In the present work we deal with the concept of alpha-fair resource allocation in the situation where the decision maker (in our case, the base station) does not have complete information about the environment. Namely...
详细信息
ISBN:
(纸本)9783642104053
In the present work we deal with the concept of alpha-fair resource allocation in the situation where the decision maker (in our case, the base station) does not have complete information about the environment. Namely, we develop a concept of a-fairness under uncertainty to allocate power resource in the presence of a jammer under two types of uncertainty: (a) the decision maker does not have complete knowledge about the parameters of the environment, but knows only their distribution, (b) the jammer can come into the environment with some probability bringing extra background noise. The goal of the decision maker is to maximize the a-fairness utility function with respect to the SNIR (signal to noise-plus-interference ratio). Here we consider a concept of the expected a-fairness utility function (short-term fairness) as well as fairness of expectation (long-term fairness). In the scenario with the unknown parameters of the environment the most adequate approach is a zero-sum game since it can also be viewed as a minimax problem for the decision maker playing against the nature where the decision maker has to apply the best allocation under the worst circumstances. In the scenario with the uncertainty about jamming being in the system the Nash equilibrium concept is employed since the agents have non-zero sum payoffs: the decision maker would like to maximize either the expected fairness or the fairness of expectation while the jammer would like to minimize the fairness if he comes in on the scene. For all the plots the equilibrium strategies in closed form are found. We have shown that for all the scenarios the equilibrium has to be constructed into two steps. In the first step the equilibrium jamming strategy has to be constructed based on a solution of the corresponding modification of the water-filling equation. In the second step the decision maker equilibrium strategy has to be constructed equalizing the induced by jammer background noise.
This paper presents a new particle swarm optimization (PSO) algorithm for tuning parameters (weights) of neural networks. The new PSO algorithm is called fuzzy logic-based particle swarm optimization with cross-mutate...
详细信息
ISBN:
(纸本)9781424450879
This paper presents a new particle swarm optimization (PSO) algorithm for tuning parameters (weights) of neural networks. The new PSO algorithm is called fuzzy logic-based particle swarm optimization with cross-mutated operation (FPSOCM), where the fuzzy inference system is applied to determine the inertia weight of PSO and the control parameter of the proposed cross-mutated operation by using human knowledge. By introducing the fuzzy system, the value of the inertia weight becomes variable. The cross-mutated operation is effectively force the solution to escape the local optimum. Tuning parameters (weights) of neural networks is presented using the FPSOCM. Numerical example of neural network is given to illustrate that the performance of the FPSOCM is good for tuning the parameters (weights) of neural networks.
Usage control generalizes access control to what happens to data in the future. We contribute to the enforcement of usage control requirements at the level of system calls by also taking into account data flow: Restri...
详细信息
ISBN:
(纸本)9781424450879
Usage control generalizes access control to what happens to data in the future. We contribute to the enforcement of usage control requirements at the level of system calls by also taking into account data flow: Restrictions on the dissemination of data, for instance, as stipulated by data protection regulations, of course relate not to just one file containing the data, but likely to all copies of that file as well. In order to enforce the dissemination restrictions on all copies of the sensitive data item, we introduce a data flow model that tracks how the content of a file flows through the system (files, network sockets, main memory). By using this model, the existence of potential copies of the data is reflected in the state of the data flow model. This allows us to enforce the dissemination restrictions by relating to the state rather than all sequences of events that possibly yield copies. Generalizing this idea, we describe how usage control policies can be expressed in a related state-based manner Finally, we present an implementation of the data flow model and state-based policy enforcement as well as first encouraging performance measurements.
The proceedings contain 208 papers. The topics discussed include: intrusion detection system based on payoff matrix for wireless sensor networks;a reputation mechanism to stimulate node cooperation in ad hoc networks;...
ISBN:
(纸本)9780769538990
The proceedings contain 208 papers. The topics discussed include: intrusion detection system based on payoff matrix for wireless sensor networks;a reputation mechanism to stimulate node cooperation in ad hoc networks;an improved RBF neural network based on evolutionary programming;an improved quantum genetic algorithm;the application of cultural algorithm in load balancing of hybrid P2P network;a reflective requirements specification for requirements evolving;RFID middleware design and implement in enterprise information public service platform;MPEG-4 image encryption research based on VEA algorithm;improved genetic algorithm for aircraft departure sequencing problem;groundwater level dynamic prediction based on chaos optimization and support vector machine;multi-objective particle swarm optimization method based on fitness function and sequence approximate model;satisfactory design of IIR digital filter based on chaotic mutation particle swarm optimization;and an optimal controller based-on GA for direct torque control.
