An optimal dimension-down iterative algorithm (DDIA) is proposed for solving a mixed (continuous/ discrete) transportation network design problem (MNDP), which is generally expressed as a mathematical programmin...An optimal dimension-down iterative algorithm (DDIA) is proposed for solving a mixed (continuous/ discrete) transportation network design problem (MNDP), which is generally expressed as a mathematical programming with equilibrium constraints (MPEC). The upper level of the MNDP aims to optimize the network performance via both the expansion of existing links and the addition of new candidate links, whereas the lower level is a traditional Wardrop user equilibrium (UE) model. The idea of the proposed DDIA is to reduce the dimensions of the problem. A group of variables (discrete/continuous) are fixed to altemately optimize another group of variables (continuous/discrete). Some continuous network design problems (CNDPs) and discrete network design problems (DNDPs) are solved repeatedly until the optimal solution is obtained. A numerical example is given to demonstrate the efficiency of the proposed algorithm.展开更多
In this article, we consider the global chaotic synchronization of general cou- pled neural networks, in which subsystems have both discrete and distributed delays. Stochastic perturbations between subsystems are also...In this article, we consider the global chaotic synchronization of general cou- pled neural networks, in which subsystems have both discrete and distributed delays. Stochastic perturbations between subsystems are also considered. On the basis of two sim- ple adaptive pinning feedback control schemes, Lyapunov functional method, and stochas- tic analysis approach, several sufficient conditions are developed to guarantee global syn- chronization of the coupled neural networks with two kinds of delay couplings, even if only partial states of the nodes are coupled. The outer-coupling matrices may be symmetric or asymmetric. Unlike existing results that an isolate node is introduced as the pinning target, we pin to help the network realizing synchronization without introducing any iso- late node when the network is not synchronized. As a by product, sufficient conditions under which the network realizes synchronization without control are derived. Numerical simulations confirm the effectiveness of the obtained results.展开更多
In this paper,the authors study some impulsive fractionalorder neural network with mixed delay. By the fractional integral and the definition of stability, the existence of solutions of the network is proved,and the s...In this paper,the authors study some impulsive fractionalorder neural network with mixed delay. By the fractional integral and the definition of stability, the existence of solutions of the network is proved,and the sufficient conditions for stability of the system are presented. Some examples are given to illustrate the main results.展开更多
In this research we proposed a strategy for location privacy protection which addresses the issues related with existing location privacy protection techniques. Mix-Zones and pseudonyms are considered as the basic bui...In this research we proposed a strategy for location privacy protection which addresses the issues related with existing location privacy protection techniques. Mix-Zones and pseudonyms are considered as the basic building blocks for location privacy; however, continuously changing pseudonyms process at multiple locations can enhance user privacy. It has been revealed that changing pseudonym at improper time and location may threat to user's privacy. Moreover, certain methods related to pseudonym change have been proposed to attain desirable location privacy and most of these solutions are based upon velocity, GPS position and direction of angle. We analyzed existing methods related to location privacy with mix zones, such as RPCLP, EPCS and MODP, where it has been observed that these methods are not adequate to attain desired level of location privacy and suffered from large number of pseudonym changes. By analyzing limitations of existing methods, we proposed Dynamic Pseudonym based multiple mix zone(DPMM) technique, which ensures highest level of accuracy and privacy. We simulate our data by using SUMO application and analysis results has revealed that DPMM outperformed existing pseudonym change techniques and achieved better results in terms of acquiring high privacy with small number of pseudonym change.展开更多
In this paper, we propose and evaluate outage performance of a mixed amplify-and-forward(AF) and decode-and-forward(DF) relaying protocol in underlay cognitive radio. Different from the conventional AF and DF protocol...In this paper, we propose and evaluate outage performance of a mixed amplify-and-forward(AF) and decode-and-forward(DF) relaying protocol in underlay cognitive radio. Different from the conventional AF and DF protocols, in the proposed protocol, a secondary source attempts to transmit its signal to a secondary destination with help of two secondary relays. One secondary relay always operates in AF mode, while the remaining one always operates in DF mode. Moreover, we also propose a relay selection method, which relies on the decoding status at the DF relay. For performance evaluation and comparison, we derive the exact and approximate closedform expressions of the outage probability for the proposed protocol over Rayleigh fading channel. Finally, we run Monte Carlo simulations to verify the derivations. Results presented that the proposed protocol obtains a diversity order of three and the outage performance of our scheme is between that of the conventional underlay DF protocol and that of the conventional underlay AF protocol.展开更多
This paper concernes analysis for the global exponential stability of a class of recurrent neural networks with mixed discrete and distributed delays. It first proves the existence and uniqueness of the balance point,...This paper concernes analysis for the global exponential stability of a class of recurrent neural networks with mixed discrete and distributed delays. It first proves the existence and uniqueness of the balance point, then by employing the Lyapunov-Krasovskii functional and Young inequality, it gives the sufficient condition of global exponential stability of cellular neural network with mixed discrete and distributed delays, in addition, the example is provided to illustrate the applicability of the result.展开更多
