The starting point is a fully automatable cluster-based network model (CNM) (Li et al., J. Fluid Mech., vol. 906, 2021, A21) that kinematically coarse grains the state with clusters and dynamically predicts the transitions in a network model. In the proposed dynamics-augmented CNM (dCNM)...
Yifan, "A Cluster-based priority scheduling algorithm for MAC layer in wireless sensor networks," Journal of Network, vol.6, pp.1507-1513, October 2011.A Cluster-based priority Scheduling Algorithm for MAC Layer in Wireless Sensor Networks[J] . Liyong Bao,Dongfeng Zhao,Yifan Zhao.Journal of ...
In Section 3, we SUHVHQW RXU JHQHUDOL]HG DUFKLWHFWXUH 7KH QHZ FOXVWHU based network model that separates the control and service planes is proposed in Section 4. We conclude the paper in Section 5. 2 Related works In this section, we present the primary achievements LQ WKH ILHOG...
基于聚类的(Cluster-based)协同过滤推荐算法提出了另外一种解决方案。将整个用户空间根据用户的购买习惯和评分特点划 … articles.e-works.net.cn|基于7个网页 2. 基于产业集群 最近一系列基于产业集群(cluster-based)经济发展的成功案例都表明了创新产业和经济发展的本质正在发生着变化。这些案 … ...
The model is consisted by reputation mechanism and cluster. In the model, we take the reputation mechanism for realizing the security transaction; and the network topology structure of CBRM adopts the cluster, so efficiency of reputation management is noticeably raised. In order to improve security,...
To tackle these challenges, we propose a novel cluster-based domain adaptive meta-learning model for cross-domain recommendation (CDAML). Specially, we utilize the adversarial cross-domain methods to introduce domain adaptation into the meta-learning framework, which can transfer domain-independent ...
To bridge this gap, this paper proposes a novel security approach termed Randomized Bi-Phase Authentication Scheme (RBAS), which integrates digital watermarking techniques to fortify both external and internal network security. RBAS not only tackles data availability, confidentiality, and authenticity ...
Wireless sensor network; Sybil attack; Novel attack model; Clustering; 机译:无线传感器网络;Sybil攻击;新型攻击模型;聚类; 入库时间 2022-08-20 07:53:14 相似文献 外文文献 中文文献 专利 1. A Novel Model of Sybil Attack in Cluster-Based Wireless Sensor Networks and Propose a Distributed Algor...
Because the input vector in the neural network structure is mostly abstract data, the BN layer in the hidden layer must be located in the back of the network structure, which makes the hierarchical performance results more profound. Hence, the joint neural network model is designed. The Spark ...
Prolonging network lifetime has become a real challenge in Mobile Wireless Sensor Networks (MWSNs) as sensors have limited energy. In this paper, we propose a Cluster-based Energy-efficient Scheme (CES) for electing a cluster-head to evenly distribute energy consumption in the overall network and...