A new shape contour description method based on eight-direction chain code and Fast Fourier Transform (FFT) is proposed. Firstly, chain code tracks shape boundary sequentially, according to the relationship between co...
详细信息
Since Otsu algorithm does not take the image spatial neighbor information into consideration, we combine the Markov random field with Otsu algorithm to integrate gray level information and spatial correlation informat...
详细信息
Li and Zhou propose an important concept for Petri nets: elementary siphons. They partition siphons into elementary and dependent ones. The controllability of the latter can be ensured by the former's proper contr...
详细信息
The asymptotic signal bandwidth of various kinds of large-scale asynchronous Time Hopping Impulse Radio Ultra-Wide Band (TH-IR UWB) communication networks such that multiple access interference can be negligible with ...
详细信息
Wireless sensor network (WSN) is attracting intensive interests in many application areas. In some scenarios such as monitoring of the coal-mining area or remote area, nodes seldom move and may switch from sleeping to...
详细信息
Wireless sensor network (WSN) is attracting intensive interests in many application areas. In some scenarios such as monitoring of the coal-mining area or remote area, nodes seldom move and may switch from sleeping to waking mode to minimize power consumption. Energy conservation design for the network lifetime extension is the primary issue. By adopting sleep scheduling to keep low duty cycle can help reduce the energy consumption. Random sleep scheduling is a desirable mechanism for its simplicity and guaranteed stable low duty cycle. Moreover, the low duty cycle sleeping of nodes may destroy the connectivity of network. Most of existing WSN routing techniques are designed for fully connected networks assuming that the nodes of the routing path between source and destination are all available at the same time. Maintaining fully connected backbone involves high duty cycle and costly clock synchronization which consumes more energy. If certain delay is tolerant, partially connected routing can achieve successful packet forwarding in networks with the deficiency of connectivity. In this paper a new partially connected routing and simple random sleep scheduling scheme is proposed for WSN with low duty cycle. A continuous time Markov chains (CTMC) connectivity availability model is introduced to evaluate the end to end packet delivery ratio of multi-hop networks subjected to the impact of both frequent disconnection and random sleep latency. The proposed connectivity availability model can also be used as the key metric for route path selection to achieve stable and high performance. Deployment guidelines are given for WSN with random sleep scheduling policy satisfying reliability, timeliness and duty cycle requirements. By modeling and simulation, we find that as compared to the fully connected routing protocol, the partially connected routing design can achieve much higher packet delivery ratio and lower duty cycle within the tolerant delay. The computation and simul
The information technology has been recognized as one of the most important means to improve health care and curb its ever-increasing cost. However, existing efforts mainly focus on informatization of hospitals or med...
详细信息
In current social computingsystem, not only hardware but also software experiences a directly discarded mode. Such directly discarded mode may result in huge waste. The major challenge in green computing is the recyc...
详细信息
To tackle the key-exposure problem in signature settings,this paper introduces a new cryptographic primitive named threshold key-insulated signature(TKIS) and proposes a concrete TKIS *** a TKIS system,at least k out ...
详细信息
To tackle the key-exposure problem in signature settings,this paper introduces a new cryptographic primitive named threshold key-insulated signature(TKIS) and proposes a concrete TKIS *** a TKIS system,at least k out of n helpers are needed to update a user's temporary private *** the one hand,even if up to k 1 helpers are compromised in addition to the exposure of any of temporary private keys,security of the non-exposed periods is still *** the other hand,even if all the n helpers are compromised,we can still ensure the security of all periods as long as none of temporary private keys is *** with traditional key-insulated signature(KIS) schemes,the proposed TKIS scheme not only greatly enhances the security of the system,but also provides flexibility and efficiency.
This work presents a method to detect the size and location of tumor in soft tissues using ultrasound. Quantitative ultrasound is utilized to allow an ultrasound signal to be sent from a transmitter to multiple receiv...
详细信息
This paper proposes a novel adaptive interpolation filter (AIF) to reduce computational complexity and bit-rate of video coding. In the proposed AIF, the filter coefficients of B frames, which are predicted from those...
详细信息
暂无评论