This paper aims to propose a design of dynamic context management scheme for low-power wireless personal area networks based on IPv6 (6LoWPAN). In the scheme, a prefix auto-configuration mechanism is established to up...
详细信息
Ghost imaging could be used to make a quick identification of orthogonal objects by means of photocurrent correlation measurements. In this paper, we extend the method to identify nonorthogonal objects. In the method,...
详细信息
Ghost imaging could be used to make a quick identification of orthogonal objects by means of photocurrent correlation measurements. In this paper, we extend the method to identify nonorthogonal objects. In the method, an object is illuminated by one photon from an entangled pair, and the other one is diffracted into a particular direction by a pre-established multiple-exposure hologram in the idler arm. By the correlation measurements, the nonorthogonal object in the signal arm could be discriminated within a very short time. The constraints for the identification of nonorthogonal objects are presented, which show that the nonorthogonal objects can be discriminated when the overlapping portion between any two objects is less than half of all the objects in the set. The numerical simulations further verify the result.
In the light of the problem of collaborative recommendation and content-based cold start, this paper proposes a hybrid recommendation system based on social network. The method is based on the user social relations ne...
详细信息
ISBN:
(纸本)9781479982172
In the light of the problem of collaborative recommendation and content-based cold start, this paper proposes a hybrid recommendation system based on social network. The method is based on the user social relations network. According to the social behavior of user, by establishing the model of social network users, it puts forward the user similarity measure. Then it takes random walk algorithm as a basis and selects out N users who have the highest similarity with the users' interest. The test results show that this method can obtain better recommendation effect and customer satisfaction.
Aimed at the problems that data access delay and static index structure cannot meet the demand of frequent index update in the massive network management data,a dynamic index mechanism based on HBase and a special ind...
详细信息
Aimed at the problems that data access delay and static index structure cannot meet the demand of frequent index update in the massive network management data,a dynamic index mechanism based on HBase and a special index table is designed in this *** key value of the table is comprised of key value and indexed column which come from original data,thus enforcing the map of the indexed column with the original *** address the problems in frequently adding and deleting data,an index update algorithm is established in which only changed data is *** results show that the index structure will be adjusted as the data is adding and deleting,rustling in the optimal search *** query efficiency based on the improved method raises 4.98 times in 100 thousand rows and 55.66 times in 1 million *** more the number of the rows increases,the more search efficiency obviously improves.
In view of the existing web site credibility evaluation models failing to comprehensively consider the multiple attributes of trust,after learning the D- S evidence theory and fuzzy theory,a new web site credibility e...
详细信息
ISBN:
(纸本)9781510805750
In view of the existing web site credibility evaluation models failing to comprehensively consider the multiple attributes of trust,after learning the D- S evidence theory and fuzzy theory,a new web site credibility evaluation model is put forward in which the trust value is divided into historical trust value and the current trust *** study shows that the model can track the change of user preferences in real-time as well as can meet the dynamic nature of universal environment,so the trust assessment is more reasonable and accurate.
Face recognition research mainly focuses on traditional 2D color images, which is extremely susceptible to be affected by external factors such as various viewpoints and has limited recognition accuracy. In order to a...
详细信息
Face recognition research mainly focuses on traditional 2D color images, which is extremely susceptible to be affected by external factors such as various viewpoints and has limited recognition accuracy. In order to achieve improved recognition performance, as well as the 3D face holds more abundant information than 2D, we present a 3D human face recognition algorithm using the Microsoft's Kinect. The proposed approach integrates the depth data with the RGB data to generate 3D face raw data and then extracts feature points, identifies the target via a two-level cascade classifier. Also, we build a 3D-face database including 16 individuals captured exclusively using Kinect. The experimental results indicate that the introduced algorithm can not only achieve better recognition accuracy in comparison to existing 2D and 3D face recognition algorithms when the probe face is exactly in front of Kinect sensor, but also can increase 9.3% of recognition accuracy compared to the PCA-3D algorithm when it is not confronting the camera.
In this paper, we present a two-hop-relay WCDMA cellular system with queueing capability, where a call can wait in the incoming buffer at the congested Base Transceiver Station (BTS) if no channel is immediately avail...
详细信息
ISBN:
(纸本)9781849199940
In this paper, we present a two-hop-relay WCDMA cellular system with queueing capability, where a call can wait in the incoming buffer at the congested Base Transceiver Station (BTS) if no channel is immediately available, so as to reduce the call blocking rate. We develop an analytic model based on Multidimensional Markov chains. Then based on this model, we can obtain the average transmission rate and the queuing delay performance of the system respectively. Finally, through numerical calculation, we analyze the impact of the various parameters on the performance of the two-hop-relay WCDMA cellular system with queueing capability.
In this paper, we consider the buffer-aided multi-relay MIMO-OFDM networks and propose a joint space-time-frequency subchannel pairing scheme, in which subchannels of the source to relay links and relay to the destina...
详细信息
ISBN:
(纸本)9781467376884
In this paper, we consider the buffer-aided multi-relay MIMO-OFDM networks and propose a joint space-time-frequency subchannel pairing scheme, in which subchannels of the source to relay links and relay to the destination links are paired in time, frequency, and space domain (TPFPSP) simultaneously. TPFPSP scheme can increase the equivalent channel gains between source and destination. We derive new expressions for the energy efficiency, the system capacity and the outage probability to examine the performance of TPFPSP scheme. Our analytical and numerical results outline that this TPFPSP scheme brings higher capacity, energy efficiency and better outage probability performance to our system. This work reported here provides detailed insights into the design of new subchannel pairing scheme, which achieves full diversity in space, time and frequency domains.
Device-to-device (D2D) communicationtechnology can significantly improve energy efficiency and offload base station traffic. It has become a new research focus in next generation mobile communications. In this paper,...
详细信息
ISBN:
(纸本)9781467376884
Device-to-device (D2D) communicationtechnology can significantly improve energy efficiency and offload base station traffic. It has become a new research focus in next generation mobile communications. In this paper, a file-sharing mechanism based on social networks is proposed for the D2D communication system underlaying cellular networks aiming at improving the users' quality of experience (QoE). In the proposed mechanism, all users are divided into several groups according to the documentation requirements. Then the D2D communication links are built within each group by fully considering the social relationships and trust degrees of users. The target files give priority to be shared through the D2D mode. Theoretical analysis and extensive simulation results show clearly that the social relationships can affect the whole wirelessnetworks significantly. Selecting a user with the largest social degree as a central user can greatly reduce the transmission delay, relieve the heavy burden of base stations and then optimize the overall performance of cellular communication systems.
Fall detection is one of the feasible solutions for solving the problem of aging of population. This paper presents an algorithm to detect falling for the elderly with one wrist-worn device. The algorithm has lower co...
详细信息
ISBN:
(纸本)9781479987467
Fall detection is one of the feasible solutions for solving the problem of aging of population. This paper presents an algorithm to detect falling for the elderly with one wrist-worn device. The algorithm has lower computation complexity to determine the fall event according to the inclination gradient. Experimental results show that it performs better than another similar devices with the average sensitivity and specificity of 94.44% and 100%, respectively.
暂无评论