As wireless network cannot dispense with a proper security measure due to its inborn vulnerability, a new security measure has been developed with an advent of new wireless network technology. Each security measure pr...
详细信息
As wireless network cannot dispense with a proper security measure due to its inborn vulnerability, a new security measure has been developed with an advent of new wireless network technology. Each security measure properly serves the security needs of its associated wireless network as it was intended to. Quality of Protection (QoP) estimates the stability of individual network system by quantifying security intensity. So, it can work as an evaluation standard for the security of network. This paper considers Historical Vulnerability Measure (HVM) and relative weight in total reward function for the improved QoP model. HVM is objectively organized by Flow-based Abnormal Traffic detection Algorithm for utility function.
In this paper we investigate the detection of OFDM primary signals using autocorrelation. The conventional model for signal detection in cognitive radio assumes that the primary signal is either absent or present with...
详细信息
In this paper we investigate the detection of OFDM primary signals using autocorrelation. The conventional model for signal detection in cognitive radio assumes that the primary signal is either absent or present with a fixed level. We show that the conventional model is the source of significant discrepancy between the analytical prediction of the detection algorithm and the simulations. We propose to design the autocorrelation-based detector using the uniform approximation for the distribution of the primary signal power. The uniform approximation allows to derive the optimal decision threshold by using the Lagrangian optimization. Finally, we are able to design the autocorrelation-based detector such that the spectrum reuse is enhanced and the analytical prediction of the detection algorithm achieves a better match with the simulation results.
In this paper, we propose a novel low complexity soft-in soft-out (SISO) equalizer using the Markov chain Monte Carlo (MCMC) technique. Direct application of MCMC to SISO equalization (reported in a previous work) res...
详细信息
In this paper, we propose a novel low complexity soft-in soft-out (SISO) equalizer using the Markov chain Monte Carlo (MCMC) technique. Direct application of MCMC to SISO equalization (reported in a previous work) results in a sequential processing algorithm that leads to a long processing delay in the communication link. Using the tool of factor graph, we propose a novel parallel processing algorithm that reduces the processing delay by orders of magnitude. Numerical results show that, both the sequential and parallel processing SISO equalizers perform similarly well and achieve a performance that is only slightly worse than the optimum SISO equalizer. The optimum SISO equalizer, on the other hand, has a complexity that grows exponentially with the size of the memory of the channel, while the complexity of the proposed SISO equalizers grows linearly.
This paper proposes a novel method to detect fire and/or smoke in real-time by processing the video data generated by an ordinary camera monitoring a scene. The objective of this work is recognizing and modeling fire ...
详细信息
This paper proposes a novel method to detect fire and/or smoke in real-time by processing the video data generated by an ordinary camera monitoring a scene. The objective of this work is recognizing and modeling fire shape evolution in stochastic visual phenomenon. It focuses on detection of fire in image sequences by applying a new hybrid algorithm that depends on optimizing the back-propagation algorithm, after canny edge detection, for determining the smoke and fire boundaries. Another clue is used in the fire detection algorithm that detects smoke and fire flicker by analyzing the video in the wavelet domain. Color variations in flame regions are detected by computing the spatial wavelet transform of moving fire-colored regions. Experimental results show that the proposed algorithm is very successful in detecting fire and/or smoke.
It is always desirable to improve the quality of a global classification model with the existence of other models. In this work, bucket learning methodology is first proposed to improve the model quality through enhan...
详细信息
It is always desirable to improve the quality of a global classification model with the existence of other models. In this work, bucket learning methodology is first proposed to improve the model quality through enhancing its local patterns. We formally define the concept of slab as a tri-tuple , which unifies the data view, model view and evaluation view of a data mining task. The bucket learning framework includes main modules of slab generation, short slab discovery, and short slab replacement as necessary steps to improve the model's quality. algorithms are designed to facilate the operations of quantifying the model merits, identifying the inferior local patterns and improving the global model. A prototype system is developed to verify the proposed methodology. The bucket learning prototype system is evaluated on 16 representative data sets from UCI data repository. Experimental results show that the improved model have an averaged F-measure of 79.5% with an improvement of 7.3% from the original model learned by J48.
