Advanced Search
Displaying 12521-12530 on page 1253 of 13096. Per Page  

Articles / Online

  • Improved Enhanced Dbtma with Contention-Aware Admission Control to Improve the Network Performance in Manets
  • Abstract DBTMA relies entirely on RTS/CTS dialogue for un-collided transmission of data. The purpose is to improve the QoS at MAC layer by developing it over 802.11e standard. However, DBTMA does not guarantee real-time constraints without efficient method for controlling the network loads. The main challenges in MANETs include prediction of the available bandwidth, establishing communication with neighboring nodes and predicting the consumption of bandwidth flow. These challenges are provided with solutions using Contention-Aware Admission Control (CACP) protocol. In this paper, the EDBTMA protocol is combined with CACP protocol that introduces bandwidth calculation using admission control strategy. The calculation includes certain…
  • More
  •   Views:1313       Downloads:881        Download PDF
  • A Capacity Improving Scheme in Multi-RSUs Deployed V2I
  • Abstract The communication reliability and system capacity are two of the key performance indicators for Internet of Vehicles (IoV). Existing studies have proposed a variety of technologies to improve reliability and other performance, such as channel selection and power allocation in Vehicle-to-Infrastructure (V2I). However, these researches are mostly applied in a single roadside unit (RSU) scenario without considering inter-cell interference (ICI) of multi-RSUs. In this paper, considering the distribution characteristics of multi-RSUs deployment and corresponding ICI, we propose a reliable uplink transmission scheme to maximize the total capacity and decrease the interference of multi-RSUs (mRSU-DI) in condition of the uplink interruption…
  • More
  •   Views:876       Downloads:756        Download PDF
  • A Multi-Objective Decision-Making Approach for the Optimal Location of Electric Vehicle Charging Facilities
  • Abstract Electric vehicles (EVs) are recognized as one of the most promising technologies worldwide to address the fossil fuel energy resource crisis and environmental pollution. As the initial work of EV charging station (EVCS) construction, site selection plays a vital role in its whole life cycle. In this paper, a multi-objective optimization model for the location layout of EVCSs is established when considering various factors such as user demand, investment cost, soil locations, the emergency charging mileage limit, the actual road condition and service network reliability. The model takes the minimum investment cost and the minimum user charging cost as the…
  • More
  •   Views:2005       Downloads:1146        Download PDF
  • Multi-Rate Polling: Improve the Performance of Energy Harvesting Backscatter Wireless Networks
  • Abstract In recent years, Researchers have proposed the concept of Energy Harvesting Backscatter Wireless Networks (EHBWN). EHBWN usually consists of one sink and several backscatter nodes. Backscatter nodes harvest energy from their environment and communicate with sink through backscattering the carrier wave transmitted by sink. Although a certain amount of access protocols for Energy Harvesting Wireless Networks have been present, they usually do not take the sink’s receiver sensitivity into account, which makes those protocols unsuitable in practice. In this paper, we first give an analysis of the backscatter channel link budget and the relationship between the effective communication range and…
  • More
  •   Views:1102       Downloads:810        Download PDF
  • A Novel Scene Text Recognition Method Based on Deep Learning
  • Abstract Scene text recognition is one of the most important techniques in pattern recognition and machine intelligence due to its numerous practical applications. Scene text recognition is also a sequence model task. Recurrent neural network (RNN) is commonly regarded as the default starting point for sequential models. Due to the non-parallel prediction and the gradient disappearance problem, the performance of the RNN is difficult to improve substantially. In this paper, a new TRDD network architecture which base on dilated convolution and residual block is proposed, using Convolutional Neural Networks (CNN) instead of RNN realizes the recognition task of sequence texts. Our…
  • More
  •   Views:1152       Downloads:960        Download PDF
  • Fuzzy C-Means Algorithm Automatically Determining Optimal Number of Clusters
  • Abstract In clustering analysis, the key to deciding clustering quality is to determine the optimal number of clusters. At present, most clustering algorithms need to give the number of clusters in advance for clustering analysis of the samples. How to gain the correct optimal number of clusters has been an important topic of clustering validation study. By studying and analyzing the FCM algorithm in this study, an accurate and efficient algorithm used to confirm the optimal number of clusters is proposed for the defects of traditional FCM algorithm. For time and clustering accuracy problems of FCM algorithm and relevant algorithms automatically…
  • More
  •   Views:1102       Downloads:2380        Download PDF
  • Ab Initio Molecular-Dynamics Simulation Liquid and Amorphous Al94-xNi6Lax (x=3-9) Alloys
  • Abstract Ab initio molecular-dynamics simulations have been used to investigate the liquid and amorphous Al94-xNi6Lax (x=3-9) alloys. Through calculating the pair distribution functions and partial coordination numbers, the structure and properties of these alloys are researched, which will help the design bulk metallic glass. The concentration of La atoms can affect the short-range order of Al94-xNi6Lax alloys, which is also studied in this calculation result.
  • More
  •   Views:1130       Downloads:733        Download PDF
  • Tibetan Sentiment Classification Method Based on Semi-Supervised Recursive Autoencoders
  • Abstract We apply the semi-supervised recursive autoencoders (RAE) model for the sentiment classification task of Tibetan short text, and we obtain a better classification effect. The input of the semi-supervised RAE model is the word vector. We crawled a large amount of Tibetan text from the Internet, got Tibetan word vectors by using Word2vec, and verified its validity through simple experiments. The values of parameter α and word vector dimension are important to the model effect. The experiment results indicate that when α is 0.3 and the word vector dimension is 60, the model works best. Our experiment also shows the…
  • More
  •   Views:1067       Downloads:792        Download PDF
  • MSICST: Multiple-Scenario Industrial Control System Testbed for Security Research
  • Abstract A security testbed is an important aspect of Industrial Control System (ICS) security research. However, existing testbeds still have many problems in that they cannot fully simulate enterprise networks and ICS attacks. This paper presents a Multiple-Scenario Industrial Control System Testbed (MSICST), a hardware-in-the-loop ICS testbed for security research. The testbed contains four typical process scenarios: thermal power plant, rail transit, smart grid, and intelligent manufacturing. We use a combination of actual physical equipment and software simulations to build the process scenario sand table and use real hardware and software to build the control systems, demilitarized zone, and enterprise zone…
  • More
  •   Views:1194       Downloads:1428        Download PDF
  • Enabling Comparable Search Over Encrypted Data for IoT with Privacy-Preserving
  • Abstract With the rapid development of cloud computing and Internet of Things (IoT) technology, massive data raises and shuttles on the network every day. To ensure the confidentiality and utilization of these data, industries and companies users encrypt their data and store them in an outsourced party. However, simple adoption of encryption scheme makes the original lose its flexibility and utilization. To address these problems, the searchable encryption scheme is proposed. Different from traditional encrypted data search scheme, this paper focuses on providing a solution to search the data from one or more IoT device by comparing their underlying numerical values.…
  • More
  •   Views:1142       Downloads:849        Download PDF
Displaying 12521-12530 on page 1253 of 13096. Per Page