This paper studies how to place the least number of sensor nodes to ensure confident information coverage in an area with obstacles, while maintaining the connectivity of the placed nodes. For this constrained optimiz...
详细信息
ISBN:
(纸本)9781509065226
This paper studies how to place the least number of sensor nodes to ensure confident information coverage in an area with obstacles, while maintaining the connectivity of the placed nodes. For this constrained optimization problem, we propose a sensor placement scheme based on an improved genetic algorithm with our new problem-specific operations, including the Delaunay triangulation-based population initialization, the chromosome correction operation with new gene insertion and redundant gene removal to produce a valid chromosome ensuring both coverage and connectivity, the chromosome mirror-crossover operation to enable the production of better offsprings. Simulation results show that the proposed algorithm can find better placement schemes in terms of much fewer deployed nodes, compared with the peer algorithms.
Computed tomography (CT) has been widely used in modern medical diagnosis and treatment. However, ionizing radiation of CT for a large population of patients becomes a concern. Low-dose CT is actively pursued to reduc...
详细信息
ISBN:
(数字)9781728141640
ISBN:
(纸本)9781728141657
Computed tomography (CT) has been widely used in modern medical diagnosis and treatment. However, ionizing radiation of CT for a large population of patients becomes a concern. Low-dose CT is actively pursued to reduce harmful radiation, but faces challenges of elevated noise in images. To address this problem and improve low-dose CT image quality, we develop an image-domain denoising method based on cycle-consistent adversarial networks (CycleGAN). Different from previous deep learning based denoising methods, CycleGAN can learn data distribution of organ structures from unpaired full-dose and low-dose images, i.e. there is no one-to-one correspondence between full-dose and low-dose images. This is an important development of learning-based methods for low-dose CT since it enables the model growth using previously acquired full-dose images and later acquired low-dose images from different patients. As a proof-of-concept study, we used the NIH-AAPM-Mayo Clinic Low Dose CT Grand Challenge data to test our CycleGAN denoising method. The results show that the proposed method not only achieves better peak signal-to-noise ratio (PSNR) for quarter-dose images than non-local mean and dictionary learning denoising methods, but also preserves more details reflected by images and structural similarity index (SSIM). Our investigation also reveals that a larger sample size leads to a better denoising performance for CycleGAN.
The paper proposes the architecture of distributed multilevel detection system of malicious software in local area networks. Its feature is the synthesis of its requirements of distribution, decentralization, multilev...
详细信息
The paper proposes the architecture of distributed multilevel detection system of malicious software in local area networks. Its feature is the synthesis of its requirements of distribution, decentralization, multilevel. This allows you to use it autonomously. In addition, the feature of autonomous program modules of the system is the same organization, which allows the exchange of knowledge in the middle of the system, which, unlike the known systems, allows you to use the knowledge gained by separate parts of the system in other parts. The developed system allows to fill it with subsystems of detection of various types of malicious software in local area networks.
In wireless coded cache network, data contents are cached in a number of mobile devices using an erasure correcting code, and a user retrieves content from other mobile devices using device-to-device communication. In...
详细信息
ISBN:
(纸本)9781509065226
In wireless coded cache network, data contents are cached in a number of mobile devices using an erasure correcting code, and a user retrieves content from other mobile devices using device-to-device communication. In this paper, we consider the repair problem when multiple devices that cache data contents fail or leave the network. By exploiting the wireless broadcast nature, we formulate the repair problem over the broadcast channels using an integer linear programming formulation, aiming at minimizing the number of necessary broadcast transmissions. We also study the construction of repair codes and propose a decentralized repair coding method. Simulation results show that the performance using our method outperforms the basic cooperative repair scheme for wired distributed storage systems.
Increased Caching Capability is one of the main benefits of Information-Centric Networking and a necessity for highly mobile ad-hoc networks such as VANETs. Hence, it is crucial to efficiently store items to improve r...
