In scenarios of real-time data collection of long-term deployed Wireless Sensor networks (WSNs), low-latency data collection with long net- work lifetime becomes a key issue. In this paper, we present a data aggrega...
详细信息
In scenarios of real-time data collection of long-term deployed Wireless Sensor networks (WSNs), low-latency data collection with long net- work lifetime becomes a key issue. In this paper, we present a data aggregation scheduling with guaran- teed lifetime and efficient latency in WSNs. We first Construct a Guaranteed Lifetime Mininmm Ra- dius Data Aggregation Tree (GLMRDAT) which is conducive to reduce scheduling latency while pro- viding a guaranteed network lifetime, and then de-sign a Greedy Scheduling algorithM (GSM) based on finding the nmzximum independent set in conflict graph to schedule he transmission of nodes in the aggregation tree. Finally, simulations show that our proposed approach not only outperfonm the state-of-the-art solutions in terms of schedule latency, but also provides longer and guaranteed network lifetilre.
In this paper, we analyze on the use of token-controlled public key encryption (TCE)schemes. We argue that for many of the applications in some possibilities of application in financial or legal scenarios, for example...
详细信息
ISBN:
(纸本)9781467358088
In this paper, we analyze on the use of token-controlled public key encryption (TCE)schemes. We argue that for many of the applications in some possibilities of application in financial or legal scenarios, for example, the millionaire's will problem, the `private-opening' commitment, the scheduled payment problem, and the sealed-bid auctions and electronic lotteries problem, in the literature, the use of token-controlled public key encryption on its own, leads to inadequate solutions. We suggest that when considering applications of TCE, it is advisable to pay close attention to the lack of authentication and incorporate defences against the problems highlighted in this paper.
In this paper, no-wait flow shop scheduling problem with flowtime minimization is considered. Objective increment properties are analyzed and proved for fundamental operations of heuristics. With these properties, whe...
详细信息
To give concurrent consideration both the efficiency and the security(intensity of intractable problem) in the standard model,a chosen ciphertext secure identity-based broadcast encryption is *** the chosen ciphertext...
详细信息
To give concurrent consideration both the efficiency and the security(intensity of intractable problem) in the standard model,a chosen ciphertext secure identity-based broadcast encryption is *** the chosen ciphertext security model,by using identity(ID) sequence and adding additional information in ciphertext,the self-adaptive chosen identity security(the full security) and the chosen ciphertext security are gained *** reduction of scheme's security is the decisional bilinear Diffie-Hellman(BDH) intractable assumption,and the proof of security shows that the proposed scheme is indistinguishable against adaptive chosen ciphertext attacks in the standard model under the decisional BDH intractable *** the security level is improved,and it is suitable for higher security environment.
With the fast development of network technology and expansion of the network scale, the heterogeneity of Internet makes the Quality of Service (QoS) guarantee techniques even more challenging. In this paper the state-...
详细信息
In the peer-to-peer (P2P) live streaming systems, a single stream is decomposed into multiple sub-streams. For the participating nodes, data blocks of different sub-streams are stored in different sub-buffers for sync...
详细信息
This paper presents a new graph-based single-copy routmg method m delay tolerant networks (DTN). With time goes on in the networks, a DTN connectivity graph is constituted with mobility of nodes and communication, a...
详细信息
This paper presents a new graph-based single-copy routmg method m delay tolerant networks (DTN). With time goes on in the networks, a DTN connectivity graph is constituted with mobility of nodes and communication, and a corresponding greedy tree is obtained using a greedy algorithm in DTN connectivity graph. While there are some bad nodes such as disabled nodes or selfish nodes in delay tolerant networks, the nodes can choose the next p^oper intermediate node to transmit the mes- sage by comparing the location of neighboring nodes in the greedy tree. The single-copy routing method is very appropriate for energy-constrained, storage-constrained and bandwidth-constrained applications such as mobile wireless DTN networks. We show that delivery ratio is increased significantly by using the graph-based single-copy routing when bad nodes exist.
We consider the problem of pilot design for sparse multipath channel estimation in multiple-input multiple-output (MIMO) orthogonal frequency division multiplexing (OFDM) system in this *** order to reconstruct MIMO s...
详细信息
ISBN:
(纸本)9781467321006
We consider the problem of pilot design for sparse multipath channel estimation in multiple-input multiple-output (MIMO) orthogonal frequency division multiplexing (OFDM) system in this *** order to reconstruct MIMO sparse channel,the prevalent compressed sensing (CS) theory is *** to random pilot construction,a deterministic pilot de- sign method is exploited to form the measurement matrix by deterministically extracting some rows of Fourier matrix that satisfies Restricted Isometry Property (RIP).Two families of continuous functions,namely f1 -SL0 and f 2-SL0,are investi- gated in this paper to approximate A 0norm for MIMO sparse channel *** results suggest that the de- terministic pilot design scheme performs as well as the random one at both low and high signal noise ratio (SNR).Moreover,f1 - SL0 and f 2-SL0 outperform A 1-dantzig algorithm with faster running time and better anti-noisy performance.
Background:MicroRNAs(miRNAs) are a class of small non-coding RNAs,which negatively regulate protein coding genes at the posttranscriptional *** tiny regulators have been associated to almost all known physiological an...
详细信息
Background:MicroRNAs(miRNAs) are a class of small non-coding RNAs,which negatively regulate protein coding genes at the posttranscriptional *** tiny regulators have been associated to almost all known physiological and pathological *** defects in miRNAs have been implicated in the etiology of many forms of human diseases. Apoptosis,autophagy and programmed necrosis are three distinct yet intimately connected functional modules of programmed cell death(PCD).In the past few years,increasing evidences suggested that aberrant expression of miRNAs regulate different subroutines of *** the roles of miRNAs in PCD network has attracted interests of researchers from a wide range of ***,a knowledge depository,which integrates information for both miRNAs and their targets in PCD network,will be of great help. Methods:Based on PubMed search,we firstly collected literatures which reported the roles of miRNAs in PCD before April ***,these literatures were inspected manually and the miRNAs and their targets genes were *** criterion for selecting PCD associated miRNAs in miRDeathDB is *** morphological or biochemical data should be provided when the miRNAs(or their targets) are manipulated in cell death *** miRDeathDB(http://***/mirdeathdb/) was developed,which allows users to browse,search and analyze the PCD associated miRNAs. Results:In total,210 records covering 86 miRNAs and 95 protein coding genes were collected in five model species:humans(Homo sapiens),mice(Mus musculus),fruit flies (Drosophila melanogaster),rat(Rattus norvegicus) and African frog(Xenopus tropicalis). Users can search the database for both miRNAs and protein coding entries based on principal *** addition,users can browse and obtain full lists of miRNAs involved in PCD for any given *** data can be freely downloaded or accessed via our website for academic uses. Conclusions:miRDeathDB provides a valuab
Most existing approaches of Web service selection with user preferences are either quantitative or qualitative. However, using a qualitative or quantitative approach alone cannot handle all the non-functional properti...
详细信息
暂无评论