期刊文献+
共找到326篇文章
< 1 2 17 >
每页显示 20 50 100
DDoS Attack Tracking Using Multi-Round Iterative Viterbi Algorithm in Satellite Internet
1
作者 Guo Wei Xu Jin +2 位作者 Pei Yukui Yin Liuguo Feng Wei 《China Communications》 2025年第3期148-163,共16页
Satellite Internet(SI)provides broadband access as a critical information infrastructure in 6G.However,with the integration of the terrestrial Internet,the influx of massive terrestrial traffic will bring significant ... Satellite Internet(SI)provides broadband access as a critical information infrastructure in 6G.However,with the integration of the terrestrial Internet,the influx of massive terrestrial traffic will bring significant threats to SI,among which DDoS attack will intensify the erosion of limited bandwidth resources.Therefore,this paper proposes a DDoS attack tracking scheme using a multi-round iterative Viterbi algorithm to achieve high-accuracy attack path reconstruction and fast internal source locking,protecting SI from the source.Firstly,to reduce communication overhead,the logarithmic representation of the traffic volume is added to the digests after modeling SI,generating the lightweight deviation degree to construct the observation probability matrix for the Viterbi algorithm.Secondly,the path node matrix is expanded to multi-index matrices in the Viterbi algorithm to store index information for all probability values,deriving the path with non-repeatability and maximum probability.Finally,multiple rounds of iterative Viterbi tracking are performed locally to track DDoS attack based on trimming tracking results.Simulation and experimental results show that the scheme can achieve 96.8%tracking accuracy of external and internal DDoS attack at 2.5 seconds,with the communication overhead at 268KB/s,effectively protecting the limited bandwidth resources of SI. 展开更多
关键词 DDoS tracking iterative Viterbi algorithm satellite Internet 6g
在线阅读 下载PDF
5G network planning in connecting urban areas for trains service using a genetic algorithm
2
作者 Evangelos D.Spyrou Vassilios Kappatos 《High-Speed Railway》 2025年第2期155-162,共8页
The adoption of 5G for Railways(5G-R)is expanding,particularly in high-speed trains,due to the benefits offered by 5G technology.High-speed trains must provide seamless connectivity and Quality of Service(QoS)to ensur... The adoption of 5G for Railways(5G-R)is expanding,particularly in high-speed trains,due to the benefits offered by 5G technology.High-speed trains must provide seamless connectivity and Quality of Service(QoS)to ensure passengers have a satisfactory experience throughout their journey.Installing base stations along urban environments can improve coverage but can dramatically reduce the experience of users due to interference.In particular,when a user with a mobile phone is a passenger in a high speed train traversing between urban centres,the coverage and the 5G resources in general need to be adequate not to diminish her experience of the service.The utilization of macro,pico,and femto cells may optimize the utilization of 5G resources.In this paper,a Genetic Algorithm(GA)-based approach to address the challenges of 5G network planning for 5G-R services is presented.The network is divided into three cell types,macro,pico,and femto cells—and the optimization process is designed to achieve a balance between key objectives:providing comprehensive coverage,minimizing interference,and maximizing energy efficiency.The study focuses on environments with high user density,such as high-speed trains,where reliable and high-quality connectivity is critical.Through simulations,the effectiveness of the GA-driven framework in optimizing coverage and performance in such scenarios is demonstrated.The algorithm is compared with the Particle Swarm Optimisation(PSO)and the Simulated Annealing(SA)methods and interesting insights emerged.The GA offers a strong balance between coverage and efficiency,achieving significantly higher coverage than PSO while maintaining competitive energy efficiency and interference levels.Its steady fitness improvement and adaptability make it well-suited for scenarios where wide coverage is a priority alongside acceptable performance trade-offs. 展开更多
