期刊文献+
共找到511,946篇文章
< 1 2 250 >
每页显示 20 50 100
基于IGWO算法的WSNs能耗均衡路由
1
作者 谢英辉 《湖南邮电职业技术学院学报》 2024年第2期1-5,共5页
能源限制是无线传感器网络(wireless sensor networks,WSNs)面临的一系列挑战中的首要问题。如何有效管理和利用有限的能量是设计WSNs路由协议的关键。为此,提出基于改进的灰狼优化算法的WSNs能耗均衡路由(improved grey wolf optimizer... 能源限制是无线传感器网络(wireless sensor networks,WSNs)面临的一系列挑战中的首要问题。如何有效管理和利用有限的能量是设计WSNs路由协议的关键。为此,提出基于改进的灰狼优化算法的WSNs能耗均衡路由(improved grey wolf optimizer based energy balancing secure,IGWOEBS)算法,能快速搜索并建立从源节点至汇聚节点的路径,提高数据包传递率,均衡节点能耗。仿真结果表明,相比于动态分区路由算法和多策略灰狼算法,该算法延长了网络生命周期,并提升了数据收集发送传输率。 展开更多
关键词 无线传感器网络 灰狼优化算法 网络生命周期 数据传输率
下载PDF
Pluggable multitask diffractive neural networks based on cascaded metasurfaces 被引量:1
2
作者 Cong He Dan Zhao +8 位作者 Fei Fan Hongqiang Zhou Xin Li Yao Li Junjie Li Fei Dong Yin-Xiao Miao Yongtian Wang Lingling Huang 《Opto-Electronic Advances》 SCIE EI CAS CSCD 2024年第2期23-31,共9页
Optical neural networks have significant advantages in terms of power consumption,parallelism,and high computing speed,which has intrigued extensive attention in both academic and engineering communities.It has been c... Optical neural networks have significant advantages in terms of power consumption,parallelism,and high computing speed,which has intrigued extensive attention in both academic and engineering communities.It has been considered as one of the powerful tools in promoting the fields of imaging processing and object recognition.However,the existing optical system architecture cannot be reconstructed to the realization of multi-functional artificial intelligence systems simultaneously.To push the development of this issue,we propose the pluggable diffractive neural networks(P-DNN),a general paradigm resorting to the cascaded metasurfaces,which can be applied to recognize various tasks by switching internal plug-ins.As the proof-of-principle,the recognition functions of six types of handwritten digits and six types of fashions are numerical simulated and experimental demonstrated at near-infrared regimes.Encouragingly,the proposed paradigm not only improves the flexibility of the optical neural networks but paves the new route for achieving high-speed,low-power and versatile artificial intelligence systems. 展开更多
关键词 optical neural networks diffractive deep neural networks cascaded metasurfaces
下载PDF
Activation Redistribution Based Hybrid Asymmetric Quantization Method of Neural Networks 被引量:1
3
作者 Lu Wei Zhong Ma Chaojie Yang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期981-1000,共20页
The demand for adopting neural networks in resource-constrained embedded devices is continuously increasing.Quantization is one of the most promising solutions to reduce computational cost and memory storage on embedd... The demand for adopting neural networks in resource-constrained embedded devices is continuously increasing.Quantization is one of the most promising solutions to reduce computational cost and memory storage on embedded devices.In order to reduce the complexity and overhead of deploying neural networks on Integeronly hardware,most current quantization methods use a symmetric quantization mapping strategy to quantize a floating-point neural network into an integer network.However,although symmetric quantization has the advantage of easier implementation,it is sub-optimal for cases where the range could be skewed and not symmetric.This often comes at the cost of lower accuracy.This paper proposed an activation redistribution-based hybrid asymmetric quantizationmethod for neural networks.The proposedmethod takes data distribution into consideration and can resolve the contradiction between the quantization accuracy and the ease of implementation,balance the trade-off between clipping range and quantization resolution,and thus improve the accuracy of the quantized neural network.The experimental results indicate that the accuracy of the proposed method is 2.02%and 5.52%higher than the traditional symmetric quantization method for classification and detection tasks,respectively.The proposed method paves the way for computationally intensive neural network models to be deployed on devices with limited computing resources.Codes will be available on https://github.com/ycjcy/Hybrid-Asymmetric-Quantization. 展开更多
