In order to achieve seamless handover for real-time applications in the IP Multimedia Subsystem (IMS) of the next-generation network,a multi-protocol combined handover mechanism is *** this work,we combine SIP (Sessio...
详细信息
In order to achieve seamless handover for real-time applications in the IP Multimedia Subsystem (IMS) of the next-generation network,a multi-protocol combined handover mechanism is *** this work,we combine SIP (Session Initiation Protocol),FMIP (Fast Mobile IPv6 Protocol) and MIH (Media Independent Handover) protocols by cross-layer design and optimize these protocols' signaling flows to improve vertical handover *** analysis and simulation result illustrate that our proposed mechanism is 1better than the original SIP and MIH combination handover mechanism in service interrupt time and packets loss aspects.
Webpage based information hiding technology uses a webpage as the cover object. The research of this area has led to several different techniques, which can be broadly classified into embedding invisible characters ba...
详细信息
Webpage based information hiding technology uses a webpage as the cover object. The research of this area has led to several different techniques, which can be broadly classified into embedding invisible characters based, switching the uppercase-lowercase states of letters in tag based, and altering the order of attributes based. Based on the attributes order, a scheme of information hiding is presented in this paper, which overcomes the drawback of the ability of imperceptibility and robustness of the traditional webpage information hiding algorithms. In the proposed scheme, a map between the set of all permutations of n-attributes and the set of all (n-1)-bit binary string is established first, then the embedding and extracting processes are achieved according to this map. The experimental results and analysis show that the proposed scheme dose not lengthen the size of the coverwebpage, and has better imperceptibility, more robust, and more perfect security than the traditional algorithms. The embedded capacity of the proposed scheme is large enough to embed specified secret data. So the proposed scheme can be used to protect the content of the webpage and covert communication.
This study presents an effective method for detecting vehicles in front of the camera-assisted car during nighttime driving and implements it on an embedded *** proposed method detects vehicles based on detecting and ...
详细信息
ISBN:
(纸本)9781424455652
This study presents an effective method for detecting vehicles in front of the camera-assisted car during nighttime driving and implements it on an embedded *** proposed method detects vehicles based on detecting and locating vehicle headlights and taillights using techniques of image segmentation and pattern ***,to effectively extract bright objects of interest,a segmentation process based on automatic multilevel thresholding applied on the grabbed road-scene *** the extracted bright objects are processed by to identify the vehicles by locating and analyzing their vehicle light patterns and to estimate their distances to the cameraassisted car by a rule-based ***,we also implement the above vision-based techniques on a real-time system mounted in the host *** proposed vision-based techniques are integrated and implemented on an ARMLinux embedded platform,as well as the peripheral devices,including image grabbing devices,voice reporting module,and other in-vehicle control devices,will be also integrated to accomplish an in-vehicle embedded vision-based nighttime driver assistance system.
This paper presents a parallelization method for the computation of interactive physical simulations. In the method, physical simulation tasks are split into multiple sets of tasks using a space partitioning algorithm...
详细信息
ISBN:
(纸本)9781424472352
This paper presents a parallelization method for the computation of interactive physical simulations. In the method, physical simulation tasks are split into multiple sets of tasks using a space partitioning algorithm. Each task set is assigned to a working thread running on a multicore processor. In order to achieve dynamic workload balancing, a work stealing algorithm is used to allowing idle threads steal tasks form heavily loaded threads. The experiments show that workload is well balanced among threads and a significant speedup has been achieved due to the parallelization. P
In this paper the real-time face region was detected by suggesting the rectangular feature-based classifier and the robust detection algorithm that satisfied the efficiency of computation and detection performance...
