In this paper, we study some transmission capacity theories of hierarchical wireless mobile ad hoc networks (H-MANET). Firstly, we present the structural protocol model, node's mobility tracking model of H-MANET. ...
详细信息
ISBN:
(纸本)0863416446
In this paper, we study some transmission capacity theories of hierarchical wireless mobile ad hoc networks (H-MANET). Firstly, we present the structural protocol model, node's mobility tracking model of H-MANET. Secondly, we propose and prove a critical inequality of transmission capacity of H-MANET. Lastly, we propose and prove a gradual probabilistic quality and the specific expression of expectant availability of transmission capacity of H-MANET. The results enrich the theory of Kumar, GP (2000) and the inf.rmation theory of wireless networks in certain degree.
We previously introduced the generalized Weighted Relevance Aggregation Operators (WRAO) for hierarchical fuzzy signatures. WRAO enhances the ability of the fuzzy signature model to adapt to different applications and...
详细信息
In ubiquitous environments, context sharing among agents should be made privacy-conscious. Privacy preferences are generally specified to govern the context exchanging among agents. Besides who has rights to see what ...
详细信息
An effective approach for energy conservation in wireless sensor networks is to schedule sleep intervals for extraneous nodes, while the remaining nodes stay active to provide continuous service. In this paper, we pro...
详细信息
An effective approach for energy conservation in wireless sensor networks is to schedule sleep intervals for extraneous nodes, while the remaining nodes stay active to provide continuous service. In this paper, we proposed a new scheme based on Monte Carlo algorithm to test whether the nodes deployed in interested region are redundant or not. The computational complexity is only O (n). It also established the coverage collision detection and back-off mechanism applied in the wireless sensor network. The simulation results show that the system can cover all the interested area with least nodes and the coverage void will not appear during the course of state-transition. The coverage collision detection and back-off mechanism proposed in this article can be applied when the nodes both have synchronous and asynchronous mechanism. It also provides a stable stage with the length of the time can be adjusted
Considering that large and various contents are shared over thousands of peers across a P2P network, one challenging problem is to locate the target content in such a large and unorganized environment. Hence, a P2P sy...
详细信息
Considering that large and various contents are shared over thousands of peers across a P2P network, one challenging problem is to locate the target content in such a large and unorganized environment. Hence, a P2P system designed with the content classification and managed distribution is more efficient and reliable than the mass and unclassified ones. We propose a MLTG (multilayer topic-group) based P2P network. Two core concepts are integrated into the system structure: topic-group and hierarchic layer. Peers act as local peers, delegate peers and super-peers. These peers spread on different hierarchic layers and the system distributes the correlative resources among the same groups. Compared with the traditional P2P schemes, the MLTG is out-performed significantly. From the experiments, it saves up to 90% of query cost for the case of a single keyword query. When the query consists of topic and keywords, it saves up to 93% of cost. MLTG guarantees the enhancement of successful search and lower consumption of bandwidth. It also makes the system more available, reliable and efficient.
Migrating a thread while preserving its state is a useful mechanism to have in situations where load balancing within applications with intensive data processing is required. Strong mobility systems, however, are rare...
详细信息
Migrating a thread while preserving its state is a useful mechanism to have in situations where load balancing within applications with intensive data processing is required. Strong mobility systems, however, are rarely developed or implemented as they introduce a number of major challenges into the implementation of the system. This is due to the fact that the underlying inf.astructure that most computers operate on was never designed to accommodate such a system, and because of this it actually impedes the development of these systems to some degree. Using a system based around a virtual machine, such as Microsoft's Common Language Runtime (CLR), circumnavigates many of these problems by abstracting away system differences. In this paper we outline the architecture of the threading mechanism in the shared source version of the CLR known as the Shared Source Common Language inf.astructure (SSCLI). We also outline how we are porting strong mobility into the SSCLI, taking advantage of its virtual machine.
In this paper we propose a novel approach to image steganography in which embedding is done without making explicit modifications to the image;that is, the embedding distortion introduced to the cover image is both pe...
详细信息
In this paper, we present a novel steganalysis technique for halftone images without knowledge of the original cover image. We first convert halftone images into grayscale-like images by low-pass filtering. The low-pa...
详细信息
In this paper, a steganalysis technique using compression bit rate as a distinguishing statistic is presented to detect secret messages embedded in document images that are degraded in quality by printing, photocopyin...
详细信息
ISBN:
(纸本)0780392892
In this paper, a steganalysis technique using compression bit rate as a distinguishing statistic is presented to detect secret messages embedded in document images that are degraded in quality by printing, photocopying, and/or scanning processes. We consider embedding techniques that flip pixels in binary document images that contain characters and symbols. Noise introduced by printing, photocopying, and/or scanning can be modelled by a local optical distortion process. Steganographic embedding is modelled as an additive noise process and we use compression bit rate as a distinguishing statistic to discriminate between stego images and unmarked images. Experimental results showed that the proposed technique can detect stego images wtih reasonably good accuracy, given the inherent difficulty of the problem.
Two main issues need to be covered when dealing with the dependability of component-based systems: quality assurance of reusable software components and quality assurance of the assembled component-based system. By fo...
详细信息
暂无评论