In peer-to-peer network environment, there is no centralized management authority to be relied on, so the service provider and service requester have to establish some assessment model, and evaluate the dynamic behavi...
详细信息
In peer-to-peer network environment, there is no centralized management authority to be relied on, so the service provider and service requester have to establish some assessment model, and evaluate the dynamic behavior of others, then choose more credible trusted entities to interact. Only in this way can they ensure security, safety and reliable decisions. On the basis of Eigen Trust model, a local trust value computation model considering time effect function is put forward, and it reduces the network overhead, increases the binding force of malicious nodes,and makes the trust value computation model more reliable and accurate. Simulation experiments show that the improved model proposed in this paper greatly reduces the network overhead indeed, and transaction success rate of nodes is higher than Eigen Trust model in the presence of malicious nodes in the P2P system.
This paper introduces a regularization method called Correlative Filter (CF) for Convolutional Neural Network (CNN), which takes advantage of the relevance between the convolutional kernels belonging to the same convo...
详细信息
ISBN:
(纸本)9781479986989
This paper introduces a regularization method called Correlative Filter (CF) for Convolutional Neural Network (CNN), which takes advantage of the relevance between the convolutional kernels belonging to the same convolutional layer. During the process of training with the proposed CF method, several pairs of filters are designed in a manner of randomness to contain opposite weights in low-level layers. Regarding higher level layers where synthetical features are processed, the relation between correlative filters is explored as translation of various directions. The proposed CF method attempts to optimize the inner structure of convolutional layers and it can work jointly with other regularization techniques, such as stochastic pooling, Dropout, etc. The experimental results on the competitive image classification benchmark dataset CIFAR-10 demonstrates the performance of the proposed CF method, additionally, it is also verified that the proposed CF method is wonderful to be employed to enhance several state-of-the-art regularization models.
Considering the existence of large Doppler frequency shift, fast time-varying channels and multiple user interference and other serious problems in the satellite-based AIS system, a noncoherent detection method called...
详细信息
This paper presented a classification algorithm which could find the concept drifts from the data streams, called Incremental Updated Discriminant Eigenspace (IUDE). The algorithm constructs the eigenspace model of th...
详细信息
The paper focuses on a stabilizing controller design problem for networked systems with quantization,mixed delays,and a series of packet losses due to the signal transmission through the unreliable communication *** o...
详细信息
The paper focuses on a stabilizing controller design problem for networked systems with quantization,mixed delays,and a series of packet losses due to the signal transmission through the unreliable communication *** of both sensor-to-controller and controller-to-actuator are taken into account for the networked systems,and the distributed time delay is also considered in the network *** conditions for designing the controller as well as the system parameters can be obtained by solving certain linear matrix ***,the effectiveness of the designed method is proved by a numerical example.
The appearance of multiplicative speckle noise in Synthetic Aperture Radar (SAR) imagery makes it very difficult to visualization and compression. This paper proposes a novel framework of Compressed Sensing (CS) to co...
详细信息
It has obvious advantage to adopt 802.1x authentication for network access control, which is an ideal and low-cost scheme and is usually used for those enterprises and campuses which run and manage simply or have simp...
详细信息
ISBN:
(纸本)9781510817982
It has obvious advantage to adopt 802.1x authentication for network access control, which is an ideal and low-cost scheme and is usually used for those enterprises and campuses which run and manage simply or have simple business. This paper analyzed 802.1x protocol, EAP protocol and RADIUS protocol, configured switch, Free RADIUS Server and My SQL, constructed AAA management framework which is based on 802.1x authentication at the end, and showed the whole authentication flow. Using software the messages of the whole authentication process have been captured. The brief analysis of these messages provides technology strongly for particular research and further improvement, and has important value for research and application.
It has obvious advantage to adopt 802.1x authentication for network access *** paper analyzes802.1x protocol,EAP protocol and RADIUS protocol,and constructs AAA which is based on 802.1x authentication at the *** softw...
详细信息
ISBN:
(纸本)9781479919819
It has obvious advantage to adopt 802.1x authentication for network access *** paper analyzes802.1x protocol,EAP protocol and RADIUS protocol,and constructs AAA which is based on 802.1x authentication at the *** software the messages of the whole authentication process have been *** to AAA mechanism it analyzes EAP messages and RADIUS messages *** analysis of these messages provides technology strongly for particular research and further improvement,and it has important value for research and application.
Parallel discrete event simulation consumes massive memory, involves frequent allocation and deallocation, and generates huge amount of data, which makes the memory usage an important issue for performance. In this pa...
详细信息
ISBN:
(纸本)9781509018949
Parallel discrete event simulation consumes massive memory, involves frequent allocation and deallocation, and generates huge amount of data, which makes the memory usage an important issue for performance. In this paper, we present our reverse computation approach in our multi-threaded parallel discrete event simulator used for large scale stochastic reaction-diffusion simulation. We compute the reverse control code to record what operation an event did on the state of the host Logical Process during forward processing, and undo the operation according to the corresponding code during recovering that event. As the results on two versions of calcium wave model show, the reverse computation version achieved better performance than the state-saving version-it saved about 33% and 36% execution time for the two models respectively when two processing threads were used.
Multi-threaded Parallel Discrete Event Simulation (PDES) is promising to achieve high performance. Generally employing a collection of multi-core nodes is necessary to accomplish large scale PDES, which makes it runni...
详细信息
ISBN:
(纸本)9781467397414
Multi-threaded Parallel Discrete Event Simulation (PDES) is promising to achieve high performance. Generally employing a collection of multi-core nodes is necessary to accomplish large scale PDES, which makes it running in a hybrid of distributed and shared memory platform. Present Global Virtual Time (GVT) computing algorithms are suitable for pure distributed or shared memory platform. In this paper we present an asynchronous GVT computing algorithm in Neuron Time Warp-Multi Thread (NTW-MT) simulator for stochastic simulation in NEURON project. GVT is computed asynchronously both within and among processes, which is the first try in multi-threaded PDES as far as we know. Then we prove this algorithm can compute a valid GVT at any wall clock time, and conclude it has less computational cost through analysing the cost and delay. Finally we show results of simulating a calcium wave model in an unbranched apical dendrite of a hippocampal pyramidal neuron.
暂无评论