-
281
Modeling of Multihop Wireless Sensor Networks with MAC, Queuing, and Cooperation
Published 2016-02-01“…To efficiently solve the models with high dimension, for the EC networks, we propose a novel computational algorithm by taking advantage of the stochastic shortest path structure of the problem; for the EH networks, we propose a dual linear programming based algorithm by considering the sparsity of the transition matrix. …”
Get full text
Article -
282
Cooperativity among short amyloid stretches in long amyloidogenic sequences.
Published 2012-01-01“…The algorithm successfully predicted and classified amyloid segments with an overall accuracy of 75%. …”
Get full text
Article -
283
Distributed Cooperative Backpressure-Based Traffic Light Control Method
Published 2019-01-01“…On the foundation of the original backpressure-based traffic light control algorithm, a distributed cooperative backpressure-based traffic light control method is proposed in this paper. …”
Get full text
Article -
284
Energy Harvesting for Throughput Enhancement of Cooperative Wireless Sensor Networks
Published 2016-07-01“…We consider an energy harvesting for cooperative wireless sensor networks with a nonlinear power consumption model. …”
Get full text
Article -
285
Two-party cooperative blind signature based on SM2
Published 2022-12-01“…SM2, issued by China in 2010, is a public key cryptography standard based on elliptic curves.It has been widely used in finance, social security and other fields thanks to its advantages of improved signature efficiency, decreased storage space and computing complexity than RSA.With the popularization and application of SM2, the issues of its key security and data privacy are of great concern.The single-key mode inhibits the potential application in multi-user settings, and the leakage of the key will threaten the security of the entire cryptosystem due to the centralization.The problem of secure storage and reasonable utilization of keys needs to be solved urgently.In addition, the SM2 digital signature algorithm cannot guarantee the message privacy.Aiming at the issues of key security and data privacy of the signature algorithm, many researchers have proposed the idea of cooperative signature and blind signature for SM2.However, there isn’t SM2 collaborative blind signature scheme proposed.Then a two-party cooperative blind signing protocol based on SM2 was proposed in this paper, which allowed two parties to sign except the user.The signing process did not require recovering the complete private key, while not revealing the information of the partial private key and secret number.The key was stored separately to improve the security of the key, while the blind signature protected the privacy of the message.In terms of security, the protocol satisfied unforgeability and unlinkability.The protocol was implemented using C to demonstrate the efficiency of each participant’s local operation.In the honest model, the time cost of each entity in the cooperative signature phase was similar as that of executing a lightweight SM2 blind signature.Overall, the proposed protocol has certain advantages in terms of function and efficiency.…”
Get full text
Article -
286
Cooperative Formation Control of Multiple Ships with Time Delay Conditions
Published 2025-03-01“…Then, to handle delays, the formation control method is extended, and the stability of the revised algorithm is rigorously proven using the Lyapunov function. …”
Get full text
Article -
287
COOPERATIVE MODEL FOR OPTIMIZATION OF EXECUTION OF THREADS ON MULTI-CORE SYSTEM
Published 2014-12-01“…The problem of the increase of efficiency of multi-thread applications on multi-core systems is investigated. The optimization cooperative model of threads execution has been proposed. …”
Get full text
Article -
288
Graph Based Cooperative Forwarding in Information Centric Vehicular Networks
Published 2025-01-01“…Interest packets are forwarded by leaders on behalf of a group there by accelerating the content retrieval process. The proposed algorithm is named as GCF (Graph based Cooperative Forwarding) and is simulated in ndnSim-2.0. …”
Get full text
Article -
289
Cooperative Terrain-Based GNSS-Denied Navigation With Particle Filter
Published 2025-01-01“…The simulation results show that the proposed algorithm performs well regarding flight accuracy in various terrains.…”
Get full text
Article -
290
Cooperative integration of spatially resolved multi-omics data with COSMOS
Published 2025-01-01Get full text
Article -
291
Cooperative trajectory optimization for multiple connected vehicles at an unsignalized intersection
Published 2025-06-01“…Through numerical simulation analysis of intersection scenarios including crossroad and roundabout, the results demonstrate that the proposed algorithm can achieve optimal trajectories for multi-vehicle cooperative motion while ensuring safe vehicle operation, which improves the efficiency of future intelligent traffic networks.…”
Get full text
Article -
292
An integrated and cooperative architecture for multi-intersection traffic signal control
Published 2023-06-01“…However, relevant studies are usually independent of the urban traffic simulation environment, collaborative TSC algorithms and traffic signal communication. In this paper, we propose (1) an integrated and cooperative Internet-of-Things architecture, namely General City Traffic Computing System (GCTCS), which simultaneously leverages an urban traffic simulation environment, TSC algorithms, and traffic signal communication; and (2) a general multi-agent reinforcement learning algorithm, namely General-MARL, considering cooperation and communication between traffic lights for multi-intersection TSC. …”
Get full text
Article -
293
-
294
Data set for UWB Cooperative Navigation and Positioning of UAV Cluster
Published 2025-03-01“…Abstract The cooperative navigation of unmanned aerial vehicle (UAV) cluster has become a popular topic in military and civilian applications. …”
Get full text
Article -
295
Agent swarms: Cooperation and coordination under stringent communications constraint.
Published 2024-01-01Get full text
Article -
296
Survey on SSDF attack and defense for distributed cooperative cognitive radio
Published 2017-01-01“…Cooperative spectrum sensing (CSS) improves the reliability of spectrum sensing,however,it is susceptible to spectrum sensing data falsification (SSDF) due to the fusion mechanism.To insight into the current research and development trend of defense strategy against the SSDF attack,several typical distributed strategies were concluded and the types of distributed algorithms were analyzed in several aspects.Finally,the future research of SSDF distributed defense strategy was prospected based on the problems found in the current research.…”
Get full text
Article -
297
Multi-tier cooperative caching in fog radio access network
Published 2019-09-01“…Aiming at the problem of reducing the load of the backward link in the edge buffer and fog wireless access network technology,a multi-tier cooperative caching scheme in F-RAN was proposed to further reduce the backhaul traffic load.In particular,by considering the network topology,content popularity prediction and link capacity,the optimization problem was decomposed into knapsack subproblems in multi-tiers,and effective greedy algorithms were proposed to solve the corresponding subproblems.Simulation results show that the proposed multi-tier cooperative caching scheme can effectively reduce the backhaul traffic and achieve relatively high cache hit rate.…”
Get full text
Article -
298
Two-Layer Optimal Scheduling and Economic Analysis of Composite Energy Storage with Thermal Power Deep Regulation Considering Uncertainty of Source and Load
Published 2024-09-01Subjects: “…composite energy storage…”
Get full text
Article -
299
Dual-timescale hierarchical MADDPG for Multi-UAV cooperative search
Published 2025-07-01“…Abstract Cooperative exploration conducted by multiple unmanned aerial vehicles (UAVs) facilitates parallelized reconnaissance over expansive territories, thereby optimizing the efficiency of target localization. …”
Get full text
Article -
300
Analysis of thermoelastic stresses in filament wound composite pressure vessels using evolutionary deep learning and many-objective optimisation
Published 2025-12-01Subjects: “…Composite pressure vessel…”
Get full text
Article