In the paper, a method of building mathematic model employing genetic multilayer feed forward neural network is presented, and the quantitative relationship of chemical measured values and near-infrared spectral data ...In the paper, a method of building mathematic model employing genetic multilayer feed forward neural network is presented, and the quantitative relationship of chemical measured values and near-infrared spectral data is established. In the paper, quantitative mathematic model related chemical assayed values and near-infrared spectral data is established by means of genetic multilayer feed forward neural network, acquired near-infrared spectral data are taken as input of network with the content of five kinds of fat acids tested from chemical method as output, weight values of multilayer feed forward neural network are trained by genetic algorithms and detection model of neural network of soybean is built. A kind of multilayer feed forward neural network trained by genetic algorithms is designed in the paper. Through experiments, all the related coefficients of five fat acids can approach 0.9 which satisfies the preliminary test of soybean breeding.展开更多
为提升命名数据移动自组织网络服务质量,针对其拓扑动态时变特性,提出一种基于节点活跃度的包转发策略。策略周期性地计算网络节点的活跃度,并利用高活跃度节点进行兴趣包和数据包的转发和存储。使用NS-3/ndnSIM开源框架开发了仿真程序...为提升命名数据移动自组织网络服务质量,针对其拓扑动态时变特性,提出一种基于节点活跃度的包转发策略。策略周期性地计算网络节点的活跃度,并利用高活跃度节点进行兴趣包和数据包的转发和存储。使用NS-3/ndnSIM开源框架开发了仿真程序,将这个策略与默认的洪泛和典型的最短路径路由策略进行评估。实验结果显示,在中等和高动态性的MANET(mobile ad hoc network)环境中,基于节点活跃度的数据包传输策略能通过适度增加节点的存储消耗,保持较低的平均请求延迟,同时取得更优秀的请求响应率,消耗更少网络带宽。展开更多
The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key managemen...The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key management scheme is responsible for secure distributing group keys among valid nodes of the group. Based on the key-insulated encryption (KIE), we propose a group key management scheme (KIE-GKMS), which integrates the pair-wise key pre-distribution for WSN. The KIE-GKMS scheme updates group keys dynamically when adding or removing nodes. Moreover, the security analysis proves that the KIE-GKMS scheme not only obtains the semantic security, but also provides the forward and backward security. Finally, the theoretical analysis shows that the KIE-GKMS scheme has constant performance on both communication and storage costs in sensor nodes.展开更多
To deeply exploit the mechanisms of ant colony optimization (ACO) applied to develop routing in mobile ad hoe networks (MANETS),some existing representative ant colony routing protocols were analyzed and compared....To deeply exploit the mechanisms of ant colony optimization (ACO) applied to develop routing in mobile ad hoe networks (MANETS),some existing representative ant colony routing protocols were analyzed and compared.The analysis results show that every routing protocol has its own characteristics and competitive environment.No routing protocol is better than others in all aspects.Therefore,based on no free lunch theory,ant routing protocols were decomposed into three key components:route discovery,route maintenance (including route refreshing and route failure handling) and data forwarding.Moreover,component based ant routing protocol (CBAR) was proposed.For purpose of analysis,it only maintained basic ant routing process,and it was simple and efficient with a low overhead.Subsequently,different mechanisms used in every component and their effect on performance were analyzed and tested by simulations.Finally,future research strategies and trends were also summarized.展开更多
In order to improve the data transmission reliability of mobile ad hoc network, a routing scheme called integrated forward error correction multipath routing protocol was proposed, which integrates the techniques of p...In order to improve the data transmission reliability of mobile ad hoc network, a routing scheme called integrated forward error correction multipath routing protocol was proposed, which integrates the techniques of packet fragmenting and forward error correction encoding into multipath routing. The scheme works as follows: adding a certain redundancy into the original packets; fragmenting the resulting packets into exclusive blocks of the same size; encoding with the forward error correction technique, and then sending them to the destination node. When the receiving end receives a certain amount of information blocks, the original information will be recovered even with partial loss. The performance of the scheme was evaluated using OPNET modeler. The experimental results show that with the method the average transmission delay is decreased by 20% and the transmission reliability is increased by 30%.展开更多
Determination of ballistic performance of an armor solution is a complicated task and evolved significantly with the application of finite element methods(FEM) in this research field.The traditional armor design studi...Determination of ballistic performance of an armor solution is a complicated task and evolved significantly with the application of finite element methods(FEM) in this research field.The traditional armor design studies performed with FEM requires sophisticated procedures and intensive computational effort,therefore simpler and accurate numerical approaches are always worthwhile to decrease armor development time.This study aims to apply a hybrid method using FEM simulation and artificial neural network(ANN) analysis to approximate ballistic limit thickness for armor steels.To achieve this objective,a predictive model based on the artificial neural networks is developed to determine ballistic resistance of high hardness armor steels against 7.62 mm armor piercing ammunition.In this methodology,the FEM simulations are used to create training cases for Multilayer Perceptron(MLP) three layer networks.In order to validate FE simulation methodology,ballistic shot tests on 20 mm thickness target were performed according to standard Stanag 4569.Afterwards,the successfully trained ANN(s) is used to predict the ballistic limit thickness of 500 HB high hardness steel armor.Results show that even with limited number of data,FEM-ANN approach can be used to predict ballistic penetration depth with adequate accuracy.展开更多
