-
5541
A Blockchain-Based Architecture of Web3.0: A Comprehensive Decentralized Model With Relay Nodes, Unique IDs and P2P
Published 2025-01-01“…The proposed model integrates a blockchain-based unique ID management system for secure node identification and employs a multistep TPM-based verification algorithm to validate node authenticity in real time. …”
Get full text
Article -
5542
Space-time spectrum sharing based on game theory:dynamic access and penalty strategy
Published 2023-12-01“…To tackle the challenge of inefficient utilization of spatiotemporal spectrum resources in heterogeneous networks, a reliable spectrum sharing strategy based on game theory was proposed for scenarios where multiple secondary users dynamically access through sensing spatiotemporal spectrum opportunities.Firstly, secondary users sensed the activity state of primary users through channel sampling and subsequently seek suitable spatiotemporal spectrum opportunities.Each secondary user aimed to access more spectrum resources while preventing quality degradation between primary users.Consequently, a negotiation of individual utilities between secondary and primary users was needed, in order to reach a mixed Nash equilibrium.When the secondary user's transmission power was abnormal, its behavior would be regarded as a violation.Then, a backoff time compensation algorithm was presented to penalize the secondary users, according to the number of violations and active nodes in the network.Finally, simulation results validate the effectiveness of the spatiotemporal spectrum opportunities sharing strategy with the penalty mechanism.…”
Get full text
Article -
5543
Prediction of magnetohydrodynamics fluid flow with viscous dissipation through artificial neural network
Published 2025-07-01“…The Levenberg–Marquardt algorithm to predict the Nusselt Number (NN) and Skin Friction Coefficients (SFCs). …”
Get full text
Article -
5544
Cross-Layer Power-Control-Based Real-Time Routing Protocol for Wireless Sensor Networks
Published 2013-11-01“…Simulation results show that the energy consumption of the network is reduced while real-time end-to-end data transmission is guaranteed.…”
Get full text
Article -
5545
Error-Tolerant and Energy-Efficient Coverage Control Based on Biological Attractor Selection Model in Wireless Sensor Networks
Published 2012-02-01“…A coverage problem is one of the important issues to prolong the lifetime of a wireless sensor network while guaranteeing that the target region is monitored by a sufficient number of active nodes. …”
Get full text
Article -
5546
Beamforming and resource optimization in UAV integrated sensing and communication network with edge computing
Published 2023-09-01“…To address the dependence of traditional integrated sensing and communication network mode on ground infrastructure, the unmanned aerial vehicle (UAV) with edge computing server and radar transceiver was proposed to solve the problems of high-power consumption, signal blocking, and coverage blind spots in complex scenarios.Firstly, under the conditions of satisfying the user’s transmission power, radar estimation information rate and task offloading proportion limit, the system energy consumption was minimized by jointly optimizing UAV radar beamforming, computing resource allocation, task offloading, user transmission power, and UAV flight trajectory.Secondly, the non-convex optimization problem was reformulated as a Markov decision process, and the proximal policy optimization method based deep reinforcement learning was used to achieve the optimal solution.Simulation results show that the proposed algorithm has a faster training speed and can reduce the system energy consumption effectively while satisfying the sensing and computing delay requirements.…”
Get full text
Article -
5547
AXIAL TENSILE STRENGTH ANALYSIS OF UNBONDED FLEXIBLE PIPE CONTAINING COMPOSITE TENSILE ARMORS
Published 2020-01-01“…As offshore oil industry moves into ultra-deep water,replacing the steel tensile armors of unbonded flexible pipe with composite is becoming a scheme that can effectively reduce weight and provide better mechanical properties.The anisotropic parameters of composite are obtained by meso-mechanical method,then a model of axisymmetric structure response for composite flexible pipe with composite armored layer is established,which is based on both thick-wall cylinder theory and the differential equation of curved beam,and also the algorithm of cyclic iterative is combined.Failure models of different type of flexible pipes are obtained,and iso-strength method is used for composite armored pipe.A case study shows that composite armors can effectively enhance the tensile strength of unbonded flexible pipe while effectively reduce the overall weight.Results state that volume fraction,elastic modulus and strength of fiber are the important parameters which affect the axial stiffness and tensile strength of unbonded flexible pipe.…”
Get full text
Article -
5548
Multi-objective optimization placement strategy for SDN security controller considering Byzantine attributes
Published 2021-06-01“…By giving the software defined network distributed control plane Byzantine attributes, its security can be effectively improved.In the process of realizing Byzantine attributes, the number and location of controllers, and the connection relationship between switches and controllers can directly affect the key network performance.Therefore, a controller multi-objective optimization placement strategy for SDN security controllers considering Byzantine attributes was proposed.Firstly, a Byzantine controller placement problem (MOSBCPP) model that comprehensively considered interaction delay, synchronization delay, load difference and the number of controllers was constructed.Then, a solution algorithm based on NASG-II was designed for this model, which included the initialization function, the mutation function, the fast non-dominated sorting function and the elite strategy selection function.Simulation results show that this strategy can effectively reduce interaction delay, synchronization delay, load difference and the number of controllers, while improving control plane security.…”
