,two kinds of deep learning models were trained by the enhanced data,which were used to locate the tampered area in temporal domain and spatial domain respectively.The test results show that the accuracy of temporal-domain location is increased to 98.5%,and the average intersection over union of spatial localization and tamper area labeling is 49%,which can effectively locate the tamper area in temporal domain and spatial domain.…”
Get full text
Article -
16251
Control of Temperature and Aluminum Fluoride Concentration Based on Model Prediction in Aluminum Electrolysis
Published 2014-01-01“…This paper developed a new kind of algorithm to control the temperature and AlF3 concentration of electrolyte for 300 kA prebake aluminum production cells by altering the setting cell voltage and the AlF3 adding rate. …”
Get full text
Article -
16252
SDFMUCR: Software-defined and fuzzy-based multi-hop unequal cluster routing
Published 2020-10-01“…Researchers give more and more attention to the design of the routing algorithm. Cluster routing is the most popular routing protocol in wireless sensor networks. …”
Get full text
Article -
16253
FAULT DIAGNOSIS OF GEARBOX BASED ON ADAPTIVE EEMD AND FAST KURTOGRAM
Published 2022-01-01“…To solve the problem that the amplitude of the added white noise and the number of ensemble trials to the ensemble empirical mode decomposition algorithm depend too much on subjective experience or multiple attempts, which is more subjective and blind, a fault diagnosis method based on adaptive EEMD and Fast Kurtogram is proposed. …”
Get full text
Article -
16254
Topology aggregation model based on focus folding for network simulation
Published 2012-07-01“…High resource consumption is the main problem of large-scale network simulation,to solve this problem,the topology aggregation model based on focus folding for network simulation was put forward.According to the abstract coefficients,the terminal node abstract,tree shrinking,and cut-edge abstract algorithm was adopt to abstract the topology.The test results show that,this technology can reduce the router node about 30 percent,the link between routers about 13.74 percent,total node about 98.48 percent,and total link about 96.1 percent.Simulating DDoS on the topology with 2.5 million nodes only need 400s time and 2 710MB memory.Take Shandong topology as an example to simulate DDoS,after abstracted,simulation memory and time have been reduced about 75.34 percent and 91.76 percent respectively.Take Beijing topology as an example to simulate worm,after abstracted,simulation memory and time have been reduced about 68.84 percent and 38.64 percent respectively,which prove that this mode can improve the simulation scale and efficiency and decrease the resource consumption and running time of simulation.…”
Get full text
Article -
16255
Ranking Influential Nodes in Complex Networks with Information Entropy Method
Published 2020-01-01“…However, these methods offer a limited improvement in algorithm performance because diversity between different attributes is not properly considered. …”
Get full text
Article -
16256
Distributed IOS-SM transmission scheme with joint antenna and IOS unit selection for high-speed railway scenario
Published 2023-04-01“…A distributed intelligent omni-surface (IOS) -assisted spatial modulation (SM) transmission scheme was proposed to address the problem of transmission rate degradation caused by the high signal penetration loss in closed carriages in the high-speed railway scenarios.Firstly, SM technology was utilized to ensure that the indexed information section was not affected by penetration loss.Then, to reduce the high path loss and power loss of the long-range IOS windows, the distributed IOS was selected by traversal algorithm according to the principle of maximizing the received signal-to-noise ratio, and the best IOS window was activated to transmit the SM modulated information.Finally, to reduce the impact of the missing direct view path gain on the overall system performance, the antenna removal principle and the sequential selection method were used to dynamically and selectively activate the receiving antenna and IOS unit under the power consumption model.The simulation results show that the proposed scheme is more suitable for the high-speed railway wireless communication scenario than the conventional relay-forwarding and reconfigurable intelligence surface -SM (RIS-SM) schemes.And with the power loss model, the distributed IOS-SM scheme chosen by the combined antenna and IOS unit is still able to guarantee high performance transmission of the system.…”
Get full text
Article -
16257
Feature Extraction for Evaluating the Complexity of Electromagnetic Environment Based on Adaptive Multiscale Morphological Gradient and Nonnegative Matrix Factorization
Published 2022-01-01“…In this paper, a feature extraction method for electromagnetic environmental signals based on adaptive multiscale morphological gradient filtering and a nonnegative matrix factorization algorithm is proposed. First, the electromagnetic environment signal is filtered by AMMG, and then the filtered signal is processed by NMF for feature extraction. …”
Get full text
Article -
16258
Development and Performance Analysis of Pneumatic Soft-Bodied Bionic Actuator
Published 2021-01-01“…Based on Yeoh’s second-order constitutive model of silica gel, the deformation analysis model of the actuator is established, and the rationality of the structure design and motion forms of the actuator and the accuracy of the deformation analysis model are verified by using the numerical simulation algorithm. According to the physical model of the pneumatic soft-bodied bionic actuator, the motion and dynamic characteristics of the actuator are tested and analyzed, the curves of motion and dynamic characteristics of the actuator are obtained, and the empirical formula of the bending angle and driving torque of the actuator is fitted out. …”
Get full text
Article -
16259
Feature enhancement and bilinear feature vector fusion for text detection of mobile industrial containers
Published 2022-07-01“…In the real factory environment, due to factors such as dim light, irregular text, and limited equipment, text detection becomes a challenging task.Aiming at this problem, a feature vector fusion module based on bilinear operation was designed and combined with feature enhancement and semi-convolution to form a lightweight text detection network RGFFD (ResNet18 + Ghost Module + FPEM(feature pyramid enhancement module)) + FFM(feature fusion module) + DB (differentiable binarization)).Among them, the Ghost module was embedded with a feature enhancement module to improve the feature extraction capability, the bilinear feature vector fusion module fused multi-scale information, and an adaptive threshold segmentation algorithm was added to improve the segmentation capability of the DB module.In the real industrial environment, the RGFFD detection speed reached 6.5 f/s, when using the embedded device UP2 board for text detection of container numbers.At the same time, the detection speed on the public datasets ICDAR2015 and Total-text reached 39.6 f/s and 49.6 f/s, respectively.The accuracy rate on the custom dataset reached 88.9%, and the detection speed was 30.7 f/s.…”
Get full text
Article -
16260
Obstacle Avoidance Path Planning for Double Manipulator based on Improved Artificial Potential Field Method
Published 2020-03-01“…An obstacle avoidance path planning algorithm based on improved artificial potential field method is proposed for dual 6-DOF manipulator. …”
Get full text
Article