168 results on '"Guangshun, Li."'
Search Results
52. ACCBN: ant-Colony-clustering-based bipartite network method for predicting long non-coding RNA–protein interactions
- Author
-
Rong Zhu, Guangshun Li, Jin-Xing Liu, Ling-Yun Dai, and Ying Guo
- Subjects
LncRNA–protein interaction ,Ant colony clustering ,Bipartite network ,Predicting ,Computer applications to medicine. Medical informatics ,R858-859.7 ,Biology (General) ,QH301-705.5 - Abstract
Abstract Background Long non-coding RNA (lncRNA) studies play an important role in the development, invasion, and metastasis of the tumor. The analysis and screening of the differential expression of lncRNAs in cancer and corresponding paracancerous tissues provides new clues for finding new cancer diagnostic indicators and improving the treatment. Predicting lncRNA–protein interactions is very important in the analysis of lncRNAs. This article proposes an Ant-Colony-Clustering-Based Bipartite Network (ACCBN) method and predicts lncRNA–protein interactions. The ACCBN method combines ant colony clustering and bipartite network inference to predict lncRNA–protein interactions. Results A five-fold cross-validation method was used in the experimental test. The results show that the values of the evaluation indicators of ACCBN on the test set are significantly better after comparing the predictive ability of ACCBN with RWR, ProCF, LPIHN, and LPBNI method. Conclusions With the continuous development of biology, besides the research on the cellular process, the research on the interaction function between proteins becomes a new key topic of biology. The studies on protein-protein interactions had important implications for bioinformatics, clinical medicine, and pharmacology. However, there are many kinds of proteins, and their functions of interactions are complicated. Moreover, the experimental methods require time to be confirmed because it is difficult to estimate. Therefore, a viable solution is to predict protein-protein interactions efficiently with computers. The ACCBN method has a good effect on the prediction of protein-protein interactions in terms of sensitivity, precision, accuracy, and F1-score.
- Published
- 2019
- Full Text
- View/download PDF
53. A New Weighted Connection-Least Load Balancing Algorithm Based on Delay Optimization Strategy.
- Author
-
Guangshun Li, Heng Ding, Junhua Wu, and Shuzhen Xu
- Published
- 2017
- Full Text
- View/download PDF
54. Dynamic Mobile Crowdsourcing Selection for Electricity Load Forecasting.
- Author
-
Lianyong Qi, Wanchun Dou, Wenping Wang, Guangshun Li, Hairong Yu, and Shaohua Wan 0001
- Published
- 2018
- Full Text
- View/download PDF
55. Resource Scheduling Based on Improved Spectral Clustering Algorithm in Edge Computing.
- Author
-
Guangshun Li, Shuzhen Xu, Junhua Wu, and Heng Ding
- Published
- 2018
- Full Text
- View/download PDF
56. Packet scheduling in rechargeable wireless sensor networks under SINR model
- Author
-
Baogui Huang, Jiguo Yu, Chunmei Ma, Guangshun Li, and Anming Dong
- Subjects
Computer Networks and Communications ,Electrical and Electronic Engineering - Published
- 2023
- Full Text
- View/download PDF
57. A Distributed Power Trading Scheme Based on Blockchain and Artificial Intelligence in Smart Grids
- Author
-
Yue Yu, Junhua Wu, Guangshun Li, and Wangang Wang
- Subjects
Computational Theory and Mathematics ,Artificial Intelligence ,Software ,Theoretical Computer Science - Published
- 2023
- Full Text
- View/download PDF
58. Methods of increasing two-way transmission capacity of wireless ad hoc networks
- Author
-
Kan Yu, Guangshun Li, Jiguo Yu, and Lina Ni
- Subjects
Two-way transmission capacity ,Guard zone ,Cooperative communication ,Telecommunication ,TK5101-6720 ,Electronics ,TK7800-8360 - Abstract
Abstract Two-way communication is required to support control functions like packet acknowledgement and channel feedback. Most previous works on the transmission capacity of wireless ad hoc networks, however, focused on one-way communication; reverse communication from the destination to the source was ignored. In this paper, we first establish mathematical expression for two-way transmission capacity under the fixing transmission distance (i.e., the distance between the source and the destination is a constant), by introducing the concept of two-way outage and setting different rate requirements in both directions. Next, based on the concept of guard zone and cooperative communication, methods of increasing two-way transmission capacity are proposed. Simulation results show that the proposed methods can improve two-way transmission capacity significantly.
- Published
- 2018
- Full Text
- View/download PDF
59. Distributed deterministic broadcasting algorithms under the SINR model.
- Author
-
Xiang Tian 0005, Jiguo Yu, Liran Ma, Guangshun Li, and Xiuzhen Cheng 0001
- Published
- 2016
- Full Text
- View/download PDF
60. 分裂二进制追踪树标签防碰撞协议 (Novel Tag Anticollision Protocol with Splitting Binary Tracking Tree).
- Author
-
Zhanqing Li, Guangshun Li, Junhua Wu, and Lingzeng Kong
- Published
- 2017
- Full Text
- View/download PDF
61. Minimum connected dominating set construction in wireless networks under the beeping model.
- Author
-
Jiguo Yu, Lili Jia, Dongxiao Yu, Guangshun Li, and Xiuzhen Cheng 0001
- Published
- 2015
- Full Text
- View/download PDF
62. Multi-leader election in dynamic sensor networks
- Author
-
Kan Yu, Meng Gao, Honglu Jiang, and Guangshun Li
- Subjects
Multi-leader election ,Dynamic networks ,Energy consumption ,Network lifetime ,Telecommunication ,TK5101-6720 ,Electronics ,TK7800-8360 - Abstract
Abstract The leader election problem is one of the fundamental problems in distributed computing. Different from most of the existing results studying the multi-leader election in static networks or one leader election in dynamic networks, in this paper, we focus on the multi-leader election in dynamic sensor networks where nodes are deployed randomly. A centralized simple leader election algorithm (VLE), a distributed leader election algorithm (NMDLE), and a multi-leader election algorithm (PSMLE) are proposed so as to elect multi-leaders for the purpose of saving energy and prolonging the network lifetime, respectively. Specifically, the proposed algorithms aim at using less leaders to control the whole network, which is controlled by at least k opt leaders, here k opt denotes the optimal number of network partitions. Then we analyze the impacts of the sleep scheme of nodes and node moving on energy consumption and establish a theoretical model for energy cost. Finally, we provide extensive simulation results valuating the correctness of theoretical analysis.
