For some existing handoff control algorithms in Aerospace Information network, the success rate of their handoff calls is not high. This paper proposes a handoff control algorithm based on service priorities and chann...
详细信息
Intermittently Connected Mobile Ad Hoc networks (ICMANs) are mobile networks in which complete source-to-destination paths do not exist most of the time. This paper proposed a Predictable Adaptive Seed Spray routing (...
详细信息
Intermittently Connected Mobile Ad Hoc networks (ICMANs) are mobile networks in which complete source-to-destination paths do not exist most of the time. This paper proposed a Predictable Adaptive Seed Spray routing (PASS) for intermittently connected mobile Ad Hoc networks. PASS is a cost-efficient delay-bounded routing protocol without network parameters and provides acceptable and resilient service in the face of challenged environments. Simulations have shown that PASS outperforms existing schemes such as Epidemic, binary spray & wait and AMR with respect to routing cost and adaptability.
wirelesssensornetworks (WSN) are mainly characterized by a potentially large number of distributed sensor nodes which collectively transmit information about sensed events to the sink. In this paper, we present a ce...
详细信息
Aiming at the problems that when common algorithms are adopted to detect foreground objects in traffic surveillance videos, there are more false detection results with higher memory and time cost, an algorithm based o...
详细信息
Smart home includes an access control system, temperature and humidity system etc. Each system includes different terminals and each terminal is equipped with different sensors. sensor senses its surroundings and gene...
详细信息
Wi-Fi has been widely deployed with the rapid development of wireless communication technique. Wi-Fi hotspots are popular in campus, making convenient wirelessnetwork access possible. However, during class teaching, ...
详细信息
A secure communication mechanism is necessary in the applications of wireless Multimedia sensornetworks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, give...
详细信息
A secure communication mechanism is necessary in the applications of wireless Multimedia sensornetworks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, given the limited technological resources (in term of energy, computation, bandwidth, and storage) of sensor nodes, security and privacy policies have to be combined with energy-aware algorithms and distributed processing of multimedia contents in WMSNs. To solve these problems in this paper, an energy efficient distributed steganography scheme, which combines steganography technique with the concept of distributed computing, is proposed for secure communication in WMSNs. The simulation results show that the proposed method can achieve considerable energy efficiency while assuring the communication security simultaneously.
With the rapid development of e-commerce, the security issues of collaborative filtering recommender systems have been widely investigated. Malicious users can benefit from injecting a great quantities of fake profile...
详细信息
With the rapid development of e-commerce, the security issues of collaborative filtering recommender systems have been widely investigated. Malicious users can benefit from injecting a great quantities of fake profiles into recommender systems to manipulate recommendation results. As one of the most important attack methods in recommender systems, the shilling attack has been paid considerable attention, especially to its model and the way to detect it. Among them, the loose version of Group Shilling Attack Generation Algorithm (GSAGenl) has outstanding performance. It can be immune to some PCC (Pearson Correlation Coefficient)-based detectors due to the nature of anti-Pearson correlation. In order to overcome the vulnerabilities caused by GSAGenl, a gravitation-based detection model (GBDM) is presented, integrated with a sophisticated gravitational detector and a decider. And meanwhile two new basic attributes and a particle filter algorithm are used for tracking prediction. And then, whether an attack occurs can be judged according to the law of universal gravitation in decision-making. The detection performances of GBDM, HHT-SVM, UnRAP, AP-UnRAP Semi-SAD,SVM-TIA and PCA-P are compared and evaluated. And simulation results show the effectiveness and availability of GBDM.
Low earth orbit(LEO) satellite network is an important development trend for future mobile communication systems, which can truly realize the“ubiquitous connection” of the whole world. In this paper, we present a co...
详细信息
Low earth orbit(LEO) satellite network is an important development trend for future mobile communication systems, which can truly realize the“ubiquitous connection” of the whole world. In this paper, we present a cooperative computation offloading in the LEO satellite network with a three-tier computation architecture by leveraging the vertical cooperation among ground users, LEO satellites, and the cloud server, and the horizontal cooperation between LEO satellites. To improve the quality of service for ground users, we optimize the computation offloading decisions to minimize the total execution delay for ground users subject to the limited battery capacity of ground users and the computation capability of each LEO satellite. However, the formulated problem is a large-scale nonlinear integer programming problem as the number of ground users and LEO satellites increases, which is difficult to solve with general optimization algorithms. To address this challenging problem, we propose a distributed deep learning-based cooperative computation offloading(DDLCCO) algorithm, where multiple parallel deep neural networks(DNNs) are adopted to learn the computation offloading strategy dynamically. Simulation results show that the proposed algorithm can achieve near-optimal performance with low computational complexity compared with other computation offloading strategies.
For effective and efficient detection of moving objects from complex surveillance scenarios, a novel integrated object detection scheme based on clustering and Bayesian theory is proposed in this paper. The algorithm ...
详细信息
暂无评论