关键词 High speed train 5g Network planning genetic algorithm
在线阅读 下载PDF
Convergence of 6G-Empowered Edge Intelligence and Generative AI:Theories,Algorithms,and Applications
3
作者 Wu Yuan Dusit Niyato +5 位作者 Cui Shuguang Zhao Lian Tony Q.S.Quek Zhang Yan Qian Liping Li Rongpeng 《China Communications》 2025年第7期I0002-I0005,共4页
The rapid advancement of 6G communication technologies and generative artificial intelligence(AI)is catalyzing a new wave of innovation at the intersection of networking and intelligent computing.On the one hand,6G en... The rapid advancement of 6G communication technologies and generative artificial intelligence(AI)is catalyzing a new wave of innovation at the intersection of networking and intelligent computing.On the one hand,6G envisions a hyper-connected environment that supports ubiquitous intelligence through ultra-low latency,high throughput,massive device connectivity,and integrated sensing and communication.On the other hand,generative AI,powered by large foundation models,has emerged as a powerful paradigm capable of creating. 展开更多
关键词 g ubiquitous intelligence edge intelligence algorithmS generative artificial intelligence ai theories large foundation modelshas intelligent computingon
在线阅读 下载PDF
基于深度学习算法的G-M制冷机低温泵冷头故障诊断研究
4
作者 彭刚 王玉青 +5 位作者 王辉 朱剑豪 王旭迪 何智 武义锋 邓家良 《真空科学与技术学报》 北大核心 2025年第5期408-413,共6页
G-M制冷机低温泵是一种广泛应用于半导体制造等领域的重要设备,对超高真空的获得与维持至关重要。由于其长期连续运行,容易引发机械磨损等故障,导致制冷能力和抽气特性下降。因此,开展有效的故障诊断显得尤为关键,文章提出一种改进型遗... G-M制冷机低温泵是一种广泛应用于半导体制造等领域的重要设备,对超高真空的获得与维持至关重要。由于其长期连续运行,容易引发机械磨损等故障,导致制冷能力和抽气特性下降。因此,开展有效的故障诊断显得尤为关键,文章提出一种改进型遗传算法与反向传播神经网络的故障诊断方法,克服了传统反向传播神经网络依赖初始权重与阈值设置、优化效率低的问题。研究结果表明,该方法在故障诊断中的准确率达98.05%。为低温泵健康监测与故障预警提供了科学依据。 展开更多
关键词 g-M制冷机低温泵 故障诊断 深度学习 遗传算法
原文传递
Signal Detection Algorithm Design Based on Stochastic Resonance Technology Under Low Signal-to-Noise Ratio 被引量:1
5
作者 JIANG Xiaolin DIAO Ming QU Susu 《Journal of Shanghai Jiaotong university(Science)》 EI 2019年第3期328-334,共7页
In the current 4th generation(4G)communication network,the base station with the same frequency transmission makes a serious interference among adjacent cells,and information transmission is susceptible to interferenc... In the current 4th generation(4G)communication network,the base station with the same frequency transmission makes a serious interference among adjacent cells,and information transmission is susceptible to interference such as channel multipath fading and occlusion effect.Detecting effectively spectrum signal under low signal-to-noise ratio(SNR),directly affects the whole performance of the wireless communication network system.This paper designs an energy signal detection algorithm based on stochastic resonance technology which transforms noise's signal energy into useful signal energy,and improves output SNR.The energy signal detection algorithm realizes the function of providing effective detection of signal under low SNR,and promotes the performance of the whole communication system. 展开更多
关键词 4g communication network stochastic resonance signal detection algorithm
原文传递
基于G-FA优化的电动汽车轨迹跟踪及稳定性控制
6
作者 郑威 贺伊琳 +2 位作者 张凯 张纪纬 杜可传 《汽车技术》 北大核心 2025年第11期23-31,共9页
为了提高独立驱动智能电动汽车轨迹跟踪的精度与稳定性,提出了一种基于遗传萤火虫算法(G-FA)优化的轨迹跟踪与直接横摆力矩协同控制方法。通过构建车辆动力学模型和跟踪误差模型,采用线性二次型调节器(LQR)设计轨迹跟踪控制器,建立模糊... 为了提高独立驱动智能电动汽车轨迹跟踪的精度与稳定性,提出了一种基于遗传萤火虫算法(G-FA)优化的轨迹跟踪与直接横摆力矩协同控制方法。通过构建车辆动力学模型和跟踪误差模型,采用线性二次型调节器(LQR)设计轨迹跟踪控制器,建立模糊PID直接横摆力矩稳定性控制器;引入前馈控制并使用遗传萤火虫算法(G-FA)优化LQR控制器的关键参数,同时消除稳态误差。CarSim/Simulink联合仿真验证结果表明:相较于原始LQR控制器,该协同控制器在双移线工况与S型弯道工况下的横向误差分别下降32.14%、60.28%,航向误差分别下降26.30%、7.39%,质心侧偏角分别减小25.61%、10.34%,横摆角速度分别减小7.51%、9.49%,提高了车辆在极限工况下的跟踪精度与稳定性。 展开更多
关键词 智能汽车 轨迹跟踪 稳定性 遗传萤火虫算法 直接横摆力矩控制
在线阅读 下载PDF
NeQuickG模型与COSMIC-2掩星数据在电离层层析算法中的使用
7
作者 尹萍 张姗姗 +1 位作者 徐硕 侯秀泽 《空间科学学报》 北大核心 2025年第4期975-986,共12页
作为电离层监测的有效手段,全球导航卫星系统气象、电离层和气候的星座观测系统2(COSMIC-2)掩星提供了实测的电离层剖面资料,而Ne Quick G模型则能提供电离层在任意时空的电子密度和总电子含量模型数据.电离层层析算法虽然能重构任意时... 作为电离层监测的有效手段,全球导航卫星系统气象、电离层和气候的星座观测系统2(COSMIC-2)掩星提供了实测的电离层剖面资料,而Ne Quick G模型则能提供电离层在任意时空的电子密度和总电子含量模型数据.电离层层析算法虽然能重构任意时间,特别是电离层扰动下大尺度的电子密度时空分布,但其算法也受到数据覆盖不均匀、垂向反演精度较低的局限.本文通过对电离层层析算法的改进,不仅融合Ne Quick G模型和COS-MIC-2的剖面观测资料,还使用COSMIC-2数据作为层析算法的输入之一,重构了武汉WU430站和韩国JJ433站等站上空2021年11月3日和4日电离层扰动阶段的电子密度分布.同时,利用测高仪数据对层析反演出的F2层峰值密度(N_(m)F_(2))和峰值高度(h_(m)F_(2))进行了评估. 展开更多
