期刊文献+
共找到23篇文章
< 1 2 >
每页显示 20 50 100
EECLP: AWireless Sensor Networks Energy Efficient Cross-Layer Protocol
1
作者 Mohammed Kaddi Mohammed Omari Moamen Alnatoor 《Computers, Materials & Continua》 SCIE EI 2024年第8期2611-2631,共21页
Recent advancements in wireless communications have allowed the birth of novel wireless sensor networks(WSN).A sensor network comprises several micro-sensors deployed randomly in an area of interest.A micro-sensor is ... Recent advancements in wireless communications have allowed the birth of novel wireless sensor networks(WSN).A sensor network comprises several micro-sensors deployed randomly in an area of interest.A micro-sensor is provided with an energy resource to supply electricity to all of its components.However,the disposed energy resource is limited and battery replacement is generally infeasible.With this restriction,the sensors must conserve energy to prolong their lifetime.Various energy conservation strategies for WSNs have been presented in the literature,from the application to the physical layer.Most of these solutions focus only on optimizing a single layer in terms of energy consumption.In this research,a novel cross-layer technique for WSNs’effective energy usage is presented.Because most energy consumption factors exist in the Medium Access Control(MAC)layer and network layer,our EECLP protocol(Energy Efficient Cross-Layer Protocol for Wireless Sensor Networks)integrates these two layers to satisfy energy efficiency criteria.To gain access to the transmission channel,we implement a communication regime at the MAC layer based on CSMA/CA(Carrier Sense Multiple Access/Collision Avoidance)techniques.Next,depending on the activity and a standby period,we employ the RTS/CTS(Request to Send/Clear to Send)method to prevent collisions and resolve hidden node concerns by utilizing the network allocation vector(NAV)to calculate the transmission duration.Employing a greedy strategy,we establish chains amongst cluster members to mitigate the issue of high energy consumption in routing data.An objective function was utilized to determine the optimal cross-chain path based on the distances to the base station(BS)and residual energy(RE).The simulation,testing,and comparison of the proposed protocol to peer protocols have shown superior outcomes and a prolonged network lifespan.Using the suggested protocol,the network lifetime increases by 10%compared to FAMACO(Fuzzy and Ant Colony Optimization based MAC/Routing Cross-layer)protocol,and it increases by 90%and 95%compared to IFUC(Improved Fuzzy Unequal Clustering)and UHEED(Unequal Hybrid Energy Efficient and Distributed)protocols successively. 展开更多
关键词 WSN energy consumption MAC layer network layer EECLP ENERGY-EFFICIENT LIFESPAN
下载PDF
Cascading Delays for the High-Speed Rail Network Under Different Emergencies:A Double Layer Network Approach
2
作者 Xingtang Wu Mingkun Yang +3 位作者 Wenbo Lian Min Zhou Hongwei Wang Hairong Dong 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第10期2014-2025,共12页
High-speed rail(HSR) has formed a networked operational scale in China. Any internal or external disturbance may deviate trains’ operation from the planned schedules, resulting in primary delays or even cascading del... High-speed rail(HSR) has formed a networked operational scale in China. Any internal or external disturbance may deviate trains’ operation from the planned schedules, resulting in primary delays or even cascading delays on a network scale. Studying the delay propagation mechanism could help to improve the timetable resilience in the planning stage and realize cooperative rescheduling for dispatchers. To quickly and effectively predict the spatial-temporal range of cascading delays, this paper proposes a max-plus algebra based delay propagation model considering trains’ operation strategy and the systems’ constraints. A double-layer network based breadth-first search algorithm based on the constraint network and the timetable network is further proposed to solve the delay propagation process for different kinds of emergencies. The proposed model could deal with the delay propagation problem when emergencies occur in sections or stations and is suitable for static emergencies and dynamic emergencies. Case studies show that the proposed algorithm can significantly improve the computational efficiency of the large-scale HSR network. Moreover, the real operational data of China HSR is adopted to verify the proposed model, and the results show that the cascading delays can be timely and accurately inferred, and the delay propagation characteristics under three kinds of emergencies are unfolded. 展开更多
