The current situation,information technology and problems of logistics for agricultural products were summarized.Some key technologies involved in mobilebased logistics information system for Hainan agricultural produ...The current situation,information technology and problems of logistics for agricultural products were summarized.Some key technologies involved in mobilebased logistics information system for Hainan agricultural products were analyzed,such as information classification and retrieval,user information authentication via QR code,and logistics information services based on WEB and mobile devices.Emphasis was given to study the design idea,content,method for the system.展开更多
Experiments of dense-phase pneumatic conveying of pulverized coal using nitrogen are carded out in an experimental test facility with the conveying pressure up to 4. 0 MPa and the gas-solid ratio up to 450 kg/m^3. The...Experiments of dense-phase pneumatic conveying of pulverized coal using nitrogen are carded out in an experimental test facility with the conveying pressure up to 4. 0 MPa and the gas-solid ratio up to 450 kg/m^3. The influences of different conveying differential pressures, coal moisture contents, gas volume flow rates and superficial velocities on the solid-gas ratios are investigated. Shannon entropy analysis of pressure fluctuation time series is developed to reveal the flow characteristics. Through investigation of the distribution of the Shannon entropy under different conditions, the flow stability and the evolutional tendency of the Shannon entropy in different regimes and regime transition processes are discovered, and the relationship between the Shannon entropy and the flow regimes is also established. The results indicate that the solid-gas ratio and the Shannon entropy rise with the increase in conveying differential pressure. The solid-gas ratio and the Shannon entropy reveal preferable regularity with gas volume flow rates. The Shannon entropy is different for different flow regimes, and can be used to identify the flow regimes. Both mass flow rate and the Shannon entropy decrease with the increase in moisture contents. The Shannon entropy analysis is a feasible approach for researching the characteristics of flow regimes, flow stability and flow regime transitions in dense-phase pneumatic conveying under high pressure.展开更多
A method of space-time block coding (STBC) system based on adaptive beamforming of cyclostationarity signal algorithm is proposed.The method uses cyclostationarity of signals to achieve adaptive beamforming,then con...A method of space-time block coding (STBC) system based on adaptive beamforming of cyclostationarity signal algorithm is proposed.The method uses cyclostationarity of signals to achieve adaptive beamforming,then constructs a pair of low correlated transmit beams based on beamform estimation of multiple component signals of uplink.Using these two selected transmit beams,signals encoded by STBC are transmitted to achieve diversity gain and beamforming gain at the same time,and increase the signal to noise ratio (SNR) of downlink.With simple computation and fast convergence performance,the proposed scheme is applicable for time division multiple access (TDMA) wireless communication operated in a complex interference environment.Simulation results show that the proposed scheme has better performance than conventional STBC,and can obtain a gain of about 5 dB when the bit error ratio (BER) is 10-4.展开更多
A new mobile multicast scheme called mobility prediction based mobile multicast(MPBMM) was proposed. In MPBMM, when a mobile node (MN) roams among subnets during a multicast session, MN predicts the next subnet, to wh...A new mobile multicast scheme called mobility prediction based mobile multicast(MPBMM) was proposed. In MPBMM, when a mobile node (MN) roams among subnets during a multicast session, MN predicts the next subnet, to which MN will attach, by the information of its position and mobility speed, consequently speeds up the handoff procedure. Simulation results show that the proposed scheme can minimize the loss of multicast packets, reduce the delay of subnet handoff, decrease the frequency of multicast tree reconfiguration, and optimize the delivery path of multicast packets. When MN moves among subnets at different speeds (from 5 to 25 ms), the maximum loss ratio of multicast packets is less than0.2%, the maximum inter-arrival time of multicast packets is 117 ms, so the proposed scheme can meet the QoS requirements of real-time services. In addition, MPBMM can support the mobility of multicast source.展开更多
