期刊文献+
共找到413篇文章
< 1 2 21 >
每页显示 20 50 100
Selfish behavior detection of cooperative relay
1
作者 付晓梅 赵艳玲 《Journal of Beijing Institute of Technology》 EI CAS 2013年第1期55-59,共5页
A selfish behavior detection technique is investigated to assist secure cooperative trans- mission at the physical layer. The detection technique calculates the correlation ratio between signals received from the dive... A selfish behavior detection technique is investigated to assist secure cooperative trans- mission at the physical layer. The detection technique calculates the correlation ratio between signals received from the diversity branches to determine the relay' s behavior in amplify and forward coop- eration strategy. The correlation ratio is considerably reduced because the relay' s selfish behavior makes the correlation between the received signals in the diversity branch degraded. Simulation re- sults show that the proposed mechanism can effectively detect selfish nodes and performance will be improved significantly with the destination' s detection technique. 展开更多
关键词 physical layer security selfish relay detection misbehavior cooperative diversity
在线阅读 下载PDF
Energy Metabolism and Allocation in Selfish Immune System and Brain: A Beneficial Role of Insulin Resistance in Aging
2
作者 Ali Almajwal Iftikhar Alam +1 位作者 Falak Zeb Sadia Fatima 《Food and Nutrition Sciences》 2019年第1期64-80,共17页
There is relatively limited knowledge concerning our understanding of how our immune system and brain take most of the available energy in a selfish manner to compensate for their own needs on priority in high energy ... There is relatively limited knowledge concerning our understanding of how our immune system and brain take most of the available energy in a selfish manner to compensate for their own needs on priority in high energy demanding situations. The main objective of this review is to understand the energy allocation to immune system and brain in infections and/or fight or flight situations. The immune system and brain behave in a selfish manner as they allocate themselves majority of the total available energy. Insulin resistance (IR) is used as a tool for energy allocation by these systems. The immune system is activated as a response to stress and infection. Similarly, the brain gets activated as a response to any external environmental impulse, anxiety, and/or mental factor. These situations need to be dealt in a way to minimize their adverse health effects. The immune system and the brain in such situations need enormous energy for activation which is derived from the energy quota otherwise allocated to other organs. This maximum flux of energy towards these systems is achieved by making rest of the organs less responsive to insulin, a condition known as IR. As immune system and brain do not depend upon insulin for uptake of glucose, these systems are benefited from IR. IR is indicated as a beneficial role ensuring maximum energy allocation to these systems for improving health and well-being. 展开更多
关键词 selfish IMMUNE System selfish BRAIN Energy Balance INSULIN Resistance
暂未订购
Detection of Selfish Behavior in Wireless Ad Hoc Networks Based on CUSUM Algorithm
3
作者 刘春凤 舒炎泰 +1 位作者 YANG Oliver 李明远 《Transactions of Tianjin University》 EI CAS 2010年第2期104-108,共5页
The cumulative sum (CUSUM) algorithm is proposed to detect the selfish behavior of a node in a wireless ad hoc network. By tracing the statistics characteristic of the backoff time between successful transmissions, ... The cumulative sum (CUSUM) algorithm is proposed to detect the selfish behavior of a node in a wireless ad hoc network. By tracing the statistics characteristic of the backoff time between successful transmissions, a wireless node can distinguish if there is a selfish behavior in the wireless network. The detection efficiency is validated using a Qualnet simulator. An IEEE 802.11 wireless ad hoc network with 20 senders and 20 receivers spreading out