关键词 Delay propagation double layer network high speed rail network max-plus algebra
下载PDF
Exploring the Road to 6G: ABC-Foundation for Intelligent Mobile Networks 被引量:10
3
作者 Jinkang Zhu Ming Zhao +1 位作者 Sihai Zhang Wuyang Zhou 《China Communications》 SCIE CSCD 2020年第6期51-67,共17页
The 5 th generation(5 G)mobile networks has been put into services across a number of markets,which aims at providing subscribers with high bit rates,low latency,high capacity,many new services and vertical applicatio... The 5 th generation(5 G)mobile networks has been put into services across a number of markets,which aims at providing subscribers with high bit rates,low latency,high capacity,many new services and vertical applications.Therefore the research and development on 6 G have been put on the agenda.Regarding demands and characteristics of future 6 G,artificial intelligence(A),big data(B)and cloud computing(C)will play indispensable roles in achieving the highest efficiency and the largest benefits.Interestingly,the initials of these three aspects remind us the significance of vitamin ABC to human body.In this article we specifically expound on the three elements of ABC and relationships in between.We analyze the basic characteristics of wireless big data(WBD)and the corresponding technical action in A and C,which are the high dimensional feature and spatial separation,the predictive ability,and the characteristics of knowledge.Based on the abilities of WBD,a new learning approach for wireless AI called knowledge+data-driven deep learning(KD-DL)method,and a layered computing architecture of mobile network integrating cloud/edge/terminal computing,is proposed,and their achievable efficiency is discussed.These progress will be conducive to the development of future 6 G. 展开更多
关键词 6G Artificial intelligence Wireless big data Cloud computing Knowledge+data driven deep learning layered computing layered network
下载PDF
Cognitive Intelligence Based 6G Distributed Network Architecture 被引量:2
4
作者 Xiaodong Duan Tao Sun +7 位作者 Chao Liu Xiao Ma Zheng Hu Lu Lu Chunhong Zhang Benhui Zhuang Weiyuan Li Shangguang Wang 《China Communications》 SCIE CSCD 2022年第6期137-153,共17页
5G is envisioned to guarantee high transmission rate,ultra-low latency,high reliability and massive connections.To satisfy the above requirements,the 5G architecture is designed with the properties of using service-ba... 5G is envisioned to guarantee high transmission rate,ultra-low latency,high reliability and massive connections.To satisfy the above requirements,the 5G architecture is designed with the properties of using service-based architecture,cloud-native oriented,adopting IT-based API interfaces and introduction of the Network Repository Function.However,with the wide commercialization of 5G network and the exploration towards 6G,the 5G architecture exposes the disadvantages of high architecture complexity,difficult inter-interface communication,low cognitive capability,bad instantaneity,and deficient intelligence.To overcome these limitations,this paper investigates 6G network architecture,and proposes a cognitive intelligence based distributed 6G network architecture.This architecture consists of a physical network layer and an intelligent decision layer.The two layers coordinate through flexible service interfaces,supporting function decoupling and joint evolution of intelligence services and network services.With the above design,the proposed 6G architecture can be updated autonomously to deal with the future unpredicted complex services. 展开更多
关键词 cognitive intelligence service-based architecture physical network layer intelligent decision layer
下载PDF
A Physical Layer Network Coding Based Tag Anti-Collision Algorithm for RFID System 被引量:3
5
作者 Cuixiang Wang Xing Shao +1 位作者 Yifan Meng Jun Gao 《Computers, Materials & Continua》 SCIE EI 2021年第1期931-945,共15页
In RFID(Radio Frequency IDentification)system,when multiple tags are in the operating range of one reader and send their information to the reader simultaneously,the signals of these tags are superimposed in the air,w... In RFID(Radio Frequency IDentification)system,when multiple tags are in the operating range of one reader and send their information to the reader simultaneously,the signals of these tags are superimposed in the air,which results in a collision and leads to the degrading of tags identifying efficiency.To improve the multiple tags’identifying efficiency due to collision,a physical layer network coding based binary search tree algorithm(PNBA)is proposed in this paper.PNBA pushes the conflicting signal information of multiple tags into a stack,which is discarded by the traditional