关键词 NeQuick g模型 COSMIC-2掩星 电离层 层析算法
在线阅读 下载PDF
A Comparative Study on Hydrodynamic Optimization Approaches for AUV Design Using CFD
8
作者 KL Vasudev Manish Pandey Jaan H.Pu 《Fluid Dynamics & Materials Processing》 2025年第7期1545-1569,共25页
This study presents a comparative analysis of optimisation strategies for designing hull shapes of Autonomous Underwater Vehicles(AUVs),paying special attention to drag,lift-to-drag ratio,and delivered power.A fully i... This study presents a comparative analysis of optimisation strategies for designing hull shapes of Autonomous Underwater Vehicles(AUVs),paying special attention to drag,lift-to-drag ratio,and delivered power.A fully integrated optimisation framework is developed accordingly,combining a single-objective Genetic Algorithm(GA)for design parameter generation,Computer-Aided Geometric Design(CAGD)for the creation of hull geometries and associated fluid domains,and a Reynolds-Averaged Navier-Stokes(RANS)solver for evaluating hydrodynamic performance metrics.This unified approach eliminates manual intervention,enabling automated determination of optimal hull configurations.Three distinct optimisation problems are addressed using the proposed methodology.First,the drag minimisation of a reference afterbody geometry(A1)at zero angle of attack is performed under constraints of fixed length and internal volume for various flow velocities spanning the range from 0.5 to 15 m/s.Second,the lift-to-drag ratio of A1 is maximised at a 6°angle of attack,maintaining constant total length and internal volume.Third,delivered power is minimised for A1 at a 0°angle of attack.The comparative analysis of results from all three optimisation cases reveals hull shapes with practical design significance.Notably,the shape optimised for minimum delivered power outperforms the other two across a range of velocities.Specifically,it achieves reductions in required power by 7.6%,7.8%,10.2%,and 13.04%at velocities of 0.5,1.0,1.5,and 2.152 m/s,respectively. 展开更多
关键词 Lift-to-drag ratio delivered power hydrodynamic drag autonomous underwater vehicle/glider(AUV/g) genetic algorithm(gA) computational fluid dynamics(CFD)
在线阅读 下载PDF
A Robust Resource Allocation Scheme for Device-to-Device Communications Based on Q-Learning 被引量:8
9
作者 Azka Amin Xihua Liu +3 位作者 Imran Khan Peerapong Uthansakul Masoud Forsat Seyed Sajad Mirjavadi 《Computers, Materials & Continua》 SCIE EI 2020年第11期1487-1505,共19页
One of the most effective technology for the 5G mobile communications is Device-to-device(D2D)communication which is also called terminal pass-through technology.It can directly communicate between devices under the c... One of the most effective technology for the 5G mobile communications is Device-to-device(D2D)communication which is also called terminal pass-through technology.It can directly communicate between devices under the control of a base station and does not require a base station to forward it.The advantages of applying D2D communication technology to cellular networks are:It can increase the communication system capacity,improve the system spectrum efficiency,increase the data transmission rate,and reduce the base station load.Aiming at the problem of co-channel interference between the D2D and cellular users,this paper proposes an efficient algorithm for resource allocation based on the idea of Q-learning,which creates multi-agent learners from multiple D2D users,and the system throughput is determined from the corresponding state-learning of the Q value list and the maximum Q action is obtained through dynamic power for control for D2D users.The mutual interference between the D2D users and base stations and exact channel state information is not required during the Q-learning process and symmetric data transmission mechanism is adopted.The proposed algorithm maximizes the system throughput by controlling the power of D2D users while guaranteeing the quality-of-service of the cellular users.Simulation results show that the proposed algorithm effectively improves system performance as compared with existing algorithms. 展开更多
