Due to limitations of power, computation capability and storage resources, wireless sensor networks are vulnerable to many attacks. The paper proposed a novel routing protocol algorithm for Wireless sensor network. Th...
详细信息
Due to limitations of power, computation capability and storage resources, wireless sensor networks are vulnerable to many attacks. The paper proposed a novel routing protocol algorithm for Wireless sensor network. The proposed routing protocol algorithm can adopt suitable routing technology for the nodes according to distance of nodes to the base station, density of nodes distribution and residual energy of nodes. Comparing the proposed routing protocol algorithm with other routing protocol algorithm through comprehensive analysis, the results show that the proposed routing protocol algorithm is secure and efficient for wireless sensor networks.
In this paper, we present a minimum spanning tree (MST) based topology control algorithm, called local minimum spanning tree (LMST), for wireless multi-hop networks. In this algorithm, each node builds its local minim...
详细信息
In this paper, we present a minimum spanning tree (MST) based topology control algorithm, called local minimum spanning tree (LMST), for wireless multi-hop networks. In this algorithm, each node builds its local minimum spanning tree independently and only keeps on-tree nodes that are one-hop away as its neighbors in the final topology. We analytically prove several important properties of LMST: (1) the topology derived under LMST preserves the network connectivity; (2) the node degree of any node in the resulting topology is bounded by 6; and (3) the topology can be transformed into one with bidirectional links (without impairing the network connectivity) after removal of all uni-directional links. These results are corroborated in the simulation study.
This paper presents the stability analysis of fuzzy model based nonlinear control systems, and the design of nonlinear gains and feedback gains of the nonlinear controller using genetic algorithm with arithmetic cross...
详细信息
This paper presents the stability analysis of fuzzy model based nonlinear control systems, and the design of nonlinear gains and feedback gains of the nonlinear controller using genetic algorithm with arithmetic crossover and nonuniform mutation. A stability condition is derived based on the Lyapunov stability theory with a smaller number of Lyapunov conditions. The solution of the stability conditions are also determined using GA. An application example of stabilizing a cart-pole type inverted pendulum system is given to show the stabilizability of the nonlinear controller.
To deal with the threat of power analysis to encryption device, a new power analysis resistant DES algorithm architecture is proposed, which is combined with "asymmetric" mask technique. And its digital hard...
详细信息
To deal with the threat of power analysis to encryption device, a new power analysis resistant DES algorithm architecture is proposed, which is combined with "asymmetric" mask technique. And its digital hardware circuit is designed. Then its power analysis attack resistant ability is tested. Compared with non-protected DES, using nearly 5 times larger samples and attack time, the key of the proposed DES still cannot be gained through correlation power analysis. Experiment results show that the designed DES algorithm has a certain anti power analysis effect.
We propose a novel algorithm to reconstruct the profile of unknown dielectric objects by using the FDTD technique and design sensitivity analysis (DSA). By introducing the DSA and the adjoint variable method, we can e...
详细信息
ISBN:
(纸本)0780370708
We propose a novel algorithm to reconstruct the profile of unknown dielectric objects by using the FDTD technique and design sensitivity analysis (DSA). By introducing the DSA and the adjoint variable method, we can exactly calculate the derivative of the error function with respect to the dielectric variable, and reduce the computational costs. The proposed method is validated by applying it to the reconstruction of unknown 2D dielectric profiles which are illuminated by TM/sup z/ plane waves with a Gaussian pulse.
The paper introduces a second-generation harmonic-balance algorithm providing a very powerful simulation and design tool for microwave VCOs and oscillators of all kinds. The oscillator tuning characteristic is determi...
详细信息
The paper introduces a second-generation harmonic-balance algorithm providing a very powerful simulation and design tool for microwave VCOs and oscillators of all kinds. The oscillator tuning characteristic is determined by a fast Newton iteration yielding order-of-magnitude CPU time savings with respect to conventional optimisation-based approaches. The program accepts arbitrarily user-defined nonlinear device models, thus allowing the nonstandard behaviour of integrated varactors to be accurately accounted for. An example of application is presented, concerning the simulation of a monolithic broadband VCO tuned by two on-chip planar Schottky varactor diodes.
Based on the emergent colonization and food-chain phenomena, behavioral ecology, a new kind of improved artificial-life algorithm is proposed. It is referred as food-chain algorithm that achieves optimization computat...
详细信息
ISBN:
(纸本)1424406048
Based on the emergent colonization and food-chain phenomena, behavioral ecology, a new kind of improved artificial-life algorithm is proposed. It is referred as food-chain algorithm that achieves optimization computation by mimicking the evolution of natural ecosystem and the information processing mechanism of natural organisms. Artificial food-chain system is firstly built in artificial world, and food-chain algorithm is designed in detail. Then the key parameters of the algorithm are secondly analyzed in detail. According to the simulation results, food-chain algorithm has outstanding performance in function optimization. Furthermore, food-chain algorithm has lifelike traits, for example, autonomy, evolution, adaptive, and robustness, and it adapts to solve the optimization problems of lifelike systems, such as, supply chain planning, distribution network designing, and etc. However, it is felt that more research must be done in order to reach a better understanding of how to design the parameters and rules of food chain algorithm
Permanent magnet synchronous (PMSM) drives become very popular in many industrial applications. Their construction provides better performance and reliability than DC drives. But there is also one significant disadvan...
详细信息
Permanent magnet synchronous (PMSM) drives become very popular in many industrial applications. Their construction provides better performance and reliability than DC drives. But there is also one significant disadvantage - actual rotor position knowledge is necessary to control the drive even in the case when only speed control is required. A position sensor has to be used increasing the drive cost. algorithms for rotor position and speed estimation from electrical quantities have been developed by many authors. This paper presents a new approach of speed and position estimation based on the estimator stability analysis.
In this paper, we first describe the basic principle and the method of the A* algorithm. And we analyze the reason that the A* algorithm influences speed when it is searching for the optimum route in network game map....
详细信息
In this paper, we first describe the basic principle and the method of the A* algorithm. And we analyze the reason that the A* algorithm influences speed when it is searching for the optimum route in network game map. Then we give the optimization scheme from the aspects of node data structure to the maintenance of the open queue. At the same time, the optimization scheme is evaluated and tested by a number of different game maps. Finally, through experiment, we can have the conclusion that the improvable A* algorithm is practical and feasible. And the A* algorithm can increase the speed of playing the game and can been implemented in the specific network game.
Advances in data collection and storage technologies have given rise to large dynamic data stores. In order to effectively manage and mine such stores on modern and emerging architectures, one must consider both desig...
详细信息
ISBN:
(纸本)9781424400546
Advances in data collection and storage technologies have given rise to large dynamic data stores. In order to effectively manage and mine such stores on modern and emerging architectures, one must consider both designing effective middleware support and re-architecting algorithms, to derive performance that commensurates with technological advances. In this article, we present a top-down view of how one can achieve this goal for next generation data analysis centers. Specifically, we present a case study on frequent pattern algorithms, and show how such algorithms can be re-structured to be cache, memory and I/O conscious. Furthermore, motivated by such algorithms, we present a services oriented middleware framework for the derivation of high performance on next generation architectures
暂无评论