In the Long Term Evolution(LTE)downlink multicast scheduling,Base Station(BS)usually allocates transmit power equally among all Resource Blocks(RBs),it may cause the waste of transmit *** avoid it,this paper put forwa...
详细信息
In the Long Term Evolution(LTE)downlink multicast scheduling,Base Station(BS)usually allocates transmit power equally among all Resource Blocks(RBs),it may cause the waste of transmit *** avoid it,this paper put forward a new algorithm for LTE multicast downlink scheduling called the Energy-saving based Inter-group Proportional Fair(EIPF).The basic idea of EIPF is to calculate an appropriate transmitting power for each group according to its data rate respectively,and then follow the inter-group proportional fair principle to allocate RBs among multicast *** results of EIPF simulation show that the proposed algorithm not only can reduce the transmit power of BS effectively but also improve the utilization rate of energy.
A secure communication mechanism is necessary in the applications of wireless Multimedia sensornetworks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, give...
详细信息
A secure communication mechanism is necessary in the applications of wireless Multimedia sensornetworks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, given the limited technological resources (in term of energy, computation, bandwidth, and storage) of sensor nodes, security and privacy policies have to be combined with energy-aware algorithms and distributed processing of multimedia contents in WMSNs. To solve these problems in this paper, an energy efficient distributed steganography scheme, which combines steganography technique with the concept of distributed computing, is proposed for secure communication in WMSNs. The simulation results show that the proposed method can achieve considerable energy efficiency while assuring the communication security simultaneously.
A new object tracking scheme for multi-camera surveillance with non-overlapping views is proposed in this paper. Brightness transfer function (BTF) is used to establish relative appearance correspondence between diffe...
详细信息
For effective and efficient detection of moving objects from complex surveillance scenarios, a novel integrated object detection scheme based on clustering and Bayesian theory is proposed in this paper. The algorithm ...
详细信息
Nonparametric model is one of the popular ones for background modeling for its ability to adapt to changes quickly in dynamic environment and enable very sensitive detection of moving objects. However, the method is t...
详细信息
Online/offline signature schemes allow one to quickly compute a digital signature from a precomputed coupon. In this paper, we present an ID-based online/offline signature for wirelesssensornetworks (WSNs), which is...
详细信息
In order to reduce network energy consumption and prolong the lifetime of wirelesssensornetworks, this paper improves the LEACH to an energy efficient multi-hop routing algorithm. LEACH in the cluster creation, data...
详细信息
Because many signals are correlated over temporal domain, this paper proposes a compressive fault telorance network coding scheme for exploring the temporal correlation of signals. This scheme overcomes the drawbacks ...
详细信息
This paper presents an Mobile Agent based Coding Aware Routing (MA-CAMR) for wirelesssensornetwork, which exploits mobile agent to discovery the routing and coding opportunities, reducing complexity of node design. ...
详细信息
In order to find the service nodes, which the users are satisfied with, in a high speed and efficiency in open network environment, a new grid-oriented multi-level service selection model is proposed, which is based o...
详细信息
暂无评论