This paper sums up four security factors after analyzing co-residency threats caused by the special multitenant environment in the *** secure the factors,a multiway dynamic trust chain transfer model was proposed on t...
详细信息
This paper sums up four security factors after analyzing co-residency threats caused by the special multitenant environment in the *** secure the factors,a multiway dynamic trust chain transfer model was proposed on the basis of a measurement interactive virtual machine and current behavior to protect the integrity of the system.A trust chain construction module is designed in a virtual machine *** dynamic monitoring,it achieves the purpose of transferring integrity between virtual machine.A cloud system with a trust authentication function is implemented on the basis of the model,and its practicability is shown.
The IEEE 802.15.4 standard does not allow to make dynamic adjustments to the inactive portion of the superframe, thus affecting the duty cycles of the coordinator and all the devices attached to it. Prior works in thi...
详细信息
The IEEE 802.15.4 standard does not allow to make dynamic adjustments to the inactive portion of the superframe, thus affecting the duty cycles of the coordinator and all the devices attached to it. Prior works in this direction are either based on superframe occupation ratio or buffer occupancy/queue length of the transmitting nodes. In this paper, we present the respective limitations of both these schemes that lead to sub-optimal MAC parameter (BO and SO) settings and later propose a dynamic duty cycling mechanism based on MAC parameters (macMinBE, macMaxCSMABackoffs and macMaxFrameRetries). A Markov model is developed for IEEE 802.15.4 CSMA-CA that is used to analytically estimate the delay and energy consumption during transmission of frames using the MAC parameters.
Duty-cycling schemes allow devices to dynamically adjust their active period to conserve energy. On the other hand, synchronization schemes allow multiple coordinators to schedule their transmissions in order to preve...
详细信息
Duty-cycling schemes allow devices to dynamically adjust their active period to conserve energy. On the other hand, synchronization schemes allow multiple coordinators to schedule their transmissions in order to prevent the overlapping of superframe schedules. In this paper, we analyze the impact of a synchronization mechanism on duty-cycling schemes in an IEEE 802.15.4 cluster tree network. We show the necessity of an operational synchronization mechanism when devices adopt an independent duty-cycling approach so that the later accounts to effective energy savings.
Atmospheric turbulence(AT) induced crosstalk can significantly impair the performance of a free-space optical(FSO)communication link using orbital angular momentum(OAM) *** this paper,we propose a multiple-user ...
详细信息
Atmospheric turbulence(AT) induced crosstalk can significantly impair the performance of a free-space optical(FSO)communication link using orbital angular momentum(OAM) *** this paper,we propose a multiple-user detection(MUD) turbulence mitigation scheme in an OAM-multiplexed FSO communication ***,we present a MUD equivalent communication model for an OAM-multiplexed FSO communication link under *** the equivalent model,each input bit stream represents one user's *** deformed OAM spatial modes caused by AT,instead of the pure OAM spatial modes,are used as information carriers,and the overlapping between the deformed OAM spatial modes are computed as the correlation coefficients between the ***,we present a turbulence mitigation scheme based on MUD idea to enhance AT tolerance of the OAM-multiplexed FSO communication *** the proposed scheme,the crosstalk caused by AT is used as a useful component to deduce users' *** numerical results show that the performance of the OAM-multiplexed communication link has greatly improved by the proposed *** the turbulence strength C_n^2 is 1 × 10^(-15) m^(-2/3),the transmission distance is 1000 m and the channel signal-to-noise ratio(SNR)is 26 dB,the bit-error-rate(BER) performance of four spatial multiplexed OAM modes l_m = + 1,+2,+3,+4 are all close to 10-5,and there is a 2-3 fold increase in the BER performance in comparison with those results without the proposed *** addition,the proposed scheme is more effective for an OAM-multiplexed FSO communication link with a larger OAM mode topological charge *** proposed scheme is a promising direction for compensating the interference caused by AT in the OAM-multiplexed FSO communication link.
In this paper, the transmission of confidential messages through single-input multiple-output (SIMO) independent and identically generalized-K (KG) fading channels is considered, where the eavesdropper overhears the t...
详细信息
Sparse representation based anomaly detection algorithms have received a widely interest in recent ***,most of the existing approaches fail to pay attention to the manifold structure of the video data,which has been p...
详细信息
ISBN:
(纸本)9781509001668
Sparse representation based anomaly detection algorithms have received a widely interest in recent ***,most of the existing approaches fail to pay attention to the manifold structure of the video data,which has been pointed to be important for data *** overcome this limitation,we develop a new sparse coding algorithm named constrained sparse representation(CSR) for video anomaly detection,which explicitly takes the manifold structure of data into *** assumes that each sample's sparse coding coefficient can be linearly reconstructed by the coding coefficients of its ***,CSR algorithm can obtain relatively smoothly sparse representations along the manifold of *** apply the proposed CSR model to video abnormal event detection task and conduct extensive experiments on the UMN *** experimental results demonstrate that our proposed CSR model performed better than some related algorithms.
With the rapid development of computer network, multimedia technology has gradually spread throughout all aspects of people's life. This article, based on the concept and characteristics of multimedia, expounds th...
With the rapid development of computer network, multimedia technology has gradually spread throughout all aspects of people's life. This article, based on the concept and characteristics of multimedia, expounds the application of multimedia technology and the trend of future development. It makes a heavy analysis of multimedia teaching and analyses the meaning and advantage of multimedia teaching.
The incidence of cutaneous malignant melanoma, a disease of worldwide distribution and is the deadliest form of skin cancer, has been rapidly increasing over the last few decades. Because advanced cutaneous melanoma i...
详细信息
For robust face recognition tasks, we particularly focus on the ubiquitous scenarios where both training and testing images are corrupted due to occlusions. Previous low-rank based methods stacked each error image int...
详细信息
For robust face recognition tasks, we particularly focus on the ubiquitous scenarios where both training and testing images are corrupted due to occlusions. Previous low-rank based methods stacked each error image into a vector and then used L 1 or L 2 norm to measure the error matrix. However, in the stacking step, the structure information of the error image can be lost. Depart from the previous methods, in this paper, we propose a novel method by exploiting the low-rankness of both the data representation and each occlusion-induced error image simultaneously, by which the global structure of data together with the error images can be well captured. In order to learn more discriminative low-rank representations, we formulate our objective such that the learned representations are optimal for classification with the available supervised information and close to an ideal-code regularization term. With strong structure information preserving and discrimination capabilities, the learned robust and discriminative low-rank representation (RDLRR) works very well on face recognition problems, especially with face images corrupted by continuous occlusions. Together with a simple linear classifier, the proposed approach is shown to outperform several other state-of-the-art face recognition methods on databases with a variety of face variations.
To protect information or messages transmitted between any two adjacent sensor nodes from variety of malicious attacks, a CK secure authentication and key exchange protocol for Wireless Sensor Networks is proposed. Se...
详细信息
暂无评论