In the down-link secure space-air-ground integrated network (SAGIN) with practical discrete modulation symbols, we consider the joint design of the power of satellite and unmanned aerial vehicle (UAV) swarm beamformin...
详细信息
作者:
GUYuZHAOBaohuaDepartment of Computer Science
University of Science and Technology of China Anhui Province Key Laboratory of Software in Computing and Communication Hefei 230027 China
In this paper, we focus on the target tracking problem in sensor networks and propose an Powersaving target localization scheme (PSTL) based on a conjecture model that reflects the moving pattern of a target, and also...
详细信息
In this paper, we focus on the target tracking problem in sensor networks and propose an Powersaving target localization scheme (PSTL) based on a conjecture model that reflects the moving pattern of a target, and also a corresponding two-step communication protocol between Base station (BS) and sensors. BS executes a query mechanism to determine which sensors should be used for detailed information according to a limited amount of data received from sensors. This scheme reduces both energy consumption and communication bandwidth requirement, prolongs the lifetime of the wireless sensor networks. Simulation results indicate that it can achieve a high accuracy while saving a large amount of energy.
作者:
HUTianZHAOBaohuaDepartment of Computer Science
University of Science and Technology of China Anhui Province Key Laboratory of Software in Computing and Communication Hefei 230027 China
This paper focuses on the problem of constructing the minimum-energy broadcast trees in all-wireless networks. We proposed a greedy algorithm called Greedy maximum-branch replacement algorithm (GMBR) to decrease the t...
详细信息
This paper focuses on the problem of constructing the minimum-energy broadcast trees in all-wireless networks. We proposed a greedy algorithm called Greedy maximum-branch replacement algorithm (GMBR) to decrease the total power of the broadcast tree further. This algorithm can be developed to a distributed one easily. Compared with the previous algorithms, GMBR was proved to have better performance, especially when the propagation loss exponent and the network size become larger.
Marine Wireless Rechargeable Sensor Networks (MWRSNs), enhanced by recent Wireless Power Transfer (WPT) technology, present a significant advancement in extending network life. Traditional methods improve network perf...
详细信息
Recently, negative databases (NDBs) are proposed for privacy protection. Similar to the traditional databases, some basic operations could be conducted over the NDBs, such as select, intersection, update, delete and...
详细信息
Recently, negative databases (NDBs) are proposed for privacy protection. Similar to the traditional databases, some basic operations could be conducted over the NDBs, such as select, intersection, update, delete and so on. However, both classifying and clustering in negative databases have not yet been studied. Therefore, two algorithms, i.e., a k nearest neighbor (kNN) classification algorithm and a k-means clustering algorithm in NDBs, are proposed in this paper, respectively. The core of these two algorithms is a novel method for estimating the Hamming distance between a binary string and an NDB. Experimental results demonstrate that classifying and clustering in NDBs are promising.
Privacy-preserving computational geometry is a special secure multi-party computation and has many applications. Previous protocols for determining whether a point is inside a circle are not secure enough. We present ...
详细信息
Privacy-preserving computational geometry is a special secure multi-party computation and has many applications. Previous protocols for determining whether a point is inside a circle are not secure enough. We present a two-round protocol for computing the distance between two private points and develop a more efficient protocol for the point-circle inclusion problem based on the distance protocol. In comparison with previous solutions, our protocol not only is more secure but also reduces the number of communication rounds and the number of modular multiplications significantly.
One of the main objective of spectrum sensing is to detect spectrum opportunity quickly and accurately. Both of the two aspects can be improved by hardware upgrading and software optimization. In this paper, we concen...
详细信息
In order to conduct optical neurophysiology experiments on a freely swimming zebrafish,it is essential to quantify the zebrafish head to determine exact lighting *** efficiently quantify a zebrafish head's behavio...
详细信息
In order to conduct optical neurophysiology experiments on a freely swimming zebrafish,it is essential to quantify the zebrafish head to determine exact lighting *** efficiently quantify a zebrafish head's behaviors with limited resources,we propose a real-time multi-stage architecture based on convolutional neural networks for pose estimation of the zebrafish head on *** stage is implemented with a small neural ***,a light-weight object detector named Micro-YOLO is used to detect a coarse region of the zebrafish head in the first *** the second stage,a tiny bounding box refinement network is devised to produce a high-quality bounding box around the zebrafish ***,a small pose estimation network named tiny-hourglass is designed to detect keypoints in the zebrafish *** experimental results show that using Micro-YOLO combined with RegressNet to predict the zebrafish head region is not only more accurate but also much faster than Faster R-CNN which is the representative of two-stage *** with DeepLabCut,a state-of-the-art method to estimate poses for user-defined body parts,our multi-stage architecture can achieve a higher accuracy,and runs 19x faster than it on CPUs.
The previous evolutionary clustering methods for time-evolving data usually adopt the temporal smoothness framework, which controls the balance between temporal noise and true concept drift of clusters. They, however,...
详细信息
Cluster analysis is a major method to study gene function and gene regulation information for there is a lack of prior knowledge for gene data. Many clustering methods existed at present usually need manual operations...
详细信息
暂无评论