关键词 QUANTIZATION neural network hybrid asymmetric ACCURACY
下载PDF
Q学习博弈论的WSNs混合覆盖漏洞恢复
4
作者 张鸰 《机械设计与制造》 北大核心 2024年第2期22-29,共8页
针对恶劣环境下分布式无线传感器网络,为了降低成本与恢复能力,提出了一种Q学习博弈论的无线传感器网络混合覆盖漏洞恢复方法。首先设计了一种能够以分散、动态和自治的方式缩小覆盖差距的混合算法,该方法利用基于Q学习算法的博弈论概念... 针对恶劣环境下分布式无线传感器网络,为了降低成本与恢复能力,提出了一种Q学习博弈论的无线传感器网络混合覆盖漏洞恢复方法。首先设计了一种能够以分散、动态和自治的方式缩小覆盖差距的混合算法,该方法利用基于Q学习算法的博弈论概念,融合了节点重新定位和功率传输调整两种覆盖控制方案。对于所制定的潜在博弈论,传感器节点可以仅使用局部熟悉来恢复覆盖漏洞,从而减小覆盖间隙,每个传感器节点选择节点重新定位和调整感知范围。最后仿真结果表明,这里的提出的方法能够在存在连续随机覆盖漏洞条件下保持网络的整体覆盖。 展开更多
关键词 无线传感器网络 Q学习 博弈论 覆盖漏洞
下载PDF
Biodiversity metrics on ecological networks: Demonstrated with animal gastrointestinal microbiomes 被引量:1
5
作者 Zhanshan(Sam)Ma Lianwei Li 《Zoological Research(Diversity and Conservation)》 2024年第1期51-65,共15页
Biodiversity has become a terminology familiar to virtually every citizen in modern societies.It is said that ecology studies the economy of nature,and economy studies the ecology of humans;then measuring biodiversity... Biodiversity has become a terminology familiar to virtually every citizen in modern societies.It is said that ecology studies the economy of nature,and economy studies the ecology of humans;then measuring biodiversity should be similar with measuring national wealth.Indeed,there have been many parallels between ecology and economics,actually beyond analogies.For example,arguably the second most widely used biodiversity metric,Simpson(1949)’s diversity index,is a function of familiar Gini-index in economics.One of the biggest challenges has been the high“diversity”of diversity indexes due to their excessive“speciation”-there are so many indexes,similar to each country’s sovereign currency-leaving confused diversity practitioners in dilemma.In 1973,Hill introduced the concept of“numbers equivalent”,which is based on Renyi entropy and originated in economics,but possibly due to his abstruse interpretation of the concept,his message was not widely received by ecologists until nearly four decades later.What Hill suggested was similar to link the US dollar to gold at the rate of$35 per ounce under the Bretton Woods system.The Hill numbers now are considered most appropriate biodiversity metrics system,unifying Shannon,Simpson and other diversity indexes.Here,we approach to another paradigmatic shift-measuring biodiversity on ecological networks-demonstrated with animal gastrointestinal microbiomes representing four major invertebrate classes and all six vertebrate classes.The network diversity can reveal the diversity of species interactions,which is a necessary step for understanding the spatial and temporal structures and dynamics of biodiversity across environmental gradients. 展开更多
关键词 Biodiversity on network Hill numbers Animal gut microbiome network link diversity network species diversity network abundance-weighted link diversity
下载PDF
EECLP: AWireless Sensor Networks Energy Efficient Cross-Layer Protocol
6
作者 Mohammed Kaddi Mohammed Omari Moamen Alnatoor 《Computers, Materials & Continua》 SCIE EI 2024年第8期2611-2631,共21页
Recent advancements in wireless communications have allowed the birth of novel wireless sensor networks(WSN).A sensor network comprises several micro-sensors deployed randomly in an area of interest.A micro-sensor is ... Recent advancements in wireless communications have allowed the birth of novel wireless sensor networks(WSN).A sensor network comprises several micro-sensors deployed randomly in an area of interest.A micro-sensor is provided with an energy resource to supply electricity to all of its components.However,the disposed energy resource is limited and battery replacement is generally infeasible.With this restriction,the sensors must conserve energy to prolong their lifetime.Various energy conservation strategies for WSNs have been presented in the literature,from the application to the physical layer.Most of these solutions focus only on optimizing a single layer in terms of energy consumption.In this research,a novel cross-layer technique for WSNs’effective energy usage is presented.Because most energy consumption factors exist in the Medium Access Control(MAC)layer and network layer,our