Incremental image compression techniques using priori information are of significance to deal with the explosively increasing remote-sensing image data. However, the potential benefi ts of priori information are still...Incremental image compression techniques using priori information are of significance to deal with the explosively increasing remote-sensing image data. However, the potential benefi ts of priori information are still to be evaluated quantitatively for effi cient compression scheme designing. In this paper, we present a k-nearest neighbor(k-NN) based bypass image entropy estimation scheme, together with the corresponding mutual information estimation method. Firstly, we apply the k-NN entropy estimation theory to split image blocks, describing block-wise intra-frame spatial correlation while avoiding the curse of dimensionality. Secondly, we propose the corresponding mutual information estimator based on feature-based image calibration and straight-forward correlation enhancement. The estimator is designed to evaluate the compression performance gain of using priori information. Numerical results on natural and remote-sensing images show that the proposed scheme obtains an estimation accuracy gain by 10% compared with conventional image entropy estimators. Furthermore, experimental results demonstrate both the effectiveness of the proposed mutual information evaluation scheme, and the quantitative incremental compressibility by using the priori remote-sensing frames.展开更多
In this paper, we conduct research on the security enhancement model of communication system based on the chaotic encryption and analytic hierarchy process. The communication of the information network is completed by...In this paper, we conduct research on the security enhancement model of communication system based on the chaotic encryption and analytic hierarchy process. The communication of the information network is completed by the communication protocol. The communication protocol can be divided into application layer, transport layer, network layer, link layer and physical layer. By using the communication protocol, the security control of the network communication can meet the needs of the information network security communication. This paper integrates the chaos system to further implement the robust system architecture. The algorithm of this paper tries to make the maximum value of the above three parameters in each iteration step by step and the output feedback to dynamically change these parameters. Compared with other algorithms, our method can adopt more related theories to perform the better result.展开更多
China's cormaaunications industry is an important part of the electronic information industry, and plays a significant role in the national informatization process. In 2006, China issued its National Plans for Medium...China's cormaaunications industry is an important part of the electronic information industry, and plays a significant role in the national informatization process. In 2006, China issued its National Plans for Medium and Long-term Development of Science and Technology (2006-2020) (NPMLDST). Since 2006, there has been a rapid increase in the number of citations of China's interna- tional papers in the field of communications. In accordance with the goals listed in the NPMLDST, China needs to over- take several competitors by 2020 to be among the top five countries in the field of natural science field. By comparing two Essential Science Indicators (ESI) (i.e., the total number of citations and the number of citations per paper) for China and other countries, China's annual growth rate is found to exceed that of other influential countries in the field of sci- ence and technology, and exhibits evident growth-type characteristics. Besides, our study also shows that the short- age of high-quality academic papers in China is the main obstacle to improving the impact of China's academic publications.展开更多
Navigation augmentation technology is one of the most common methods to increase the continuity,reliability and integrity of the global satellite navigation system.The concept of volunteer augmentation navigation (VNA...Navigation augmentation technology is one of the most common methods to increase the continuity,reliability and integrity of the global satellite navigation system.The concept of volunteer augmentation navigation (VNA) is proposed and the elements and topological structure of VNA are also analyzed in this paper.The study focuses on the neural network model that volunteers and ordinary users use modern communication information network to exchange self-organizing information.The neural cell model of Volunteer Augmentation Navigation using shared information is built.Thus interactive general relative positioning is realized.Then basic theories and methods of volunteer augmentation navigation are formed on the basis of the above-mentioned study.This study of realization mechanism of volunteer augmentation technology helps to form a relatively integral architecture of volunteer augmentation navigation.A user self-service satellite navigation augmentation which combines information exchange and navigation services may strengthen the continuity,reliability and integrity of the navigation system.The volunteer augmentation navigation theory proposed in this paper improves the traditional satellite navigation application model and expands the connotation and denotation of satellite navigation augmentation methods.展开更多
In this paper, we consider a network communication delay improvement problem,which is to upgrade nodes in a network with minimum cost such that the communication delay betweenany two nodes of the network is below a pr...In this paper, we consider a network communication delay improvement problem,which is to upgrade nodes in a network with minimum cost such that the communication delay betweenany two nodes of the network is below a pre-specific level. In the upgrading model, the improvementby upgrading one node is a continuous variable, and the cost incurred by such an upgrading is alinear function of the improvement. We show that achieving an approximation ratio βln(|V|) for theproblem is NP-hard for some constant β > 0 even if the underlying network is a bipartite graph. Butif the underlying network is restricted as a tree, we show that it can be solved in a stronglypolynomial time.展开更多
基金supported by National Basic Research Project of China(2013CB329006)National Natural Science Foundation of China(No.61622110,No.61471220,No.91538107)
文摘Incremental image compression techniques using priori information are of significance to deal with the explosively increasing remote-sensing image data. However, the potential benefi ts of priori information are still to be evaluated quantitatively for effi cient compression scheme designing. In this paper, we present a k-nearest neighbor(k-NN) based bypass image entropy estimation scheme, together with the corresponding mutual information estimation method. Firstly, we apply the k-NN entropy estimation theory to split image blocks, describing block-wise intra-frame spatial correlation while avoiding the curse of dimensionality. Secondly, we propose the corresponding mutual information estimator based on feature-based image calibration and straight-forward correlation enhancement. The estimator is designed to evaluate the compression performance gain of using priori information. Numerical results on natural and remote-sensing images show that the proposed scheme obtains an estimation accuracy gain by 10% compared with conventional image entropy estimators. Furthermore, experimental results demonstrate both the effectiveness of the proposed mutual information evaluation scheme, and the quantitative incremental compressibility by using the priori remote-sensing frames.
