期刊文献+
共找到1,708篇文章
< 1 2 86 >
每页显示 20 50 100
Dimension-down iterative algorithm for the mixed transportation network design problem
1
作者 陈群 姚加林 《Journal of Southeast University(English Edition)》 EI CAS 2012年第2期236-239,共4页
An optimal dimension-down iterative algorithm (DDIA) is proposed for solving a mixed (continuous/ discrete) transportation network design problem (MNDP), which is generally expressed as a mathematical programmin... An optimal dimension-down iterative algorithm (DDIA) is proposed for solving a mixed (continuous/ discrete) transportation network design problem (MNDP), which is generally expressed as a mathematical programming with equilibrium constraints (MPEC). The upper level of the MNDP aims to optimize the network performance via both the expansion of existing links and the addition of new candidate links, whereas the lower level is a traditional Wardrop user equilibrium (UE) model. The idea of the proposed DDIA is to reduce the dimensions of the problem. A group of variables (discrete/continuous) are fixed to altemately optimize another group of variables (continuous/discrete). Some continuous network design problems (CNDPs) and discrete network design problems (DNDPs) are solved repeatedly until the optimal solution is obtained. A numerical example is given to demonstrate the efficiency of the proposed algorithm. 展开更多
关键词 mixed network design problem (MNDP) dimension-down iterative algorithm (DDIA) mathematical programming with equilibrium constraint (MPEC)
在线阅读 下载PDF
ADAPTIVE PINNING SYNCHRONIZATION OF COUPLED NEURAL NETWORKS WITH MIXED DELAYS AND VECTOR-FORM STOCHASTIC PERTURBATIONS 被引量:4
2
作者 杨鑫松 曹进德 《Acta Mathematica Scientia》 SCIE CSCD 2012年第3期955-977,共23页
In this article, we consider the global chaotic synchronization of general cou- pled neural networks, in which subsystems have both discrete and distributed delays. Stochastic perturbations between subsystems are also... In this article, we consider the global chaotic synchronization of general cou- pled neural networks, in which subsystems have both discrete and distributed delays. Stochastic perturbations between subsystems are also considered. On the basis of two sim- ple adaptive pinning feedback control schemes, Lyapunov functional method, and stochas- tic analysis approach, several sufficient conditions are developed to guarantee global syn- chronization of the coupled neural networks with two kinds of delay couplings, even if only partial states of the nodes are coupled. The outer-coupling matrices may be symmetric or asymmetric. Unlike existing results that an isolate node is introduced as the pinning target, we pin to help the network realizing synchronization without introducing any iso- late node when the network is not synchronized. As a by product, sufficient conditions under which the network realizes synchronization without control are derived. Numerical simulations confirm the effectiveness of the obtained results. 展开更多
关键词 Coupled neural networks mixed delays SYNCHRONIZATION vector-form noises PINNING ADAPTIVE asymmetric coupling
在线阅读 下载PDF
Dynamic Analysis of Some Impulsive Fractional-Order Neural Network with Mixed Delay 被引量:3
3
作者 刘向虎 刘衍民 李艳芳 《Journal of Donghua University(English Edition)》 EI CAS 2015年第1期86-90,共5页
In this paper,the authors study some impulsive fractionalorder neural network with mixed delay. By the fractional integral and the definition of stability, the existence of solutions of the network is proved,and the s... In this paper,the authors study some impulsive fractionalorder neural network with mixed delay. By the fractional integral and the definition of stability, the existence of solutions of the network is proved,and the sufficient conditions for stability of the system are presented. Some examples are given to illustrate the main results. 展开更多