- Published
- 2017
- Full Text
- View/download PDF
63. WDFAD-DBR: Weighting depth and forwarding area division DBR routing protocol for UASNs.
- Author
-
Haitao Yu 0004, Nianmin Yao, Tong Wang 0005, Guangshun Li, Zhenguo Gao, and Guozhen Tan
- Published
- 2016
- Full Text
- View/download PDF
64. NLR family CARD domain containing 5 promotes hypoxia-induced cancer progress and carboplatin resistance by activating PI3K/AKT via carcinoembryonic antigen related cell adhesion molecule 1 in non-small cell lung cancer
- Author
-
Yu Dong, Tao Xu, Dongfan Li, Hua Guo, Xusheng Du, Guangshun Li, Jiakuan Chen, Bo Wang, Peng Wang, Gang Yu, Xuan Zhao, and Ruiqi Xue
- Subjects
Bioengineering ,General Medicine ,Applied Microbiology and Biotechnology ,Biotechnology - Published
- 2022
- Full Text
- View/download PDF
65. Data Processing Delay Optimization in Mobile Edge Computing.
- Author
-
Guangshun Li, Jiping Wang, Junhua Wu, and Jianrong Song
- Published
- 2018
- Full Text
- View/download PDF
66. Method of Resource Estimation Based on QoS in Edge Computing.
- Author
-
Guangshun Li, Jianrong Song, Junhua Wu, and Jiping Wang
- Published
- 2018
- Full Text
- View/download PDF
67. An efficient and secure aggregation encryption scheme in edge computing
- Author
-
Junhua Wu, Xiaofei Sheng, Guangshun Li, Kan Yu, and Junke Liu
- Subjects
Computer Networks and Communications ,Electrical and Electronic Engineering - Published
- 2022
- Full Text
- View/download PDF
68. Blockchain-Based Privacy-Preserving Positioning Data Sharing for IoT-Enabled Maritime Transportation Systems
- Author
-
Keke Gai, Haokun Tang, Guangshun Li, Tianxiu Xie, Shuo Wang, Liehuang Zhu, and Kim-Kwang Raymond Choo
- Subjects
Mechanical Engineering ,Automotive Engineering ,Computer Science Applications - Published
- 2022
- Full Text
- View/download PDF
69. Time-Aware Cross-Platform IoT Service Recommendation with Privacy Preservation
- Author
-
Can Zhang, Junhua Wu, Chao Yan, and Guangshun Li
- Subjects
Q1-390 ,Science (General) ,Article Subject ,Computer Networks and Communications ,T1-995 ,Technology (General) ,Information Systems - Abstract
IoT service recommendation techniques can help a user select appropriate IoT services efficiently. Aiming at improving the recommendation efficiency and preserving the data privacy, the locality-sensitive hashing (LSH) technique is adopted in service recommendation. However, existing LSH-based service recommendation methods ignore the intrinsic temporal feature of IoT services. In light of this challenge, we integrate the temporal feature into the conventional LSH-based method and present a time-aware approach with the capability of privacy preservation for IoT service recommendation across multiple platforms. Experiments on a real-world dataset are conducted to validate the advantage of our proposed approach in terms of accuracy and efficiency in recommendation.
- Published
- 2021
- Full Text
- View/download PDF
70. Dimension Reduction Algorithm Based on Adaptive Maximum Linear Neighborhood Selection in Edge Computing
- Author
-
Junhua Wu, Guangshun Li, Ren Xinrong, Jiabin Cao, and Haili Yu
- Subjects
Computer Networks and Communications ,Computer science ,Dimensionality reduction ,Approximation algorithm ,Filter (signal processing) ,Computer Science Applications ,Dimension (vector space) ,Hardware and Architecture ,Feature (computer vision) ,Signal Processing ,Embedding ,Enhanced Data Rates for GSM Evolution ,Algorithm ,Edge computing ,Information Systems - Abstract
With the rapid development of the Internet of Things (IoT), large quantities of data have been generated. Due to the limitation of the network bandwidth, the time and energy consumption of data transmission are increased. Data feature information can be extracted in real-time by the deployment of a data processing center. In this article, a novel dimension reduction approach is proposed in edge computing. First, a four-layer data processing framework is designed for data acquisition. A task assignment algorithm (TAA) is used for the condition when the edge node stops working due to an accident. Second, a threshold strategy is proposed to filter the data and reduce the dimension. Finally, the dimension reduction algorithm based on adaptive maximum linear neighborhood selection (AMLNS) is proposed. The harmonic geodesic distance is introduced to avoid the deformation of the manifold structure in AMLNS algorithm. Particularly, multiple weights are used to construct linear structure, which has a better embedding effect than single weight. The maximum linear neighborhood error weight is used to calculate the data coordinates. Experimental results show that the TAA improves the task completion rate about 15% and 36% over the random assignment method in mobile layer and edge layer, respectively. Compared with the local linear embedding (LLE), the points distribution of AMLNS is more uniform and regular, the execution time of AMLNS is reduced by about 17%. Furthermore, the embedding errors are less than those of LLE.
- Published
- 2021
- Full Text
- View/download PDF
71. Edge-cloud-enabled matrix factorization for diversified APIs recommendation in mashup creation
- Author
-
Lianyong Qi, Lina Wang, Guangshun Li, Fan Wang, Chao Lv, and Yilei Wang
- Subjects
Information retrieval ,Computer Networks and Communications ,business.industry ,Computer science ,Cloud computing ,Recommender system ,computer.software_genre ,Web API ,Task (project management) ,Matrix decomposition ,Hardware and Architecture ,The Internet ,Mashup ,Enhanced Data Rates for GSM Evolution ,business ,computer ,Software - Abstract
A growing number of web APIs published on the Internet allows mashup developers to discover appropriate web APIs for polishing mashups. Developers often have to manually pick and choose several web APIs from extremely massive candidates, which is a laborious and cumbersome task. Fortunately, recommender system comes into existence. Some approaches perform recommendations in cloud platforms by utilizing historical records of Mashup-API interactions stored in edge nodes. However, many of these methods often pay more attention to recommendation accuracy while ignoring recommendation diversity, i.e., there are usually popular web APIs in recommendation list while most of the other novel web APIs are absent. The poor recommendation diversity may limit the usefulness of the recommendation results due to the lack of novelty. In order to implement an accurate and diversified web API recommendation, a novel MF-based recommendation approach named Div_PreAPI is put forward in this paper. Div_PreAPI integrates a weighting mechanism and neighborhood information into matrix factorization (MF) to implement diversified and personalized APIs recommendations. Finally, we conduct a series of experiments on a real-world dataset. Experimental results show the effectiveness of our proposal.
