The growth of network coding opportunities is considered the unique optimization goal by most current network coding based routing algorithms for wireless mesh networks. This usually results in flows aggregation probl...
详细信息
The growth of network coding opportunities is considered the unique optimization goal by most current network coding based routing algorithms for wireless mesh networks. This usually results in flows aggregation problem in areas with coding opportunities, and degrades the network performance. This paper proposes a Load balanced coding aware multipath routing(LCMR)for wireless mesh networks. To facilitate the evaluation of discovered multiple paths and the tradeoffs between coding opportunity and load balancing, a novel routing metric, Load balanced coding aware routing metric(LCRM) is presented, which considers the load degree of nodes when detects coding opportunities. LCMR could spread traffic over multipath to further balance load. Simulation results demonstrate that LCMR could evenly spread the traffic over the network with increasing network throughput in a heavy load at the expense of some coding opportunities.
In order to make cloud users get credible, high-quality composition of services, the trust quality of service aware(TQoS-aware) based parallel ant colony algorithm is proposed. Our approach takes the service credibili...
详细信息
In order to make cloud users get credible, high-quality composition of services, the trust quality of service aware(TQoS-aware) based parallel ant colony algorithm is proposed. Our approach takes the service credibility as the weight of the quality of service, then calculates the trust service quality T-QoS for each service, making the service composition situated in a credible environment. Through the establishment on a per-service T-QoS initialization pheromone matrix, we can reduce the colony’s initial search time. By modifying the pheromone updating rules and introducing two ant colonies to search from different angles in parallel,we can avoid falling into the local optimal solution, and quickly find the optimal combination of global solutions. Experiments show that our approach can combine high-quality services and the improvement of the operational success rate. Also, the convergence rate and the accuracy of optimal combination are improved.
Abstract: This paper focuses on the first-or- der and second-order performance of dual-hop underlay cognitive radio systems with oppor- tunistic relaying (UCR-OR) over indepen- dent and non-identically distributed ...
详细信息
Abstract: This paper focuses on the first-or- der and second-order performance of dual-hop underlay cognitive radio systems with oppor- tunistic relaying (UCR-OR) over indepen- dent and non-identically distributed (***.d) Rayleigh fading channels. For the UCR-OR systems, the tolerable maximum interference power (TMIP) Q at primary users (PUs) and the allowable maximum transmission power limit (AMTP) P at secondary users (SUs) are considered, simultaneously. We first obtain the closed-form solutions to the first-order performance such as outage probability, ave- rage symbol error ratio (SER), and ergodic capacity (EC). Secondly, we investigate the second-order statistical performance, i.e., ave- rage outage rate (AOR) and average outage duration (AOD). With the consideration that in practice implementation the receiver perfor- mance is primarily influenced by the signal- to-noise ratio (SNR) (not the signal envelope), the second-order statistical performance is investigated based on the equivalent instan- taneous end-to-end SNR. Finally, we present the detailed performance comparison analysis of UCR-OR systems by defining a random variable ,μ=Pmax/Q. The results show that the effect of μ on the first-order and second-or- der performances is different greatly. For the first-order performance, the perlbrmance gap is negligible when the value of// is relatively large. However, for the second-order one, the gap is distinct.
Continuous-variable quantum key distribution(CVQKD)[1-7]allows two remote parties(Alice and Bob)to share a secret key,even in the presence of an eavesdropper(Eve)with unlimited computational power[8-17].While,a ...
详细信息
Continuous-variable quantum key distribution(CVQKD)[1-7]allows two remote parties(Alice and Bob)to share a secret key,even in the presence of an eavesdropper(Eve)with unlimited computational power[8-17].While,a highly efficient reconciliation protocol[18-21]is crucial in a CVQKDsystem, which can not only extract the errorless secret keys, but also provide a promising way to achieve a long distance CVQKD at a low signal-to-noise ratio (SNR).
Currently,the cloud computing systems use simple key-value data processing,which cannot support similarity search efectively due to lack of efcient index structures,and with the increase of dimensionality,the existing...
详细信息
Currently,the cloud computing systems use simple key-value data processing,which cannot support similarity search efectively due to lack of efcient index structures,and with the increase of dimensionality,the existing tree-like index structures could lead to the problem of"the curse of dimensionality".In this paper,a novel VF-CAN indexing scheme is ***-CAN integrates content addressable network(CAN)based routing protocol and the improved vector approximation fle(VA-fle) *** are two index levels in this scheme:global index and local *** local index VAK-fle is built for the data in each storage ***-fle is thek-means clustering result of VA-fle approximation vectors according to their degree of *** cluster forms a separate local index fle and each fle stores the approximate vectors that are contained in the *** vector of each cluster center is stored in the cluster center information fle of corresponding storage *** the global index,storage nodes are organized into an overlay network CAN,and in order to reduce the cost of calculation,only clustering information of local index is issued to the entire overlay network through the CAN *** experimental results show that VF-CAN reduces the index storage space and improves query performance efectively.
