The unmanned aerial vehicle (UAV) has been a research focus in recent years and the path planner is a key element of the UAV autonomous control module. In this paper, a novel UAV path planning method based on intellig...
详细信息
ISBN:
(数字)9781538682463
ISBN:
(纸本)9781538682470
The unmanned aerial vehicle (UAV) has been a research focus in recent years and the path planner is a key element of the UAV autonomous control module. In this paper, a novel UAV path planning method based on intelligent water drop algorithm is proposed. Firstly, the mathematical model of the UAV path planning problem is presented. Secondly, an improved intelligent water drop algorithm is proposed to solve the UAV path planning model. In the proposed algorithm, a novel path construction mechanism is proposed and an adaptive global soli update mechanism is developed. The proposed algorithm can overcome some shortages of the original ITD algorithm, such as slow search speed, easily falling into local minima, and so on. Experimental results demonstrate that the proposed planner outperforms the original ITD planner in a statistical manner.
How to reduce the number of transmissions or prolong the lifetime of wirelesssensornetworks(WSNs) has become a research focus. Based on the spatial correlation of sensor readings, in this paper, we propose a spati...
详细信息
How to reduce the number of transmissions or prolong the lifetime of wirelesssensornetworks(WSNs) has become a research focus. Based on the spatial correlation of sensor readings, in this paper, we propose a spatial compression scheme for improving the lifetime of wirelesssensornetwork to address this issue. This scheme can prolong the lifetime of network significantly by combing LEACH protocol and spatial compression. Meanwhile, the reconstruction precision of original data is high for exploring the spatial correlation of sensor readings fully. Moreover, based on the layered network architecture, the proposed scheme can improve the network loading by selecting the cluster head randomly. Finally, the simulation results confirm that the lifetime of the proposed scheme is longer than other related schemes, and the original data can be reconstructed with high precision.
We put forward an optimal entanglement concentration protocol(ECP) for recovering an arbitrary less-entangled multi-photon Greenberger–Horne–Zeilinger(GHZ) state into the maximally entangled GHZ state based on t...
详细信息
We put forward an optimal entanglement concentration protocol(ECP) for recovering an arbitrary less-entangled multi-photon Greenberger–Horne–Zeilinger(GHZ) state into the maximally entangled GHZ state based on the photonic Faraday rotation in low-quality(Q) cavity. In the ECP, only one pair of less-entangled multi-photon GHZ state and one auxiliary photon are required, and the concentration task can be realized by local operations. Moreover, our ECP can be used repeatedly to further concentrate the discarded items of conventional ECPs, which can increase its success probability largely. Under the practical imperfect detection condition, our protocol can still work with relatively high success probability. This ECP has application potential in current and future quantum communication.
Orbital angular momentum entanglement is one of the most intriguing topics in quantum physics. A broad range of research have been dedicated either to unravel its underlying physics or to expand the entanglement dimen...
详细信息
In this paper, an analytical framework is developed to evaluate the uplink outage and spatial blocking performance in a multichannel heterogeneous cellular network. A weighted uplink cell association criterion and ran...
详细信息
In recent years, volunteer service in China has made an unprecedented development, but the credibility and traceability of volunteer service time management are confronted with serious challenges. Sin
ISBN:
(纸本)9781467389808
In recent years, volunteer service in China has made an unprecedented development, but the credibility and traceability of volunteer service time management are confronted with serious challenges. Sin
We theoretically and numerically investigate the temperature-dependent properties of the biphotons generated from four isomorphs of periodically poled KTiOPO4 (PPKTP): i.e., PPRTP, PPKTA, PPRTA and PPCTA. It is discov...
详细信息
Association rule analysis, as one of the significant means of data mining, plays an important role in discovering the implicit knowledge in massive transaction data. Aiming at the inherent defects of the classic Aprio...
详细信息
In cellular networks, the proximity devices may share files directly without going through the e NBs, which is called Device-to-Device communications(D2D). It has been considered as a potential technological component...
详细信息
In cellular networks, the proximity devices may share files directly without going through the e NBs, which is called Device-to-Device communications(D2D). It has been considered as a potential technological component for the next generation of communication. In this paper, we investigate a novel framework to distribute video files from some other proximity devices through users' media cloud assisted D2 D communication. The main contributions of this work lie in: 1) Providing an efficient algorithm Media Cloud Cluster Selecting Scheme(MCCSS) to achieve the reasonable cluster; 2) Distributing the optimum updating files to the cluster heads, in order to minimize the expected D2 D communication transmission hop for files; 3) Proposing a minimum the hop method, which can ensure the user obtain required file as soon as possible. Extensive simulation results have demonstrated the efficiency of the proposed scheme.
In the open network environment, malicious attacks to the trust model have become increasingly serious. Compared with single node attacks, collusion attacks do more harm to the trust model. To solve this problem, a co...
详细信息
In the open network environment, malicious attacks to the trust model have become increasingly serious. Compared with single node attacks, collusion attacks do more harm to the trust model. To solve this problem, a collusion detector based on the GN algorithm for the trust evaluation model is proposed in the open Internet environment. By analyzing the behavioral characteristics of collusion groups, the concept of flatting is defined and the G-N community mining algorithm is used to divide suspicious communities. On this basis, a collusion community detector method is proposed based on the breaking strength of suspicious communities. Simulation results show that the model has high recognition accuracy in identifying collusion nodes, so as to effectively defend against malicious attacks of collusion nodes.
暂无评论