In the Long Term Evolution(LTE)downlink multicast scheduling,Base Station(BS)usually allocates transmit power equally among all Resource Blocks(RBs),it may cause the waste of transmit *** avoid it,this paper put forwa...
详细信息
In the Long Term Evolution(LTE)downlink multicast scheduling,Base Station(BS)usually allocates transmit power equally among all Resource Blocks(RBs),it may cause the waste of transmit *** avoid it,this paper put forward a new algorithm for LTE multicast downlink scheduling called the Energy-saving based Inter-group Proportional Fair(EIPF).The basic idea of EIPF is to calculate an appropriate transmitting power for each group according to its data rate respectively,and then follow the inter-group proportional fair principle to allocate RBs among multicast *** results of EIPF simulation show that the proposed algorithm not only can reduce the transmit power of BS effectively but also improve the utilization rate of energy.
Coverage enhancement is one of the hot research topics in wireless multimedia sensor net- works. A novel Coverage-enhancing algorithm based on three-dimensional Directional perception and co-evolution (DPCCA) is propo...
详细信息
Coverage enhancement is one of the hot research topics in wireless multimedia sensor net- works. A novel Coverage-enhancing algorithm based on three-dimensional Directional perception and co-evolution (DPCCA) is proposed in multimedia sensornetworks on the basis of the model whose pitch angle and deviation angle can be adjusted. Based on the proposed elliptical cone sensing model, we can derive the coverage area of the node and calculate the optimal pitch angle according the information of monitoring area and the nodes, and then the deviation angle is optimized based on co-evolution al- gorithm, which eliminate the overlapped and blind sensing area effectively. A set of simulations demonstrate the ef- fectiveness of our algorithm in coverage ratio.
As a new manufacturing paradigm, cloud manufacturing transforms the traditional manufacturing business model, in which distributed resources belonged to different enterprises are encapsulated into cloud services. Clie...
详细信息
A secure communication mechanism is necessary in the applications of wireless Multimedia sensornetworks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, give...
详细信息
A secure communication mechanism is necessary in the applications of wireless Multimedia sensornetworks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, given the limited technological resources (in term of energy, computation, bandwidth, and storage) of sensor nodes, security and privacy policies have to be combined with energy-aware algorithms and distributed processing of multimedia contents in WMSNs. To solve these problems in this paper, an energy efficient distributed steganography scheme, which combines steganography technique with the concept of distributed computing, is proposed for secure communication in WMSNs. The simulation results show that the proposed method can achieve considerable energy efficiency while assuring the communication security simultaneously.
We describe a high efcient entanglement concentration protocol(ECP)for multi-particle less-entangled nitrogen-vacancy(N-V)center and microtoroidal resonator *** the ECP,we only require one pair of less-entangled state...
详细信息
We describe a high efcient entanglement concentration protocol(ECP)for multi-particle less-entangled nitrogen-vacancy(N-V)center and microtoroidal resonator *** the ECP,we only require one pair of less-entangled state,two auxiliary N-V center in microcavities and some single *** the photon passing through the microcavity,by measuring the polarization of the photon,a maximally entangled W state can be obtained with some success *** ECP does not need to destroy the solid qubit,which makes it more ***,by resorting to more single photons,it can be repeated to reach a high success *** features make this ECP useful in current long-distance quantum communications.
A new object tracking scheme for multi-camera surveillance with non-overlapping views is proposed in this paper. Brightness transfer function (BTF) is used to establish relative appearance correspondence between diffe...
详细信息
To solve the problems of high memory occupation, low connectivity and poor resiliency against node capture, which existing in the random key pre-distribution techniques while applying to the large scale wireless Senso...
详细信息
To solve the problems of high memory occupation, low connectivity and poor resiliency against node capture, which existing in the random key pre-distribution techniques while applying to the large scale wirelesssensornetworks (WSNs), an Identity-Based key Agreement Scheme (IBKAS) is proposed based on identity-based encryption and Elliptic Curve Diffie-Hellman (ECDH). IBKAS can resist man-in-the-middle attacks and node-capture attacks through encrypting the key agreement parameters using identity-based encryption. Theoretical analysis indicates that comparing to the random key pre-distribution techniques, IBKAS achieves significant improvement in key connectivity, communication overhead, memory occupation, and security strength, and also enables efficient secure rekcying and network expansion. Furthermore, we implement IBKAS for TinyOS-2.1.2 based on the MICA2 motes, and the experiment results demonstrate that IBKAS is feasible for infrequent key distribution and rekeying for large scale sensornetworks.
In order to reduce network energy consumption and prolong the lifetime of wirelesssensornetworks, this paper improves the LEACH to an energy efficient multi-hop routing algorithm. LEACH in the cluster creation, data...
详细信息
This paper presents an Mobile Agent based Coding Aware Routing (MA-CAMR) for wirelesssensornetwork, which exploits mobile agent to discovery the routing and coding opportunities, reducing complexity of node design. ...
详细信息
Because many signals are correlated over temporal domain, this paper proposes a compressive fault telorance network coding scheme for exploring the temporal correlation of signals. This scheme overcomes the drawbacks ...
详细信息
暂无评论