Device-free Passive(DfP) detection has received increasing attention for its ability to support various pervasive applications. Instead of relying on variable Received Signal Strength(RSS), most recent studies rel...
详细信息
Device-free Passive(DfP) detection has received increasing attention for its ability to support various pervasive applications. Instead of relying on variable Received Signal Strength(RSS), most recent studies rely on finer-grained Channel State Information(CSI). However, existing methods have some limitations, in that they are effective only in the Line-Of-Sight(LOS) or for more than one moving individual. In this paper, we analyze the human motion effect on CSI and propose a novel scheme for Robust Passive Motion Detection(R-PMD). Since traditional low-pass filtering has a number of limitations with respect to data denoising, we adopt a novel Principal Component Analysis(PCA)-based filtering technique to capture the representative signals of human motion and extract the variance profile as the sensitive metric for human detection. In addition, existing schemes simply aggregate CSI values over all the antennas in MIMO systems. Instead, we investigate the sensing quality of each antenna and aggregate the best combination of antennas to achieve more accurate and robust detection. The R-PMD prototype uses off-the-shelf WiFi devices and the experimental results demonstrate that R-PMD achieves an average detection rate of 96.33% with a false alarm rate of 3.67%.
QoS-aware routing algorithm is important in wireless multimedia sensornetworks. This paper formulates a generalized QoS-aware routing model on the basis of multiple routing metrics and priorities of packets. We first...
详细信息
QoS-aware routing algorithm is important in wireless multimedia sensornetworks. This paper formulates a generalized QoS-aware routing model on the basis of multiple routing metrics and priorities of packets. We first introduce a 2D plain-based routing algorithm IPACR which improves the standard ant colony algorithm by optimizing the initial distribution of artificial pheromone in order to accelerate the algorithm convergence rate. Then a clustering-based routing algorithm ICACR is presented which can be well applied in a large scale network. ICACR is a variation of IPACR because it can be suitable for clustering cases to satisfy the larger scale situations. Both the numerical algorithm performance analysis and simulation of IPACR and ICACR are given. The results show that ICACR outperforms IPACR in terms of both network lifetime and QoS-aware routing metrics in large scale wireless multimedia sensornetworks. Moreover, the simulation based on the real video traces shows that by extending the multi-path to ICACR for different priorities of video frames better performance can be achieved.
We present an efficient entanglement concentration protocol(ECP) for the less-entangled W state with some identical conventional polarized single *** the protocol,two of the parties say Alice and Charlie should perf...
详细信息
We present an efficient entanglement concentration protocol(ECP) for the less-entangled W state with some identical conventional polarized single *** the protocol,two of the parties say Alice and Charlie should perform the parity check measurements and they can ultimately obtain the maximally entangled W state with a certain success ***,they can obtain another less-entangled W state,which can be reconcentrated into the maximally entangled W *** iterating this ECP,a high success probability can be *** ECP may be an optimal one and it is useful in current quantum information processing.
How to effectively reduce the energy consumption of large-scale data centers is a key issue in cloud computing. This paper presents a novel low-power task scheduling algorithm (L3SA) for large-scale cloud data cente...
详细信息
How to effectively reduce the energy consumption of large-scale data centers is a key issue in cloud computing. This paper presents a novel low-power task scheduling algorithm (L3SA) for large-scale cloud data centers. The winner tree is introduced to make the data nodes as the leaf nodes of the tree and the final winner on the purpose of reducing energy consumption is selected. The complexity of large-scale cloud data centers is fully consider, and the task comparson coefficient is defined to make task scheduling strategy more reasonable. Experiments and performance analysis show that the proposed algorithm can effectively improve the node utilization, and reduce the overall power consumption of the cloud data center.
As a viable component of 6G wirelesscommunication architecture,satellite-terrestrial networks support efficient file delivery by leveraging the innate broadcast ability of satellite and the enhanced powerful file tra...
详细信息
As a viable component of 6G wirelesscommunication architecture,satellite-terrestrial networks support efficient file delivery by leveraging the innate broadcast ability of satellite and the enhanced powerful file transmission approaches of multi-tier terrestrial *** the paper,we introduce edge computing technology into the satellite-terrestrial network and propose a partition-based cache and delivery strategy to make full use of the integrated resources and reducing the backhaul *** on the interference effect from varied nodes in different geographical distances,we derive the file successful transmission probability of the typical user and by utilizing the tool of stochastic *** the constraint of nodes cache space and file sets parameters,we propose a near-optimal partition-based cache and delivery strategy by optimizing the asymptotic successful transmission probability of the typical *** complex nonlinear programming problem is settled by jointly utilizing standard particle-based swarm optimization(PSO)method and greedy based multiple knapsack choice problem(MKCP)optimization *** results show that compared with the terrestrial only cache strategy,Ground Popular Strategy,Satellite Popular Strategy,and Independent and identically distributed popularity strategy,the performance of the proposed scheme improve by 30.5%,9.3%,12.5%and 13.7%.
