作者:
Junqing ZhangRuchuan WangYisheng QianQianyi WangCollege of Computer
Nanjing University of Posts and Telecommunications Nanjing Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education
The main study of traditional probability coverage problem in wirelesssensornetworks(WSNs) is aiming at twodimensional space, however, most practical applications of wirelesssensornetwork is placed in a three-dime...
详细信息
The main study of traditional probability coverage problem in wirelesssensornetworks(WSNs) is aiming at twodimensional space, however, most practical applications of wirelesssensornetwork is placed in a three-dimensional sensornetworks. Therefore, probability model is introduced for three-dimensional WSNs. This paper presents a method that using Voronoi divide to control the Scheduling of the probability model nodes in the target area. Also, a coverage control algorithm based on probability model(PMCCA) is proposed. We verify the effectiveness and the practice of PMCCA algorithm by comparing PMCCA algorithm to another algorithm in simulation experiment.
In DTN (Delay Tolerant networks), bundle and block shred data to cope with frequent interruption. However, it remains a problem of what impact will be generated on transmission efficiency by the size of bundle and blo...
详细信息
How to classify the data sets with vast information amount and large distribution fluctuation, which is always the research hotspot. This paper puts forward an improved SVM incremental learning algorithm by comparing ...
详细信息
ISBN:
(纸本)9781479964123
How to classify the data sets with vast information amount and large distribution fluctuation, which is always the research hotspot. This paper puts forward an improved SVM incremental learning algorithm by comparing the different incremental learning methods of SVM algorithm. In the algorithm, whether to violate the KTT conditions is regarded as an important basis for incremental data set. And the algorithm will be more efficient on the classification of SVM incremental sets through optimizing and improving itself. Then the paper compares the SVM-based re-training algorithm, the standard SVM incremental learning algorithm and the improved SVM incremental learning algorithm through identifying P2P network traffic. The experimental results show that the improved SVM incremental learning algorithm proposed in this article can save storage space and increase the accuracy of the identification of P2P traffic.
We propose new schemes on implementing the single-photon-added coherent source in the quantum key *** apply the source in either the standard BB84 protocol or the new proposed measurement-device-independent quantum ke...
详细信息
We propose new schemes on implementing the single-photon-added coherent source in the quantum key *** apply the source in either the standard BB84 protocol or the new proposed measurement-device-independent quantum key *** compare its performance with the case of using other existing sources,e.g.,the
The Delay/Disruption Tolerant network(DTN) is characterized with long delay,high bit-error rate,intermittent connectivity and frequent *** to this,network coding is introduced to improve its transmission performance...
详细信息
The Delay/Disruption Tolerant network(DTN) is characterized with long delay,high bit-error rate,intermittent connectivity and frequent *** to this,network coding is introduced to improve its transmission performance *** DTN routing algorithms based on network coding have been ***,they are susceptible to various malicious *** this paper,we propose a new kind of networking scheme suitable to the DTN,which can resist the eavesdropping attacks to a certain ***,we establish a DTN network model based on the packet path optimization allocation algorithm and redefine the packet format to meet the algorithm ***,to resist the dropping attacks,the source node dynamically adds redundancy factors at the certain *** the pollution attacks and the data tampering attacks can almost be resisted by means of mutual authentication between intermediate *** approach avoids the traditional anti-tampering attack algorithm over-reliant on the source *** security analysis and simulation results show that our scheme can effectively resist the joint attacks and optimize the network performance.
The subspace pursuit algorithm in compressed sensing cannot achieve desirable reconstruction performance in the presence of impulsive noise based on the fact that the support detection and least squares are not robust...
详细信息
Due to the explosive increment of data in big data era, it is a challenging task to analyze and extract meaningful data for users. Data needs to be timely operated because of the time sensitivity, so it faces enormous...
