No abstract available.
Front Matter
Vulnerability Variants and Path Factors in Networks
The vulnerability of the network is one of the core contents of network security research, and there are several variables to test the network vulnerability from the perspective of network structure. For example, toughness, isolated toughness and ...
Network Adjacency Condition for Fractional -Critical Covered Graphs
In resource scheduling network, the availability of resource scheduling can be converted into the existing the fractional factor of the related network graph. The study of the existence of fractional factors in specific graph structure is helpful ...
An Effective Remote Data Disaster Recovery Plan for the Space TT&C System
The critical asset data of the Space Tracking Telemetry and Command (TT&C) System plays an important role in fulfilling space missions. According to analyze the current storing methods and disaster recovery requirements of the data, the remote ...
Research on Progress and Inspiration of Entity Relation Extraction in English Open Domain
In the era of big data, how to extract unrestricted type of entity relations from open domain text is a challenging topic. In order to further understand related deep issues, this paper summarized the latest progress in the field of English entity ...
A SEU Immune Flip-Flop with Low Overhead
In nano-scale CMOS technologies, storage cells such as flip-flops are becoming increasingly sensitive to soft errors caused by harsh radiation effects. This paper proposes a radiation-hardened flip-flop with single event upset (SEU) immunity and ...
An Information and Power Simultaneous Transfer Strategy in UAV and Wireless Rechargeable Sensor Networks
Using UAV to Simultaneous Wireless Information and Power Transfer (SWIPT) can effectively solve sensor energy problems in Wireless Rechargeable Sensor Networks (WRSN). Among current charging techniques, radio frequency (RF) remote charging with a ...
Research on Adaptive Beacon Transmitting Power Based on Vehicle Forecast Error
In view of the problem that the channel resources cannot be allocated optimally in Vehicular Ad Hoc NETwork (VANET) with nodes sending information at fixed power, we propose an adaptive VANET power control algorithm. The algorithm calculates the ...
Analysis of the Effective Scatters for Hyperloop Wireless Communications Using the Geometry-Based Model
A novel 3-dimensional (3D) non-stationary geometry-based deterministic model (GBDM) is proposed in this paper to analyze the effective scatters for the Hyperloop train-to-ground wireless communication. Different from the stochastic models, the ...
Finite-Time Consensus of Second-Order Multi-agent Systems with External Disturbances and Without Velocity Measurements
In order to solve the problem of flocking for multi-agent systems with external disturbances, this paper studies the finite-time consensus of second-order multi-agent systems with external disturbances. Based on the disturbance estimations of ...
A Comparative Study on Key Technologies of Ultra-Reliable Low Latency Communication
The three typical business scenarios of 5G are Enhanced Mobile Broadband, Massive Machine Type Communication, and Ultra-Reliable Low Latency Communication. Among them, Ultra-Reliable Low Latency Communication is one of the key application ...
Research on the Construction of College Campus Sports Culture and the Participation of College Students in Sports Activities
This article selects male and female college students from 5 colleges and universities in Dongguan, Guangdong Province as the research object, using the theoretical background of college students’ participation in sports activities and the ...
Group Movement of Multi-agent Systems with Diverse Delays
Wireless sensor network, which is an important part of Cyber-physical systems, has been widely applied in the fields of artificial intelligence. However, there exist communication delays between nodes in wireless communication network, which may ...
Online Task Allocation in Mobile Crowdsensing with Sweep Coverage and Stability Control
Mobile crowdsensing (MCS) harnesses the sensing capabilities of sensors built into a large number of smart devices to collect and analyze data, which can be used by a large number of mobile participants to perform numerous sensing tasks. Stability ...
Max-Min Fairness Multi-task Allocation in Mobile Crowdsensing
Mobile Crowdsensing (MCS) has become a new paradigm of collecting and merging a large number of sensory data by using rich sensor-equipped mobile terminals. Existing studies focusing on multi-task allocation with the objective of maximizing the ...
Research on High Reliable Wireless Channel Data Cleaning Method
Recent developments in the 5th generation wireless communication system have heightened the need for the propagation characteristics and modeling of wireless channels. As the propagation characteristics and variation rules of radio waves in ...
A New Health Assessment Approach of Lithium-Ion Batteries Under Variable Operation Conditions
The monitoring information of the Lithium-ion batteries is influenced by variable operation conditions. Many health assessment approaches acquire the battery monitoring information to assess the battery health status. However, these approaches ...
Health Evaluation of Lithium Ion Battery Based on Weighted Kalman Filter Algorithm
With the wide application of lithium ion batteries in various fields, the safety and reliability of lithium ion batteries have been put forward higher requirements, and the health evaluation of lithium ion batteries is very important. In this ...
Location Planning of UAVs for WSNs Data Collection Based on Adaptive Search Algorithm
Unmanned Aerial Vehicles (UAVs) have been widely used in data collection, tracking and monitoring in wireless sensor networks (WSNs). By considering the three factors of sensor coverage, energy consumption and Quality of Service (QoS), the WSNs ...
Covid-19 Public Opinion Analysis Based on LDA Topic Modeling and Data Visualization
The Coronavirus Disease 2019 has a huge impact on countries all over the world. The analysis of public opinions during this period is conducive to the government timely understanding and solving the difficulties faced by the people. In this paper, ...
A Capacitated Vehicle Routing Problem with Order Release Time Based on a Hybrid Harmony Search
With the popularity of Internet technology, e-commerce enterprises have rapidly developed. Orders need to be collected before delivery, and vehicles are waiting in the warehouse for most enterprises. This paper considers a capacitated vehicle ...
An Adaptive Data Protection Scheme for Optimizing Storage Space
Data is the main driving factor of artificial intelligence represented by machine learning, and how to ensure data security is one of the severe challenges. In many traditional methods, a single snapshot strategy is used to protect data. In order ...
The Thinned Rectangular Array Based on Modified Interger Genetic Algorithm
Aiming at the optimization of peak sidelobe levels (PSLL) of rectangular thinned arrays with fixed thinned rate and array aperture constraints. This paper proposes a new coding mapping model and an improved integer genetic algorithm (MIGA). ...
A Novel Method to Classify Videos Based VBR Trace
Video classification research has been studied for many years. Traditional video classification methods are based on text, sound, and visual content. However, all these approaches require that the video content can be inspected. If the video ...
Research on Friendvertising-Counter Technology in Big Data
In today’s society, the Internet is rapidly developing, Internet merchants can use the user information they have mastered to analyze consumer preferences. Then they conduct product recommendations to maximize profits. The accumulation of data on ...
A Survey of Researches on Personalized Bundle Recommendation Techniques
The recommender system is widely used in various fields such as movies, music, and products. It has been an effective method to handle the preference matching problem by retrieving the most relevant information and services from a large amount of ...
Estimation of Motor Imagination Based on Consumer-Grade EEG Device
Nowadays, classifying electroencephalogram (EEG) signals based motor imagery tasks is extensively used to control brain-computer interface applications, as a communication bridge between humans and computers. In this paper, we propose signal-to-...
An Overview of Key Technologies and Challenges of 6G
Significant increase has been witnessed in data usage and users over the years for communication. Development of technology is a necessity hence 5G (5th generation) system is about to launch commercially however over a few years even that won’t be ...
Index Terms
- Machine Learning for Cyber Security: Third International Conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, Proceedings, Part II