EECLP protocol(Energy Efficient Cross-Layer Protocol for Wireless Sensor Networks)integrates these two layers to satisfy energy efficiency criteria.To gain access to the transmission channel,we implement a communication regime at the MAC layer based on CSMA/CA(Carrier Sense Multiple Access/Collision Avoidance)techniques.Next,depending on the activity and a standby period,we employ the RTS/CTS(Request to Send/Clear to Send)method to prevent collisions and resolve hidden node concerns by utilizing the network allocation vector(NAV)to calculate the transmission duration.Employing a greedy strategy,we establish chains amongst cluster members to mitigate the issue of high energy consumption in routing data.An objective function was utilized to determine the optimal cross-chain path based on the distances to the base station(BS)and residual energy(RE).The simulation,testing,and comparison of the proposed protocol to peer protocols have shown superior outcomes and a prolonged network lifespan.Using the suggested protocol,the network lifetime increases by 10%compared to FAMACO(Fuzzy and Ant Colony Optimization based MAC/Routing Cross-layer)protocol,and it increases by 90%and 95%compared to IFUC(Improved Fuzzy Unequal Clustering)and UHEED(Unequal Hybrid Energy Efficient and Distributed)protocols successively. 展开更多
关键词 wsn energy consumption MAC layer network layer EECLP ENERGY-EFFICIENT LIFESPAN
下载PDF
Correcting Climate Model Sea Surface Temperature Simulations with Generative Adversarial Networks:Climatology,Interannual Variability,and Extremes 被引量:2
7
作者 Ya WANG Gang HUANG +6 位作者 Baoxiang PAN Pengfei LIN Niklas BOERS Weichen TAO Yutong CHEN BO LIU Haijie LI 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2024年第7期1299-1312,共14页
Climate models are vital for understanding and projecting global climate change and its associated impacts.However,these models suffer from biases that limit their accuracy in historical simulations and the trustworth... Climate models are vital for understanding and projecting global climate change and its associated impacts.However,these models suffer from biases that limit their accuracy in historical simulations and the trustworthiness of future projections.Addressing these challenges requires addressing internal variability,hindering the direct alignment between model simulations and observations,and thwarting conventional supervised learning methods.Here,we employ an unsupervised Cycle-consistent Generative Adversarial Network(CycleGAN),to correct daily Sea Surface Temperature(SST)simulations from the Community Earth System Model 2(CESM2).Our results reveal that the CycleGAN not only corrects climatological biases but also improves the simulation of major dynamic modes including the El Niño-Southern Oscillation(ENSO)and the Indian Ocean Dipole mode,as well as SST extremes.Notably,it substantially corrects climatological SST biases,decreasing the globally averaged Root-Mean-Square Error(RMSE)by 58%.Intriguingly,the CycleGAN effectively addresses the well-known excessive westward bias in ENSO SST anomalies,a common issue in climate models that traditional methods,like quantile mapping,struggle to rectify.Additionally,it substantially improves the simulation of SST extremes,raising the pattern correlation coefficient(PCC)from 0.56 to 0.88 and lowering the RMSE from 0.5 to 0.32.This enhancement is attributed to better representations of interannual,intraseasonal,and synoptic scales variabilities.Our study offers a novel approach to correct global SST simulations and underscores its effectiveness across different time scales and primary dynamical modes. 展开更多
关键词 generative adversarial networks model bias deep learning El Niño-Southern Oscillation marine heatwaves
下载PDF
A data-driven model of drop size prediction based on artificial neural networks using small-scale data sets 被引量:1
8
作者 Bo Wang Han Zhou +3 位作者 Shan Jing Qiang Zheng Wenjie Lan Shaowei Li 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2024年第2期71-83,共13页
