Showing 61 - 80 results of 1,112 for search 'network average problem', query time: 0.07s Refine Results
  1. 61

    Cyber attacks and privacy protection distributed consensus algorithm for multi-agent systems by Ming XU, Baojun ZHANG, Yiming WU, Chenduo YING, Ning ZHENG

    Published 2023-03-01
    “…To solve the consensus problem of multi-agent systems in the environment of cyber attacks and information eavesdropping, an average consensus algorithm that can effectively resist network denial of service (DoS) attacks and protect nodes’ state privacy was proposed.Firstly, combined with the characteristics of DoS attacks in networked control systems, a periodic DoS attack model related to time was constructed.Then a distributed network node information processing mechanism based on differential privacy was proposed by using the information interaction between neighbor nodes, and then it was introduced into the average consensus algorithm.Furthermore, combined with the event-triggered mechanism, a consensus algorithm method suitable for undirected communication networks under DoS attacks was proposed, and its convergence and privacy protection performance were analyzed strictly mathematically.Finally, the effectiveness of the proposed algorithm was verified by a numerical simulation experiment and hardware experiment.…”
    Get full text
    Article
  2. 62

    Cyber attacks and privacy protection distributed consensus algorithm for multi-agent systems by Ming XU, Baojun ZHANG, Yiming WU, Chenduo YING, Ning ZHENG

    Published 2023-03-01
    “…To solve the consensus problem of multi-agent systems in the environment of cyber attacks and information eavesdropping, an average consensus algorithm that can effectively resist network denial of service (DoS) attacks and protect nodes’ state privacy was proposed.Firstly, combined with the characteristics of DoS attacks in networked control systems, a periodic DoS attack model related to time was constructed.Then a distributed network node information processing mechanism based on differential privacy was proposed by using the information interaction between neighbor nodes, and then it was introduced into the average consensus algorithm.Furthermore, combined with the event-triggered mechanism, a consensus algorithm method suitable for undirected communication networks under DoS attacks was proposed, and its convergence and privacy protection performance were analyzed strictly mathematically.Finally, the effectiveness of the proposed algorithm was verified by a numerical simulation experiment and hardware experiment.…”
    Get full text
    Article
  3. 63
  4. 64

    Self-Adaptive Sampling Rate to Improve Network Lifetime using Watchdog Sensor and Context Recognition in Wireless Body Sensor Networks by Hamid Mehdi, Houman Zarrabi, Ahmad Khadem Zadeh, AmirMasoud Rahmani

    Published 2024-02-01
    “…One of the most important problems regarding Wireless Body Sensor Network (WBSNs) is network lifetime. …”
    Get full text
    Article
  5. 65

    Analysis of hotspots of urban eco-environmental problems: A case study of Shenzhen City by Yue Cai, Rencai Dong, Anxin Lian, Zerui Wang, Yiqiao Zhao, Qinrui Luo, Change Liu

    Published 2025-03-01
    “…The results show a positive correlation between the PM2.5 concentration distribution and the points of interest, road network density, number of dead-end roads, and average building height in Shenzhen. …”
    Get full text
    Article
  6. 66

    Universal Continuous Model of Active Power Factor Correctors by Amelina M., Amelin S., Yakimenko I.

    Published 2024-02-01
    “…The models are designed to solve optimization problems aimed at increasing the energy efficiency of these devices. …”
    Get full text
    Article
  7. 67
  8. 68

    Cost calculation method development for various types of engine fuel filling for first category automobiles by M. V. Banket, D. V. Shapoval, I. A. Eychler, D. S. Aleshko, I. V. Pogulyaeva

    Published 2023-03-01
    “…Reducing the operating costs of motor fuel for cars is possible through the use of cheaper and at the same time less environmentally harmful alternative energy sources. The main problem with the use of these energy sources, especially for 1 category cars, is the underdeveloped infrastructure of the network of filling stations for alternative fuels. …”
    Get full text
    Article
  9. 69

