Showing 61 - 80 results of 415 for search 'cooperation research algorithm', query time: 0.13s Refine Results
  1. 61
  2. 62

    Cooperative Formation Control of Multiple Ships with Time Delay Conditions by Wei Tao, Jian Tan, Zhongyi Sui, Lizheng Wang, Xin Xiong

    Published 2025-03-01
    “…The cooperative control of multiple autonomous surface vehicles (ASVs) is a critical area of research due to its significant applications in maritime operations, such as search and rescue and environmental monitoring. …”
    Get full text
    Article
  3. 63
  4. 64
  5. 65
  6. 66

    Two-party cooperative blind signature based on SM2 by Xue BAI, Baodong QIN, Rui GUO, Dong ZHENG

    Published 2022-12-01
    “…SM2, issued by China in 2010, is a public key cryptography standard based on elliptic curves.It has been widely used in finance, social security and other fields thanks to its advantages of improved signature efficiency, decreased storage space and computing complexity than RSA.With the popularization and application of SM2, the issues of its key security and data privacy are of great concern.The single-key mode inhibits the potential application in multi-user settings, and the leakage of the key will threaten the security of the entire cryptosystem due to the centralization.The problem of secure storage and reasonable utilization of keys needs to be solved urgently.In addition, the SM2 digital signature algorithm cannot guarantee the message privacy.Aiming at the issues of key security and data privacy of the signature algorithm, many researchers have proposed the idea of cooperative signature and blind signature for SM2.However, there isn’t SM2 collaborative blind signature scheme proposed.Then a two-party cooperative blind signing protocol based on SM2 was proposed in this paper, which allowed two parties to sign except the user.The signing process did not require recovering the complete private key, while not revealing the information of the partial private key and secret number.The key was stored separately to improve the security of the key, while the blind signature protected the privacy of the message.In terms of security, the protocol satisfied unforgeability and unlinkability.The protocol was implemented using C to demonstrate the efficiency of each participant’s local operation.In the honest model, the time cost of each entity in the cooperative signature phase was similar as that of executing a lightweight SM2 blind signature.Overall, the proposed protocol has certain advantages in terms of function and efficiency.…”
    Get full text
    Article
  7. 67

    Survey on SSDF attack and defense for distributed cooperative cognitive radio by Guangyue LU, Hang SU

    Published 2017-01-01
    “…Cooperative spectrum sensing (CSS) improves the reliability of spectrum sensing,however,it is susceptible to spectrum sensing data falsification (SSDF) due to the fusion mechanism.To insight into the current research and development trend of defense strategy against the SSDF attack,several typical distributed strategies were concluded and the types of distributed algorithms were analyzed in several aspects.Finally,the future research of SSDF distributed defense strategy was prospected based on the problems found in the current research.…”
    Get full text
    Article
  8. 68

    Foreign Economic Cooperation between Russia and Vietnam in the Context of Regional Integration by N. O. Yakushev

    Published 2025-01-01
    “…The study employs methods of comparison, interpretation, and identification of functional links. Specifically, the research follows a step-by-step algorithm comprising five stages: data collection and structuring, analysis of product groups, identification of critical Russian exporting regions, evaluation of regional export specifics, and developing recommendations for further cooperation. …”
    Get full text
    Article
  9. 69

    Improvement and Optimization of Feature Selection Algorithm in Swarm Intelligence Algorithm Based on Complexity by Bingsheng Chen, Huijie Chen, Mengshan Li

    Published 2021-01-01
    “…The experiment found that the performance of students under the feature selection algorithm is about 30% higher than other teaching methods, and the awareness of cooperation between students reaches 0.8. …”
    Get full text
    Article
  10. 70
  11. 71
  12. 72

    Multi-satellite cooperative beam hopping resource allocation based on interference perception by Jinlong HU, Jihong LIU, Yiqing ZHOU, Huan CAO, Zifan LIU, Jiawei ZHAO, Jinhong YUAN

    Published 2023-08-01
    “…Beam hopping (BH) technology is one of effective ways to solve limitation of beam resources and enhance the system coverage ability of low earth orbit (LEO) satellite systems.Existing research typically considers beam hopping resource allocation for a single LEO satellite, however, the actual LEO system is covered by multiple satellites in multiple orbits, and existing research ignores beam interference between satellites, which can easily lead to a decrease in system throughput and service quality.To address these issues, this paper designs an interference aware cooperative resource allocation for LEO with beam hopping (IARA-BH), aiming to maximize the beam service satisfaction (BSS).A BH resource allocation scheme by multi satellite interference coordination based on simulated annealing algorithm (MSIC-SAA) is proposed to solve the optimization problem.Simulation experiments show that compared to beam hopping resource allocation schemes that only consider a single satellite, the BSS of the MSIC-SAA algorithm has been improved by 47.24%, the average signal to interference noise ratio (SINR) has been improved by 27.40%, and the system throughput has been improved by 22.92%.…”
    Get full text
    Article
  13. 73

    Wireless-powered cooperative energy aware anycast routing in wireless sensor networks by Fazle Hadi, Sheeraz Ahmed, Abid Ali Minhas, Abdulaziz Al Mazyad, Najam ul Islam, Imran Ahmed, Nadeem Javaid

    Published 2016-11-01
    “…Results further reveal that our proposed algorithm has improved energy consumption in comparison to the non-cooperative energy aware anycast scheme and the cooperation-based robust cooperative routing protocol scheme. …”
    Get full text
    Article
  14. 74

    BESO Topology Optimization Driven by an ABAQUS-MATLAB Cooperative Framework with Engineering Applications by Dong Sun, Xudong Yang, Hui Liu, Hai Yang

    Published 2025-04-01
    “…The Bi-directional Evolutionary Structural Optimization (BESO) method, owing to its algorithmic simplicity and strong scalability, has emerged as one of the most prevalent topology optimization methodologies in current research and industrial applications. …”
    Get full text
    Article
  15. 75

    User-cooperative dynamic resource allocation for backscatter-aided wireless-powered MEC network by Huaiwen He, Chenghao Zhou, Feng Huang, Hong Shen, Yihong Yang, Shangsong Liang, Xinyuan Jin

    Published 2025-05-01
    “…However, there is little research on the integration of user cooperation in WPMEC scenarios within volatile network environments. …”
    Get full text
    Article
  16. 76
  17. 77
  18. 78
  19. 79
  20. 80