An artificial neural network(ANN)method is introduced to predict drop size in two kinds of pulsed columns with small-scale data sets.After training,the deviation between calculate and experimental results are 3.8%and ... An artificial neural network(ANN)method is introduced to predict drop size in two kinds of pulsed columns with small-scale data sets.After training,the deviation between calculate and experimental results are 3.8%and 9.3%,respectively.Through ANN model,the influence of interfacial tension and pulsation intensity on the droplet diameter has been developed.Droplet size gradually increases with the increase of interfacial tension,and decreases with the increase of pulse intensity.It can be seen that the accuracy of ANN model in predicting droplet size outside the training set range is reach the same level as the accuracy of correlation obtained based on experiments within this range.For two kinds of columns,the drop size prediction deviations of ANN model are 9.6%and 18.5%and the deviations in correlations are 11%and 15%. 展开更多
关键词 Artificial neural network Drop size Solvent extraction Pulsed column Two-phase flow HYDRODYNAMICS
下载PDF
A Novel Approach to Energy Optimization:Efficient Path Selection in Wireless Sensor Networks with Hybrid ANN
9
作者 Muhammad Salman Qamar Ihsan ulHaq +3 位作者 Amil Daraz Atif MAlamri Salman A.AlQahtani Muhammad Fahad Munir 《Computers, Materials & Continua》 SCIE EI 2024年第5期2945-2970,共26页
In pursuit of enhancing the Wireless Sensor Networks(WSNs)energy efficiency and operational lifespan,this paper delves into the domain of energy-efficient routing protocols.InWSNs,the limited energy resources of Senso... In pursuit of enhancing the Wireless Sensor Networks(WSNs)energy efficiency and operational lifespan,this paper delves into the domain of energy-efficient routing protocols.InWSNs,the limited energy resources of Sensor Nodes(SNs)are a big challenge for ensuring their efficient and reliable operation.WSN data gathering involves the utilization of a mobile sink(MS)to mitigate the energy consumption problem through periodic network traversal.The mobile sink(MS)strategy minimizes energy consumption and latency by visiting the fewest nodes or predetermined locations called rendezvous points(RPs)instead of all cluster heads(CHs).CHs subsequently transmit packets to neighboring RPs.The unique determination of this study is the shortest path to reach RPs.As the mobile sink(MS)concept has emerged as a promising solution to the energy consumption problem in WSNs,caused by multi-hop data collection with static sinks.In this study,we proposed two novel hybrid algorithms,namely“ Reduced k-means based on Artificial Neural Network”(RkM-ANN)and“Delay Bound Reduced kmeans with ANN”(DBRkM-ANN)for designing a fast,efficient,and most proficient MS path depending upon rendezvous points(RPs).The first algorithm optimizes the MS’s latency,while the second considers the designing of delay-bound paths,also defined as the number of paths with delay over bound for the MS.Both methods use a weight function and k-means clustering to choose RPs in a way that maximizes efficiency and guarantees network-wide coverage.In addition,a method of using MS scheduling for efficient data collection is provided.Extensive simulations and comparisons to several existing algorithms have shown the effectiveness of the suggested methodologies over a wide range of performance indicators. 展开更多
关键词 Wireless Sensor networks(wsns) mobile sink(MS) rendezvous point(RP) machine learning Artificial Neural networks(ANNs)
下载PDF
IWSNs防移动干扰节点的两层协作Stackelberg博弈
10
作者 孙子文 杨晨曦 《系统工程与电子技术》 EI CSCD 北大核心 2024年第4期1448-1455,共8页
针对工业无线传感器网络物理层移动干扰攻击节点的攻击问题,研究sink节点和簇头节点共同抵御攻击的两层协作博弈模型。在簇头节点中选择最佳协作节点,共同抵御移动干扰攻击节点;以网络安全速率为优化目标,将sink节点、最佳协作节点和攻... 针对工业无线传感器网络物理层移动干扰攻击节点的攻击问题,研究sink节点和簇头节点共同抵御攻击的两层协作博弈模型。在簇头节点中选择最佳协作节点,共同抵御移动干扰攻击节点;以网络安全速率为优化目标,将sink节点、最佳协作节点和攻击节点之间的合作竞争关系建模为两层协作Stackelberg博弈模型,采用逆向归纳法求解博弈均衡解。仿真实验结果表明,与未采用协作节点的方案相比,采用的最佳协作节点选择方案对移动攻击节点的抵御效果更佳,且与其他协作博弈功率控制模型相比,两层协作Stackelberg博弈模型可有效提高工业无线传感器网络的安全速率。 展开更多
关键词 工业无线传感器网络 移动干扰攻击 协作干扰 STACKELBERG博弈
下载PDF
优化聚类分簇结合自适应中继策略的双簇首WSNs路由算法
11
作者 张晶 高翔 张宏 《小型微型计算机系统》 CSCD 北大核心 2024年第4期1007-1017,共11页
