clustering analysis is an important step in extracting and analyzing technology bibliography trend. The bibliographic records, consisting of the title, authors, keywords, and publications, are short texts carrying les...
详细信息
ISBN:
(纸本)9781728108315
clustering analysis is an important step in extracting and analyzing technology bibliography trend. The bibliographic records, consisting of the title, authors, keywords, and publications, are short texts carrying less information than long texts, while bibliographic network has the citation relations among bibliographies. The experimental dataset therein refers to bibliographies in the computer field crawled from the existing literature databases. Based on traditional Hierarchical clustering algorithm, this paper merges the cocitation relations. The experiment result shows that the mean silhouette coefficient of the Agglomerative clustering algorithm that merges the co-citation relations among the bibliographies is improved obviously, thus effectively improving clustering result among bibliographies with strong co-citation relations, and good clusters provide a solid research basis for the follow-up bibliography trend analysis.
Mobile Wireless Sensor Networks (MWSNs) are a definitive area for applications such as basic security activities, military reconnaissance and observing forest fire. In MWSNs appropriate selection of cluster head (CH) ...
详细信息
ISBN:
(纸本)9789811501111;9789811501104
Mobile Wireless Sensor Networks (MWSNs) are a definitive area for applications such as basic security activities, military reconnaissance and observing forest fire. In MWSNs appropriate selection of cluster head (CH) is to enhance the network lifetime. On taking the security of network into account is a challenging task. Trustworthy data collection is a major topic that interests much research work. Trust plays an important role in military and other applications. Many algorithms do not take security into account while selecting CH for MWSNs. Existing security-aware protocols use the cryptographic method, which are not enough to overcome serious issues. The cryptographic technique causes complexity in the network, a large amount of overhead and poor connectivity. Therefore, this paper proposes a trust-aware approach for MWSNs using type-2 fuzzy logic (T2FL). Trust value is considered as a major parameter that affects the performance of nodes. In this approach, to elect secure CH, trust value, remaining battery power, concentration, distance to base station and moving speed is used. Experimental analysis shows that this approach can successfully eliminate the malicious node in MWSN.
clustering in Vehicular Ad-Hoc Networks (VANETs) is essential to mitigate different challenges and meet the required quality of communications. However, most of the available clustering protocols were designed for hig...
详细信息
ISBN:
(纸本)9781728134734
clustering in Vehicular Ad-Hoc Networks (VANETs) is essential to mitigate different challenges and meet the required quality of communications. However, most of the available clustering protocols were designed for highways, and thus become unstable in realistic urban environments with many intersections. In this paper, a clustering Adaptation Near Intersection (CANI) approach is proposed to ensure clustering stability at intersections. This approach exploits Online Sequential Extreme Learning Machine (OS-ELM) to predict the behavior of the vehicles near an intersection and adapt the clusters accordingly. The main advantage of the developed OS-ELM prediction model is its ability to continuously learn and update in real time. After being validated, the proposed adaptation approach is included in a highway clustering scheme. The resultant clustering protocol is compared to other schemes in a realistic urban environment, and shows significant stability and efficiency performance improvement.
The problem of universal outlying sequence detection is studied, where the goal is to detect outlying sequences among M sequences of samples. A sequence is considered as outlying if the observations therein are genera...
详细信息
The problem of universal outlying sequence detection is studied, where the goal is to detect outlying sequences among M sequences of samples. A sequence is considered as outlying if the observations therein are generated by a distribution different from those generating the observations in the majority of the sequences. In the universal setting, we are interested in identifying all the outlying sequences without knowing the underlying generating distributions. We consider the outlying sequence detection problem in three different scenarios: first, known number of outlying sequences;second, unknown number of identical outlying sequences;and finally, typical and outlying distributions forming clusters. In this paper, a class of tests based on distribution clustering is proposed. These tests are shown to be exponentially consistent with linear time complexity in M. Numerical results demonstrate that our clustering-based tests achieve similar performance to existing tests, while being considerably more computationally efficient.
A hybrid reliability analysis procedure that combines the advantages of the Subset Simulation method, the application of surrogate models and clustering techniques is proposed to efficiently assess the failure probabi...
详细信息
A hybrid reliability analysis procedure that combines the advantages of the Subset Simulation method, the application of surrogate models and clustering techniques is proposed to efficiently assess the failure probability of complex structural systems that may exhibit multiple failure modes. The proposed procedure, herein called SS-KK, integrates the Kriging surrogate modeling technique, K-means clustering algorithm into the original Subset Simulation (SS) method. The approach is found to not only improve the efficiency of the Subset Simulation method in finding the reliability of a structural system but to also help identify the important failure modes and controlling random variables. This information is important to aid engineers optimize the structural design process by focusing on the critical failures modes and design variables. The method consists of first constructing a relatively coarse global Kriging model at each subset level of SS by applying an appropriate active learning strategy. Subsequently, the initial global Kriging model is partitioned into several local Kriging models that coincide with the important failure modes identified by the K-means clustering algorithm. This partitioning, which helps identify the important failure modes, also gives a better representation of the entire failure region leading to improved estimates of the system reliability. Finally, FORM is implemented for each local Kriging to rank the importance of each identified failure mode based on its Hasofer-Lind reliability index and to use the associated design point and sensitivity coefficients to identify the most critical random variables. Several examples extracted from the available literature are analyzed to illustrate the advantages of the proposed SS-KK methodology and demonstrate its accuracy and efficiency.