关键词 5g D2D communications power allocation algorithm resource optimization
在线阅读 下载PDF
Performance Evaluation of Scheduling Algorithms for 4G (LTE) 被引量:2
10
作者 Bamidele Moses Kuboye 《Communications and Network》 2018年第4期152-163,共12页
Long Term Evolution (LTE) is designed to revolutionize mobile broadband technology with key considerations of higher data rate, improved power efficiency, low latency and better quality of service. This work analyzes ... Long Term Evolution (LTE) is designed to revolutionize mobile broadband technology with key considerations of higher data rate, improved power efficiency, low latency and better quality of service. This work analyzes the impact of resource scheduling algorithms on the performance of LTE (4G) and WCDMA (3G) networks. In this paper, a full illustration of LTE system is given together with different scheduling algorithms. Thereafter, 3G WCDMA and 4G LTE networks were simulated using Simulink simulator embedded in MATLAB and performance evaluations were carried out. The performance metrics used for the evaluations are average system throughput, packet delay, latency and allocation of fairness using Round Robin, Best CQI and Proportional fair Packet Scheduling Algorithms. The results of the evaluations on both networks were analysed. The results showed that 4G LTE network performs better than 3G WCDMA network in all the three scheduling algorithms used. 展开更多
关键词 LONg TERM Evolution THIRD gENERATION (3g) FOURTH gENERATION (4g) Network algorithms Scheduling
在线阅读 下载PDF
ITU-T G.729语音编解码及DSP实现
11
作者 王磊 胡耀明 《电子器件》 CAS 2010年第5期632-636,共5页
对G.729编解码算法的原理进行了简要分析,并提出了一种基于TMS320C54x的G.729语音编解码算法的实现方法。针对算法特征及DSP体系结构的特点,提出了一些有效的优化措施。仿真结果表明,运算复杂度大大降低,而重建语音具有很好的编解码效果。
关键词 语音编解码 g.729算法 数字信号处理器 优化
在线阅读 下载PDF
Anti-jamming channel access in 5G ultra-dense networks: a game-theoretic learning approach 被引量:1
12
作者 Yunpeng Zhang Luliang Jia +2 位作者 Nan Qi Yifan Xu Meng Wang 《Digital Communications and Networks》 SCIE CSCD 2023年第2期523-533,共11页
This paper investigates the Quality of Experience(QoE)oriented channel access anti-jamming problem in 5th Generation Mobile Communication(5G)ultra-dense networks.Firstly,considering that the 5G base station adopts bea... This paper investigates the Quality of Experience(QoE)oriented channel access anti-jamming problem in 5th Generation Mobile Communication(5G)ultra-dense networks.Firstly,considering that the 5G base station adopts beamforming technology,an anti-jamming model under Space Division Multiple Access(SDMA)conditions is proposed.Secondly,the confrontational relationship between users and the jammer is formulated as a Stackelberg game.Besides,to achieve global optimization,we design a local cooperation mechanism for users and formulate the cooperation and competition among users as a local altruistic game.By proving that the local altruistic game is an Exact Potential Game(EPG),we further prove the existence of pure strategy Nash Equilibrium(NE)among users and Stackelberg Equilibrium(SE)between users and jammer.Thirdly,to obtain the equilibrium solutions of the proposed games,we propose an anti-jamming channel selection algorithm and improve its convergence speed through heterogeneous learning parameters.The simulation results validate the convergence and effectiveness of the proposed algorithm.Compared with the throughput optimization scheme,our proposed scheme obtain a greater network satisfaction rate.Finally,we also analyze user fairness changes during the algorithm convergence process and get some interesting conclusions. 展开更多
关键词 ANTI-JAMMINg 5g Ultra-dense networks Stackelberg game Exact potential game Channel selection algorithm
在线阅读 下载PDF
Optimization and Realization of G.729 Speech Coding Algorithm 被引量:1
13
作者 ZHOU Xin MIAO Chang-yun LI Yan-feng WU Zhi-gang 《Semiconductor Photonics and Technology》 CAS 2009年第2期111-116,共6页
