Recently, network coding has been applied to the loss recovery of reliable broadcast transmission in wireless networks. Since it was proved that fi nding the optimal set of lost packets for XOR-ing is a complex NP-com...Recently, network coding has been applied to the loss recovery of reliable broadcast transmission in wireless networks. Since it was proved that fi nding the optimal set of lost packets for XOR-ing is a complex NP-complete problem, the available time-based retransmission scheme and its enhanced retransmission scheme have exponential computational complexity and thus are not scalable to large networks. In this paper, we present an efficient heuristic scheme based on hypergraph coloring and also its enhanced heuristic scheme to improve the transmission efficiency. Basically, our proposed schemes fi rst create a hypergraph according to the packet-loss matrix. Then our schemes solve the problem of generating XORed packets by coloring the edges of hypergraph. Extensive simulation results demonstrate that, the heuristic scheme based on hypergraph coloring and its enhanced scheme can achieve almost the same transmission efficiency as the available ones, but have much lower computational complexity, which is very important for the wireless devices without high computation capacity.展开更多
Ethernet over SDH/SONET (EOS) is a hotspot in today's data transmission technology for it combines the merits of both Ethernet and SDH/SONET. However, implementing an EOS system on a chip is complex and needs full...Ethernet over SDH/SONET (EOS) is a hotspot in today's data transmission technology for it combines the merits of both Ethernet and SDH/SONET. However, implementing an EOS system on a chip is complex and needs full verifications. This paper introduces our design of Hardware/Software co-verification platform for EOS design. The hardware platform contains a microprocessor board and an FPGA (Field Programmable Gate Array)-based verification board, and the corresponding software includes test benches running in FPGAs, controlling programs for the microprocessor and a console program with GUI (Graphical User Interface) interface for configuration, management and supervision. The design is cost-effective and has been successfully employed to verify several IP (Intellectual Property) blocks of our EOS chip. Moreover, it is flexible and can be applied as a general-purpose verification platform.展开更多
IP电话又叫VOIP(voice over Intemet protocol)电话,是指应用于IP网络上实现语音信号传输的一项新的数据网络集成技术。IP(Intemet protocol),即网际协议。指网络间互连进行通信时事先约定好的而且必须遵守的一套规则。凡是遵守IP协...IP电话又叫VOIP(voice over Intemet protocol)电话,是指应用于IP网络上实现语音信号传输的一项新的数据网络集成技术。IP(Intemet protocol),即网际协议。指网络间互连进行通信时事先约定好的而且必须遵守的一套规则。凡是遵守IP协议的网络都叫IP网络。人们当前最熟悉的IP网络就是遍布全球的国际互联网(Intemet)。展开更多
Data aggregation technology reduces traffic overhead of wireless sensor network and extends effective working time of the network,yet continued operation of wireless sensor networks increases the probability of aggreg...Data aggregation technology reduces traffic overhead of wireless sensor network and extends effective working time of the network,yet continued operation of wireless sensor networks increases the probability of aggregation nodes being captured and probability of aggregated data being tampered.Thus it will seriously affect the security performance of the network. For network security issues,a stateful public key based SDAM( secure data aggregation model) is proposed for wireless sensor networks( WSNs),which employs a new stateful public key encryption to provide efficient end-to-end security. Moreover,the security aggregation model will not impose any bound on the aggregation function property,so as to realize the low cost and high security level at the same time.展开更多
A new design solution of data access layer for N-tier architecture is presented. It can solve the problems such as low efficiency of development and difficulties in transplantation, update and reuse. The solution util...A new design solution of data access layer for N-tier architecture is presented. It can solve the problems such as low efficiency of development and difficulties in transplantation, update and reuse. The solution utilizes the reflection technology of .NET and design pattern. A typical application of the solution demonstrates that the new solution of data access layer performs better than the current N-tier architecture. More importantly, the application suggests that the new solution of data access layer can be reused effectively.展开更多
The development of mobile internet and internet of things brings the vigorous developing data service, which increases need of bandwidth sharply. Operators strive to develop the data service oriented LTE(long term evo...The development of mobile internet and internet of things brings the vigorous developing data service, which increases need of bandwidth sharply. Operators strive to develop the data service oriented LTE(long term evolution)technology, especially TD-LTE (time division-LTE) technology adopting the spectral asymmetric. This paper analyzed details of TD-LTE system networking, and studied the feasibility of TD-LTE and TD-SCDMA(TD-synchronous code division multiple access) system with the same spectrum. At last, the paper provided suggestions on networking of TD-LTE system.展开更多