In this paper, a robust THP is proposed for broadcast channel in multi-user multi-input multi-output (MU-MIMO) system, in which the channel uncertainty caused by feedback delay and mobile speed is taken into account. ...In this paper, a robust THP is proposed for broadcast channel in multi-user multi-input multi-output (MU-MIMO) system, in which the channel uncertainty caused by feedback delay and mobile speed is taken into account. In order to acquire the imperfect channel state information at transmitter (CSIT), a dynamic CSIT model is introduced where the channel temporal and spatial correlations are considered. By utilizing the unchanged channel statistics and accurate outdated feedback channel information jointly, the imperfect CSIT is obtained as the channel estimate and error covariance. Based on the obtained imperfect CSIT, a Minimum Mean-Square Error (MMSE) Tomlinsion-Harashima precoding (THP) is designed and the closed-form solution is derived by the Lagrangian multiplier approach under total power constraint. Simulation results are provided to indicate the preferable performances of the robust THP. Performance analysis with respect to feedback delay and mobile speed is also given.展开更多
Currently cellular networks do not have sufficient capacity to accommodate the exponential growth of mobile data requirements.Data can be delivered between mobile terminals through peer-to-peer WiFi communications(e.g...Currently cellular networks do not have sufficient capacity to accommodate the exponential growth of mobile data requirements.Data can be delivered between mobile terminals through peer-to-peer WiFi communications(e.g.WiFi direct),but contacts between mobile terminals are frequently disrupted because of the user mobility.In this paper,we propose a Subscribe-and-Send architecture and an opportunistic forwarding protocol for it called HPRO.Under Subscribe-and-Send,a user subscribes contents on the Content Service Provider(CSP) but does not download the subscribed contents.Some users who have these contents deliver them to the subscribers through WiFi opportunistic peer-to-peer communications.Numerical simulations provide a robust evaluation of the forwarding performance and the traffic offloading performance of Subscribe-and-Send and HPRO.展开更多
In secure multicast, one of the challenging problems is the authentication of multicast packets. This paper presents a novel scheme to address this problem, which combines ideas in both the hash tree schemes and the h...In secure multicast, one of the challenging problems is the authentication of multicast packets. This paper presents a novel scheme to address this problem, which combines ideas in both the hash tree schemes and the hash chain schemes. In this scheme, a group of packets is partitioned into equal-sized subgroups. Then a Merkle hash tree is built for each subgroup of packets, and the hash value of every root is appended to preceding packets to form hash chains. Its performance is analyzed and simulated using Biased Coin Toss loss model and 2-state Markov Chain loss model, respectively. Compared with the original hash chain schemes, results show that this scheme is much more efficient in term of communication overhead.展开更多
The sender shares six-particle maximally entangled states as quantum channel with the receiver. If the quantum channel is secure, the sender performs projective measurements and tells the measurement outcome to the re...The sender shares six-particle maximally entangled states as quantum channel with the receiver. If the quantum channel is secure, the sender performs projective measurements and tells the measurement outcome to the receiver. The receiver performs the unitary transformations and makes projective measurements on his particles to obtain the secret information. Using teleportation, the transmission of three-qubit secret information can be completed in each quantum channel展开更多
The detection performance is evaluated for our proposed analog multiuser receiver in Ultra-WideBand (UWB) transmitted-reference system. In the presence of dense multipath and multi-access signals,the performance analy...The detection performance is evaluated for our proposed analog multiuser receiver in Ultra-WideBand (UWB) transmitted-reference system. In the presence of dense multipath and multi-access signals,the performance analysis is difficult due to the complicated waveform of received impulse. We develop an approach to analyze the steady-state Signal-to-Interference-plus-Noise (SINR) of the detector output. The multipath-spread impulse is fitted to an exponentially decaying profile in the analysis. A closed-form expression of steady-state SINR is further deduced for the proposed Least Minimum Square (LMS) detector. The analysis is validated by simulations in Line-Of-Sight (LOS) and Non-Line-Of-Sight (NLOS) channel respectively. Based on the theoretical results,the multipath delay spread is employed to determine the optimal width of the integration window of the detector.展开更多
We propose a deterministic quantum secure direct two check photon sequences are used to check the securities of the communication protocol by using dense coding. The channels between the message sender and the receive...We propose a deterministic quantum secure direct two check photon sequences are used to check the securities of the communication protocol by using dense coding. The channels between the message sender and the receiver. The continuous variable operations instead of the usual discrete unitary operations are performed on the travel photons so that the security of the present protocol can be enhanced. Therefore some specific attacks such as denial-of-service attack, intercept-measure-resend attack and invisible photon attack can be prevented in ideal quantum channel. In addition, the scheme is still secure in noise channel. Furthurmore, this protocol has the advantage of high capacity and can be realized in the experiment.展开更多
