Femtocell networks which use femtocell access point (FAP) and existing networks as backhaul connectivity can meet the requirement of high data rate for wirelesscommunication system as well as solve the indoor coverag...
详细信息
ISBN:
(纸本)9781467358309
Femtocell networks which use femtocell access point (FAP) and existing networks as backhaul connectivity can meet the requirement of high data rate for wirelesscommunication system as well as solve the indoor coverage problem. The handover from femtocell to femtocell is quite demanding and complicated because there are hundreds of possible target FAPs when mobile station (MS) moves out from the coverage of its serving FAP. In this paper, we propose a new mechanism for femtocell-to-femtocell handover which considers several factors such as received signal level, the hidden FAP problem and the access mode of femtocell. The simulation results show that our proposed scheme has a lower handover failure rate and a smaller neighbor femtocell list than the traditional scheme which is based on received signal level only.
Overlay networks are used widely in the Internet, such as retrieval and share of files, multimedia games and so on. However, in distributed system, the retrieval and share of 2-dimension spatial data still have some d...
详细信息
Overlay networks are used widely in the Internet, such as retrieval and share of files, multimedia games and so on. However, in distributed system, the retrieval and share of 2-dimension spatial data still have some difficult problems and can not solve the complex retrieval of 2-dimension spatial data efficiently. This article presents a new indexing overlay networks, named 2D-Ring, which is the ring topology based on gossip for 2-dimension spatial data. The peers in our overlay networks exchange the information periodically and update each local view by constructing algorithm. 2-dimension spatial data is divided by quad-tree and mapped into control points, which are hashed into 2D-Ring by SHA-1 hash function. In such way, the problem of 2-dimension spatial data indexing is converted to the problem of searching peers in the 2D-Ring. A large of extensive experiments show that the time complexity of constructing algorithm of 2D-Ring can reach convergence logarithmically as a function of the network size and hold higher hit rate and lower query delay.
Future cellular networks such as IMT-Advanced are expected to allow Device-to-Device (D2D) communication as an underlay. During the downlink period, both of the D2D receiver and cellular user will suffer from interfer...
详细信息
ISBN:
(纸本)9781467358309
Future cellular networks such as IMT-Advanced are expected to allow Device-to-Device (D2D) communication as an underlay. During the downlink period, both of the D2D receiver and cellular user will suffer from interference caused by radio resource sharing. In this paper, a joint resource allocation and resource reuse scheme is investigated, in which resource allocation to cellular users is employed on proportional fair algorithm and resource reuse to D2D users is employed on a greedy heuristic algorithm. The greedy heuristic algorithm determines the D2D mode is appropriate or not by path loss comparison, then decreases the interference to cellular user by selection of the minimum channel gain between cellular user and D2D transmitter each time. System simulations in two different scenarios demonstrate that sum throughput of cellular user and D2D pair is improved using the proposed scheme, and the interference to cellular user is under control.
Because of the difficulty of getting the association rules over out-of-order streams for big data, this paper presents an improved BP algorithm based on dynamical adjustment. In this algorithm, a dynamic adaptive stru...
详细信息
Because of the difficulty of getting the association rules over out-of-order streams for big data, this paper presents an improved BP algorithm based on dynamical adjustment. In this algorithm, a dynamic adaptive structural is settled according to environmental requirements, which can automatically remove invalid training neurons, and optimize the iterative training process. Furthermore, the algorithm dynamically adjusts three factors (i.e. momentum factor, right learning index and threshold learning factor) during the learning process to speed up the response time and enhance the stability of the network. In the simulation, three factors are changed by a self-adapting adjusting mechanism. By comparing with the traditional BP algorithm, it gets more convergence times and convergence rate. Results also indicate that the proposed algorithm can obviously improve efficiency and finally obtain the association rules over out-of-order data streams.