randomly in a given area is evaluated. The well-behaved senders use minimum contention window size of 32 and maximum con- tention window size of I 024, and the selfish nodes are assumed not to use the binary exponential strategy for which the contention window sizes are both fixed as 16. The transmission radius of all nodes is 250 m. Two scenarios are investigated: a single-hop network with nodes spreading out in 100 m^100 m, and all the nodes are in the range of each other; and a multi-hop network with nodes spreading out in 1 000 m~ 1 000 m. The node can monitor the backoff time from all the other nodes and run the detection algorithms over those samples. It is noted that the threshold can significantly affect the detection time and the detection accuracy. For a given threshold of 0.3 s, the false alarm rates and the missed alarm rates are less than 5%. The detection delay is less than 1.0 s. The simulation results show that the algorithm has short detection time and high detection accuracy. 展开更多
关键词 ad hoc networks selfish behavior DETECTION CUSUM
在线阅读 下载PDF
Classification of Selfish and Regular Nodes Based on Reputation Values in MANET Using Adaptive Decision Boundary
4
作者 Amir Khusru Akhtar G. Sahoo 《Communications and Network》 2013年第3期185-191,共7页
A MANET is a cooperative network in which each node has dual responsibilities of forwarding and routing thus node strength is a major factor because a lesser number of nodes reduces network performance. The existing r... A MANET is a cooperative network in which each node has dual responsibilities of forwarding and routing thus node strength is a major factor because a lesser number of nodes reduces network performance. The existing reputation based methods have limitation due to their stricter punishment strategy because they isolate nodes from network participation having lesser reputation value and thus reduce the total strength of nodes in a network. In this paper we have proposed a mathematical model for the classification of nodes in MANETs using adaptive decision boundary. This model classifies nodes in two classes: selfish and regular node as well as it assigns the grade to individual nodes. The grade is computed by counting how many passes are required to classify a node and it is used to define the punishment strategy as well as enhances the reputation definition of traditional reputation based mechanisms. Our work provides the extent of noncooperation that a network can allow depending on the current strength of nodes for the given scenario and thus includes selfish nodes in network participation with warning messages. We have taken a leader node for reputation calculation and classification which saves energy of other nodes as energy is a major challenge of MANET. The leader node finally sends the warning message to low grade nodes and broadcasts the classification list in the MANET that is considered in the routing activity. 展开更多
关键词 MANETs REGULAR NODE selfish NODE ADAPTIVE DECISION BOUNDARY Feature Value Noncooperation
暂未订购
Computation of PoA for Selfish Node Detection and Resource Allocation Using Game Theory
5
作者 S.Kanmani M.Murali 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2583-2598,共16页
The introduction of new technologies has increased communication network coverage and the number of associating nodes in dynamic communication networks(DCN).As the network has the characteristics like decentralized an... The introduction of new technologies has increased communication network coverage and the number of associating nodes in dynamic communication networks(DCN).As the network has the characteristics like decentralized and dynamic,few nodes in the network may not associate with other nodes.These uncooperative nodes also known as selfish nodes corrupt the performance of the cooperative nodes.Namely,the nodes cause congestion,high delay,security concerns,and resource depletion.This study presents an effective selfish node