ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Publication Date: 2015-12-25
    Description: The dynamics of a discrete-time hyperchaotic system and the amplitude control of Hopf bifurcation for a stochastic discrete-time hyperchaotic system are investigated in this paper. Numerical simulations are presented to exhibit the complex dynamical behaviors in the discrete-time hyperchaotic system. Furthermore, the stochastic discrete-time hyperchaotic system with random parameters is transformed into its equivalent deterministic system with the orthogonal polynomial theory of discrete random function. In addition, the dynamical features of the discrete-time hyperchaotic system with random disturbances are obtained through its equivalent deterministic system. By using the Hopf bifurcation conditions of the deterministic discrete-time system, the specific conditions for the existence of Hopf bifurcation in the equivalent deterministic system are derived. And the amplitude control with random intensity is discussed in detail. Finally, the feasibility of the control method is demonstrated by numerical simulations.
    Print ISSN: 1026-0226
    Electronic ISSN: 1607-887X
    Topics: Mathematics
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 2
    Publication Date: 2013-11-27
    Description: In wireless sensor networks, coverage holes are caused by energy depletion at some nodes, and the aim of this paper is to study how to utilize the redundant nodes with remaining energy. Particularly, this paper proposes a vector algebra based algorithm by exploring redundant nodes as an extra dimension for coverage compensation. This algorithm consists of two parts. One is to find the locations of potential redundant nodes for coverage compensation; and the other is to opportunistically select the best redundant nodes by jointly considering the hole boundaries and the remaining energy of nodes. Simulation results are provided to demonstrate that the proposed algorithm minimizes the energy consumption when repairing the holes for full coverage. Furthermore, compared with other algorithms, the proposed one exhibits better performance in terms of moving distance and energy consumption.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 3
    Publication Date: 2013-12-20
    Description: Because of the special nature of wireless sensor networks, data fusion process is vulnerable to attacks by the destroyer, which is useful for reducing the network communication overhead and improving the data transmission efficiency. Therefore, it is very essential to provide transmission with high security and low energy consumption for sensitive data fusion in wireless sensor network. In this paper, a data fusion algorithm of privacy protection based on Query of Server (Qos) and hierarchical multilayers was put forward, which divided the required privacy protection levels according to different safety requirements, and set up hierarchical network models. In data fusion process, delay constraint was added to guarantee service quality of Qos, and this would reduce energy consumption overhead. Meanwhile, it would guarantee the accuracy of the data and reduce the probability of the whole network information exposed.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 4
    Publication Date: 2017-01-01
    Description: In this work, we explore the transition of absolute instability and convective instability in a compressible inviscid shear layer, through a linear spatial-temporal instability analysis. From linearized governing equations of the shear layer and the ideal-gas equation of state, the dispersion relation for the pressure perturbation was obtained. The eigenvalue problem for the evolution of two-dimensional perturbation was solved by means of shooting method. The zero group velocity is obtained by a saddle point method. The absolute/convective instability characteristics of the flow are determined by the temporal growth rate at the saddle point. The absolute/convective nature of the flow instability has strong dependence on the values of the temperature ratio, the velocity ratio, the oblique angle, and M number. A parametric study indicates that, for a great value of velocity ratio, the inviscid shear layer can transit to absolute instability. The increase of temperature ratio decreases the absolute growth rate when the temperature ratio is large; the effect of temperature ratio is opposite when the temperature ratio is relatively small. The obliquity of the perturbations would cause the increase of the absolute growth rate. The effect of M number is different when the oblique angle is great and small. Besides, the absolute instability boundary is found in the velocity ratio, temperature ratio, and M number space.
    Print ISSN: 1687-5966
    Electronic ISSN: 1687-5974
    Topics: Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 5
    Publication Date: 2018-07-09
    Description: This paper is devoted to studying the analytical series solutions for the differential equations with variable coefficients. By a general residual power series method, we construct the approximate analytical series solutions for differential equations with variable coefficients, including nonhomogeneous parabolic equations, fractional heat equations in 2D, and fractional wave equations in 3D. These applications show that residual power series method is a simple, effective, and powerful method for seeking analytical series solutions of differential equations (especially for fractional differential equations) with variable coefficients.
    Print ISSN: 1026-0226
    Electronic ISSN: 1607-887X
    Topics: Mathematics
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 6
    Publication Date: 2017-01-01
    Description: Internal attack is a crucial security problem of WSN (wireless sensor network). In this paper, we focus on the internal attack detection which is an important way to locate attacks. We propose a state transition model, based on the continuous time Markov chain (CTMC), to study the behaviors of the sensors in a WSN under internal attack. Then we conduct the internal attack detection model as the epidemiological model. In this model, we explore the detection rate as the rate of a compromised state transition to a response state. By using the Bellman equation, the utility for the state transitions of a sensor can be written in standard forms of dynamic programming. It reveals a natural way to find the optimal detection rate that is by maximizing the total utility of the compromised state of the node (the sum of current utility and future utility). In particular, we encapsulate the current state, survivability, availability, and energy consumption of the WSN into an information set. We conduct extensive experiments and the results show the effectiveness of our solutions.
    Print ISSN: 1026-0226
    Electronic ISSN: 1607-887X
    Topics: Mathematics
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...