The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Power metering automation terminals communicate to main station by mobile cellular network. Hence the terminals occur communication and internal faults in normal case and part of faults have apparent statistical features in data flow term. Based on the power metering automation terminals' historical communication flows records, this dissertation studies on the method of preprocessing and multiply...
A novel analytical representation of polarimetric Stokes parameters' distributions and their lower-order statistics are derived via the joint Wishart distribution of the covariance matrix of the stochastic multi-look speckle fields by using the polarization basis transformation. The last three Stokes parameters are expressed as a universal form by three parameters of the number samples, the degree...
Stationary properties of node distribution and speed distribution for random direction model were studied. Firstly, geometric probability was applied to analyze stationary node distribution. A closed form probability density function for circular regions was obtained which indicated that mobile nodes tended to disperse with simulation advancing. Secondly, we applied palm calculus to calculate probability...
Concept of small-world is applied in the context of wireless multi-hop networks in this paper. We build a network model by selecting a small part of nodes and magnifying their communication distance. It is proved that this model behaves small-world character, mainly in average path length and clustering coefficient. Based on this model we put forward an uneven probabilistic flooding algorithm. Simulation...
In this paper, we firstly study the connectivity of ad hoc networks and establish the correlations of connectivity with average node degree. Then, based on the simulation result of connectivity, we present a probabilistic flooding algorithm that can tradeoff the efficiency and reliability by using weighting factor. Thus, we treat the well-known contradictions in our new algorithm. Our simulation results...
This paper is concerned with timing synchronization of high rates ultra-wideband (UWB) signals operating in a dense multipath environment, where access must tackle inter-frame interference (IFI), inter-symbol interference (ISI) and even multi-user interference (MUI). A training-based joint timing and channel estimation algorithm is proposed, which is resilient to IFI, ISI, MUI, and pulse distortion...
The genetic simulated annealing algorithm can get global solution with low computational load. By means of this algorithms optimization method, the support vector machines (SVM) radial basis probabilistic kernel parameters of the performance was found out. A special software was developed on this method, it can be used in different field and improved the application of SVM in industry area. Then,...
A method combining Bayesian statistical model with time slicing function is investigated to detect network anomaly. On the basis of analyzing Bayesian theory and rules of network traffic changing with time, the advantages of Bayesian theorem in solving uncertain problems were combined with the function whose network traffic changes with time. The purpose was to establish anomaly intrusion detection...
It is difficult to acquire the whole scene at the same time, when the size of a requiring scene is beyond the scope of a CCD camera. In this case, the requiring scene can be captured by several CCD cameras at one time, and the overlapped images can be acquired. Using the images, the whole scene is reproduced. This paper presents an approach of using multi-sensor and image mosaics technique to implement...
In this paper, a method combining Bayesian statistical model with function of time slicing is presented, which is used for network anomaly detection. By using Bayesian statistical model with time function, the method is intended to find and determine anomaly in the computer network. Combining the advantages of Bayesian theorem when solving uncertain problems with the function whose network traffic...
The Lempel-Ziv algorithm is not fully suitable for measuring the complexity of short series. When the Lempel-Ziv algorithm is applied, the assumption that the sequence must be long enough is always ignored: the series length is usually too large, and the equi-probability assumption also is not considered in some papers. Based on these facts, the universal algorithm of trial and error is presented...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.