Consider a backoff algorithm for medium access in wireless networks where a node chooses with probability 1-q to transmit right away and with probability q to transmit after CW slots, where CW is the maximum value of ...
详细信息
Consider a backoff algorithm for medium access in wireless networks where a node chooses with probability 1-q to transmit right away and with probability q to transmit after CW slots, where CW is the maximum value of the contention window. We study a variation of the 802.11 protocol called XVBEB which uses the above backoff scheme and give a theoretical analysis of its saturation throughput. Simulation results show that the throughput of XVBEB is better than that of 802.11 for saturated CBR traffic. Furthermore, XVBEB also exhibits lower packet loss, delay and delay variation than 802.11 for both VBR and VoIP traffic for a variety of load conditions.
Lucid programs are data-flow programs and can be visually represented as data flow graphs (DFGs) and composed visually. Forensic Lucid, a Lucid dialect, is a language to specify and reason about cyberforensic cases. I...
详细信息
Lucid programs are data-flow programs and can be visually represented as data flow graphs (DFGs) and composed visually. Forensic Lucid, a Lucid dialect, is a language to specify and reason about cyberforensic cases. It includes the encoding of the evidence (representing the context of evaluation) and the crime scene modeling in order to validate claims against the model and perform event reconstruction, potentially within large swaths of digital evidence. To aid investigators to model the scene and evaluate it, instead of typing a Forensic Lucid program, we propose to expand the design and implementation of the Lucid DFG programming onto Forensic Lucid case modeling and specification to enhance the usability of the language and the system. We briefly discuss the related work on visual programming and DFG modeling in an attempt to define and select one approach or a composition of approaches for Forensic Lucid based on various criteria such as previous implementation, wide use, formal backing in terms of semantics and translation. In the end, we solicit the readers' constructive, opinions, feedback, comments, and recommendations within the context of this short discussion.
By using virtual instrument technology, a direct digital control bioreactor is developed, which is able to be remote controlled through internet. Mathematical model of the bioreaction system is developed, which is use...
详细信息
Service composition is widely applied in different applications. One key issue is how to model and analyze time-related properties for service composition. A model called service composition time-constrained Petri Net...
详细信息
Iterative learning control can be applied to systems that repeat the same task over a finite duration with resetting to the starting point once each one is complete. The idea of iterative learning control is to make u...
详细信息
Foraging Behavior in Ant Swarms can be very helpful when applied to the protocols in Mobile Ad hoc NETworks (MANETs). When the Ant Colony Optimization Scheme (ACO) is applied to a protocol, larger number of paths are ...
详细信息
ISBN:
(纸本)9789898425737
Foraging Behavior in Ant Swarms can be very helpful when applied to the protocols in Mobile Ad hoc NETworks (MANETs). When the Ant Colony Optimization Scheme (ACO) is applied to a protocol, larger number of paths are generated from the source to destination which helps in improving the packet delivery ratio because an alternate back up path is always available in case a path gets broken due to the mobile nodes. In this paper, we apply the ACO scheme on an already existing Energy efficient protocol Conditional Max-Min Battery Capacity Routing (CMMBCR) (C.-K. Toh, 2001). The CMMBCR not only takes care of the total transmission energy in the network but also the residual battery capacity of the nodes. Hence applying ACO scheme on CMMBCR makes it more efficient in terms of energy, packet delivery ratio etc. The efficiency of our proposed protocol A-CMMBCR is then established by comparing it with some of the other existing Energy aware protocols such as Energy-Aware Routing protocol (EAAR) (Dhurandher et al., 2009), Minimum Transmission Power Routing (MTPR) (Scott and Bambos, 1996) and CMMBCR. The results are captured in the form of a graphical format.
Monotone prediction problems, in which the target variable is non-decreasing given an increase of the explanatory variables, have became more popular nowadays in many problem settings which fulfill the so-called monot...
详细信息
Monotone prediction problems, in which the target variable is non-decreasing given an increase of the explanatory variables, have became more popular nowadays in many problem settings which fulfill the so-called monotonicity constraint, namely, if an object is better in all attributes as another one then it should not be classified lower. Recent approaches to monotone prediction consider linear ordering on attribute domains, thus the meaning of being better in an attribute is limited to having a larger or a lower value in that attribute. However, this limitation restricts the use of recent approaches in cases where middle or marginal values of an attribute are better, what is natural in many real-world scenarios. We present a simple attribute value-transformation approach in this paper. The idea is to map attribute domains to real values where the mapped values express how the given value of an attribute contributes to higher classification of objects. Thus, we are searching for an data-specific approximation of a fuzzy membership function on the domain of each (numerical) attribute. Then, instead of the original attribute values we use their mapped values to mitigate the violation of monotonicity constraints in the data. Our approach is quite simple and is not limited to numerical attributes only. The described approach was tested and evaluated on benchmark datasets from the UCI machine learning repository.
Mobile Ad Hoc Networks (MANETs) offer a dynamic environment in which data exchange can occur without the need of a centralized server or human authority, providing that nodes cooperate among each other for routing. In...
详细信息
Mobile Ad Hoc Networks (MANETs) offer a dynamic environment in which data exchange can occur without the need of a centralized server or human authority, providing that nodes cooperate among each other for routing. In such an environment, the protection of data en route to its destination is still a challenging issue in the presence of malevolent nodes. This paper proposes a message security approach in MANETs that uses a trust-based multipath AOMDV routing combined with soft-encryption, yielding our so-called T-AOMDV scheme. Simulation results using ns2 demonstrate that our scheme is much more secured than traditional multipath routing algorithms and a recently proposed message security scheme for MANETs (our so-called Trust-based Multipath Routing scheme (T-DSR)), chosen as benchmark. The performance criteria used are route selection time and trust compromise.
The features of the RFID system and the constraints of RFID devices may bring about various privacy problems. After analyzing some existing RFID protocols, this paper proposes a new protocol based on random number and...
ISBN:
(纸本)9781618399571
The features of the RFID system and the constraints of RFID devices may bring about various privacy problems. After analyzing some existing RFID protocols, this paper proposes a new protocol based on random number and encryption hash. A process of formal analysis is presented by using BAN logic; the security and the complexity of this protocol are compared with other typical ones. The messages in the protocol are encrypted by key, it makes the protocol can prevent from illegal reading, tracking, eavesdropping, spoofing and replay attack. Both theory and analysis show that this new protocol can ensure the security of RFID systems and keep low-cost.
In order to resolve the problem of skew phenomenon in the handwritten document image during the scanning process, a new skew angle detection algorithm based on maximum gradient difference as well as Hough transform wa...
详细信息
ISBN:
(纸本)9781457717000
In order to resolve the problem of skew phenomenon in the handwritten document image during the scanning process, a new skew angle detection algorithm based on maximum gradient difference as well as Hough transform was proposed in the paper. Firstly, text lines are labeled by using maximum gradient difference, and then we use the method of non-text filtering to get rid of shorter text lines and dots. Finally, margin information is extracted after refining on text lines, and two-stage Hough transform is made to the margin extracted information with the strategy varying from “coarse” to “fine” strategy, calculating the skew angle of document image which is fixed by the average of several longest lines. Experiment results shows that the algorithm detects skew angles of document image more rapidly and accurately than Hough transform alone.
暂无评论