In order to solve the controllab.lity problem of worm attack range and effect in network counterwork and achieve the precise attack on the target host, we propose a propagation control method based on lifetime and a d...
详细信息
wireless Multimedia sensornetwork (WMSN) need to transfer large amounts of video streaming data, how to achieve efficient and reliable transmission becomes a research hotspot. Layered scalab.e coding techniques can r...
详细信息
In this paper, we proposed an improved hybrid semantic matching algorithm combining Input/Output (I/O) semantic matching with text lexical similarity to overcome the disadvantage that the existing semantic matching al...
详细信息
In this paper, we proposed an improved hybrid semantic matching algorithm combining Input/Output (I/O) semantic matching with text lexical similarity to overcome the disadvantage that the existing semantic matching algorithms were unable to distinguish those services with the same I/O by only performing I/O based service signature matching in semantic web service discovery techniques. The improved algorithm consists of two steps, the first is logic based I/O concept ontology matching, through which the candidate service set is obtained and the second is the service name matching with lexical similarity against the candidate service set, through which the final precise matching result is concluded. Using Ontology Web Language for Services (OWL-S) test collection, we tested our hybrid algorithm and compared it with OWL-S Matchmaker-X (OWLS-MX), the experimental results have shown that the proposed algorithm could pick out the most suitable advertised service corresponding to user's request from very similar ones and provide better matching precision and efficiency than OWLS-MX.
For some existing handoff control algorithms in Aerospace Information network, the success rate of their handoff calls is not high. This paper proposes a handoff control algorithm based on service priorities and chann...
详细信息
Traditional speech-related identity recognition commonly pays attention to individual aspect of speech signals but in reality, the speech signals are made up of semantics, speaker dependent features,
ISBN:
(纸本)9781467389808
Traditional speech-related identity recognition commonly pays attention to individual aspect of speech signals but in reality, the speech signals are made up of semantics, speaker dependent features,
Anti-worm is an effective way to fight against malicious worm and has been followed closely by malicious worm researchers recently. However, active and passive confronting technologies in peer-to-peer (P2P) networks...
详细信息
Anti-worm is an effective way to fight against malicious worm and has been followed closely by malicious worm researchers recently. However, active and passive confronting technologies in peer-to-peer (P2P) networks have not been studied in depth. This paper introduces both of them to fight against malicious worm in P2P networks. To study their effectiveness in P2P networks, this paper takes the topology degree in P2P networks into consideration and puts forward a four-state propagation model for active anti-worm and a five-state propagation model for passive anti-worm respectively. Both of the models are simplified in the case that size of a P2P network is large enough. The simulation results have not only validated the effectiveness of our propagation models but also evaluated the excellent performance of both active anti-worm and passive anti-worm.
The high-purity single-photon source plays an important role in the field of quantum ***,it is generated through spontaneous parametric down-conversion *** this paper,we investigate and summarize a few approaches on o...
详细信息
The high-purity single-photon source plays an important role in the field of quantum ***,it is generated through spontaneous parametric down-conversion *** this paper,we investigate and summarize a few approaches on obtaining single-photon sources with a high purity using either PPKTP or PPLN nonlinear ***,we present improved schemes to increase the purity based on existing work,corresponding applicable conditions and procedures are discussed and ***,we carry out numerical simulations and show that nearly perfect purity can be reached even without using any ***,this work might provide valuable references for the generation and application of high purity single-photon sources.
作者:
Shao, XingWang, RuchuanXu, HeHuang, HaipingSun, LijuanCollege of Computer
Nanjing University of Posts and Telecommunications Nanjing 210003 China College of Computer
Nanjing University of Posts and Telecommunications Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing 210003 China
network coding has been confirmed as a potential technology to improve performance of wireless mesh networks (WMNs) and a few network coding aware routings have been proposed. However, these mechanisms detect coding o...
详细信息
network coding has been confirmed as a potential technology to improve performance of wireless mesh networks (WMNs) and a few network coding aware routings have been proposed. However, these mechanisms detect coding opportunities through local traffic pattern checking, which hardly obtains optimal routes. This paper proposes a Genetic algorithm based Coding Aware Routing (GCAR) for wireless mesh networks, which employs genetic algorithm to optimize routes and coding opportunities. In addition, the key ingredients in GCAR, e.g., chromosome representation, genetic operation of crossover and mutation, fitness function considering coding opportunity and interference, are carefully designed. Through simulations on a randomly generated wireless mesh network, GCAR is shown to find optimal routes within a short time, and achieve more improvements than the previously proposed methods on route setup time, throughput and load balancing.
We propose a compressed ghost imaging scheme based on differential speckle patterns,named *** the scheme,a series of bucket detector signals are acquired when a series of random speckle patterns are employed to illumi...
详细信息
We propose a compressed ghost imaging scheme based on differential speckle patterns,named *** the scheme,a series of bucket detector signals are acquired when a series of random speckle patterns are employed to illuminate an unknown *** the differential speckle patterns(differential bucket detector signals)are obtained by taking the difference between present random speckle patterns(present bucket detector signals)and previous random speckle patterns(previous bucket detector signals).Finally,the image of object can be obtained directly by performing the compressed sensing algorithm on the differential speckle patterns and differential bucket detector *** experimental and simulated results reveal that CGI-DSP can improve the imaging quality and reduce the number of measurements comparing with the traditional compressed ghost imaging schemes because our scheme can remove the environmental illuminations efficiently.
The subspace pursuit algorithm in compressed sensing cannot achieve desirable reconstruction performance in the presence of impulsive noise based on the fact that the support detection and least squares are not robust...
详细信息
暂无评论