The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A method of classifying the P2P traffic based on the Probabilistic Neural Network is proposed. Firstly, we utilize "WinPcap" to capture the network packets and then the core characteristics of the obtained data are analyzed with the help of the tool. Based on the above work, the P2P traffic classification system was realized. It makes full use of the advantage of the PNN which has a high...
Secret sharing is important in information and network security and has broad applications in the real world. Since an elegant secret sharing mechanism was first proposed by Shamir in 1979, many schemes have appeared in literature. These schemes deal with either single or multiple secrets and their shares have either the same weight or different weights. Weighted shares mean that different shares...
In multiple access channels, when users know each other channels, precoders can be designed utilizing channel information to cancel the interference at the receiver without sacrificing the diversity or the complexity of the system. In a recent work, it was shown that when there are only two users, a receiver can completely cancel the interference and provide full diversity for each user. Unfortunately,...
A large number of real-time data and fault history data of turbine could be got through DCS, but the ability of data processing is lagging, a new method of fault diagnosis based on supervision of data-driven for turbine is introduced which is.The method of classification replace given data with points, using the weighted distance in place of Euclidean distance, establishing the iterative algorithm...
MIMO multi-hop channel plays an important role in wireless ad hoc networks. In this paper, we investigate the resource allocation optimization problem in order to achieve throughput maximization with given resource constraints. We propose algorithms with low complexity to achieve maximum capacity. The main idea is to determine the rank of the optimal transmit covariance matrix and the optimal power...
Flexibility has been recognized as a desirable quality of software since the earliest days of software engineering. But no metrics for quantifying it are known to us. We bring forward a user-oriented model to measure the flexibility of software. User-oriented flexible point is the basic element in this model. Other elements are the manipulative complexity, flexible distance and flexible degree, which...
Recently, opportunistic routing (OR) has been widely used to compensate for the low packet delivery ratio of multi-hop wireless networks. Previous works either provide heuristic solutions without optimality analysis, or assume that unlimited retransmission is available for delivering a data packet. In this paper, we apply OR to a utility-based routing where the successful delivery of a data packet...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.