With the fast development of network technology and expansion of the network scale, the heterogeneity of Internet makes the Quality of Service (QoS) guarantee techniques even more challenging. In this paper the state-...
详细信息
This article puts forward a new scheme to control message redundancy efficiently in delay tolerant mobile Ad-hoc networks (MANET). The class of networks generally lacks end-to-end connectivity. In order to improve t...
详细信息
This article puts forward a new scheme to control message redundancy efficiently in delay tolerant mobile Ad-hoc networks (MANET). The class of networks generally lacks end-to-end connectivity. In order to improve the efficiency that messages are delivered successfully, multiple message copies routing protocols are usually used, but the network load is increased due to a large number of message redundancies. In the study, by using counter method, every node adds an encounter counter based on epidemic routing scheme. The counter records the number which the node encounters other nodes with the same message copy. If the counter of a node reaches tbe installed threshold, the node removes the copy. Theoretical analysis gives a lower bound of threshold in delay tolerant MANET. According to the lower bound of threshold, a rational threshold is installed in real environment. With proposed scheme message copies decrease obviously and are removed completely finally. The successful delivery efficiency is still the same as epidemic routing and the redundant copies are efficiently controlled to a relatively low level computer simulations give the variation of message copies concerning different thresholds in fast and slow mobility scenes.
In this paper, no-wait flow shop scheduling problem with flowtime minimization is considered. Objective increment properties are analyzed and proved for fundamental operations of heuristics. With these properties, whe...
详细信息
Target detection and field surveillance are among the most prominent applications of wireless sensor networks. The quality of detection achieved by a sensor network can be quantified by evaluating the probability of d...
详细信息
Target detection and field surveillance are among the most prominent applications of wireless sensor networks. The quality of detection achieved by a sensor network can be quantified by evaluating the probability of detecting a mobile target crossing a sensing field. Detection probability of sensor nodes has been studied in sensor networks for many purposes such as quality of service and decision making. However, the sensing capabilities of sensors are affected by environmental factors in real deployment. This paper investigates the problem of detecting probability in a log-normal shadow fading environment. It presents an analytic method to evaluate the detection probability by at least k sensors under practical considerations. Furthermore, we also shows that shadow fading makes significant influence in detection probability compared to unit disk sensing model through extensive simulation experiments.
XSS (Cross-Site Scripting) is a major security threat for web applications. Due to lack of source code of web application, fuzz technique has become a popular approach to discover XSS in web application except Webmail...
详细信息
Localization is one of the key technologies in wireless sensor networks, and the mobile beacon assisted localization method is promising to reduce the cost. The methods with only one beacon introduce collinearity prob...
详细信息
It is a significant challenges to deal with the noise data in data mining and knowledge discovery applications. Most of previous works on data cleansing and correction have been focused on addressing class noise or at...
详细信息
This paper presents the Neuron Self-adaptive PID control of Brushless DC (BLDC) Motor. It is difficult to tune the parameters and get satisfied control characteristics by using normal PID controller. As the single neu...
详细信息
ISBN:
(纸本)9780769542966
This paper presents the Neuron Self-adaptive PID control of Brushless DC (BLDC) Motor. It is difficult to tune the parameters and get satisfied control characteristics by using normal PID controller. As the single neuron has the ability of self-learning, the simple structure and it is easy for computing, In order to control the BLDC motor, a single neuron self-adaptive PID controller is designed as the controller of the BLDC motor. The experimental results verify that a single neuron self-adaptive PID controller has better control performance than the normal PID controller.
The algorithm applied to video watermark based on HVS is rare recently , but adaptively selecting the embedding position and the embedding strength according to the host(such as videos, images etc.) is necessary, whic...
详细信息
DDoS detection has been the research focus in the field of information security. Existing detecting methods such as Hurst parameter method and Markov model must ensure that the network traffic signal f(t) is a station...
详细信息
DDoS detection has been the research focus in the field of information security. Existing detecting methods such as Hurst parameter method and Markov model must ensure that the network traffic signal f(t) is a stationary signal. But its stability is just a regular assumption and has no strict mathematical proof. Therefore methods mentioned above lack of reliable theoretical support. This article introduces Hilbert-HuangTtransformation(HHT) . HHT does not need to be based on signal stability,but it monitors the similarity between Hilbert marginal spectrums of adjacent observation sequences so as to realize DDoS detection. The method is experimented on DARPA 1999 data and simulating data respectively. Experimental results show that the method behaves better than existing Hurst parameter method in distinguishing both the normal and the attacked traffic.
暂无评论