Node location estimation is not only the promise of the wireless network for target recognition,monitoring,tracking and many other applications,but also one of the hot topics in wireless network *** this paper,the loc...
详细信息
Node location estimation is not only the promise of the wireless network for target recognition,monitoring,tracking and many other applications,but also one of the hot topics in wireless network *** this paper,the localization algorithm for wireless network with unevenly distributed nodes is discussed,and a novel multi-hop localization algorithm based on Elastic Net is *** proposed approach is formulated as a regression problem,which is solved by Elastic *** other previous localization approaches,the proposed approach overcomes the shortcomings of traditional approaches assume that nodes are distributed in regular areas without holes or obstacles,therefore has a strong adaptability to the complex deployment *** proposed approach consists of three steps:the data collection step,mapping model building step,and location estimation *** the data collection step,training information among anchor nodes of the given network is *** mapping model building step,the mapping model among the hop-counts and the Euclidean distances between anchor nodes is constructed using Elastic *** location estimation step,each normal node finds its exact location in a distributed *** scenario experiments and simulation experiments do exhibit the excellent and robust location estimation performance.
With the growing use of the Internet, as a wildly used tool, Internet has faced many resistances as an unreliable transmission medium. The core problem is time-varying delay in information transmission process. To sol...
详细信息
In this paper, decentralized linear active disturbance rejection control (LADRC) method is applied to the benchmark refrigeration system presented at the 3rdIFAC Conference on Advances in Proportional-Integral-Derivat...
详细信息
This paper focuses on developing a new paradigm motivated by investigating the consensus problem of networked Lagrangian systems with time-varying delay and switching topologies. We present adaptive controllers with p...
详细信息
In this paper, we investigate the state estimation problem over multiple Markovian packet drop channels. In this problem setup, a remote estimator receives measurement data transmitted from multiple sensors over indiv...
详细信息
The Internet of Things technology has been used in a wide range of fields, ranging from industrial applications to individual lives. As a result, a massive amount of sensitive data is generated and transmitted by IoT ...
详细信息
ISBN:
(数字)9781728150895
ISBN:
(纸本)9781728150901
The Internet of Things technology has been used in a wide range of fields, ranging from industrial applications to individual lives. As a result, a massive amount of sensitive data is generated and transmitted by IoT devices. Those data may be accessed by a large number of complex users. Therefore, it is necessary to adopt an encryption scheme with access control to achieve more flexible and secure access to sensitive data. The Ciphertext Policy Attribute-Based Encryption (CP-ABE) can achieve access control while encrypting data can match the requirements mentioned above. However, the long ciphertext and the slow decryption operation makes it difficult to be used in most IoT devices which have limited memory size and computing capability. This paper proposes a modified CP-ABE scheme, which can implement the full security (adaptive security) under the access structure of AND gate. Moreover, the decryption overhead and the length of ciphertext are constant. Finally, the analysis and experiments prove the feasibility of our scheme.
Visual simultaneous localization and mapping (SLAM) is the core of intelligent robot navigation system. Many traditional SLAM algorithms assume that the scene is static. When a dynamic object appears in the environmen...
详细信息
The class of port-Hamiltonian systems incorporates many physical models, such as mechanical systems in the finite-dimensional case and wave and beam equations in the infinite-dimensional case. In this paper we study a...
详细信息
With the rapid development of computer technology, the scale of graph increases explosively and large-scale graph computing has been the focus in recent years. Breadth-First Search (BFS) is one of the most important k...
详细信息
暂无评论