As the major problem in multicast security, the group key management has been the focus of research But few results are satisfactory. In this paper, the problems of group key management and access control for large dy...As the major problem in multicast security, the group key management has been the focus of research But few results are satisfactory. In this paper, the problems of group key management and access control for large dynamic multicast group have been researched and a solution based on SubGroup Secure Controllers (SGSCs) is presented, which solves many problems in IOLUS system and WGL scheme.展开更多
This paper proposes a joint network-channel codingbased on turbo codes for user cooperation. The scenario under consideration is one in which two "partners"--UE1 and UE2---cooperate in transmitting information to th...This paper proposes a joint network-channel codingbased on turbo codes for user cooperation. The scenario under consideration is one in which two "partners"--UE1 and UE2---cooperate in transmitting information to the base station (BS). Each partner transmits both locally generated information and the relayed information that originated at the other partner. The local information and relayed information are jointly network-channel coded to form a superimposed codeword, and the adjacent codewords transmitted in turn by the two partners are tightly correlative like a chain. It is shown via simulation that the proposed scheme achieves full diversity gain compared with the other user cooperation schemes, including those based on coded cooperation and distributed space-time coded cooperation.展开更多
The paper study communication protocol, the structure of the circuit, antenna design of radio frequency identification technology (RFID), and puts forward a scheme based on IOT application: RFID logistics tracking ...The paper study communication protocol, the structure of the circuit, antenna design of radio frequency identification technology (RFID), and puts forward a scheme based on IOT application: RFID logistics tracking system. Finally, the paper study the logistics distribution center information management model from three aspects of the system design objectives, system function analysis and system architecture design based on RFID.展开更多
Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, ...Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, it is necessary to verify data integrity to properly respond to an adversary's ill-intentioned data modification. In sensor network environment, the data integrity verification method verifies the final data only, requesting multiple communications. An energy-efficient private information retrieval(PIR)-based data integrity verification method is proposed. Because the proposed method verifies the integrity of data between parent and child nodes, it is more efficient than the existing method which verifies data integrity after receiving data from the entire network or in a cluster. Since the number of messages for verification is reduced, in addition, energy could be used more efficiently. Lastly, the excellence of the proposed method is verified through performance evaluation.展开更多
To develop a measurement system for monitoring partial discharge (PD) without the effect of external interferences,an algorithm of PD signal extraction based on wavelet transform with Teager's energy operators was ...To develop a measurement system for monitoring partial discharge (PD) without the effect of external interferences,an algorithm of PD signal extraction based on wavelet transform with Teager's energy operators was presented. Acoustic signal generated by PD was selected to remove excessive interfering signals and electromagnetic interferences. Acoustic signals were collected and decomposed into I0 levels by wavelet transform into approximation and detail components. “Daubechies 25” was proved to be the most suitable mother wavelet for the extraction of PD acoustic signals. Compared with conventional wavelet denoising method, Teager's energy operators were adopted to the PD signal reconstruction and the signal to noise ratio was in creased by 20%-25% inthe experiment,without lost in energy and pulse amplitude.展开更多