In order to efficiently mitigate error propagation and reduce computational complexity, this paper proposes a scheme for traditional cooperative networks, named as dual-threshold symbol selective demodulate-and-forwar...In order to efficiently mitigate error propagation and reduce computational complexity, this paper proposes a scheme for traditional cooperative networks, named as dual-threshold symbol selective demodulate-and-forward. In the scheme, two log likelihood ratio(LLR)-based thresholds are devised to measure the reliability of received signals for the relay and the destination, respectively. One of the threshold guarantees that the relay only forwards reliable symbols, thus less error will be propagated to the destination. The other threshold is used at the destination for determining the reliability of symbols received from the source.The destination will directly demodulate reliable symbols received from the source. Otherwise, when the symbols received from the source are not reliable, the maximum ratio combiner(MRC) is used to combine symbols received from the source and the relay.Closed-form expression of the bit error probability(BEP) of the proposed scheme is derived and analyzed under binary phase shift keying(BPSK) modulation. Then, the relationship and closed-form solutions of two LLR-based thresholds are derived. Simulation results prove that the theoretical BEP of the proposed scheme closely matches the simulated ones. The proposed scheme can achieve high performance with low computational complexity compared to existing schemes.展开更多
This paper pays its attention on Chinese mobile Internet service( MIS). Chinese MIS is developing so rapidly that the research on the mechanism of the formation of MIS assessment makes significant sense and therefore ...This paper pays its attention on Chinese mobile Internet service( MIS). Chinese MIS is developing so rapidly that the research on the mechanism of the formation of MIS assessment makes significant sense and therefore the three layers construct of the artificial neural network( ANN) theory is applied to address the problem. The final research model contains MIS features including personalization,localization,reachability,connectivity,convenience and ubiquity as the input layer variables,perceived MIS quality and MIS satisfaction as the hidden layer variables and reuse intention as the output layer variable. MIS risk is identified as the mediating variable. Theoretically,the framework is robust and reveals the mechanism of how customers evaluate a certain mobile Internet service. Practically,the model based on ANN should shed some light on how to understand and improve customer perceived mobile Internet service for both MIS giants and new comers.展开更多
基金Heilongjiang Natural Science Foundation (F0318).
文摘In the paper, a method of building mathematic model employing genetic multilayer feed forward neural network is presented, and the quantitative relationship of chemical measured values and near-infrared spectral data is established. In the paper, quantitative mathematic model related chemical assayed values and near-infrared spectral data is established by means of genetic multilayer feed forward neural network, acquired near-infrared spectral data are taken as input of network with the content of five kinds of fat acids tested from chemical method as output, weight values of multilayer feed forward neural network are trained by genetic algorithms and detection model of neural network of soybean is built. A kind of multilayer feed forward neural network trained by genetic algorithms is designed in the paper. Through experiments, all the related coefficients of five fat acids can approach 0.9 which satisfies the preliminary test of soybean breeding.
文摘为提升命名数据移动自组织网络服务质量,针对其拓扑动态时变特性,提出一种基于节点活跃度的包转发策略。策略周期性地计算网络节点的活跃度,并利用高活跃度节点进行兴趣包和数据包的转发和存储。使用NS-3/ndnSIM开源框架开发了仿真程序,将这个策略与默认的洪泛和典型的最短路径路由策略进行评估。实验结果显示,在中等和高动态性的MANET(mobile ad hoc network)环境中,基于节点活跃度的数据包传输策略能通过适度增加节点的存储消耗,保持较低的平均请求延迟,同时取得更优秀的请求响应率,消耗更少网络带宽。
基金Project(61100201) supported by National Natural Science Foundation of ChinaProject(12ZZ019) supported by Technology Innovation Research Program,Shang Municipal Education Commission,China+1 种基金Project(LYM11053) supported by the Foundation for Distinguished Young Talents in Higher Education of Guangdong Province,ChinaProject(NCET-12-0358) supported by New Century Excellent Talentsin University,Ministry of Education,China
文摘The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key management scheme is responsible for secure distributing group keys among valid nodes of the group. Based on the key-insulated encryption (KIE), we propose a group key management scheme (KIE-GKMS), which integrates the pair-wise key pre-distribution for WSN. The KIE-GKMS scheme updates group keys dynamically when adding or removing nodes. Moreover, the security analysis proves that the KIE-GKMS scheme not only obtains the semantic security, but also provides the forward and backward security. Finally, the theoretical analysis shows that the KIE-GKMS scheme has constant performance on both communication and storage costs in sensor nodes.
