For achieving fast accesses the cloud's big data through mobile smart node, an extreme high data rate for the forwarding link under high-mobility wireless communications is necessary. 3GPP thus specifies LTE/LTE-A...
详细信息
Adopting Bayesian network (BN) as the effective framework for representing and inferring dependencies and uncertainties among variables, in this paper, we established a BN-based model to discover user similarities in ...
详细信息
In this research paper, we evaluate an assortment of tools and intend to investigate multifarious characteristic of Imagix-4D Reverse engineering Tool and on the basis of investigation find out inadequacy of Imagix-4D...
详细信息
In this research paper, we evaluate an assortment of tools and intend to investigate multifarious characteristic of Imagix-4D Reverse engineering Tool and on the basis of investigation find out inadequacy of Imagix-4D Reverse engineering Tool (illustrate only abstract Class Diagram, and it has no support to illustrate ER-Diagram and Sequence Diagram) and propose a Reverse engineering Tool based on Unified Mapping Method (RETUM) for prominence of Class Diagram Visualizations which surmount the limitation (class diagram which is intricate in visualization) of Imagix-4D Reverse engineering Tool.
A robust lane detection algorithm is proposed in this paper. For lane detection, the lane boundary information is derived from the sector-scanning detection method and entered the model. In order to solve the problem ...
详细信息
Recently, the problem of traffic jam in major cities is getting worse. By leveraging the taxi GPS data of Shenzhen, this paper analyzes the urban traffic status and proposes rational suggestions for urban traffic mana...
详细信息
Privacy preserving data mining is a research area concerned with the privacy driven from personally identifiable information when considered for data mining. This paper addresses the privacy problem by considering the...
详细信息
Privacy preserving data mining is a research area concerned with the privacy driven from personally identifiable information when considered for data mining. This paper addresses the privacy problem by considering the privacy and algorithmic requirements simultaneously. The objective of this paper is to implement an association rule hiding algorithm for privacy preserving data mining which would be efficient in providing confidentiality and improve the performance at the time when the database stores and retrieves huge amount of data. This paper compares the performance of proposed algorithm with the two existing algorithms namely ISL and DSR.
Mobile networks have become one of the most popular forms of modern world communication. These are different from conventional networks because they lack a fixed infrastructure. Since the nodes are mobile, therefore r...
详细信息
Mobile networks have become one of the most popular forms of modern world communication. These are different from conventional networks because they lack a fixed infrastructure. Since the nodes are mobile, therefore routes have to be constantly updated. The data transmission on these constantly changing routes has to be maintained efficiently with respect to successful delivery of data packets between source and destination, and delay in this transaction. Along with these two, several other parameters have also to be taken care of. There are several protocols available for data transfer on mobile ad hoc networks (MANETs). No single algorithm could be termed best for all applications. Optimal results for any algorithm depend on the conditions in which it is used, and the parameters which are given high priority. In this paper, some popular routing protocols for MANETs including both proactive protocols such as DSDV, OLSR, FSR and reactive protocols such as AODV, DSR, TORA have been compared and found that on-demand protocols are more befitting than table driven protocols, especially with increased number of nodes and mobility. At low mobility, table driven protocols perform better than on-demand protocols.
Rhythm is the combination of beats which is most essential ingredient of music that contains the length of each note in a music composition. Knowledge of Rhythm structures and their application for new Music generatio...
详细信息
An expanded dynamic parameter model is introduced based on cellular automata. In this model friction is modeled quantitatively. The dynamic parameters including direction parameter and empty parameter are formulated t...
详细信息
The congestion control of TCP Vegas is more stable and brilliant than other TCP versions such as Westwood Plus because of the congestion control before collision in Ad Hoc networks with frequent topology changes. Neve...
详细信息
The congestion control of TCP Vegas is more stable and brilliant than other TCP versions such as Westwood Plus because of the congestion control before collision in Ad Hoc networks with frequent topology changes. Nevertheless, Vegas has less competitive ability when its data flow coexists with other protocols'. In addition, it cannot make full advantage of available bandwidth to transmit packets. The research aims to propose an improved TCP Vegas, ICATCP, which has three enhanced aspects in congestion avoidance phases.. The lower layers' parameters will be considered in throughput model to improve the accuracy of theoretical throughput.. Forward throughput prediction mechanism with revision based on Grey Prediction is used to promote the online cwnd control.. The optimal exploring mechanism based on Q-Learning is applied to search the more reasonable changing size of congestion window. The simulation results show that the ICATCP has higher throughput, lower delay, more fair allocation of bandwidth than Vegas and Westwood Plus in multi-hops Ad Hoc scenarios.
暂无评论