detection method to address these problems.The Price of Anarchy(PoA)and the Price of Stability(PoS)in Game Theory with the Presence of Nash Equilibrium(NE)are discussed for the Selfish Node Detection.This is a novel experiment to detect selfish nodes in a network using PoA.Moreover,the least response dynamic-based Capacitated Selfish Resource Allocation(CSRA)game is introduced to improve resource usage among the nodes.The suggested strategy is simulated using the Solar Winds simulator,and the simulation results show that,when compared to earlier methods,the new scheme offers promising performance in terms of delivery rate,delay,and throughput. 展开更多
关键词 Dynamic communication network(DCN) price of anarchy(PoA) nash equilibrium(NE) capacitated selfish resource allocation(CSRA)game game theory price of stability(PoS)
在线阅读 下载PDF
Efficient Selfish Attack Detection in Cognitive Radio Network
6
作者 Shailaja C. Patil Amrita Janardhanan 《Wireless Engineering and Technology》 2016年第4期105-117,共13页
The main intention of developing cognitive radio technology is to solve the spectrum deficiency problem by allocating the spectrum dynamically to the unlicensed clients. An important aim of any wireless network is to ... The main intention of developing cognitive radio technology is to solve the spectrum deficiency problem by allocating the spectrum dynamically to the unlicensed clients. An important aim of any wireless network is to secure communication. It is to help the unlicensed clients to utilize the maximum available licensed bandwidth, and the cognitive network is designed for opportunistic communication technology. Selfish attacks cause serious security problem because they significantly deteriorate the performance of a cognitive network. In this paper, the selfish attacks have been identified using cooperative neighboring cognitive radio ad hoc network (COOPON). A novel technique has been proposed as ICOOPON (improvised COOPON), which shows improved performance in selfish attack detection as compared to existing technique. A comparative study has been presented to find the efficiency of proposed technique. The parameters used are throughput, packet delivery ratio and end to end delay. 展开更多
关键词 Cognitive Radio Network ICOOPON COOPON selfish Attack
在线阅读 下载PDF
Calculation of Available Transfer Capability Using Hybrid Chaotic Selfish Herd Optimizer and 24 Hours RES-thermal Scheduling 被引量:1
7
作者 Kingsuk Majumdar Provas Kumar Roy Subrata Banerjee 《Chinese Journal of Electrical Engineering》 EI CSCD 2023年第4期54-72,共19页
As fossil fuel stocks are being depleted,alternative sources of energy must be explored.Consequently,traditional thermal power plants must coexist with renewable resources,such as wind,solar,and hydro units,and all-da... As fossil fuel stocks are being depleted,alternative sources of energy must be explored.Consequently,traditional thermal power plants must coexist with renewable resources,such as wind,solar,and hydro units,and all-day planning and operation techniques are necessary to safeguard nature while meeting the current demand.The fundamental components of contemporary power systems are the simultaneous decrease in generation costs and increase in the available transfer capacity(ATC)of current systems.Thermal units are linked to sources of renewable energy such as hydro,wind,and solar power,and are set up to run for 24 h.By contrast,new research reports that various chaotic maps are merged with various existing optimization methodologies to obtain better results than those without the inclusion of chaos.Chaos seems to increase the performance and convergence properties of existing optimization approaches.In this study,selfish animal tendencies,mathematically represented as selfish herd optimizers,were hybridized with chaotic phenomena and used to improve ATC and/or reduce generation costs,creating a multi-objective optimization problem.To evaluate the performance of the proposed hybridized optimization technique,an optimal power flow-based ATC was enforced under various hydro-thermal-solar-wind conditions,that is,the renewable energy source-thermal scheduling concept,on IEEE 9-bus,IEEE 39-bus,and Indian Northern Region Power Grid 246-bus test systems.The findings show that the proposed technique outperforms existing well-established optimization strategies. 展开更多