Unmanned aerial vehicle-based aerial base stations (BSs) can provide rapid communication services to ground users and are thus promising for future communication systems. In this paper, we consider a scenario where no...
详细信息
Unmanned aerial vehicle-based aerial base stations (BSs) can provide rapid communication services to ground users and are thus promising for future communication systems. In this paper, we consider a scenario where no functional terrestrial BSs are available and the aim is deploying multiple aerial BSs to cover a maximum number of users within a certain target area. To this end, we first propose a naive successive deployment method, which converts the non-convex constraints in the involved optimization into a combination of linear constraints through geometrical relaxation. Then, we investigate a deployment method based on K-means clustering. The method divides the target area into K convex subareas, where within each subarea, a mixed integer non-linear problem is solved. An iterative power efficient technique is further proposed to improve coverage probability with reduced power. Finally, we propose a robust technique for compensating the loss of coverage probability in the existence of inaccurate user location information. Our simulation results show that the proposed techniques achieve an up to 30% higher coverage probability when users are not distributed uniformly. In addition, the proposed simultaneous deployment techniques, especially the one using iterative algorithm, improve power-efficiency by up to 15% compared with the benchmark circle packing theory.
Bitcoin is the world's first decentralized cryptocurrency whose transactions are recorded on a distributed, openly accessible ledger. On the Bitcoin Blockchain, an entity's real-world identity is hidden behind...
详细信息
Bitcoin is the world's first decentralized cryptocurrency whose transactions are recorded on a distributed, openly accessible ledger. On the Bitcoin Blockchain, an entity's real-world identity is hidden behind a pseudonym, a socalled ***, Bitcoin is widely assumed to provide a high degree of anonymity, which is a driver for its frequent use for illicit *** criminal activities that use Bitcoin as an intermediary are becoming more rampant, and it is difficult for law enforcement agencies to identify and track them. In order to identify the identity behind the Bitcoin address and realize the supervision of the blockchain, this paper propose to give a review of the most used Bitcoin clustering algorithms. The research is divided into two categories: One is the Transaction-based heuristic method for static address information;The other is classic clustering algorithms for dynamic behavior patterns, so as to achieve the purpose of de-anonymization of Bitcoin.
Aiming at the problem of the large-scale weapon target distribution model, the conventional algorithms are low efficient to obtain the solution and can not obtain the fire optimization scheme untimely. Thus a new two-...
详细信息
Aiming at the problem of the large-scale weapon target distribution model, the conventional algorithms are low efficient to obtain the solution and can not obtain the fire optimization scheme untimely. Thus a new two-level task optimization distribution model is constructed, which can obtain a distribution scheme in a shorter time by combining the fuzzy clustering algorithm with the auction algorithm. The numerical example shows that the established collaborative task allocation model and the corresponding solution method can get the task allocation scheme in time and effectively, and solve the problem of the fire power optimal allocation of the large-scale weapon-target.
Today, a wide variety of applications with different requirements are rapidly developed in industrial wireless sensor networks, and providing the Quality of Service (QoS) for this kind of communication network is inev...
详细信息
Today, a wide variety of applications with different requirements are rapidly developed in industrial wireless sensor networks, and providing the Quality of Service (QoS) for this kind of communication network is inevitable. It is difficult to solve the problems of poor adaptability and difficulty in the implementation of the QoS-based network configuration and management in traditional network architecture. We present a hierarchical software-defined network architecture for wireless sensor networks, which makes the complex network management possible and the system more adaptable. Furthermore, we propose a QoS-based routing protocol, called QSDN-WISE, which consists of a clustering algorithm, a routing algorithm, and local network maintenance. A double-cluster head-based uneven clustering algorithm, called DCHUC, avoids the energy hole phenomenon and reduces the workload of a single cluster head. The centralized QSDN-WISE routing algorithm constructs two heterogeneous forwarding paths for nodes, which meets the requirements for different data levels. Local network maintenance reduces the number of control messages in the network. The simulation results indicate that the QSDN-WISE can provide the QoS support for data with different requirements, balance the network energy consumption, and prolong the network's lifetime.
The integrated terrestrial-satellite network (ITSN) combines cellular networks and satellite networks to provide services for the ever-increasing users, where the coexistence of the two systems can not only highlight ...
详细信息
The integrated terrestrial-satellite network (ITSN) combines cellular networks and satellite networks to provide services for the ever-increasing users, where the coexistence of the two systems can not only highlight their advantages but also bring serious interference. Confronted with the target of maximizing the network capacity and ensuring the quality-of-service (QoS) for large number of users, we propose a framework-involved joint optimization of the multigroup precoding and resource allocation in the ITSN. In the multigroup precoding, we ameliorate the interference by optimizing the user access scheme, where the users with weak correlation on channel state information are distributed into the same group, such that all the users are divided into multiple groups and served at different time slots. To realize this multigroup precoding, first, we propose the multilevel clustering based grouping approach to obtain the groups in each cell or satellite. Second, we match those groups at different time slots to minimize intra-system interference and inter-system interference according to the proposed shortest path pairing algorithm and satellite users precoding method, respectively. In the resource allocation, we first transform the complicated non-convex problem into multiple convex subproblems, and then propose the collaborative power allocation method to optimize the power control for the whole network. Our simulation results show that the joint multigroup precoding and the resource allocation method is superior to the existing algorithms in terms of system capacity and QoS, which can significantly improve the performance of the ITSN.
暂无评论