Due to limitations of power, computation capability and storage resources, wireless sensor networks are vulnerable to many attacks. The paper proposed a novel routing protocol algorithm for Wireless sensor network. Th...
详细信息
Due to limitations of power, computation capability and storage resources, wireless sensor networks are vulnerable to many attacks. The paper proposed a novel routing protocol algorithm for Wireless sensor network. The proposed routing protocol algorithm can adopt suitable routing technology for the nodes according to distance of nodes to the base station, density of nodes distribution and residual energy of nodes. Comparing the proposed routing protocol algorithm with other routing protocol algorithm through comprehensive analysis, the results show that the proposed routing protocol algorithm is secure and efficient for wireless sensor networks.
This paper presents the stability analysis of fuzzy model based nonlinear control systems, and the design of nonlinear gains and feedback gains of the nonlinear controller using genetic algorithm with arithmetic cross...
详细信息
This paper presents the stability analysis of fuzzy model based nonlinear control systems, and the design of nonlinear gains and feedback gains of the nonlinear controller using genetic algorithm with arithmetic crossover and nonuniform mutation. A stability condition is derived based on the Lyapunov stability theory with a smaller number of Lyapunov conditions. The solution of the stability conditions are also determined using GA. An application example of stabilizing a cart-pole type inverted pendulum system is given to show the stabilizability of the nonlinear controller.
To deal with the threat of power analysis to encryption device, a new power analysis resistant DES algorithm architecture is proposed, which is combined with "asymmetric" mask technique. And its digital hard...
详细信息
To deal with the threat of power analysis to encryption device, a new power analysis resistant DES algorithm architecture is proposed, which is combined with "asymmetric" mask technique. And its digital hardware circuit is designed. Then its power analysis attack resistant ability is tested. Compared with non-protected DES, using nearly 5 times larger samples and attack time, the key of the proposed DES still cannot be gained through correlation power analysis. Experiment results show that the designed DES algorithm has a certain anti power analysis effect.
Based on the emergent colonization and food-chain phenomena, behavioral ecology, a new kind of improved artificial-life algorithm is proposed. It is referred as food-chain algorithm that achieves optimization computat...
详细信息
ISBN:
(纸本)1424406048
Based on the emergent colonization and food-chain phenomena, behavioral ecology, a new kind of improved artificial-life algorithm is proposed. It is referred as food-chain algorithm that achieves optimization computation by mimicking the evolution of natural ecosystem and the information processing mechanism of natural organisms. Artificial food-chain system is firstly built in artificial world, and food-chain algorithm is designed in detail. Then the key parameters of the algorithm are secondly analyzed in detail. According to the simulation results, food-chain algorithm has outstanding performance in function optimization. Furthermore, food-chain algorithm has lifelike traits, for example, autonomy, evolution, adaptive, and robustness, and it adapts to solve the optimization problems of lifelike systems, such as, supply chain planning, distribution network designing, and etc. However, it is felt that more research must be done in order to reach a better understanding of how to design the parameters and rules of food chain algorithm
We propose a novel algorithm to reconstruct the profile of unknown dielectric objects by using the FDTD technique and design sensitivity analysis (DSA). By introducing the DSA and the adjoint variable method, we can e...
详细信息
ISBN:
(纸本)0780370708
We propose a novel algorithm to reconstruct the profile of unknown dielectric objects by using the FDTD technique and design sensitivity analysis (DSA). By introducing the DSA and the adjoint variable method, we can exactly calculate the derivative of the error function with respect to the dielectric variable, and reduce the computational costs. The proposed method is validated by applying it to the reconstruction of unknown 2D dielectric profiles which are illuminated by TM/sup z/ plane waves with a Gaussian pulse.
The paper introduces a second-generation harmonic-balance algorithm providing a very powerful simulation and design tool for microwave VCOs and oscillators of all kinds. The oscillator tuning characteristic is determi...
详细信息
The paper introduces a second-generation harmonic-balance algorithm providing a very powerful simulation and design tool for microwave VCOs and oscillators of all kinds. The oscillator tuning characteristic is determined by a fast Newton iteration yielding order-of-magnitude CPU time savings with respect to conventional optimisation-based approaches. The program accepts arbitrarily user-defined nonlinear device models, thus allowing the nonstandard behaviour of integrated varactors to be accurately accounted for. An example of application is presented, concerning the simulation of a monolithic broadband VCO tuned by two on-chip planar Schottky varactor diodes.
Permanent magnet synchronous (PMSM) drives become very popular in many industrial applications. Their construction provides better performance and reliability than DC drives. But there is also one significant disadvan...
详细信息
Permanent magnet synchronous (PMSM) drives become very popular in many industrial applications. Their construction provides better performance and reliability than DC drives. But there is also one significant disadvantage - actual rotor position knowledge is necessary to control the drive even in the case when only speed control is required. A position sensor has to be used increasing the drive cost. algorithms for rotor position and speed estimation from electrical quantities have been developed by many authors. This paper presents a new approach of speed and position estimation based on the estimator stability analysis.
In this paper, we first describe the basic principle and the method of the A* algorithm. And we analyze the reason that the A* algorithm influences speed when it is searching for the optimum route in network game map....
详细信息
In this paper, we first describe the basic principle and the method of the A* algorithm. And we analyze the reason that the A* algorithm influences speed when it is searching for the optimum route in network game map. Then we give the optimization scheme from the aspects of node data structure to the maintenance of the open queue. At the same time, the optimization scheme is evaluated and tested by a number of different game maps. Finally, through experiment, we can have the conclusion that the improvable A* algorithm is practical and feasible. And the A* algorithm can increase the speed of playing the game and can been implemented in the specific network game.
Advances in data collection and storage technologies have given rise to large dynamic data stores. In order to effectively manage and mine such stores on modern and emerging architectures, one must consider both desig...
详细信息
ISBN:
(纸本)9781424400546
Advances in data collection and storage technologies have given rise to large dynamic data stores. In order to effectively manage and mine such stores on modern and emerging architectures, one must consider both designing effective middleware support and re-architecting algorithms, to derive performance that commensurates with technological advances. In this article, we present a top-down view of how one can achieve this goal for next generation data analysis centers. Specifically, we present a case study on frequent pattern algorithms, and show how such algorithms can be re-structured to be cache, memory and I/O conscious. Furthermore, motivated by such algorithms, we present a services oriented middleware framework for the derivation of high performance on next generation architectures
This paper proposes a rate-based active queue management algorithm or RAQM. It uses the aggregated traffic input rate to calculate packet drop probability according to an exponential rule. We analyze the stability and...
详细信息
This paper proposes a rate-based active queue management algorithm or RAQM. It uses the aggregated traffic input rate to calculate packet drop probability according to an exponential rule. We analyze the stability and investigate practical implementation issues of the RAQM. Simulations are carried out to study RAQM performance and to compare with other AQM algorithms, in particular PI and REM schemes. The results demonstrate that RAQM achieves better stability and faster response as it can quickly regulate the queue length to the expected value with small overshoot. RAQM also obtains better tradeoff between link utilization and queuing delay, and obtains higher goodput with the same buffer size as in PI and REM schemes. Finally RAQM has O(1) complexity, thus is independent of the number of flows.
暂无评论