anti-collision algorithm.In addition,physical layer network coding is exploited by PNBA to obtain unread tag information through the decoding operation of physical layer network coding using the conflicting information in the stack.Therefore,PNBA reduces the number of interactions between reader and tags,and improves the tags identification efficiency.Theoretical analysis and simulation results using MATLAB demonstrate that PNBA reduces the number of readings,and improve RFID identification efficiency.Especially,when the number of tags to be identified is 100,the average needed reading number of PNBA is 83%lower than the basic binary search tree algorithm,43%lower than reverse binary search tree algorithm,and its reading efficiency reaches 0.93. 展开更多
关键词 Radio frequency identification(RFID) tag anti-collision algorithm physical layer network coding binary search tree algorithm
下载PDF
Analysis of robustness of urban bus network 被引量:3
6
作者 任涛 王一帆 +1 位作者 刘苗苗 徐艳杰 《Chinese Physics B》 SCIE EI CAS CSCD 2016年第2期1-12,共12页
In this paper, the invulnerability and cascade failures are discussed for the urban bus network. Firstly, three static models(bus stop network, bus transfer network, and bus line network) are used to analyse the str... In this paper, the invulnerability and cascade failures are discussed for the urban bus network. Firstly, three static models(bus stop network, bus transfer network, and bus line network) are used to analyse the structure and invulnerability of urban bus network in order to understand the features of bus network comprehensively. Secondly, a new way is proposed to study the invulnerability of urban bus network by modelling two layered networks, i.e., the bus stop-line network and the bus line-transfer network and then the interactions between different models are analysed. Finally, by modelling a new layered network which can reflect the dynamic passenger flows, the cascade failures are discussed. Then a new load redistribution method is proposed to study the robustness of dynamic traffic. In this paper, the bus network of Shenyang City which is one of the biggest cities in China, is taken as a simulation example. In addition, some suggestions are given to improve the urban bus network and provide emergency strategies when traffic congestion occurs according to the numerical simulation results. 展开更多
关键词 complex network urban bus network layered network INVULNERABILITY cascade failures
下载PDF
STUDY ON STRATEGY OF DYNAMIC JOINT ROUTING AND RESOURCE ALLOCATION IN LAYERED OPTICAL TRANSPORT NETWORKS 被引量:2
7
作者 Su Yang Xu Zhanqi +1 位作者 Zhao Ruiqin Liu Zengji 《Journal of Electronics(China)》 2008年第2期166-173,共8页
A layered network model for optical transport networks is proposed in this paper,which involves Internet Protocol(IP) ,Synchronous Digital Hierarchy(SDH) and Wavelength Division Mul-tiplexing(WDM) layers. The strategy... A layered network model for optical transport networks is proposed in this paper,which involves Internet Protocol(IP) ,Synchronous Digital Hierarchy(SDH) and Wavelength Division Mul-tiplexing(WDM) layers. The strategy of Dynamic Joint Routing and Resource Allocation(DJRRA) and its algorithm description are also presented for the proposed layered network model. DJRRA op-timizes the bandwidth usage of interface links between different layers and the logic links inside all layers. The simulation results show that DJRRA can reduce the blocking probability and increase network throughput effectively,which is in contrast to the classical separate sequential routing and resource allocation solutions. 展开更多
关键词 Layered network model Optical transport network Joint routing and resource allocation network throughput
下载PDF
A Priority-aware Frequency Domain Polling MAC Protocol for OFDMA-based Networks in Cyber-physical Systems 被引量:1
8
作者 Meng Zheng Junru Lin +1 位作者 Wei Liang Haibin Yu 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI 2015年第4期412-421,共10页
Wireless networking in cyber-physical systems (CPSs) is characteristically different from traditional wireless systems due to the harsh radio frequency environment and applications that impose high real-time and relia... Wireless networking in cyber-physical systems (CPSs) is characteristically different from traditional wireless systems due to the harsh radio frequency environment and applications that impose high real-time and reliability constraints. One of the fundamental considerations for enabling CPS networks is the medium access control protocol. To this end, this paper proposes a novel priority-aware frequency domain polling medium access control (MAC) protocol, which takes advantage of an orthogonal frequency-division multiple access (OFDMA) physical layer to achieve instantaneous priority-aware polling. Based on the polling result, the proposed work then optimizes the resource allocation of the OFDMA network to further improve the data reliability. Due to the non-polynomial-complete nature of the OFDMA resource allocation, we propose two heuristic rules, based on which an efficient solution algorithm to the OFDMA resource allocation problem is designed. Simulation results show that the reliability performance of CPS networks is significantly improved because of this work. © 2014 Chinese Association of Automation. 展开更多