An optical encryption scheme based on a ghost imaging system with disordered speckles is proposed to obtain a higher security with a small key. In the scheme, Alice produces the random speckle patterns and obtains the...
详细信息
An optical encryption scheme based on a ghost imaging system with disordered speckles is proposed to obtain a higher security with a small key. In the scheme, Alice produces the random speckle patterns and obtains the detection results with the help of a computational ghost imaging(CGI) system. Then Alice permutes the order of the random speckle patterns and shares the permutation sequence as a secure key to the authorized users. With the secure key, Bob could recover the object with the principle of the CGI system, whereas, the unauthorized users could not obtain any information of the object. The numerical simulations and experimental results show that the proposed scheme is feasible with a small key, simultaneously,it has a higher security. When the eavesdropping ratio(ER) is less than 40%, the eavesdropper cannot acquire any useful information. Meanwhile, the authorized users could recover completely with the secure key.
The rapid developments of high-speed trains(HSTs) introduce new challenges to HST wirelesscommunication systems. Realistic HST channel models play a critical role in designing and evaluating HST communication systems...
详细信息
The rapid developments of high-speed trains(HSTs) introduce new challenges to HST wirelesscommunication systems. Realistic HST channel models play a critical role in designing and evaluating HST communication systems. Due to the length limitation, bounding of tunnel itself, and waveguide effect, channel characteristics in tunnel scenarios are very different from those in other HST scenarios. Therefore, accurate tunnel channel models considering both large-scale and small-scale fading characteristics are essential for HST communication systems. Moreover, certain characteristics of tunnel channels have not been investigated sufficiently. This article provides a comprehensive review of the measurement campaigns in tunnels and presents some tunnel channel models using various modeling methods. Finally, future directions in HST tunnel channel measurements and modeling are discussed.
Data as well as pilot symbols are nonlinearly distorted due to signal clipping in practical OFDM systems. The distortion inflicted on pilot symbols has great negative effect on the channel estimation. To solve this is...
详细信息
We propose a compressed ghost imaging scheme based on differential speckle patterns,named *** the scheme,a series of bucket detector signals are acquired when a series of random speckle patterns are employed to illumi...
详细信息
We propose a compressed ghost imaging scheme based on differential speckle patterns,named *** the scheme,a series of bucket detector signals are acquired when a series of random speckle patterns are employed to illuminate an unknown *** the differential speckle patterns(differential bucket detector signals)are obtained by taking the difference between present random speckle patterns(present bucket detector signals)and previous random speckle patterns(previous bucket detector signals).Finally,the image of object can be obtained directly by performing the compressed sensing algorithm on the differential speckle patterns and differential bucket detector *** experimental and simulated results reveal that CGI-DSP can improve the imaging quality and reduce the number of measurements comparing with the traditional compressed ghost imaging schemes because our scheme can remove the environmental illuminations efficiently.
Self-configuration of physical cell identity (PCI) is a key feature for the long term evolution advanced (LTE-A) network. The PCI is used to identify the different cells in the system, becoming an essential cell c...
详细信息
Self-configuration of physical cell identity (PCI) is a key feature for the long term evolution advanced (LTE-A) network. The PCI is used to identify the different cells in the system, becoming an essential cell configuration parameter. Considering the uncoordinated deployments of the evolved Node B (eNodeB) and the limited number of PCI, the PCI assignment for cells would be quite complex. This paper presents and puts forward a graph theory based centralized PCI self-configuration scheme (GT-PCIS). The PCI self-configuration problem is mapped to the well-known minimum spanning tree (MST) problem in order to optimize the PCI reuse distance and decrease the multiplexing interference throughout the entire network. The proposal provides a greedy search to make the locally optimal selection of PCI at each stage, and to achieve a global optimum. To demonstrate the algorithm validity, performances of GT-PCIS and manual configuration are evaluated. Simulation results show that the proposed GT-PCIS outperforms other configuration algorithms even under the condition of severe PCI deficiency.
暂无评论