Driverless technology has become a hot spot of current research, in order to improve the speed of unmanned vehicle path planning. Firstly, the artificial potential field (APF) model is added to the objective function ...
详细信息
Random opportunistic networks are dynamic, resulting in nodes not being able to sense the state of the network, and the network topology of nodes changes all the time. Therefore, this paper proposes a RIS-aided channe...
详细信息
ISBN:
(纸本)9781665454636
Random opportunistic networks are dynamic, resulting in nodes not being able to sense the state of the network, and the network topology of nodes changes all the time. Therefore, this paper proposes a RIS-aided channel construction algorithm, which can be used to maintain and change the topology of random opportunistic networks. A machine learning algorithm with spatio-temporal feature fusion is first used to predict the current position of the node, and finally the RIS-aided channel construction is implemented based on the predicted position. The simulation experiments show that the algorithm can find the optimal path between the target node and the source node in the presence of errors in the target node.
A distributed filter design method for WSN with sensor nonlinearity saturation and random switching of network topology are proposed in this paper. A mass of sensor nodes are deployed in the sensor network, the target...
详细信息
ISBN:
(纸本)9781665454636
A distributed filter design method for WSN with sensor nonlinearity saturation and random switching of network topology are proposed in this paper. A mass of sensor nodes are deployed in the sensor network, the target device is sensed and measured, and transmitted to the distributed filter through the network. In the filtering network, the local estimator receives the measurement information from the sensor node. The estimation from the neighboring nodes via a random time-varying topology to complete the state estimation and trajectory tracking for the objective system. The Bernoulli binary distribution is used to describe the random saturation nonlinearity of the sensor network, and the inhomogeneous Markov chain is adopted to represent the random switching topologies. The sufficient conditions are given as distributed filters in the form of linear matrix inequalities method. In the end, the effectiveness of this design method is illustrated by a simulation example.
Predicting the performance of parallel applications at scale is a challenging problem. We have developed a performance prediction model for structured grid-based scientific applications for High Performance computing ...
Predicting the performance of parallel applications at scale is a challenging problem. We have developed a performance prediction model for structured grid-based scientific applications for High Performance computing systems. Our model can capture the system complexity and consider computation and communication attributes of application performance on HPC architectures. We have also proposed a methodology for obtaining the realistic value of the model parameters by small-scale sample runs of an application on the target system. We have used our model to predict the performance of an actual application (2D Flood Simulation) and a synthetic application (Game of Life) on the Summit supercomputer at Oak Ridge National Laboratory and Stampede2 at Texas Advanced computing Center. The experimental results indicate that our model’s predictive performance is acceptable, and our model was able to predict the performance of these two applications on Summit and Stampede2 with more than 90% accuracy.
Under the rapid development of big data and cloud computing, emerging applications have seen significant improvements in efficiency and service quality. Nevertheless, the conflict between data sharing and privacy pres...
详细信息
ISBN:
(数字)9798331509712
ISBN:
(纸本)9798331509729
Under the rapid development of big data and cloud computing, emerging applications have seen significant improvements in efficiency and service quality. Nevertheless, the conflict between data sharing and privacy preservation remains a major obstacle to the advancement of big data technology. Addressing this issue, this study introduces a solution tailored to the big data environment, which achieves privacy protection and auditability in data sharing and processing. This approach separates data ownership, usage, and validation to mitigate privacy breaches and improper computing behaviors. Leveraging blockchain technology, a transparent governance platform is constructed to identify and track illegal data and computing activities. Furthermore, the solution integrates noninteractive zero-knowledge proofs for publicly verifying data consistency and computing validity on the blockchain. Experimental analysis on computational latency, communication costs, and encryption parameters confirms the feasibility and efficacy of this approach.
People's work, study and daily life are closely related to electricity, which puts forward higher requirements for power safety control. How to ensure power safety has also become the focus of social attention. Th...
详细信息
ISBN:
(纸本)9781665454636
People's work, study and daily life are closely related to electricity, which puts forward higher requirements for power safety control. How to ensure power safety has also become the focus of social attention. The use of Internet of things technology in power security can improve work efficiency, reduce resource waste and avoid safety accidents. Starting from the importance of power security management and control, this paper explores the application of Internet of things technology in power security management and control under the background of big data, and investigates the impact of the use of Internet of things technology on power security management and control.
An Ad-Hoc File System dynamically virtualizes storage on compute nodes into a fast storage volume to reduce congestion on parallel file systems used as backends in HPC environments and improve data locality. This pape...
详细信息
Aiming at the problems of real-time data transmission and system scheduling in complex environments such as ship general performances prediction app, operation system, software and hardware environment, operation time...
详细信息
ISBN:
(纸本)9781665454636
Aiming at the problems of real-time data transmission and system scheduling in complex environments such as ship general performances prediction app, operation system, software and hardware environment, operation time and task priority, this paper analyzes the operation status of heterogeneous app at home and abroad, and discusses in detail the key technologies of multi-threaded asynchronous execution and intelligent decision scheduling of heterogeneous app, so as to ensure the reliable, real-time and efficient operation of heterogeneous app, so as to significantly reduce the design cycle, Improving the operation efficiency of the ship general performances prediction app can effectively reduce the risk of subsequent physical tests.
Most of today’s IP traffic is cloud traffic. Due to a vast, complex and non-transparent Internet infrastructure, securely accessing and delegating data is not a trivial task. Existing technologies of Information-Cent...
详细信息
Group autonomous security intelligent system is an improvement of the traditional security system. By establishing group autonomous security intelligent system, traditional security system fault tree model, using the ...
详细信息
ISBN:
(纸本)9781665454636
Group autonomous security intelligent system is an improvement of the traditional security system. By establishing group autonomous security intelligent system, traditional security system fault tree model, using the Monte Carlo method to simulate the fault tree model, finally through the fault tree simulation calculation, matlab group autonomous security intelligent system and traditional security system reliability curve, inefficiency curve, the average fault-free working time (MTBF) and the importance of the components. The results show that the group autonomous security intelligent system lasts longer and the average fault-free working time is longer than the traditional security systems.
暂无评论