In this paper,the sharing schemes of multicast in survivable Wavelength-Division Multi-plexed(WDM) networks are studied and the concept of Shared Risk Link Group(SRLG) is considered.While the network resources are sha...In this paper,the sharing schemes of multicast in survivable Wavelength-Division Multi-plexed(WDM) networks are studied and the concept of Shared Risk Link Group(SRLG) is considered.While the network resources are shared by the backup paths,the sharing way is possible to make the backup paths selfish.This selfishness leads the redundant hops of the backup route and a large number of primary lightpaths to share one backup link.The sharing schemes,especially,the self-sharing and cross-sharing,are investigated to avoid the selfishness when computing the backup light-tree.In order to decrease the selfishness of the backup paths,it is important to make the sharing links fair to be used.There is a trade-off between the self-sharing and cross-sharing,which is adjusted through simulation to adapt the sharing degree of each sharing scheme and save the network resources.展开更多
To provide scalable and simple Quality of Service(QoS) mechanism for multicast services, Probe-Based Multicast Admission Control (PBMAC) scheme was proposed. In this paper, PBMAC is studicd and a so-called subsequ...To provide scalable and simple Quality of Service(QoS) mechanism for multicast services, Probe-Based Multicast Admission Control (PBMAC) scheme was proposed. In this paper, PBMAC is studicd and a so-called subsequent request problem is found in PBMAC, which degrades system performance significantly when the network traffic is heavily loaded. Based on the analysis on subsequent request problem, an Enhance PBMAC (EPBMAC) scheme is proposed, in which complementary probing is devised to solve the problem. Using a new metric of normalized requested equivalent link capacity, the pertbrmance of PBMAC and EPBMAC is analyzed and evaluated. Two implementations are proposed for incremental dcployment. The paper finally introduces evaluation with packet-based simulations. Both analytical and simulation results show the significant improvement in performance.展开更多
Intelligent Transportation System (ITS) integrates information and communication technologies with location based technologies into roads, vehicles, traffic and transport management systems. Application of ITS can i...Intelligent Transportation System (ITS) integrates information and communication technologies with location based technologies into roads, vehicles, traffic and transport management systems. Application of ITS can improve situation in major cities where due to the increasing number of residents and level of motorization traffic congestion represents important issue. Another problem arises from this facts and that is that cities have contradictory needs as grooving need for goods within urban areas as well as need for less vehicles in the same area. The urban logistics activities by private companies within urban areas represent an integral part of city logistics that aims to improve the efficiency of urban freight transportation, reduce traffic congestion, mitigate environmental impacts, reduce costs and fuel consumption. This research presents application of ITS technologies and vehicle routing problem for night delivery scheme planning as one of the core techniques for modelling city logistics.展开更多
基金Supported by the Key Science and Technology Planning Project of Hainan Province(ZDXM2014082)the China Spark Program(2012GA8000022)the Natural Science Foundation of Hainan Province(613172)~~
文摘The current situation,information technology and problems of logistics for agricultural products were summarized.Some key technologies involved in mobilebased logistics information system for Hainan agricultural products were analyzed,such as information classification and retrieval,user information authentication via QR code,and logistics information services based on WEB and mobile devices.Emphasis was given to study the design idea,content,method for the system.
基金The National Basic Research Program of China(973 Program) (No2004CB217702-01)the Foundation of ExcellentPhDThesis of Southeast University
文摘Experiments of dense-phase pneumatic conveying of pulverized coal using nitrogen are carded out in an experimental test facility with the conveying pressure up to 4. 0 MPa and the gas-solid ratio up to 450 kg/m^3. The influences of different conveying differential pressures, coal moisture contents, gas volume flow rates and superficial velocities on the solid-gas ratios are investigated. Shannon entropy analysis of pressure fluctuation time series is developed to reveal the flow characteristics. Through investigation of the distribution of the Shannon entropy under different conditions, the flow stability and the evolutional tendency of the Shannon entropy in different regimes and regime transition processes are discovered, and the relationship between the Shannon entropy and the flow regimes is also established. The results indicate that the solid-gas ratio and the Shannon entropy rise with the increase in conveying differential pressure. The solid-gas ratio and the Shannon entropy reveal preferable regularity with gas volume flow rates. The Shannon entropy is different for different flow regimes, and can be used to identify the flow regimes. Both mass flow rate and the Shannon entropy decrease with the increase in moisture contents. The Shannon entropy analysis is a feasible approach for researching the characteristics of flow regimes, flow stability and flow regime transitions in dense-phase pneumatic conveying under high pressure.