基金Project(61225012)supported by the National Science Foundation for Distinguished Young Scholars of ChinaProjects(61070162,71071028,70931001)supported by the National Natural Science Foundation of China+4 种基金Project(20120042130003)supported by the Specialized Research Fund of the Doctoral Program of Higher Education for the Priority Development Areas,ChinaProjects(20100042110025,20110042110024)supported by the Specialized Research Fund for the Doctoral Program of Higher Education,ChinaProject(2012)supported by the Specialized Development Fund for the Internet of Things from the Ministry of Industry and Information Technology of ChinaProject(N110204003)supported by the Fundamental Research Funds for the Central Universities of ChinaProject(L2013001)supported by the Scientific Research Fund of Liaoning Provincial Education Department,China
文摘To deeply exploit the mechanisms of ant colony optimization (ACO) applied to develop routing in mobile ad hoe networks (MANETS),some existing representative ant colony routing protocols were analyzed and compared.The analysis results show that every routing protocol has its own characteristics and competitive environment.No routing protocol is better than others in all aspects.Therefore,based on no free lunch theory,ant routing protocols were decomposed into three key components:route discovery,route maintenance (including route refreshing and route failure handling) and data forwarding.Moreover,component based ant routing protocol (CBAR) was proposed.For purpose of analysis,it only maintained basic ant routing process,and it was simple and efficient with a low overhead.Subsequently,different mechanisms used in every component and their effect on performance were analyzed and tested by simulations.Finally,future research strategies and trends were also summarized.
基金Projects(2003CB314802) supported by the State Key Fundamental Research and Development Programof China project(90104001) supported by the National Natural Science Foundation of China
文摘In order to improve the data transmission reliability of mobile ad hoc network, a routing scheme called integrated forward error correction multipath routing protocol was proposed, which integrates the techniques of packet fragmenting and forward error correction encoding into multipath routing. The scheme works as follows: adding a certain redundancy into the original packets; fragmenting the resulting packets into exclusive blocks of the same size; encoding with the forward error correction technique, and then sending them to the destination node. When the receiving end receives a certain amount of information blocks, the original information will be recovered even with partial loss. The performance of the scheme was evaluated using OPNET modeler. The experimental results show that with the method the average transmission delay is decreased by 20% and the transmission reliability is increased by 30%.
基金Otokar Otomotiv ve Savunma Sanayi A.S. for the financial support
文摘Determination of ballistic performance of an armor solution is a complicated task and evolved significantly with the application of finite element methods(FEM) in this research field.The traditional armor design studies performed with FEM requires sophisticated procedures and intensive computational effort,therefore simpler and accurate numerical approaches are always worthwhile to decrease armor development time.This study aims to apply a hybrid method using FEM simulation and artificial neural network(ANN) analysis to approximate ballistic limit thickness for armor steels.To achieve this objective,a predictive model based on the artificial neural networks is developed to determine ballistic resistance of high hardness armor steels against 7.62 mm armor piercing ammunition.In this methodology,the FEM simulations are used to create training cases for Multilayer Perceptron(MLP) three layer networks.In order to validate FE simulation methodology,ballistic shot tests on 20 mm thickness target were performed according to standard Stanag 4569.Afterwards,the successfully trained ANN(s) is used to predict the ballistic limit thickness of 500 HB high hardness steel armor.Results show that even with limited number of data,FEM-ANN approach can be used to predict ballistic penetration depth with adequate accuracy.
基金supported by the National High Technology Research and Development Program of China(863 Program)(2014AA2649)
文摘In order to efficiently mitigate error propagation and reduce computational complexity, this paper proposes a scheme for traditional cooperative networks, named as dual-threshold symbol selective demodulate-and-forward. In the scheme, two log likelihood ratio(LLR)-based thresholds are devised to measure the reliability of received signals for the relay and the destination, respectively. One of the threshold guarantees that the relay only forwards reliable symbols, thus less error will be propagated to the destination. The other threshold is used at the destination for determining the reliability of symbols received from the source.The destination will directly demodulate reliable symbols received from the source. Otherwise, when the symbols received from the source are not reliable, the maximum ratio combiner(MRC) is used to combine symbols received from the source and the relay.Closed-form expression of the bit error probability(BEP) of the proposed scheme is derived and analyzed under binary phase shift keying(BPSK) modulation. Then, the relationship and closed-form solutions of two LLR-based thresholds are derived. Simulation results prove that the theoretical BEP of the proposed scheme closely matches the simulated ones. The proposed scheme can achieve high performance with low computational complexity compared to existing schemes.
文摘This paper pays its attention on Chinese mobile Internet service( MIS). Chinese MIS is developing so rapidly that the research on the mechanism of the formation of MIS assessment makes significant sense and therefore the three layers construct of the artificial neural network( ANN) theory is applied to address the problem. The final research model contains MIS features including personalization,localization,reachability,connectivity,convenience and ubiquity as the input layer variables,perceived MIS quality and MIS satisfaction as the hidden layer variables and reuse intention as the output layer variable. MIS risk is identified as the mediating variable. Theoretically,the framework is robust and reveals the mechanism of how customers evaluate a certain mobile Internet service. Practically,the model based on ANN should shed some light on how to understand and improve customer perceived mobile Internet service for both MIS giants and new comers.