针对无线传感器网络中分簇路由算法节点能量利用率低、能量消耗不均匀等问题,提出了一种优化聚类分簇结合自适应中继策略的双簇首无线传感器网络路由算法.该算法对分簇路由协议中的三个阶段分别进行优化设计.成簇阶段,首先对双簇首模型... 针对无线传感器网络中分簇路由算法节点能量利用率低、能量消耗不均匀等问题,提出了一种优化聚类分簇结合自适应中继策略的双簇首无线传感器网络路由算法.该算法对分簇路由协议中的三个阶段分别进行优化设计.成簇阶段,首先对双簇首模型下最优成簇规模与网络能耗的关系进行理论分析,然后使用改进的算术优化算法计算模糊C均值算法的初始聚类中心,提高了模糊C均值算法聚类成簇的准确率和鲁棒性.簇首选举阶段,引入双簇首策略,以节点的位置、能量和中心度为影响因子,根据承担任务的不同分别为内外簇首设计独立的簇首评价函数,以评价值为依据由节点分布式动态选举簇首减少了广播数量,同时可以将整个簇的能量负载平均分配到每个簇成员节点中.数据传输阶段,设置了多跳中继策略的距离适用条件,并以能量消耗速率为依据选择中继节点,避免了节点提前过载.仿真结果表明:在多种规模的网络中,该算法相较于对比算法在均衡网络负载、提高能量利用效率方面效果更好,从而延长了网络的有效感测时间. 展开更多
关键词 无线传感器网络 分簇路由算法 模糊C均值 算术优化算法 能耗优化
下载PDF
Enabling Efficient Data Transmission in Wireless Sensor Networks-Based IoT Application
12
作者 Ibraheem Al-Hejri Farag Azzedin +1 位作者 Sultan Almuhammadi Naeem Firdous Syed 《Computers, Materials & Continua》 SCIE EI 2024年第6期4197-4218,共22页
The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure ... The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure domains like oil and gas supply,intelligent transportation,power grids,and autonomous agriculture,it is essential to guarantee the confidentiality,integrity,and authenticity of data collected and exchanged.However,the limited resources coupled with the heterogeneity of IoT devices make it inefficient or sometimes infeasible to achieve secure data transmission using traditional cryptographic techniques.Consequently,designing a lightweight secure data transmission scheme is becoming essential.In this article,we propose lightweight secure data transmission(LSDT)scheme for IoT environments.LSDT consists of three phases and utilizes an effective combination of symmetric keys and the Elliptic Curve Menezes-Qu-Vanstone asymmetric key agreement protocol.We design the simulation environment and experiments to evaluate the performance of the LSDT scheme in terms of communication and computation costs.Security and performance analysis indicates that the LSDT scheme is secure,suitable for IoT applications,and performs better in comparison to other related security schemes. 展开更多
关键词 IoT LIGHTWEIGHT computation complexity communication overhead cybersecurity threats threat prevention secure data transmission Wireless Sensor networks(wsns) elliptic curve cryptography
下载PDF
Influencer identification of dynamical networks based on an information entropy dimension reduction method
13
作者 段东立 纪思源 袁紫薇 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第4期375-384,共10页
Identifying critical nodes or sets in large-scale networks is a fundamental scientific problem and one of the key research directions in the fields of data mining and network science when implementing network attacks,... Identifying critical nodes or sets in large-scale networks is a fundamental scientific problem and one of the key research directions in the fields of data mining and network science when implementing network attacks, defense, repair and control.Traditional methods usually begin from the centrality, node location or the impact on the largest connected component after node destruction, mainly based on the network structure.However, these algorithms do not consider network state changes.We applied a model that combines a random connectivity matrix and minimal low-dimensional structures to represent network connectivity.By using mean field theory and information entropy to calculate node activity,we calculated the overlap between the random parts and fixed low-dimensional parts to quantify the influence of node impact on network state changes and ranked them by importance.We applied this algorithm and the proposed importance algorithm to the overall analysis and stratified analysis of the C.elegans neural network.We observed a change in the critical entropy of the network state and by utilizing the proposed method we can calculate the nodes that indirectly affect muscle cells through neural layers. 展开更多
关键词 dynamical networks network influencer low-dimensional dynamics network disintegration
下载PDF
Effective data transmission through energy-efficient clustering and Fuzzy-Based IDS routing approach in WSNs
14
作者 Saziya TABBASSUM Rajesh Kumar PATHAK 《虚拟现实与智能硬件(中英文)》 EI 2024年第1期1-16,共16页
