The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Smart systems such as smart grid, smart transportation, and smart city are typical applications supported by Internet-of-Things. Particularly, the smart grid is the integration of renewable energy resources, information and communication technologies into the electricity grid to achieve a reliable, cost efficient, sustainable, and environment-friendly power grid. To deal with uncertainties raised...
Phase images derived from imaging devices are usually wrapped into discontinuous images, so phase unwrapping is needed for phase image reconstruction. The wrap counts of every voxel are determined by the assumption that the true phase is spatially continuous. However, it is difficult to distinguish whether the phase jump is caused by phase wrap or noise. In this paper, a new 3D phase unwrapping method...
Although games is famous for its high interactivity, but in some special area of applications, such as educational games [1], the interactivity of games is still not enough. For example, the 3D objects in game scene cannot be cut off in real. This paper proposes a real-time 3D objects cutting technology in games, which can cut any arbitrary 3D objects at any angle into two parts. Applying with this...
Current DTN systems are vulnerable to malicious attacks by compromised nodes taking advantage of the DTN protocols that control how nodes join and leave the backbone. Without addressing such security issues, DTN systems could result in performance degrade, the compromise of message confidentiality and integrity, and denial of service. Thus, effective mechanisms to identify and fix this vulnerability...
Current DTN systems are vulnerable to malicious attacks by compromised nodes taking advantage of the DTN protocols that control how nodes join and leave the backbone. Without addressing such security issues, DTN systems could result in performance degrade, the compromise of message confidentiality and integrity, and denial of service. Thus, effective mechanisms to identify and fix this vulnerability...
Link prediction is to calculate the probability of a potential link between a pair of unlinked nodes in the future. It has significance value in both theoretical and practical. The similarity of two nodes in the networks is an essential factor to determine the probability of a potential link between them. One of the important methods with the similarity of two nodes is to consider common neighbors...
Group key is used to encrypt group data in group communication. Multicast key distribution scheme updates and distributes group keys safely when a member joins or leaves the group. However it has problems when arbitrary group members want to build a dynamic conference, because traditional distribution scheme uses group controller to manage the work. In fact, a n-member group will have 2n − n − 1 possible...
For deep space networks, the major challenge is that transmission power consumption is serious while the power resource is limited. In this paper, we proposed a Temporal Graph Model based Power Aware Routing algorithm using a weighted metric of remaining power level, data rate and distance of nodes for determining routes. The traditional standards and techniques of static networks is hard to solve...
The internet of things comes into our daily life. It connected lots of resource-constrained devices, denoted as smart device, in an Internet-like structure. Considering the computing burden, the CoAP protocol is developed for serving the resource-constrained device and maps to HTTP for integration with existing web. In this paper, an access-control protocol will be introduced. The protocol is designed...
In UWB-IR signal detection, the threshold of signal to noise ratio(SNR) limit the performance of FHN model detection method, from this point, wavelet packet is introduced into FHN model, a novel UWB-IR signal detection method based on wavelet packet and FHN model is proposed, in addition, the disadvantages of traditional single threshold wavelet packet is analyzed, combined with the new piecewise...
Location Based Service (LBS) is gaining popularity. As one fundamental LBS service, range search returns all Point of Interests (POIs) within a user-specified range. However, people also leave their location privacy at risks when using range search. How to provide a high-quality range search service while protecting users' location privacy is a challenging problem. Most existing approaches use space-filling...
In order to efficiently transfer data, rate control and route scheduling are critical in deep space scenarios. The major challenge is the long-haul and intermittent links, which easily leads to low link utilization. However, Traditional backpressure algorithms can not acquire accurate queue information and maintain long queues at each node. Therefore, we devise a system model for deep space networks,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.