As the scale of the power system continues to expand,the environment for power operations becomes more and more complex.Existing risk management and control methods for power operations can only set the same risk dete...As the scale of the power system continues to expand,the environment for power operations becomes more and more complex.Existing risk management and control methods for power operations can only set the same risk detection standard and conduct the risk detection for any scenario indiscriminately.Therefore,more reliable and accurate security control methods are urgently needed.In order to improve the accuracy and reliability of the operation risk management and control method,this paper proposes a method for identifying the key links in the whole process of electric power operation based on the spatiotemporal hybrid convolutional neural network.To provide early warning and control of targeted risks,first,the video stream is framed adaptively according to the pixel changes in the video stream.Then,the optimized MobileNet is used to extract the feature map of the video stream,which contains both time-series and static spatial scene information.The feature maps are combined and non-linearly mapped to realize the identification of dynamic operating scenes.Finally,training samples and test samples are produced by using the whole process image of a power company in Xinjiang as a case study,and the proposed algorithm is compared with the unimproved MobileNet.The experimental results demonstrated that the method proposed in this paper can accurately identify the type and start and end time of each operation link in the whole process of electric power operation,and has good real-time performance.The average accuracy of the algorithm can reach 87.8%,and the frame rate is 61 frames/s,which is of great significance for improving the reliability and accuracy of security control methods.展开更多
This article analyzes the characteristics of PON and WiMAX convergence network planning.Based on user coverage ratio,WiMAX channel allocation,cell radius,carrier-to-noise ratio threshold,and bandwidth constraint,we pr...This article analyzes the characteristics of PON and WiMAX convergence network planning.Based on user coverage ratio,WiMAX channel allocation,cell radius,carrier-to-noise ratio threshold,and bandwidth constraint,we propose a mixed integer programming model solved by a Branch-Band and Heuristic Search method.Finally,the simulation result is given and analyzed.The planning method based on a mixed integer programming model can save 20 percentage of the overall planning cost,compared with the greedy algorithm.The relationship between the convergence network planning cost and frequency usage is also analyzed.The optimized planning result with the lowest cost can be acquired through the best frequency usage.展开更多
The need for travel demand models is growing worldwide. Obtaining reasonably accurate level of service (LOS) attributes of different travel modes such as travel time and cost representing the performance of transporta...The need for travel demand models is growing worldwide. Obtaining reasonably accurate level of service (LOS) attributes of different travel modes such as travel time and cost representing the performance of transportation system is not a trivial task, especially in growing cities of developing countries. This study investigates the sensitivity of results of a travel mode choice model to different specifications of network-based LOS attributes using a mixed logit model. The study also looks at the possibilities of correcting some of the inaccuracies in network-based LOS attributes. Further, the study also explores the effects of different specifications of LOS data on implied values of time and aggregation forecasting. The findings indicate that the implied values of time are very sensitive to specification of data and model implying that utmost care must be taken if the purpose of the model is to estimate values of time. Models estimated on all specifications of LOS-data perform well in prediction, likely suggesting that the extra expense on developing a more detailed and accurate network models so as to derive more precise LOS attributes is unnecessary for impact analyses of some policies.展开更多
In this paper,we study the anti-periodic solutions for a class of impulsive Cohen-Grossberg neural networks with mixed delays.By using analysis techniques,some sufficient conditions are obtained which guarantee the ex...In this paper,we study the anti-periodic solutions for a class of impulsive Cohen-Grossberg neural networks with mixed delays.By using analysis techniques,some sufficient conditions are obtained which guarantee the existence and global exponential stability of the anti-periodic solutions.The criteria extend and improve some earlier results.Moreover,we give an examples to illustrate our main results.展开更多
Blockchain is a technology that uses community validation to keep synchronized the content of ledgers replicated across multiple users,which is the underlying technology of digital currency like bitcoin.The anonymity ...Blockchain is a technology that uses community validation to keep synchronized the content of ledgers replicated across multiple users,which is the underlying technology of digital currency like bitcoin.The anonymity of blockchain has caused widespread concern.In this paper,we put forward AABN,an Anonymity Assessment model based on Bayesian Network.Firstly,we investigate and analyze the anonymity assessment techniques,and focus on typical anonymity assessment schemes.Then the related concepts involved in the assessment model are introduced and the model construction process is described in detail.Finally,the anonymity in the MIX anonymous network is quantitatively evaluated using the methods of accurate reasoning and approximate reasoning respectively,and the anonymity assessment experiments under different output strategies of the MIX anonymous network are analyzed.展开更多
基金The National Natural Science Foundation of China(No. 50908235 )China Postdoctoral Science Foundation (No.201003520)
文摘An optimal dimension-down iterative algorithm (DDIA) is proposed for solving a mixed (continuous/ discrete) transportation network design problem (MNDP), which is generally expressed as a mathematical programming with equilibrium constraints (MPEC). The upper level of the MNDP aims to optimize the network performance via both the expansion of existing links and the addition of new candidate links, whereas the lower level is a traditional Wardrop user equilibrium (UE) model. The idea of the proposed DDIA is to reduce the dimensions of the problem. A group of variables (discrete/continuous) are fixed to altemately optimize another group of variables (continuous/discrete). Some continuous network design problems (CNDPs) and discrete network design problems (DNDPs) are solved repeatedly until the optimal solution is obtained. A numerical example is given to demonstrate the efficiency of the proposed algorithm.