文摘A method of space-time block coding (STBC) system based on adaptive beamforming of cyclostationarity signal algorithm is proposed.The method uses cyclostationarity of signals to achieve adaptive beamforming,then constructs a pair of low correlated transmit beams based on beamform estimation of multiple component signals of uplink.Using these two selected transmit beams,signals encoded by STBC are transmitted to achieve diversity gain and beamforming gain at the same time,and increase the signal to noise ratio (SNR) of downlink.With simple computation and fast convergence performance,the proposed scheme is applicable for time division multiple access (TDMA) wireless communication operated in a complex interference environment.Simulation results show that the proposed scheme has better performance than conventional STBC,and can obtain a gain of about 5 dB when the bit error ratio (BER) is 10-4.
基金Project (60573127) supported by the National Natural Science Foundation of ChinaProject (20040533036) supported by the Specialized Research Fund for the Doctoral Program of Higher Education of China+1 种基金Project (05JJ40131) supported by the Natural Science Foundation of Hunan Province, ChinaProject(03C326) supported by the Natural Science Foundation of Education Department of Hunan Province, China
文摘A new mobile multicast scheme called mobility prediction based mobile multicast(MPBMM) was proposed. In MPBMM, when a mobile node (MN) roams among subnets during a multicast session, MN predicts the next subnet, to which MN will attach, by the information of its position and mobility speed, consequently speeds up the handoff procedure. Simulation results show that the proposed scheme can minimize the loss of multicast packets, reduce the delay of subnet handoff, decrease the frequency of multicast tree reconfiguration, and optimize the delivery path of multicast packets. When MN moves among subnets at different speeds (from 5 to 25 ms), the maximum loss ratio of multicast packets is less than0.2%, the maximum inter-arrival time of multicast packets is 117 ms, so the proposed scheme can meet the QoS requirements of real-time services. In addition, MPBMM can support the mobility of multicast source.
基金supported by National Basic Research Program of China (973 Program) (Grant No. 2007CB310604, 2009CB320401)National Natural Science Foundation of China (Grant No. 60772108, 60702048)
文摘In this paper, a robust THP is proposed for broadcast channel in multi-user multi-input multi-output (MU-MIMO) system, in which the channel uncertainty caused by feedback delay and mobile speed is taken into account. In order to acquire the imperfect channel state information at transmitter (CSIT), a dynamic CSIT model is introduced where the channel temporal and spatial correlations are considered. By utilizing the unchanged channel statistics and accurate outdated feedback channel information jointly, the imperfect CSIT is obtained as the channel estimate and error covariance. Based on the obtained imperfect CSIT, a Minimum Mean-Square Error (MMSE) Tomlinsion-Harashima precoding (THP) is designed and the closed-form solution is derived by the Lagrangian multiplier approach under total power constraint. Simulation results are provided to indicate the preferable performances of the robust THP. Performance analysis with respect to feedback delay and mobile speed is also given.
基金supported by the National Natural Science Foundation of China under Grants No. 61100208,No. 61100205the Natural Science Foundation of Jiangsu Province under Grant No. BK2011169+1 种基金the Foundation of Beijing University of Posts and Telecommunications under Grant No. 2013RC0309supported by the EU FP7 Project REC-OGNITION:Relevance and Cognition for SelfAwareness in a Content-Centric Internet
文摘Currently cellular networks do not have sufficient capacity to accommodate the exponential growth of mobile data requirements.Data can be delivered between mobile terminals through peer-to-peer WiFi communications(e.g.WiFi direct),but contacts between mobile terminals are frequently disrupted because of the user mobility.In this paper,we propose a Subscribe-and-Send architecture and an opportunistic forwarding protocol for it called HPRO.Under Subscribe-and-Send,a user subscribes contents on the Content Service Provider(CSP) but does not download the subscribed contents.Some users who have these contents deliver them to the subscribers through WiFi opportunistic peer-to-peer communications.Numerical simulations provide a robust evaluation of the forwarding performance and the traffic offloading performance of Subscribe-and-Send and HPRO.