关键词 Access control Embedded systems Frequency domain analysis Medium access control network layers Orthogonal frequency division multiplexing POLYNOMIALS Real time systems Reliability Resource allocation Wireless networks
下载PDF
Artificial Neural Network-based prediction of glacial debris flows in the ParlungZangbo Basin, southeastern Tibetan Plateau,China 被引量:1
9
作者 TANG Wang DING Hai-tao +4 位作者 CHEN Ning-sheng MA Shang-Chang LIU Li-hong WU Kang-lin TIAN Shu-feng 《Journal of Mountain Science》 SCIE CSCD 2021年第1期51-67,共17页
Accurate prediction on geological hazards can prevent disaster events in advance and greatly reduce property losses and life casualties.Glacial debris flows are the most serious hazards in southeastern Tibet in China ... Accurate prediction on geological hazards can prevent disaster events in advance and greatly reduce property losses and life casualties.Glacial debris flows are the most serious hazards in southeastern Tibet in China due to their complexity in formation mechanism and the difficulty in prediction.Data collected from 102 glacier debris flow events from 31 gullies since 1970 and regional meteorological data from 1970 to 2019 in ParlungZangbo River Basin in southeastern Tibet were used for Artificial Neural Network(ANN)-based prediction of glacial debris flows.The formation mechanism of glacial debris flows in the ParlungZangbo Basin was systematically analyzed,and the calculations involving the meteorological data and disaster events were conducted by using the statistical methods and two layers fully connected neural networks.The occurrence probabilities and scales of glacial debris flows(small,medium,and large)were predicted,and promising results have been achieved.Through the proposed model calculations,a prediction accuracy of 78.33%was achieved for the scale of glacial debris flows in the study area.The prediction accuracy for both large-and medium-scale debris flows are higher than that for small-scale debris flows.The debris flow scale and the probability of occurrence increase with increasing rainfall and temperature.In addition,the K-fold cross-validation method was used to verify the reliability of the model.The average accuracy of the model calculated under this method is about 93.3%,which validates the proposed model.Practices have proved that the combination of ANN and disaster events can provide sound prediction on geological hazards under complex conditions. 展开更多
关键词 Two layers neural networks Glacial debris flow Disaster events K-fold cross-validation RAINFALL Temperature
下载PDF
Resource Allocation for Physical Layer Security in Heterogeneous Network with Hidden Eavesdropper 被引量:5
10
作者 GONG Shiqi XING Chengwen +1 位作者 FEI Zesong KUANG Jingming 《China Communications》 SCIE CSCD 2016年第3期82-95,共14页
The tremendous performance gain of heterogeneous networks(Het Nets) is at the cost of complicated resource allocation. Considering information security, the resource allocation for Het Nets becomes much more challengi... The tremendous performance gain of heterogeneous networks(Het Nets) is at the cost of complicated resource allocation. Considering information security, the resource allocation for Het Nets becomes much more challenging and this is the focus of this paper. In this paper, the eavesdropper is hidden from the macro base stations. To relax the unpractical assumption on the channel state information on eavesdropper, a localization based algorithm is first given. Then a joint resource allocation algorithm is proposed in our work, which simultaneously considers physical layer security, cross-tier interference and joint optimization of power and subcarriers under fairness requirements. It is revealed in our work that the considered optimization problem can be efficiently solved relying on convex optimization theory and the Lagrangian dual decomposition method is exploited to solve the considered problem effectively. Moreover, in each iteration the closed-form optimal resource allocation solutions can be obtained based on the Karush-Kuhn-Tucker(KKT) conditions. Finally, the simulation results are given to show the performance advantages of the proposed algorithm. 展开更多
