The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
NCS (Network Coordinate System) provides us an effective way through which we can predict a network node's distance. NCS has been applied to a huge number of Internet applications. In this paper, we build a differential dynamic model to analyze the global dynamical behavior of a famous NCS algorithm Vivaldi and study the convergence problem existing in it. As a result, our model suggest that TIVs...
For emergent production interruptions in supply chain affected by disasters, an emergency decision model with multi-objective and multi-constraints for distribution plan is proposed. In this model, two objectives, profit level and shortage cost, are considered by characterizing the performance and demand of satisfaction of decision-makers. According to preferences of decision makers, three rules of...
The use of wireless sensor networks (WSNs) for closing the loops between the cyberspace and the physical processes is more attractive and promising for future control systems. For some real-time control applications, controllers need to accurately estimate the process state within rigid delay constraints. In this paper, we propose a novel in-network estimation approach for state estimation with delay...
The queueing model of Poisson arrival process, general distribution service process and infinite servers can be applied in the stochastic service system how many servers do we need to ensure the customers scarcely have to wait in queue. According to the additivity of Poisson distribution, the queueing theory principle and nature of probability theory, established the parameters such as the number...
Without considering the echo signal power changes caused by target distance changes during the accumulated time the traditional radar equation is hardly applied. We take account of the effects of velocity, signal-to-noise ratio during the processing time; a modified radar equation is built which can be used for long-time integration of weak targets with high speed. After analyzing the relation between...
Agent persuasion can improve negotiation efficiency in dynamic environment based on developing the knowledge, experience, skill of agent fully, which is being affected much more by trust. The trust model based on agent persuasion is illustrated, and the concept of trust degree is also provided. Then Its Evaluation Mechanism is set up. Finally the model and evaluation mechanism is elaborated by a calculation...
It is a challenging work to design a robust audio watermarking scheme against various attacks. Based on wavelet moment and synchronization code, we propose a new digital audio watermarking algorithm with good auditory quality and reasonable resistance toward desynchronization attacks in this paper. Firstly, the origin digital audio is segmented and then each segment is cut into two parts. Secondly,...
In this paper we investigate the evolutions of Bloch vector in a dense two-level system with near-dipole-dipole (NDD) interactions driven by ultrafast incident pulses, whose duration is far less than the relaxation times. The results show that the evolutionary relationships between dispersion (absorption) and inversion, as function of NDD parameter, are reciprocal. And the pulse width and pulse area...
Protecting the privacy of message receivers is an important issue in pay services of e-commerce and the distribution of digital contents on the Internet. This paper proposes an efficient privacy of message encryption algorithm called PMEA for pay services of e-commerce. In PMEA, each of the receivers only needs to perform constant times of pairing computation to decrypt the received message. PMEA...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.