With the rapid development of computer network, multimedia technology has gradually spread throughout all aspects of people's life. This article, based on the concept and characteristics of multimedia, expounds th...
详细信息
Research of Unmanned Aerial Vehicle(UAV) formation is a hot spot in the field of UAV applications. Based on the fountain code, an encoding communication scheme using unequal level coding Lu by Transform(ULC-LT) code a...
详细信息
ISBN:
(纸本)9781509059300;9781509059294
Research of Unmanned Aerial Vehicle(UAV) formation is a hot spot in the field of UAV applications. Based on the fountain code, an encoding communication scheme using unequal level coding Lu by Transform(ULC-LT) code and stepwise unequal error protection Lu by Transform(SUEP-LT) code are proposed for the UAV formation communication. Simulation results reveal that the proposed coding scheme can reduce the decoding bit error rate and provide strong unequal error protection property across sources.
Object detection, as of one the most fundamental and challenging problems in computer vision, has received great attention in recent years. Over the past two decades, we have seen a rapid technological evolution of ob...
详细信息
This letter considers optimizing user association in a heterogeneous network via utility maximization, which is a combinatorial optimization problem due to integer constraints. Different from existing solutions based ...
详细信息
Nowadays,many researches study the negotiation-based order allocation problem in the supply chain environment,aiming to improve the efficiency of the allocation and the profits of the supply chain *** competition and ...
详细信息
ISBN:
(纸本)9781538629185
Nowadays,many researches study the negotiation-based order allocation problem in the supply chain environment,aiming to improve the efficiency of the allocation and the profits of the supply chain *** competition and cooperation in supplier’s side are mainly addressed because of independent *** this paper,we analyze an interdependent order allocation problem in a two-echelon supply *** supply chain consists of a manufacturer echelon and a supplier *** to the interdependence,both the competition and cooperation in the manufacturer echelon are *** agent-based negotiation algorithm is developed to support the order allocation process and the conflicts *** show in experiments that orders under various supply chain contexts can be successfully allocated through the algorithm.
A Linear Quadratic robust control algorithm is proposed for the system with non-stochastic *** this paper,the uncertainties are the noises which lie in a bounded ellipsoid *** assumption weakens the requirements of th...
详细信息
ISBN:
(纸本)9781509046584
A Linear Quadratic robust control algorithm is proposed for the system with non-stochastic *** this paper,the uncertainties are the noises which lie in a bounded ellipsoid *** assumption weakens the requirements of the known Gaussian distribution in the traditional Linear Quadratic Gaussian(LQG) *** on the linear characteristic of the system and robust optimization theory,the linear quadratic robust controller is *** simulation results show the effectiveness of the algorithm.
In this paper,the distributed optimization problem is investigated under a second-order multi-agent *** the proposed algorithm,each agent solves the optimization via local computation and information exchange with its...
详细信息
ISBN:
(纸本)9781509046584
In this paper,the distributed optimization problem is investigated under a second-order multi-agent *** the proposed algorithm,each agent solves the optimization via local computation and information exchange with its neighbors through the communication ***,in comparison with the existing second-order distributed optimization algorithms,the proposed algorithm is much simpler due to one coupled information exchange among the agents is *** achieve the optimization,the distributed algorithm is proposed based on the consensus method and the gradient *** optimal solution of the problem is thus obtained with the design of Lyapunov function and the help of LaSallel's Invariance Principle.A numerical simulation example and comparison of proposed algorithm with existing works are presented to illustrate the effectiveness of the theoretical result.
Chain recurrent point, strong chain recurrent point and Devaney chaos have an important significance in terms of theory and application. In this paper, we will introduce the concept of chain recurrent point, strong ch...
详细信息
ISBN:
(纸本)9781728113678;9781728113661
Chain recurrent point, strong chain recurrent point and Devaney chaos have an important significance in terms of theory and application. In this paper, we will introduce the concept of chain recurrent point, strong chain recurrent point and Devaney chaos. By means of properties of the product space and topological conjugation, We study the dynamical properties of chain recurrent point, strong chain recurrent point and Devaney chaos. It is gived that the following conclusions. (1) The set CR(G) and SCR(G) are a closed set. (2) The set CR(G) and SCR(G) are strongly invariable for G. (3) If G_1 and G_2 are to be topologically conjugate, then the group G_1 is Devaney chaotic if and only if the group G_2 is Devaney chaotic;(4) The group G_1 × G_2 is Devaney chaotic if and only if the group G_1 and G_2 are Devaney chaotic. These results enrich the theory of chain recurrent point, strong chain recurrent point and Devaney chaos under the action of topological group
Machine learning (ML) is revolutionizing research and industry. Many ML applications rely on the use of large amounts of personal data for training and inference. Among the most intimate exploited data sources is elec...
详细信息
This paper analyzes the current situation of blockchain application security. Then, makes a concrete analysis on the problems existing in the application safety of blockchain, including the attack of consensus algorit...
This paper analyzes the current situation of blockchain application security. Then, makes a concrete analysis on the problems existing in the application safety of blockchain, including the attack of consensus algorithm, the leakage of privacy, and the programming vulnerability of blockchain and hash collisions. Then it introduces in detail the three key technologies of security protection under the blockchain application environment, P2P network technology, asymmetric encryption technology and consensus mechanism technology. In order to make more relevant people know more about the key technologies of safety protection in the application environment of blockchain.
暂无评论