基金supported by the National Natural Science Foundation of China under Grant No. 60874088 and No. 11072059the Scientific Research Fund of Yunnan Province under Grant No. 2010ZC150the Scientific Research Fund of Yunnan Provincial Education Department under Grant No. 07Y10085
文摘In this article, we consider the global chaotic synchronization of general cou- pled neural networks, in which subsystems have both discrete and distributed delays. Stochastic perturbations between subsystems are also considered. On the basis of two sim- ple adaptive pinning feedback control schemes, Lyapunov functional method, and stochas- tic analysis approach, several sufficient conditions are developed to guarantee global syn- chronization of the coupled neural networks with two kinds of delay couplings, even if only partial states of the nodes are coupled. The outer-coupling matrices may be symmetric or asymmetric. Unlike existing results that an isolate node is introduced as the pinning target, we pin to help the network realizing synchronization without introducing any iso- late node when the network is not synchronized. As a by product, sufficient conditions under which the network realizes synchronization without control are derived. Numerical simulations confirm the effectiveness of the obtained results.
基金National Natural Science Foundation of China(No.71461027)Research Fund for the Doctoral Program of Zunyi Normal College,China(No.201419)Guizhou Science and Technology Mutual Fund,China(No.[2015]7002)
文摘In this paper,the authors study some impulsive fractionalorder neural network with mixed delay. By the fractional integral and the definition of stability, the existence of solutions of the network is proved,and the sufficient conditions for stability of the system are presented. Some examples are given to illustrate the main results.
基金supported by the National Natural Science Foundation of China (Grant No.61401040,Grant No.61372110)
文摘In this research we proposed a strategy for location privacy protection which addresses the issues related with existing location privacy protection techniques. Mix-Zones and pseudonyms are considered as the basic building blocks for location privacy; however, continuously changing pseudonyms process at multiple locations can enhance user privacy. It has been revealed that changing pseudonym at improper time and location may threat to user's privacy. Moreover, certain methods related to pseudonym change have been proposed to attain desirable location privacy and most of these solutions are based upon velocity, GPS position and direction of angle. We analyzed existing methods related to location privacy with mix zones, such as RPCLP, EPCS and MODP, where it has been observed that these methods are not adequate to attain desired level of location privacy and suffered from large number of pseudonym changes. By analyzing limitations of existing methods, we proposed Dynamic Pseudonym based multiple mix zone(DPMM) technique, which ensures highest level of accuracy and privacy. We simulate our data by using SUMO application and analysis results has revealed that DPMM outperformed existing pseudonym change techniques and achieved better results in terms of acquiring high privacy with small number of pseudonym change.
基金supported by the 2016 research fund of University of Ulsan
文摘In this paper, we propose and evaluate outage performance of a mixed amplify-and-forward(AF) and decode-and-forward(DF) relaying protocol in underlay cognitive radio. Different from the conventional AF and DF protocols, in the proposed protocol, a secondary source attempts to transmit its signal to a secondary destination with help of two secondary relays. One secondary relay always operates in AF mode, while the remaining one always operates in DF mode. Moreover, we also propose a relay selection method, which relies on the decoding status at the DF relay. For performance evaluation and comparison, we derive the exact and approximate closedform expressions of the outage probability for the proposed protocol over Rayleigh fading channel. Finally, we run Monte Carlo simulations to verify the derivations. Results presented that the proposed protocol obtains a diversity order of three and the outage performance of our scheme is between that of the conventional underlay DF protocol and that of the conventional underlay AF protocol.