关键词 resource allocation physical layer security heterogeneous networks RSS-based location estimation lagrangian dual decomposition
下载PDF
Evolutionary dynamics analysis of complex network with fusion nodes and overlap edges 被引量:1
11
作者 YANG Yinghui LI Jianhua +2 位作者 SHEN Di NAN Mingli CUI Qiong 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2018年第3期549-559,共11页
Multiple complex networks, each with different properties and mutually fused, have the problems that the evolving process is time varying and non-equilibrium, network structures are layered and interlacing, and evolvi... Multiple complex networks, each with different properties and mutually fused, have the problems that the evolving process is time varying and non-equilibrium, network structures are layered and interlacing, and evolving characteristics are difficult to be measured. On that account, a dynamic evolving model of complex network with fusion nodes and overlap edges(CNFNOEs) is proposed. Firstly, we define some related concepts of CNFNOEs, and analyze the conversion process of fusion relationship and hierarchy relationship. According to the property difference of various nodes and edges, fusion nodes and overlap edges are subsequently split, and then the CNFNOEs is transformed to interlacing layered complex networks(ILCN). Secondly,the node degree saturation and attraction factors are defined. On that basis, the evolution algorithm and the local world evolution model for ILCN are put forward. Moreover, four typical situations of nodes evolution are discussed, and the degree distribution law during evolution is analyzed by means of the mean field method.Numerical simulation results show that nodes unreached degree saturation follow the exponential distribution with an error of no more than 6%; nodes reached degree saturation follow the distribution of their connection capacities with an error of no more than 3%; network weaving coefficients have a positive correlation with the highest probability of new node and initial number of connected edges. The results have verified the feasibility and effectiveness of the model, which provides a new idea and method for exploring CNFNOE's evolving process and law. Also, the model has good application prospects in structure and dynamics research of transportation network, communication network, social contact network,etc. 展开更多
关键词 complex network with fusion nodes and overlap edges(CNFNOEs) interlacing layered complex networks(ILCN) local world dynamic evolvement split saturation attraction factor
下载PDF
A Kind of Second-Order Learning Algorithm Based on Generalized Cost Criteria in Multi-Layer Feed-Forward Neural Networks
12
作者 张长江 付梦印 金梅 《Journal of Beijing Institute of Technology》 EI CAS 2003年第2期119-124,共6页
A kind of second order algorithm--recursive approximate Newton algorithm was given by Karayiannis. The algorithm was simplified when it was formulated. Especially, the simplification to matrix Hessian was very reluct... A kind of second order algorithm--recursive approximate Newton algorithm was given by Karayiannis. The algorithm was simplified when it was formulated. Especially, the simplification to matrix Hessian was very reluctant, which led to the loss of valuable information and affected performance of the algorithm to certain extent. For multi layer feed forward neural networks, the second order back propagation recursive algorithm based generalized cost criteria was proposed. It is proved that it is equivalent to Newton recursive algorithm and has a second order convergent rate. The performance and application prospect are analyzed. Lots of simulation experiments indicate that the calculation of the new algorithm is almost equivalent to the recursive least square multiple algorithm. The algorithm and selection of networks parameters are significant and the performance is more excellent than BP algorithm and the second order learning algorithm that was given by Karayiannis. 展开更多
关键词 multi layer feed forward neural networks BP algorithm Newton recursive algorithm
下载PDF
Key MAC Layer Technologies of Cognitive Radio Network
13
作者 Zeng Zhimin, Guo Caili (School of Information and Communication Engineering , Beijing University of Posts and Telecommunications , Beijing 100876 , P . R . China ) 《ZTE Communications》 2009年第2期21-26,共6页