关键词 Available transfer capability(ATC) biogeography-based optimization(BBO) chaotic map chaotic selfish herd optimizer(CSHO) grey wolf optimizer(GWO) optimum power flow(OPF) power generation cost(PGC) renewable energy sources(RES) selfish herd optimizer(SHO)
原文传递
A New Theoretical Framework of Pyramid Markov Processes for Blockchain Selfish Mining 被引量:3
8
作者 Quanlin Li Yanxia Chang +1 位作者 Xiaole Wu Guoqing Zhang 《Journal of Systems Science and Systems Engineering》 SCIE EI CSCD 2021年第6期667-711,共45页
In this paper,we provide a new theoretical framework of pyramid Markov processes to solve some open and fundamental problems of blockchain selfish mining under a rigorous mathematical setting.We first describe a more ... In this paper,we provide a new theoretical framework of pyramid Markov processes to solve some open and fundamental problems of blockchain selfish mining under a rigorous mathematical setting.We first describe a more general model of blockchain selfish mining with both a two-block leading competitive criterion and a new economic incentive mechanism.Then we establish a pyramid Markov process and show that it is irreducible and positive recurrent,and its stationary probability vector is matrix-geometric with an explicitly representable rate matrix.Also,we use the stationary probability vector to study the influence of orphan blocks on the waste of computing resource.Next,we set up a pyramid Markov reward process to investigate the long-run average mining profits of the honest and dishonest mining pools,respectively.As a by-product,we build one-dimensional Markov reward processes and provide some new interesting interpretation on the Markov chain and the revenue analysis reported in the seminal work by Eyal and Sirer(2014).Note that the pyramid Markov(reward)processes can open up a new avenue in the study of blockchain selfish mining.Thus we hope that the methodology and results developed in this paper shed light on the blockchain selfish mining such that a series of promising research can be developed potentially. 展开更多
关键词 Blockchain Proof of Work selfish mining main chain pyramid Markov process pyramid Markov reward process phase-type distribution Matrix-geometric solution
原文传递
Stability vs.Optimality in Selfish Ring Routing
9
作者 Bo CHEN Xujin CHEN Jie HU 《Acta Mathematica Sinica,English Series》 SCIE CSCD 2014年第5期767-784,共18页
We study asymmetric atomic selfish routing in ring networks, which has diverse practical applications in network design and analysis. We are concerned with minimizing the maximum latency of source-destination node-pai... We study asymmetric atomic selfish routing in ring networks, which has diverse practical applications in network design and analysis. We are concerned with minimizing the maximum latency of source-destination node-pairs over links with linear latencies. We show that there exists an optimal solution that is a 9-approximate Nash equilibrium, significantly improving the existing upper bound of 54 on the instability factor. We present fast implementation of the best response dynamics for computing a Nash equilibrium. Furthermore, we perform empirical study on the price of stability, narrowing the gap between the lower and upper bounds to 0.7436. 展开更多
关键词 selfish routing price of stability minimum maximum linear latency
原文传递
A SELFISH ROUTING BASED NETWORK IMPROVEMENT PROBLEM
10
作者 Binwu ZHANG Shu-Cherng FANG 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2011年第1期68-78,共11页
