We carry out a proof-of-principle demonstration of three-state uncharacterized measurement-device-independent quantum key distribution over 170 km, achieving the longest transmission distance under the same security l...
详细信息
P-homomorphic signature is a general framework for computing on authenticated data, which is recently proposed by Ahn et al. With P-homomorphic signature, any third party can derive a signature on the object message m...
详细信息
Existing Ethernet Passive Optical network (EPON) Dynamic Bandwidth Allocation (DBA) algorithms suffer from the disadvantage of idle time loss, which lower the upstream bandwidth utilization. This letter proposes an im...
详细信息
Security is an important factor which influences the application of the wireless multimedia sensornetworks. And Multipath routing is an effective approach to transmit large multimedia dada in sensornetworks. This pa...
详细信息
作者:
Junqing ZhangRuchuan WangYisheng QianQianyi WangCollege of Computer
Nanjing University of Posts and Telecommunications Nanjing Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education
The main study of traditional probability coverage problem in wirelesssensornetworks(WSNs) is aiming at twodimensional space, however, most practical applications of wirelesssensornetwork is placed in a three-dime...
详细信息
The main study of traditional probability coverage problem in wirelesssensornetworks(WSNs) is aiming at twodimensional space, however, most practical applications of wirelesssensornetwork is placed in a three-dimensional sensornetworks. Therefore, probability model is introduced for three-dimensional WSNs. This paper presents a method that using Voronoi divide to control the Scheduling of the probability model nodes in the target area. Also, a coverage control algorithm based on probability model(PMCCA) is proposed. We verify the effectiveness and the practice of PMCCA algorithm by comparing PMCCA algorithm to another algorithm in simulation experiment.
The wireless mesh network (WMN) is effective as emergency networks in disaster area which has a flexible network topology. The efficiency of the energy is particularly important in the emergency communicationnetwork....
详细信息
As networks have grown in size and complexity, the existing isolated add-on security systems of internet are confronting some serious challenges. This paper outlines the background, concept, evolution and basic proper...
详细信息
As networks have grown in size and complexity, the existing isolated add-on security systems of internet are confronting some serious challenges. This paper outlines the background, concept, evolution and basic properties of the trustworthy network, and projects the future development of the network in terms of its access control, modeling of trust relationship, quantification and decisionmaking. Then put forward a strengthen TNC to fix the deficiencies.
The traditional Poisson model in the modern data networks have been ineffective and cannot reflect the real flow trend. However, since Hosking discovers the network traffic self-similarity, self-similar models have co...
详细信息
The traditional Poisson model in the modern data networks have been ineffective and cannot reflect the real flow trend. However, since Hosking discovers the network traffic self-similarity, self-similar models have continued to emerge, this article improved FARIMA model based on time compensation. We put forward a sliding FARIMA model which fixes the time delay of FARIMA model and analyzed the model's application in the anomaly detection of network.
According to the application of range-free measurement for wirelesssensornetworks (WSNs), a novel localization algorithm of nodes in based on iterative centroid estimation is proposed in the paper. First, we derive ...
详细信息
ISBN:
(纸本)9781538653746
According to the application of range-free measurement for wirelesssensornetworks (WSNs), a novel localization algorithm of nodes in based on iterative centroid estimation is proposed in the paper. First, we derive the centroid of the plane enclosed by the current connected beacon nodes as well as the received signal strength (RSSI) between target and beacon nodes. Then, we replace the farthest beacon node from the target node with the centroid node we derive in order to narrow the area of the plane enclosed by the connected beacon nodes and improve the location accuracy through multiple iterations. Judging from the simulation results, the proposed algorithm presents decent results of all indications and is thus eligible for localization in WSNs.
This paper considers a cognitive wireless powered communicationnetwork (CWPCN) consisting of a cognitive base station (CBS) and a set of secondary users (SUs) sharing spectrum with a primary user (PU). The transmissi...
详细信息
This paper considers a cognitive wireless powered communicationnetwork (CWPCN) consisting of a cognitive base station (CBS) and a set of secondary users (SUs) sharing spectrum with a primary user (PU). The transmission time is assumed to be divided into two parts, where the CBS transfers energy in the downlink during the first time part, and the SUs use the harvested energy to transmit in the uplink based on the time-division multiple access (TDMA) during the second time part. We investigate the problem for minimizing the average outage probability of the SUs by jointly optimizing the time allocation and the downlink transmit power allocation under the interference power and the transmit power constraints and propose a heuristic algorithm to solve it. Simulations show that the proposed algorithm greatly outperforms the benchmark algorithms.
暂无评论