基金Project supported by the National Natural Science Foundations of China(Grant No.70871056)the Society Science Foundation from Ministry of Education of China(Grant No.08JA790057)the Advanced Talents'Foundation and Student's Foundation of Jiangsu University,China(Grant Nos.07JDG054 and 07A075)
文摘This paper concernes analysis for the global exponential stability of a class of recurrent neural networks with mixed discrete and distributed delays. It first proves the existence and uniqueness of the balance point, then by employing the Lyapunov-Krasovskii functional and Young inequality, it gives the sufficient condition of global exponential stability of cellular neural network with mixed discrete and distributed delays, in addition, the example is provided to illustrate the applicability of the result.
基金This paper is supported by the Science and technology projects of Yunnan Province(Grant No.202202AD080004).
文摘As the scale of the power system continues to expand,the environment for power operations becomes more and more complex.Existing risk management and control methods for power operations can only set the same risk detection standard and conduct the risk detection for any scenario indiscriminately.Therefore,more reliable and accurate security control methods are urgently needed.In order to improve the accuracy and reliability of the operation risk management and control method,this paper proposes a method for identifying the key links in the whole process of electric power operation based on the spatiotemporal hybrid convolutional neural network.To provide early warning and control of targeted risks,first,the video stream is framed adaptively according to the pixel changes in the video stream.Then,the optimized MobileNet is used to extract the feature map of the video stream,which contains both time-series and static spatial scene information.The feature maps are combined and non-linearly mapped to realize the identification of dynamic operating scenes.Finally,training samples and test samples are produced by using the whole process image of a power company in Xinjiang as a case study,and the proposed algorithm is compared with the unimproved MobileNet.The experimental results demonstrated that the method proposed in this paper can accurately identify the type and start and end time of each operation link in the whole process of electric power operation,and has good real-time performance.The average accuracy of the algorithm can reach 87.8%,and the frame rate is 61 frames/s,which is of great significance for improving the reliability and accuracy of security control methods.
基金supported by National High Technical Research and Development Program of China(863 program)under Grant No.2009AA01A345Fundamental Research Funds for the Central Universities under Grant No.BUPT2009RC0402
文摘This article analyzes the characteristics of PON and WiMAX convergence network planning.Based on user coverage ratio,WiMAX channel allocation,cell radius,carrier-to-noise ratio threshold,and bandwidth constraint,we propose a mixed integer programming model solved by a Branch-Band and Heuristic Search method.Finally,the simulation result is given and analyzed.The planning method based on a mixed integer programming model can save 20 percentage of the overall planning cost,compared with the greedy algorithm.The relationship between the convergence network planning cost and frequency usage is also analyzed.The optimized planning result with the lowest cost can be acquired through the best frequency usage.
文摘The need for travel demand models is growing worldwide. Obtaining reasonably accurate level of service (LOS) attributes of different travel modes such as travel time and cost representing the performance of transportation system is not a trivial task, especially in growing cities of developing countries. This study investigates the sensitivity of results of a travel mode choice model to different specifications of network-based LOS attributes using a mixed logit model. The study also looks at the possibilities of correcting some of the inaccuracies in network-based LOS attributes. Further, the study also explores the effects of different specifications of LOS data on implied values of time and aggregation forecasting. The findings indicate that the implied values of time are very sensitive to specification of data and model implying that utmost care must be taken if the purpose of the model is to estimate values of time. Models estimated on all specifications of LOS-data perform well in prediction, likely suggesting that the extra expense on developing a more detailed and accurate network models so as to derive more precise LOS attributes is unnecessary for impact analyses of some policies.
基金supported by National Nature Science Foundation under Grant 11161029,Chinascience and technology research projects of guangxi under Grant 2013YB282,201203YB186
文摘In this paper,we study the anti-periodic solutions for a class of impulsive Cohen-Grossberg neural networks with mixed delays.By using analysis techniques,some sufficient conditions are obtained which guarantee the existence and global exponential stability of the anti-periodic solutions.The criteria extend and improve some earlier results.Moreover,we give an examples to illustrate our main results.
基金supported by the following grants:the National Natural Science Foundation of China under Grant No.61170273the China Scholarship Council under Grant No.[2013]3050+1 种基金CCF-Tencent Open Fund WeBank Special Fuding(CCF-WebankRAGR20180104)the Beijing Natural Science Foundation(4194086)
文摘Blockchain is a technology that uses community validation to keep synchronized the content of ledgers replicated across multiple users,which is the underlying technology of digital currency like bitcoin.The anonymity of blockchain has caused widespread concern.In this paper,we put forward AABN,an Anonymity Assessment model based on Bayesian Network.Firstly,we investigate and analyze the anonymity assessment techniques,and focus on typical anonymity assessment schemes.Then the related concepts involved in the assessment model are introduced and the model construction process is described in detail.Finally,the anonymity in the MIX anonymous network is quantitatively evaluated using the methods of accurate reasoning and approximate reasoning respectively,and the anonymity assessment experiments under different output strategies of the MIX anonymous network are analyzed.