This paper considers a selfish routing based network improvement problem, in which the authors would like to find a modified latency function that results in a new Nash equilibrium flow satisfying all traffic demands ... This paper considers a selfish routing based network improvement problem, in which the authors would like to find a modified latency function that results in a new Nash equilibrium flow satisfying all traffic demands subject to the target capacity, while the total modification cost on edge latency is minimized. By using the reduction from the 3-Satisfiability (3-SAT) problem to our problem, the authors show that this problem is strongly NP-hard, even for the single commodity network. 展开更多
关键词 Nash equilibrium NP-HARD selfish routing price of anarchy.
原文传递
Semi Markov process inspired selfish aware co-operative scheme for wireless sensor networks(SMPISCS)
11
作者 Kanchana Devi V Ganesan R 《Cybersecurity》 CSCD 2019年第1期76-90,共15页
In Wireless Sensor Network(WSN),energy and packet forwarding tendencies of sensor nodes plays a potential role in ensuring a maximum degree of co-operation under data delivery.This quantified level of co-operation sig... In Wireless Sensor Network(WSN),energy and packet forwarding tendencies of sensor nodes plays a potential role in ensuring a maximum degree of co-operation under data delivery.This quantified level of co-operation signifies the performance of the network in terms of increased throughput,packet delivery rate and decreased delay depending on the data being aggregated and level of control overhead.The performance of a sensor network is highly inclined by the selfish behaving nature of sensor nodes that gets revealed when the residual energy ranges below a bearable level of activeness in packet forwarding.The selfish sensor node needs to be identified in future through reliable forecasting mechanism for improving the lifetime and packet delivery rate.Semi Markov Process Inspired Selfish aware Co-operative Scheme(SMPISCS)is propounded for making an attempt to mitigate selfish nodes for prolonging the lifetime of the network and balancing energy consumptions of the network.SMPISCS model provides a kind of sensor node’s behavior for quantifying and future forecasting the probability with which the node could turn into selfish.Simulation experiments are carried out through Network Simulator 2 and the performance are analyzed based on varying the number of selfish sensor nodes,number of sensor nodes and range of detection threshold. 展开更多
关键词 Information security Routing overhead selfish sensor nodes Semi Markov process Wireless sensor networks
原文传递
Semi Markov process inspired selfish aware co-operative scheme for wireless sensor networks(SMPISCS)
12
作者 Kanchana Devi V Ganesan R 《Cybersecurity》 2018年第1期351-365,共15页
In Wireless Sensor Network(WSN),energy and packet forwarding tendencies of sensor nodes plays a potential role in ensuring a maximum degree of co-operation under data delivery.This quantified level of co-operation sig... In Wireless Sensor Network(WSN),energy and packet forwarding tendencies of sensor nodes plays a potential role in ensuring a maximum degree of co-operation under data delivery.This quantified level of co-operation signifies the performance of the network in terms of increased throughput,packet delivery rate and decreased delay depending on the data being aggregated and level of control overhead.The performance of a sensor network is highly inclined by the selfish behaving nature of sensor nodes that gets revealed when the residual energy ranges below a bearable level of activeness in packet forwarding.The selfish sensor node needs to be identified in future through reliable forecasting mechanism for improving the lifetime and packet delivery rate.Semi Markov Process Inspired Selfish aware Co-operative Scheme(SMPISCS)is propounded for making an attempt to mitigate selfish nodes for prolonging the lifetime of the network and balancing energy consumptions of the network.SMPISCS model provides a kind of sensor node’s behavior for quantifying and future forecasting the probability with which the node could turn into selfish.Simulation experiments are carried out through Network Simulator 2 and the performance are analyzed based on varying the number of selfish sensor nodes,number of sensor nodes and range of detection threshold. 展开更多
