-
5461
On Guaranteed Detectability for Surveillance Sensor Networks
Published 2012-07-01“…In this paper, we propose a fully distributed algorithm GAP for energy-efficient event detection for surveillance applications. …”
Get full text
Article -
5462
Distributed Vector Quantization over Sensor Network
Published 2014-10-01“…A vector quantizer is a system for encoding the original data to reduce the bits needed for communication and storage saving while maintaining the necessary fidelity of the data. …”
Get full text
Article -
5463
LOGIC SIMULATION OF LIFE SUPPORT SYSTEM COMPONENT IN REAL TIME
Published 2016-07-01“…A detailed algorithm of the program made on the basis of an Any Logic software package. …”
Get full text
Article -
5464
FedGAN: Federated diabetic retinopathy image generation.
Published 2025-01-01“…By federating the GAN's discriminator and generator via the Federated Averaging (FedAvg) algorithm, FedGAN generates high-quality synthetic retinal images while complying with HIPAA and GDPR. …”
Get full text
Article -
5465
Distributed Constraint Optimization with Flocking Behavior
Published 2018-01-01“…First, a bounded potential function to construct the controller is given and a distributed optimization algorithm that makes a group of agents avoid collisions during the evolution is presented. …”
Get full text
Article -
5466
Probabilistic Cellular Automata Monte Carlo for the Maximum Clique Problem
Published 2024-09-01“…This is an NP-hard problem and no exact algorithm to solve it exactly in polynomial time is known to exist. …”
Get full text
Article -
5467
Search of Fuzzy Periods in the Works of Poetry of Different Authors
Published 2018-01-01“…We applied a new method for the identification of fuzzy periods and the insertion and deletion of characters were taken into consideration while studying the works of poetry. The technique employs genetic algorithm, dynamic programming, and the Monte Carlo method. …”
Get full text
Article -
5468
Message forwarding based on periodically evolving social characteristics in opportunistic mobile networks
Published 2015-03-01“…Moreover, a social-aware routing algorithm, PerEvo, was then designed based on them. …”
Get full text
Article -
5469
CRASHWORTHINESS DESIGN AND OPTIMIZATION FOR COLLISION POST OF TRAIN
Published 2022-01-01“…Based on the optimal Latin hypercube experimental design method, a polynomial response surface surrogate model of the specific energy absorption and the peak crush force with respect to the wall thickness of the novel multi-cell collision post was established, the multi-objective optimization problem was conducted using the Non-dominated Sorting Genetic Algorithm-Ⅱ and the Pareto front was obtained. The optimization results show that the total energy and specific energy absorption of the novel multi-cell collision post are improved significantly while meeting the structural lightweight requirements compared with the conventional single-cell structure.…”
Get full text
Article -
5470
Self-Organized Clustering Architecture for Vehicular Ad Hoc Networks
Published 2015-08-01“…This paper proposes a new system based on 1-hop clustering to reduce the number of VANET communications in dense road traffic scenarios while maintaining the security of communications by combining public-key with secret-key cryptography. …”
Get full text
Article -
5471
Cross-layer scheduling and dynamic resource allocation for MIMO-OFDMA/SDMA systems with multi-service
Published 2010-01-01“…Cross-layer scheduling and dynamic resource allocation problems were investigated for downlink MIMO-OFDMA/SDMA systems with multi-service.Firstly,a mathematical formulation of the optimization problem was provided with the objective of maximizing the total system throughput under various constraints.Secondly,a user group-ing scheme was proposed utilizing clustering analysis method based on the type of services and the spatial compatibility of multiple users with multiple receive antennas.Thirdly,a new cross-layer scheduling and dynamic resource allocation algorithm was developed based on the proposed user grouping scheme combined with the priorities of different service,which maximizes the total system throughput by maximizing the throughput of each subcarrier.Simulation results show that compared with the existing schemes,the proposed algorithms obtain reasonable throughput performance while provide better QoS requirement for each user of different services.…”
Get full text
Article -
5472
Energy-efficient cooperative sensing and transmission in relay-assisted cognitive radio network
Published 2017-05-01“…An innovative EE-oriented cooperative sensing and transmission scheme in relay-assisted cognitive radio networks,called energy-efficient best-relay cooperative transmission (BCT) was proposed.Based on the BCT scheme,mean energy efficiency (MEE) maximization problem with sensing duration and transmitting power as optimization variables was modeled for fading channels under constraint of minimal secondary outage probability.By virtue of Jensen’s inequality,the original optimization problem was decomposed into two relatively independent subproblems which solved sensing duration and power allocation respectively.And for the two subproblems,an efficient cross iteration based algorithm was proposed to obtain the suboptimal solutions.Both analytical and simulation results demonstrate that the proposals can achieve significantly higher EE while enhancing reliability of secondary transmission remarkably compared to non-cooperation single cognitive transmission schemesin high QoS requirement.…”