The paper proposes a novel approach for fine frequency synchronization of OFDM syn- chronization systems in multi-path channels. Maximum Likelihood (ML) function of frequency offsets including integral and decimal par...The paper proposes a novel approach for fine frequency synchronization of OFDM syn- chronization systems in multi-path channels. Maximum Likelihood (ML) function of frequency offsets including integral and decimal parts in frequency domain is developed according to the law of great number to eliminate the noise impact of the signal. When the timing delay close to the actual time, the proposed function produces a deep valley indicating frequency offset when large Valley-Square- Error (VSE) appears. Coarse timing offset can also be detected when function’s Valley-Square-Error (VSE) is maximized. Simulation results shows that the proposed algorithm gives very robust estimation of frequency offset, and a coarse timing offset estimation.展开更多
Long Term Evolution(LTE) and IEEE 802.16 WiMAX are competing access network technologies adopted in 4G wireless networks in recent years.LTE complies with3 GPP standards whereas 802.16 WiMAX is regulated by the Instit...Long Term Evolution(LTE) and IEEE 802.16 WiMAX are competing access network technologies adopted in 4G wireless networks in recent years.LTE complies with3 GPP standards whereas 802.16 WiMAX is regulated by the Institute of Electrical and Electronics Engineers(IEEE).Although WiMAX is already operating commercially in Taiwan,the system is limited to an independent new system that is incompatible with the current 3G system.Hence,the cost of implementing the WiMAX system is relatively high,this being an impediment to its rapid uptake and widespread use.On the other hand,LTE conforms to 3GPP that is supported by telecommunication manufacturers and operators and is,moreover,backward compatible with 3G/UMTS cellular systems.The LTE specifications define how user equipment(UE) connects and communicates with evolved Node B(eNB) base stations.The enhanced version,LTE-Advanced,adds a new entity called the relay node(RN) to widen service coverage,although this change has resulted in a more complex architecture.Mobility management and data forwarding are essential components in wireless mobile networking.This paper focuses on the efficient handover procedure in LTE-Advanced networks,and proposes a Smart Forwarding mechanism to improve the handover performance.Simulation studies show that the proposed Smart Forwarding scheme employs a better operational transmission path that effectively reduces handover latency and signal overhead.展开更多
NTP is nowadays the most widely used distributed network time protocol, which aims at synchronizing the clocks of computers in a network and keeping the accuracy and validation of the time information which is transmi...NTP is nowadays the most widely used distributed network time protocol, which aims at synchronizing the clocks of computers in a network and keeping the accuracy and validation of the time information which is transmitted in the network. Without automatic configuration mechanism, the stability and flexibility of the synchronization network built upon NTP protocol are not satisfying. P2P’s resource discovery mechanism is used to look for time sources in a synchronization network, and according to the network environment and node’s quality, the synchronization network is constructed dynamically.展开更多
The paper study the software and hardware principles of ultrasonic ranging reversing radar, design the vehicle reversing radar based on intelligent node of CAN bus, realize data communication and resource sharing with...The paper study the software and hardware principles of ultrasonic ranging reversing radar, design the vehicle reversing radar based on intelligent node of CAN bus, realize data communication and resource sharing with other intelligent nodes of the reversing radar. The experimental results show that, the design can achieve the expected technical indicators design, measurement precision and the reliability is high, which has certain guiding significance in the design of the car reversing radar, has wide application prospect and practical significance in the function of the extended CAN bus communication messages design and automotive CAN network.展开更多
