The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Delay Tolerant Networks (DTNs) are featured by unpredictable mobility patterns and easily-interrupted connections. Forwarding strategy has always been the research focus, in order to improve the delivery ratio. An enormous amount of researches pay attention to solving the following two problems: whether to forward, and how to forward. Therefore, forwarding metrics and forwarding strategies both play...
BIT was first used in the field of aircraft and weapon equipment system in 1970s. It plays an import role in simplifying the maintenance process and reducing costs. But it has some problems with high fault alarm rate, which prevent its wider application, and the traditional method to recognize fault alarm cannot meet the requirement for modern equipment. The modern intelligent algorithm is widely...
Detecting an event of interest, e.g., damage in aerospace vehicles from the continuous arriving data in Internet of Things (IoT) is challenging due to the detection quality. Traditional data mining schemes are employed to reduce data that often use metrics, association rules, and binary values for frequent patterns as indicators for finding interesting knowledge. However, these may not be directly...
The topic-based mobile publish/subscribe (pub/sub) system has shown the potential applications in many scenarios, e.g., product coupon distribution. In this paper, we focus on the budget-constrained data dissemination services with a pre-determinated total amount of copy. A mobile user may subscribe data under different topics, but receiving a copy in any topic is enough. This is the mutually exclusive...
Currently, conventional indoor localization schemes mainly leverage WiFi-based or Bluetooth-based schemes to locate the users in the indoor environment. These schemes require to deploy the infrastructures such as the WiFi APs and Bluetooth beacons in advance to assist indoor localization. This property hinders the indoor localization schemes in that they are not scalable to any other situations without...
Most existing works on video transmission over wireless multi-hop networks only consider routing as a network layer problem and have been decoupled from application. Traditionally, the multi-path routing protocol selects paths with lower hop counts and discards routes with higher hop counts, which are application-agnostic. However, the paths with minimum hop counts are not always the least delay ones...
Current network protocols are exceedingly strict, making the administrative duties of network providers difficult. The switches that control a network rely on stringent definitions, usually defined by the company who designed the switch, with which they can forward packets. Software Defined Networking (SDN) is a concept which allows control over the operations of a switch via remote software applications...
Data collection in wireless networked sensing systems (WNSS) is usually not reliable due to sensor faults and/or security attacks. This makes detection of an event (e.g., structural damage) through data aggregation unreliable. In this paper, we propose a trustworthy and protected data collection (TPDC) framework for event detection in WNSS. This framework facilitates reliable data for aggregation...
Security protocols have been commonly used to protect secure communication in networked systems. It is often assumed that individual wireless nodes or leaders in a system are sincere and use techniques (authentication, permission, etc.) of these protocols to have secure communications. We discover that such protocols may be leaked by a sophisticated collusion attack (a type of attacks in which a node...
In this paper, the performance of network codingbased gossip algorithms -- i.e. algebraic gossip algorithms -- is analyzed on random geometric graphs under static and mobile environments. The lower bounds for the convergence time of algebraic gossip algorithms are derived based on the conductance, and these bounds are O(n log n log ε -- 1 -- log n log ε -- 1) with node...
Considering the heterogeneous subscriptions of the subscribers in the content-based publish/subscribe (pub/sub) system, the subscription aggregation technique is used to optimize the system performance, e.g., reducing the routing table, simplifying the matching procedure. However, introducing this technique also has disadvantages. If some subscribers leave the network, the brokers which aggregate...
Because the instrument response in highly deviated wells and horizontal wells is the three-dimensional numerical calculation, its environmental impact factors is very complicated. Firstly, this paper analyzes the influencing factors of induction logging responses in horizontal wells, covering the geological factors and instrumental observation factors. Secondly, a three-layer dual induction logging...
For the attitude control of unmanned aerial vehicle(UAV), this paper proposes a kind of adaptive sliding mode controller based on backstepping. Backstepping control has the characteristics of simpleness in designing and convenience in application. Adding the backstepping method in the sliding mode controller can avoid the appearance of the signal function, simplify the controller and maximize the...
MapReduce includes three phases of map, shuffle, and reduce. Since the map phase is CPU-intensive and the shuffle phase is I/O-intensive, these phases can be conducted in parallel. This paper studies a joint scheduling optimization of overlapping map and shuffle phases to minimize the average job makespan. Challenges come from the dependency relationship between map and shuffle phases, since the shuffle...
A dual-polarized horn antenna is proposed for K-band wireless communication in this paper. It has a common radiation aperture and two orthogonal wave ports. Hybrid feeding technology of waveguide and microstrip is adopted in the design. High isolation between the two ports can be achieved by adding the waveguide mode cut-off windows. The antenna is able to work well within the relative bandwidth of...
A robust approach to integrated guidance and control (IGC) involving a terminal angular constraint for hypersonic vehicles is proposed in this paper. A novel state-space model of a hypersonic vehicle that is suitable for bank-to-turn (BTT) technology is established by combining the line-of-sight (LOS) equations describing the relative motion between the vehicle and the target with the attitude motion...
The employed dictionary plays a vital role in sparse representation based classification (SRC). Dictionary learning (DL) for classification proposed in previous work learns a dictionary by utilizing the original training samples and has shown satisfying classification accuracy when performing image classification. This paper proposes a novel supervised dictionary learning framework for classification,...
With the advantages of vehicle networks, cloud computing, Vehicle Cloud Computing (VCC) has emerged, wins a lot of interests. In this paper, we propose an attack detection scheme in the VCC, that can detect the potential attacks launched by malicious vehicles, while preserving benign vehicles' privacy. First of all, we propose a distributed secret key distribution scheme, where multiple authorities...
Network coding is a technique which can be used in wired and wireless networks to increase the throughput of the networks and provide reliable transmissions. Also, it can be used in distributed storage systems to store large data on different storages and provide fault tolerance against storage failures. Using network coding, the set of packets that form a file can be encoded to an infinite number...
Recent advances in visual data acquisition and Internet technologies make it convenient and popular to collect and share videos. These activities, however, also raise the issue of privacy invasion. One potential privacy threat is the unauthorized capture and/or sharing of covert videos, which are recorded without the awareness of the subject(s) in the video. Automatic classification of such videos...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.