Get full text
Article -
5473
Differential privacy protection scheme based on edge betweenness model
Published 2019-05-01“…With the continuous development of social network application,user’s personal social data is so sensitive that the problem of privacy protection needs to be solved urgently.In order to reduce the network data sensitivity,a differential privacy protection scheme BCPA based on edge betweenness model was proposed.The 2K sequence corresponding to the graph structure based on the dK model was captured,and 2K sequences based on the edge betweenness centrality were reordered.According to the result of reordering,the 2K sequence was grouped into several sub-sequences,and each sub-sequence was respectively added with noise by a dK perturbation algorithm.Finally,a social network graph satisfying differential privacy was generated according to the new 2K sequences after integration.Based on the real datasets,the scheme was compared with the classical schemes through simulation experiments.The results demonstrate that it improves the accuracy and usability of data while ensuring desired privacy protection level.…”
Get full text
Article -
5474
Antioptimisation of Trusses Using Two-Level Population-Based Incremental Learning
Published 2013-01-01“…The task is to find the optimum solution of common design variables while simultaneously searching for the worst case scenario of those parameters with uncertainties. …”
Get full text
Article -
5475
Performance analysis of secrecy rate for SWIPT in massive antenna
Published 2017-09-01“…In the multi-drop broadcast system,the existing research is to optimize the single-user security rate in the complete channel state information.In fact,it’s impossible that there exists only one user in the system.The base station often receives incomplete channel state information.Aiming at this problem,a robust beamforming scheme was proposed.In the multi-user case,considering the influence of channel estimation error on the system security rate,the particle swarm optimization algorithm was used to optimize the emission beamforming vector,artificial noise covariance and power split ratio to ensure that the user collects a certain energy while maximizing the safe transmission rate.The simulation results show that the proposed scheme is slightly lower than the security rate in the ideal case,but it is meaningful to the actual system,taking into account the existence of eavesdropping users and the estimation error.…”
Get full text
Article -
5476
Guaranteed convergence control for consensus of mobile sensor networks with dynamical topologies
Published 2016-11-01“…The topology graphs over the mobile sensors are unconnected, directed, dynamical and switched periodically at any moment, while the joint graphs of dynamical topologies are connected in a bounded time period. …”
Get full text
Article -
5477
Backdoor defense method in federated learning based on contrastive training
Published 2024-03-01“…In response to the inadequacy of existing defense methods for backdoor attacks in federated learning to effectively remove embedded backdoor features from models, while simultaneously reducing the accuracy of the primary task, a federated learning backdoor defense method called ContraFL was proposed, which utilized contrastive training to disrupt the clustering process of backdoor samples in the feature space, thereby rendering the global model classifications in federated learning independent of the backdoor trigger features.Specifically, on the server side, a trigger generation algorithm was developed to construct a generator pool to restore potential backdoor triggers in the training samples of the global model.Consequently, the trigger generator pool was distributed to the participants by the server, where each participant added the generated backdoor triggers to their local samples to achieve backdoor data augmentation.Experimental results demonstrate that ContraFL effectively defends against various backdoor attacks in federated learning, outperforming existing defense methods.…”
Get full text
Article -
5478
Multifactor Stock Selection Strategy Based on Machine Learning: Evidence from China
Published 2022-01-01“…The main findings are as follows: the support vector regression has the most stable successful rate for predicting, while ridge regression and linear regression have the most unstable successful rate with more extreme cases; algorithm of support vector regression fitting higher-degree polynomials in Chinese A-share market is optimized, compared with the traditional linear regression both in terms of stock return and retracement control; the results of support vector regression significantly outperforming the CSI 500 index prove further.…”
Get full text
Article -
5479
Low-Complexity Relay Selection for Full-Duplex Random Relay Networks
Published 2025-03-01“…In addition, we propose a low-complexity relay selection algorithm that constructs the candidate relay set while considering the selection diversity gain. …”
Get full text
Article -
5480
Enhancing Cost and Security of Arabic SMS Messages over Mobile Phone Network
Published 2009-09-01“…This paper investigates a novel algorithm for compressing and encrypting Arabic short text messages (SMS messages). …”
Get full text
Article