Incorporating cognitive radio capability in recource-constrainted multihop wirelesssensornetworks may help realize the deployment of multiple overlaid sensornetworks, and eliminate collision and excessive contentio...
详细信息
A new scheme of object tracking with mean shift is put forward in this paper. At first, texture feature is fused in the processing by Local Ternary Pattern (LTP). Since LTP is sensitive to local noise, least median of...
详细信息
A new scheme of object tracking with mean shift is put forward in this paper. At first, texture feature is fused in the processing by Local Ternary Pattern (LTP). Since LTP is sensitive to local noise, least median of squares (LMedS) algorithm is used to adaptively calculate the noise threshold for accurate estimation of the LTP texture information. Furthermore, target scale and orientation is estimated in case of partial occlusion or rotation, so as to realize robust object tracking. Experimental results show that the proposed algorithm can acquire robust tracking performance under complex background .
In this work, with respect to the uncertainty about the individual information, we investigate the relay power allocation problem from the energy-efficient, Pareto optimal, and competitive fairness perspective. At fir...
详细信息
ISBN:
(纸本)9781467309202
In this work, with respect to the uncertainty about the individual information, we investigate the relay power allocation problem from the energy-efficient, Pareto optimal, and competitive fairness perspective. At first, we design an easy-implementation energy efficiency metric, which aims at striking a balance between the QoS provisioning and the energy consumption. Then, an auction mechanism is proposed for relay power allocation. By transferring the auction mechanism into a game, we prove the existence, uniqueness, and Pareto optimality of the Nash equilibrium (NE) for our auction game, and show that the allocation strategies from the NE can achieve the energy efficiency in terms of the proposed metric. Next, we develop a distributed relay power allocation algorithm based on our best-response functions to reach the Pareto optimal NE. Importantly, we not only certify the convergence of the proposed algorithm, but also provide quantitative analysis on it. Extensive simulations results are conducted to confirm the validity of the analytical results.
The primary issue in dynamic cloud computing environments is how to select and schedule the ideal and different cloud resources to cooperation in order to guarantee the requirements of applications. This paper propose...
详细信息
The primary issue in dynamic cloud computing environments is how to select and schedule the ideal and different cloud resources to cooperation in order to guarantee the requirements of applications. This paper proposed a novel cloud services selection algorithm for hierarchy evaluation of SLA, which is selecting the proper resources to compromise services. The service level agreement can only ensure completion of the application. Through fuzzing the SLA attribute, this paper conducted a non-deterministic evaluation on the SLA attribute data provided by cloud service providers using variable weights. Based on the relationships among different SLA attributes, a better cloud service will be selected in a Service Oriented Architecture. The experimental results show the effectiveness of the algorithm: there is no force in the relationship between sub-tasks in the case, each cloud resource and service providers can effectively reduce the cost of application based on recommendations;with the introduction of mandatory use of strong relationships and recommendation of service resources, the effectiveness of the application is ensured while reducing the total consumption of services;the right way to use fuzzy variable cloud resources involved in service evaluation will help to cut the cost of commercial cloud services and providing users with better services.
The aim of this study is to forecast the number of free-riders in P2P networks which can help network managers to know the status of the networks in advance and take appropriate measures to cope with free-riding behav...
详细信息
In viewing of the problem that network coding can improve network throughput as well as increase network complexity, this paper proposed a special cognitive wireless mesh network topology while constructed a novel cod...
详细信息
In viewing of the problem that network coding can improve network throughput as well as increase network complexity, this paper proposed a special cognitive wireless mesh network topology while constructed a novel coding algorithm. In the multicast model based on wireless channel, the algorithm improved information transmission rate to some extent with random linear processing of data at intermediate nodes, therefore transported several combinations of data messages. Compared with traditional random message distribution algorithms, the proposed algorithm can reduce transmission number of source packets effectively and improve network throughput measured with network coding gain. The effectiveness of the algorithm has been verified by the theoretical deduction and experimental results.
Refers to the both dynamic and multivariate network environment, we proposed a cognitive networks(CNs) available resource health assessment model, did health assessment of CNs resource availability through comprehensi...
详细信息
Refers to the both dynamic and multivariate network environment, we proposed a cognitive networks(CNs) available resource health assessment model, did health assessment of CNs resource availability through comprehensive fuzzy assessment model based on intelligent agent according to user Quality of Service(QoS) combined with network real-time state. Finally, by taking video on demand (VOD) as an example, we assessed the health degree of VOD service. The experimental results represented that the proposed approach can real-timely assess overall network performance as well as CNs available resource health effectively, therefore further guarantee the CNs overall performance and service end to end QoS.
In this paper,we propose a novel method to detect encrypted bother *** the traffic preprocessing stage,the proposed payload extraction method can identify a large amount of encrypted applications *** can filter out a ...
详细信息
In this paper,we propose a novel method to detect encrypted bother *** the traffic preprocessing stage,the proposed payload extraction method can identify a large amount of encrypted applications *** can filter out a large amount of non-malicious traffic,greatly improving the detection efficiency.A Sequential Probability Ratio Test (SPRT)-based method can find spatialtemporal correlations in suspicious botnet traffic and make an accurate *** results show that the false positive and false negative rates can be controlled within a certain range.
In scenarios of real-time data collection of long-term deployed wirelesssensornetworks (WSNs), low-latency data collection with long net- work lifetime becomes a key issue. In this paper, we present a data aggrega...
详细信息
In scenarios of real-time data collection of long-term deployed wirelesssensornetworks (WSNs), low-latency data collection with long net- work lifetime becomes a key issue. In this paper, we present a data aggregation scheduling with guaran- teed lifetime and efficient latency in WSNs. We first Construct a Guaranteed Lifetime Mininmm Ra- dius Data Aggregation Tree (GLMRDAT) which is conducive to reduce scheduling latency while pro- viding a guaranteed network lifetime, and then de-sign a Greedy Scheduling algorithM (GSM) based on finding the nmzximum independent set in conflict graph to schedule he transmission of nodes in the aggregation tree. Finally, simulations show that our proposed approach not only outperfonm the state-of-the-art solutions in terms of schedule latency, but also provides longer and guaranteed network lifetilre.
The Electronic Product Code (EPC) network, originally developed by the Auto-ID Center with its standards now managed by EPCglobal, is designed and implemented to enable all objects in the world to be linked via the In...
详细信息
The Electronic Product Code (EPC) network, originally developed by the Auto-ID Center with its standards now managed by EPCglobal, is designed and implemented to enable all objects in the world to be linked via the Internet for all time. EPC is the next evolution of product identification, utilizing Radio Frequency Identification (RFID) technology to identify objects. RFID technology has been widely used in many areas, and how to deploy of a large number of readers becomes a core challenge due to the limited read range between reader and tag. This paper proposes a novel reader redundant optimization model for finding optimal redundant number of readers and their positions to cover all tags with using optimization algorithm in EPC network. Firstly, we give an overview of the collision problems in RFID system. Secondly, we propose reliability based RFID reader system model. Thirdly, we use ant colony algorithm to solve this optimization problem. Analysis results show the effectiveness of the proposed system model and simulation results show that the algorithm is effective in achieving the goal of this optimal solution.
暂无评论