- Published
- 2021
- Full Text
- View/download PDF
72. Methods of Resource Scheduling Based on Optimized Fuzzy Clustering in Fog Computing.
- Author
-
Guangshun Li, Yuncui Liu, Junhua Wu, Dandan Lin, and Shuaishuai Zhao
- Published
- 2019
- Full Text
- View/download PDF
73. PDM: Privacy-Aware Deployment of Machine-Learning Applications for Industrial Cyber–Physical Cloud Systems
- Author
-
Xiaochun Yin, Victor Chang, Mohanmmad R. Khosravi, Ruichao Mo, Guangshun Li, Xiaolong Xu, and Fahimeh Aghaei
- Subjects
Information privacy ,business.industry ,Computer science ,020208 electrical & electronic engineering ,Cyber-physical system ,Provisioning ,Cloud computing ,02 engineering and technology ,Machine learning ,computer.software_genre ,Computer Science Applications ,Workflow ,Resource (project management) ,Control and Systems Engineering ,Software deployment ,Differential evolution ,0202 electrical engineering, electronic engineering, information engineering ,Artificial intelligence ,Electrical and Electronic Engineering ,business ,computer ,Information Systems - Abstract
The cyber-physical cloud systems (CPCSs) release powerful capability in provisioning the complicated industrial services. Due to the advances of machine learning (ML) in attack detection, a wide range of ML applications are involved in industrial CPCSs. However, how to ensure the implementation efficiency of these applications, and meanwhile avoid the privacy disclosure of the datasets due to data acquisition by different operators, remain challenging for the design of the CPCSs. To fill this gap, in this article a privacy-aware deployment method (PDM), named PDM, is devised for hosting the ML applications in the industrial CPCSs. In PDM, the ML applications are partitioned as multiple computing tasks with certain execution order, like workflows. Specifically, the deployment problem is formulated as a multiobjective problem for improving the implementation performance and resource utility. Then, the most balanced and optimal strategy is selected by leveraging an improved differential evolution technique. Finally, through comprehensive experiments and comparison analysis, PDM is fully evaluated.
- Published
- 2021
- Full Text
- View/download PDF
74. Verification of Circuits Including Black Box Based on TED.
- Author
-
Junhua Wu, Guangshun Li, Xinchuang Liu, and Guang-Sheng Ma
- Published
- 2007
- Full Text
- View/download PDF
75. Complex Data Flow Matching Algorithm Based on TDG.
- Author
-
Guangshun Li, Guang-Sheng Ma, and Donghai Li
- Published
- 2006
- Full Text
- View/download PDF
76. Sharing Methods of Multi-objective Functions Based on TED.
- Author
-
Junhua Wu, Guang-Sheng Ma, and Guangshun Li
- Published
- 2006
- Full Text
- View/download PDF
77. RepShardChain: A Reputation-Based Sharding Blockchain System in Smart City
- Author
-
Xiangmei Bu, Junhua Wu, and Guangshun Li
- Published
- 2022
- Full Text
- View/download PDF
78. Time-Aware Missing Healthcare Data Prediction Based on ARIMA Model
- Author
-
Lingzhen Kong, Guangshun Li, Wajid Rafique, Shigen Shen, Qiang He, Mohammad R. Khosravi, Ruili Wang, and Lianyong Qi
- Subjects
Applied Mathematics ,Genetics ,Biotechnology - Abstract
Healthcare uses state-of-the-art technologies (such as wearable devices, blood glucose meters, electrocardiographs), which results in the generation of large amounts of data. Healthcare data is essential in patient management and plays a critical role in transforming healthcare services, medical scheme design, and scientific research. Missing data is a challenging problem in healthcare due to system failure and untimely filing, resulting in inaccurate diagnosis treatment anomalies. Therefore, there is a need to accurately predict and impute missing data as only complete data could provide a scientific and comprehensive basis for patients, doctors, and researchers. However, traditional approaches in this paradigm often neglect the effect of the time factor on forecasting results. This paper proposes a time-aware missing healthcare data prediction approach based on the autoregressive integrated moving average (ARIMA) model. We combine a truncated singular value decomposition (SVD) with the ARIMA model to improve the prediction efficiency of the ARIMA model and remove data redundancy and noise. Through the improved ARIMA model, our proposed approach (named MHDP
- Published
- 2022
79. Blockchain-based mobile edge computing system
- Author
-
Ren Xinrong, Ruili Wang, Guangshun Li, Wanting Ji, Junhua Wu, Jiabin Cao, and Haili Yu
- Subjects
Information Systems and Management ,Blockchain ,Mobile edge computing ,Edge device ,Computer science ,business.industry ,05 social sciences ,050301 education ,02 engineering and technology ,Minimum spanning tree ,Computer Science Applications ,Theoretical Computer Science ,Scheduling (computing) ,Artificial Intelligence ,Control and Systems Engineering ,Server ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Enhanced Data Rates for GSM Evolution ,business ,0503 education ,Software ,Edge computing ,Block (data storage) ,Computer network - Abstract
With the development of the Internet of Things (IoT), the number of mobile terminal devices is increasing rapidly. Due to high transmission delay and bandwidth limitation, computing power requirements for IoT devices are getting higher and higher. Recently, edge computing is an effective way to reduce system delay, and blockchain solves the security problem of edge computing. In this paper, a three-layer network model, named blockchain-based mobile edge computing system (BMEC), is proposed for clone block identification. Specifically, a neural network based clone block identification (NCBI) method is proposed to prevent clone block attacks. After that, the Prim algorithm is applied to BMEC to generate a weighted undirected graph minimum spanning tree that is composed of edge blocks. This can divide a main chain into several side chains to improve the transaction speed of blockchain. Finally, the blockchain is constructed based on the time slicing round-robin scheduling algorithm to control resources from edge servers and regulate edge devices’ activities based on the predefined rules of priority, application type, and past behavior. Experimental results show that our clone block identification method can achieve block validation effectively in BMEC, and our construction of blockchain delay is lower than conventional edge computing methods.
