Non-destructive testing (NDT) techniques have been employed in all kinds of fields successfully for many years. Newly developed and applied NDT methods of detecting and monitoring fatigue crack in metal material are r...
详细信息
Interference Alignment (IA) can effectively increase Degrees-of-freedom (DOF) for cellular systems. In order to improve the Bit Error Rate (BER) performance, we propose a space-time diversity scheme for IA in uplink c...
详细信息
The routing protocol is the core of the Ad Hoc network protocols, which largely determines the performance and features of an Ad Hoc network. Aiming at the characteristics of the Mobile Radio Ad Hoc network, this pape...
详细信息
ISBN:
(纸本)9781849199094
The routing protocol is the core of the Ad Hoc network protocols, which largely determines the performance and features of an Ad Hoc network. Aiming at the characteristics of the Mobile Radio Ad Hoc network, this paper is to design a low-rate mobile Ad Hoc network routing protocols WLRP (Wireless Low-Rate Ad Hoc security Routing Protocol), using the trust evaluation mechanism between neighbour nodes which can effectively prevent attacks from inside the network, to greatly enhance the Ad Hoc Network security. Simulation results show that in low-Rate link environment, the WLRP protocol performs better than AODV.
With high definition cameras are widely used in urban traffic monitoring, the resolution of vehicle and traffic monitoring image rises. As the main component of intelligent traffic system, the vehicle license plate re...
详细信息
Role identification for network user plays a very important role in function and behaviour network analysis against criminal groups. Therefore, a network key role identification algorithm based on behaviour accumulati...
详细信息
ISBN:
(纸本)9781849198455
Role identification for network user plays a very important role in function and behaviour network analysis against criminal groups. Therefore, a network key role identification algorithm based on behaviour accumulation is proposed in the paper. Firstly, behaviour attribution of node (user) in network instance is extracted in the algorithm, description and abstraction of user behaviour by vector mode is performed, simultaneously, K mean algorithm is adopted to make clustering analysis for user behaviour;on the basis of conditions described as above, Hybrid Ant-Colony Algorithm (HBACA) is modified to search relationships between variety of grouping sets in the network instance, and identify each user role in the performing process of network instance. Simulation result shows that the algorithm can extract internal relations of communication behaviours between each network member, in order to obtain key role in a specific network instance.
This paper details the radiation of laser induced air plasma. The plasma was produced by interacting the air with the Nd: YGA laser focused with optical lens. The relationship between spectrum of laser - induced air p...
详细信息
In this paper, we first give a new set of design goals for anonymous two-factor authentication scheme. The new set is a refinement of some previously proposed requirement sets;it not only eliminates the redundancies, ...
详细信息
In this paper, we first give a new set of design goals for anonymous two-factor authentication scheme. The new set is a refinement of some previously proposed requirement sets;it not only eliminates the redundancies, conflicts and ambiguities of the old ones, but also provides more desired security properties. Then we demonstrate that both of Sun et al.'s scheme and Li et al.'s scheme fail to satisfy all the security goals we propose. Specifically, we point out that Sun et al.'s scheme still suffers from the smart card loss problem and fails to provide user untraceability. Li et al.'s scheme is vulnerable to desynchronization attack. In order to remedy these defects in their schemes, we propose a robust two-factor authentication and key agreement scheme with user privacy preservation achieving all the goals we present. Compared with the previous schemes, our scheme not only provides more security guarantees, but also is still efficient both in computation and communication cost.
In order to improve spectrum efficiency in Cognitive Radio Networks (CRNs), a standard distributed optimal power control strategy with high Signal to Interference Plus Noise Ratio (SINR) based on maximization of data ...
详细信息
Power control is one of key technologies for Cognitive Radio Networks (CRNs) since it can protect Primary Users (PUs) in the networks and guarantee Quality of Service (QoS) requirements for Second Users (SUs). In this...
详细信息
暂无评论