In the open network environment, malicious attacks to the trust model have become increasingly serious. Compared with single node attacks, collusion attacks do more harm to the trust model. To solve this problem, a co...
详细信息
In the open network environment, malicious attacks to the trust model have become increasingly serious. Compared with single node attacks, collusion attacks do more harm to the trust model. To solve this problem, a collusion detector based on the GN algorithm for the trust evaluation model is proposed in the open Internet environment. By analyzing the behavioral characteristics of collusion groups, the concept of flatting is defined and the G-N community mining algorithm is used to divide suspicious communities. On this basis, a collusion community detector method is proposed based on the breaking strength of suspicious communities. Simulation results show that the model has high recognition accuracy in identifying collusion nodes, so as to effectively defend against malicious attacks of collusion nodes.
Due to 5G's stringent and uncertainty traffic requirements,open ecosystem would be one inevitable way to develop *** the other hand,GPP based mobile communication becomes appealing recently attributed to its strik...
详细信息
Due to 5G's stringent and uncertainty traffic requirements,open ecosystem would be one inevitable way to develop *** the other hand,GPP based mobile communication becomes appealing recently attributed to its striking advantage in flexibility and *** this paper,both the advantages and challenges of GPP platform are detailed ***,both GPP based software and hardware architectures for open 5G are presented and the performances of real-time signal processing and power consumption are also *** evaluation results indicate that turbo and power consumption may be another challengeable problem should be further solved to meet the requirements of realistic deployments.
In cellular networks, the proximity devices may share files directly without going through the e NBs, which is called Device-to-Device communications(D2D). It has been considered as a potential technological component...
详细信息
In cellular networks, the proximity devices may share files directly without going through the e NBs, which is called Device-to-Device communications(D2D). It has been considered as a potential technological component for the next generation of communication. In this paper, we investigate a novel framework to distribute video files from some other proximity devices through users' media cloud assisted D2 D communication. The main contributions of this work lie in: 1) Providing an efficient algorithm Media Cloud Cluster Selecting Scheme(MCCSS) to achieve the reasonable cluster; 2) Distributing the optimum updating files to the cluster heads, in order to minimize the expected D2 D communication transmission hop for files; 3) Proposing a minimum the hop method, which can ensure the user obtain required file as soon as possible. Extensive simulation results have demonstrated the efficiency of the proposed scheme.
We describe an efficient entanglement concentration protocol (ECP) for an arbitrary partially entangled threeelectron W state. We show that with the help of two ancillary single electrons, the concentration task can...
详细信息
We describe an efficient entanglement concentration protocol (ECP) for an arbitrary partially entangled threeelectron W state. We show that with the help of two ancillary single electrons, the concentration task can be well completed. This ECP has several advantages: Firstly, we only require one pair of partially entangled states. Secondly, only two single electrons are used during the whole protocol. Thirdly, we do not require all the parties to participate in the whole process, and only two parties are needed to perform the operation. Fourthly, the protocol can 5e repeated to obtain a high success probability. This ECP may be useful in current quantum computation and quantum communication.
Device-free Passive(DfP) detection has received increasing attention for its ability to support various pervasive applications. Instead of relying on variable Received Signal Strength(RSS), most recent studies rel...
详细信息
Device-free Passive(DfP) detection has received increasing attention for its ability to support various pervasive applications. Instead of relying on variable Received Signal Strength(RSS), most recent studies rely on finer-grained Channel State Information(CSI). However, existing methods have some limitations, in that they are effective only in the Line-Of-Sight(LOS) or for more than one moving individual. In this paper, we analyze the human motion effect on CSI and propose a novel scheme for Robust Passive Motion Detection(R-PMD). Since traditional low-pass filtering has a number of limitations with respect to data denoising, we adopt a novel Principal Component Analysis(PCA)-based filtering technique to capture the representative signals of human motion and extract the variance profile as the sensitive metric for human detection. In addition, existing schemes simply aggregate CSI values over all the antennas in MIMO systems. Instead, we investigate the sensing quality of each antenna and aggregate the best combination of antennas to achieve more accurate and robust detection. The R-PMD prototype uses off-the-shelf WiFi devices and the experimental results demonstrate that R-PMD achieves an average detection rate of 96.33% with a false alarm rate of 3.67%.
暂无评论