- Published
- 2021
- Full Text
- View/download PDF
80. Noniterative Sparse LS-SVM Based on Globally Representative Point Selection
- Author
-
Xun Liang, James T. Kwok, Yuefeng Ma, Guangshun Li, Maoli Wang, and Gang Sheng
- Subjects
Computer Networks and Communications ,Computer science ,Iterative method ,Feature vector ,Stability (learning theory) ,02 engineering and technology ,Computer Science Applications ,Support vector machine ,Data set ,Kernel (linear algebra) ,Hyperplane ,Artificial Intelligence ,Least squares support vector machine ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Algorithm ,Software ,Sparse matrix - Abstract
A least squares support vector machine (LS-SVM) offers performance comparable to that of SVMs for classification and regression. The main limitation of LS-SVM is that it lacks sparsity compared with SVMs, making LS-SVM unsuitable for handling large-scale data due to computation and memory costs. To obtain sparse LS-SVM, several pruning methods based on an iterative strategy were recently proposed but did not consider the quantity constraint on the number of reserved support vectors, as widely used in real-life applications. In this article, a noniterative algorithm is proposed based on the selection of globally representative points (global-representation-based sparse least squares support vector machine, GRS-LSSVM) to improve the performance of sparse LS-SVM. For the first time, we present a model of sparse LS-SVM with a quantity constraint. In solving the optimal solution of the model, we find that using globally representative points to construct the reserved support vector set produces a better solution than other methods. We design an indicator based on point density and point dispersion to evaluate the global representation of points in feature space. Using the indicator, the top globally representative points are selected in one step from all points to construct the reserved support vector set of sparse LS-SVM. After obtaining the set, the decision hyperplane of sparse LS-SVM is directly computed using an algebraic formula. This algorithm only consumes O(N2) in computational complexity and O(N) in memory cost which makes it suitable for large-scale data sets. The experimental results show that the proposed algorithm has higher sparsity, greater stability, and lower computational complexity than the traditional iterative algorithms.
- Published
- 2021
- Full Text
- View/download PDF
81. Securing transmissions by friendly jamming scheme in wireless networks
- Author
-
Sheng Xiaofei, Guangshun Li, Haili Yu, and Junhua Wu
- Subjects
Scheme (programming language) ,Computer Networks and Communications ,Computer science ,Jamming ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Theoretical Computer Science ,law.invention ,Artificial Intelligence ,Relay ,law ,Computer Science::Networking and Internet Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Selection (genetic algorithm) ,Computer Science::Cryptography and Security ,Computer Science::Information Theory ,computer.programming_language ,Wireless network ,business.industry ,Node (networking) ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020206 networking & telecommunications ,Hardware and Architecture ,Channel state information ,020201 artificial intelligence & image processing ,Focus (optics) ,business ,computer ,Software ,Computer network - Abstract
In this paper, we focus on the design of optimal relay and jammer selection strategy in relay-aided wireless networks. Different from previous works, assuming that the channel state information (CSI) of illegitimate nodes was available and only an eavesdropper existed, we first analyze disadvantages of joint relay and jammer selection (JRJS), average optimal relay selection (AORS), traditional maximum relay selection (TMRS) schemes. Then, we design an optimal relay and jammer selection strategy where the ratio of received SNRs at the destination generated by any two relays is maximized. By applying proposed strategy, computation complexity can be reduced. Moreover, we derive the lower and upper bounds of the secrecy outage probability based on the assumptions of existence of only illegitimate node and symmetric case for mathematical convenience. Finally, simulation shows that the proposed strategy operating with no CSI of illegitimate nodes can work efficiently compared with JRJS, TMRS and AORS strategies.
- Published
- 2020
- Full Text
- View/download PDF
82. Resource Management Framework Based on the Stackelberg Game in Vehicular Edge Computing
- Author
-
Lin Qingyan, Zhang Ying, Junhua Wu, Wang Maoli, Sheng Xiaofei, and Guangshun Li
- Subjects
Multidisciplinary ,Mobile edge computing ,Article Subject ,General Computer Science ,business.industry ,Computer science ,Quality of service ,Distributed computing ,020206 networking & telecommunications ,020302 automobile design & engineering ,QA75.5-76.95 ,02 engineering and technology ,Subgame perfect equilibrium ,0203 mechanical engineering ,Electronic computers. Computer science ,0202 electrical engineering, electronic engineering, information engineering ,Stackelberg competition ,Resource allocation ,Resource management ,The Internet ,Enhanced Data Rates for GSM Evolution ,Data as a service ,business - Abstract
With the emergence and development of the Internet of Vehicles (IoV), quick response time and ultralow delay are required. Cloud computing services are unfavorable for reducing delay and response time. Mobile edge computing (MEC) is a promising solution to address this problem. In this paper, we combined MEC and IoV to propose a specific vehicle edge resource management framework, which consists of fog nodes (FNs), data service agents (DSAs), and cars. A dynamic service area partitioning algorithm is designed to balance the load of DSA and improve the quality of service. A resource allocation framework based on the Stackelberg game model is proposed to analyze the pricing problem of FNs and the data resource strategy of DSA with a distributed iteration algorithm. The simulation results show that the proposed framework can ensure the allocation efficiency of FN resources among the cars. The framework achieves the optimal strategy of the participants and subgame perfect Nash equilibrium.
- Published
- 2020
- Full Text
- View/download PDF
83. Distributed Shortest Link Scheduling Algorithms With Constant Time Complexity in IoT Under Rayleigh Fading
- Author
-
Jiguo Yu, Anming Dong, Kan Yu, and Guangshun Li
- Subjects
distributed algorithms ,Schedule ,General Computer Science ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,General Engineering ,Shortest link scheduling ,Interference (wave propagation) ,Scheduling (computing) ,Rayleigh fading ,locality ,Distributed algorithm ,TheoryofComputation_ANALYSISOFALGORITHMSANDPROBLEMCOMPLEXITY ,Range (statistics) ,General Materials Science ,Fading ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,lcsh:TK1-9971 ,Time complexity ,Algorithm - Abstract
For the shortest link scheduling (SLS), i.e., scheduling a given set of links with minimum time slots, we consider the distributed algorithm design by using the locality of the protocol model with high fidelity under the Rayleigh fading. Different from most previous works, focusing on distributed algorithm design under the deterministic SINR model, which ignores the fading effects in signal propagation, we first show that a successful link of protocol model is also feasible under the deterministic SINR model, then it can be scheduled successfully with high probability under the Rayleigh fading, by upper-bounding interference outside interference range of protocol model. Then on the basis of this key conclusion, we design LLS-SLS algorithm to solve SLS within (2eΔmaxT + 1)δ log2 ΔmaxT time slots for a constant δ. Specifically, ΔmaxT is the number of a sender's neighbors within some certain range, and can be upper-bounded. Next, based on the concept of random contention, we design CLLS algorithm to schedule all links after costing 4(δ + 1)ΔmaxT ln (ΔmaxT + 1) time slots. In addition, extensive simulations evaluate the performance of two proposed algorithms.