As a smart spectrum sharing technology, Cognitive Radio (CR) is becoming a hot topic in the field of wireless telecommunications. Besides providing traditional services, the cognitive radio network Media Access Contro... As a smart spectrum sharing technology, Cognitive Radio (CR) is becoming a hot topic in the field of wireless telecommunications. Besides providing traditional services, the cognitive radio network Media Access Control (MAC) layer is required to perform an entirely new set of functions for effective reusing spectrum opportunity, without causing any harmful interference to incumbents. Spectrum sensing management selects and optimizes sensing strategies and parameters by the selection of sensing mode, sensing period, sensing time, sensing channel, and sensing quiet period. Access control avoids collision with primary users mainly by cooperation access and transparent access. Dynamic spectrum allocation optimizes the allocation of uncertain spectrum for binary interference model and accumulative interference model. Security mechanism adds authentication and encryption mechanisms to MAC frame to defense MAC layer security attacks. Cross-layer design combines MAC layer information with physical layer or higher layers information, such as network layer, transmission layer, to achieve global optimization. 展开更多
关键词 MAC Key MAC Layer Technologies of Cognitive Radio network RADIO
下载PDF
Ensemble Based Learning with Accurate Motion Contrast Detection
14
作者 M.Indirani S.Shankar 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期1657-1674,共18页
Recent developments in computer vision applications have enabled detection of significant visual objects in video streams.Studies quoted in literature have detected objects from video streams using Spatiotemporal Parti... Recent developments in computer vision applications have enabled detection of significant visual objects in video streams.Studies quoted in literature have detected objects from video streams using Spatiotemporal Particle Swarm Optimization(SPSOM)and Incremental Deep Convolution Neural Networks(IDCNN)for detecting multiple objects.However,the study considered opticalflows resulting in assessing motion contrasts.Existing methods have issue with accuracy and error rates in motion contrast detection.Hence,the overall object detection performance is reduced significantly.Thus,consideration of object motions in videos efficiently is a critical issue to be solved.To overcome the above mentioned problems,this research work proposes a method involving ensemble approaches to and detect objects efficiently from video streams.This work uses a system modeled on swarm optimization and ensemble learning called Spatiotemporal Glowworm Swarm Optimization Model(SGSOM)for detecting multiple significant objects.A steady quality in motion contrasts is maintained in this work by using Chebyshev distance matrix.The proposed system achieves global optimization in its multiple object detection by exploiting spatial/temporal cues and local constraints.Its experimental results show that the proposed system scores 4.8%in Mean Absolute Error(MAE)while achieving 86%in accuracy,81.5%in precision,85%in recall and 81.6%in F-measure and thus proving its utility in detecting multiple objects. 展开更多
关键词 Multiple significant objects ensemble based learning modified pooling layer based convolutional neural network spatiotemporal glowworm swarm optimization model
下载PDF
Extreme learning with chemical reaction optimization for stock volatility prediction 被引量:2
15
作者 Sarat Chandra Nayak Bijan Bihari Misra 《Financial Innovation》 2020年第1期290-312,共23页
Extreme learning machine(ELM)allows for fast learning and better generalization performance than conventional gradient-based learning.However,the possible inclusion of non-optimal weight and bias due to random selecti... Extreme learning machine(ELM)allows for fast learning and better generalization performance than conventional gradient-based learning.However,the possible inclusion of non-optimal weight and bias due to random selection and the need for more hidden neurons adversely influence network usability.Further,choosing the optimal number of hidden nodes for a network usually requires intensive human intervention,which may lead to an ill-conditioned situation.In this context,chemical reaction optimization(CRO)is a meta-heuristic paradigm with increased success in a large number of application areas.It is characterized by faster convergence capability and requires fewer tunable parameters.This study develops a learning framework combining the advantages of ELM and CRO,called extreme learning with chemical reaction optimization(ELCRO).ELCRO simultaneously optimizes the weight and bias vector and number of hidden neurons of a single layer feed-forward neural network without compromising prediction accuracy.We evaluate its performance by predicting the daily volatility and closing prices of BSE indices.Additionally,its performance is compared with three other similarly developed models—ELM based on particle swarm optimization,genetic algorithm,and gradient descent—and find the performance of the proposed algorithm superior.Wilcoxon signed-rank and Diebold–Mariano tests are then conducted to verify the statistical significance of the proposed model.Hence,this model can be used as a promising tool for financial forecasting. 展开更多
