This paper considers the problem of transmitting correlated information from multiple sources to multiple receivers, where every receiver seeks to recover all of the original sources. In order to improve the efficienc...
详细信息
This paper presents a new method of gaze tracking based on iris detection for images of human eyes captured by ordinary PC camera. In the basis of traditional iris detection, this paper improves the circle detection b...
详细信息
For the current opportunistic networks routing algorithms, their message arrival rate is not high and the delivery delay is large. This paper proposes a domain-epidemic spray and forward routing algorithm. The algorit...
详细信息
Graphical models have been widely applied in solving distributed inference problems in wirelesssensornetworks (WSNs). In this paper, we formulate the distributed multi-sensor tracking problem in a WSN as an inferenc...
详细信息
Graphical models have been widely applied in solving distributed inference problems in wirelesssensornetworks (WSNs). In this paper, we formulate the distributed multi-sensor tracking problem in a WSN as an inference problem on a factor graph. Using particle filtering methods, we propose a nonparametric variant of sum-product algorithm (SPA), called sequential particle-based SPA (SPSPA), for factor graphs to infer the multi-sensor target states over time. In the proposed algorithm, importance sampling methods are used to sample from message products, and the computational complexity of SPSPA is thus linear in the number of particles. We apply the SPSPA to a distributed multi-sensor tracking problem, and evaluate its performance in terms of the measurement noise and the number of particles.
It is necessary for a server oriented to the Internet of Things(IOT) applications to provide countless connections with efficient andreliable *** the communication layer should try to lower the *** a highly efficient ...
详细信息
ISBN:
(纸本)9781467356985
It is necessary for a server oriented to the Internet of Things(IOT) applications to provide countless connections with efficient andreliable *** the communication layer should try to lower the *** a highly efficient design for a socket server with buffer pool and a thread pool for concurrent request on the IOT platform is *** reduces the system overhead and buffer usage to the largest extent while faced with a large number of connections and digital *** simulation shows that a socket server with a thread pool and buffer pool could lower the overhead on the context switch of threads as well as the I/O *** creates and destroys threads so as to energize the system.
In this paper, we explore network architecture anal key technologies for content-centric networking (CCN), an emerging networking technology in the big-data era. We descrihe the structure anti operation mechanism of...
详细信息
In this paper, we explore network architecture anal key technologies for content-centric networking (CCN), an emerging networking technology in the big-data era. We descrihe the structure anti operation mechanism of tl CCN node. Then we discuss mobility management, routing strategy, and caching policy in CCN. For better network performance, we propose a probability cache replacement policy that is based on cotent popularity. We also propose and evaluate a probability cache with evicted copy-up decision policy.
Graphical models have been widely applied in solving distributed inference problems in wirelesssensornetworks (WSNs). In this paper, we formulate the sensor self-localization problem in a WSN as an inference problem...
详细信息
Graphical models have been widely applied in solving distributed inference problems in wirelesssensornetworks (WSNs). In this paper, we formulate the sensor self-localization problem in a WSN as an inference problem on a factor graph. Using a sequential schedule of message updates, a sequential uniformly reweighted sum-product algorithm (SURW-SPA) is developed for self-localization problems. The proposed algorithm combines the distributed nature of belief propagation (BP) with the improved performance of sequential tree-reweighted message passing (TRW-S) algorithm. We apply the SURW-SPA to sensor self-localization in large-scale static networks, and evaluate its performance in terms of localization accuracy and convergence speed.
Traditional information hiding algorithms cannot maintain a good balance of capacity,invisibility and *** this paper,a novel blind colour image information hiding algorithm based on grey prediction and grey relational...
详细信息
Traditional information hiding algorithms cannot maintain a good balance of capacity,invisibility and *** this paper,a novel blind colour image information hiding algorithm based on grey prediction and grey relational analysis in the Discrete Cosine Transform(DCT) domain is ***,this algorithm compresses the secret image losslessly based on the improved grey prediction GM(1,1)(IGM) *** then chooses the blocks of rich texture in the cover image as the embedding regions using Double-dimension Grey Relational Analysis(DGRA).Finally,it adaptively embeds the compressed secret bits stream into the DCT domain mid-frequency coefficients,which are decided by those blocks' Double-Dimension Grey Correlation Degree(DGCD) and Human Visual System(HVS).This method can ensure an adequate balance between invisibility,capacity and *** results show that the proposed algorithm is robust against JPEG compression(46.724 6 dB when the compression quality factor is 90%),Gaussian noise(45.531 3 dB when the parameter is(0,0.000 5)) etc.,and it is a blind information hiding algorithm that can be extracted without an original carrier.
P-homomorphic signature is a general framework for computing on authenticated data, which is recently proposed by Ahn et al. With P-homomorphic signature, any third party can derive a signature on the object message m...
详细信息
According to the significant impact on the accuracy rate of detection of current immune algorithms brought by incorrect classification of signal, it proposes network malicious code dendritic cell immune algorithm base...
详细信息
暂无评论