distribution scheme
Recently Published Documents


TOTAL DOCUMENTS

681
(FIVE YEARS 95)

H-INDEX

25
(FIVE YEARS 6)

2022 ◽  
Vol 355 ◽  
pp. 02065
Author(s):  
Luying Dong ◽  
Shuhan Ma ◽  
Yajuan Han ◽  
Yipeng Zhou

The traditional demand split logistics distribution schemes are mainly based on vehicle distribution. In recent years, with the rapid development of civil UAVs, the use of UAVs for distribution will be more efficient and economical in some specific conditions. In this paper, through the analysis of the advantages of UAV distribution, we simulate the demands and distribution schemes in real scene, especially in remote mountainous areas. And then, we propose to define a demand-splitting distribution scheme of vehicle-supported UAV, which ensures the customer point will be satisfy demand when the loading capacity of the UAV is exceeded. This scheme aims to provides a realizable distribution scheme for the customers point in mountainous areas with large demand.


Author(s):  
Akber Ali Khan ◽  
Samiulla Itoo ◽  
Vinod Kumar ◽  
Musheer Ahmad ◽  
Srinivas Jangirala

2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Jie Huang ◽  
Xiaowen Wang ◽  
Wei Wang ◽  
Zhenyu Duan

With the development of IoT (Internet of Things), the demand for security is increasing day by day. However, the traditional key distribution scheme is high in cost and complicated in calculation, so a lightweight key distribution scheme is urgently needed. In this paper, a novel key distribution scheme based on transmission delay is proposed. Based on the experimental observation, we find that the statistical characteristics of their transmission delays are about the same if any two terminals transmit the equal-length packets on the Internet and are different for different transmission paths. Accordingly, we propose a method to customize transmission delays. On the Internet, we have deployed 7 forwarding hosts. By randomly determining the forwarding path of packets, we can get customized transmission delay sets. Then, these sets are processed, respectively, by correcting outlier, normalizing, quantizing, encoding, and reconciling so as to be able to realize key distribution between two sides. Next, we design a key distribution protocol and a key distribution system, which consists of a Management Center, a Packet Forwarding Network, and Users. Finally, we reason the security of the key distribution protocol with formal analysis tools.


Sensors ◽  
2021 ◽  
Vol 21 (21) ◽  
pp. 7368
Author(s):  
Yongje Shin ◽  
Hyunseok Choi ◽  
Youngju Nam ◽  
Euisin Lee

By leveraging the development of mobile communication technologies and due to the increased capabilities of mobile devices, mobile multimedia services have gained prominence for supporting high-quality video streaming services. In vehicular ad-hoc networks (VANETs), high-quality video streaming services are focused on providing safety and infotainment applications to vehicles on the roads. Video streaming data require elastic and continuous video packet distributions to vehicles to present interactive real-time views of meaningful scenarios on the road. However, the high mobility of vehicles is one of the fundamental and important challenging issues for video streaming services in VANETs. Nevertheless, previous studies neither dealt with suitable data caching for supporting the mobility of vehicles nor provided appropriate seamless packet forwarding for ensuring the quality of service (QoS) and quality of experience (QoE) of real-time video streaming services. To address this problem, this paper proposes a video packet distribution scheme named Clone, which integrates vehicle-to-vehicle and vehicle-to-infrastructure communications to disseminate video packets for video streaming services in VANETs. First, an indicator called current network quality information (CNQI) is defined to measure the feature of data forwarding of each node to its neighbor nodes in terms of data delivery ratio and delay. Based on the CNQI value of each node and the trajectory of the destination vehicle, access points called clones are selected to cache video data packets from data sources. Subsequently, packet distribution optimization is conducted to determine the number of video packets to cache in each clone. Finally, data delivery synchronization is established to support seamless streaming data delivery from a clone to the destination vehicle. The experimental results show that the proposed scheme achieves high-quality video streaming services in terms of QoS and QoE compared with existing schemes.


2021 ◽  
Vol 87 (11) ◽  
pp. 807-819
Author(s):  
Weining Zhu ◽  
Zeliang Zhang ◽  
Zaiqiao Yang ◽  
Shuna Pang ◽  
Jiang Chen ◽  
...  

Unlike traditional remote sensing inversion, this study proposes a new distribution–distribution scheme, which uses statistical inferences to estimate the probability distribution of in-water components based on the probability distribution of the observed spectra. The distribution–distribution scheme has the advantages that it rapidly gives the statistical information of the water of interest, assists the traditional scheme in improving models, and provides more valuable information for water classification and aquatic environment analysis. In this study, based on Landsat-8 images, we analyzed the spectral probability distributions of 688 global waters and found that many of them were normal, log normal, and exponential distributions with diverse patterns in distribution parameters such as the mean, standard deviation, skewness, and kurtosis. Using simulated and field-measured data, we propose a bootstrap-based distribution–distribution scheme and develop some simple remote sensing statistical inference models to estimate the distribution parameters of yellow substance in water.


2021 ◽  
Vol 2096 (1) ◽  
pp. 012008
Author(s):  
S V Belim ◽  
S Y Belim

Abstract In the article, the protocol for key pre-distribution using a threshold scheme is proposed. The Blom pre-distribution scheme is used as the basis. Shamir secret sharing scheme is used for threshold scheme. A polynomial of three variables is used to form key materials. Messaging between users is required to generate a key. The threshold scheme (3,4) is used to calculate the encryption key.


Energies ◽  
2021 ◽  
Vol 14 (19) ◽  
pp. 6069
Author(s):  
Yu Sun ◽  
Rijing Zhao ◽  
Siyuan Wu ◽  
Dong Huang

The evaporator in a frost-free refrigerator typically has more tube rows, but frost deposition reduces along the airflow direction. Correspondingly, the evaporator fin distribution is thinner in the upstream rows but denser downstream, and a good match between frost and fin distribution is achieved to recover evaporator capacity loss. However, quantitative design principles of non-uniform fin distribution are lacking. A quasi-static frosting evaporator model is established and experimentally verified considering a three-dimensional (3D) evaporator, 1D frost growth and 1D non-uniform fin distribution. An optimization method for row-by-row fin distribution of a multi-row frosting evaporator is proposed based on the air pressure drop’s increase rate. When the increase rate in the air pressure drop of each row is almost equal, the smallest overall evaporator pressure drop is obtained, leading to the highest air flowrate and the greatest evaporator capacity. By applying the method, the air flowrate and the evaporator capacity increase by 5.5% and 4.6%, respectively, compared to the original fin distribution scheme. Moreover, the robustness of the optimization method is validated under wide temperature and humidity operating conditions. An equivalent implementation under an initial no-frost condition is also proposed to facilitate the optimization method without calculating the whole frosting process.


Sign in / Sign up

Export Citation Format

Share Document