关键词 fractional-order neural network mixed delay fixed point theorem
在线阅读 下载PDF
Privacy Protection with Dynamic Pseudonym-Based Multiple Mix-Zones Over Road Networks 被引量:1
4
作者 Qasim Ali Arain Zhongliang Deng +4 位作者 Imran memon Asma Zubedi Jichao Jiao Aisha Ashraf Muhammad Saad Khan 《China Communications》 SCIE CSCD 2017年第4期89-100,共12页
In this research we proposed a strategy for location privacy protection which addresses the issues related with existing location privacy protection techniques. Mix-Zones and pseudonyms are considered as the basic bui... In this research we proposed a strategy for location privacy protection which addresses the issues related with existing location privacy protection techniques. Mix-Zones and pseudonyms are considered as the basic building blocks for location privacy; however, continuously changing pseudonyms process at multiple locations can enhance user privacy. It has been revealed that changing pseudonym at improper time and location may threat to user's privacy. Moreover, certain methods related to pseudonym change have been proposed to attain desirable location privacy and most of these solutions are based upon velocity, GPS position and direction of angle. We analyzed existing methods related to location privacy with mix zones, such as RPCLP, EPCS and MODP, where it has been observed that these methods are not adequate to attain desired level of location privacy and suffered from large number of pseudonym changes. By analyzing limitations of existing methods, we proposed Dynamic Pseudonym based multiple mix zone(DPMM) technique, which ensures highest level of accuracy and privacy. We simulate our data by using SUMO application and analysis results has revealed that DPMM outperformed existing pseudonym change techniques and achieved better results in terms of acquiring high privacy with small number of pseudonym change. 展开更多
关键词 road network multiple mix-zones location privacy
在线阅读 下载PDF
End-to-end Delay Analysis for Mixed-criticality WirelessHART Networks 被引量:2
5
作者 Xi Jin Jintao Wang Peng Zeng 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI 2015年第3期282-289,共8页
WirelessHART, as a robust and reliable wireless protocol, has been widely-used in industrial wireless sensoractuator networks. Its real-time performance has been extensively studied, but limited to the single critical... WirelessHART, as a robust and reliable wireless protocol, has been widely-used in industrial wireless sensoractuator networks. Its real-time performance has been extensively studied, but limited to the single criticality case. Many advanced applications have mixed-criticality communications, where different data flows come with different levels of importance or criticality. Hence, in this paper, we study the real-time mixedcriticality communication using WirelessHART protocol, and propose an end-to-end delay analysis approach based on fixed priority scheduling. To the best of our knowledge, this is the first work that introduces the concept of mixed-criticality into wireless sensor-actuator networks. Evaluation results show the effectiveness and efficacy of our approach. © 2014 Chinese Association of Automation. 展开更多
关键词 Criticality (nuclear fission)
在线阅读 下载PDF
Performance Analysis of Mixed Amplify-and-Forward and Decode-and-Forward Protocol in Underlay Cognitive Networks 被引量:3