- Published
- 2020
- Full Text
- View/download PDF
84. A new load balancing strategy by task allocation in edge computing based on intermediary nodes
- Author
-
Yao Yonghui, Lin Qingyan, Xiaoxiao Liu, Sheng Xiaofei, Junhua Wu, and Guangshun Li
- Subjects
Edge device ,Computer Networks and Communications ,business.industry ,Computer science ,020208 electrical & electronic engineering ,lcsh:Electronics ,lcsh:TK7800-8360 ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,Edge computing ,Load balancing (computing) ,Computer Science Applications ,State assessment ,lcsh:Telecommunication ,lcsh:TK5101-6720 ,Signal Processing ,0202 electrical engineering, electronic engineering, information engineering ,business ,Load balancing ,Computer network ,Task allocation - Abstract
The latency of cloud computing is high for the reason that it is far from terminal users. Edge computing can transfer computing from the center to the network edge. However, the problem of load balancing among different edge nodes still needs to be solved. In this paper, we propose a load balancing strategy by task allocation in edge computing based on intermediary nodes. The intermediary node is used to monitor the global information to obtain the real-time attributes of the edge nodes and complete the classification evaluation. First, edge nodes can be classified to three categories (light-load, normal-load, and heavy-load), according to their inherent attributes and real-time attributes. Then, we propose a task assignment model and allocate new tasks to the relatively lightest load node. Experiments show that our method can balance load among edge nodes and reduce the completion time of tasks.
- Published
- 2020
85. Privacy-aware Traffic Flow Prediction based on Multi-party Sensor Data with Zero Trust in Smart City
- Author
-
Fan Wang, Guangshun Li, Yilei Wang, Wajid Rafique, Mohammad R. Khosravi, Guanfeng Liu, Yuwen Liu, and Lianyong Qi
- Subjects
Computer Networks and Communications - Abstract
With the continuous increment of city volume and size, a number of traffic-related urban units (e.g., vehicles, roads, buildings, etc.) are emerging rapidly, which plays a heavy burden on the scientific traffic control of smart cities. In this situation, it is becoming a necessity to utilize the sensor data from massive cameras deployed at city crossings for accurate traffic flow prediction. However, the traffic sensor data are often distributed and stored by different organizations or parties with zero trust, which impedes the multi-party sensor data sharing significantly due to privacy concerns. Therefore, it requires challenging efforts to balance the tradeoff between data sharing and data privacy to enable cross-organization traffic data fusion and prediction. In light of this challenge, we put forward an accurate LSH (locality-sensitive hashing)-based traffic flow prediction approach with the ability to protect privacy. Finally, through a series of experiments deployed on a real-world traffic dataset, we demonstrate the feasibility of our proposal in terms of prediction accuracy and efficiency while guaranteeing sensor data privacy.
- Published
- 2022
- Full Text
- View/download PDF
86. A New Heuristic Computation Offloading Method Based on Cache-Assisted Model
- Author
-
Junhua Wu, Cang Fan, Guangshun Li, Zhuqing Xu, Zhenyu Jin, and Yuanwang Zheng
- Subjects
Article Subject ,Computer Networks and Communications ,Electrical and Electronic Engineering ,Information Systems - Abstract
Mobile edge computing (MEC) solves the high latency problem of cloud computing by offloading tasks to edge servers. Due to limited resources, it is necessary to improve the efficiency of computation offloading. However, there is a lot of redundant data transmission between MEC servers and users in the existing methods. Additional data transmission increases the task processing delay. To reduce the total delay, a new cache-assisted computation offloading strategy is proposed. In response to a large number of similar requests from users, a new cache management mechanism is designed. This mechanism can select reusable calculation results more accurately in the cache space through an approximate matching method and improve the cache hit ratio. Then, aiming at the problem of offloading efficiency, the delay optimization problem is transformed into an optimal path problem, a cost function is defined to determine the optimal offloading position, and an improved path planning method is used to plan the optimal offloading path. The simulation results indicate that the proposed scheme can improve the cache hit ratio and reduce the total processing delay of tasks compared with other standard schemes.
- Published
- 2022
- Full Text
- View/download PDF
87. A Privacy Protection Scheme for Facial Recognition and Resolution Based on Edge Computing
- Author
-
Junhua wu, Wenzhen Feng, Guopeng Liang, Tiantian Wang, Guangshun Li, and Yuanwang Zheng
- Subjects
Article Subject ,Computer Networks and Communications ,Information Systems - Abstract
Facial recognition and resolution technology have extensive application scenarios in the era of big data. It ensures the consistency of personal identity in physical space and cyberspace by establishing correspondence between physical objects and network entities. However, massive data brings huge processing pressure to cloud service, and there are data leakage risks about personal information. To address this problem, we propose a privacy security protection scheme for facial recognition and resolution based on edge computing. Firstly, a facial recognition and resolution framework based on edge computing is established, which improves the communication and storage efficiency through task partition and relieves the pressure of cloud computing. Then, a verifiable deletion scheme based on Hidden CP-ABE is proposed to provide fine-grained access control and ensure the safe deletion of target data in the cloud. Moreover, after applying the verifiable deletion method, the safe deletion of the target data in the cloud can be achieved. Finally, the simulation results show the effectiveness and security of the proposed scheme.
- Published
- 2022
- Full Text
- View/download PDF
88. Heuristic Algorithms for One-Slot Link Scheduling in Wireless Sensor Networks under SINR
- Author
-
Hui Deng, Jiguo Yu, Dongxiao Yu, Guangshun Li, and Baogui Huang
- Subjects
Electronic computers. Computer science ,QA75.5-76.95 - Abstract
One-slot link scheduling is important for enhancing the throughput capacity of wireless sensor networks. It includes two aspects: maximum links scheduling (MLS) and maximum weighted links scheduling (MWLS). In this paper we propose two heuristic algorithms for the two NP-hard problems with obvious power assignments under the SINR (signal-to-interference-plus-noise-ratio) model. For MLS, we propose an algorithm MTMA (maximum tolerance and minimum affectance ), which improves the currently best approximation algorithm by 28%–62% on average. For MWLS, we give an effective heuristic algorithm MWMA (maximum weighted and minimum affectance ), which performs better on improving the throughput and reducing the running time. The correctness and performance of our algorithms are confirmed through theoretical analysis and comprehensive simulations.
