scholarly journals Tree Node

2020 ◽  
Author(s):  
Keyword(s):  
2014 ◽  
Vol 518 ◽  
pp. 10-21
Author(s):  
Yong Zhang ◽  
Francis Y.L. Chin ◽  
Hing-Fung Ting
Keyword(s):  

2013 ◽  
Vol 765-767 ◽  
pp. 413-416
Author(s):  
Jian Hong Gong ◽  
Bo Li ◽  
Xiao Guang Gao

To deal with the problem of penetration trajectory planning for UAV security issues, an improved bidirectional quintuple tree node expansion algorithm is proposed. Compare to traditional quintuple tree node expansion algorithm, the proposed algorithm could reduce the number of the expanded tree node, and it makes the bidirectional quintuple tree node expansion algorithm more efficient in path planning. By combining the bidirectional quintuple tree node expansion algorithm with multi-step optimization search mechanism, a kind of real-time UAV path planning algorithm is presented.


2013 ◽  
Vol 444-445 ◽  
pp. 1799-1803
Author(s):  
Jin Li ◽  
Xiao Wei Guan ◽  
Shi Bo Guo ◽  
Jian Hui Hou ◽  
Min Bai

For resolving the obscurity and complexity problem of equipment fault diagnosis training, gave out a fault diagnosis simulation training method. Based on the fault tree theory, the method can create the training simulative scenes, by building up the mapping between the fault tree node and the simulative scenes node. With the training subject and complexity requirement, this method can control the randomness and complexity of the training sample, the simulative scenes also can improve the training effect. And the fuzzy reasoning result assessment method can give out the proper training mark.


2010 ◽  
Vol 22 (3) ◽  
pp. 359-377 ◽  
Author(s):  
Joseph Wun-Tat Chan ◽  
Francis Y. L. Chin ◽  
Hing-Fung Ting ◽  
Yong Zhang

2019 ◽  
Vol 11 (7) ◽  
pp. 149
Author(s):  
Yi-Cheng Chen ◽  
Yueh-Peng Chou ◽  
Yung-Chen Chou

Research on digital image processing has become quite popular and rapid in recent years, and scholars have proposed various image verification mechanisms. Similarly , blockchain technology has also become very popular in recent years. This paper proposes a new image verification mechanism based on the Merkle tree technique in the blockchain. The Merkle tree root in the blockchain mechanism provides a reliable environment for storage of image features. In image verification, the verification of each image can be performed by the Merkle tree mechanism to obtain the hash value of the Merkle tree node on the path. In addition, the method combines the Inter-Planetary File System (IPFS) to improve the availability of images. The main purpose of this paper is to achieve the goal of image integrity verification. The proposed method can not only verify the integrity of the image but also restore the tampered area in the case of image tampering. Since the proposed method employs the blockchain mechanism, the image verification mechanism does not need third party resources . The verification method is performed by each node in the blockchain network. The experimental results demonstrate that the proposed method successfully achieved the goal of image authentication and tampered area restoration.


2013 ◽  
Vol 321-324 ◽  
pp. 2780-2784
Author(s):  
Hua Sheng Chen ◽  
Yong Qi ◽  
Wei Hua Li

Failure Detection periodically detects node validity to maintain application layer network stability. The detection cycle interval value is a key parameter for detection scheme performance; there have been few studies on models of analyzing cycle interval value affecting the scheme. We propose a dynamic model of hierarchical application layer multicast tree node failure epidemic SIRS (NFE-SIRS). The NFE-SIRS analyzes statistical node failure in hierarchical application layer multicast tree structure, and models relationship between cycle interval value and detection scheme repair behavior, finally obtains the expected cycle interval value to improve detection scheme performance. Simulation shows that, the NFE-SIRS can dramatically improve detection scheme performance compared with common fixed cycle interval detection scheme.


Sign in / Sign up

Export Citation Format

Share Document