Sensor networks have been a very active area of research in recent years. However, most of the sensors used in the development of these networks have been local and non-imaging sensors such as acoustics, seismic, vibr...
详细信息
ISBN:
(纸本)9781424446193
Sensor networks have been a very active area of research in recent years. However, most of the sensors used in the development of these networks have been local and non-imaging sensors such as acoustics, seismic, vibration, temperature, humidity, etc. The development of emerging video sensor networks poses its own set of unique challenges, including high bandwidth and low latency requirements for real-time processing and control. This paper presents a systematic approach for the design, implementation, and evaluation of a large-scale, software-reconfigurable, wireless camera network, suitable for a variety of practical real-time applications. We take into consideration issues related to the hardware, software, control, architecture, network connectivity, performance evaluation, and data processing strategies for the network. We perform multi-objective optimization on settings such as video resolution and compression quality to provide insight into the performance trade-offs when configuring such a network.
This paper is concerned with network-based multi-user haptic interaction using a distributed peer-peer control architecture. It proposes new quantitative measures for quantifying the fidelity of haptic simulations in ...
详细信息
ISBN:
(纸本)9781424438587
This paper is concerned with network-based multi-user haptic interaction using a distributed peer-peer control architecture. It proposes new quantitative measures for quantifying the fidelity of haptic simulations in such environments. User's perceived admittance and discrepancy among local copies of virtual objects are considered in defining these measures. A state prediction scheme is proposed to compensate for the negative effects of the network communication delay on the transparency and stability of the haptic simulation. An optimization problem is formulated for selecting the control gains that can enhance the performance while maintaining system stability. Numerical analysis and haptic interaction experiments are carried out to demonstrate the effectiveness of the proposed approach.
In this paper we cover the problem of load balancing in terms of optimum cell selection and wireless channel condition in the hybrid optical wireless network. For a given set of multimedia users with minimum quality o...
详细信息
As the widespread modus operandi in real applications, Backpropagation(BP) in Recurrent Neural networks (RNN) is computationally more powerful than standard feedforward neural networks. In principle, RNN can implement...
详细信息
ISBN:
(纸本)9781424441549
As the widespread modus operandi in real applications, Backpropagation(BP) in Recurrent Neural networks (RNN) is computationally more powerful than standard feedforward neural networks. In principle, RNN can implement almost any arbitrary sequential behavior. However, there are many drawbacks in BP network, for instance, confinement in finding local minimum and may get stuck at regions of a search space or trap in local minima. To solve these problems, various optimization techniques such as Particle Swarm optimization (PSO) and Genetic Algorithm (GA) have been executed to improve ANN performance. In this study, we exploit errors optimization of Elman Recurrent network with Particle Swarm optimization (ERNPSO) to probe the performance of both networks with bounded Vmax function. Main characteristics of Vmax function are to control the global exploration of particles in PSO. The results show that ERNPSO with bounded Vmax of hyperbolic tangent furnishes promising outcomes in terms of classification accuracy and convergence rate compared to bounded Vmax sigmoid function and standard Vmax function.
TCP39;s congestion control provides remarkable stability to the media streaming. In the course of implementation of the TCP protocol,in order to achieve optimal throughput TCP led to the delay and reduce the quality...
详细信息
ISBN:
(纸本)9781424444168
TCP's congestion control provides remarkable stability to the media streaming. In the course of implementation of the TCP protocol,in order to achieve optimal throughput TCP led to the delay and reduce the quality of the media streaming transmission..In this paper, we introduced dynamic tuning of the send-side buffer ways to minimize this latency. The experiment proved that the method introduced by this article can effectively reduce the latency caused by TCP layer, hence reduce the end-to-end latency of TCP connection.
Coal-fired boiler operation is confronted with two requirements to reduce its operation cost and to lower its emission. In this paper, a model for boiler efficiency and a model for NOx emission are set up respectively...
详细信息
暂无评论