The principles of G.729 algorithm are analyzed. It proposes an optimal approach of adaptive codebook search. Realized on fixed point DSP TMS320VC5410,the searching time of the optimal algorithm is thus significantly d... The principles of G.729 algorithm are analyzed. It proposes an optimal approach of adaptive codebook search. Realized on fixed point DSP TMS320VC5410,the searching time of the optimal algorithm is thus significantly decreased,and the result shows that the speech quality is not decreased. 展开更多
关键词 g. 729 CS-ACELP algorithm optimization TMS320VC5410
在线阅读 下载PDF
A Dynamic Leader Election Algorithm for Decentralized Networks 被引量:1
14
作者 Vijay K. Madisetti Siddhanta Panda 《Journal of Transportation Technologies》 2021年第3期404-411,共8页
Leader election algorithms play an important role in orchestrating different processes on distributed systems, including next-generation transportation systems. This leader election phase is usually triggered after th... Leader election algorithms play an important role in orchestrating different processes on distributed systems, including next-generation transportation systems. This leader election phase is usually triggered after the leader has failed and has a high overhead in performance and state recovery. Further, these algorithms are not generally applicable to cloud-based native microservices-based applications where the resources available to the group and resources participating in a group continuously change and the current leader <span style="font-family:Verdana;">may exit the system with prior knowledge of the exit. Our proposed algo</span><span style="font-family:Verdana;">rithm, t</span><span style="font-family:Verdana;">he dynamic leader selection algorithm, provides several benefits through</span><span style="font-family:Verdana;"> selection (not, election) of a set of future leaders which are then alerted prior to </span><span style="font-family:Verdana;">the failure of the current leadership and handed over the leadership. A </span><span style="font-family:Verdana;">specific </span><span style="font-family:Verdana;">illustration of this algorithm is provided with reference to a peer-to-peer</span><span style="font-family:Verdana;"> distribution of autonomous cars in a 5G architecture for transportation networks. The proposed algorithm increases the efficiencies of applications that use the leader election algorithm and finds broad applicability in microservices-based applications.</span> 展开更多
关键词 Bully algorithm Peer-to-Peer Services Dynamic Leader algorithm 5g Cloud-Native Functions and Microservices
在线阅读 下载PDF
A Highly Efficient Algorithm for Phased-Array mmWave Massive MIMO Beamforming
15
作者 Ayman Abdulhadi Althuwayb Fazirulhisyam Hashim +5 位作者 Jiun Terng Liew Imran Khan Jeong Woo Lee Emmanuel Ampoma Affum Abdeldjalil Ouahabi Sébastien Jacques 《Computers, Materials & Continua》 SCIE EI 2021年第10期679-694,共16页
With the rapid development of the mobile internet and the internet of things(IoT),the fifth generation(5G)mobile communication system is seeing explosive growth in data traffic.In addition,low-frequency spectrum resou... With the rapid development of the mobile internet and the internet of things(IoT),the fifth generation(5G)mobile communication system is seeing explosive growth in data traffic.In addition,low-frequency spectrum resources are becoming increasingly scarce and there is now an urgent need to switch to higher frequency bands.Millimeter wave(mmWave)technology has several outstanding features—it is one of the most well-known 5G technologies and has the capacity to fulfil many of the requirements of future wireless networks.Importantly,it has an abundant resource spectrum,which can significantly increase the communication rate of a mobile communication system.As such,it is now considered a key technology for future mobile communications.MmWave communication technology also has a more open network architecture;it can deliver varied services and be applied in many scenarios.By contrast,traditional,all-digital precoding systems have the drawbacks of high computational complexity and higher power consumption.This paper examines the implementation