Image registration based on mutual information is widely employed in medical image processing. But this method may lead to the wrong result of registration due to the excessive local maximum points and low accuracy. A...
详细信息
We present a scheme for the practical decoy-state quantum key distribution with heralded single-photon source. In this scheme, only two-intensity decoy states are employed. However, its performance can approach the as...
详细信息
We present a scheme for the practical decoy-state quantum key distribution with heralded single-photon source. In this scheme, only two-intensity decoy states are employed. However, its performance can approach the asymptotic case of using infinite decoy states. We compare it with the standard three-intensity decoy-state method, and through numerical simulations, we demonstrate its significant improvement over the three-intensity method in both the final key rate and the secure transmission distance. Furthermore, when taking statistical fluctuations into account, a very high key generation rate can still be obtained even at a long transmission distance.
In the view of the DV-Hop positioning algorithm which relies on the distance vector and beacon nodes, several aspects are improved: the average hop distance and hop count are corrected;a method to detect the abnormal ...
详细信息
In the view of the DV-Hop positioning algorithm which relies on the distance vector and beacon nodes, several aspects are improved: the average hop distance and hop count are corrected;a method to detect the abnormal distribution of beacon nodes is used to avoid the influence of the abnormal distribution on the positioning performance. The proposed algorithm is simple and effective. Simulation results show that compared with the traditional DV-Hop algorithm, the performance of the proposed algorithm is greatly *** performance is even even superior to that of the algorithm mentioned in literature [10]
Since the temporal and spatial correlations of sensor readings are existent in wirelesssensornetworks (WSNs), this paper develops a clustered spatio-temporal compression scheme by integrating network coding (NC) and...
详细信息
Since the temporal and spatial correlations of sensor readings are existent in wirelesssensornetworks (WSNs), this paper develops a clustered spatio-temporal compression scheme by integrating network coding (NC) and compressed sensing (CS) for correlated data. The proper selections of NC coefficients and measurement matrix are designed for this scheme. This design guarantees the reconstruction of clustered compression data successfully with an overwhelming probability and unifies the operations of NC and CS into real field successfully. Moreover, in contrast to other spatio-temporal schemes with the same computational complexity, the proposed scheme possesses lower reconstruction error by employing the independent encoding in each sensor node (including the cluster head nodes) and joint decoding in sink node. At the same time it has lower computational complexity as compared with JSM-based spatio-temporal scheme by exploiting the temporal and spatial correlations of original sensing data step by step. Finally, the simulation results verify that the clustered spatio-temporal compression scheme outperforms the other two compression schemes significantly in terms of recovery error and compression gain.
This paper focuses on decode-and-forward (DF) OFDM full duplex relaying (FDR) systems with multiple relays, where residual loop interference is taken into account. Closed-form and high-SNR approximate expressions for ...
详细信息
ISBN:
(纸本)9781467376884
This paper focuses on decode-and-forward (DF) OFDM full duplex relaying (FDR) systems with multiple relays, where residual loop interference is taken into account. Closed-form and high-SNR approximate expressions for the outage probability are derived. Simulations are carried out to validate the derived outage performance and compare the performance of OFDM FDR with that of OFDM half duplex relaying (HDR) systems.
After wormhole attacks the routing mechanism of wirelesssensornetwork (WSN) is damaged, then the hop count and distance between nodes cannot be well matched, so that the WSN becomes the anisotropic sensornetwork, r...
详细信息
ISBN:
(纸本)9781509018949
After wormhole attacks the routing mechanism of wirelesssensornetwork (WSN) is damaged, then the hop count and distance between nodes cannot be well matched, so that the WSN becomes the anisotropic sensornetwork, resulting in security treats for WSN. Considering that wormhole attacks can cause the changing of node connectivity, through the theoretical analysis and derivation, the paper has proposed a method which detects wormhole attacks with the connected relation of high connectivity nodes, and optimizes routing with the help of the normal nodes outside the wormhole. Simulation results show that the algorithm can well detect wormhole attacks and has better localization accuracy In addition, the effect is more obvious in the case of the wormhole nodes with large communication radius and long distance.
Nano-Ag incorporated hydroxyapatite/titania (HA/TiO2) coatings were deposited on Ti6A14V substrates by the plasma electrolytic oxidation process. Compared with the substrate, the deposited coatings display attractiv...
详细信息
Nano-Ag incorporated hydroxyapatite/titania (HA/TiO2) coatings were deposited on Ti6A14V substrates by the plasma electrolytic oxidation process. Compared with the substrate, the deposited coatings display attractive mechani- cal and biomedical properties. First, the coatings have stronger wear resistance and corrosion resistance. Second, they show a strong antibacterial ability. The mean vitality of the P. gingivalis on the coating surfaces is reduced to about 21%. Third, the coatings have good biocompatibility. The mean viability of the fibroblast cells on the coating surface is increased to about 130%. With these attractive properties, Ag incorporated HA/TiO2 coatings may be useful in the biomedical field.
To solve the increasing complexity with the growth of solution sets number in PESA, we present a comentropy-based PESA algorithm (C-PESA), which is an evolutionary algorithm of multi-objective optimization. In C-PESA,...
详细信息
In the view of the DV-Hop positioning algorithm which relies on the distance vector and beacon nodes, several aspects are improved: the average hop distance and hop count are corrected; a method to detect the abnormal...
详细信息
In the view of the DV-Hop positioning algorithm which relies on the distance vector and beacon nodes, several aspects are improved: the average hop distance and hop count are corrected; a method to detect the abnormal distribution of beacon nodes is used to avoid the influence of the abnormal distribution on the positioning performance. The proposed algorithm is simple and effective. Simulation results show that compared with the traditional DV-Hop algorithm, the performance of the proposed algorithm is greatly improved. The performance is even even superior to that of the algorithm mentioned in literature [10].
To solve the fairness problem in user access of mobile communication systems, we proposed an access control scheme based on price and customer satisfaction (PSAC) in this paper. In the scheme, we borrow Cobb-Douglas o...
详细信息
暂无评论