Cellular systems operate on ISM band with the co-existence of wide-deployed WLAN is a promising solution to offload the crowded cellular band, where cellular device acting as virtual a WLAN station contends for WLAN c...
详细信息
Cellular systems operate on ISM band with the co-existence of wide-deployed WLAN is a promising solution to offload the crowded cellular band, where cellular device acting as virtual a WLAN station contends for WLAN channel resource via applying the same IEEE 802.11 Distributed Coordination Function(DCF) as WLAN rivals is a straightforward way. However, the conventional mechanism cannot fully utilize the spectrum resource, we propose an adaptive probability access (APA) method which could adjust the channel access probability of cellular system by maximizing the proportional fairness throughput of both systems. This method can adjust the cellular access probability step by step to ensure that both cellular and WLAN work near the optimum operating spot. Simulation results show that the proposed APA method improves both the proportional fairness and total throughput.
Proxy cryptosystems are classified into proxy decryption systems and proxy re-encryption systems on the basis of a proxy's role. In this paper, we propose an ID-based proxy cryptosystem with revocability and hiera...
详细信息
With the moving development of networks, especially Internet of Things, electronic identity administration in cyberspace is becoming more and more important. And personal identity management in cyberspace associated w...
详细信息
Neuronal oscillations in the gamma frequency range and spikes have been reported in many cortical areas in the information processing, but the role of spikes play in cortical processing remains unclear. The aim of thi...
详细信息
Neuronal oscillations in the gamma frequency range and spikes have been reported in many cortical areas in the information processing, but the role of spikes play in cortical processing remains unclear. The aim of this study was to examine the role of high dose DHPG in the generation of oscillatory field activity at gamma frequency in the medical septal diagonal band of Broca (MSDB) slice prepared from rat brain, and to determine the phase relationship between spikes and gamma oscillations. The high dose DHPG induced large amplitude field population spiking activity, which is correlated linearly with the field gamma oscillations. The relationship between timing of spikes and the phase of gamma oscillation was determined by an analysis of circular statistics. Further analysis with Rayleigh test revealed that the relationship of phase-locking between spikes and gamma rhythm is of statistical significance. These data demonstrate that DHPG-sensitive neuronal networks within medial septum are able to generate gamma oscillations which are modulated by large amplitude population spikes and phase-locking of spikes to the gamma rhythm suggest the role of memory enhancement in the presence of mGluR1 activation.
The transformation from high-level model description to low-level implementation for network survivability may lead to semantic inconsistency problem, since the method of transformation is based on symbolic transforma...
The transformation from high-level model description to low-level implementation for network survivability may lead to semantic inconsistency problem, since the method of transformation is based on symbolic transformation of machine which neglects semantics of proposed problem. Therefore, in order to analyze the semantic differences of transformation before and after and ensure the semantic consistency, this paper built an Ontology model of high-level model description and low-level implementation for network survivability. We proposed an Ontology-based multi-factor synthesized method which is used to analyze semantic similarity of multi-hierarchy text including high-level model description text and low-level implementation text. This method included the computation of type similarity of the text based on concept lattice, computation of content similarity of the text based on ontology and computation of structure similarity of the text based on inverse order pairs. The availability of the method is verified by experiments and its accuracy is proved by comparison with classic VSM algorithm, WeiSong algorithm, CF algorithm and professional value.
Quantizing Error during the process of JPEG compression is analyzed, and a new information hiding algorithm is proposed based on Quantizing Error of JPEG image. Experimental results show that the proposed algorithm ca...
详细信息
Quantizing Error during the process of JPEG compression is analyzed, and a new information hiding algorithm is proposed based on Quantizing Error of JPEG image. Experimental results show that the proposed algorithm can provide a high capacity information hiding and keep the visual quality well, also the produced stego-image are almost identical to the original cover images.
There exist noisy, unparallel sentences in parallel web pages. Web page structure is subjected to some limitation for sentences alignment task for web page text. The most straightforward way of aligning sentences is u...
详细信息
There exist noisy, unparallel sentences in parallel web pages. Web page structure is subjected to some limitation for sentences alignment task for web page text. The most straightforward way of aligning sentences is using a translation lexicon. However, a major obstacle to this approach is the lack of dictionary for training. This paper presents a method for automatically align Mongolian-Chinese parallel text on the Web via vector space model. Vector space model is an algebraic model for representing any object as vectors of identifiers, such as index terms. In the statistically based vector-space model, a sentence is conceptually represented by a vector of keywords extracted from the text. Extracted keywords are composed by content words, known as terms and the weight of a term in a sentence vector can be determined tf-idf method. CHI is used to compute the association between bilingual words. Once the term weights are determined, the similarity between sentence vectors is computed via cosine measure. The experimental results indicate that the method is accurate and efficient enough to apply without human intervention.
Strategy of sensor nodes deployment is directly related to the cost and performance for underwater wireless sensor networks, which is largely determined the various service-quality improvement of wireless sensor netwo...
详细信息
Strategy of sensor nodes deployment is directly related to the cost and performance for underwater wireless sensor networks, which is largely determined the various service-quality improvement of wireless sensor networks. In order to improve the coverage of the target area, this paper presents a distributed algorithm of coverage control. Assume that nodes initially deployed on the surface of the water and can only move in vertical direction in 3-D space, the algorithm is first to control the nodes in-depth and relocate the nodes at different depths, then the nodes continue to adjust their depths until there is no augment for improving their coverage, and to achieve efficient coverage of the three-dimensional sensor networks ultimately. Experimental results show that compared with traditional random deployment method, the proposed coverage control algorithm can improve coverage of network effectively.
Currently, unmanned aerial vehicles (UAVs) are applied to routine inspection tasks of electric distribution networks. As an important information source, machine vision attracts much attention in the area of the UAV...
详细信息
ISBN:
(纸本)9781467316439
Currently, unmanned aerial vehicles (UAVs) are applied to routine inspection tasks of electric distribution networks. As an important information source, machine vision attracts much attention in the area of the UAV's autonomous control. To this end, real-time algorithms are studied-in this paper to detect the power lines in the UAV video images. First, video images are converted into binary images through an adaptive thresholding approach. Then, Hough Transform is used to detect line candidates in the binary images. Finally, a fuzzy C- means (FCM) clustering algorithm is used to discriminate the power lines from the detected line candidates. The properties of power lines are used to remove the spurious lines, and the length and slope of the detected lines are used as features to establish the clustering data set. Experimental results show that the algorithms proposed are effective and able to tolerate noises from complicated terrain background and various illuminations.
Service composition was the core problem of service computing, the validity and reliability of service composition had become the premise of service execution. A method was presented which utilizes the finite state ma...
详细信息
Service composition was the core problem of service computing, the validity and reliability of service composition had become the premise of service execution. A method was presented which utilizes the finite state machine (FSM) to model the business process's state transitions, and described the required properties with Alloy language. Then, Alloy model was used to formalize the service FSM and the required properties of the system. Finally, Alloy Analyzer was used to verify the model that whether the required properties were satisfied. It is shown that the method of Alloy-based verification of the service composition is of good feasibility.
暂无评论