作者:
Junqing ZhangRuchuan WangYisheng QianQianyi WangCollege of Computer
Nanjing University of Posts and Telecommunications Nanjing Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education
The main study of traditional probability coverage problem in wirelesssensornetworks(WSNs) is aiming at twodimensional space, however, most practical applications of wirelesssensornetwork is placed in a three-dime...
详细信息
The main study of traditional probability coverage problem in wirelesssensornetworks(WSNs) is aiming at twodimensional space, however, most practical applications of wirelesssensornetwork is placed in a three-dimensional sensornetworks. Therefore, probability model is introduced for three-dimensional WSNs. This paper presents a method that using Voronoi divide to control the Scheduling of the probability model nodes in the target area. Also, a coverage control algorithm based on probability model(PMCCA) is proposed. We verify the effectiveness and the practice of PMCCA algorithm by comparing PMCCA algorithm to another algorithm in simulation experiment.
Super resolution (SR) through neighbor embedding is recognized as an effective way to produce a high resolution (HR) image. However, this learning-based method is clumsy at preserving sharper edges and suppressing unw...
详细信息
We propose new schemes on implementing the single-photon-added coherent source in the quantum key *** apply the source in either the standard BB84 protocol or the new proposed measurement-device-independent quantum ke...
详细信息
We propose new schemes on implementing the single-photon-added coherent source in the quantum key *** apply the source in either the standard BB84 protocol or the new proposed measurement-device-independent quantum key *** compare its performance with the case of using other existing sources,e.g.,the
The subspace pursuit algorithm in compressed sensing cannot achieve desirable reconstruction performance in the presence of impulsive noise based on the fact that the support detection and least squares are not robust...
详细信息
The Delay/Disruption Tolerant network(DTN) is characterized with long delay,high bit-error rate,intermittent connectivity and frequent *** to this,network coding is introduced to improve its transmission performance...
详细信息
The Delay/Disruption Tolerant network(DTN) is characterized with long delay,high bit-error rate,intermittent connectivity and frequent *** to this,network coding is introduced to improve its transmission performance *** DTN routing algorithms based on network coding have been ***,they are susceptible to various malicious *** this paper,we propose a new kind of networking scheme suitable to the DTN,which can resist the eavesdropping attacks to a certain ***,we establish a DTN network model based on the packet path optimization allocation algorithm and redefine the packet format to meet the algorithm ***,to resist the dropping attacks,the source node dynamically adds redundancy factors at the certain *** the pollution attacks and the data tampering attacks can almost be resisted by means of mutual authentication between intermediate *** approach avoids the traditional anti-tampering attack algorithm over-reliant on the source *** security analysis and simulation results show that our scheme can effectively resist the joint attacks and optimize the network performance.
Device-to-Device (D2D) communication has been proposed to be a promising data offloading solution in the coming big data age, with multimedia dominating the digital contents. As quality of experience (QoE) is the majo...
详细信息
Device-to-Device (D2D) communication has been proposed to be a promising data offloading solution in the coming big data age, with multimedia dominating the digital contents. As quality of experience (QoE) is the major determining factor in the success of new multimedia applications, we novelly propose a QoE-driven cooperative content dissemination (QeCS) scheme in the paper. Specifically, all the users predict the QoE of the potential connections characterized by mean opinion score (MOS) and send the results to the content provider (CP). Then CP formulates a weighted oriented graph based on the network topology and MOS of each potential connection. By factorizing the graph, the content dissemination fashion is established through seeking 1-factor with the maximum weight thus achieving maximum total user MOS.
An improved outdoor camera calibration method based on Extended Kalman Filter(EKF) is proposed in this paper. GPS coordinate system is introduced to establish world coordinate system in the calibration procedure. Acco...
详细信息
ISBN:
(纸本)9781629939865
An improved outdoor camera calibration method based on Extended Kalman Filter(EKF) is proposed in this paper. GPS coordinate system is introduced to establish world coordinate system in the calibration procedure. According to the characteristics of GPS coordinate converted to plane coordinate and the camera calibration model, we establish the mapping relations of reference points between image plane coordinate and the world coordinate. Further, we consider the world coordinate error, set the world coordinates as the measure quantities, use the method of EKF to get the optimal estimation of intrinsic and extrinsic camera parameters, in EKF the camera's intrinsic and extrinsic parameters are set as state variables, the transformation equations of image coordinate to the world coordinate are set as the measurement equations, and we let the observed feature points' image coordinates and corresponding world coordinates as the input of the filter. Experimental results confirmed that the proposed method with high precision.
The Delay/Disruption Tolerant network (DTN) is characterized with long delay, high bit-error rate, intermittent connectivity and frequent partitions. Due to this, network coding is introduced to improve its transmissi...
详细信息
The Delay/Disruption Tolerant network (DTN) is characterized with long delay, high bit-error rate, intermittent connectivity and frequent partitions. Due to this, network coding is introduced to improve its transmission performance significantly. Numerous DTN routing algorithms based on network coding have been developed. However, they are susceptible to various malicious attacks. In this paper, we propose a new kind of networking scheme suitable to the DTN, which can resist the eavesdropping attacks to a certain extant. Firstly, we establish a DTN network model based on the packet path optimization allocation algorithm and redefine the packet format to meet the algorithm requirements. Meanwhile, to resist the dropping attacks, the source node dynamically adds redundancy factors at the certain time. Then the pollution attacks and the data tampering attacks can almost be resisted by means of mutual authentication between intermediate nodes. This approach avoids the traditional anti-tampering attack algorithm over-reliant on the source node. The security analysis and simulation results show that our scheme can effectively resist the joint attacks and optimize the network performance.
In DTN (Delay Tolerant networks), bundle and block shred data to cope with frequent interruption. However, it remains a problem of what impact will be generated on transmission efficiency by the size of bundle and blo...
详细信息
In this paper, a new fast encoding scheme using CU depth information for quality scalable HEVC was proposed. The proposed scheme based on the correlation between the base layer and enhancement layer, as well as the co...
详细信息
In this paper, a new fast encoding scheme using CU depth information for quality scalable HEVC was proposed. The proposed scheme based on the correlation between the base layer and enhancement layer, as well as the correlation between current frame and reference frame, which obtained by experiment. The main idea of the algorithm is that when each LCU is encoded in enhancement layer, it's corresponding encoded LCU's best coding depth in base layer is used as the new maximum encoding depth in enhancement layer, thereby, it can reduce the unnecessary CU division process then reduce the computational complexity. On the other hand, for base layer, when each LCU encoding in current frame, the corresponding LCU's depth in already coded reference frame is utilized to skip parts process of mode selection before reach this reference depth, so that the computational complexity can be reduced again. Experimental results show that compared with the original SHM5.1, our proposed method saves about 59.45% and 67.71% encoding time in whole encoding layers and enhancement layer respectively, with a negligible decrease in PSNR of 0.014 dB and bitrate increase of 0.46% in EL, as well as PSNR of 0.05 dB and bitrate increase of 1.15% in BL averagely.
暂无评论