In this paper, we propose to leverage social graphs from Online Social Networks (OSN) to improve the forwarding efficiency of mobile networks, more particularly Delay Tolerant Networks (DTN). We extract community stru...
详细信息
In this paper, we propose to leverage social graphs from Online Social Networks (OSN) to improve the forwarding efficiency of mobile networks, more particularly Delay Tolerant Networks (DTN). We extract community structures from three popular OSNs, Flickr, LiveJournal,and YouTube, and quantify the clustering features of each network at different levels of hierarchical resolution. We then show how community information can be used for forwarding using hints small enough to store on a mobile device. We also provide a first comparison study of the topological community structures for different types of OSNs with millions of users.
This paper presents a practical topological navigation system for indoor mobile robots, making use of a novel artificial landmark which is called MR (Mobile Robot) code. This new kind of paper-made landmarks can be ea...
详细信息
This paper presents a practical topological navigation system for indoor mobile robots, making use of a novel artificial landmark which is called MR (Mobile Robot) code. This new kind of paper-made landmarks can be easily attached on the ceilings or on the walls. Localization algorithms for the two cases are given respectively. An approaching control algorithm and an extended line tracking algorithm are also described, which a robot employs to approach its current goal. A simple topological navigation algorithm is proposed. Experiment results show the effectiveness of the method in real environment.
In the line-pipe industries with JCOE process, the unbend angle after removing punch load varies from the target angle due to elastic recovery in each bending step for forming the longitudinal-seam submerged arc pipes...
详细信息
In the line-pipe industries with JCOE process, the unbend angle after removing punch load varies from the target angle due to elastic recovery in each bending step for forming the longitudinal-seam submerged arc pipes. This variation causes bad roundness in formed pipe and inconvenience of performing subsequent welding process. To improve the roundness, the unbend angle should be measured precisely and the compensation for the variation should be conducted in next bending step. The quality inspection system designed to real-time measure the unbend angle was developed based on machine vision technique in this investigation. The system structure, the mathematical model converting the angle identified in the image into actual angle in the world frame, and the line detection algorithms are illustrated in detail. A prototype was designed and developed to test the performance of line detection algorithms. Experimental results have indicated that the accuracy for identifying the unbend angle reaches 0.5 degree and the mean cost time is less than 150 ms. Inspections performed by the prototype have proved the effectiveness and value of line detection algorithm proposed in this quality inspection system.
The major weakness in modern detection methods in the snorts is that the power of snorts is restricted only to the network on which algorithms are applied. This paper presents a new method to solve issues considering ...
详细信息
The major weakness in modern detection methods in the snorts is that the power of snorts is restricted only to the network on which algorithms are applied. This paper presents a new method to solve issues considering locality. We place anomaly detection algorithms that used in snorts in form of services within verified servers. The major advantage of this method is that the former snort strategies can also use possibilities of the new snorts dispersed over the network. We will evaluate this method and show that the resulted traffic is balanced across the Internet.
Multiple-input and multiple-output (MIMO) is one of the key component in wireless standards. Wireless standards exploit MIMO to enhance user experience by improving the data rate and reliability of the link. Multiple-...
详细信息
Multiple-input and multiple-output (MIMO) is one of the key component in wireless standards. Wireless standards exploit MIMO to enhance user experience by improving the data rate and reliability of the link. Multiple-input and multiple-output (MIMO) systems formed by multiple transmit and receive antennas can improve performance and increase capacity of wireless sensor networks. In this Paper, the performance of different detection algorithms for V-BLAST, the zero forcing algorithm (ZF), minimum mean square error (MMSE) algorithm and the Maximum a-Posteriori (MAP) algorithm have been simulated and their performances have been compared. under the assumption that the receiver has perfect knowledge about the channel state information (CSI). Convolutional code can be combined with the V-BLAST algorithm to improve its performance.
暂无评论