Aiming at the low utilization rate of attribute information and the lack of mining of the correlation among attributes of the existing cross-social network user identity matching algorithms, we proposed an algorithm f...
Aiming at the low utilization rate of attribute information and the lack of mining of the correlation among attributes of the existing cross-social network user identity matching algorithms, we proposed an algorithm for user identity matching across social networks utilizing fuzzy measure and Choquet integrals. Firstly, according to the characteristics of different attributes, we determineddifferent similarity calculation strategies; Secondly, we utilized particle swarm optimization method to calculate the fuzzy density of each attribute; Then Choquet integral was utilized to calculate the similarity of two accounts; Finally, the similarity was compared with the preset matching threshold and the final matching result was obtained. The experimental results in multiple sets of data showed that the average F1 value of the proposed algorithm reaching 84.5%. The performance is not only better than traditional machine learning methods, but also better than several baseline algorithms. It can be more accurate to identify the same user's accounts in multiple social networks according to the attribute information.
A simple design of broadband metamaterial absorber(MA) based on resistive film is numerically presented in this *** unit cell of this absorber is composed of crossedrectangularrings-shapedresistive film,dielectri...
详细信息
A simple design of broadband metamaterial absorber(MA) based on resistive film is numerically presented in this *** unit cell of this absorber is composed of crossedrectangularrings-shapedresistive film,dielectric substrate,and continuous metal *** simulatedresults indicate that the absorber obtains a 12.82-GHz-wide absorption from about 4.75 GHz to 17.57 GHz with absorptivity over 90% at normal *** of surface power loss density is illustrated to understand the intrinsic absorption mechanism of the *** proposed structure can work at wide polarization angles and wide angles of incidence for both transverse electric(TE) and transverse magnetic(TM) ***,the multi-reflection interference theory is involved to analyze and explain the broadband absorption mechanism at both normal and oblique ***,the polarization-insensitive feature is also investigated by using the interference *** is seen that the simulated and calculated absorption rates agree fairly well with each other for the absorber.
This paper proposes a method to select multi-antenna signals based on SNr estimation, in order to solve the negative influence of the poor partial quality branch signals in multi-antenna system. The algorithm proposes...
详细信息
This paper proposes a method to select multi-antenna signals based on SNr estimation, in order to solve the negative influence of the poor partial quality branch signals in multi-antenna system. The algorithm proposes antenna selecting programs, based on the SNr estimation, the Cramerrao bound and the combined signal matched filtering, to avoid the branch poor signals and enhance the signal combine quality. Theoretical and simulation results show that the proposed algorithm has a better performance than the traditional method, and the performance of the algorithm is improved with the increase of the number of antennas and the difference of the signal quality.
Considering the disadvantages of centralized algorithms and limitation of energy in wireless sensor networks (WSN), a distributed auction algorithm is proposed to realize the target tracking sensor management. The met...
详细信息
Considering the disadvantages of centralized algorithms and limitation of energy in wireless sensor networks (WSN), a distributed auction algorithm is proposed to realize the target tracking sensor management. The method introduces the auction theory in economics and adjusts the price of the sensorresources to solve the target-sensor assignment problem. In order to shorten the decision-making time and save the energy consumption, the CSMA mechanism is introduced and the decision-making can be completed with local information and a few interactions. The convergence and effectiveness of the algorithm are proved, and the simulation results show that the algorithm is superior.
In this paper, the allocation of downlink channel resources in the indoor visible light multi cell network is studied. Based on the three color channels of rGB-LEd, a conflict graph model is established, and a downlin...
详细信息
In this paper, the allocation of downlink channel resources in the indoor visible light multi cell network is studied. Based on the three color channels of rGB-LEd, a conflict graph model is established, and a downlink channel allocation algorithm is proposed for visible light multi cell network. First, the global allocation of users’ access to the cell is given out. Then, considering the users’ business needs, a weighted conflict graph model is established, the channel allocation algorithm is proposed based on graph coloring and user traffic fairness. The simulation results show that, compared with the graph-baseddynamic allocation algorithm, the proposed algorithm is to improve the downlink communication fairness of users, and the average throughput of the whole network is improved at the same time.
In this paper, we propose a novel approach called Wntiifs to infer the topology of CSMA/CA wireless network without the need to cooperate in the network ordecode the network’s messages. The approach divides rF frame...