Get full text
Article -
5549
An Empirical Configuration Study of a Common Document Clustering Pipeline
Published 2023-09-01“…The results suggest that BERT embeddings combined with UMAP dimension reduction to no less than 15 dimensions provides a good basis for clustering, regardless of the specific clustering algorithm used. Moreover, while UMAP performed better than PCA in our experiments, tuning the UMAP settings showed little impact on the overall performance. …”
Get full text
Article -
5550
Uplink assisted downlink channel estimation method of extra-large scale MIMO-OTFS system
Published 2023-12-01“…A low complexity downlink channel estimation method for high-speed mobile scenarios was proposed for the extra-large scale multiple-input multiple-output (MIMO) orthogonal time-frequency space (OTFS) system.Different from the existing studies, the proposed method considers the significant spatial non-stationary characteristics of extra-large scale MIMO-OTFS system.Based on the visible path region, an enhanced sparse orthogonal matching pursuit (OMP) algorithm with low complexity was proposed, uplink-assisted downlink channel estimation was achieved using the mapping relationship between the uplink and downlink channels in the frequency-division duplex (FDD) mode.Simulation results show that the proposed uplink-assisted downlink channel estimation method can accurately represent the non-stationary of the system, and achieve significant improvement in the channel estimation performance while reducing the computational complexity , and still perform well in high-mobility IoT scenarios.…”
Get full text
Article -
5551
Self-adaptive dragonfly based optimal thresholding for multilevel segmentation of digital images
Published 2018-10-01“…Dragonfly optimization (DFO) is a population based meta-heuristic optimization algorithm that simulates the static and dynamic swarming behaviors of dragonflies. …”
Get full text
Article -
5552
Accelerating and Compressing Transformer-Based PLMs for Enhanced Comprehension of Computer Terminology
Published 2024-10-01“…Our method involves a pipeline parallelism algorithm designed to accelerate training. It is paired with an innovative mixed compression strategy that combines pruning and knowledge distillation to effectively reduce the model size while preserving its performance. …”
Get full text
Article -
5553
Audio-Based Assistive Device for Boxed Product Detection for The Visually Impaired
Published 2025-04-01“…The HC-SR04 ultrasonic sensor is used to measure the distance of objects from the user, while the output information is provided through wireless earphones in the form of audio. …”
Get full text
Article -
5554
Fractional Modeling of Non-Newtonian Casson Fluid between Two Parallel Plates
Published 2023-01-01“…A modified homotopy perturbation algorithm is used for the solution and analysis of highly nonlinear and fully fractional ordinary differential equations. …”
Get full text
Article -
5555
Modeling of Distorted Degradation Data Based on Oil Analysis
Published 2025-06-01“…The main contributions are as follows: First, we developed a degradation correction model that automatically identifies oil top-up events while globally rectifying distorted data, achieving an accurate reconstruction of physical degradation curves. …”
Get full text
Article -
5556
Sparse joint representation for massive MIMO satellite uplink and downlink based on dictionary learning
Published 2025-08-01“…To address this issue,we analyze the conditional constraints of the dictionary for joint UL/DLchannel representation, aiming to quantify the maximum boundary while pro-posing a constrained dictionary learning algorithm with singular value decom-position to obtain an effective representation and conduct an adaptabilityanalysis in dynamic satellite communication scenarios.…”
Get full text
Article -
5557
Laguerre-Based Frequency-Limited Balanced Truncation of Discrete-Time Systems
Published 2025-01-01“…By leveraging Laguerre functions, we develop two efficient MOR algorithms that avoid the computationally expensive generalized Lyapunov equation solvers used in traditional methods. …”
Get full text
Article -
5558
Using machine learning to simultaneously quantify multiple cognitive components of episodic memory
Published 2025-03-01“…Overall, this study provides critical insight into the underlying reasons why some events are remembered while others are not.…”
Get full text
Article -
5559
Secondary Intraocular Lens Options in Intraocular Lens Dislocation: A Review
Published 2024-12-01“…While there are numerous IOL techniques and lens options for addressing IOL dislocation, there is currently no consensus on the optimal method. …”
Get full text
Article -
5560
Cross-Domain Edge Computing Offloading Strategy for Delay-Optimized in Low Earth Orbit Satellite Network
Published 2025-06-01“…Existing approaches primarily employ centralized or distributed management, where the former suffers from high information collection latency and limited flexibility, while the latter incurs high inter-satellite collaboration costs, restricting global optimization. …”
Get full text
Article