A novel trust transmission method which is based on the similarities of nodes in trust models is proposed in this paper. Trust transmission is evaluated by calculating the similarity between recommenders when trustor ...
详细信息
To improve the effectiveness of control and remediation of failure access terminals in trusted network, a novel remediation scheme is proposed in this paper. Based on the introduction of a definition of stability of a...
详细信息
An improved MEW ( muhiplicative exponent weighting) algorithm, SLE-MEW is proposed for vertical handoff decision in heterogeneous wirelessnetworks. It introduces the SINR( signal to interference plus noise ratio)...
详细信息
An improved MEW ( muhiplicative exponent weighting) algorithm, SLE-MEW is proposed for vertical handoff decision in heterogeneous wirelessnetworks. It introduces the SINR( signal to interference plus noise ratio) effects, LS (least square) and information entropy method into the algorithm. An attribute matrix is constructed considering the SINR in the source network and the equivalent SINR in the target network, the required bandwidth, the traffic cost and the available bandwidth of participating access networks. Handoff decision meeting multi-attribute QoS(quality of serv- ice) requirement is made according to the traffic features. The subjective weight relation of decision elements is determined with LS method. The information entropy method is employed to derive the objective weights of the evaluation criteria, and lead to the comprehensive weight. Finally decision is made using MEW algorithm based on the attribute matrix and weight vector. Four 3GPP( the 3rd generation partnership project) defined traffic classes are considered in performance evaluation. The simulation results have shown that the proposed algorithm can provide satisfactory performance fitting to the characteristics of the traffic.
Video compression can reduce the amount of data information for wireless multimedia sensornetworks(WMSNs). Compared with the traditional video coding algorithms, big gap existed in coding performance for Distributed ...
详细信息
Video compression can reduce the amount of data information for wireless multimedia sensornetworks(WMSNs). Compared with the traditional video coding algorithms, big gap existed in coding performance for Distributed Video Coding (DVC). In order to improve the efficiency of side information estimation, a novel hash-based side information estimation algorithm is proposed in this paper. For the regions of the Wyner-Ziv frame which cannot coding and decoding accurately, Discrete Cosine Transform (DCT) low-frequency coefficients of DCT is extracted according to the criteria of ROI for entropy coding. Then decoded DCT low-frequency coefficients for bidirectional hash motion estimation is utilized by decoder, which enables the decoder to choose between past and future reference frames for frame interpolation to generate best side information. Experimental results show that our proposed algorithm can gain more accurate motion estimation in the intense motion region. The algorithm can also reduce the rate, improve the quality of decoded image, and decrease the energy consumption of sensor nodes ultimately, which is important for WMSNs.
The PROMETHEE (Preference Ranking Organization METHod for Enrichment Evaluation) algorithm is applied in the vertical handoff decision technology for heterogeneous wirelessnetworks and researched on its performance. ...
详细信息
The PROMETHEE (Preference Ranking Organization METHod for Enrichment Evaluation) algorithm is applied in the vertical handoff decision technology for heterogeneous wirelessnetworks and researched on its performance. Four 3GPP defined traffic classes are considered in performance evaluation. An attribute matrix is constructed by considering the SINR in the source network and the equivalent SINR in the target network, the required bandwidth, the traffic cost and the available bandwidth of participating access networks. Handoff decision meeting multi-attribute QoS requirement is made according to the traffic features. The weight relation of decision elements is determined with Least Square (LS) method. Finally decision is made by using PROMETHEE algorithm based on the attribute matrix and weight vector. The simulation results show that the PROMETHEE algorithm can provide satisfactory vertical handoff performance and the proposed LS-PROMETHEE algorithm can be fit for the characteristics of the traffic.
In an underlay cognitive two-way Amplify-and-Forward (AF) relaying network, secondary users (SUS) and primary user (PU) can share the licensed spectrum simultaneously under the interference threshold constraint. In th...
详细信息
ISBN:
(纸本)9781629939254
In an underlay cognitive two-way Amplify-and-Forward (AF) relaying network, secondary users (SUS) and primary user (PU) can share the licensed spectrum simultaneously under the interference threshold constraint. In this paper, the joint power allocation and optimal relay selection scheme is proposed for allocating radio resource on cognitive nodes effectively. For power allocation problem, the objective function is to maximize the achieved minimum Signal to Interference plus Noise Ratio (SINR) at SUS, and the constraints include the total transmit power of cognitive nodes and PU interference threshold, the optimal power allocation algorithm and a simple distributed power allocation algorithm are proposed. Furthermore, based on these results, an optimal two-way relay selection scheme is proposed. Simulation results show that the proposed joint power allocation algorithms and relay selection scheme can achieve excellent system performance.
To bridge the gap between limited energy supplies of the sensor nodes and the system lifetime, duty-cycle wirelesssensornetworks (WSNs) with data aggregation are studied in this paper. We proposed a load-balanced an...
详细信息
As networks have grown in size and complexity, the existing isolated add-on security systems of internet are confronting some serious challenges. This paper outlines the background, concept, evolution and basic proper...
详细信息
As networks have grown in size and complexity, the existing isolated add-on security systems of internet are confronting some serious challenges. This paper outlines the background, concept, evolution and basic properties of the trustworthy network, and projects the future development of the network in terms of its access control, modeling of trust relationship, quantification and decisionmaking. Then put forward a strengthen TNC to fix the deficiencies.
The traditional Poisson model in the modern data networks have been ineffective and cannot reflect the real flow trend. However, since Hosking discovers the network traffic self-similarity, self-similar models have co...
详细信息
The traditional Poisson model in the modern data networks have been ineffective and cannot reflect the real flow trend. However, since Hosking discovers the network traffic self-similarity, self-similar models have continued to emerge, this article improved FARIMA model based on time compensation. We put forward a sliding FARIMA model which fixes the time delay of FARIMA model and analyzed the model's application in the anomaly detection of network.
With the development of web service, more and more attention has been drawn to web service in recent years. However, the damage caused by service security problems is becoming more and more serious nowadays. This pape...
详细信息
暂无评论