Suggested Topics within your search.
Suggested Topics within your search.
-
2341
A Blockchain-Integrated Federated Learning Approach for Secure Data Sharing and Privacy Protection in Multi-Device Communication
Published 2025-12-01“…This method incorporates factors such as experience, familiarity, and timeliness to more quickly gather reliable information about nodes to assess their behavior. …”
Get full text
Article -
2342
A Multichannel Cross-Layer Architecture for Multimedia Sensor Networks
Published 2013-03-01“…Depending upon the technological developments, the same fast evolution has occurred in the structures of sensor networks, their composing devices which are sensor nodes, and their application areas. Those tiny, energy-constrained, mostly non-real-time data transmitting sensor nodes have evolved to more energy-containing, camera-adapted, real-time multimedia-data-transmitting devices. …”
Get full text
Article -
2343
Fully Distributed Multicast Routing Protocol for IEEE 802.15.8 Peer-Aware Communication
Published 2015-08-01“…Performance evaluation shows that the FDMRP can reduce the number of routing entries and control message overhead by up to 85% and 95%, respectively, when the number of nodes is more than 500.…”
Get full text
Article -
2344
Research on selective trust-path search and aggregation in distributed environment
Published 2012-09-01“…Current trust models based on reputation had some disadvantages in characterizing recommendation credibility and dealing with Trust-Path Search and aggregation.To solve these problems,an updating algorithm for recommendation credibility was proposed considering factors of time decay,recommendation inosculation and success transaction rate.Furthermore,a selective search-algorithm for trust-path in distributed environment was presented.The algorithm uses recommendation credibility,evaluation similarity and trust-path length as its control parameters and can evade malicious nodes directly in the process of searching.It can also stop the search for unnecessary trust-paths and execute the search for paths containing valuable recommendation.Lastly,trust aggregation method was given by using an advanced combining algorithm in D-S theory of evidence.Simulation results show that compared with existing trust models,the proposed model is more robust on defending attacks of various malicious nodes.…”
Get full text
Article -
2345
A bit-arc capacity scaling algorithm for the maximum flow problem subjected to box constraints on the flow vector in digraph
Published 2025-06-01“…It solves the maximal flow problem as a sequence of O(n^2) Dijkstra's shortest path between two nodes in the defined residual network with n nodes and m arcs. …”
Get full text
Article -
2346
Extending the Touchscreen Pattern Lock Mechanism with Duplicated and Temporal Codes
Published 2016-01-01“…Our solution allows including nodes in the grid multiple times, which enhances the resilience to smudge and other forms of attack. …”
Get full text
Article -
2347
Public Opinion Communication Model under the Control of Official Information
Published 2021-01-01“…According to the influence and importance of the network nodes, we theoretically derive the attitude conversion probability of the nodes, making the model more in line with the actual situation. …”
Get full text
Article -
2348
RSU-coordinated multichannel MAC protocol in vehicular ad hoc network
Published 2018-11-01“…A road side unit (RSU)-coordinated multichannel media access control (MAC) (RMM) protocol was proposed in vehicular ad hoc network,which aimed to improve the transmission efficiency of non-safety messages.Under the coordination of RSU,nodes had more opportunities to make SCH reservations on control channel,and the contention-free message transmissions were thus realized.The proposed RMM protocol could use the service channel during the whole synchronization interval for non-safety message transmissions,and thus the saturated network throughput and channel utilization were improved,and the transmission delay was reduced.Compared with other existing protocols,extensive analysis and simulation results demonstrate the superiority of the RMM protocol.…”
Get full text
Article -
2349
RSU-coordinated multichannel MAC protocol in vehicular ad hoc network
Published 2018-11-01“…A road side unit (RSU)-coordinated multichannel media access control (MAC) (RMM) protocol was proposed in vehicular ad hoc network,which aimed to improve the transmission efficiency of non-safety messages.Under the coordination of RSU,nodes had more opportunities to make SCH reservations on control channel,and the contention-free message transmissions were thus realized.The proposed RMM protocol could use the service channel during the whole synchronization interval for non-safety message transmissions,and thus the saturated network throughput and channel utilization were improved,and the transmission delay was reduced.Compared with other existing protocols,extensive analysis and simulation results demonstrate the superiority of the RMM protocol.…”
Get full text
Article -
2350
Efficient attack detection and data aggregation algorithm
Published 2012-09-01“…An efficient algorithm of attack detection and data aggregation for wireless multimedia sensor networks based on the previous work was proposed.The proposed algorithm concludes the action trait of sensor nodes from their attribute vectors without any prior knowledge,at the same time;it was scalable and could be applied in large scale net-works.The simulation results show that the proposed algorithm can detect the attacks action more accurate than other technologies,and can make data aggregation efficiently.At the same time,the proposed algorithm can make the wireless multimedia sensor networks secure and reduce communication flow so that it will save a lot of resources in wireless mul-timedia sensor networks.…”
Get full text
Article -
2351
Collection tree-oriented mesh routing optimization for extending the lifetime of wireless sensor networks
Published 2022-03-01“…However, with collection tree-based routing protocol, some nodes easily become the bottleneck points and quickly run out of the energy. …”
Get full text
Article -
2352
Quantum-assisted trustworthiness for the Quantum Internet.
