IPv6 network is developing rapidly, so the teaching of IPv6 network becomes more important than ever, but IPv4 network and IPv6 network will coexist for a long time. So according to the coexistence of IPv4 and IPv6 ne...
详细信息
A novel error-aware visual localization method is proposed that utilizes vertical planes,such as vertical building facades in urban areas as *** planes,reconstructed from coplanar vertical lines,are robust high-level ...
详细信息
A novel error-aware visual localization method is proposed that utilizes vertical planes,such as vertical building facades in urban areas as *** planes,reconstructed from coplanar vertical lines,are robust high-level features if compared with point features or line ***,the error models of vertical lines and vertical planes are built,where maximum likelihood estimation(MLE)is employed to estimate all vertical planes from coplanar vertical ***,the closed-form representation of camera location error variance is ***,the minimum variance camera pose estimation is formulated into a convex optimization problem,and the weight for each vertical plane is obtained by solving this well-studied *** are carried out and the results show that the proposed localization method has an accuracy of about 2 meters,at par with commercial GPS operating in open environments.
Outlier detection refers to the identification of anomalous samples that deviate significantly from the distribution of normal data and has been extensively studied and used in a variety of practical tasks. However, m...
详细信息
To integrate the satellite communications with the LTE/5G services, the concept of Hybrid Satellite Terrestrial Relay Networks(HSTRNs) has been proposed. In this paper, we investigate the secure transmission in a HSTR...
详细信息
To integrate the satellite communications with the LTE/5G services, the concept of Hybrid Satellite Terrestrial Relay Networks(HSTRNs) has been proposed. In this paper, we investigate the secure transmission in a HSTRN where the eavesdropper can wiretap the transmitted messages from both the satellite and the intermediate relays. To effectively protect the message from wiretapping in these two phases, we consider cooperative jamming by the relays, where the jamming signals are optimized to maximize the secrecy rate under the total power constraint of relays. In the first phase, the Maximal Ratio Transmission(MRT) scheme is used to maximize the secrecy rate, while in the second phase, by interpolating between the sub-optimal MRT scheme and the null-space projection scheme, the optimal scheme can be obtained via an efficient one-dimensional searching method. Simulation results show that when the number of cooperative relays is small, the performance of the optimal scheme significantly outperforms that of MRT and null-space projection scheme. When the number of relays increases, the performance of the null-space projection approaches that of the optimal one.
The first level of material's classification information by means of tree structure is added up to thousands of kinds, and dozens of levels in depth. Therefore, it is rather hard to make the spanning tree. By comp...
详细信息
This paper introduces the ADS-B system. The distributed ADS-B system can increase the scope of monitoring and share data. Two distributed algorithms of ADS-B system are proposed, and their advantages and disadvantages...
详细信息
This paper presents a method of error correcting code to improve the performance of audio information hiding. To use hadamard as error correcting code, not only makes audio information more secret, but also has higher...
详细信息
This paper introduces the basic theory of QoS and Overlay Internet of things, the logical topology structure of the active Overlay Internet of things service routing is expounded, then the routing problem of the Inter...
详细信息
Recent years have witnessed a rapid growth in using Internet of things(Io T), which facilitates and simultaneously raises challenges for the intelligent logistics. The real-world devices can provide their functionalit...
详细信息
Recent years have witnessed a rapid growth in using Internet of things(Io T), which facilitates and simultaneously raises challenges for the intelligent logistics. The real-world devices can provide their functionality as Web services. Because of the dynamicity and heterogeneity of the target networking environment, the services offered by Io T resources cannot be composed by simply extending existing Service oriented architecture(SOA) approaches. Logistics, which consists of a complex network of organizations and business processes, must be monitored in real time. Based on the proper understanding of the possible exceptions, we propose a middleware approach to solve the logistics service composition in Io T, where a decentralized coordination mechanism is used to monitor the component services with few resources efficiently. Through a set of experiments, the effectiveness and robustness of our approach are evaluated.
With the rapid development of the Internet, the network has become an indispensable part of people's lives and has been widely used in daily life and work, but at the same time, computertechnology is also facing ...
详细信息
暂无评论