The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a new Distributed Deny of Service attack in Named Data Networking, and analyzes the Interest Flooding Attack in the case of conspiracy between the consumer and the content provider. After collusion with the content provider server, the attacker sends an Interest Flooding Attack request that can be satisfied, and the content provider server delays a large enough time to return the...
In the multi-objective decision-making problems, the weight problem research occupies a very important position. The weight is the quantitative distribution of the different aspects' importance of the object to be evaluated, and the weight of each evaluation factor in the overall evaluation is differentiated, and is of great significance in practice. In this paper, by using the fuzzy analytic hierarchy...
Sparse Linear Method (SLIM) recommendation algorithm is developed for Top-N recommender system, which has better performance than existing algorithms. However, the limitation of the algorithm is that only the similarity between items evaluated by at least one user can be calculated. In this paper, we propose a method based on similar user set to improve the performance of SLIM algorithm. We calculate...
The valve-control dispensing method is one of the most common methods to dispense biological reagents in the field of life science, but it faces difficulties in control and impacts from the system parameters. Based on the two-phase volume of fluid model, a computing and simulating model of biological reagent droplet dispensing process is constructed. Through numerical simulation, the droplet formation...
To capture the trends of concerned topics in specific field, people often use topic discovery methods to get this goal. The traditional topic discovery algorithms are generally divided into two types, text clustering algorithm and text topic model. The former lacks of attention on semantic information, and the latter always ignores relativity of the topic. These affect the topic discovery and topic...
In most of the existing compressed sensing based Massive MIMO channel state information acquisition schemes, the huge overhead introduced by reconstruction and measurement of channel cannot afford by power-limited users. Combining channel estimation and feedback together, a Two-dimensional compressed sensing schemes is proposed for Massive MIMO channel state information. Instead of reconstruct the...
Aiming to improve positioning precision of the INS/GPS integrated navigation system during GPS outages, a novel neural network learning algorithm based on model predictive filter (MPFNN) for INS errors compensation is proposed. MPFNN is applied to establish a highly accurate mapping relationship when GPS works well and to predict INS errors during GPS outages. Different from traditional algorithm,...
The natural conditions of the deep mine are especially poor and deployment of wireless sensor networks in it is constrained by limited energy and communication resources, Aiming at this problem, a data fusion algorithm based on unbiased gray Markov prediction is proposed to solve this problem. This algorithm uses the unbiased gray Markov prediction model to predict the future data and set the threshold,...
Increasing process variation and logic delay can significantly degrade the write-ability of near-threshold SRAM cells. In this paper, taking 8-T cell as an example, a transient NBL scheme is adopted to improve the write-ability of SRAM by using a transient negative bit-line voltage at the start of the word-line pulse without complicated on-chip control circuits, which greatly simplifies the design...
A cognitive vehicle network is date from Vehicular Ad hoc Networks (VANET), which is proposed to solve the problem of control channel and spectrum scarcity in VANET. To resolve channel conflict problem in channel switching in vehicle network, a new dynamic spectrum allocation algorithm (DSAARCC) is proposed. When the vehicle user chooses the channel, to minimize the average delay under the condition...
Efficiency of MAC (media access control) is one of important issues of power line communication (PLC). There exists efficiency problem in current CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) mechanism of large-scale PLC network. Aimed to solve this problem, a Cluster and Probability Competition Based MAC (CP-MAC) mechanism is presented to improve the MAC efficiency, in which the...
For the new energy microgrid oriented communication technologies, the broadband power line communication (BPLC) is able to achieve high speed, but there still exists anti-jamming and the anti-attenuation problems. The two-way Automatic Communication System (TWACS) has better performance on anti-jamming and the anti-attenuation ability. In this article, analysis is conducted on the communication principle...
Near space hypersonic vehicle is characterized by its high speed and high maneuverability, so the more stable algorithm, SRCKF: Square-root Cubature Kalman Filter, was applied to track it. But in the state of target's strong maneuvering, observation noise always increases, traditional CKF algorithm easily lead tracking divergence, tracking accuracy reducing and even losing targets. Aiming at this...
Renewable distributed power has the characters of cleanliness and environmental protection, it can also improve stability and flexibility of the whole power system. It is more reliable to realize information exchange between the main grid and distributed power by communication. Aiming at the problem, the paper uses the feature of extremely strong decay resistance for the power line zero-crossing communication...
The time-varying Received Signal Strength (RSS) drastically reduces the correlation between signals and location information, which leads to degrade the indoor positioning accuracy in WiFi. And the kernel selection of Support Vector Regression (SVR) is limited by the Mercer theorem, it has a negative influence on the regressive result. In this paper, a new positioning algorithm based on Kernel Direct...
In order to solve the problems existing in the traditional battery-powered sensor networks that the battery is not available to replace and the energy of nodes is easy to be exhausted, RF energy harvesting technology has been applied to the wireless rechargeable sensor network. To satisfy the energy threshold of sensor nodes in different positions, the mobile robot charger is often employed to move...
Named Data Networking (NDN) has been drawing increasing attention in both academia and industry. Data forwarding is one of the key issues in relation to efficient content retrieval in named data DTN. In this paper, we propose an activeness-based data forwarding protocol, named as ADF, to support efficient content retrieval in named data delay tolerant networks. Using the real movement trajectory data...
With the popularization of the network in recent years, the application of video broadcast system, video conference system, video Surveillance System and other aspects of the application have put forward higher requirements on the security of video information. Especially, if it is related to the military, economic and political sensitivity of the video data, studying the encryption of video data...
As network intrusion data's scale gets larger and larger, designing parallel schemes for intrusion detection have been becoming research focus in the field of information security. In order to solve the problem that the intrusion detection algorithm is high time-consuming, the classification of large amounts of data occupies lots of memory and the efficiency of single detection is low, a parallel...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.