Spurred by the need of network monitoring and security, network traffic modeling is a much discussed research topic. However, the classical Markov flow model is no longer suitable for packet-switched network because o...
详细信息
Efficient video transmission over unreliable channels may encounter huge challenge due to unavoidable bit error or packets loss. Error concealment (EC) techniques at the decoder side have been developed to recover the...
详细信息
In this paper,we introduce a new kind of homomorphic signature,which is suitable for identity authentication in cloud computing.A user firstly computes the full signature on its all identity attributes,and sends the f...
详细信息
In this paper,we introduce a new kind of homomorphic signature,which is suitable for identity authentication in cloud computing.A user firstly computes the full signature on its all identity attributes,and sends the full signature to the intermediate channel server (the intermediate channel server should check and verify it).During the valid period of his full signature,if the user wants to require a cloud service on a special identity (only involves part of identity attributes),he only needs to securely send a {0,1}n vector to the intermediate channel *** intermediate channel server who doesn't know the secret key can compute the partial signature on the special identity,and then sends it to the cloud *** give a formal secure definition of this homomorphic signature,and construct a scheme from GHR *** prove that our scheme is secure under GHR signature.
Strategy of sensor nodes deployment is directly related to the cost and performance for underwater wireless sensornetworks, which is largely determined the various service-quality improvement of wireless sensor netwo...
详细信息
Strategy of sensor nodes deployment is directly related to the cost and performance for underwater wireless sensornetworks, which is largely determined the various service-quality improvement of wireless sensornetworks. In order to improve the coverage of the target area, this paper presents a distributed algorithm of coverage control. Assume that nodes initially deployed on the surface of the water and can only move in vertical direction in 3-D space, the algorithm is first to control the nodes in-depth and relocate the nodes at different depths, then the nodes continue to adjust their depths until there is no augment for improving their coverage, and to achieve efficient coverage of the three-dimensional sensornetworks ultimately. Experimental results show that compared with traditional random deployment method, the proposed coverage control algorithm can improve coverage of network effectively.
Wireless multimedia sensornetworks have become the focus of research in a wide variety of areas in recent years. The camera sensor nodes observe the phenomenon at different locations in the field, and the spatially p...
详细信息
Wireless multimedia sensornetworks have become the focus of research in a wide variety of areas in recent years. The camera sensor nodes observe the phenomenon at different locations in the field, and the spatially proximal cameras could have highly overlapped field of views (FoVs). Based on the three-dimensional sensing model of camera sensor node, a FoVs correlation model was proposed in this paper. Then, a grid-based and a relative position-based approach were respectively designed to calculate the correlation coefficient between two cameras. Simulation results and algorithm complexity analysis demonstrate that the relative position-based method has highly efficiency and nearly reduces two orders of magnitude of time complexity to the former.
The primary issue in dynamic cloud computing environments is how to select and schedule the ideal and different cloud resources to cooperation in order to guarantee the requirements of applications. This paper propose...
详细信息
The primary issue in dynamic cloud computing environments is how to select and schedule the ideal and different cloud resources to cooperation in order to guarantee the requirements of applications. This paper proposed a novel cloud services selection algorithm for hierarchy evaluation of SLA, which is selecting the proper resources to compromise services. The service level agreement can only ensure completion of the application. Through fuzzing the SLA attribute, this paper conducted a non-deterministic evaluation on the SLA attribute data provided by cloud service providers using variable weights. Based on the relationships among different SLA attributes, a better cloud service will be selected in a Service Oriented Architecture. The experimental results show the effectiveness of the algorithm: there is no force in the relationship between sub-tasks in the case, each cloud resource and service providers can effectively reduce the cost of application based on recommendations;with the introduction of mandatory use of strong relationships and recommendation of service resources, the effectiveness of the application is ensured while reducing the total consumption of services;the right way to use fuzzy variable cloud resources involved in service evaluation will help to cut the cost of commercial cloud services and providing users with better services.
A new scheme of object tracking with mean shift is put forward in this paper. At first, texture feature is fused in the processing by Local Ternary Pattern (LTP). Since LTP is sensitive to local noise, least median of...
详细信息
A new scheme of object tracking with mean shift is put forward in this paper. At first, texture feature is fused in the processing by Local Ternary Pattern (LTP). Since LTP is sensitive to local noise, least median of squares (LMedS) algorithm is used to adaptively calculate the noise threshold for accurate estimation of the LTP texture information. Furthermore, target scale and orientation is estimated in case of partial occlusion or rotation, so as to realize robust object tracking. Experimental results show that the proposed algorithm can acquire robust tracking performance under complex background .
In this work, with respect to the uncertainty about the individual information, we investigate the relay power allocation problem from the energy-efficient, Pareto optimal, and competitive fairness perspective. At fir...
详细信息
ISBN:
(纸本)9781467309202
In this work, with respect to the uncertainty about the individual information, we investigate the relay power allocation problem from the energy-efficient, Pareto optimal, and competitive fairness perspective. At first, we design an easy-implementation energy efficiency metric, which aims at striking a balance between the QoS provisioning and the energy consumption. Then, an auction mechanism is proposed for relay power allocation. By transferring the auction mechanism into a game, we prove the existence, uniqueness, and Pareto optimality of the Nash equilibrium (NE) for our auction game, and show that the allocation strategies from the NE can achieve the energy efficiency in terms of the proposed metric. Next, we develop a distributed relay power allocation algorithm based on our best-response functions to reach the Pareto optimal NE. Importantly, we not only certify the convergence of the proposed algorithm, but also provide quantitative analysis on it. Extensive simulations results are conducted to confirm the validity of the analytical results.
In viewing of the problem that network coding can improve network throughput as well as increase network complexity, this paper proposed a special cognitive wireless mesh network topology while constructed a novel cod...
详细信息
In viewing of the problem that network coding can improve network throughput as well as increase network complexity, this paper proposed a special cognitive wireless mesh network topology while constructed a novel coding algorithm. In the multicast model based on wireless channel, the algorithm improved information transmission rate to some extent with random linear processing of data at intermediate nodes, therefore transported several combinations of data messages. Compared with traditional random message distribution algorithms, the proposed algorithm can reduce transmission number of source packets effectively and improve network throughput measured with network coding gain. The effectiveness of the algorithm has been verified by the theoretical deduction and experimental results.
Refers to the both dynamic and multivariate network environment, we proposed a cognitive networks(CNs) available resource health assessment model, did health assessment of CNs resource availability through comprehensi...
详细信息
Refers to the both dynamic and multivariate network environment, we proposed a cognitive networks(CNs) available resource health assessment model, did health assessment of CNs resource availability through comprehensive fuzzy assessment model based on intelligent agent according to user Quality of Service(QoS) combined with network real-time state. Finally, by taking video on demand (VOD) as an example, we assessed the health degree of VOD service. The experimental results represented that the proposed approach can real-timely assess overall network performance as well as CNs available resource health effectively, therefore further guarantee the CNs overall performance and service end to end QoS.
暂无评论