详细信息
ISBN:
(纸本)9781509065226
Increased Caching Capability is one of the main benefits of Information-Centric Networking and a necessity for highly mobile ad-hoc networks such as VANETs. Hence, it is crucial to efficiently store items to improve resource utilization, increasing cache efficiency, reducing network load. In this paper, we propose a cache content insertion policy, UG-Cache, for ICN-VANETs. In UG-Cache, cache insertion decisions are made based on recommendations from content sender dependent on request frequency and cache distance. Numerical results denote the benefits of increased control over cache variety via application of UG-Cache. Simulation results reveal increased delivery rates and reduced average hop count of content delivery of UG-Cache over other schemes. UG-Cache also achieves higher cache hit ratio than other on-demand caching strategies.
Virtual Content Delivery Network (vCDN) orchestration is necessary to optimize the use of resources and improve the performance of the overall SDN/NFV-based CDN function in terms of network operator cost reduction and...
详细信息
ISBN:
(纸本)9781509065226
Virtual Content Delivery Network (vCDN) orchestration is necessary to optimize the use of resources and improve the performance of the overall SDN/NFV-based CDN function in terms of network operator cost reduction and high streaming quality. It requires intelligent and enticed joint SDN/NFV orchestration algorithm due to the evident huge amount of traffic to be delivered to end customers of the network. In this paper, a global vCDN architecture and an exact approach for finding the optimal path orchestration(s) and vCDN component instantiation(s) (OCPA) are proposed. Moreover, several scenarios are considered to quantify the OCPA behavior and to compare its efficiency in terms of caching and streaming cost, orchestration time, vCDN replication number, and other cost factors. Then, it is implemented and evaluated under different deployment flavors. Several scenarios are considered to study the algorithm's behavior and to quantify the impact of both network and system parameters.
Multilayer Clustered Designing Algorithm is exploited to present MCDA - Hot Spot algorithm;a technique to increase the network throughput by alleviating the impact of hotspot issue on network lifetime. The network nod...
详细信息
ISBN:
(纸本)9781509065837
Multilayer Clustered Designing Algorithm is exploited to present MCDA - Hot Spot algorithm;a technique to increase the network throughput by alleviating the impact of hotspot issue on network lifetime. The network nodes in the hot spot region are in a flat layer form in contrast to rest of the network nodes that are grouped into clusters. This design substantially helps in achieving goal above. This claim is proved by making its simulation-based comparison with other competing algorithms on various performance evaluation parameters.
Recently, the demand for wireless networks to treat periodic traffic is increasing, which includes healthcare wireless sensor networks. This tendency causes the problem of continual packet collisions among different p...
详细信息
ISBN:
(纸本)9781509065226
Recently, the demand for wireless networks to treat periodic traffic is increasing, which includes healthcare wireless sensor networks. This tendency causes the problem of continual packet collisions among different periodic flows. In this paper, we propose a new formula for predicting whether two heterogeneous periodical flows from different source nodes have overlapping packet transfer durations. From this formula, we propose a transfer scheduling method that shifts the packet generation phase (timing) to avoid future collisions. This method adopts naive random access control, like DCF, for the MAC layer process. In addition, source nodes do not require significant computational power, because only the sink intensively schedules the timing and informs them to the corresponding source. Therefore, compared to existing methods in which each source node completely schedules the timing of creating packets based on time division multiple access (TDMA), our method requires less functional expansion, complexity, and computational power. Finally, we demonstrate the effectiveness of our method through computer simulations.
The exponential growth in the mobile internet traffic is creating challenges for the present service providers to provide quality network mobility management to fulfil the user bandwidth demand. The network mobility m...
详细信息
In this paper we propose an novel approach to secure enterprise Wireless local Area networks (WLANs) by leveraging the Software-defined Networking (SDN) paradigm to detect and mitigate attack attempts in WLANs. We ext...
详细信息
ISBN:
(纸本)9781538646342
In this paper we propose an novel approach to secure enterprise Wireless local Area networks (WLANs) by leveraging the Software-defined Networking (SDN) paradigm to detect and mitigate attack attempts in WLANs. We extend our SDN platform from [1] to implement a client localization mechanism that exploits information from the physical and MAC layers offered by current wireless chipsets to localize transmitting clients. Based on location information, we create a “virtual perimeter” to prevent WLAN access for clients from outside of the defined area. We further introduce a single-channel WLAN model as a possible solution optimization. Our evaluation shows that the proposed solution succeeds in identifying WLAN Denial-of-Service attacks, such as ieee 802.11 deauthentication.
暂无评论