- Published
- 2015
- Full Text
- View/download PDF
89. Distributed Link Scheduling Algorithm Based on Successive Interference Cancellation in MIMO Wireless Networks
- Author
-
Yuncui Liu, Junhua Wu, Dandan Lin, Yanmin Yin, and Guangshun Li
- Subjects
Article Subject ,lcsh:T ,Computer Networks and Communications ,business.industry ,Computer science ,Wireless network ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,MIMO ,020302 automobile design & engineering ,020206 networking & telecommunications ,Throughput ,02 engineering and technology ,lcsh:Technology ,lcsh:Telecommunication ,Scheduling (computing) ,0203 mechanical engineering ,Single antenna interference cancellation ,lcsh:TK5101-6720 ,Computer Science::Networking and Internet Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,business ,Computer Science::Information Theory ,Information Systems ,Computer network - Abstract
The performance of multiple input multiple output (MIMO) wireless networks is limited mainly by concurrent interference among sensor nodes. Effective link scheduling algorithms with the technology of successive interference cancellation (SIC) can maximize throughput in MIMO wireless networks. Most previous works on link scheduling in MIMO wireless networks did not consider SIC. In this paper, we propose a MIMO-SIC (MSIC) algorithm under the SINR model. First, a mathematical framework is established for the cross-layer optimization of routing and scheduling, with constraints of traffic balance and link capacity. Second, the interference regions are divided to characterize the level of interference between links. Finally, we propose a distributed link scheduling algorithm based on MSIC to eliminate the interference between competing links in the MIMO network. Experimental results show that the MSIC algorithm can increase the end-to-end throughput per unit by approximately 73% on average compared with non-SIC algorithms.
- Published
- 2019
- Full Text
- View/download PDF
90. Compressed-Sensing-based Gradient Reconstruction for Ghost Imaging
- Author
-
Rong Zhu, Ying Guo, and Guangshun Li
- Subjects
Physics and Astronomy (miscellaneous) ,010308 nuclear & particles physics ,Computer science ,business.industry ,Image quality ,General Mathematics ,Computation ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Process (computing) ,Iterative reconstruction ,Ghost imaging ,01 natural sciences ,Search engine ,Compressed sensing ,Compression (functional analysis) ,0103 physical sciences ,Computer vision ,Artificial intelligence ,010306 general physics ,business - Abstract
In this paper, we propose a compression sensing ghost imaging algorithm to reduce the computation time with high image quality via compression sensing based on the total variation reconstruction. A small amount of measurements can be used for shortening the sampling time. The total variation is used as criteria during the search process. It makes the ghost image achieving a high image reconstruction quality. The simulation results demonstrate that the proposed method can enhance imaging quality with the reduced computation time.
- Published
- 2019
- Full Text
- View/download PDF
91. Energy Consumption Optimization With a Delay Threshold in Cloud-Fog Cooperation Computing
- Author
-
Lin Qingyan, Lu Chen, Zhang Ying, Guangshun Li, Yan Jiahe, and Junhua Wu
- Subjects
Consumption (economics) ,Queueing theory ,General Computer Science ,business.industry ,Computer science ,Node (networking) ,Real-time computing ,General Engineering ,tasks scheduling ,020207 software engineering ,Cloud computing ,02 engineering and technology ,Energy consumption ,Nonlinear programming ,Energy consumption optimization ,First-come, first-served ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,fog computing ,business ,lcsh:TK1-9971 ,Edge computing - Abstract
With the rapid development of the Internet of Things (IoT), the number of mobile terminal devices is increasing. Massive data are generated by mobile terminal devices, resulting in high delay and high energy consumption. In most cases, however, a low delay means high energy consumption. To balance energy consumption and delay, we adopt a tradeoff strategy that can realize optimal energy consumption with a delay threshold in this paper. First, we introduce the role of the delay threshold in reducing delay. Then, we describe the delay and energy consumption of the mobile terminal layer, fog node layer and cloud server layer with queue theory. Nonlinear programming is used to solve the energy optimization problem by calculating the optimal workload of each layer. We design a cloud-fog cooperation scheduling algorithm to reduce energy consumption. A task offloading algorithm is also designed to complete tasks when their nodes leave. The experimental results show that the energy consumption is reduced by approximately 22%, while the delay is 12.5% less than the first come first served (FCFS) approach.
- Published
- 2019
92. Dynamic Computation Offloading Based on Graph Partitioning in Mobile Edge Computing
- Author
-
Yan Jiahe, Lin Qingyan, Guangshun Li, Junhua Wu, and Zhang Ying
- Subjects
General Computer Science ,Computer science ,Distributed computing ,Cloud computing ,02 engineering and technology ,Nash equilibrium ,Scheduling (computing) ,node clustering ,Server ,0202 electrical engineering, electronic engineering, information engineering ,Computation offloading ,Overhead (computing) ,General Materials Science ,offloading decision ,Mobile edge computing ,business.industry ,General Engineering ,Graph partition ,020206 networking & telecommunications ,Energy consumption ,optimal strategy ,020201 artificial intelligence & image processing ,Enhanced Data Rates for GSM Evolution ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,Mobile device ,lcsh:TK1-9971 - Abstract
Mobile edge computing is a new cloud computing paradigm that utilizes small-sized edge clouds to provide real-time services to users. These mobile edge clouds (MECs) are located near users, thereby enabling users to seamlessly access applications that are running on MECs and to easily access MECs. Terminal devices can transfer tasks to MEC servers nearby to improve the quality of computing. In this paper, we study multi-user computation offloading problem for mobile-edge computing in a multichannel wireless interference environment. Then, we analyze the overhead of each mobile devices, and we propose strategies for task scheduling and offloading in a multi-user MEC system. For reducing the energy consumption, we propose a server partitioning algorithm that is based on clustering. We formulate the task offloading decision problem as a multi-user game, which always has a Nash equilibrium. The simulation results demonstrate that our scheme outperforms the traditional offloading strategy in terms of energy consumption.