关键词 Extreme learning machine Single layer feed-forward network Artificial chemical reaction optimization Stock volatility prediction Financial time series forecasting Artificial neural network Genetic algorithm Particle swarm optimization
下载PDF
Classification and spectrum optimization method of grease based on infrared spectrum
16
作者 Xin FENG Yanqiu XIA +1 位作者 Peiyuan XIE Xiaohe LI 《Friction》 SCIE EI CAS CSCD 2024年第6期1154-1164,共11页
The infrared(IR)absorption spectral data of 63 kinds of lubricating greases containing six different types of thickeners were obtained using the IR spectroscopy.The Kohonen neural network algorithm was used to identif... The infrared(IR)absorption spectral data of 63 kinds of lubricating greases containing six different types of thickeners were obtained using the IR spectroscopy.The Kohonen neural network algorithm was used to identify the type of the lubricating grease.The results show that this machine learning method can effectively eliminate the interference fringes in the IR spectrum,and complete the feature selection and dimensionality reduction of the high-dimensional spectral data.The 63 kinds of greases exhibit spatial clustering under certain IR spectrum recognition spectral bands,which are linked to characteristic peaks of lubricating greases and improve the recognition accuracy of these greases.The model achieved recognition accuracy of 100.00%,96.08%,94.87%,100.00%,and 87.50%for polyurea grease,calcium sulfonate composite grease,aluminum(Al)-based grease,bentonite grease,and lithium-based grease,respectively.Based on the different IR absorption spectrum bands produced by each kind of lubricating grease,the three-dimensional spatial distribution map of the lubricating grease drawn also verifies the accuracy of classification while recognizing the accuracy.This paper demonstrates fast recognition speed and high accuracy,proving that the Kohonen neural network algorithm has an efficient recognition ability for identifying the types of the lubricating grease. 展开更多
关键词 GREASE infrared(IR)spectroscopy layered Kohonen network species recognition spectrum band optimization
原文传递
A Framework for Distributed Semi-supervised Learning Using Single-layer Feedforward Networks 被引量:1
17
作者 Jin Xie San-Yang Liu Jia-Xi Chen 《Machine Intelligence Research》 EI CSCD 2022年第1期63-74,共12页
This paper aims to propose a framework for manifold regularization(MR) based distributed semi-supervised learning(DSSL) using single layer feed-forward neural network(SLFNN). The proposed framework, denoted as DSSL-SL... This paper aims to propose a framework for manifold regularization(MR) based distributed semi-supervised learning(DSSL) using single layer feed-forward neural network(SLFNN). The proposed framework, denoted as DSSL-SLFNN is based on the SLFNN, MR framework, and distributed optimization strategy. Then, a series of algorithms are derived to solve DSSL problems. In DSSL problems, data consisting of labeled and unlabeled samples are distributed over a communication network, where each node has only access to its own data and can only communicate with its neighbors. In some scenarios, DSSL problems cannot be solved by centralized algorithms. According to the DSSL-SLFNN framework, each node over the communication network exchanges the initial parameters of the SLFNN with the same basis functions for semi-supervised learning(SSL). All nodes calculate the global optimal coefficients of the SLFNN by using distributed datasets and local updates. During the learning process, each node only exchanges local coefficients with its neighbors rather than raw data. It means that DSSL-SLFNN based algorithms work in a fully distributed fashion and are privacy preserving methods. Finally, several simulations are presented to show the efficiency of the proposed framework and the derived algorithms. 展开更多
关键词 Distributed learning(DL) semi-supervised learning(SSL) manifold regularization(MR) single layer feed-forward neural network(SLFNN) privacy preserving
原文传递
Forced Collision:Detecting Wormhole Attacks with Physical Layer Network Coding
18