To date, only active-decoy-state methods have been adopted in current measurement-device-independent (MDI) quantum key distribution (QKD) protocols, causing security loopholes when modulating multiple light intensitie...
详细信息
To date, only active-decoy-state methods have been adopted in current measurement-device-independent (MDI) quantum key distribution (QKD) protocols, causing security loopholes when modulating multiple light intensities with practical devices. To solve this problem, the passive-decoy-state method will be a good choice. Until today practical passive-decoy-state MDI QKD is still missing. In this paper, based on a recently discussed structure of heralded single-photon sources, we propose a passive-decoy-state MDI QKD protocol. In present work, one does not need to modulate light sources into different intensities, but utilizes the built-in local detection events to passively generate different decoy states. Furthermore, through carrying out an appropriate mathematical method, we are able to give very precise estimations for single-photon-pair contributions. As a result, our protocol can exhibit distinct advantages compared with state-of-the-art MDI QKD schemes even when the finite-key-size effect is taken into account. Therefore, our protocol seems a promising candidate to enhance both the security and performance of MDI QKD in practical implementation.
An efficient design for a Socket server with buffer pool and a thread pool for concurrent request on the IOT platform is presented. This reduces the system overhead and buffer usage to the largest extent while faced w...
详细信息
An efficient design for a Socket server with buffer pool and a thread pool for concurrent request on the IOT platform is presented. This reduces the system overhead and buffer usage to the largest extent while faced with a large number of connections and digital requests. The simulation results show that a Socket server with a thread pool and buffer pool could lower the overhead on the context switch of threads as well as the I/O blocking.
One of the basic problems in cryptography is the generation of a common secret key between two legitimate parties in order to prevent eavesdropping. In this paper, we develop an information-theoretic secret key genera...
详细信息
One of the basic problems in cryptography is the generation of a common secret key between two legitimate parties in order to prevent eavesdropping. In this paper, we develop an information-theoretic secret key generation method that exploits the physical layer properties of the multipath channel in orthogonal frequency division multiplexing (OFDM) systems with time division duplexing (TDD), and in particular the amplitude and phase of the estimated channel frequency response (CFR). Both the fast space decorrelation and the independency of the amplitude and phase of the multipath fading channel are used to generate the secret key, leading to increased secrecy bit rate and negligible secrecy leakage. The effect of the channel estimation error, delay and mobility are investigated for the presented method. Simulation results corroborate the increased performance of the proposed method over existing ones.
In order to improve energy efficiency, the bacterial foraging optimization algorithm (OBFOA) is applied into the routing strategy for wirelesssensornetworks. The proposed strategy makes proper improvements on bacter...
详细信息
We present a scheme for the practical decoy-state quantum key distribution with heralded single-photon source. In this scheme, only two-intensity decoy states are employed. However, its performance can approach the as...
详细信息
We present a scheme for the practical decoy-state quantum key distribution with heralded single-photon source. In this scheme, only two-intensity decoy states are employed. However, its performance can approach the asymptotic case of using infinite decoy states. We compare it with the standard three-intensity decoy-state method, and through numerical simulations, we demonstrate its significant improvement over the three-intensity method in both the final key rate and the secure transmission distance. Furthermore, when taking statistical fluctuations into account, a very high key generation rate can still be obtained even at a long transmission distance.
Bundle and block were introduced into DTN transmission protocol, which shred data into bits to deal with frequent interruption in DTN network. Bundle and LTP protocol in DTN transmission layer were put forward, and th...
详细信息
Bundle and block were introduced into DTN transmission protocol, which shred data into bits to deal with frequent interruption in DTN network. Bundle and LTP protocol in DTN transmission layer were put forward, and the impact of block size on transmission efficiency was investigated when network environment probably vary dramatically in a short time. Finally we put forward a Bundle sending algorithm that dynamically changes its strategy in DTN network to achieve the best transmission efficiency and system performance. Simulation results show that selecting proper size of data block can increase the transmission effectiveness.
暂无评论