- Published
- 2019
93. RFID Location Algorithm Based on Target Search and Repeat Calibration
- Author
-
Junhua Wu, Yanmin Yin, Chenglong Li, and Guangshun Li
- Subjects
Basis (linear algebra) ,Computer science ,020206 networking & telecommunications ,02 engineering and technology ,Euclidean distance ,Indoor positioning system ,0202 electrical engineering, electronic engineering, information engineering ,Calibration ,Range (statistics) ,General Earth and Planetary Sciences ,020201 artificial intelligence & image processing ,Point (geometry) ,Algorithm ,General Environmental Science - Abstract
In the RFID indoor positioning system, how to realize the positional positioning of the tag to be positioned is an important issue on the basis of ensuring the positioning accuracy. In order to solve this problem, a new search method is proposed in this paper. Firstly, the positioning area to which the tag to be located belongs is determined, the positioning range is narrowed, and the center point of the positioning area is selected as the search starting point, and the target search is performed in a certain step along the six directions in the positioning area until the virtual point RSSI value is searched. When the Euclidean distance between the signal strength value of the tag to be located satisfies the accuracy e, the point coordinate is output, and then improve the positioning accuracy by introducing repeat calibration technology. Finally, the influence of search distance on the improved algorithm is observed by adjusting the size of search step. The simulation results show that the minimum positioning error of the new algorithm is 0.5m and the average positioning accuracy is improved by 40% compared with the original algorithm.
- Published
- 2019
- Full Text
- View/download PDF
94. DV-Hop Localization Algorithm Based on Minimum Mean Square Error in Internet of Things
- Author
-
Chenglong Li, Yuncui Liu, Guangshun Li, Junhua Wu, and Shuaishuai Zhao
- Subjects
Minimum mean square error ,business.industry ,Computer science ,Computer Science::Networking and Internet Architecture ,General Earth and Planetary Sciences ,Internet of Things ,business ,Algorithm ,General Environmental Science ,Arithmetic mean ,Hop (networking) - Abstract
In the practical application of node positioning in the Internet of Things (IOT), the distribution of beacon nodes is generally non-uniform, so there is a certain error in positioning accuracy. In order to make the positioning more accurate, The MMSDV-Hop localization algorithm which improved DV-Hop localization algorithm is proposed in this paper. At first, this algorithm needs to determine the valid beacon nodes in a local range by selecting threshold value, and after using minimization criterion of mean-square error and correcting to obtain the final average hop distance. The dynamic weight is added with the hop number and the number of valid nodes as weights to determine the distance between the unknown nodes and the beacon nodes. A Weighted centroid localization algorithm and a weighted least square method are used to obtain an estimated position separately and the final position is determined by the arithmetic mean value of the two estimated positions. The Matlab simulation experiment shows that compared with the DV-Hop localization algorithm, the improved MMSDV-Hop localization algorithm has increased significantly in the positioning accuracy.
- Published
- 2019
- Full Text
- View/download PDF
95. Trajectory Privacy Protection Method Based on Location Service in Fog Computing
- Author
-
Shuaishuai Zhao, Guangshun Li, Junhua Wu, Dandan Lin, and Yanmin Yin
- Subjects
business.industry ,Computer science ,Privacy protection ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,Bottleneck ,Fog computing ,Location-based service ,0202 electrical engineering, electronic engineering, information engineering ,General Earth and Planetary Sciences ,020201 artificial intelligence & image processing ,business ,Internet of Things ,General Environmental Science ,Computer network ,Anonymity - Abstract
With the development of cloud computing in the Internet of Things and the wide application based on location services, the location trajectory information of mobile users is increasing. The risk of privacy leakage is also increasing. In order to protect the user’s trajectory privacy in the location service, we have designed a trajectory privacy protection method with several properties in the fog-based architecture. Fog computing extends the capabilities of cloud computing to the edge of the network, with local computing and storage capabilities, and a wide geographical mobility. Therefore, this paper uses the fog server instead of the traditional TTP anonymous server in the location-based privacy protection to solve the problem that performance bottleneck and concentrated attack in the TTP server anonymity process, and then completes our design with several properties through the fog server. The TRT algorithm implements k-anonymity of the trajectory. Finally, experimental analysis proves that our method can effectively enhance the user’s trajectory privacy.
- Published
- 2019
- Full Text
- View/download PDF
96. MicroRNA‑217 inhibits the proliferation and invasion, and promotes apoptosis of non‑small cell lung cancer cells by targeting sirtuin 1
- Author
-
Guangshun Li and Shouping Zhong
- Subjects
0301 basic medicine ,Cancer Research ,biology ,Sirtuin 1 ,Cell growth ,miR-217 ,Cell ,Cancer ,AMPK ,Articles ,Cell cycle ,medicine.disease ,sirtuin 1 ,03 medical and health sciences ,030104 developmental biology ,0302 clinical medicine ,medicine.anatomical_structure ,Oncology ,Apoptosis ,030220 oncology & carcinogenesis ,microRNA ,biology.protein ,medicine ,Cancer research ,non-small cell lung cancer - Abstract
Non-small cell lung cancer (NSCLC) is a common malignancy worldwide. MicroRNA (miR)-217 and sirtuin 1 (SIRT1) have been reported to play significant roles in different types of cancer, such as osteosarcoma and prostate cancer; however, the association between miR-217 and SIRT1 in the cell proliferation, apoptosis and invasion of NSCLC remain unknown. Thus, the present study aimed to investigate the roles of miR-217 and SIRT1 in NSCLC. The expression levels of miR-217 and SIRT1 were detected via reverse transcription-quantitative (RT-q)PCR and western blot analyses. The effect of miR-217 on A549 and H1299 cell proliferation, apoptosis and invasion was assessed via the Cell Counting Kit-8, flow cytometry and Transwell assays, respectively. In addition, the association between SIRT1 and miR-217 was predicted using the TargetScan database, and verified via the dual-luciferase reporter assay, and RT-qPCR and western blot analyses. The results demonstrated that miR-217 expression was significantly downregulated, while SIRT1 expression was significantly upregulated in A549 and H1299 cells compared with the human bronchial epithelial cells. Furthermore, transfection with miR-217 mimic significantly inhibited A549 and H1299 cell proliferation and invasion, and induced A549 and H1299 cell apoptosis. The results of the dual-luciferase reporter assay and western blot analysis confirmed that SIRT1 is a target gene of miR-217. In addition, miR-217 inhibited the activation of AMP-activated protein kinase (AMPK) and mTOR signaling. Taken together, the results of the present study suggest that miR-217 inhibits A549 and H1299 cell proliferation and invasion, and induces A549 and H1299 cell apoptosis by targeting SIRT1 and inactivating the SIRT1-mediated AMPK/mTOR signaling pathway. Thus, miR-217 may be used as a potential therapeutic target for the treatment of patients with NSCLC.
