To minimize the length of scheduling and guarantee the load balance of channels, a Load-balanced and length-minimized link scheduling (LBLM) algorithm is proposed. LBLM algorithm is a heuristic scheme, which assigns t...
详细信息
To minimize the length of scheduling and guarantee the load balance of channels, a Load-balanced and length-minimized link scheduling (LBLM) algorithm is proposed. LBLM algorithm is a heuristic scheme, which assigns time slots for unicast traffic based on link's weight and hop-count in the routing traffic tree. Thus the algorithm considers both primary and secondary interference, as well as guarantees the proportional fairness. The ns2 simulation results show that in multi-channel TDMA Wireless mesh networks (WMNs), the proposed algorithm has the benefits of lower complexity, shorter frame length and better channel balance compared to other well-known schedule mechanisms.
With the development of LPWAN technology, LoRa, one of the typical representatives, is widely used in various communication scenarios. At the same time, it is also faced with problems such as difficulty in identifying...
详细信息
Delay tolerant networks may become unexpectedly partitioned due to node mobility or variation in signal strength. However, most widely used models in some relative works are generally very simplistic. In order to expl...
详细信息
Delay tolerant networks may become unexpectedly partitioned due to node mobility or variation in signal strength. However, most widely used models in some relative works are generally very simplistic. In order to exploit intelligent forwarding algorithms, a novel nodal mobile model of delay tolerant networks is presented to map reality with more accuracy. And several approaches are introduced to analyze the network structure, such as n-cliques, n-clans, degree, closeness and betweenness. Our research results showed that the centralizations became smaller when the wireless connections were concerned. It meant that quite a number of nodes became potential relays because of the new structure of networks.
In this paper, we address the problem of automatic clothing parsing in surveillance images using the information from user-generated tags, such as "jeans" and "T-shirt." Although clothing parsing h...
详细信息
Lip-reading is to utilize the visual information of the speaker's lip movements to recognize words and sentences. Existing event-based lip-reading solutions integrate different frame rate branches to learn spatio-...
In order to support computing-intensive and service-sensitive Internet of Vehicles (IoV) applications, Digital Twin and edge computing are attractive solutions. Most of the existing IoV service offloading solutions on...
详细信息
Recently, Radio Frequency Identification (RFID) has been widely used. A lightweight security authentication protocol for mobile RFID is proposed to aim at the problems of high complexity and system security in existin...
详细信息
To efficiently detect the time-slot power of the Time Division Multiple Access (TDMA) communication systems such as repeaters and base stations in real-time. This article designs a signal-sampling hardware circuit bas...
详细信息
ISBN:
(纸本)9798400716775
To efficiently detect the time-slot power of the Time Division Multiple Access (TDMA) communication systems such as repeaters and base stations in real-time. This article designs a signal-sampling hardware circuit based on the Advanced RISC Machine (ARM) platform and proposes a comprehensive method to calculate the time-slot power values. The signal sampling circuit uses the ADC108S052 chip with an 8-channel linked to the ARM via the Serial Peripheral Interface (SPI), and the time-slot power detection approach consists of a signal timing sampling module, sampling data reading module, and sampling data processing module to compute the detected time-slot power comprehensively. We design experiments to evaluate the efficacy of the approach to detect the time-slot power with the system power-on and normality running condition, the detection of the system CPU resource consumption for the time-slot power, the detection of the error value for the time-slot power, etc. The experimental results demonstrate that the approach can be efficient, and real-time detection of the time-slot power of the TDMA system, the system of repeaters and base stations and other systems of signal coverage, optimization and so on is of great significance.
Driven by the vision of integrated sensing and communication (ISAC) toward 6G technology, the WiFi-based respiration sensing approach has emerged as a highly competitive candidate for advanced healthcare services. Nev...
详细信息
As the power Internet of Things(IoT)enters the security construction stage,the massive use of perception layer devices urgently requires an identity authentication scheme that considers both security and *** existing ...
详细信息
As the power Internet of Things(IoT)enters the security construction stage,the massive use of perception layer devices urgently requires an identity authentication scheme that considers both security and *** existing public key infrastructure(PKI)-based security authentication scheme is currently difficult to apply in many terminals in *** key distribution and management costs are high,which hinders the development of power IoT security *** Public key(CPK)technology uses a small number of seeds to generate unlimited public *** is very suitable for identity authentication in the power Internet of *** this paper,we propose a novel identity authentication scheme for power *** scheme combines the physical unclonable function(PUF)with improved CPK technology to achieve mutual identity authentication between power IoT terminals and *** proposed scheme does not require third-party authentication and improves the security of identity authentication for power ***,the scheme reduces the resource consumption of power IoT *** improved CPK algorithm solves the key collision problem,and the third party only needs to save the private key and the public key *** results show that the amount of storage resources occupied in our scheme is *** proposed scheme is more suitable for the power IoT.
暂无评论