This paper proposes an adaptive data aggregation for wireless sensor networks in the TD-SCDMA *** design explores a data transmission approach: the atomic MAC layer unit is sent through the TD-SCDMA radio channel by d...
详细信息
This paper proposes an adaptive data aggregation for wireless sensor networks in the TD-SCDMA *** design explores a data transmission approach: the atomic MAC layer unit is sent through the TD-SCDMA radio channel by dynamically aggregating one or more sensor packets.A trade-off exists between the desire to reduce header and physical layer overhead by making frames larger,and the need to reduce frame error rates in the noisy channel by using small frame *** the optimum depends on the channel *** analysis shows that the proposed approach is scalable in maintenance overheads,and performs efficiently in the visible *** implement the proposed protocol in a 3G wireless router and test its feasibility and applicability by a 20-node wireless sensor *** further conduct extensive simulations to examine the efficiency and scalability of our scheme with varied network settings.
To build a high-efficient cloud platform for virtual resources, we deployed a virtual resource pool based on Hyper-V Virtualization to meet people's requirements. In this way, users can get a free VM from the pool...
详细信息
ISBN:
(纸本)9781629939865
To build a high-efficient cloud platform for virtual resources, we deployed a virtual resource pool based on Hyper-V Virtualization to meet people's requirements. In this way, users can get a free VM from the pool in less time compared with creating a new one. A VM usually includes an operating system, the network to communicate with cloud platform and end-users, the shared storage space and other configurations. It will be presented that the deployment process of the resource pool and the infrastructure of cloud platform in this paper. The time to wait for an available VM will take just about 1/3 of the original time after using resource pool.
Position Detection is an important application in Wireless Sensor Network and has received much research ***,it has been used for indoor navigation for people with visual ***,experiment and evaluation of these systems...
详细信息
Position Detection is an important application in Wireless Sensor Network and has received much research ***,it has been used for indoor navigation for people with visual ***,experiment and evaluation of these systems usually incur a high cost in that users with disability must be *** address this issue,this paper proposes an Oriented Random Walk Model for the simulation test before sensors are *** can be reduced and more efficient deployment can be deployed.
The influence of substitution Co for Ni on the phase structure and electrochemical properties of LaMgNi phase composition alloys have been investigated *** structure analyses show that the alloys are mainly composed o...
详细信息
The influence of substitution Co for Ni on the phase structure and electrochemical properties of LaMgNi phase composition alloys have been investigated *** structure analyses show that the alloys are mainly composed of *** as CaCus phase,PrCo phase and CeCo *** electrochemical measurement showed that alloy electrodes could be activated in 2-3 cycles,with increasing of x value,the maximum discharge capacity gradually increased from 345.7 mA·h/g(x = 0.0) to 382.8 tnA·h/g(x = 2.0),cyclic stability increased a little,but high-rate dischargeability(HRD) decreased *** is found that the HRD was mainly controlled by the electrocatalytic activity on the alloy electrode surface,and the improvement of cyclic stability was due to the increase of CaCus phase and CeCo *** phase increased with increasing Co *** phase has a small corrosion rate in the electrochemical cycle.
The random numbers are used in all areas of computer based systems. In general, random numbers are spawned from big seed values that is retrieved from complex formulas. The random number algorithm is proposed to gener...
详细信息
The random numbers are used in all areas of computer based systems. In general, random numbers are spawned from big seed values that is retrieved from complex formulas. The random number algorithm is proposed to generate the random numbers in low cost and efficient manner. The seed values are collected from parameters of clients and server for example mouse movement values and registry values of the system. The generated random numbers are tested against brute force attack testing tool. Also, it is compared with existing random generating algorithms and it is found the proposed algorithm is very well suitable for system with lowest configuration.
This paper is the preface to the Third Workshop on Urgent *** Urgent Computing workshops have been traditionally embedded in frame of internationalconference of Computational science (ICCS) since 2012. They are aimed...
详细信息
This paper is the preface to the Third Workshop on Urgent *** Urgent Computing workshops have been traditionally embedded in frame of internationalconference of Computational science (ICCS) since 2012. They are aimed to develop a dialogue on the present and future ofresearch and applications associated with the large-scale computations for decision support in critical situations. The key workshop topics in 2014 are: methods and principles of urgent computing, middleware, platforms and infrastructures, simulation-based decision support for complex systems control, interactive visualization and virtual reality for decision support in emergency situations, domain-area applications to emergency situations, including natural and man-made disasters, *** problems, epidemics, criminal acts, etc.
Adopting MTS815 hydraulic servo system,through triaxial compressive deformation and triaxial creep experiment result of tunnel supports,research the stress-strain and creep properties of tunnel *** results show that d...
详细信息
Adopting MTS815 hydraulic servo system,through triaxial compressive deformation and triaxial creep experiment result of tunnel supports,research the stress-strain and creep properties of tunnel *** results show that deformation process of support concrete displays obvious strain softening,instantaneous elastic strain increments with stress level and strain of creep curve appears increased trend with *** curve of concrete drive to a fixed value when stress level is lower and strain rate of concrete more and more *** generalized Kelvin model of three element and LUBBY2 model are feasible as creep model of concrete *** on the relation of creep characteristic curves for rock salt,the creep parameters of generalized Kelvin model and LUBBY2 model are advanced.
An Integrated Agent-Based University Information system (IABUIS) consisting of following four modules: Student Administration Management system (SAMS), Library Information system (US), Distance Learning system (DLS) a...
详细信息
ISBN:
(纸本)9783642330292;9783642330308
An Integrated Agent-Based University Information system (IABUIS) consisting of following four modules: Student Administration Management system (SAMS), Library Information system (US), Distance Learning system (DLS) and University Management Information system (UMIS), has been presented in this paper. An agent based testing subsystem as a part of the Distance Learning system (DLS) has been also described. It is better for regional characterized economy construction.
New technologies emerge to guarantee the disaster recovery capabilities of the important information systems. Emergency management information system(EMIS) is a complex platform with integrated software and hardware, ...
详细信息
New technologies emerge to guarantee the disaster recovery capabilities of the important information systems. Emergency management information system(EMIS) is a complex platform with integrated software and hardware, aiming to provide the technical support for the decision makers during the emergencies. Therefore, EMIS would set forth higher requirements on disaster recovery capabilities. This paper puts forward a new approach of protecting the overall EMISs through establishing a cloud service center based on all of the EMIS nodes. Based on the analysis of the user requirements, the ongoing research work and major developments of the adopted technologies are explained.
More and more heterogeneous cores are integrated on one single chip. There are four difficulties limiting program parallelism on heterogeneous multi-cores: communication obstacle, indirect access, input-dependent para...
详细信息
ISBN:
(纸本)9781784660543
More and more heterogeneous cores are integrated on one single chip. There are four difficulties limiting program parallelism on heterogeneous multi-cores: communication obstacle, indirect access, input-dependent parallelism and unpredictable control flow. Thread level speculation(TLS) has been proposed and researched to parallelize traditional sequential applications on homogeneous multi-core architecture. In this paper, we design and implement a heterogeneous multi-core hardware simulation system(TAHU), integrated with TLS execution rationale. With a novel TLS programming model and a number of new speculative tuning techniques, the four difficulties have been well overcome. Benchmark Gzip is parallelized from-3% to 195% on a four-core heterogeneous processor, and the speedup of the test benchmarks are 30%, 43% and 156%, respectively with three kinds of speculation.
暂无评论