This paper presents a performance analysis of the end-to-end sensor-to-cloud personal living platform. The analysis is based on a typical architecture starting from a single sensor and actuator and continuing to the v...
详细信息
This paper presents a performance analysis of the end-to-end sensor-to-cloud personal living platform. The analysis is based on a typical architecture starting from a single sensor and actuator and continuing to the virtualized services at smart dust, dew, fog and cloud level. The system is diverse and allows interconnection of different sensors/ actuators technologies directly or throughout gateways. The experiments in a living lab presented use energy harvesters and ZigBee PRO sensors. The results from sensor network are applicable for non-real-time and non-critical data connection. As a final conclusion, we claim that for critical and non-critical measurements that need to be supported in a typical living environment there is a necessity to use different priorities of the services and different sensors as well.
In this paper, we study and analyze cooperative cognitive radio networks with arbitrary number of secondary users (SUs). Each SU is considered a prospective relay for the primary user (PU) besides having its own data ...
详细信息
Nowadays, the data centric system has been playing an increasingly important role in blogs sharing, content delivery and news broadcasting, file-synchronization, and so on. Due to generated amount of data within the s...
详细信息
ISBN:
(纸本)9781509047963
Nowadays, the data centric system has been playing an increasingly important role in blogs sharing, content delivery and news broadcasting, file-synchronization, and so on. Due to generated amount of data within the system, data backup and archiving has become a main challenging task. A main methods to solve the problem is Chunking based deduplication by eliminating redundant data and reducing the total storage space. In this paper, we summarized several ways of file-differing, and then designs a new Unlimited Content-Defined Chunking (UCDC) algorithm, which contains file-chunking, file-comparing and file-merging. We evaluate the effectiveness of the UCDC by simulation example that produces the description of file.
Cloud computing has become one of the most dynamic and adoptable computing paradigms. Multimedia Cloud Computing (MCC) is one of today’s hot research topic. MCC is proven to be a most dynamic and efficient platform f...
详细信息
When use the image mutual information to assess the quality of reconstructed image in pseudo-thermal light ghost imaging, a negative exponential behavior with respect to the measurement number is observed. Based on in...
详细信息
In this work, sidebands suppression induced by the buffer gas argon (Ar) in 852 nm cesium Faraday anomalous dispersion optical filter (FADOF) is investigated. FADOF performances at different Ar pressures (0 torr, 1 to...
详细信息
When the sampling data of ghost imaging is recorded with less bits, i.e., experiencing quantization, decline of image quality is observed. The less bits used, the worse image one gets. Dithering, which adds suitable r...
详细信息
The conservative Additive Increase Multiplicative Decrease mechanism of traditional TCP causes the link under-utilization in the Wide Area networks(WANs) due to the WANs' intrinsic nature of high latency and high ...
详细信息
The conservative Additive Increase Multiplicative Decrease mechanism of traditional TCP causes the link under-utilization in the Wide Area networks(WANs) due to the WANs' intrinsic nature of high latency and high packet *** alleviate the problem,we present the design and implantation of STAG,an Acceleration Gateway with Split-TCP in the *** is built on embedded network equipment and acts as a transparent *** STAG,a new improved congestion control method named Rapid TCP is adopted,which determines whether or not to decrease the congestion window based on the packet loss *** particular,in the fast recovery phase,it chooses different window adjustment strategies based on the current size of congestion window to achieve higher *** performance validation of STAG is done on both our emulation testbed and the real wide area *** results show that STAG with Rapid TCP effectively adapts to the high loss network environment and significantly speeds up the applications without loss of fairness.
Existing privacy measures often conflict with the requirements of future vehicular networks. First and foremost, in attempting to achieve local privacy, they interfere with the primary purpose of vehicular networks: t...
详细信息
ISBN:
(纸本)9781509051984
Existing privacy measures often conflict with the requirements of future vehicular networks. First and foremost, in attempting to achieve local privacy, they interfere with the primary purpose of vehicular networks: to improve road safety. Other solutions undermine accountability or introduce too high overhead to be of practical use. For this reason, proper privacy protection is disregarded in many field experiments, proposals, and standardization documents. In this paper, we take a structured approach to deriving a holistic solution for location privacy protection in Vehicular Ad-Hoc networks (VANETs): Under reasonable assumptions about an adversary's capability, local privacy is neither required nor can it be achieved without compromising traffic safety. Our approach is therefore based on synchronized time-slotted pseudonym pools and the local announcing of pseudonym changes. By this, we overcome the privacy-safety problem while at the same time increasing privacy for all users. Our system is fully compatible with the requirements of vehicular networks and current standardization efforts.
Ultrahigh-resolution optical strain sensors provide powerful tools in various scientific and engineering fields, ranging from long-baseline interferometers to civil and aerospace industries. Here we demonstrate an ult...
详细信息
暂无评论