The popularity of technology has allowed universities to make changes through their educational system in recent years. Some transitioned from face-to-face instruction to online instruction. The aim of this study is t...The popularity of technology has allowed universities to make changes through their educational system in recent years. Some transitioned from face-to-face instruction to online instruction. The aim of this study is to investigate the perceptions of both the instructors and the students as regards second language acquisition through online education at a rural university. The study was implemented in the context of teaching and learning English as a second language in an online education environment. The course material is based on The Net Languages Learning Platform, which is available at http://ide.yok.gov.tr/, and the course level is general English pre-elementary. Both quantitative and qualitative methods were used in this study. For quantitative data collection, a questionnaire was employed to understand the reasons for low student attendance on online courses. For qualitative research method, observation was carried out, and interviews are designed as data collection techniques. Purposive selection was used for selection of the participants. The findings revealed that online education needs to be modified. The students are eager to improve their second language competencies; however, they do not want to waste their time on an easy course level.展开更多
With the economic development and the popularity of application of electronic computer, electronic commerce has rapid development. More and more commerce and key business has been carried on the lnternet because Inter...With the economic development and the popularity of application of electronic computer, electronic commerce has rapid development. More and more commerce and key business has been carried on the lnternet because Internet has the features of interaction, openness, sharing and so on. However, during the daily commerce, people worry about the security of the network system. So a new technology which can detect the unusual behavior in time has been invented in order to protect the security of network system. The system of intrusion detection needs a lot of new technology to protect the data of the network system. The application of data mining technology in the system of intrusion detection can provide a better assistant to the users to analyze the data and improve the accuracy of the checking system.展开更多
Experimentation data of perspex glass sheet cutting, using CO2 laser, with missing values were modelled with semi-supervised artificial neural networks. Factorial design of experiment was selected for the verification...Experimentation data of perspex glass sheet cutting, using CO2 laser, with missing values were modelled with semi-supervised artificial neural networks. Factorial design of experiment was selected for the verification of orthogonal array based model prediction. It shows improvement in modelling of edge quality and kerf width by applying semi-supervised learning algorithm, based on novel error assessment on simulations. The results are expected to depict better prediction on average by utilizing the systematic randomized techniques to initialize the neural network weights and increase the number of initialization. Missing values handling is difficult with statistical tools and supervised learning techniques; on the other hand, semi-supervised learning generates better results with the smallest datasets even with missing values.展开更多
In this paper, a new algorithm HCOUNT + is proposed to find frequent items over data stream based on the HCOUNT algorithm. The new algorithm adopts aided measures to improve the precision of HCOUNT greatly. In additi...In this paper, a new algorithm HCOUNT + is proposed to find frequent items over data stream based on the HCOUNT algorithm. The new algorithm adopts aided measures to improve the precision of HCOUNT greatly. In addition,HCOUNT + is introduced to time critical applications and a novel sliding windows-based algorithm SL-HCOUNT + is proposed to mine the most frequent items occurring recently.This algorithm uses limited memory (nB · (1 +α) · e/ε·In(-M/lnρ)(α〈1) counters), requires constant processing time per packet (only (1+α) · ln(-M/lnρ(α〈1)) counters are updated), makes only one pass over the streaming data,and is shown to work well in the experimental results.展开更多
In this paper, we conduct research on the O2O mode and corresponding influence on the online and offline Internet marketing. Precision marketing is on the basis of fully understanding of consumer information, accordin...In this paper, we conduct research on the O2O mode and corresponding influence on the online and offline Internet marketing. Precision marketing is on the basis of fully understanding of consumer information, according to its characteristics and primary preferences targeted to carry out the one-to-one marketing. Mobile Internet users are mostly fixed which can be the new network technology in-depth insight into consumer interest and demand, and to establish for each specific customer database. Based on the analysis of customer data, then according to the characteristics of the different customers and the preference information such as the precision marketing, at the same time which can also according to customer' s feedback information targeted adjustment of products and the marketing, in order to better meet the needs of customers. Our research combines the O2O concepts and the technique to propose the novel marketing paradigm which is of great importance.展开更多
