The growth of network coding opportunities is considered the unique optimization goal by most current network coding based routing algorithms for wireless mesh networks. This usually results in flows aggregation probl...
详细信息
The growth of network coding opportunities is considered the unique optimization goal by most current network coding based routing algorithms for wireless mesh networks. This usually results in flows aggregation problem in areas with coding opportunities, and degrades the network performance. This paper proposes a Load balanced coding aware multipath routing(LCMR)for wireless mesh networks. To facilitate the evaluation of discovered multiple paths and the tradeoffs between coding opportunity and load balancing, a novel routing metric, Load balanced coding aware routing metric(LCRM) is presented, which considers the load degree of nodes when detects coding opportunities. LCMR could spread traffic over multipath to further balance load. Simulation results demonstrate that LCMR could evenly spread the traffic over the network with increasing network throughput in a heavy load at the expense of some coding opportunities.
Distributed search and routing algorithms based on the DHT(distributed hash table) protocol have attracted considerable attention in structured P2P(peer-to-peer) research as a result of favorable properties such as di...
详细信息
Distributed search and routing algorithms based on the DHT(distributed hash table) protocol have attracted considerable attention in structured P2P(peer-to-peer) research as a result of favorable properties such as distribution,self-organization,and high *** with a traditional C/S(client/server) network,the probability of peers initiating malicious behavior increases dramatically because of their self-governing and dynamic characteristics,which also make it harder to satisfy the peers’ security required by *** this paper,we propose a new secure DHT protocol based on a multidimensional mapping *** mechanism maps peers to a multidimensional space by dividing the identifiers into ***,a series of secure methods and routing algorithms are provided to achieve secure DHT in smaller *** with state-ofthe-art approaches,the theoretical analysis and experimental results show that the multidimensional mapping mechanism can effectively improve the average success rate of a resource search by inhibiting malicious behavior.
To reach necessary end-to-end connectivity between the Internet and wirelesssensornetworks (WSNs), the Internet Engineering Task Force (IETF) IPv6 over low power wireless personal area network (6LowPAN) workin...
详细信息
To reach necessary end-to-end connectivity between the Internet and wirelesssensornetworks (WSNs), the Internet Engineering Task Force (IETF) IPv6 over low power wireless personal area network (6LowPAN) working group has been established and introduced an adaptation layer for integration of IEEE 802.15.4 physical layer/media access control (PHY/MAC) layers and the upper layers of any Intemet protocol (IP)-based networks, such as the Internet. The energy efficiency is one of the most important performance measures in WSNs because most sensor nodes are only battery powered so we should reduce the energy consumption to the lowest to extend the life of nodes. Therefore the determination of MAC frame length should be carefully considered since that the radio frequency (RF) module consumes most the energy of a sensor node meanwhile the MAC protocol is the direct controller of RF module. In this paper, we provide a star-shaped 6LowPAN non-beacon mode with unslotted carrier sense multiple access with collision avoidance (CSMA/CA) mechanism to access to the channel and model the stochastic behavior of a target end node as the M/G/1 queuing system. Analytical expressions for some parameters such as channel busy probability, packet loss probability and energy efficiency are obtained in this paper and our analytical results can clearly show the impact of MAC frame length on the energy efficiency of a target node in both ideal and lossy channel.
In order to make cloud users get credible, high-quality composition of services, the trust quality of service aware(TQoS-aware) based parallel ant colony algorithm is proposed. Our approach takes the service credibili...
详细信息
In order to make cloud users get credible, high-quality composition of services, the trust quality of service aware(TQoS-aware) based parallel ant colony algorithm is proposed. Our approach takes the service credibility as the weight of the quality of service, then calculates the trust service quality T-QoS for each service, making the service composition situated in a credible environment. Through the establishment on a per-service T-QoS initialization pheromone matrix, we can reduce the colony’s initial search time. By modifying the pheromone updating rules and introducing two ant colonies to search from different angles in parallel,we can avoid falling into the local optimal solution, and quickly find the optimal combination of global solutions. Experiments show that our approach can combine high-quality services and the improvement of the operational success rate. Also, the convergence rate and the accuracy of optimal combination are improved.
The analysis the outage performance of suggested Cognitive wireless Relay network (CWRN) which consists of a source, a destination and M cognitive relay nodes and M primary user nodes. In this study, we mainly study t...
详细信息
We present a highly efficient entanglement concentration protocol (ECP) for a four-electron system in a less-entangled cluster state. In this ECP, we only require one pair of less-entangled electron cluster states a...
详细信息
We present a highly efficient entanglement concentration protocol (ECP) for a four-electron system in a less-entangled cluster state. In this ECP, we only require one pair of less-entangled electron cluster states and one ancillary electron to complete the task. With the help of the controlled-not (CNOT) gate, the concentrated maximally entangled state can be retained for further application with some success probability. On the other hand, the discarded items can be reused to obtain a high success probability. All the features make this ECP useful in the current quantum information field.
Distributed secure quantum machine learning (DSQML) enables a classical client with little quantum technology to delegate a remote quantum machine learning to the quantum server with the privacy data preserved. More...
详细信息
Distributed secure quantum machine learning (DSQML) enables a classical client with little quantum technology to delegate a remote quantum machine learning to the quantum server with the privacy data preserved. Moreover, DSQML can be extended to a more general case that the client does not have enough data, and resorts both the remote quantum server and remote databases to perform the secure machi~ learning. Here we propose a DSQML protocol that the client can classify two-dimensional vectors to dif- ferent clusters, resorting to a remote small-scale photon quantum computation processor. The protocol is secure without leaking any relevant information to the Eve. Any eavesdropper who attempts to intercept and disturb the learning process can be noticed. In principle, this protocol can be used to classify high dimensional vectors and may provide a new viewpoint and application for future "big data".
In order to ensure the visual quality and the objective quality of video under low bandwidth, this paper presents a FGS enhancement layer coding algorithm for interested region. First, this paper introduces the tradit...
详细信息
In order to ensure the visual quality and the objective quality of video under low bandwidth, this paper presents a FGS enhancement layer coding algorithm for interested region. First, this paper introduces the traditional FGS enhancement layer coding and analyzes the exist problems. Then, proposes the main steps and description of the FGS enhancement layer coding algorithm for interested region. Finally, this paper shows the effectiveness of the algorithm through experimental results.
To improve the performance of reprogramming in wirelesssensornetwork, we present a novel reprogramming structure and constructive interference-based dissemination protocol (CIDP) to transmit the patch throughout the...
详细信息
Video compression can reduce the amount of data information for wireless multimedia sensornetworks(WMSNs). Compared with the traditional video coding algorithms, big gap existed in coding performance for Distributed ...
详细信息
Video compression can reduce the amount of data information for wireless multimedia sensornetworks(WMSNs). Compared with the traditional video coding algorithms, big gap existed in coding performance for Distributed Video Coding (DVC). In order to improve the efficiency of side information estimation, a novel hash-based side information estimation algorithm is proposed in this paper. For the regions of the Wyner-Ziv frame which cannot coding and decoding accurately, Discrete Cosine Transform (DCT) low-frequency coefficients of DCT is extracted according to the criteria of ROI for entropy coding. Then decoded DCT low-frequency coefficients for bidirectional hash motion estimation is utilized by decoder, which enables the decoder to choose between past and future reference frames for frame interpolation to generate best side information. Experimental results show that our proposed algorithm can gain more accurate motion estimation in the intense motion region. The algorithm can also reduce the rate, improve the quality of decoded image, and decrease the energy consumption of sensor nodes ultimately, which is important for WMSNs.
暂无评论