关键词 Information security Routing overhead selfish sensor nodes Semi Markov process Wireless sensor networks
原文传递
Machine Learning-Based Detection and Selective Mitigation of Denial-of-Service Attacks in Wireless Sensor Networks
13
作者 Soyoung Joo So-Hyun Park +2 位作者 Hye-Yeon Shim Ye-Sol Oh Il-Gu Lee 《Computers, Materials & Continua》 2025年第2期2475-2494,共20页
As the density of wireless networks increases globally, the vulnerability of overlapped dense wireless communications to interference by hidden nodes and denial-of-service (DoS) attacks is becoming more apparent. Ther... As the density of wireless networks increases globally, the vulnerability of overlapped dense wireless communications to interference by hidden nodes and denial-of-service (DoS) attacks is becoming more apparent. There exists a gap in research on the detection and response to attacks on Medium Access Control (MAC) mechanisms themselves, which would lead to service outages between nodes. Classifying exploitation and deceptive jamming attacks on control mechanisms is particularly challengingdue to their resemblance to normal heavy communication patterns. Accordingly, this paper proposes a machine learning-based selective attack mitigation model that detects DoS attacks on wireless networks by monitoring packet log data. Based on the type of detected attack, it implements effective corresponding mitigation techniques to restore performance to nodes whose availability has been compromised. Experimental results reveal that the accuracy of the proposed model is 14% higher than that of a baseline anomaly detection model. Further, the appropriate mitigation techniques selected by the proposed system based on the attack type improve the average throughput by more than 440% compared to the case without a response. 展开更多
关键词 Distributed coordinated function mechanism jamming attack machine learning-based attack detection selective attack mitigation model selective attack mitigation model selfish attack
在线阅读 下载PDF
Enhancing User Experience in AI-Powered Human-Computer Communication with Vocal Emotions Identification Using a Novel Deep Learning Method
14
作者 Ahmed Alhussen Arshiya Sajid Ansari Mohammad Sajid Mohammadi 《Computers, Materials & Continua》 2025年第2期2909-2929,共21页
Voice, motion, and mimicry are naturalistic control modalities that have replaced text or display-driven control in human-computer communication (HCC). Specifically, the vocals contain a lot of knowledge, revealing de... Voice, motion, and mimicry are naturalistic control modalities that have replaced text or display-driven control in human-computer communication (HCC). Specifically, the vocals contain a lot of knowledge, revealing details about the speaker’s goals and desires, as well as their internal condition. Certain vocal characteristics reveal the speaker’s mood, intention, and motivation, while word study assists the speaker’s demand to be understood. Voice emotion recognition has become an essential component of modern HCC networks. Integrating findings from the various disciplines involved in identifying vocal emotions is also challenging. Many sound analysis techniques were developed in the past. Learning about the development of artificial intelligence (AI), and especially Deep Learning (DL) technology, research incorporating real data is becoming increasingly common these days. Thus, this research presents a novel selfish herd optimization-tuned long/short-term memory (SHO-LSTM) strategy to identify vocal emotions in human communication. The RAVDESS public dataset is used to train the suggested SHO-LSTM technique. Mel-frequency cepstral coefficient (MFCC) and wiener filter (WF) techniques are used, respectively, to remove noise and extract features from the data. LSTM and SHO are applied to the extracted data to optimize the LSTM network’s parameters for effective emotion recognition. Python Software was used to execute our proposed framework. In the finding assessment phase, Numerous metrics are used to evaluate the proposed model’s detection capability, Such as F1-score (95%), precision (95%), recall (96%), and accuracy (97%). The suggested approach is tested on a Python platform, and the SHO-LSTM’s outcomes are contrasted with those of other previously conducted research. Based on comparative assessments, our suggested approach outperforms the current approaches in vocal emotion recognition. 展开更多
关键词 Human-computer communication(HCC) vocal emotions live vocal artificial intelligence(AI) deep learning(DL) selfish herd optimization-tuned long/short K term memory(SHO-LSTM)
在线阅读 下载PDF
信息不对称下的智能网联汽车公平服务缓存与任务卸载算法
15
作者 叶鹏飞 陈龙 +1 位作者 吴嘉鑫 武继刚 《广东工业大学学报》 2025年第1期114-125,共12页
在延迟敏感任务存在的车联网中,车到车雾计算可有效缓解路边单元的计算任务过载。现有研究往往假设路边单元可获取网络中所有车辆全局算力信息,且假设提供服务车辆能够自主为服务请求车辆提供计算,然而其忽视了算法大规模实际部署时获... 在延迟敏感任务存在的车联网中,车到车雾计算可有效缓解路边单元的计算任务过载。现有研究往往假设路边单元可获取网络中所有车辆全局算力信息,且假设提供服务车辆能够自主为服务请求车辆提供计算,然而其忽视了算法大规模实际部署时获取全局算力信息需要高昂的控制开销以及车辆的自私性。为此,针对车联网负载卸载中的自私性、信息不对称性和服务公平性问题,建立面向车辆雾计算的服务缓存与任务卸载整数数学线性规划模型,谋求系统最小服务完成率最大。通过设计基于合同理论的高效轻量级激励机制以激励车辆提供雾计算资源,且路边单元无需获取全局车辆算力信息,从而更贴近实际运行环境。仿真实验结果表明,提出的基于合同的舍入算法(Contract-based Rounding Algorithm,CRA)与基准算法相比,最小服务完成率平均提升73.16%和48.72%,吞吐量降低平均不超过3.39%和14.96%。 展开更多
关键词 自私性 合同论 车辆雾计算 公平性 服务推理
在线阅读 下载PDF
社交物联网中节点转发路由算法综述
16
作者 陈晓文 侯德邻 +3 位作者 熊曾刚 王时绘 张学敏 李源 《湖北科技学院学报》 2025年第6期93-107,共15页
随着无线技术的快速发展,节点间的通信能力极大增强。传统的“存储—携带—转发”机制已广泛应用于分布式社交物联网中,节点通过该机制将消息传递给目标节点。由于现有的路由算法在复杂网络环境中的表现仍存在不足,因此如何优化并设计... 随着无线技术的快速发展,节点间的通信能力极大增强。传统的“存储—携带—转发”机制已广泛应用于分布式社交物联网中,节点通过该机制将消息传递给目标节点。由于现有的路由算法在复杂网络环境中的表现仍存在不足,因此如何优化并设计出更高效、可靠的路由算法,成为当前的研究热点。首先,本文介绍了社交物联网的基本架构及其路由算法的技术路线。其次,将社交物联网中的路由算法分为四类:经典路由算法、自私节点激励算法、改进转发效率的算法以及受其他学科启发的算法,并分别梳理每类路由算法的优缺点。最后,结合现有路由算法的局限性与面临的挑战,探讨未来可能的研究方向与发展趋势。 展开更多
关键词 社交物联网 自私激励 机会网络 路由 启发式算法
在线阅读 下载PDF
商业与德性:亚当·斯密对商业社会的伦理辩护
17
作者 李育书 《当代中国价值观研究》 2025年第1期5-14,共10页
长期以来,商业社会受到了各种道德批评。斯密通过同情心确立社会的消极正义、发展个体的德性,通过考察社会历史表明商业社会的发展推动了社会风气的进步和现代政治制度的形成,并批判古典德性的过时,最终回应了商业社会遭受的道德批判,... 长期以来,商业社会受到了各种道德批评。斯密通过同情心确立社会的消极正义、发展个体的德性,通过考察社会历史表明商业社会的发展推动了社会风气的进步和现代政治制度的形成,并批判古典德性的过时,最终回应了商业社会遭受的道德批判,论证了商业社会的道德意义。无论是斯密所揭示的个体之社会性维度,还是他所采用的历史性方法,都使得他对商业社会的辩护具有更深远的意义。当下,我们可以立足商业社会建构正义与规范,在发展市场经济、推动社会转型过程中提升社会整体道德水平。 展开更多
关键词 商业社会 自私 同情 正义 德性
在线阅读 下载PDF
社交物联网中自私节点的激励机制研究
18
作者 赵罡 徐方 《福建电脑》 2025年第10期26-34,共9页
针对社交物联网中自私节点导致网络性能下降的问题,本文提出一种基于虚拟货币的激励机制。该机制通过等效交换原则,结合动态定价策略与二次议价规则,综合考虑节点资源状态(剩余缓存、能量、财富)和消息属性(生存时间、大小),构建了源节... 针对社交物联网中自私节点导致网络性能下降的问题,本文提出一种基于虚拟货币的激励机制。该机制通过等效交换原则,结合动态定价策略与二次议价规则,综合考虑节点资源状态(剩余缓存、能量、财富)和消息属性(生存时间、大小),构建了源节点出价与转发节点要价的动态博弈模型。仿真结果表明,相较于传统算法,该机制在消息交付率(92.3%)、平均延迟(118ms)和网络开销率(0.13)方面均有显著提升,有效平衡了节点利益与网络整体性能。该研究为动态资源环境下的自私节点管理提供了高效实用的解决方案。 展开更多
关键词 社交物联网 激励机制 自私节点 等价交换 虚拟货币
在线阅读 下载PDF
基于3DOF-PID的含可再生能源电力系统AGC模型
19
作者 郭良梅 解勇 +2 位作者 王京 孙昱淞 周奕辰 《微型电脑应用》 2025年第10期192-195,200,共5页
针对存在多种非线性条件的复杂电力系统,为了将系统频率和联络线功率保持在一定范围内,需要为自动发电控制(AGC)系统设计专门的控制器,以满足高质量功率和频率的要求。对此,提出了具有不同自由度(DOF)的比例-积分-微分(PID)控制器,将其... 针对存在多种非线性条件的复杂电力系统,为了将系统频率和联络线功率保持在一定范围内,需要为自动发电控制(AGC)系统设计专门的控制器,以满足高质量功率和频率的要求。对此,提出了具有不同自由度(DOF)的比例-积分-微分(PID)控制器,将其与微分滤波器结合,作为AGC二次控制器,并采用自私羊群优化(SHO)算法进行控制参数优化。对含可再生能源的两区域电力系统进行了算例仿真,将3自由度-比例-积分-微分(3DOF-PID)控制器的动态性能与PID和2自由度-比例-积分-微分(2DOF-PID)控制器进行比较,验证了所提控制器应对可变负载和可变太阳辐射的鲁棒性和有效性。 展开更多
关键词 自动发电控制 自由度 比例-积分-微分 自私羊群优化 动态性能
在线阅读 下载PDF
论毛泽东人性观的嬗变及其影响
20
作者 陈思 周如冰 《西部学刊》 2025年第3期22-25,共4页
毛泽东人性观是复杂的,家庭影响和儒家启蒙教育使他的人性观一开始不可避免的是性善论,学习西方资本主义文化学说后又形成了人性自私的观点,接触马克思主义后即坚定地认为阶级属性是人的根本属性和唯一属性,坚决否认普遍的、抽象的人性... 毛泽东人性观是复杂的,家庭影响和儒家启蒙教育使他的人性观一开始不可避免的是性善论,学习西方资本主义文化学说后又形成了人性自私的观点,接触马克思主义后即坚定地认为阶级属性是人的根本属性和唯一属性,坚决否认普遍的、抽象的人性存在。毛泽东对人性的认识是一个逐步深化的过程,这个过程与毛泽东思想的形成和发展密切相关,对毛泽东思想的形成和发展有着重大影响。 展开更多
关键词 人性观 性善论 人性自私 阶级性
在线阅读 下载PDF
上一页 1 2 21 下一页 到第
使用帮助 返回顶部