Although many researchers have written about OFDMA transmission system, it needs more attention and analysis in next generation wireless networks. This paper is aimed at studying the performance analysis of OFDMA in W...
详细信息
Although many researchers have written about OFDMA transmission system, it needs more attention and analysis in next generation wireless networks. This paper is aimed at studying the performance analysis of OFDMA in WiMAX IEEE 802.16m and 3GPP LTE Advanced systems Communication in hybrid environment systems. This study further focuses on Downlink and Uplink models. Finally, it summarizes simulation results of OFDMA transmission technique.
To overcome the drawback that switched Ethernet can not meet the real-time requirements in industrial communications, an improved message transmission model in which switch and the end-nodes control the real-time traf...
详细信息
To overcome the drawback that switched Ethernet can not meet the real-time requirements in industrial communications, an improved message transmission model in which switch and the end-nodes control the real-time traffic with Earliest Deadline First (EDF) scheduling was proposed. In addition, a distributed admission control method for periodic messages which is performed by the source and the destination nodes without the modification of the operational features of Ethernet switch was presented. Moreover, a more general schedulability condition for real-time periodic message over switched Ethernet was given and proved by using real-time scheduling theory.
A secure and trusted execution environment is a fundamental requirement for distributed network, so that the integrity of service provider platform should be verified prior to services' distribution in order to as...
详细信息
A secure and trusted execution environment is a fundamental requirement for distributed network, so that the integrity of service provider platform should be verified prior to services' distribution in order to assure that the platform is free from a malicious modification and attack. In this paper, we proposed an implementation of trusted execution environment based on the combination of trusted computing and virtualization technology. On the service provider's platform, from the very beginning of Virtual Machine Monitor (VMM) was booted to the execution environment was set up, all of the platform status changes has been recorded into Platform Configuration Register (PCR) and reported to remote service requester, which make it sure about the trustworthy of the result. Furthermore, the VM image was leveraged to make the execution environment constructed more flexible. Analysis shows our method is efficient and secure.
In this paper, we investigate the effects that the lossy image compression has on the performance competitive codes of palmprint verification algorithms. Effects of lossy compression on palmprint recognition performan...
详细信息
In this paper, we investigate the effects that the lossy image compression has on the performance competitive codes of palmprint verification algorithms. Effects of lossy compression on palmprint recognition performance are of interest in applications where image storage space and transmission time are of critical importance. To reconcile that goal with its implications for bandwidth and storage, we test the effects of image lossy compression on competitive code under different transforms, quantization and encoding algorithms using a publicly available palmprint database. Experiments performing recognition directly in the compressed domain show that the extracted feature template variation from the compressed palmprint image is not consistent with the image distortion. What is interesting, the effect on the JPEG is more serious than that of JPEG2000 when the compression ratio is bigger than about 11 while the effect on JPEG2000 is more serious than that of JPEG when the compression ratio is smaller than about 11. And the trellis coded quantized method is not suitable for compressing palmprint images.
Secure sensor networks has received much attention in the last few years.A sensor network always works unattended possibly in a hostile environment such as a *** such environments,sensor networks are subject to node *...
详细信息
Secure sensor networks has received much attention in the last few years.A sensor network always works unattended possibly in a hostile environment such as a *** such environments,sensor networks are subject to node *** energy,memory,and computational capabilities of sensor nodes mandate a clever design of security solutions to minimize overhead while maintaining secure communication over the lifespan of the *** this paper,an authenticated dynamic key management scheme,ADKM has been *** provides efficient,scalable,and survivable dynamic keying in a clustered sensor network with a large number of sensor *** employs a combinatorial exclusion basis system (EBS) for efficiency and one-way hash chains for *** of security and performance demonstrate that ADKM is efficient in security of sensor networks.
The news filtering and summarization (NFAS) system can automatically recognize Web news pages, retrieve each news page's title and news content, and extract key phrases. This extraction method substantially outper...
A Boolean function with an even number n = 2k of variables is called Bent if it is maximally nonlinear. A technique on constructing Maiorana-McFarland's Bent functions of arbitrary degree is described. Based on th...
详细信息
A Boolean function with an even number n = 2k of variables is called Bent if it is maximally nonlinear. A technique on constructing Maiorana-McFarland's Bent functions of arbitrary degree is described. Based on the properties of Maiorana-McFarland's Bent functions, a Bent function with arbitrary degree can be constructed by changing the order of concatenating linear functions.
The data is transmitted between a small satellite near earth and the ground stations. For transmitting reliably, the data is divided into many fragments, and these fragments are encapsulated as multiple bundles with t...
详细信息
ISBN:
(纸本)9781424458219;9781424458240
The data is transmitted between a small satellite near earth and the ground stations. For transmitting reliably, the data is divided into many fragments, and these fragments are encapsulated as multiple bundles with the bundle protocol of Delay/Disruption Tolerant networks (DTNs). Some bundles which may be error are requested to retransmit in next communication link. An r-uniform random hypergraph model is introduced and the relation is analyzed between the probability of error bundle and the structure of hypergraph.
The condition-based maintenance (CBM) technique has been widely used in the power plant in China. Feed water pump is one of the most important general requirements in the power plant. its reliability plays an importan...
详细信息
Automated trust negotiation (ATN) is an approach that establishes mutual trust between strangers wishing to share resources or conduct business by gradually requesting and disclosing digitally signed credentials. When...
详细信息
ISBN:
(纸本)9781424463886;9780769539874
Automated trust negotiation (ATN) is an approach that establishes mutual trust between strangers wishing to share resources or conduct business by gradually requesting and disclosing digitally signed credentials. When designing security schemes and systems in ATN, the negotiation efficiency, which is a desirable property, is not considered sufficiently. In this paper, a useful model of P. E. evaluation is proposed to enhance negotiation efficiency by improving the efficiency of security schemes used in ATN. The useful model of P. E. evaluation is responsible for choosing a most appropriate policy among several alternative policies that can advance a negotiation at the same time, which makes the negotiation more efficient.
暂无评论