Published 2025-01-01“…Existing algorithms in this regard aim to exchange a significant number of messages among nodes to identify and agree which communication links or nodes are faulty. …”
Get full text
Article -
2353
A survey of key issues of URLLC in industrial internet of things
Published 2022-05-01“…In the age of 6G internet of things, massive terminal devices are connected intelligently to explore environmental information to improve life quality and create a more intelligent world.With the development of economic society and industry, the number of industrial nodes in the industrial internet of things (IIoT) grows at an significant speed.The real-time transmission and exchange of information between these industrial nodes puts forward higher requirements for communication delay and reliability.Under limited time-frequency resources and strict communication quality requirements, in order to ensure ultra-reliable and low-latency communication (URLLC) of massive terminals in IIoT, it is necessary to analyze the existing key problems from the aspects of low delay, reliability, energy efficiency, spectrum efficiency and scalability.In the scenario of IIoT, combined with the characteristics and requirements of URLLC, the key issues of communication in IIoT were studied, including challenges and opportunities in active user detection, random access, resource allocation and convergence of communication and computation.After summarizing and analyzing the key issues and existing technologies, the future research direction was proposed.…”
Get full text
Article -
2354
Channel access mechanism based on equally allocation of protocol sequence for VANET
Published 2016-04-01“…Equally importantly, EA can also keep relative low net overhead and available fairness about channel access of the nodes.…”
Get full text
Article -
2355
Probabilistic alignment of multiple networks
Published 2025-04-01“…Abstract The network alignment problem appears in many areas of science and involves finding the optimal mapping between nodes in two or more networks, so as to identify corresponding entities across networks. …”
Get full text
Article -
2356
High-throughput and low-overhead probabilistic routing based on multi-player bargaining game for opportunistic networks
Published 2015-06-01“…To address the problems existing in the present probabilistic routing based on bargaining games,including unidirectional transmission of messages degrades the success ratio,depending on the virtual money decreases the purchasing power of nodes,and redundancy exists in the interaction process of messages,an routing algorithm based on multi-player bargaining game for opportunistic networks,HLPR-MG,was proposed.Through extending the two-player game to a multi-player bargaining game,introducing the barter trade to enhance purchasing power of nodes,and improving the existing interaction mechanism to reduce the times of game,proposed algorithm achieves the effect of increasing network throughput and decreasing control overhead.Theoretical analysis verifies the effectiveness of HLPR-MG,and simulation results show that HLPR-MG improves the network throughput and success ratio at least 3.63%,and reduces the control overhead and average end-to-end delay by more than 17.76% and 4.03%,respectively,as compared to the classical GSCP and BG algorithms.…”
Get full text
Article -
2357
参数方程曲线的最优逼近算法及实现
Published 2008-01-01“…Symmetrical algorithm for symmetrical graph is used to increase symmetry of the graph,thus the program runs more rapidly. The nodes are solved by programming in matlab software to provide reference for processing complex curve in numerical control and CAD system.…”
Get full text
Article -
2358
Fast Processing of Massive Hyperspectral Image Anomaly Detection Based on Cloud-Edge Collaboration
Published 2025-01-01“…Then, different detection task nodes are deployed at the edge and the cloud based on the characteristics of cloud-edge computing paradigm. …”
Get full text
Article -
2359
Cache replacement strategy based on content value
Published 2018-11-01“…The cache replacement mechanism is one of the important research issues of the content center network.Considering the limited cache space,the reasonable replacement of the cache content becomes a key factor affecting the overall performance of the network.Therefore,a cache replacement scheme based on content value was designed.Considering the dynamic popularity of content,the cost of caching,and the time of the most recently requested,a more realistic content value function was built,and an effective content storage and replacement scheme was designed based on the content value function.Specifically,when the cache space was insufficient,the existing cache contents were replaced according to the value from small to large.Simulation results show that compared with the traditional replacement algorithms LRU,LFU and FIFO,the proposed scheme effectively improves the content cache hit rate of network nodes and reduces the average hops of users’ content acquisition.…”
Get full text
Article -
2360
Transmission characteristics of air-ground channel in aerial communication platform
Published 2018-01-01“…Satellite communication can solve the problem of global communication,at the same time,it follows the problems of difficult deploy and limited satellite resources.Aerial communication platform is consisted of aircraft with payload communication and not more than 10 km from ground.The platform communicating with ground nodes can solve the weakness of traditional satellite communication.The loss of air-to-ground channel was analyzed to model the air-to-ground wideband channel in Ku and Ka band.The consequence of theory and simulation demonstrates that the fading of the model has serious influence on transmission performance.In low elevation transmission,the value of K-factor is small because of multipath reception.Simulation results show that orthogonal frequency division multiplexing (OFDM) can be a good candidate for wideband communications to transmit payload data from aerial platform to ground station.…”
Get full text
Article