Wireless sensor networks(WSN)gather information and sense information samples in a certain region and communicate these readings to a base station(BS).Energy efficiency is considered a major design issue in the WSNs,a... Wireless sensor networks(WSN)gather information and sense information samples in a certain region and communicate these readings to a base station(BS).Energy efficiency is considered a major design issue in the WSNs,and can be addressed using clustering and routing techniques.Information is sent from the source to the BS via routing procedures.However,these routing protocols must ensure that packets are delivered securely,guaranteeing that neither adversaries nor unauthentic individuals have access to the sent information.Secure data transfer is intended to protect the data from illegal access,damage,or disruption.Thus,in the proposed model,secure data transmission is developed in an energy-effective manner.A low-energy adaptive clustering hierarchy(LEACH)is developed to efficiently transfer the data.For the intrusion detection systems(IDS),Fuzzy logic and artificial neural networks(ANNs)are proposed.Initially,the nodes were randomly placed in the network and initialized to gather information.To ensure fair energy dissipation between the nodes,LEACH randomly chooses cluster heads(CHs)and allocates this role to the various nodes based on a round-robin management mechanism.The intrusion-detection procedure was then utilized to determine whether intruders were present in the network.Within the WSN,a Fuzzy interference rule was utilized to distinguish the malicious nodes from legal nodes.Subsequently,an ANN was employed to distinguish the harmful nodes from suspicious nodes.The effectiveness of the proposed approach was validated using metrics that attained 97%accuracy,97%specificity,and 97%sensitivity of 95%.Thus,it was proved that the LEACH and Fuzzy-based IDS approaches are the best choices for securing data transmission in an energy-efficient manner. 展开更多
关键词 Low energy adaptive clustering hierarchy(LEACH) Intrusion detection system(IDS) Wireless sensor network(wsn) Fuzzy logic and artificial neural network(ANN)
下载PDF
Verifying hierarchical network nonlocality in general quantum networks
15
作者 杨舒媛 侯晋川 贺衎 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第7期199-208,共10页
Recently, a class of innovative notions on quantum network nonlocality(QNN), called full quantum network nonlocality(FQNN), have been proposed in Phys. Rev. Lett. 128 010403(2022). As the generalization of full networ... Recently, a class of innovative notions on quantum network nonlocality(QNN), called full quantum network nonlocality(FQNN), have been proposed in Phys. Rev. Lett. 128 010403(2022). As the generalization of full network nonlocality(FNN), l-level quantum network nonlocality(l-QNN) was defined in arxiv. 2306.15717 quant-ph(2024). FQNN is a NN that can be generated only from a network with all sources being non-classical. This is beyond the existing standard network nonlocality, which may be generated from a network with only a non-classical source. One of the challenging tasks is to establish corresponding Bell-like inequalities to demonstrate the FQNN or l-QNN. Up to now, the inequality criteria for FQNN and l-QNN have only been established for star and chain networks. In this paper, we devote ourselves to establishing Bell-like inequalities for networks with more complex structures. Note that star and chain networks are special kinds of tree-shaped networks. We first establish the Bell-like inequalities for verifying l-QNN in k-forked tree-shaped networks. Such results generalize the existing inequalities for star and chain networks. Furthermore, we find the Bell-like inequality criteria for l-QNN for general acyclic and cyclic networks. Finally, we discuss the demonstration of l-QNN in the well-known butterfly networks. 展开更多
关键词 full network nonlocality hierarchical network nonlocality tree network
下载PDF
Source localization in signed networks with effective distance
16
作者 马志伟 孙蕾 +2 位作者 丁智国 黄宜真 胡兆龙 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第2期577-585,共9页
