The problem of transmission power control in a rate-aware way is investigated to improve the throughput of wireless ad hoc network. The behavior of basic IEEE 802.11 DCF is approximated by the p-persistent CSMA throug...
详细信息
The problem of transmission power control in a rate-aware way is investigated to improve the throughput of wireless ad hoc network. The behavior of basic IEEE 802.11 DCF is approximated by the p-persistent CSMA through a Markov chain model. The throughput model takes hidden terminals, muhi-hop flow and concurrent interference into account. Numerical results show that the optimal transmission power derived from this model could balance the tradeoff between spatial reuse and data rate and hence yield maximum throughput.
Fundamentals of e-learning/e-teaching environments are reviewed. Role of personality and emotions in e-learning are explained. Learning styles and Myers-Briggs Type Indicator (MBTI) are explained. Basics of personalit...
详细信息
ISBN:
(纸本)1565553195
Fundamentals of e-learning/e-teaching environments are reviewed. Role of personality and emotions in e-learning are explained. Learning styles and Myers-Briggs Type Indicator (MBTI) are explained. Basics of personality and emotional filters in agent simulation of e-learning/e-teaching are covered. In addition, in order to help the process of learning, the agent of virtual classmate is used in some levels of learning.
The aim is to glean appropriate theories and pragmatic findings on human culture and explore ways in which they can be embedded on the decision making of advanced software agents. For this purpose, bases for fuzzy com...
详细信息
ISBN:
(纸本)1565553195
The aim is to glean appropriate theories and pragmatic findings on human culture and explore ways in which they can be embedded on the decision making of advanced software agents. For this purpose, bases for fuzzy computational agents to represent cultural background and cultural biases of individuals are presented. Some definitions of culture and dimensions, layers and descriptions of differences among cultures are reviewed. Culture models of Hofstede and Schwartz are reviewed and a special questionnaire to specify cultural values is explained. A preliminary model for cultural agents is described briefly and simulation of a cultural agent in Fuzzy Clips environment is reported.
In order to enhance the network covert channel's ability of detection-resistant, the invisibility for protocol steganography was studied. The ISN generation model of Windows 2000 was established through initial se...
详细信息
In order to enhance the network covert channel's ability of detection-resistant, the invisibility for protocol steganography was studied. The ISN generation model of Windows 2000 was established through initial sequence number (ISN) sampling experiments of the operation system. With the basis of this model, a steganography named random incremental ISN algorithm was proposed. It could simulate ISN generation algorithm of the platform realistically, and its distribution of ISN was very close to the normal system's distribution in visual and statistical features. The results of experimental were evaluated objectively with similarity index. And the evaluation results show that the steganography sequences are similar to the sequences which come from least squares fitting method in approximation. So the algorithm is transparent to the existing statistics steganalysis.
In this paper, we explore the idea of integrating the Remove Last Pass (RLP) algorithm to the Fast Zero (FastZ) algorithm as the prior initial solution to improve routing performance in optical multistage interconnect...
详细信息
Within the traditional research community in this decade, there has been recently a great deal of work developing Super-Resolution Reconstruction (SRR) algorithms for combining a set of low quality images to produce a...
详细信息
Within the traditional research community in this decade, there has been recently a great deal of work developing Super-Resolution Reconstruction (SRR) algorithms for combining a set of low quality images to produce a set of higher quality images. While many such algorithms have been proposed, the almost SRR estimations are based on L1 or L2 statistical norm estimation. Hence, these algorithms are usually too sensitive to their assumed noise model limiting their application. In this paper, we propose a novel SRR framework using the stochastic regularization technique by minimizing a cost function. The Hampel norm is used for measuring the difference between the projected estimate of the high quality image and each low high quality image and for removing outliers in the data. To remove artifacts from the final answer and improve the rate of convergence, Tikhonov regularization is incorporated in the proposed framework. Finally, a number of experimental results are presented to demonstrate the performance of the proposed algorithm in comparison to several previously published methods using a several noise models such as noiseless, AWGN, Poisson Noise and Salt & Pepper Noise.
In these two decades, although there has been a great deal of research developing super-resolution reconstruction (SRR) algorithms and many such algorithms have been proposed, the almost SRR algorithms are based on L1...
详细信息
In these two decades, although there has been a great deal of research developing super-resolution reconstruction (SRR) algorithms and many such algorithms have been proposed, the almost SRR algorithms are based on L1 or L2 statistical norm estimation. Consequently, these SRR algorithms are typically very sensitive to their assumed noise model that limits their utility. This paper proposes a novel SRR algorithm based on the stochastic regularization technique of Bayesian MAP estimation by minimizing a cost function. The Andrewpsilas Sine norm is used for measuring the difference between the projected estimate of the high-resolution image and each low resolution image and for removing outliers in the data. Moreover Tikhonov regularization is used to remove artifacts from the final answer and improve the rate of convergence. Finally, the efficiency of the proposed algorithm is demonstrated here in a number of experimental results using Lena standard images and using a several noise models such as noiseless, AWGN, Poisson noise and salt & pepper noise.
This study intended to use CELL system to aid storytelling activity for the enhancement of creativity of seven hearing-impaired students. The design of CELL was based on the idea of connectivism and employed an open s...
详细信息
ISBN:
(纸本)9789868473522
This study intended to use CELL system to aid storytelling activity for the enhancement of creativity of seven hearing-impaired students. The design of CELL was based on the idea of connectivism and employed an open source on the Internet. Cell allows storytelling members to exchange episodes and ideas with each other via network. Members can search and collect various resources on the Internet. Furthermore, members can exchange their story artifacts as well as publish their stories in the public area. Video taping, action logs, answers of storytelling activity, and interviews were used to collect data. The data collected were analyzed by the method of ethnographic microanalysis of interaction. The results of this study demonstrated that developing a collaborative story creation platform could connect the resources of the Internet and integrate the materials of multimedia, as well as provide a public area for sharing the collaborative artifacts. It could also enrich the resources of inspiration and make possible developing story plots in multi representations when the hearing-impaired students performed the storytelling activity.
JI et al improved ***'s PayWord scheme based on hash chains and proposed a micro-payment scheme which had better security and fairness, but the scheme did not solve the problems of user's malicious overdraft a...
详细信息
ISBN:
(纸本)9781424414741
JI et al improved ***'s PayWord scheme based on hash chains and proposed a micro-payment scheme which had better security and fairness, but the scheme did not solve the problems of user's malicious overdraft and its executive timeliness. Furthermore its efficiency and security was restricted by the inherent shortcoming of conventional hash chains (CHC). The paper proposes a micro-payment scheme based on Self-Renewal Hash Chains scheme (SRHC). The analysis results show that the proposed scheme not only solves the problems existed in JI's scheme, but also has better features on security, efficiency and fairness. The novel scheme fits scenario of repeated micro-payment such as information commodity between a mobile user and a fixed service provider.
In many communication systems, two or more traffic links are merged together to form a common trunk line. Usually, a Markovian technique is used to determine the different traffic parameters of aforementioned combined...
详细信息
暂无评论