The method of using in-network aggregation for energy efficient data collection often results in processing delay and additional time for gathering related data at an intermediate node. This unfortunately may make the...
详细信息
ISBN:
(纸本)1595936955
The method of using in-network aggregation for energy efficient data collection often results in processing delay and additional time for gathering related data at an intermediate node. This unfortunately may make the scheme undesirable for networks deployed for emergent event monitoring. In this paper, we propose ReCoDa - Reliable forwarding of Correlated Data with low latency, an energy-efficient and reliable delivery scheme benefiting from data correlation among sensor nodes but without performing in-network aggregation. Our idea is to allow each node to determine the data transmission reliability it shall obtain based on the preceding transmissions from other nodes, subjecting to the overall information reliability requirement. This in turn is achieved through controllab.e multi-path forwarding. Simulation shows that ReCoDa can successfully reduce redundancy up to 2.9 times compared with schemes not exploiting data redundancy and achieves energy efficiency up to 4.79 times higher. Copyright 2007 ACM.
As an information carrier in trusted computing platform, the security issues about disk storage directly effected system security, dependability and data confidentiality. Therefore, introduced concept of trusted stora...
详细信息
As an information carrier in trusted computing platform, the security issues about disk storage directly effected system security, dependability and data confidentiality. Therefore, introduced concept of trusted storage (TS), and advanced implements about TS through analyzing several access scenarios in practice, and two examples were given to illustrate the application and effect of TS in trusted computing platform. Deep analysis and comparison show that using TS can help to extend trust chain of platform to peripherals to analyze the security risk of different operation environment. Moreover, TS can enhance communication protocol of storage device to improve security of data flow.
Trusted platform model (TPM) is special-purpose integrated circuits built into a variety of platforms to enable strong user authentication and machine attestation-essential to prevent inappropriate access to confident...
详细信息
AI planning is the main stream method for automatic semantic web service composition (SWSC) research. However, planning based SWSC method can only return service composition upon user requirement description and lacks...
详细信息
Through comprehensively utilizing color spectrum, texture and shape feature of the remote sensing images, a novel method of image classification is presented based on the fractal theory and ridgelet neural network. Th...
详细信息
Through comprehensively utilizing color spectrum, texture and shape feature of the remote sensing images, a novel method of image classification is presented based on the fractal theory and ridgelet neural network. The blue, green and red band spectrums is used as three-band-spectral characteristics, the DBC dimension and multi-fractal dimension calculated by fractal theory as two texture characteristics, the average unchanged moment as one shape feature, and the ridgelet neural network with a strong ability to identify the direction of curve is used as classifier in the proposed method. The experimental results indicated that the method used in color image classification has a high accurate rate and a strong antinoise ability.
Our work links Chinese calligraphy to computerscience through an integrated intelligence approach. We first extract strokes of existent calligraphy using a semi-automatic, two-phase mechanism: the first phase tries t...
详细信息
Applying modern information management technology to traditional environment field is the sign of making environment protection work modern and the necessitous task that environment protection departments are confront...
详细信息
Since the current rate control schemes in H.264 do not present the capability of efficient GOP-level bit allocation, the video quality varies greatly for sequences with the scene change or the scene complexity varying...
Since the current rate control schemes in H.264 do not present the capability of efficient GOP-level bit allocation, the video quality varies greatly for sequences with the scene change or the scene complexity varying from one GOP to another. To overcome the limitation, we propose a novel rate control scheme based on incremental PID algorithm. The incremental PID algorithm is introduced to minimize video quality variations in GOP-level bit allocation. Extensive simulation results show that the proposed rate control scheme, without expensive computational complexity added, decreases the average video quality variations by 15.07%.
Support vector machine (SVM) has been studied and applied extensively for its high accuracy, but it must construct SVM decision tree to classify sample sets with multiclass for it just be applicable for binary classif...
详细信息
ISBN:
(纸本)7900719229
Support vector machine (SVM) has been studied and applied extensively for its high accuracy, but it must construct SVM decision tree to classify sample sets with multiclass for it just be applicable for binary classification and solve a quadratic programming problem to gain optimal hyperplane either in sample spaces or in feature spaces;Alternative covering algorithm which designs neutral networks with spherical domains has the advantages of fast performance, some hard solving problems have been solved using this algorithm. In this paper, a new kind of structural learning algorithm which combining covering design algorithm, fuzzy set and SVM is put forward, instances show that this kind of networks has the virtue of both covering design algorithm and SVM.
Based on El Gamal homomorphic encryption, a protocol of secure multi-party multi-data ranking problem was proposed. The problem extended millionaires' problem. Furthermore, the correctness and security of this pro...
详细信息
Based on El Gamal homomorphic encryption, a protocol of secure multi-party multi-data ranking problem was proposed. The problem extended millionaires' problem. Furthermore, the correctness and security of this protocol were shown in semi-honest model, using the definition of secure multi-party computation. The solution of secure multi-party multi-data ranking problem can form a fundamental basis of new-style electronic transaction, such as private biding and auction, secret online transaction and so on.
暂无评论