详细信息
Due to the explosive increment of data in big data era, it is a challenging task to analyze and extract meaningful data for users. Data needs to be timely operated because of the time sensitivity, so it faces enormous pressure in storage and computing. To deal with the problem that it is hard to achieve valuable information from out-of-order streams over big data in short time, a model-matching algorithm based on improved BP (Back Propagation) is proposed. In the algorithm, the matching model is set dynamically. Information is extracted for users according to the order of data's arriving time. Furthermore, the algorithm parameters are automatically adjusted in the process of learning and matching. Accordingly, the responding speed of learning is accelerated and the time of matching reduces. In the simulation, a group of optimum parameters of improved BP are achieved by using self-adapting adjusting mechanism. The threshold (TH), connecting weight (CW) and learning rate (LR) are equal to 1.5, 3 and 1, respectively. We implement our model-matching algorithm on 10000 sets of out-of-order streams with these parameters. Results indicate that the proposed algorithm can obviously improve the accuracy and speed of matching and achieve better stability.
Device-to-Device (D2D) communication has been proposed to be a promising data offloading solution in the coming big data age, with multimedia dominating the digital contents. As quality of experience (QoE) is the majo...
详细信息
Device-to-Device (D2D) communication has been proposed to be a promising data offloading solution in the coming big data age, with multimedia dominating the digital contents. As quality of experience (QoE) is the major determining factor in the success of new multimedia applications, we novelly propose a QoE-driven cooperative content dissemination (QeCS) scheme in the paper. Specifically, all the users predict the QoE of the potential connections characterized by mean opinion score (MOS) and send the results to the content provider (CP). Then CP formulates a weighted oriented graph based on the network topology and MOS of each potential connection. By factorizing the graph, the content dissemination fashion is established through seeking 1-factor with the maximum weight thus achieving maximum total user MOS.
Spectrum sensing in a wideband regime for cognitive radio network (CRN) faces considerably technical challenge due to the constraints on ADCs, especially in the presence of primary user emulation attack (PUEA) where s...
详细信息
ISBN:
(纸本)9781849198455
Spectrum sensing in a wideband regime for cognitive radio network (CRN) faces considerably technical challenge due to the constraints on ADCs, especially in the presence of primary user emulation attack (PUEA) where some malicious users try to impersonate the primary user (PU) to prevent other secondary users (SUs) from accessing the idle spectrum. To address this issue, an eigenvalue-based compressive wideband spectrum sensing (ECWSS) scheme is proposed in this paper. ECWSS directly utilizes the compressive measurements based on compressive sampling (CS) theory to perform wideband spectrum sensing without requiring signal recovery. In ECWSS, the sensors around a SU carry out compressive sampling at the sub- Nyquist rate instead of the SU. Furthermore, the exact probability density function of extreme eigenvalues is used to set the threshold. Theoretical analysis and simulation results show that compared to the traditional sensing scheme, ECWSS has better detection performance and is more robust in the existence of PUEA.
The Delay/Disruption Tolerant network (DTN) is characterized with long delay, high bit-error rate, intermittent connectivity and frequent partitions. Due to this, network coding is introduced to improve its transmissi...
详细信息
The Delay/Disruption Tolerant network (DTN) is characterized with long delay, high bit-error rate, intermittent connectivity and frequent partitions. Due to this, network coding is introduced to improve its transmission performance significantly. Numerous DTN routing algorithms based on network coding have been developed. However, they are susceptible to various malicious attacks. In this paper, we propose a new kind of networking scheme suitable to the DTN, which can resist the eavesdropping attacks to a certain extant. Firstly, we establish a DTN network model based on the packet path optimization allocation algorithm and redefine the packet format to meet the algorithm requirements. Meanwhile, to resist the dropping attacks, the source node dynamically adds redundancy factors at the certain time. Then the pollution attacks and the data tampering attacks can almost be resisted by means of mutual authentication between intermediate nodes. This approach avoids the traditional anti-tampering attack algorithm over-reliant on the source node. The security analysis and simulation results show that our scheme can effectively resist the joint attacks and optimize the network performance.
暂无评论