The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, based on the mean-field theory, we propose a new susceptible-infected-removed (SIR) model to study epidemic spreading on scale-free networks with traffic flow. Theoretical analysis shows that as the network traffic flow increases, the epidemic prevalence is obviously enhanced, and the epidemic threshold is reduced. We also find that the epidemic threshold is related to the ratio between...
A significant body of work in multiagent systems over more than two decades has focused on multi-agent coordination. Many challenges in multi-agent coordination can be modeled as Distributed Constraint Optimizations (DCOPs). Many complete and incomplete algorithms have been introduced for DCOPs but complete algorithms are often impractical for large-scale and dynamic environments which lead to study...
In this paper, we present an approach to coordinate two temporal plans, where one plan is for the achievement of a reactive goal, and thus has more priority, while the other is for the achievement of a proactive goal. As both plans have been computed independently from each other, conflicts can arise during their execution. We present a plan merging algorithm to coordinate the actions of both plans...
Finding the length of the longest increasing subsequence (LIS) is a classic algorithmic problem. Let n denote the size of the array. Simple O(n log n) time algorithms are known that determine the LIS exactly. In this paper, we develop a randomized approximation algorithm, that for any constant δ > 0, runs in time polylogarithmic in n and estimates the length of the LIS of an array up to an additive...
Trust quantification is an important issue of dynamic trust management. Trust is fuzzy and dynamic, if exact math tools are used to calculate trust, there is information missing in the calculation. In this paper, we use fuzzy comprehensive evaluation method to quantify trust and propose a trust quantification algorithm. Simulation results show that the trust quantification algorithm can effectively...
Recently, a block encryption scheme based on dynamic sequences generated by multiple chaotic systems has been proposed. This paper points out some defects of the scheme and its related security problems. Furthermore, the paper gives out the details of a chosen plaintext attack and verifies it through experiments. The result of experiment shows that the encryption scheme cannot resist the chosen plaintext...
The focus of this work is to adaptively optimize continuous queries in a wireless sensor network. Therefore, we analyze and categorize the different types of queries used by wireless sensor applications. We present a short survey on the existing algorithms that can be adapted and used to optimize the different types of queries. We present their strengths and their drawbacks and identify that continuous...
Focus on the image compressing problem of unmanned aerial vehicle with high compression ratio, fixed compressing ratio and low computational complexity requirement, a low-complexity image-sequence compressing algorithm based on homography transformation was proposed. The image sequences were dynamically divided into frame-groups according the data from airborne inertial navigation systems, and the...
Inspired by the change of antibody concentration, network security system can reduce the false alarm rate effectively. In this paper, we discuss the nonlinear dynamics of antibody number in the antibody concentration inspired network security method. According to the conclusion of this paper, we can get the general calculation approach to compute the accumulation of antibody number in the antibody...
Measurement methods have significant meaning for user's trust to software trustworthiness. Data mining is one of technologies through which measurement methods and tools can collect trustworthiness data to calculate software trustworthiness. In this paper, a Measurement Method based on Data Mining (MMDM) is proposed, trying to improve correctness of conclusion made by user toward provider's service...
The thesis proposes a hybrid intrusion detection model based on the parallel genetic algorithm and the rough set theory. Due to the difficult for the status of intrusion detection rules. This model, taking the advantage of rough set's streamline the edge to data and genetic algorithm's high parallelism, succeeds in introducing the genetic-rough set theory to the instrusion detection. The application...
The immunoglobulin is one kind of special material for protecting the biological body far way from the invasion of harmful foreign antigen. When the biological body is under the attack by the continuous harmful foreign antigens, the set of immune cell in biological immune system will secret much immunoglobulin to neutralize them. Inspired by the process of immunoglobulin secretion in biological body,...
Scientific task allocation and knowledge workers scheduling is an important part of rational human resources management in enterprises. In this paper, ant colony algorithm is used to research task allocation and knowledge workers scheduling. Ant colony optimization algorithm can reduce the number of optimization iteration and computing time. Elite solution retention tactics is used in iterating process...
Future wireless access will involve a variety of integrated and interworking technologies. Depending on the conditions (e.g., the specific application, the quality of service requirements, the user mobility) each session will be served through the most suited access network; following some event, there will be a variation of the access technology, which is called vertical handover. Although the use...
While Performance Enhancement Proxy (PEP) is a promising solution for TCP's performance issues over satellite links, it has a serious constraint in terms of a translation table limit of 500 entries that proved to be detrimental when a large number of TCP sessions need to be maintained between endpoints. We experienced one of these cases in Saudi Aramco where web-based drilling applications were establishing...
This paper presents a novel mechanism which increases mobile terminal battery performance. It supports a cell reselection algorithm which decides on which cell, user equipment (UE) is camped on when in idle mode (there is no active radio connection with a mobile network). Study is based on real 3G UTRA network measurements. Authors propose a technique to reduce UE current consumption in idle mode...
In this paper, we apply distributed optimization dynamics of the mutually connected neural networks to RAN selection in heterogeneous type cognitive wireless networks. We evaluate the performance of the proposed approach by implementing it on an experimental heterogeneous wireless network system called Cognitive Wireless Cloud, which supports vertical handover between different radio access networks...
In this article, we are interested in improving the handover quality of Host Identity Protocol (HIP) in the case of micro mobility by (i) proposing the Local Rendezvous Server architecture as a first attempt to minimize the handover delay in the mobility process, (ii) introducing an adaptive early update mechanism to improve the handover quality during mobility by introducing early HIP (eHIP) and...
The growing problem of spectrum scarcity and the inefficient spectrum utilization in the licensed bands, are addressed by the emerging Cognitive Radio (CR) paradigm. It is seen that the choice of the spectrum bands, called as spectrum decision, must be organized carefully by considering the challenges in the spectrum availability over time, the short term fluctuations in the availability, and the...
This paper proposes a new double iterative procedure for sum-rate maximization in a Multiuser MIMO system (MU-MIMO). The proposed algorithm is based on joint precoder and decoder optimization involving two different decoding schemes. For that we considered a precoding algorithm namely the iterative SJNR (Signal to Jamming and Noise Ratio) precoder combined with two iterative receivers. The first receiver...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.