In this paper, we proposed an improved hybrid semantic matching algorithm combining Input/Output (I/O) semantic matching with text lexical similarity to overcome the disadvantage that the existing semantic matching al...
详细信息
In this paper, we proposed an improved hybrid semantic matching algorithm combining Input/Output (I/O) semantic matching with text lexical similarity to overcome the disadvantage that the existing semantic matching algorithms were unable to distinguish those services with the same I/O by only performing I/O based service signature matching in semantic web service discovery techniques. The improved algorithm consists of two steps, the first is logic based I/O concept ontology matching, through which the candidate service set is obtained and the second is the service name matching with lexical similarity against the candidate service set, through which the final precise matching result is concluded. Using Ontology Web Language for Services (OWL-S) test collection, we tested our hybrid algorithm and compared it with OWL-S Matchmaker-X (OWLS-MX), the experimental results have shown that the proposed algorithm could pick out the most suitable advertised service corresponding to user's request from very similar ones and provide better matching precision and efficiency than OWLS-MX.
Traditional speech-related identity recognition commonly pays attention to individual aspect of speech signals but in reality, the speech signals are made up of semantics, speaker dependent features,
ISBN:
(纸本)9781467389808
Traditional speech-related identity recognition commonly pays attention to individual aspect of speech signals but in reality, the speech signals are made up of semantics, speaker dependent features,
Anti-worm is an effective way to fight against malicious worm and has been followed closely by malicious worm researchers recently. However, active and passive confronting technologies in peer-to-peer (P2P) networks...
详细信息
Anti-worm is an effective way to fight against malicious worm and has been followed closely by malicious worm researchers recently. However, active and passive confronting technologies in peer-to-peer (P2P) networks have not been studied in depth. This paper introduces both of them to fight against malicious worm in P2P networks. To study their effectiveness in P2P networks, this paper takes the topology degree in P2P networks into consideration and puts forward a four-state propagation model for active anti-worm and a five-state propagation model for passive anti-worm respectively. Both of the models are simplified in the case that size of a P2P network is large enough. The simulation results have not only validated the effectiveness of our propagation models but also evaluated the excellent performance of both active anti-worm and passive anti-worm.
The high-purity single-photon source plays an important role in the field of quantum ***,it is generated through spontaneous parametric down-conversion *** this paper,we investigate and summarize a few approaches on o...
详细信息
The high-purity single-photon source plays an important role in the field of quantum ***,it is generated through spontaneous parametric down-conversion *** this paper,we investigate and summarize a few approaches on obtaining single-photon sources with a high purity using either PPKTP or PPLN nonlinear ***,we present improved schemes to increase the purity based on existing work,corresponding applicable conditions and procedures are discussed and ***,we carry out numerical simulations and show that nearly perfect purity can be reached even without using any ***,this work might provide valuable references for the generation and application of high purity single-photon sources.
作者:
Shao, XingWang, RuchuanXu, HeHuang, HaipingSun, LijuanCollege of Computer
Nanjing University of Posts and Telecommunications Nanjing 210003 China College of Computer
Nanjing University of Posts and Telecommunications Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing 210003 China
network coding has been confirmed as a potential technology to improve performance of wireless mesh networks (WMNs) and a few network coding aware routings have been proposed. However, these mechanisms detect coding o...
详细信息
network coding has been confirmed as a potential technology to improve performance of wireless mesh networks (WMNs) and a few network coding aware routings have been proposed. However, these mechanisms detect coding opportunities through local traffic pattern checking, which hardly obtains optimal routes. This paper proposes a Genetic algorithm based Coding Aware Routing (GCAR) for wireless mesh networks, which employs genetic algorithm to optimize routes and coding opportunities. In addition, the key ingredients in GCAR, e.g., chromosome representation, genetic operation of crossover and mutation, fitness function considering coding opportunity and interference, are carefully designed. Through simulations on a randomly generated wireless mesh network, GCAR is shown to find optimal routes within a short time, and achieve more improvements than the previously proposed methods on route setup time, throughput and load balancing.
We propose a compressed ghost imaging scheme based on differential speckle patterns,named *** the scheme,a series of bucket detector signals are acquired when a series of random speckle patterns are employed to illumi...
详细信息
We propose a compressed ghost imaging scheme based on differential speckle patterns,named *** the scheme,a series of bucket detector signals are acquired when a series of random speckle patterns are employed to illuminate an unknown *** the differential speckle patterns(differential bucket detector signals)are obtained by taking the difference between present random speckle patterns(present bucket detector signals)and previous random speckle patterns(previous bucket detector signals).Finally,the image of object can be obtained directly by performing the compressed sensing algorithm on the differential speckle patterns and differential bucket detector *** experimental and simulated results reveal that CGI-DSP can improve the imaging quality and reduce the number of measurements comparing with the traditional compressed ghost imaging schemes because our scheme can remove the environmental illuminations efficiently.
The subspace pursuit algorithm in compressed sensing cannot achieve desirable reconstruction performance in the presence of impulsive noise based on the fact that the support detection and least squares are not robust...
详细信息
network Coding (NC) brings correlation between the coded signals from different sources, which makes the system more vulnerable to the decode error at relay. Conventional Cyclic Redundancy Code (CRC) has been implemen...
详细信息
network Coding (NC) brings correlation between the coded signals from different sources, which makes the system more vulnerable to the decode error at relay. Conventional Cyclic Redundancy Code (CRC) has been implemented for error bit detection. However, its error correction is simply ignored. To fully exploit this feature, this paper proposes a novel joint Log-Likelihood Ratio (LLR) CRC error mitigation for NC two way relay channel. Specific thresholds are designed to estimate the error number of data block and identify those which can be recovered if the number is within the error correction scope of CRC. We examine two modes of the thresholds, one based on the average Bit Error Rate (BER) of source-relay link, while the other based on that of instantaneous one. We provide the full analysis for the Pair-wise Error Probability (PEP) performance of the scheme. A variety of numerical results are presented to reveal the superiority of the proposed scheme to conventional CRC NC under independent Rayleigh fading channels. Moreover, the efficiencies of the proposed thresholds are also validated.
Since the existence of characteristics of heterogeneity, limited energy, complexity and so forth, it turns into a research hot spot on the security mechanism of wirelesssensornetworks (WSN), especially the problems ...
详细信息
In an underlay cognitive two-way Amplify-and-Forward (AF) relaying network, secondary users (SUS) and primary user (PU) can share the licensed spectrum simultaneously under the interference threshold constraint. In th...
详细信息
ISBN:
(纸本)9781849196413
In an underlay cognitive two-way Amplify-and-Forward (AF) relaying network, secondary users (SUS) and primary user (PU) can share the licensed spectrum simultaneously under the interference threshold constraint. In this paper, the joint power allocation and optimal relay selection scheme is proposed for allocating radio resource on cognitive nodes effectively. For power allocation problem, the objective function is to maximize the achieved minimum Signal to Interference plus Noise Ratio (SINR) at SUS, and the constraints include the total transmit power of cognitive nodes and PU interference threshold, the optimal power allocation algorithm and a simple distributed power allocation algorithm are proposed. Furthermore, based on these results, an optimal two-way relay selection scheme is proposed. Simulation results show that the proposed joint power allocation algorithms and relay selection scheme can achieve excellent system performance.
暂无评论