While progress has been made in information source localization,it has overlooked the prevalent friend and adversarial relationships in social networks.This paper addresses this gap by focusing on source localization ... While progress has been made in information source localization,it has overlooked the prevalent friend and adversarial relationships in social networks.This paper addresses this gap by focusing on source localization in signed network models.Leveraging the topological characteristics of signed networks and transforming the propagation probability into effective distance,we propose an optimization method for observer selection.Additionally,by using the reverse propagation algorithm we present a method for information source localization in signed networks.Extensive experimental results demonstrate that a higher proportion of positive edges within signed networks contributes to more favorable source localization,and the higher the ratio of propagation rates between positive and negative edges,the more accurate the source localization becomes.Interestingly,this aligns with our observation that,in reality,the number of friends tends to be greater than the number of adversaries,and the likelihood of information propagation among friends is often higher than among adversaries.In addition,the source located at the periphery of the network is not easy to identify.Furthermore,our proposed observer selection method based on effective distance achieves higher operational efficiency and exhibits higher accuracy in information source localization,compared with three strategies for observer selection based on the classical full-order neighbor coverage. 展开更多
关键词 complex networks signed networks source localization effective distance
下载PDF
The Immense Impact of Reverse Edges on Large Hierarchical Networks
17
作者 Haosen Cao Bin-Bin Hu +7 位作者 Xiaoyu Mo Duxin Chen Jianxi Gao Ye Yuan Guanrong Chen Tamás Vicsek Xiaohong Guan Hai-Tao Zhang 《Engineering》 SCIE EI CAS CSCD 2024年第5期240-249,共10页
Hierarchical networks are frequently encountered in animal groups,gene networks,and artificial engineering systems such as multiple robots,unmanned vehicle systems,smart grids,wind farm networks,and so forth.The struc... Hierarchical networks are frequently encountered in animal groups,gene networks,and artificial engineering systems such as multiple robots,unmanned vehicle systems,smart grids,wind farm networks,and so forth.The structure of a large directed hierarchical network is often strongly influenced by reverse edges from lower-to higher-level nodes,such as lagging birds’howl in a flock or the opinions of lowerlevel individuals feeding back to higher-level ones in a social group.This study reveals that,for most large-scale real hierarchical networks,the majority of the reverse edges do not affect the synchronization process of the entire network;the synchronization process is influenced only by a small part of these reverse edges along specific paths.More surprisingly,a single effective reverse edge can slow down the synchronization of a huge hierarchical network by over 60%.The effect of such edges depends not on the network size but only on the average in-degree of the involved subnetwork.The overwhelming majority of active reverse edges turn out to have some kind of“bunching”effect on the information flows of hierarchical networks,which slows down synchronization processes.This finding refines the current understanding of the role of reverse edges in many natural,social,and engineering hierarchical networks,which might be beneficial for precisely tuning the synchronization rhythms of these networks.Our study also proposes an effective way to attack a hierarchical network by adding a malicious reverse edge to it and provides some guidance for protecting a network by screening out the specific small proportion of vulnerable nodes. 展开更多
关键词 SYNCHRONIZABILITY Large hierarchical networks Reverse edges Information flows Complex networks
下载PDF
Impact of different interaction behavior on epidemic spreading in time-dependent social networks
18
作者 黄帅 陈杰 +2 位作者 李梦玉 徐元昊 胡茂彬 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期190-195,共6页