6
作者 Tran Trung Duy Hyung Yun Kong 《China Communications》 SCIE CSCD 2016年第3期115-126,共12页
In this paper, we propose and evaluate outage performance of a mixed amplify-and-forward(AF) and decode-and-forward(DF) relaying protocol in underlay cognitive radio. Different from the conventional AF and DF protocol... In this paper, we propose and evaluate outage performance of a mixed amplify-and-forward(AF) and decode-and-forward(DF) relaying protocol in underlay cognitive radio. Different from the conventional AF and DF protocols, in the proposed protocol, a secondary source attempts to transmit its signal to a secondary destination with help of two secondary relays. One secondary relay always operates in AF mode, while the remaining one always operates in DF mode. Moreover, we also propose a relay selection method, which relies on the decoding status at the DF relay. For performance evaluation and comparison, we derive the exact and approximate closedform expressions of the outage probability for the proposed protocol over Rayleigh fading channel. Finally, we run Monte Carlo simulations to verify the derivations. Results presented that the proposed protocol obtains a diversity order of three and the outage performance of our scheme is between that of the conventional underlay DF protocol and that of the conventional underlay AF protocol. 展开更多
关键词 underlay cognitive network cooperative communication outage probability mixed AF and DF protocols Rayleigh fading channel
在线阅读 下载PDF
Global exponential stability of mixed discrete and distributively delayed cellular neural network 被引量:2
7
作者 姚洪兴 周佳燕 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第1期245-257,共13页
This paper concernes analysis for the global exponential stability of a class of recurrent neural networks with mixed discrete and distributed delays. It first proves the existence and uniqueness of the balance point,... This paper concernes analysis for the global exponential stability of a class of recurrent neural networks with mixed discrete and distributed delays. It first proves the existence and uniqueness of the balance point, then by employing the Lyapunov-Krasovskii functional and Young inequality, it gives the sufficient condition of global exponential stability of cellular neural network with mixed discrete and distributed delays, in addition, the example is provided to illustrate the applicability of the result. 展开更多
关键词 global exponential stability cellular neural network mixed discrete and distributed de-lays Lyapunov-Krasovskii functional and Young inequality
原文传递
Identification of Key Links in Electric Power Operation Based-Spatiotemporal Mixing Convolution Neural Network
8
作者 Lei Feng Bo Wang +2 位作者 Fuqi Ma Hengrui Ma Mohamed AMohamed 《Computer Systems Science & Engineering》 SCIE EI 2023年第8期1487-1501,共15页
As the scale of the power system continues to expand,the environment for power operations becomes more and more complex.Existing risk management and control methods for power operations can only set the same risk dete... As the scale of the power system continues to expand,the environment for power operations becomes more and more complex.Existing risk management and control methods for power operations can only set the same risk detection standard and conduct the risk detection for any scenario indiscriminately.Therefore,more reliable and accurate security control methods are urgently needed.In order to improve the accuracy and reliability of the operation risk management and control method,this paper proposes a method