We study the asymptotic throughput for a large-scale wireless ad hoc network consisting of n nodes under the generalized physical model. We directly compute the throughput of multicast sessions to unify the unicast an...
We study the asymptotic throughput for a large-scale wireless ad hoc network consisting of n nodes under the generalized physical model. We directly compute the throughput of multicast sessions to unify the unicast and broadcast throughputs. We design two multicast schemes based on the so-called ordinary arterial road system and parallel arterial road system, respectively. Correspondingly, we derive the achievable multicast throughput by taking account of all possible cases of n
s
= ω(1) and 1 ≤ n
d
≤ n − 1, rather than only the cases of
$$n_s=\Uptheta(n)$$
as in most related works, where n
s
and n
d
denote the number of sessions and the number of destinations of each session, respectively. Furthermore, we consider the network with a general node density
$$\lambda \in [1,n]$$
, while the models in most related works are either random dense network (RDN) or random extended network (REN) where the density is λ = n and λ = 1, respectively, which further enhances the generality of this work. Particularly, for the special case of our results by letting λ = 1 and
$$n_s=\Uptheta(n)$$
, we show that for some regimes of n
d
, the multicast throughputs achieved by our schemes are better than those derived by the well-known percolation-based schemes.
In computerscience, a computational challenge exists in finding a globally optimized solution from a tremendously large search space. Heuristic optimization methods have therefore been created that can search the ver...
详细信息
In computerscience, a computational challenge exists in finding a globally optimized solution from a tremendously large search space. Heuristic optimization methods have therefore been created that can search the very large spaces of candidate solutions. These methods have been extensively studied in the past, and progressively extended in order to suit a wide range of optimization problems. Researchers recently have invented a collection of heuristic optimization methods inspired by the movements of animals and insects (e.g., Firefly, Cuckoos, Bats and Accelerated PSO) with the advantages of efficient computation and easy implementation. This paper proposes a new bio-inspired heuristic optimization algorithm called the Wolf Search Algorithm (WSA) that imitates the way wolves search for food and survive by avoiding their enemies. The contribution of the paper is twofold: 1. for verifying the efficacy of the WSA the algorithm is tested quantitatively and compared to other heuristic algorithms under a range of popular non-convex functions used as performance test problems for optimization algorithms; 2. The WSA is investigated with respective to its memory requirement. Superior results are observed in most tests.
The research of metamaterial is one of most important global activity that promises to change the lives in many different ways. Flexibly controlling the properties of metamaterials by tunable designs makes metamateria...
详细信息
The research of metamaterial is one of most important global activity that promises to change the lives in many different ways. Flexibly controlling the properties of metamaterials by tunable designs makes metamaterials more colorful and thus enables a family of new electromagnetic devices. In this paper, the use of ferrites on design of tunable metamaterials has been reviewed. Owing to the novel properties of ferrites, including broadband negative permeability and tunability of permeability, a great many researchers have focused on investigating ferrites based metamaterials and the relevant applications. This paper reviews the design, theoretical analysis, numerical and experimental demonstrations, and the potential applications of the ferrite based metamaterials.
Photonic crystals realized in LiNbO3 have a great potential to reduce the size and increase the functionality of integrated optical devices. In order to accomplish these aims, fabrication know-how must be mastered yet...
详细信息
Advances in mobile networking and information processing technologies have triggered vehicular ad hoc networks (VANETs) for traffic safety and value-added applications. Most efforts have been made to address the secur...
详细信息
Productive information system has high-level security requirements, but Trusted computing Group's solution of trust chain isn't competent. After analysis and comparison of two different trust transfer ways, a ...
详细信息
We present a tunable triple-band μ-negative metamaterial composed of loop resonator and ferrite. The tunable triple-band-stop transmission spectrum of such metamaterial is investigated numerically by full wave simula...
We present a tunable triple-band μ-negative metamaterial composed of loop resonator and ferrite. The tunable triple-band-stop transmission spectrum of such metamaterial is investigated numerically by full wave simulations. Moreover, the corresponding effective parameters are retrieved to illustrate the tunable μ-negative characteristic.
In harsh operational conditions, machines lose components on a frequent basis, causing a significant footprint to the surrounding environment. This affects operational up-time, safety measures and cost effectiveness. ...
详细信息
In harsh operational conditions, machines lose components on a frequent basis, causing a significant footprint to the surrounding environment. This affects operational up-time, safety measures and cost effectiveness. This paper proposes the use of an integrated RFID-WSN architecture to reduce the footprint of mining equipment used in the Canadian Oil Sands industry. Sensors and RFID tags provide both identification and positioning data for detecting broken parts from Ground Engaging Tools (GETs), such as huge shovel teeth. A delay-tolerant delivery approach utilizes mobile couriers, placed on loading trucks available in the vicinity, to store and carry data from readers and relays to remote base-stations. Delivering data in such harsh mining environments poses several challenges including power scarcity, vast transmission distances and the lack of an accessible communication infrastructure. We provide a use case to demonstrate how this architecture successfully overcomes these challenges within the harsh industrial environment of the Oil Sands.
Biometrics is an effective technology for personnel identity recognition, but uni-modal biometric systems which use a single trait for recognition will suffer from problems like noisy sensor data, non-universality, la...
详细信息
ISBN:
(纸本)9781457720529
Biometrics is an effective technology for personnel identity recognition, but uni-modal biometric systems which use a single trait for recognition will suffer from problems like noisy sensor data, non-universality, lack of distinctiveness of the biometric trait, and spoof attacks. These problems can be tackled by using multi-biometrics in the system. Hand-based person recognition provides a reliable, low-cost and user-friendly viable solution for a range of access control applications. As one of the most popular biometric traits, fingerprints (FP) are widely used in personal recognition. However, a novel hand-based biometric feature, Finger-Knuckle-Print (FKP), has attracted an increasing amount of attention. In this paper, FP and FKP are integrated in order to construct an efficient multi-biometric recognition system based on matching score level and image level fusion. In this study we use the minimum average correlation energy (MACE) and Unconstrained MACE (UMACE) filters in conjunction with two correlation plane performance measures, max peak value and peak-to-sidelobe ratio, to determine the effectiveness of this method. The experimental results showed that the designed system achieves an excellent recognition rate on the Hong Kong polytechnic university (PolyU) FKP and high resolution fingerprint database.
Swarm intelligence is an umbrella for amount optimization algorithms. This discipline deals with natural and artificial systems composed of many individuals that coordinate their activities using decentralized control...
详细信息
暂无评论