基金Supported by the Natural Science Foundation of China (No. 60173066)
文摘In secure multicast, one of the challenging problems is the authentication of multicast packets. This paper presents a novel scheme to address this problem, which combines ideas in both the hash tree schemes and the hash chain schemes. In this scheme, a group of packets is partitioned into equal-sized subgroups. Then a Merkle hash tree is built for each subgroup of packets, and the hash value of every root is appended to preceding packets to form hash chains. Its performance is analyzed and simulated using Biased Coin Toss loss model and 2-state Markov Chain loss model, respectively. Compared with the original hash chain schemes, results show that this scheme is much more efficient in term of communication overhead.
基金supported by the National Natural Science Foundation of China under Grant No.10704011the Research Programs of the Educational Office of Liaoning Province under Grant No.2008006
文摘The sender shares six-particle maximally entangled states as quantum channel with the receiver. If the quantum channel is secure, the sender performs projective measurements and tells the measurement outcome to the receiver. The receiver performs the unitary transformations and makes projective measurements on his particles to obtain the secret information. Using teleportation, the transmission of three-qubit secret information can be completed in each quantum channel
基金Supported by the Guangxi Natural Science Foundation (No.0731025, No.0731026)the Established Project by Guangxi Education Department (No.200808LX117)
文摘The detection performance is evaluated for our proposed analog multiuser receiver in Ultra-WideBand (UWB) transmitted-reference system. In the presence of dense multipath and multi-access signals,the performance analysis is difficult due to the complicated waveform of received impulse. We develop an approach to analyze the steady-state Signal-to-Interference-plus-Noise (SINR) of the detector output. The multipath-spread impulse is fitted to an exponentially decaying profile in the analysis. A closed-form expression of steady-state SINR is further deduced for the proposed Least Minimum Square (LMS) detector. The analysis is validated by simulations in Line-Of-Sight (LOS) and Non-Line-Of-Sight (NLOS) channel respectively. Based on the theoretical results,the multipath delay spread is employed to determine the optimal width of the integration window of the detector.
基金supported by the Natural Science Research Programme of the Education Department of Anhui Province under Grant No. KJ2009B039Zthe Municipal Level Research Project from Lu'an City directive entrusted to West Anhui University under Grant No. 2008lw004
文摘We propose a deterministic quantum secure direct two check photon sequences are used to check the securities of the communication protocol by using dense coding. The channels between the message sender and the receiver. The continuous variable operations instead of the usual discrete unitary operations are performed on the travel photons so that the security of the present protocol can be enhanced. Therefore some specific attacks such as denial-of-service attack, intercept-measure-resend attack and invisible photon attack can be prevented in ideal quantum channel. In addition, the scheme is still secure in noise channel. Furthurmore, this protocol has the advantage of high capacity and can be realized in the experiment.
文摘As the major problem in multicast security, the group key management has been the focus of research But few results are satisfactory. In this paper, the problems of group key management and access control for large dynamic multicast group have been researched and a solution based on SubGroup Secure Controllers (SGSCs) is presented, which solves many problems in IOLUS system and WGL scheme.
文摘This paper proposes a joint network-channel codingbased on turbo codes for user cooperation. The scenario under consideration is one in which two "partners"--UE1 and UE2---cooperate in transmitting information to the base station (BS). Each partner transmits both locally generated information and the relayed information that originated at the other partner. The local information and relayed information are jointly network-channel coded to form a superimposed codeword, and the adjacent codewords transmitted in turn by the two partners are tightly correlative like a chain. It is shown via simulation that the proposed scheme achieves full diversity gain compared with the other user cooperation schemes, including those based on coded cooperation and distributed space-time coded cooperation.