of a new hybrid precoding system that significantly reduces both calculational complexity and energy consumption.The primary idea is to generate several sub-channels with equal gain by dividing the channel by the geometric mean decomposition(GMD).In this process,the objective function of the spectral efficiency is derived,then the basic tracking principle and least square(LS)techniques are deployed to design the proposed hybrid precoding.Simulation results show that the proposed algorithm significantly improves system performance and reduces computational complexity by more than 45%compared to traditional algorithms. 展开更多
关键词 5g mmWave phased array algorithm antenna beamforming
在线阅读 下载PDF
基于优化G-P算法求解关联维数
16
作者 方若望 何越磊 +2 位作者 李再帏 路宏遥 赵彦旭 《计算机与数字工程》 2024年第5期1270-1274,共5页
为了解决研究混沌关联维数主流算法G-P算法存在的问题,包括相空间和距离矩阵的循环构造,相关参量选取不当影响结论,Heaviside阶跃函数判断冗余等,提出改进的G-P算法。该算法在原理和重复计算上作出优化,在原矩阵的基础上操作形成后续矩... 为了解决研究混沌关联维数主流算法G-P算法存在的问题,包括相空间和距离矩阵的循环构造,相关参量选取不当影响结论,Heaviside阶跃函数判断冗余等,提出改进的G-P算法。该算法在原理和重复计算上作出优化,在原矩阵的基础上操作形成后续矩阵及对距离矩阵进行排序,避免了循环判断,大大缩减了计算周期;对相关参量取值做出决策,使结论更严谨;对双对数图像的无标度区间采用Taylor级数法确定,使其更加直观。后续以Lorenz系统数据进行实例分析,仿真的结果也证明了改进算法的准确性。 展开更多
关键词 混沌 相空间重构 关联维数 算法优化 g-P算法
在线阅读 下载PDF
Optimization of Linear Consecutive-k-Out-of-n Systems with Birnbaum Importance Based Ant Colony Optimization Algorithm
17
作者 WANG Wei CAI Zhiqiang +1 位作者 ZHAO Jiangbin SI Shubin 《Journal of Shanghai Jiaotong university(Science)》 EI 2020年第2期253-260,共8页
The linear consecutive-k-out-of-n:failure(good)(Lin/Con/k/n:F(G))system consists of n interchangeable components that have different reliabilities.These components are arranged in a line path and different component a... The linear consecutive-k-out-of-n:failure(good)(Lin/Con/k/n:F(G))system consists of n interchangeable components that have different reliabilities.These components are arranged in a line path and different component assignments change the system reliability.The optimization of Lin/Con/k/n:F(G)system is to find an optimal component assignment to maximize the system reliability.As the number of components increases,the computation time for this problem increases considerably.In this paper,we propose a Birnbaum importance-based ant colony optimization(BIACO)algorithm to obtain quasi optimal assignments for such problems.We compare its performance using the Birnbaum importance based two-stage approach(BITA)and Birnbaum importancebased genetic local search(BIGLS)algorithm from previous researches.The experimental results show that the BIACO algorithm has a good performance in the optimization of Lin/Con/k/n:F(G)system. 展开更多
关键词 LINEAR consecutive-k-out-of-n:failure(good)(Lin/Con/k/n:F(g))system ant COLONY optimization(ACO)algorithm OPTIMIZATION Birnbaum importance(BI)
原文传递
Collusion detector based on G-N algorithm for trust model
18
作者 Lin Zhang Na Yin +1 位作者 Jingwen Liu Ruchuan Wang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第4期926-935,共10页
In the open network environment, malicious attacks to the trust model have become increasingly serious. Compared with single node attacks, collusion attacks do more harm to the trust model. To solve this problem, a co... In the open network environment, malicious attacks to the trust model have become increasingly serious. Compared with single node attacks, collusion attacks do more harm to the trust model. To solve this problem, a collusion detector based on the GN algorithm for the trust evaluation model is proposed in the open Internet environment. By analyzing the behavioral characteristics of collusion groups, the concept of flatting is defined and the G-N community mining algorithm is used to divide suspicious communities. On this basis, a collusion community detector method is proposed based on the breaking strength of suspicious communities. Simulation results show that the model has high recognition accuracy in identifying collusion nodes, so as to effectively defend against malicious attacks of collusion nodes. 展开更多
关键词 trust model collusion detector g-N algorithm
在线阅读 下载PDF
A Genetic Algorithm for Overall Designing and Planning of a Long Term Evolution Advanced Network