for identifying the key links in the whole process of electric power operation based on the spatiotemporal hybrid convolutional neural network.To provide early warning and control of targeted risks,first,the video stream is framed adaptively according to the pixel changes in the video stream.Then,the optimized MobileNet is used to extract the feature map of the video stream,which contains both time-series and static spatial scene information.The feature maps are combined and non-linearly mapped to realize the identification of dynamic operating scenes.Finally,training samples and test samples are produced by using the whole process image of a power company in Xinjiang as a case study,and the proposed algorithm is compared with the unimproved MobileNet.The experimental results demonstrated that the method proposed in this paper can accurately identify the type and start and end time of each operation link in the whole process of electric power operation,and has good real-time performance.The average accuracy of the algorithm can reach 87.8%,and the frame rate is 61 frames/s,which is of great significance for improving the reliability and accuracy of security control methods. 展开更多
关键词 Security risk management key links identifications electric power operation spatiotemporal mixing convolution neural network MobileNet network
在线阅读 下载PDF
PON and WiMAX Convergence Network Planning Based on Mixed Integer Programming Model
9
作者 吕淼 陈雪 《China Communications》 SCIE CSCD 2011年第5期111-118,共8页
This article analyzes the characteristics of PON and WiMAX convergence network planning.Based on user coverage ratio,WiMAX channel allocation,cell radius,carrier-to-noise ratio threshold,and bandwidth constraint,we pr... This article analyzes the characteristics of PON and WiMAX convergence network planning.Based on user coverage ratio,WiMAX channel allocation,cell radius,carrier-to-noise ratio threshold,and bandwidth constraint,we propose a mixed integer programming model solved by a Branch-Band and Heuristic Search method.Finally,the simulation result is given and analyzed.The planning method based on a mixed integer programming model can save 20 percentage of the overall planning cost,compared with the greedy algorithm.The relationship between the convergence network planning cost and frequency usage is also analyzed.The optimized planning result with the lowest cost can be acquired through the best frequency usage. 展开更多
关键词 PON WIMAX network planning mixed integer planning COST
在线阅读 下载PDF
The Sensitivity of Model Results to Specification of Network-Based Level of Service Attributes: An Application of a Mixed Logit Model to Trave Mode Choice
10
作者 Bharat P. Bhatta 《Journal of Transportation Technologies》 2011年第3期34-46,共13页
The need for travel demand models is growing worldwide. Obtaining reasonably accurate level of service (LOS) attributes of different travel modes such as travel time and cost representing the performance of transporta... The need for travel demand models is growing worldwide. Obtaining reasonably accurate level of service (LOS) attributes of different travel modes such as travel time and cost representing the performance of transportation system is not a trivial task, especially in growing cities of developing countries. This study investigates the sensitivity of results of a travel mode choice model to different specifications of network-based LOS attributes using a mixed logit model. The study also looks at the possibilities of correcting some of the inaccuracies in network-based LOS attributes. Further, the study also