    Reliable heuristic mapping method for survivable virtual network by Qiang ZHU, Hui-qiang WANG, Chun-guang MA, Guang-sheng FENG, Hong-wu LV

    Published 2015-07-01
    “…For reliable virtual network mapping problem,virtual network survivability constraints are introduced to ensure that the rest of the mapped virtual network remains connected under a single node failure condition in the substrate network,which makes sure the completeness of the virtual network and continuity of services.In order to reduce cost of the substrate network,the reliable heuristic mapping problem is considered as an integer linear programming model and a reliable heuristic mapping method for survivable virtual network is proposed to solve the problem.The simulation results show that average usage of links is reduced and the success rate,average revenue of mapping,recovery success rate of virtual network are increased compared with the existing reliable mapping algorithms.…”
    Get full text
    Article
  10. 70

    Fine-granularity inference and estimations to network traffic for SDN. by Dingde Jiang, Liuwei Huo, Ya Li

    Published 2018-01-01
    “…However, the end-to-end network traffic matrix's inferences and estimations are a challenging problem. …”
    Get full text
    Article
  11. 71

    PERFORMANCE REQUIRED FOR COMMON-USE COMPONENTS OF COMPUTER NETWORKS by BOLUN, Ion

    Published 2024-09-01
    “…Based on Jackson’s partitioning theorem and considering the linear dependence of the costs of channels, routers, and servers on their performance, a simplified analytical model for these components of the network is defined. Using this model, two optimization problems are formulated: minimizing the average response time to user requests of data processing and minimizing the summary cost of servers, channels and routers of the computer network. …”
    Get full text
    Article
  12. 72
  13. 73

    Directed broadcasting with mobility prediction for vehicular sensor networks by Si-Ho Cha, Jong-Eon Lee, Minwoo Ryu

    Published 2016-07-01
    “…By using LAT for broadcasting propagation, MPDB protocol can intensify the reliability of the message dissemination and also prevent the broadcast storm problem in vehicular networks. The simulation results show that MPDB protocol has better performance improvement in terms of average packet rate and packet delay.…”
    Get full text
    Article
  14. 74

    Method of dynamic random network coding in DTN environment by Guang-hong DENG, Wan-hua CAO, Jian ZHANG, Li FENG, Xiong CHENG

    Published 2014-02-01
    “…For working out this problem, a dynamic random network coding transfer method (DRNC) was proposed. …”
    Get full text
    Article
  15. 75
  16. 76

    Image Compression Based on Clustering Fuzzy Neural Network by Shahba Khaleel, Jamal Majeed, Bayda Khaleel

    Published 2007-12-01
    “…This new approach includes new objective function, and its minimization by energy function based on unsupervised two dimensional fuzzy Hopfield neural network. New objective function consists of a combination of classification entropy function and average distance between image pixels and cluster centers. …”
    Get full text
    Article
  17. 77

    Energy-Aware Task Allocation for Multi-Cloud Networks by Sambit Kumar Mishra, Sonali Mishra, Ahmed Alsayat, N Z Jhanjhi, Mamoona Humayun, Kshira Sagar Sahoo, Ashish Kr. Luhach

    Published 2020-01-01
    “…The same is implemented and analyzed to understand the improved performance of the heterogeneous multi-cloud network. The proposed task allocation algorithm (Energy-aware Task Allocation in Multi-Cloud Networks (<italic>ETAMCN</italic>)) minimizes the overall energy consumption and also reduces the makespan. …”
    Get full text
    Article
  18. 78
  19. 79

    A Max-Flow Approach to Random Tensor Networks by Khurshed Fitter, Faedi Loulidi, Ion Nechita

    Published 2025-07-01
    “…The entanglement entropy of a random tensor network (RTN) is studied using tools from free probability theory. …”
    Get full text
    Article
  20. 80

    Minimum uncertainty as Bayesian network model selection principle by Grigoriy Gogoshin, Andrei S. Rodin

    Published 2025-04-01
    “…Abstract Background Bayesian Network (BN) modeling is a prominent methodology in computational systems biology. …”
    Get full text
    Article