详细信息
In this paper the real-time face region was detected by suggesting the rectangular feature-based classifier and the robust detection algorithm that satisfied the efficiency of computation and detection performance was suggested. By using the detected face region as a recognition input image, in this paper the face recognition method combined with PCA and the multi-layer network which is one of the intelligent classification was suggested and its performance was evaluated. As a preprocessing algorithm of input face image, this method computes the eigenface through PCA and expresses the training images with it as a fundamental vector. Each image takes the set of weights for the fundamental vector as a feature vector and it reduces the dimension of image at the same time, and then the face recognition is performed by inputting the multi-layer neural network. As a result of comparing with existing methods, Euclidean and Mahananobis method, the suggested method showed the improved recognition performance with the incorrect matching or matching failure. In addition, by studying the changes of recognition rate according to the learning rate in various environments, the most optimum value of learning rate was calculated.
Wireless multimedia sensor networks (WMSNs) are a new and emerging type of wireless sensor networks (WSNs),which enable applications of multimedia captured through special sensors equipped with cameras or microphones ...
详细信息
Wireless multimedia sensor networks (WMSNs) are a new and emerging type of wireless sensor networks (WSNs),which enable applications of multimedia captured through special sensors equipped with cameras or microphones ***,WMSNs face the challenges of transport reliability and energy *** this paper,we propose an adaptive error control mechanism based on the importance of link-layer frame (AEC-LLFIV).The mathematical analysis shows that our AEC-LLFIV achieves better performance compared with Forward Error Correction (FEQ,Automatic Repeat Request (ARQ) and Chase combing Hybrid ARQ (HARQ),in terms of communication reliability and energy efficiency in WMSNs.
We propose a dynamic RWA method for optical path networks that pre-computes route candidates to attain better load-balancing. Numerical experiments elucidate that the proposed method can accommodate 1.3-1.8 times more...
详细信息
ISBN:
(纸本)9780819485571
We propose a dynamic RWA method for optical path networks that pre-computes route candidates to attain better load-balancing. Numerical experiments elucidate that the proposed method can accommodate 1.3-1.8 times more traffic than the conventional method that ignores load-balancing.
Many of the optimization problems in the real world are multi-objective in nature,and NSGA II is commonly used. Frequently,the multi-objective problems present a high complexity,so classical meta-heuristic algorithms ...
详细信息
Many of the optimization problems in the real world are multi-objective in nature,and NSGA II is commonly used. Frequently,the multi-objective problems present a high complexity,so classical meta-heuristic algorithms fail to solve them in a reasonable amount of time. In this context,parallelism is a choice to overcome this fact to some extent. In this paper we study three different models i.e. trigger model,island model and cone separation model to parallelize NSGA-II,by considering 0/1 knapsack problem as a case study. Further we emphasize on two factors that scale the parallelism i.e.,convergence and time. The experimental results conform that cone separation model is better than other two models in terms of processing time and approximation to true Pareto front.
We propose a simple node architecture that is used to concatenate two ROADM rings. The proposed architecture employs variable filters that can effectively handle classified node input signals to realize the desired ro...
详细信息
ISBN:
(纸本)9780819485564
We propose a simple node architecture that is used to concatenate two ROADM rings. The proposed architecture employs variable filters that can effectively handle classified node input signals to realize the desired routing operations. Finally, we developed a prototype system and performed transmission experiments. The technical feasibility has been confirmes.
Backdoor sets of SAT problem can quickly decide the satisfiability of real-world SAT instances, and the QBF problem is the generalization of SAT problem, so backdoor sets of QBF are crucial to its solution. We propose...
详细信息
ISBN:
(纸本)9781424458219;9781424458240
Backdoor sets of SAT problem can quickly decide the satisfiability of real-world SAT instances, and the QBF problem is the generalization of SAT problem, so backdoor sets of QBF are crucial to its solution. We propose a new algorithm of computing QHorn deletion backdoor sets in this paper, which contains two stages. Firstly, we compute renamed QBF formula according to the largest renamable Rm>1 of matrix of QBF formula, here only existent variables are renamed. Then the RQHorn deletion backdoor sets of the renamed QBF formula are computed. Furthermore, we illustrate the advantages of our algorithm through several real-world QBF instances.
暂无评论