文摘In this paper, we conduct research on the security enhancement model of communication system based on the chaotic encryption and analytic hierarchy process. The communication of the information network is completed by the communication protocol. The communication protocol can be divided into application layer, transport layer, network layer, link layer and physical layer. By using the communication protocol, the security control of the network communication can meet the needs of the information network security communication. This paper integrates the chaos system to further implement the robust system architecture. The algorithm of this paper tries to make the maximum value of the above three parameters in each iteration step by step and the output feedback to dynamically change these parameters. Compared with other algorithms, our method can adopt more related theories to perform the better result.
基金supported by National High-tech R&D Program of China (863 Program) under Grant No.2011AA01A206
文摘China's cormaaunications industry is an important part of the electronic information industry, and plays a significant role in the national informatization process. In 2006, China issued its National Plans for Medium and Long-term Development of Science and Technology (2006-2020) (NPMLDST). Since 2006, there has been a rapid increase in the number of citations of China's interna- tional papers in the field of communications. In accordance with the goals listed in the NPMLDST, China needs to over- take several competitors by 2020 to be among the top five countries in the field of natural science field. By comparing two Essential Science Indicators (ESI) (i.e., the total number of citations and the number of citations per paper) for China and other countries, China's annual growth rate is found to exceed that of other influential countries in the field of sci- ence and technology, and exhibits evident growth-type characteristics. Besides, our study also shows that the short- age of high-quality academic papers in China is the main obstacle to improving the impact of China's academic publications.
基金supported by the National Basic Research Program of China (Grant No.2007CB815502)the West Light Foundation of the Chinese Academy of Sciences (Grant No.Y001YR2701)
文摘Navigation augmentation technology is one of the most common methods to increase the continuity,reliability and integrity of the global satellite navigation system.The concept of volunteer augmentation navigation (VNA) is proposed and the elements and topological structure of VNA are also analyzed in this paper.The study focuses on the neural network model that volunteers and ordinary users use modern communication information network to exchange self-organizing information.The neural cell model of Volunteer Augmentation Navigation using shared information is built.Thus interactive general relative positioning is realized.Then basic theories and methods of volunteer augmentation navigation are formed on the basis of the above-mentioned study.This study of realization mechanism of volunteer augmentation technology helps to form a relatively integral architecture of volunteer augmentation navigation.A user self-service satellite navigation augmentation which combines information exchange and navigation services may strengthen the continuity,reliability and integrity of the navigation system.The volunteer augmentation navigation theory proposed in this paper improves the traditional satellite navigation application model and expands the connotation and denotation of satellite navigation augmentation methods.
基金This research is supported by National Key Researchand Development Programof China(No.2002CB312004)and the National Outstanding Youth Fund.
文摘In this paper, we consider a network communication delay improvement problem,which is to upgrade nodes in a network with minimum cost such that the communication delay betweenany two nodes of the network is below a pre-specific level. In the upgrading model, the improvementby upgrading one node is a continuous variable, and the cost incurred by such an upgrading is alinear function of the improvement. We show that achieving an approximation ratio βln(|V|) for theproblem is NP-hard for some constant β > 0 even if the underlying network is a bipartite graph. Butif the underlying network is restricted as a tree, we show that it can be solved in a stronglypolynomial time.