explores the effects of different specifications of LOS data on implied values of time and aggregation forecasting. The findings indicate that the implied values of time are very sensitive to specification of data and model implying that utmost care must be taken if the purpose of the model is to estimate values of time. Models estimated on all specifications of LOS-data perform well in prediction, likely suggesting that the extra expense on developing a more detailed and accurate network models so as to derive more precise LOS attributes is unnecessary for impact analyses of some policies. 展开更多
关键词 Data SPECIFICATION Level of Service Attributes TRAVEL Mode CHOICE network Models mixed LOGIT ERROR Components LOGIT
暂未订购
基于自适应GCN与Time-Mixing MLP的多变量时间序列预测模型
11
作者 徐猛猛 吴涛 李振龙 《黑龙江大学自然科学学报》 2025年第2期147-153,共7页
为了更好地处理多变量时间序列中变量交互和尺度交互,提出了多变量时间序列预测模型自适应图卷积网络—时间混合多层感知机(Adaptive graph convolutional network-time-mixing multi-layer perceptron,AGCN-Mixing)。该模型在变量维度... 为了更好地处理多变量时间序列中变量交互和尺度交互,提出了多变量时间序列预测模型自适应图卷积网络—时间混合多层感知机(Adaptive graph convolutional network-time-mixing multi-layer perceptron,AGCN-Mixing)。该模型在变量维度上,利用自适应图卷积网络进行变量交互,有效提取序列间的隐藏特征和模式;在时间维度上,将时间序列下采样为子时间序列,并利用时间混合多层感知机进行多尺度交互,有效捕获序列内的复杂交互关系。在6个公开数据集上进行了实验,结果显示,与现有基准模型相比,AGCN-Mixing的均方误差(Mean squared error,MSE)比多变量时间序列图神经网络(Multivariate time series graph neural network,MTGNN)、频率增强分解Transformer(Frequency enhanced decomposed transformer,FEDformer)、分解线性层网络(Decomposition linear layer network,DLinear)和基于时间二维变化网络(Time-based two dimensional variation network,TimesNet)模型分别平均减少了20.50%、15.64%、15.44%和7.50%,表明AGCN-Mixing有效提升了预测精度。 展开更多
关键词 多变量时间序列预测 图卷积网络 时间混合多层感知机 下采样
在线阅读 下载PDF
Existence and Exponential Stability of the Anti-Periodic Solutions for a Class of Impulsive CohenGrossberg Neural Networks with Mixed Delays
12
作者 QIN Fajin YAO Xiaojie 《软件》 2014年第5期17-24,共8页
In this paper,we study the anti-periodic solutions for a class of impulsive Cohen-Grossberg neural networks with mixed delays.By using analysis techniques,some sufficient conditions are obtained which guarantee the ex... In this paper,we study the anti-periodic solutions for a class of impulsive Cohen-Grossberg neural networks with mixed delays.By using analysis techniques,some sufficient conditions are obtained which guarantee the existence and global exponential stability of the anti-periodic solutions.The criteria extend and improve some earlier results.Moreover,we give an examples to illustrate our main results. 展开更多
关键词 mixed DELAYS IMPULSIVE COHEN-GROSSBERG Neural networks ANTI-PERIODIC Solution Global EXPONENTIAL Stability
在线阅读 下载PDF
基于特征插值TSCTransMix-CapsNet的轴承故障分类模型
13
作者 任义 孙明丽 +1 位作者 栾方军 袁帅 《机电工程》 北大核心 2025年第4期607-617,共11页
针对轴承故障诊断分类模型不能很好地提取到振动序列多层次特征,以及故障样本量稀少的问题,提出了一种基于特征插值的时间序列分类Transformer融合胶囊网络(TSCTransMix-CapsNet)的故障诊断模型。首先,以重叠采样预处理后的一维振动信... 针对轴承故障诊断分类模型不能很好地提取到振动序列多层次特征,以及故障样本量稀少的问题,提出了一种基于特征插值的时间序列分类Transformer融合胶囊网络(TSCTransMix-CapsNet)的故障诊断模型。首先,以重叠采样预处理后的一维振动信号数据作为模型的输入,利用时间序列分类Transformer(TSCTransformer)捕捉了序列长距离关系,提取了振动信号的全局故障特征,同时应用混合数据增强方法(Mixup)对特征做了插值处理,进行了特征增强;然后,利用胶囊网络模型对全局故障特征作了进一步细化处理,提取了局部故障特征,从而形成了包含全局模式和局部细节的特征输出;最后,在多工况条件下选取CWRU和XJTU-SY数据集进行了轴承故障诊断的消融和对比实验,并将该模型与其他模型进行了比较。研究结果表明:该模型在CWRU数据集上的故障诊断准确率达到99.50%,在XJTU-SY数据集上的故障诊断准确率达到99.87%。相比于其他模型,该模型能更加有效地提高轴承故障诊断中的分类性能。 展开更多
关键词 故障诊断模型 时间序列分类Transformer 胶囊网络模型 特征插值 特征增强 混合数据增强方法
在线阅读 下载PDF
基于双线性对的乐观Mix-net协议
14
作者 李龙海 付少锋 苏锐丹 《通信学报》 EI CSCD 北大核心 2013年第11期153-161,共9页
提出了一种新的基于双线性对的乐观Mix-net协议。利用双线性对工具简化了密钥管理,在不同的协议会话中服务器端不用重新生成密钥,并且当前会话不会为其他会话提供解密预言机服务。采用了"哑元追踪法"保证混洗过程的完整性,简... 提出了一种新的基于双线性对的乐观Mix-net协议。利用双线性对工具简化了密钥管理,在不同的协议会话中服务器端不用重新生成密钥,并且当前会话不会为其他会话提供解密预言机服务。采用了"哑元追踪法"保证混洗过程的完整性,简化了正确性证明的构造。对ElGamal联合解密过程做了优化,降低了每个服务器节的指数运算量。在没有服务器作弊的情况下,对输入密文组的混洗和解密速度比其他可公开验证的Mix-net方案高得多。 展开更多