详细信息
In this paper, we propose a novel approach called Wntiifs to infer the topology of CSMA/CA wireless network without the need to cooperate in the network ordecode the network’s messages. The approach divides rF frames observed into session atoms according to an inter frame space threshold, and ensures that a session atom consists only of frames transmitted by two nodes. Then, it extracts the link in each atom in different observation time window. Finally, it merges the links in different time window to reconstruct the complete network topology. Experimental results demonstrate that, compared with the existing wireless network topology inference algorithms, Wntiifs is of higher topology inference accuracy.
In sparse fast Fourier transform algorithm, noise will increase the difficulty in frequency location. As to this problem, probability of detected frequency are analyzed with respect to noise level and bucket in this p...
详细信息
In sparse fast Fourier transform algorithm, noise will increase the difficulty in frequency location. As to this problem, probability of detected frequency are analyzed with respect to noise level and bucket in this paper. Firstly different mean and variance of compressed vector in frequency domain are derived under the hypothesis of whether there is a signal, then these statistical characteristics are used to analyze the impact of signal-to-noise ratio and number of point per bucket on detection probability of frequency. Finally, simulation curves is given under the conditions of different noise and bucket. Simulation shows that frequency of signal with additive white Gaussian noise could be effectively detected when SNr is higher than 10dB and number of point per bucket smaller than 2 12 . And in order to ensure effective detection of frequency, when SNrdecrease, number of point per bucket should be reduced. Through the analysis, this paper provides a theoretical support to enhance the reliability of the algorithm.
In recent years, SdN(Software defined Network) as a new network architecture has become the hot research point. Meanwhile,the well-known Open Flow-based SdN got a lot of attention. But it can't provide a flexible ...
详细信息
In recent years, SdN(Software defined Network) as a new network architecture has become the hot research point. Meanwhile,the well-known Open Flow-based SdN got a lot of attention. But it can't provide a flexible and effective network resource description *** an open programmable technology, For CES(Forwarding and Control Element Separation)has also been concerned. However, For CES is confined within a single network node and cannot be applied to the entire network. This paper proposes a new architecture — ForS A(ForC ESbased SdN architecture). The architecture is added a configuration layer based on the traditional SdN architecture, which solves the problem that the northbound interface is not clear between the application layer and the control layer in the SdN architecture. ForS A also implements the compatibility within various forwarding devices in the forwarding layer.
In cyberspace,unknown zero-day attacks can bring safety *** defense methods based on signatures are *** on the Cyberspace Mimic defense(CMd)architecture,the paper proposes a framework to detect the attacks andrespond...
详细信息
In cyberspace,unknown zero-day attacks can bring safety *** defense methods based on signatures are *** on the Cyberspace Mimic defense(CMd)architecture,the paper proposes a framework to detect the attacks andrespond to *** are assigned to all online redundant heterogeneous functionally equivalent *** independent outputs are compared and the outputs in the majority will be the final *** abnormal outputs can be detected and so can the *** damaged executive modules with abnormal outputs will be replaced with new ones from the diverse executive module *** analyzing the abnormal outputs,the correspondence between inputs and abnormal outputs can be built and inputs leading to recurrent abnormal outputs will be written into the zero-day attack relateddatabase and theirreuses cannot work any longer,as the suspicious malicious inputs can be detected and *** responses include IP blacklisting and patching,*** framework also uses honeypot like executive module to confuse the *** proposed method can prevent the recurrent attack based on the same exploit.
To address the issues that middleboxes as a fundamental part of today's networks are facing, Network Function Virtualization(NFV)has been recently proposed, which in essence asserts to migrate hardware-based middl...
详细信息
To address the issues that middleboxes as a fundamental part of today's networks are facing, Network Function Virtualization(NFV)has been recently proposed, which in essence asserts to migrate hardware-based middleboxes into software-based virtualized function *** to the demands of virtual services placement in NFV network environment, this paper models the service amount placement problem involving with the resources allocation as a cooperative game and proposes the placement policy by Nash Bargaining Solution(NBS). Specifically,we first introduce the system overview and apply the rigorous cooperative game-theoretic guide to build the mathematical model, which can give consideration to both the responding efficiency of service requirements and the allocation *** a distributed algorithm corresponding to NBS is designed to achieve predictable network performance for virtual instances ***, with simulations under various scenarios,the results show that our placement approach can achieve high utilization of network through the analysis of evaluation metrics namely the satisfaction degree and fairness index. With the suitable demand amount of services, the average values of two metrics can reach above 90%. And by tuning the base placement, our solution can enable operators to flexibly balance the tradeoff between satisfaction and fairness of resourcessharing in service platforms.
暂无评论