- Published
- 2021
- Full Text
- View/download PDF
97. On Constructing t-Spanner in IoT under SINR
- Author
-
Wenping Chen, Xiujuan Zhang, Yuqing Zhu, Deying Li, Guangshun Li, and Yongcai Wang
- Subjects
Technology ,Optimization problem ,Article Subject ,Computer Networks and Communications ,Computer science ,0102 computer and information sciences ,02 engineering and technology ,TK5101-6720 ,01 natural sciences ,TheoryofComputation_ANALYSISOFALGORITHMSANDPROBLEMCOMPLEXITY ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,Wireless network ,business.industry ,Node (networking) ,Spanner ,020206 networking & telecommunications ,Graph ,Randomized algorithm ,Stretch factor ,010201 computation theory & mathematics ,Distributed algorithm ,Independent set ,Telecommunication ,business ,Information Systems ,Computer network ,MathematicsofComputing_DISCRETEMATHEMATICS - Abstract
Following the recent advances in the Internet of Things (IoT), it is drawing lots of attention to design distributed algorithms for various network optimization problems under the SINR (Signal-to-Interference-and-Noise-Ratio) interference model, such as spanner construction. Since a spanner can maintain a linear number of links while still preserving efficient routes for any pair of nodes in wireless networks, it is important to design distributed algorithms for spanners. Given a constant t > 1 as the required stretch factor, the problem of our concern is to design an efficient distributed algorithm to construct a t -spanner of the communication graph under SINR such that the delay for the task completion is minimized, where the delay is the time interval between the time slot that the first node commences its operation to the time slot that all the nodes finish their task of constructing the t -spanner. Our main contributions include four aspects. First, we propose a proximity range and proximity independent set (PISet) to increase the number of nodes transmitting successfully at the same time in order to reduce the delay. Second, we develop a distributed randomized algorithm SINR-Spanner to construct a required t -spanner with high probability. Third, the approximation ratio of SINR-Spanner is proven to be a constant. Finally, extensive simulations are carried out to verify the effectiveness and efficiency of our proposed algorithm.
- Published
- 2021
98. An Edge Trajectory Protection Approach Using Blockchain
- Author
-
Yue Zhang, Meikang Qiu, Guangshun Li, Keke Gai, and Meiquan Wang
- Subjects
Authentication ,Computer science ,Distributed computing ,Trajectory ,Entropy (information theory) ,Enhanced Data Rates for GSM Evolution ,Information protection policy ,Block (data storage) ,Anonymity ,Protection mechanism - Abstract
With the popularity of edge-based trajectory applications, application providers have accumulated a large amount of user trajectory data. However, direct use of trajectory data containing rich privacy information has the risk of leaking user privacy. In this paper, we propose an edge trajectory protection approach using the technique of blockchain. This protection mechanism not only takes account of users information protection and identity authentication in block generation, but considers the screening mechanism to ensure the integrity of most authorized nodes. We propose trajectory entropy suppression method that combines it with a cost function evaluation sequence and achieve collaboration between regions by deploying smart contracts. Our experimental results demonstrate the efficiency and effectiveness of our proposed model.
- Published
- 2021
- Full Text
- View/download PDF
99. Blockchain-Based Privacy-Preserving Medical Data Sharing Scheme Using Federated Learning
- Author
-
Yue Zhang, Meikang Qiu, Huiru Zhang, Guangshun Li, and Keke Gai
- Subjects
Information privacy ,Security analysis ,Blockchain ,business.industry ,Computer science ,Big data ,Hash function ,Computer security ,computer.software_genre ,Data sharing ,Differential privacy ,business ,Raw data ,computer - Abstract
With the booming development of big data technology and health care applications, data in the medical field is characterized by explosive growth, and medical data is valuable, which is the privacy data of patients. However, the characteristics and storage environment of medical big data have brought great challenges to the realization of privacy protection of medical data. In order to ensure the protection of data privacy when sharing medical data, we propose a medical data privacy protection framework based on blockchain (MPBC). In this framework, we protect privacy by adding differential privacy noise into federated learning. In addition, the growing volume of medical data could make blockchain storage problematic. Therefore, a storage mode is proposed to reduce the storage burden of blockchain. The raw data are stored locally and only the hash value calculated by IPFS are stored in blockchain. To enhance the performance, a mechanism is used to validate transactions and aggregate the model. Security analysis shows that our method is a safe and effective way to implement medical data.
- Published
- 2021
- Full Text
- View/download PDF
100. Multi-sensor Data Fusion Algorithm Based on Adaptive Trust Estimation and Neural Network
- Author
-
Wenzhen Feng, Junhua Wu, Wang Maoli, Zhao Xuexin, Guangshun Li, and Haili Yu
- Subjects
Artificial neural network ,Computer science ,05 social sciences ,Exponential smoothing ,050801 communication & media studies ,Sensor fusion ,computer.software_genre ,Multi sensor ,0508 media and communications ,0502 economics and business ,Data fusion algorithms ,Redundancy (engineering) ,050211 marketing ,Data mining ,computer - Abstract
Multi-sensor data fusion technique plays a key role in the agricultural services such as data collection and processing. However, the collected data usually is featured by redundancies and errors, which deteriorate the reliability of network. In this paper, based on adaptive trust estimation, we propose a multisensor data fusion algorithm in Trust Neural Network (T-NN), aiming to solve the problem of low accuracy and poor stability of multi-sensor data fusion. In particular, the original data collected by the sensors first are pre-processed by exponential smoothing. Then, trust estimation model is applied to calculate the value of trust among the sensing nodes and optimize the data, and the performance of redundancy and reliability are enhanced. Furthermore, the data optimized is introduced into BP neural network for training and fusion. Extensive simulations show that the algorithm proposed in this paper greatly outperforms adaptive weighted average model and traditional BPNN model, in terms of the accuracy of data fusion.
- Published
- 2020
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.