文摘The paper study communication protocol, the structure of the circuit, antenna design of radio frequency identification technology (RFID), and puts forward a scheme based on IOT application: RFID logistics tracking system. Finally, the paper study the logistics distribution center information management model from three aspects of the system design objectives, system function analysis and system architecture design based on RFID.
基金supported by the Sharing and Diffusion of National R&D Outcome funded by the Korea Institute of Science and Technology Information
文摘Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, it is necessary to verify data integrity to properly respond to an adversary's ill-intentioned data modification. In sensor network environment, the data integrity verification method verifies the final data only, requesting multiple communications. An energy-efficient private information retrieval(PIR)-based data integrity verification method is proposed. Because the proposed method verifies the integrity of data between parent and child nodes, it is more efficient than the existing method which verifies data integrity after receiving data from the entire network or in a cluster. Since the number of messages for verification is reduced, in addition, energy could be used more efficiently. Lastly, the excellence of the proposed method is verified through performance evaluation.
文摘To develop a measurement system for monitoring partial discharge (PD) without the effect of external interferences,an algorithm of PD signal extraction based on wavelet transform with Teager's energy operators was presented. Acoustic signal generated by PD was selected to remove excessive interfering signals and electromagnetic interferences. Acoustic signals were collected and decomposed into I0 levels by wavelet transform into approximation and detail components. “Daubechies 25” was proved to be the most suitable mother wavelet for the extraction of PD acoustic signals. Compared with conventional wavelet denoising method, Teager's energy operators were adopted to the PD signal reconstruction and the signal to noise ratio was in creased by 20%-25% inthe experiment,without lost in energy and pulse amplitude.
基金the National Natural Science Foundation of China (No.60502004)
文摘In this paper,the sharing schemes of multicast in survivable Wavelength-Division Multi-plexed(WDM) networks are studied and the concept of Shared Risk Link Group(SRLG) is considered.While the network resources are shared by the backup paths,the sharing way is possible to make the backup paths selfish.This selfishness leads the redundant hops of the backup route and a large number of primary lightpaths to share one backup link.The sharing schemes,especially,the self-sharing and cross-sharing,are investigated to avoid the selfishness when computing the backup light-tree.In order to decrease the selfishness of the backup paths,it is important to make the sharing links fair to be used.There is a trade-off between the self-sharing and cross-sharing,which is adjusted through simulation to adapt the sharing degree of each sharing scheme and save the network resources.
文摘To provide scalable and simple Quality of Service(QoS) mechanism for multicast services, Probe-Based Multicast Admission Control (PBMAC) scheme was proposed. In this paper, PBMAC is studicd and a so-called subsequent request problem is found in PBMAC, which degrades system performance significantly when the network traffic is heavily loaded. Based on the analysis on subsequent request problem, an Enhance PBMAC (EPBMAC) scheme is proposed, in which complementary probing is devised to solve the problem. Using a new metric of normalized requested equivalent link capacity, the pertbrmance of PBMAC and EPBMAC is analyzed and evaluated. Two implementations are proposed for incremental dcployment. The paper finally introduces evaluation with packet-based simulations. Both analytical and simulation results show the significant improvement in performance.
文摘Intelligent Transportation System (ITS) integrates information and communication technologies with location based technologies into roads, vehicles, traffic and transport management systems. Application of ITS can improve situation in major cities where due to the increasing number of residents and level of motorization traffic congestion represents important issue. Another problem arises from this facts and that is that cities have contradictory needs as grooving need for goods within urban areas as well as need for less vehicles in the same area. The urban logistics activities by private companies within urban areas represent an integral part of city logistics that aims to improve the efficiency of urban freight transportation, reduce traffic congestion, mitigate environmental impacts, reduce costs and fuel consumption. This research presents application of ITS technologies and vehicle routing problem for night delivery scheme planning as one of the core techniques for modelling city logistics.