Two-dimensional fuzzy temperature controller was used in the system of inverter air-conditioner to control the room temperature. Self-adjustment PID fuzzy controller was proposed to realize real-time control function....
详细信息
The routing protocol is the core of the Ad Hoc network protocols, which largely determines the performance and features of an Ad Hoc network. Aiming at the characteristics of the Mobile Radio Ad Hoc network, this pape...
详细信息
ISBN:
(纸本)9781849199094
The routing protocol is the core of the Ad Hoc network protocols, which largely determines the performance and features of an Ad Hoc network. Aiming at the characteristics of the Mobile Radio Ad Hoc network, this paper is to design a low-rate mobile Ad Hoc network routing protocols WLRP (Wireless Low-Rate Ad Hoc security Routing Protocol), using the trust evaluation mechanism between neighbour nodes which can effectively prevent attacks from inside the network, to greatly enhance the Ad Hoc Network security. Simulation results show that in low-Rate link environment, the WLRP protocol performs better than AODV.
With the strong development momentum of the Internet, network not only brings convenience to our life, but also poses threats to our network security. Users can hide their IP and identity information through encryptio...
详细信息
In recent years,LoRa has been extensively researched in the satellite Internet of Things(IoT).However,the multiple access technology of LoRa is still one of the bottlenecks of satellite *** improve the multiple access...
详细信息
In recent years,LoRa has been extensively researched in the satellite Internet of Things(IoT).However,the multiple access technology of LoRa is still one of the bottlenecks of satellite *** improve the multiple access performance of LoRa satellite IoT,based on the orthogonality of LoRa symbols in the fractional domain,this paper proposes a low complexity Orthogonal LoRa Multiple Access(OLMA)algorithm for multiple LoRa users occupying the same frequency *** algorithm introduces the address code to divide the fractional bandwidth into multiple parts,and the OLMA users with different address codes occupy different parts to transmit the information code,thus avoiding mutual interference caused by collisions in the same frequency *** multiple access capability of OLMA can be flexibly configured only by simply adjusting the length of the address code according to the actual application requirements of data *** analysis and simulation results show that the OLMA algorithm can greatly improve the multiple access capability and the total transmission bit rate of LoRa IoT without changing the existing LoRa modulation parameters and process.
Dear editor,Discrete Gaussian sampling, that is, sampling from a discrete Gaussian distribution DΛ,σ,cwith parameter σ> 0 and center c∈R~n over an ndimensional lattice Λ, has been considered by the cryptograph...
详细信息
Dear editor,Discrete Gaussian sampling, that is, sampling from a discrete Gaussian distribution DΛ,σ,cwith parameter σ> 0 and center c∈R~n over an ndimensional lattice Λ, has been considered by the cryptography research community as one of the fundamental building blocks of lattice-based cryptography [1, 2]. The simplest lattice is the one-
Through introducing Koch fractal theory, an ordinary AMC structure and broadband Koch fractal AMC ground planes are designed and compared. The bandwidth and performance improvement of the fractal AMC ground plane are ...
详细信息
Research on biometrics for high security applica- tions has not attracted as much attention as civilian or foren- sic applications. Limited research and deficient analysis so far has led to a lack of general solutions...
详细信息
Research on biometrics for high security applica- tions has not attracted as much attention as civilian or foren- sic applications. Limited research and deficient analysis so far has led to a lack of general solutions and leaves this as a challenging issue. This work provides a systematic analy- sis and identification of the problems to be solved in order to meet the performance requirements for high security applica- tions, a double low problem. A hybrid ensemble framework is proposed to solve this problem. Setting an adequately high threshold for each matcher can guarantee a zero false accep- tance rate (FAR) and then use the hybrid ensemble framework makes the false reject rate (FRR) as low as possible. Three ex- periments are performed to verify the effectiveness and gener- alization of the framework. First, two fingerprint verification algorithms are fused. In this test only 10.55% of fingerprints are falsely rejected with zero false acceptance rate, this is sig- nificantly lower than other state of the art methods. Second, in face verification, the framework also results in a large re- duction in incorrect classification. Finally, assessing the per- formance of the framework on a combination of face and gait verification using a heterogeneous database show this frame- work can achieve both 0% false rejection and 0% false accep- tance simultaneously.
Discrete modulation represents a practical and device-friendly solution for high speed transmission in continuous-variable quantum key distribution (CV-QKD), offering high compatibility with coherent optical communica...
详细信息
Federated Learning (FL) trains machine learning models on edge devices with distributed data. However, the computational and memory limitations of these devices restrict the training of large models using FL. Split Fe...
详细信息
In order to calculate the packet loss rate in OBS network, this paper proposes a method, which performs good in both accuracy and rapidity, based on Erlang B formula to estimate the packet loss probability in OBS netw...
详细信息
暂无评论