In this paper, a novel approach is presented to calculate the lumped parameters of right/left-handed Structures. By this method, the equivalent circuit can be extracted, and the left/right handed features can be certi...
详细信息
In this literature, a novel left-handed circularly polarized voltage-controlled leaky wave antenna is presented with a scanning range of 0° to -37° with a perfect axial ratio at the most time below 2 dB. The...
详细信息
Wireless communication network has such features as limited bandwidth, changeful channel and dynamic topology, etc. Ad hoc network has lots of difficulties in accessing control, bandwidth distribution, resource assign...
详细信息
A detection method based on the strong low-frequency weak-signal detection ability of stochastic resonance is proposed, aimed at the detection of the unknown weak signal. By mixing the unknown signal with a continuous...
详细信息
This paper proposes a method for classification of incomplete data using neural network ensembles. In the method, the incomplete data set is analyzed and projected into a group of complete data subsets that give a ful...
详细信息
The importance of incremental learning in changing environments has been acknowledged in recent years. In this paper we present an ensemble learning method for supervised learning with drifting concepts. The method em...
详细信息
Traditionally, sea cucumber production relies heavily on human labors which results in low production efficiency and inability to meet the demands of a rapidly growing market. To address this problem, this paper bring...
详细信息
To motivate more people to participate in vaccination campaigns, various subsidy policies are often supplied by government and the health sectors. However, these external incentives may also alter the vaccination deci...
详细信息
To motivate more people to participate in vaccination campaigns, various subsidy policies are often supplied by government and the health sectors. However, these external incentives may also alter the vaccination decisions of the broader public, and hence the choice of incentive needs to be carefully considered. Since human behavior and the networking-constrained interactions among individuals significantly impact the evolution of an epidemic, here we consider the voluntary vaccination on human contact networks. To this end, two categories of typical subsidy policies are considered: (1) under the free subsidy policy, the total amount of subsidy is distributed to a certain fraction of individual and who are vaccinated without personal cost, and (2) under the partial-offset subsidy policy, each vaccinated person is offset by a certain amount of subsidy. A vaccination decision model based on evolutionary game theory is established to study the effects of these different subsidy policies on disease control. Simulations suggest that, because the partial-offset subsidy policy encourages more people to take vaccination, its performance is significantly better than that of the free subsidy policy. However, an interesting phenomenon emerges in the partial-offset scenario: with limited amount of total subsidy, a moderate subsidy rate for each vaccinated individual can guarantee the group-optimal vaccination, leading to the maximal social benefits, while such an optimal phenomenon is not evident for the free subsidy scenario.
Cryptographic approaches are vulnerable to impersonation attacks when nodes become compromised. Meanwhile, trust-based judgment and confirmation of cluster heads in WSN imposes higher communication cost. Trust managem...
详细信息
Focusing on the protection of privacy and non- publicity of special networks, the CPN model is extended to PCPN by the protocol factor and the formal model. The FPCPN (Formal Protocol Colored Petri Net) is presented t...
详细信息
Focusing on the protection of privacy and non- publicity of special networks, the CPN model is extended to PCPN by the protocol factor and the formal model. The FPCPN (Formal Protocol Colored Petri Net) is presented to analyze the operation mechanism of protocols. It is introduced by four steps, such as the whole structure, the network element conversion, the conditions of transition triggers/executions and sub-system partitions. Finally, the feasibility and efficiency of FPCPN is validated by an example.
暂无评论