We investigate the impact of pairwise and group interactions on the spread of epidemics through an activity-driven model based on time-dependent networks.The effects of pairwise/group interaction proportion and pairwi... We investigate the impact of pairwise and group interactions on the spread of epidemics through an activity-driven model based on time-dependent networks.The effects of pairwise/group interaction proportion and pairwise/group interaction intensity are explored by extensive simulation and theoretical analysis.It is demonstrated that altering the group interaction proportion can either hinder or enhance the spread of epidemics,depending on the relative social intensity of group and pairwise interactions.As the group interaction proportion decreases,the impact of reducing group social intensity diminishes.The ratio of group and pairwise social intensity can affect the effect of group interaction proportion on the scale of infection.A weak heterogeneous activity distribution can raise the epidemic threshold,and reduce the scale of infection.These results benefit the design of epidemic control strategy. 展开更多
关键词 epidemic transmission complex network time-dependent networks social interaction
下载PDF
Migration Networks Pattern of China’s Floating Population from the Perspective of Complex Network
19
作者 LIU Wangbao CHEN Ranran 《Chinese Geographical Science》 SCIE CSCD 2024年第2期327-341,共15页
Since China’s reform and opening-up,the growing disparity between urban and rural areas and regions has led to massive migration.With China’s Rural Revitalization Strategy and the industrial transfer from the easter... Since China’s reform and opening-up,the growing disparity between urban and rural areas and regions has led to massive migration.With China’s Rural Revitalization Strategy and the industrial transfer from the eastern coastal areas to the inland,the migration direction and pattern of the floating population have undergone certain changes.Using the 2017 China Migrants Dynamic Survey(CMDS),excluding Hong Kong,Macao,and Taiwan regions of China,organized by China’s National Health Commission,the relationship matrix of the floating population is constructed according to the inflow place of the interviewees and their outflow place(the location of the registered residence)in the questionnaire survey.We then apply the complex network model to analyze the migration direction and network pattern of China’s floating population from the city scale.The migration network shows an obvious hierarchical agglomeration.The first-,second-,third-and fourth-tier distribution cities are municipalities directly under the central government,provincial capital cities,major cities in the central and western regions and ordinary cities in all provinces,respectively.The migration trend is from the central and western regions to the eastern coastal areas.The migration network has‘small world’characteristics,forming nine communities.It shows that most node cities in the same community are closely linked and geographically close,indicating that the migration network of floating population is still affected by geographical proximity.Narrowing the urban-rural and regional differences will promote the rational distribution this population.It is necessary to strengthen the reform of the registered residence system,so that the floating population can enjoy urban public services comparable to other populations,and allow migrants to live and work in peace. 展开更多
关键词 complex network floating population migration network spatial pattern community structure
下载PDF
基于改进和声搜索的配电网WSNs多路径QoS路由算法 被引量:1
20
作者 杨佳 季泽宇 +1 位作者 王佳豪 彭瑞召 《电气工程学报》 CSCD 北大核心 2024年第1期272-280,共9页
针对智能配电网(Smart distribution network,SDN)中无线通信数据传输不可靠且网络寿命低等问题,提出一种基于改进和声搜索的无线传感器网络(Wireless sensor networks,WSNs)多路径QoS路由算法(Multipath QoS routing algorithm,MQRA)... 针对智能配电网(Smart distribution network,SDN)中无线通信数据传输不可靠且网络寿命低等问题,提出一种基于改进和声搜索的无线传感器网络(Wireless sensor networks,WSNs)多路径QoS路由算法(Multipath QoS routing algorithm,MQRA)。首先,分析配电网的通信需求并建立数据传输模型;然后,针对无线传感器路由问题的特点对和声搜索算法(Harmony search,HS)做出改进;再将其自适应参数公式进行改进以避免算法陷入局部最优;通过在源节点与目的节点之间构建前传区域来优化转发节点集以避免数据回传,提升算法的运行效率;最后,在初始和声库生成阶段,综合考虑距离、丢包率以及节点剩余能量来改进轮盘法中的概率公式。仿真结果表明MQRA算法能有效降低数据传输的时延,提升数据可靠性并均衡节点能耗延长网络使用寿命。 展开更多
关键词 无线传感器网络 智能配电网 和声搜索 路由算法 服务质量
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部