505 research outputs found
Distributed MAC Protocol Supporting Physical-Layer Network Coding
Physical-layer network coding (PNC) is a promising approach for wireless
networks. It allows nodes to transmit simultaneously. Due to the difficulties
of scheduling simultaneous transmissions, existing works on PNC are based on
simplified medium access control (MAC) protocols, which are not applicable to
general multi-hop wireless networks, to the best of our knowledge. In this
paper, we propose a distributed MAC protocol that supports PNC in multi-hop
wireless networks. The proposed MAC protocol is based on the carrier sense
multiple access (CSMA) strategy and can be regarded as an extension to the IEEE
802.11 MAC protocol. In the proposed protocol, each node collects information
on the queue status of its neighboring nodes. When a node finds that there is
an opportunity for some of its neighbors to perform PNC, it notifies its
corresponding neighboring nodes and initiates the process of packet exchange
using PNC, with the node itself as a relay. During the packet exchange process,
the relay also works as a coordinator which coordinates the transmission of
source nodes. Meanwhile, the proposed protocol is compatible with conventional
network coding and conventional transmission schemes. Simulation results show
that the proposed protocol is advantageous in various scenarios of wireless
applications.Comment: Final versio
Approximating Word Ranking and Negative Sampling for Word Embedding
CBOW (Continuous Bag-Of-Words) is one of the most commonly used techniques to generate word embeddings in various NLP tasks. However, it fails to reach the optimal performance due to uniform involvements of positive words and a simple sampling distribution of negative words. To resolve these issues, we propose OptRank to optimize word ranking and approximate negative sampling for bettering word embedding. Specifically, we first formalize word embedding as a ranking problem. Then, we weigh the positive words by their ranks such that highly ranked words have more importance, and adopt a dynamic sampling strategy to select informative negative words. In addition, an approximation method is designed to efficiently compute word ranks. Empirical experiments show that OptRank consistently outperforms its counterparts on a benchmark dataset with different sampling scales, especially when the sampled subset is small. The code and datasets can be obtained from https://github.com/ouououououou/OptRank
Risk Evaluation for Virtual Enterprise
Virtual Enterprise is the potential mode of enterprise in the future. The risk management for virtual enterprise is the new research area recently. In virtual enterprise, the enterprise operation is always organized by project mode and there is always less historical data and there are many uncertain factors. Hence, in this paper, the fuzzy synthetic evaluation model for the risk evaluation of virtual enterprise is established focus on the project mode and uncertain characteristics of virtual enterprise. In the 5 levels model, the goal and sub-goal of the enterprise, the process of the project, as well as the risk event and risk factors are considered. The case study suggests that the method is useful
CD: Fine-grained 3D Mesh Reconstruction with Twice Chamfer Distance
Monocular 3D reconstruction is to reconstruct the shape of object and its
other information from a single RGB image. In 3D reconstruction, polygon mesh,
with detailed surface information and low computational cost, is the most
prevalent expression form obtained from deep learning models. However, the
state-of-the-art schemes fail to directly generate well-structured meshes, and
most of meshes have two severe problems Vertices Clustering (VC) and Illegal
Twist (IT). By diving into the mesh deformation process, we pinpoint that the
inappropriate usage of Chamfer Distance (CD) loss is the root causes of VC and
IT problems in the training of deep learning model. In this paper, we initially
demonstrate these two problems induced by CD loss with visual examples and
quantitative analyses. Then, we propose a fine-grained reconstruction method
CD by employing Chamfer distance twice to perform a plausible and adaptive
deformation. Extensive experiments on two 3D datasets and comparisons with five
latest schemes demonstrate that our CD directly generates well-structured
meshes and outperforms others by alleviating VC and IT problems.Comment: under major review in TOM
Risk Sorting for Enterprise under EC Environments
With the rapid development of internet and emerging of global economic, risk management for enterprise under EC (Electronic Commerce) environments has drawn attentions of many researchers. In this paper, the characteristics of risk for EC enterprise are analyzed. Further, focused on the project organization mode and the uncertain factor of the enterprise under EC, which are main different characteristics from the conventional enterprise, enterprise risk sorting, which is one of the key problems of risk management under EC environments, is studied by using fuzzy ISODATA cluster method based on fuzzy describing of risks. Case study suggests the effectiveness of the method
CBR Based Risk Management for Virtual Organization
After researching various factors that influence the management and decisions on risk management of virtual organization, CBR based risk management for virtual organization is proposed in this paper. Relevant theories of fuzzy mathematics are utilized in the process of modifying the corresponding similar cases. Correct application of the new method is demonstrated substantially through instance simulation
A green intelligent routing algorithm supporting flexible QoS for many-to-many multicast
The tremendous energy consumption attributed to the Information and Communication Technology (ICT) field has become a persistent concern during the last few years, attracting significant academic and industrial efforts. Networks have begun to be improved towards being “green”. Considering Quality of Service (QoS) and power consumption for green Internet, a Green Intelligent flexible QoS many-to-many Multicast routing algorithm (GIQM) is presented in this paper. In the proposed algorithm, a Rendezvous Point Confirming Stage (RPCS) is first carried out to obtain a rendezvous point and the candidate Many-to-many Multicast Sharing Tree (M2ST); then an Optimal Solution Identifying Stage (OSIS) is performed to generate a modified M2ST rooted at the rendezvous point, and an optimal M2ST is obtained by comparing the original M2ST and the modified M2ST. The network topology of Cernet2, GéANT and Internet2 were considered for the simulation of GIQM. The results from a series of experiments demonstrate the good performance and outstanding power-saving potential of the proposed GIQM with QoS satisfied
- …