In order to calculate the lost phase from the intensity information effectively,a new method of phase retrieval which based on cosine grating modulation and transport of intensity equation is proposed
In order to calculate the lost phase from the intensity information effectively,a new method of phase retrieval which based on cosine grating modulation and transport of intensity equation is proposed
In this paper,we propose a cross-layer power allocation scheme over wireless relay networks for quality-of-service(Qo S)*** formulate our original throughput maximization problem into effective capacity maximization p...
详细信息
In this paper,we propose a cross-layer power allocation scheme over wireless relay networks for quality-of-service(Qo S)*** formulate our original throughput maximization problem into effective capacity maximization problem by applying information theory and the concept of the effective *** our scheme,we focus on full duplex mode and amplify-and-forward(AF)*** particular,our proposed scheme derives closed-form expressions and analyzes the impacts of the SNR of the interference channel on the performance of full duplex relaying *** comparison purpose,we also give the analysis of half duplex relaying *** results show that our proposed power allocation scheme can support diverse Qo S guarantees and achieve better effective capacity than equal power allocation scheme and direct transmission *** analysis also indicate that the perfect full duplex mode can achieve twice optimal effective capacity of the half duplex mode.
Two-way relaying can considerably improve spectral efficiency in relay-assisted bidirectional ***,most existing works focus on physical layer to exploit its resource *** benefits and flexible structures of two-way rel...
详细信息
Two-way relaying can considerably improve spectral efficiency in relay-assisted bidirectional ***,most existing works focus on physical layer to exploit its resource *** benefits and flexible structures of two-way relaying on datalink layer are much less *** in this paper,the cross-layer optimization for amplify-and-forward(AF)two-way relaying system is studied and an optimal power allocation scheme is *** goal is to find the optimal power allocation factors to maximize the weighted sum effective capacity of two sources in the physical layer while guaranteeing the statistical delay quality-of-service(QoS)requirement for each source in the datalink *** statistical delay Qo S requirement is characterized by the QoS exponentq,which is the only requested information exchanged between the physical layer and the datalink layer in our cross-layer design based *** integrating the concept of effective capacity,the cross-layer optimization problem is equivalent to a weighted sum effective capacity maximization *** problem is formulated into a convex optimization problem,and an algorithm is presented to solve this *** results show that proposed optimal power allocation scheme can achieve better weighted sum effective capacity than equal power allocation scheme and direct transmission scheme,and the relay transmission combined with direct links can get the max weighted sum effective capacity.
Large-scale service composition has become an important research topic in Service-Oriented computing(SOC). Quality of Service(Qo S) has been mostly applied to represent nonfunctional properties of web services and...
详细信息
Large-scale service composition has become an important research topic in Service-Oriented computing(SOC). Quality of Service(Qo S) has been mostly applied to represent nonfunctional properties of web services and to differentiate those with the same functionality. Many studies for measuring service composition in terms of Qo S have been completed. Among current popular optimization methods for service composition, the exhaustion method has some disadvantages such as requiring a large number of calculations and poor scalability. Similarly,the traditional evolutionary computation method has defects such as exhibiting slow convergence speed and falling easily into the local optimum. In order to solve these problems, an improved optimization algorithm, WS FOA(Web Service composition based on Fruit Fly Optimization Algorithm) for service composition, was proposed, on the basis of the modeling of service composition and the FOA. Simulated experiments demonstrated that the algorithm is effective, feasible, stable, and possesses good global searching ability.
In the era of big data, data intensive applications have posed new challenges to the field of service composition. How to select the optimal composited service from thousands of functionally equivalent services but di...
详细信息
In the era of big data, data intensive applications have posed new challenges to the field of service composition. How to select the optimal composited service from thousands of functionally equivalent services but different Quality of Service(Qo S) attributes has become a hot research in service computing. As a consequence,in this paper, we propose a novel algorithm MR-IDPSO(Map Reduce based on Improved Discrete Particle Swarm Optimization), which makes use of the improved discrete Particle Swarm Optimization(PSO) with the Map Reduce to solve large-scale dynamic service composition. Experiments show that our algorithm outperforms the parallel genetic algorithm in terms of solution quality and is efficient for large-scale dynamic service composition. In addition,the experimental results also demonstrate that the performance of MR-IDPSO becomes more better with increasing number of candidate services.
