作者:
GUYuZHAOBaohuaDepartment of Computer Science
University of Science and Technology of China Anhui Province Key Laboratory of Software in Computing and Communication Hefei 230027 China
In this paper, we focus on the target tracking problem in sensor networks and propose an Powersaving target localization scheme (PSTL) based on a conjecture model that reflects the moving pattern of a target, and also...
详细信息
In this paper, we focus on the target tracking problem in sensor networks and propose an Powersaving target localization scheme (PSTL) based on a conjecture model that reflects the moving pattern of a target, and also a corresponding two-step communication protocol between Base station (BS) and sensors. BS executes a query mechanism to determine which sensors should be used for detailed information according to a limited amount of data received from sensors. This scheme reduces both energy consumption and communication bandwidth requirement, prolongs the lifetime of the wireless sensor networks. Simulation results indicate that it can achieve a high accuracy while saving a large amount of energy.
作者:
HUTianZHAOBaohuaDepartment of Computer Science
University of Science and Technology of China Anhui Province Key Laboratory of Software in Computing and Communication Hefei 230027 China
This paper focuses on the problem of constructing the minimum-energy broadcast trees in all-wireless networks. We proposed a greedy algorithm called Greedy maximum-branch replacement algorithm (GMBR) to decrease the t...
详细信息
This paper focuses on the problem of constructing the minimum-energy broadcast trees in all-wireless networks. We proposed a greedy algorithm called Greedy maximum-branch replacement algorithm (GMBR) to decrease the total power of the broadcast tree further. This algorithm can be developed to a distributed one easily. Compared with the previous algorithms, GMBR was proved to have better performance, especially when the propagation loss exponent and the network size become larger.
This paper describes qualitative and quantita- tive analysis of color emotion dimension expression using a standard device-independent colorimetric system. To collect color emotion data, 20 subjects are required to re...
详细信息
This paper describes qualitative and quantita- tive analysis of color emotion dimension expression using a standard device-independent colorimetric system. To collect color emotion data, 20 subjects are required to report their emotion responses, using a valence-arousal emotion model, to 52 color samples that are chosen from CIElab Lch color spaces. Qualitative analysis, including analysis of variance (ANOVA), Pearson's correlation and Spearman's rank cor- relation, shows that significant differences exist between re- sponses to achromatic and chromatic stimuli, but there are no significant differences between chromatic samples. There is a positive linear relationship between lightness/chroma and valence-arousal dimensions. Subsequently, several clas- sic predictors are used to quantitatively predict emotion in- duced by color attributes. Furthermore, several explicit color emotion models are developed by using multiple linear re- gression with stepwise and pace regression. Experimental results show that chroma and lightness have stronger effects on emotions than hue, which is consistent with our qualitative results and other psychological studies. Arousal has greater predictive value than valence.
Recently, negative databases (NDBs) are proposed for privacy protection. Similar to the traditional databases, some basic operations could be conducted over the NDBs, such as select, intersection, update, delete and...
详细信息
Recently, negative databases (NDBs) are proposed for privacy protection. Similar to the traditional databases, some basic operations could be conducted over the NDBs, such as select, intersection, update, delete and so on. However, both classifying and clustering in negative databases have not yet been studied. Therefore, two algorithms, i.e., a k nearest neighbor (kNN) classification algorithm and a k-means clustering algorithm in NDBs, are proposed in this paper, respectively. The core of these two algorithms is a novel method for estimating the Hamming distance between a binary string and an NDB. Experimental results demonstrate that classifying and clustering in NDBs are promising.
Privacy-preserving computational geometry is a special secure multi-party computation and has many applications. Previous protocols for determining whether a point is inside a circle are not secure enough. We present ...
详细信息
Privacy-preserving computational geometry is a special secure multi-party computation and has many applications. Previous protocols for determining whether a point is inside a circle are not secure enough. We present a two-round protocol for computing the distance between two private points and develop a more efficient protocol for the point-circle inclusion problem based on the distance protocol. In comparison with previous solutions, our protocol not only is more secure but also reduces the number of communication rounds and the number of modular multiplications significantly.
Testing is a critical activity to find software errors. And choosing an effective test suite is the key problem in software testing area. Program invariant, as an attribute of program, can record the implementation st...
详细信息
Appropriate dealing with boundary conditions is very important for SPH. Current boundary treatment methods like boundary force method, ghost particle method and virtual boundary layer method, when dealing with complex...
详细信息
By using the knowledge of facial structure and temperature distribution, this paper proposes an automatic eye localization method from infrared thermal images. A facial structure consisting of 15 sub-regions is propos...
详细信息
In this paper a method for precisely reconstructing porous media three-dimensional model based on slice images is proposed. It first processes the original slice images, then uses 3D seed filling algorithm to find all...
详细信息
One of the main objective of spectrum sensing is to detect spectrum opportunity quickly and accurately. Both of the two aspects can be improved by hardware upgrading and software optimization. In this paper, we concen...
详细信息
暂无评论