

Email alert
Considering the dynamic resource allocation and energy management problem in the 5G Heterogeneous Cloud Radio Access Networks(H-CRANs) architecture for hybrid energy supply, a dynamic network resource allocation and energy management algorithm based ...
Lossless data compression system is prone to bit error and causes error spread during communication transmission, which affects its application to file system and wireless communication. For the lossless data compression algorithm Lempel-Ziv-Welch (L...
Due to the popularity of vehicle applications and the increase of the number of vehicles, the physical resources of roadside infrastructure are limited. When a large number of vehicles are connected to the vehicle networks, the energy consumption and...
Since real-time processing scenarios for ever-increasing amount and type of streaming data caused by the development of the Internet of Things (IoT) keep increasing, and strategies based on empirical knowledge for checkpoint configuration are deficie...
In virtualized network slicing scenario, one anomaly Physical Node (PN) or Physical Link (PL) in substrate networks will cause performance degradation of multiple network slices. For new measurements are achieved in each period, two online anomaly de...
In order to meet the demand of the substantial increase of wireless data traffic, the resource optimization of the Heterogeneous Cloud Radio Access Network (H-CRAN) is still an important problem that needs to be solved urgently. In this paper, under ...
Considering the problems of low resource utilization and poor reliability of traditional network slice embedding, a Reliability-aware Network Slice (NS) Reconfiguration and Embedding (RNSRE) strategy is proposed. Firstly, a utility function of reliab...
Pedestrian detector performance is damaged because occlusion often leads to missed detection. In order to improve the detector's ability to detect pedestrian, a single-stage detector based on feature-guided attention mechanism is proposed. Firstly, a...
Hilbert curve is an important method for high-dimensional reduction to one-dimensional. It has good characteristics of spatial aggregation and spatial continuity and is widely used in geographic information system, spatial databases and information r...
With an increasing diversity in modern architectural design, the inner structure of buildings is much more complex than before, which makes the traditional fire emergency escape indication system fail to provide people with real-time instructions bec...
Source node location protection is critical to the Marine Wireless Sensor Networks (MWSNs), especially for unattended environment. However, due to most of the static deployment and the limitations in energy, storage and communication capabilities of ...
The lightweight block cipher algorithm PUFFIN based on substitution-permutation network structure is widely used in resource-constrained hardware environments. Differential fault attack is a more effective attack method for hardware cryptographic alg...
In order to increase the classification speed of Aggregated Bit Vector (ABV) algorithm, an Improved Aggregated Bit Vector (IABV) algorithm is proposed, which is connection-oriented. Based on the characteristic that the packets which belong to the sam...
In the view of the integrity verification problem of data sharing on the cloud platform, a Shared Data auditing scheme for efficient Revocation of group Members via multi-participation (SDRM) is proposed. First, through the Shamir secret sharing meth...
Parameter estimation is essential for SAR imaging of moving targets. The existing algorithms mainly estimate the radial velocity and azimuth velocity of the moving target, but the normal velocity of the three-dimensional moving target can not be esti...
A simulation model of total power microwave radiometer is developed for the microwave humidity and temperature sounder onboard the FY-3 satellite. The key components such as mixer, low noise amplifier, local oscillator, filter and detector are parame...