作者 Zhiwei Li Di Pu +1 位作者 Weichao Wang Alex Wyglinski 《Tsinghua Science and Technology》 SCIE EI CAS 2011年第5期505-519,共15页
Previous research on security of network coding focused on the protection of data dissemination procedures and the detection of malicious activities such as pollution attacks. The capabilities of network coding to det... Previous research on security of network coding focused on the protection of data dissemination procedures and the detection of malicious activities such as pollution attacks. The capabilities of network coding to detect other attacks have not been fully explored. In this paper, we propose a new mechanism based on physical layer network coding to detect wormhole attacks. When two signal sequences collide at the receiver, the starting point of the collision is determined by the distances between the receiver and the senders. Therefore, by comparing the starting points of the collisions at two receivers, we can estimate the distance between them and detect fake neighbor connections via wormholes. While the basic idea is clear, we have proposed several schemes at both physical and network layers to transform the idea into a practical approach. Simulations using BPSK modulation at the physical layer show that the wireless nodes can effectively detect fake neighbor connections without the adoption of special hardware or time synchronization. 展开更多
关键词 physical layer network coding wormhole attacks cross-layer design
原文传递
Optimal energy-efficient scheme for two-way relay channel using physical layer network coding
19
作者 ZHOU Min CUI Qi-mei +3 位作者 WANG Hui TAO Xiao-feng TIAN Hui MIKKO Valkama 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2011年第6期51-58,共8页
Systems are always designed and optimized based on full traffic load in the current literatures. However, practical systems are seldom operating at full load, even at peak traffic hours. Instead of maximizing system r... Systems are always designed and optimized based on full traffic load in the current literatures. However, practical systems are seldom operating at full load, even at peak traffic hours. Instead of maximizing system rate to achieve the full load, an optimal energy-efficient scheme to minimize the transmit power with required rates is investigated in this article. The considered scenario is a two-way relay channel using amplify-and-forward protocol of physical layer network coding, where two end nodes exchange messages via multiple relay nodes within two timeslots. A joint power allocation and relay selection scheme is designed to achieve the minimum transmit power. Through convex optimization theory, we firstly prove that single relay selection scheme is the most energy-efficient way for physical layer network coding. The closed-form expressions of power allocation are also given. Numerical simulations demonstrate the performance of the designed scheme as well as the comparison among different schemes. 展开更多
关键词 ENERGY-EFFICIENT two-way relay channel physical layer network coding power allocation relay selection rate constraints
原文传递
Advanced nitrogen removal using pilot-scale SBR with intelligent control system built on three layer network
20
作者 YANG Qing WANG Shuying +2 位作者 YANG Anming GUO Jianhua BO Fengyang 《Frontiers of Environmental Science & Engineering》 SCIE EI CSCD 2007年第1期33-38,共6页
Since eutrophication has become increasingly severe in China,nitrogen and phosphorous have been the concern of wastewater treatment,especially nitrogen remov-al.The stabilization of the intelligent control system and ... Since eutrophication has become increasingly severe in China,nitrogen and phosphorous have been the concern of wastewater treatment,especially nitrogen remov-al.The stabilization of the intelligent control system and nitrogen removal efficiency were investigated in a pilot-scale aerobic-anoxic sequencing batch reactor(SBR)with a treat-ment capacity of 60 m3/d.Characteristic points on the profiles of dissolved oxygen(DO),pH,and oxidation reduction potential(ORP)could exactly reflect the process of nitrifica-tion and denitrification.Using the intelligent control system not only could save energy,but also could achieve advanced nitrogen removal.Applying the control strategy water quality of the effluent could stably meet the national first discharge standard during experiment of 10 months.Even at low tem-perature(t=13°C),chemical oxygen demand(COD)and total nitrogen(TN)in the effluent were under 50 and 5 mg/L,respectively. 展开更多
关键词 three layer network sequencing batch reactor(SBR) advanced nitrogen removal intelligent control
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部