19
作者 Brou Aguié Pacôme Bertrand Diaby Moustapha +2 位作者 Soro Etienne Oumtanaga Souleymane Aka Boko 《American Journal of Operations Research》 2016年第4期355-370,共17页
In the mobile radio industry, planning is a fundamental step for the deployment and commissioning of a Telecom network. The proposed models are based on the technology and the focussed architecture. In this context, w... In the mobile radio industry, planning is a fundamental step for the deployment and commissioning of a Telecom network. The proposed models are based on the technology and the focussed architecture. In this context, we introduce a comprehensive single-lens model for a fourth generation mobile network, Long Term Evolution Advanced Network (4G/LTE-A) technology which includes three sub assignments: cells in the core network. In the resolution, we propose an adaptation of the Genetic Evolutionary Algorithm for a global resolution. This is a combinatorial optimization problem that is considered as difficult. The use of this adaptive method does not necessarily lead to optimal solutions with the aim of reducing the convergence time towards a feasible solution. 展开更多
关键词 Overall Planning 4g/LTE-A Network genetic algorithm
在线阅读 下载PDF
A Novel 6G Scalable Blockchain Clustering-Based Computer Vision Character Detection for Mobile Images
20
作者 Yuejie Li Shijun Li 《Computers, Materials & Continua》 SCIE EI 2024年第3期3041-3070,共30页
6G is envisioned as the next generation of wireless communication technology,promising unprecedented data speeds,ultra-low Latency,and ubiquitous Connectivity.In tandem with these advancements,blockchain technology is... 6G is envisioned as the next generation of wireless communication technology,promising unprecedented data speeds,ultra-low Latency,and ubiquitous Connectivity.In tandem with these advancements,blockchain technology is leveraged to enhance computer vision applications’security,trustworthiness,and transparency.With the widespread use of mobile devices equipped with cameras,the ability to capture and recognize Chinese characters in natural scenes has become increasingly important.Blockchain can facilitate privacy-preserving mechanisms in applications where privacy is paramount,such as facial recognition or personal healthcare monitoring.Users can control their visual data and grant or revoke access as needed.Recognizing Chinese characters from images can provide convenience in various aspects of people’s lives.However,traditional Chinese character text recognition methods often need higher accuracy,leading to recognition failures or incorrect character identification.In contrast,computer vision technologies have significantly improved image recognition accuracy.This paper proposed a Secure end-to-end recognition system(SE2ERS)for Chinese characters in natural scenes based on convolutional neural networks(CNN)using 6G technology.The proposed SE2ERS model uses the Weighted Hyperbolic Curve Cryptograph(WHCC)of the secure data transmission in the 6G network with the blockchain model.The data transmission within the computer vision system,with a 6G gradient directional histogram(GDH),is employed for character estimation.With the deployment of WHCC and GDH in the constructed SE2ERS model,secure communication is achieved for the data transmission with the 6G network.The proposed SE2ERS compares the performance of traditional Chinese text recognition methods and data transmission environment with 6G communication.Experimental results demonstrate that SE2ERS achieves an average recognition accuracy of 88%for simple Chinese characters,compared to 81.2%with traditional methods.For complex Chinese characters,the average recognition accuracy improves to 84.4%with our system,compared to 72.8%with traditional methods.Additionally,deploying the WHCC model improves data security with the increased data encryption rate complexity of∼12&higher than the traditional techniques. 展开更多
关键词 6g technology blockchain end-to-end recognition Chinese characters natural scene computer vision algorithms convolutional neural network
在线阅读 下载PDF
上一页 1 2 17 下一页 到第
使用帮助 返回顶部