We compare two field demonstrations of SPECTS-OCDMA on an 80.8-km link and 150-km link using integrated, polarization independent arrayed-waveguide grating (AWG)-based encoders/decoders, an ultra-stable optical freque...
详细信息
We compare two field demonstrations of SPECTS-OCDMA on an 80.8-km link and 150-km link using integrated, polarization independent arrayed-waveguide grating (AWG)-based encoders/decoders, an ultra-stable optical frequency comb generator and a tunable dispersion-slope compensator.
Sink mobility has become an increasingly important requirement of various sensor network applications. Handling such mobile sink conditions brings new challenges to large-scale sensor networking. This investigation pr...
详细信息
Sink mobility has become an increasingly important requirement of various sensor network applications. Handling such mobile sink conditions brings new challenges to large-scale sensor networking. This investigation proposed a Hybrid-Structure Routing Protocol (HSRP) that combines the benefits of grid-based and cluster-based structures. Grid-based structure is designed to solve the cluster head selection problem. A virtual cluster structure based on grid structure information is also built. The hybrid-structure can establish a local shortest routing path from mobile sink toward to source. Simulation results indicate that the proposed HSRP mechanism reduces about 28% energy consumption than other approach. Moreover, HSRP mechanism reduces average delay time, increases higher success ratio, and has a longer network lifetime.
In this paper, we present a robust approach of digital watermarking embedding and retrieval for digital *** new approach works in special domain and it has two major steps: (1) to extract affine co-variant regions, an...
详细信息
In this paper, we present a robust approach of digital watermarking embedding and retrieval for digital *** new approach works in special domain and it has two major steps: (1) to extract affine co-variant regions, and (2) to embed watermarks with a novel fuzzy inference *** advantage of this proposed approach is demonstrated by a large amount of experiments, which are mainly against different attacks, such as common image processing, rotation, scaling, cropping, and several other affine transformations.
The three articles in this special section are an open call for papers that address the following topics: unified spectrum management; soft-decision in UMTS systems; and polar transmitters for wireless communications.
The three articles in this special section are an open call for papers that address the following topics: unified spectrum management; soft-decision in UMTS systems; and polar transmitters for wireless communications.
An embedded 8b RISC for advanced memories is designed to control, analyze and optimize the memory timing and voltage parameters. The processor-based built-in-self-optimize (BISO) algorithm is proposed to enhance the m...
详细信息
An embedded 8b RISC for advanced memories is designed to control, analyze and optimize the memory timing and voltage parameters. The processor-based built-in-self-optimize (BISO) algorithm is proposed to enhance the memory yield. A test PRAM with the RISC is fabricated in 90nm, 3-metal diode-switch process. By applying BISO, the PRAM margin window increases by 221%. It operates at 100MHz and consumes 28.4mW at 1.0V supply voltage. The embedded RISC enables 100Mb/s/pin read/write throughputs to PRAM.
This article presents an incremental and scalable solution for tracing Denial of Service (DoS) and Distributed DoS (DDoS) attacks. Our approach allows the victim to identify the network paths traversed by attack traff...
详细信息
ISBN:
(纸本)0977520005
This article presents an incremental and scalable solution for tracing Denial of Service (DoS) and Distributed DoS (DDoS) attacks. Our approach allows the victim to identify the network paths traversed by attack traffic without requiring the support from ISP or knowledge of the network topology. In contrast to previous probabilistic packet marking work, our approach has no false positive and fixed computation overhead for the victim to reconstruct the attack paths. Furthermore, the volume of attack packets required to reconstruct the attack path is dramatically less.
A low power 16-bit RISC is proposed for body sensor network system. The proposed IPEEP scheme provides zero overhead for the wakeup operation. The lossless compression accelerator is embedded in the RISC to support th...
详细信息
Variable length decoding(VLD) is inherent bit-serial operation and is the first stage of the whole video decoding task, the overall decoding system performance is determined by its throughput and efficiency. In this p...
详细信息
Most routing protocols focus on obtaining a workable route without considering network traffic condition for a mobile ad hoc network (MANET). Therefore, the quality of service (QoS) is not easily achieved by the real ...
详细信息
ISBN:
(纸本)9078677015
Most routing protocols focus on obtaining a workable route without considering network traffic condition for a mobile ad hoc network (MANET). Therefore, the quality of service (QoS) is not easily achieved by the real time or multimedia applications. To support QoS, this work proposes a QoS-aware routing protocol that incorporates an admission control scheme into route discovery and route setup. A dual-card dual-signal mechanism is adopted to increase system performance. Simulation results show the proposed protocol can more significantly improve packet delivery ratio, throughput (in heavy load), as well as reduce average end-to-end delay than routing protocols without QoS support can.
Image based reconstruction from multiple views is an interesting challenge. Recently methods of optimisation based voxel colouring have appeared which make use of incremental visibility updates. We present an alternat...
详细信息
Image based reconstruction from multiple views is an interesting challenge. Recently methods of optimisation based voxel colouring have appeared which make use of incremental visibility updates. We present an alternative incremental voxel colouring algorithm in the mould of GVC-LDI, which directly associates each visible voxel with the set of rays in it's visible projection, using ray-voxel traversal as a mechanism for updates. We make some time comparisons using calibrated photographs and synthetic images, as well looking at optimisation based voxel colouring and level of detail. Results show that our method compares favourably to GVC-LDI
暂无评论