The method of physical layer security in wireless relay communication based on cooperative jamming scheme need the channel of legitimate user keep constant. It fails if the eavesdropper has more antennas than the send...
详细信息
ISBN:
(纸本)9781467327626
The method of physical layer security in wireless relay communication based on cooperative jamming scheme need the channel of legitimate user keep constant. It fails if the eavesdropper has more antennas than the sender. To solve this problem, this paper proposes a second-order spatial hopping transmission scheme. The sender, by the antenna switching and the hopping spatial pattern (HSP), forms equivalent spatial channel of the first-order; Acting as a virtual multi-antenna receivers, relays use time-varying coefficient of beam-forming to weighted-and-forward, form equivalent spatial channel of the second-order. Simulation results show that the scheme proposed achieves low probability of intercept (LPI) in eavesdropper and the power consumption is lower than the method of cooperative jamming.
For affinity propagation algorithm, traditional Euclidean distance measure cannot fully reflect the complex spatial distribution of the data sets. We propose a self-tuning kernel geodesic distance as the similarity me...
详细信息
For affinity propagation algorithm, traditional Euclidean distance measure cannot fully reflect the complex spatial distribution of the data sets. We propose a self-tuning kernel geodesic distance as the similarity measure which can reflect the inherent manifold structure information effectively. Meanwhile, according to the neighborhooddensity of the data sets, it identifies and eliminates the influence of boundary noise effectively, the results show that the improved algorithm has higher accuracy and betterrobustness fordata with manifolddistribution, multi-scale and noise overlap.
The wireless microphone network is an important PU network for CrN, but there is no effective technology to solve the problem of microphone evaluation attacks. Therefore, this paper propose ASA algorithm, which utiliz...
详细信息
Cognitive radio Network is an effective technology and a hot research direction which can solve the problem of deficient resource andrevolutionize utilization. And its safety technology attracts more and more researc...
详细信息
An analysis of the radar backscattering from the ocean surface covered by oil spill is presented using a mi- crowave scattering model and Monte-Carlo simulation. In the analysis, a one-dimensional rough sea sur- face ...
详细信息
An analysis of the radar backscattering from the ocean surface covered by oil spill is presented using a mi- crowave scattering model and Monte-Carlo simulation. In the analysis, a one-dimensional rough sea sur- face is numerically generated with an ocean waveheight spectrum for a given wind velocity. A two-layered medium is then generated by adding a thin oil layer on the simulatedrough sea surface. The electric fields backscattered from the sea surface with two-layered medium are computed with the method of moments (MoM), and the backscattering coefficients are statistically obtained with N independent samples for each oil-spilled surface using the Monte-Carlo technique for various conditions of surface roughness, oil-layer thickness, frequency, polarization and incidence angle. The numerical simulation results are compared with theoretical models for clean sea surfaces and SAr images of an off-spilled sea surface caused by the Hebei (Hebei province, China) Spirit oil tanker in 2007. Further, conditions for better oil spill extraction are sought by the numerical simulation on the effects of wind speed and oil-layer thickness at different inci- dence angles on the backscattering coefficients.
Twitter is emerging social media. There is an important practical significance to study its communication effect in many aspects of the Marketing Management, Public Sentiment, Hot Extraction and so on. The retweeting ...
详细信息
ISBN:
(纸本)9781467327626
Twitter is emerging social media. There is an important practical significance to study its communication effect in many aspects of the Marketing Management, Public Sentiment, Hot Extraction and so on. The retweeting scale is an important indicator to reflect the communication effect. Based on analyzing the factors, a prediction algorithm based on SVM was proposed forretweeting with five features: publisher influence, acceptor activity, interest level, content importance and intimacy. Furthermore, the prediction algorithm forretweeting scale was proposed based above, the method to evaluate the prediction accuracy was given. At last the experiment with Twitterdata showed a goodresult that the prediction accuracy of retweeting scale was up to 86.63%.
For the issue of the discretionary access control(dAC) model safety analysis,a logic method is *** method takes the Gd model as the classic dAC model and Prolog as the basic language to describe system states and st...
详细信息
For the issue of the discretionary access control(dAC) model safety analysis,a logic method is *** method takes the Gd model as the classic dAC model and Prolog as the basic language to describe system states and state transferrules.A general program based on this logic method is proposed fordAC safety analysis,but this program may never be terminal for some safety analysis *** safety analysis algorithm is achieved by simplifying the general program according to the property of the dAC model state transfer *** safety analysis algorithm is easier to understand and implement than the previous algorithms and its time complexity is O(N+M+T),in which N,M,and T are the numbers of the rights with copy flag,the policies forright transferring,and the policies forright permitting,respectively.
The inter-domain routing system faces many serious security threats because the border gateway protocol(BGP) lacks effective security ***,there is no solution that satisfies the requirements of a real *** address this...
详细信息
The inter-domain routing system faces many serious security threats because the border gateway protocol(BGP) lacks effective security ***,there is no solution that satisfies the requirements of a real *** address this problem,we propose a new model based on immune theory to monitor the inter-domain routing *** introduce the dynamic evolution models for the "self" anddetection cells,and construct washout and update mechanisms for the memory detection ***,borrowing an idea from immune network theory,we present a new coordinative method to identify anomalous nodes in the inter-domain routing *** this way,the more nodes working with their own information that join the coordinative network,the greater is the ability of the system to identify anomalous nodes through evaluation between *** it is not necessary to modify the BGP,the ITMM is easy to deploy and inexpensive to *** experimental results confirm the method’s ability to detect abnormal routes and identify anomalous nodes in the inter-domain routing system.
Providing performance guarantees for arriving traffic flows has become an important measure for today’s routing andswitchingsystems. However, none of current scheduling algorithms built on CICQ (combined input and ...
详细信息
Providing performance guarantees for arriving traffic flows has become an important measure for today’s routing andswitchingsystems. However, none of current scheduling algorithms built on CICQ (combined input and cross-point buffered) switches can provide flow level performance guarantees. Aiming at meeting this requirement, the feasibility of implementing flow level scheduling is discussed thoroughly. Then, based on the discussion, it comes up with a hybrid and stratified fair scheduling (HSFS) scheme, which is hierarchical and hybrid, for CICQ switches. With HSFS, each input port and output port can schedule variable length packets independently with a complexity of O(1). Theoretical analysis show that HSFS can provide delay bound, service rate and fair performance guarantees without speedup. Finally, we implement HSFS in SPES (switch performance evaluation system) to verify the analytical results.
Multi-path basedrouting andswitching can achieve network-wide load balancing andreduce the port conflicts of switching *** by this novel idea,in this paper,through analyzing the feasibility of implementing multi-ne...
详细信息
Multi-path basedrouting andswitching can achieve network-wide load balancing andreduce the port conflicts of switching *** by this novel idea,in this paper,through analyzing the feasibility of implementing multi-next-hops in core switching networks comprehensively,we advance a switching scheme called MHrS(multi-next-hop re-routing switch)and a forwarding table management scheme called HMFT(hierarchical multi-stage forwarding table)to support multi-next-hop dynamical *** implements dynamical re-routing in the switches according its congestion status to achieve real-time load balancing,while HMFT can provide traffic with different forwarding paths based on their QoS *** analysis and simulation results show that switches equipped with HMFT and MHrS can provide gooddelay and throughput ***,they can reduce port conflicts significantly.
暂无评论