In order to solve nonlinear and unstable problem in measurement, a fiber-optic temperature sensing film probe was designed. The material of the sensing film probe is germanium. The sensing probe is a double-layered fi...
详细信息
In order to solve nonlinear and unstable problem in measurement, a fiber-optic temperature sensing film probe was designed. The material of the sensing film probe is germanium. The sensing probe is a double-layered film structure, in which the low refractive index material is silicon dioxide and the high refractive index material is germanium. The detection principle is based on the changes of refractive index of germanium because of the temperature change, resulting in changes in the reflectivity. Practically, we can get the temperature figures by measuring the reflected power. The line linearization of the sensor, which was obtained over a temperature measurement range of 30°C-130°C is 99.85%. The results show that the conclusion can meet the purpose of linearization of fiber temperature sensor.
In order to improve the network spatial reuse and maximize the network throughput, this paper presents a physical conflict model based power allocation and link scheduling algorithm (PPLA). Firstly, PPLA picks availab...
详细信息
In order to improve the network spatial reuse and maximize the network throughput, this paper presents a physical conflict model based power allocation and link scheduling algorithm (PPLA). Firstly, PPLA picks available set of parallel links using hexagon coloring method. With physical conflict model, it further obtains the minimum power vector which corresponds to parallel links set. The experimental results indicate that the algorithm can increase network spatial reuse ratio and improve throughput significantly.
Peer-to-peer (P2P) on-demand streaming systems inevitably suffer from peers churn that is the inherent dynamic characteristic of overlay network. With frequent peer departure, a large amount of media data cached on pe...
详细信息
In this paper, we investigate on the optimal routing jointly scheduling, channel and power assignment in multi-power multi-radio WSNs. We first formulate the optimal routing as a linear programming problem, and then d...
详细信息
In this paper, we investigate on the optimal routing jointly scheduling, channel and power assignment in multi-power multi-radio WSNs. We first formulate the optimal routing as a linear programming problem, and then design a polynomial time heuristic algorithm. Experiments show that the proposed cross-layer routing significantly reduce the energy consumption and the end-to-end transmission delay.
A simulation system scenario design method was proposed for the space-based information simulation system supporting anti-earthquake rescue. This method is based on the conceptual models of the mission space method in...
详细信息
A simulation system scenario design method was proposed for the space-based information simulation system supporting anti-earthquake rescue. This method is based on the conceptual models of the mission space method including the formal description of simulation aim, scale, static data, dynamic data set and simulation play. A simulation scenario creator was developed to realize these functions and prove the usability of these models.
Content sharing is one of the most significant issues of Digital Rights Management (abbr. DRM). Various schemes for content sharing have been presented in the past years. However, the main goals of these schemes are t...
详细信息
Content sharing is one of the most significant issues of Digital Rights Management (abbr. DRM). Various schemes for content sharing have been presented in the past years. However, the main goals of these schemes are to solve portability problems instead of rational sharing between different users who are not family members. In this work, we propose an initial step toward this rational sharing and present a general sharing model based on proxy re-encryption. Our model can support the flexible sharing mechanism, with which the user can choose any of the purchased content to share with any legal device, and the content provider can know and limit the number of sharing devices to achieve some novel DRM policies such as pay-per-sharing. To our best knowledge, our sharing model is the first model for content sharing between different users' devices who are not family members using proxy re-encryption. With rational applications, our model can benefit for both the user and content provider to achieve win-win development.
In this paper,we consider skyline queries in a mobile and distributed environment,where data objects are distributed in some sites(database servers)which are interconnected through a high-speed wired network,and queri...
详细信息
In this paper,we consider skyline queries in a mobile and distributed environment,where data objects are distributed in some sites(database servers)which are interconnected through a high-speed wired network,and queries are issued by mobile units(laptop,cell phone,etc.)which access the data objects of database servers by wireless *** inherent properties of mobile computing environment such as mobility,limited wireless bandwidth,frequent disconnection,make skyline queries more *** show how to efficiently perform distributed skyline queries in a mobile environment and propose a skyline query processing approach,called efficient distributed skyline based on mobile computing(EDS-MC).In EDS-MC,a distributed skyline query is decomposed into five processing phases and each phase is elaborately designed in order to reduce the network communication,network delay and query response *** conduct extensive experiments in a simulated mobile database system,and the experimental results demonstrate the superiority of EDS-MC over other skyline query processing techniques on mobile computing.
This paper introduced the optimization and deoptimization technologies for Escape analysis in open world. These technologies are used in a novel Escape analysis framework that has been implemented in Open runtime plat...
详细信息
This paper introduced the optimization and deoptimization technologies for Escape analysis in open world. These technologies are used in a novel Escape analysis framework that has been implemented in Open runtime platform, Intel's opensource Java virtual machine. We introduced the optimization technologies for synchronization removal and object stack allocation, as well as the runtime deoptimization and compensation work. The deoptimization and compensation technologies are crucial for a practical Escape analysis in open world. We evaluated the runtime efficiency of the deoptimization and compensation work on benchmarks like SPECjbb2000 and SPECjvm98.
Surveillance is a vital problem for harbor protection, border control or the security of other commercial facilities. It is particularly challenging to protect the vast near-coast sea surface and busy harbor areas fro...
详细信息
Surveillance is a vital problem for harbor protection, border control or the security of other commercial facilities. It is particularly challenging to protect the vast near-coast sea surface and busy harbor areas from intrusions of unauthorized marine vessels, such as trespassing boats and ships. In this paper, we present an innovative solution for ship intrusion detection. Equipped with three-axis accelerometer sensors, we deploy an experimental wireless sensor network on the sea surface to detect ships. Using signal processing techniques and cooperative signal processing, we can detect the passing ships by distinguishing the ship-generated waves and the ocean waves. We design an intrusion detection system in which we propose to exploit spatial and temporal correlations of the intrusion to increase detection reliability. We conduct evaluations with real data collected by our initial experiments, and provide quantitative analysis on the detection system, such as the successful detection ratio and the estimation of the intruding ship velocity.
From field-scale measurements to global climate simulations and remote sensing, the growing body of very large and long time series Earth science data are increasingly difficult to analyze, visualize, and interpret. D...
详细信息
From field-scale measurements to global climate simulations and remote sensing, the growing body of very large and long time series Earth science data are increasingly difficult to analyze, visualize, and interpret. Data mining, information theoretic, and machine learning techniques—such as cluster analysis, singular value decomposition, block entropy, Fourier and wavelet analysis, phase-space reconstruction, and artificial neural networks—are being applied to problems of segmentation, feature extraction, change detection, model-data comparison, and model validation. The size and complexity of Earth science data exceed the limits of most analysis tools and the capacities of desktop computers. New scalable analysis and visualization tools, running on parallel cluster computers and supercomputers, are required to analyze data of this magnitude. This workshop will demonstrate how data mining techniques are applied in the Earth sciences and describe innovative computerscience methods that support analysis and discovery in the Earth sciences.
暂无评论