Suggested Topics within your search.
Suggested Topics within your search.
-
61
Cyber attacks and privacy protection distributed consensus algorithm for multi-agent systems
Published 2023-03-01“…To solve the consensus problem of multi-agent systems in the environment of cyber attacks and information eavesdropping, an average consensus algorithm that can effectively resist network denial of service (DoS) attacks and protect nodes’ state privacy was proposed.Firstly, combined with the characteristics of DoS attacks in networked control systems, a periodic DoS attack model related to time was constructed.Then a distributed network node information processing mechanism based on differential privacy was proposed by using the information interaction between neighbor nodes, and then it was introduced into the average consensus algorithm.Furthermore, combined with the event-triggered mechanism, a consensus algorithm method suitable for undirected communication networks under DoS attacks was proposed, and its convergence and privacy protection performance were analyzed strictly mathematically.Finally, the effectiveness of the proposed algorithm was verified by a numerical simulation experiment and hardware experiment.…”
Get full text
Article -
62
Cyber attacks and privacy protection distributed consensus algorithm for multi-agent systems
Published 2023-03-01“…To solve the consensus problem of multi-agent systems in the environment of cyber attacks and information eavesdropping, an average consensus algorithm that can effectively resist network denial of service (DoS) attacks and protect nodes’ state privacy was proposed.Firstly, combined with the characteristics of DoS attacks in networked control systems, a periodic DoS attack model related to time was constructed.Then a distributed network node information processing mechanism based on differential privacy was proposed by using the information interaction between neighbor nodes, and then it was introduced into the average consensus algorithm.Furthermore, combined with the event-triggered mechanism, a consensus algorithm method suitable for undirected communication networks under DoS attacks was proposed, and its convergence and privacy protection performance were analyzed strictly mathematically.Finally, the effectiveness of the proposed algorithm was verified by a numerical simulation experiment and hardware experiment.…”
Get full text
Article -
63
-
64
Self-Adaptive Sampling Rate to Improve Network Lifetime using Watchdog Sensor and Context Recognition in Wireless Body Sensor Networks
Published 2024-02-01“…One of the most important problems regarding Wireless Body Sensor Network (WBSNs) is network lifetime. …”
Get full text
Article -
65
Analysis of hotspots of urban eco-environmental problems: A case study of Shenzhen City
Published 2025-03-01“…The results show a positive correlation between the PM2.5 concentration distribution and the points of interest, road network density, number of dead-end roads, and average building height in Shenzhen. …”
Get full text
Article -
66
Universal Continuous Model of Active Power Factor Correctors
Published 2024-02-01“…The models are designed to solve optimization problems aimed at increasing the energy efficiency of these devices. …”
Get full text
Article -
67
Linear Diophantine Fuzzy Einstein Aggregation Operators for Multi-Criteria Decision-Making Problems
Published 2021-01-01Get full text
Article -
68
Cost calculation method development for various types of engine fuel filling for first category automobiles
Published 2023-03-01“…Reducing the operating costs of motor fuel for cars is possible through the use of cheaper and at the same time less environmentally harmful alternative energy sources. The main problem with the use of these energy sources, especially for 1 category cars, is the underdeveloped infrastructure of the network of filling stations for alternative fuels. …”
Get full text
Article -
69
Reliable heuristic mapping method for survivable virtual network
Published 2015-07-01“…For reliable virtual network mapping problem,virtual network survivability constraints are introduced to ensure that the rest of the mapped virtual network remains connected under a single node failure condition in the substrate network,which makes sure the completeness of the virtual network and continuity of services.In order to reduce cost of the substrate network,the reliable heuristic mapping problem is considered as an integer linear programming model and a reliable heuristic mapping method for survivable virtual network is proposed to solve the problem.The simulation results show that average usage of links is reduced and the success rate,average revenue of mapping,recovery success rate of virtual network are increased compared with the existing reliable mapping algorithms.…”
Get full text
Article -
70
Fine-granularity inference and estimations to network traffic for SDN.
Published 2018-01-01“…However, the end-to-end network traffic matrix's inferences and estimations are a challenging problem. …”
Get full text
Article -
71
PERFORMANCE REQUIRED FOR COMMON-USE COMPONENTS OF COMPUTER NETWORKS
Published 2024-09-01“…Based on Jackson’s partitioning theorem and considering the linear dependence of the costs of channels, routers, and servers on their performance, a simplified analytical model for these components of the network is defined. Using this model, two optimization problems are formulated: minimizing the average response time to user requests of data processing and minimizing the summary cost of servers, channels and routers of the computer network. …”
Get full text
Article -
72
Precision Improvement for the Detection of TGC via RBF Network
Published 2020-01-01Get full text
Article -
73
Directed broadcasting with mobility prediction for vehicular sensor networks
Published 2016-07-01“…By using LAT for broadcasting propagation, MPDB protocol can intensify the reliability of the message dissemination and also prevent the broadcast storm problem in vehicular networks. The simulation results show that MPDB protocol has better performance improvement in terms of average packet rate and packet delay.…”
Get full text
Article -
74
Method of dynamic random network coding in DTN environment
Published 2014-02-01“…For working out this problem, a dynamic random network coding transfer method (DRNC) was proposed. …”
Get full text
Article -
75
OW-YOLO: An Improved YOLOv8s Lightweight Detection Method for Obstructed Walnuts
Published 2025-01-01Get full text
Article -
76
Image Compression Based on Clustering Fuzzy Neural Network
Published 2007-12-01“…This new approach includes new objective function, and its minimization by energy function based on unsupervised two dimensional fuzzy Hopfield neural network. New objective function consists of a combination of classification entropy function and average distance between image pixels and cluster centers. …”
Get full text
Article -
77
Energy-Aware Task Allocation for Multi-Cloud Networks
Published 2020-01-01“…The same is implemented and analyzed to understand the improved performance of the heterogeneous multi-cloud network. The proposed task allocation algorithm (Energy-aware Task Allocation in Multi-Cloud Networks (<italic>ETAMCN</italic>)) minimizes the overall energy consumption and also reduces the makespan. …”
Get full text
Article -
78
Vehicle routing problem in waste collection: a case study in Son Tra, Da Nang
Published 2024-11-01Get full text
Article -
79
A Max-Flow Approach to Random Tensor Networks
Published 2025-07-01“…The entanglement entropy of a random tensor network (RTN) is studied using tools from free probability theory. …”
Get full text
Article -
80
Minimum uncertainty as Bayesian network model selection principle
Published 2025-04-01“…Abstract Background Bayesian Network (BN) modeling is a prominent methodology in computational systems biology. …”
Get full text
Article