DTNs overcome the problems associated with intermittent connectivity, long or variable delay, asymmetric data rates, and high error rates by using store-carry-forward message switching. In DTNs, a node is an entity wi...
详细信息
ISBN:
(纸本)9781509034857
DTNs overcome the problems associated with intermittent connectivity, long or variable delay, asymmetric data rates, and high error rates by using store-carry-forward message switching. In DTNs, a node is an entity with a bundle layer. A node may be a host, router, or gateway (or some combination) acting as a source, destination, or forwarder of bundles. In addition, the performance of node shows great differences. However, the previous DTN routings show blindly and randomly, which do not measure the performance of node when they forward messages. To deal with this issue, we present the concept of Node Connection Intensity (NCI) and Node Connection Stability (NCS), then propose a routing scheme based on Spray-and-Wait and Connecting-Capability of Node (SW-CCN), which evaluate relay node's forward capability synthetically according to the NCI and the NCS. The SW-CCN routing can allocate message replications dynamically and solve the problem of selecting the relay node blindly. Compared with the classical routing protocols, the simulation results show that the proposed algorithm can significantly enhance delivery rate and improve network performance.
In this letter, we present a three-dimensional (3-D) artificial anisotropy weakly conditional stability finite-difference time-domain (WCS-FDTD) method to achieve better dispersion performance. This artificial anisotr...
详细信息
ISBN:
(纸本)9781509047444
In this letter, we present a three-dimensional (3-D) artificial anisotropy weakly conditional stability finite-difference time-domain (WCS-FDTD) method to achieve better dispersion performance. This artificial anisotropy WCS-FDTD algorithm can minimize the dispersion error for arbitrary incident angles and different time-step sizes. Stability analysis presents that this algorithm is weakly conditionally stable if proper artificial anisotropy parameter values are chosen. Dispersion analysis illustrates the error of the numerical phase velocity can be controlled.
According to granular computing, Pawlak s rough set theory is based on a single granulation; however, multi-granulation rough set theory is applied to describe an uncertain concept by multiple binary relations. In thi...
详细信息
According to granular computing, Pawlak s rough set theory is based on a single granulation; however, multi-granulation rough set theory is applied to describe an uncertain concept by multiple binary relations. In this paper, the multi-granulation rough set approach with maximal consistent block technique has been introduced into the incomplete information system. Based on this maximal consistent block technique, a new pessimistic multi-granulation rough set in the incomplete information system is proposed. The lower and upper approximations of an uncertain set are defined based on this new model, and some properties are proposed for this new model.
This paper firstly gives some necessary conditions on one-Gray weight linear codes. And then we use these results to construct several classes of one-Gray weight linear codes over Z_4 +uZ_4(u^2=u) with type 16^(k_1)8^...
详细信息
This paper firstly gives some necessary conditions on one-Gray weight linear codes. And then we use these results to construct several classes of one-Gray weight linear codes over Z_4 +uZ_4(u^2=u) with type 16^(k_1)8^(k_2)8^(k_3)4^(k_4)4^(k_5)4^(k_6)2^(k_7)2^(k_8) based on a distance-preserving Gray map from(Z4 + u Z4)n to Z2n4. Secondly, the authors use the similar approach to do works on two-Gray(projective) weight linear codes. Finally, some examples are given to illustrate the construction methods.
The community detection was performed from the perspective of links, and we proposed an inhibition method against social network worms. Firstly, a community detection algorithm was proposed, which based on link cluste...
详细信息
The community detection was performed from the perspective of links, and we proposed an inhibition method against social network worms. Firstly, a community detection algorithm was proposed, which based on link clustering, and we got related link incremental information through the network structure information at various time points. In order to obtain the link communities, we adopted an improved link partition density function to dispose the link incremental information. Next, we gave three selection strategies of key nodes in community and proposed corresponding worm inhibition method. Finally, on the basis of real web data sets, we applied community detection and worm inhibition experiments to prove validity of algorithm in this paper.
暂无评论