关键词 匿名通信 乐观混合网络 双线性对 秘密混洗证明
在线阅读 下载PDF
基于Mix网络的通信系统安全性能分析 被引量:1
15
作者 高超 毛胜利 《黄石理工学院学报》 2010年第2期24-26,共3页
文章论证了基于Mix网络的安全性,给出了基于Mix网络中各类节点的负载。Mix网络在提供较强匿名性的同时,系统中用户节点的期望负载不随系统规模的扩大而增加,消息的期望路径长度与系统规模无关,系统的可扩展性较好。
关键词 mix网络 Crowds节点 通信安全
在线阅读 下载PDF
选择密文安全的可验证Mix-Net协议
16
作者 李龙海 黄诚强 +1 位作者 许尚妹 付少锋 《通信学报》 EI CSCD 北大核心 2015年第10期17-27,共11页
提出了一种在选择密文攻击下可证明安全的可验证Mix-Net协议。在Wikstr?m Mix-Net方案基础上,引入了新的密钥生成算法和秘密混洗零知识证明构造方法,提高了安全性。在不暴露输入密文与输出明文匹配关系的条件下,任何人都可以根据Mix服... 提出了一种在选择密文攻击下可证明安全的可验证Mix-Net协议。在Wikstr?m Mix-Net方案基础上,引入了新的密钥生成算法和秘密混洗零知识证明构造方法,提高了安全性。在不暴露输入密文与输出明文匹配关系的条件下,任何人都可以根据Mix服务器公布的证据验证输出结果的正确性,即满足可公开验证性;任意发送者还可以追踪和检验自己输入的密文的处理过程,即满足发送者可验证性。基于随机预言机假设证明了该协议在适应性选择密文攻击模型下的安全性。与之前具有类似安全属性的方案相比,所提协议无需信任中心,无需用户与服务器之间的多轮交互,计算和通信复杂度更低,因此是构建安全电子选举协议的理想密码学工具。 展开更多
关键词 混合网络 秘密混洗证明 选择密文安全 电子选举
在线阅读 下载PDF
基于信息熵的MIX网络关系匿名度量
17
作者 宋伟 刘景森 《光盘技术》 2009年第5期49-51,共3页
关系匿名对于报文目的站的分布有着很高的敏感性,特别是网络浏览的齐夫分布斜率特征提供了弱关系匿名。文中对关系匿名给出一个正式的定义和度量方法,同时考虑到了路由选择算法,并结合了信息理论评估中的熵和最小熵的概念。最后,在几个... 关系匿名对于报文目的站的分布有着很高的敏感性,特别是网络浏览的齐夫分布斜率特征提供了弱关系匿名。文中对关系匿名给出一个正式的定义和度量方法,同时考虑到了路由选择算法,并结合了信息理论评估中的熵和最小熵的概念。最后,在几个仿真的MIX网络中,对关系匿名进行了计算,并以图解的方式呈现出来。 展开更多
关键词 匿名度量 秘密 mix网络
在线阅读 下载PDF
一种基于停止-转发MIX的统计型攻击
18
作者 徐红云 刘京 李孟杰 《小型微型计算机系统》 CSCD 北大核心 2010年第11期2217-2221,共5页
为了增强匿名系统的匿名性,更好地保护用户的通信隐私,基于停止-转发MIX提出一种新的统计型攻击算法.算法将攻击者的连续观察时间划分成t个周期,每个周期统计MIX节点输出信息包的接收者集合,称之为一个观察集合,获得t个观察集合后,采用... 为了增强匿名系统的匿名性,更好地保护用户的通信隐私,基于停止-转发MIX提出一种新的统计型攻击算法.算法将攻击者的连续观察时间划分成t个周期,每个周期统计MIX节点输出信息包的接收者集合,称之为一个观察集合,获得t个观察集合后,采用概率统计、集合运算等方法,确定目标发送者的接收者集合.指出采用填充包技术防御该攻击时,可以增加攻击所需的观察集合数,降低攻击的有效性. 展开更多
关键词 数据隐私 网络安全 匿名系统 停止-转发mix 统计型攻击
在线阅读 下载PDF
一种基于分组填充Mix策略的匿名通信机制
19
作者 汤念 王雷 +2 位作者 姚焯善 张大方 徐红云 《计算机应用》 CSCD 北大核心 2007年第7期1606-1608,共3页
Mix机制为实现匿名通信技术提供了可行的解决方案,但攻击者仍可以在一定程度上通过流量分析来获取通信关系。为了进一步提高Mix机制对抗信息量分析攻击的能力,提出了分组填充的思想,并基于分组填充Mix策略给出了一种新型匿名通信机制。... Mix机制为实现匿名通信技术提供了可行的解决方案,但攻击者仍可以在一定程度上通过流量分析来获取通信关系。为了进一步提高Mix机制对抗信息量分析攻击的能力,提出了分组填充的思想,并基于分组填充Mix策略给出了一种新型匿名通信机制。算法分析和仿真实验表明,与传统Mix机制相比,新的基于分组填充的Mix机制,能在有效抵御信息量分析攻击的同时,进一步降低网络的额外带宽开销。 展开更多
关键词 匿名通信 mix机制 分组填充 网络安全
在线阅读 下载PDF
AABN: Anonymity Assessment Model Based on Bayesian Network With Application to Blockchain 被引量:2
20
作者 Tianbo Lu Ru Yan +1 位作者 Min Lei Zhimin Lin 《China Communications》 SCIE CSCD 2019年第6期55-68,共14页
Blockchain is a technology that uses community validation to keep synchronized the content of ledgers replicated across multiple users,which is the underlying technology of digital currency like bitcoin.The anonymity ... Blockchain is a technology that uses community validation to keep synchronized the content of ledgers replicated across multiple users,which is the underlying technology of digital currency like bitcoin.The anonymity of blockchain has caused widespread concern.In this paper,we put forward AABN,an Anonymity Assessment model based on Bayesian Network.Firstly,we investigate and analyze the anonymity assessment techniques,and focus on typical anonymity assessment schemes.Then the related concepts involved in the assessment model are introduced and the model construction process is described in detail.Finally,the anonymity in the MIX anonymous network is quantitatively evaluated using the methods of accurate reasoning and approximate reasoning respectively,and the anonymity assessment experiments under different output strategies of the MIX anonymous network are analyzed. 展开更多
关键词 blockchain ANONYMITY ASSESSMENT BAYESIAN network mix
在线阅读 下载PDF
上一页 1 2 86 下一页 到第
使用帮助 返回顶部