In control system, tag table is like a dictionary mapping tagname to address. Therefore, applications on workstation may use tagname to access different data in system. Normally tag table generated by configuration so...In control system, tag table is like a dictionary mapping tagname to address. Therefore, applications on workstation may use tagname to access different data in system. Normally tag table generated by configuration software will transfer to other workstation in system manually after system configuration, which is inconvenient and failible. The development of peer-to-peer (P2P) network technology and the realization of control system based on P2P network make the auto distn'bution of tag table possible. In this paper based on file sharing technology the presented method realizes the auto distn'bution of tag table.展开更多
基金supported by the National Natural Science Foundation of China (60502046, 60573034)863 Foundation of China (2007AA01Z215)
文摘Recently, network coding has been applied to the loss recovery of reliable broadcast transmission in wireless networks. Since it was proved that fi nding the optimal set of lost packets for XOR-ing is a complex NP-complete problem, the available time-based retransmission scheme and its enhanced retransmission scheme have exponential computational complexity and thus are not scalable to large networks. In this paper, we present an efficient heuristic scheme based on hypergraph coloring and also its enhanced heuristic scheme to improve the transmission efficiency. Basically, our proposed schemes fi rst create a hypergraph according to the packet-loss matrix. Then our schemes solve the problem of generating XORed packets by coloring the edges of hypergraph. Extensive simulation results demonstrate that, the heuristic scheme based on hypergraph coloring and its enhanced scheme can achieve almost the same transmission efficiency as the available ones, but have much lower computational complexity, which is very important for the wireless devices without high computation capacity.
文摘Ethernet over SDH/SONET (EOS) is a hotspot in today's data transmission technology for it combines the merits of both Ethernet and SDH/SONET. However, implementing an EOS system on a chip is complex and needs full verifications. This paper introduces our design of Hardware/Software co-verification platform for EOS design. The hardware platform contains a microprocessor board and an FPGA (Field Programmable Gate Array)-based verification board, and the corresponding software includes test benches running in FPGAs, controlling programs for the microprocessor and a console program with GUI (Graphical User Interface) interface for configuration, management and supervision. The design is cost-effective and has been successfully employed to verify several IP (Intellectual Property) blocks of our EOS chip. Moreover, it is flexible and can be applied as a general-purpose verification platform.
文摘IP电话又叫VOIP(voice over Intemet protocol)电话,是指应用于IP网络上实现语音信号传输的一项新的数据网络集成技术。IP(Intemet protocol),即网际协议。指网络间互连进行通信时事先约定好的而且必须遵守的一套规则。凡是遵守IP协议的网络都叫IP网络。人们当前最熟悉的IP网络就是遍布全球的国际互联网(Intemet)。
基金Support by the National High Technology Research and Development Program of China(No.2012AA120802)the National Natural Science Foundation of China(No.61302074)+1 种基金Specialized Research Fund for the Doctoral Program of Higher Education(No.20122301120004)Natural Science Foundation of Heilongjiang Province(No.QC2013C061)
文摘Data aggregation technology reduces traffic overhead of wireless sensor network and extends effective working time of the network,yet continued operation of wireless sensor networks increases the probability of aggregation nodes being captured and probability of aggregated data being tampered.Thus it will seriously affect the security performance of the network. For network security issues,a stateful public key based SDAM( secure data aggregation model) is proposed for wireless sensor networks( WSNs),which employs a new stateful public key encryption to provide efficient end-to-end security. Moreover,the security aggregation model will not impose any bound on the aggregation function property,so as to realize the low cost and high security level at the same time.
基金the Foundation for Key Teachers of Chongqing University (200209055).
文摘A new design solution of data access layer for N-tier architecture is presented. It can solve the problems such as low efficiency of development and difficulties in transplantation, update and reuse. The solution utilizes the reflection technology of .NET and design pattern. A typical application of the solution demonstrates that the new solution of data access layer performs better than the current N-tier architecture. More importantly, the application suggests that the new solution of data access layer can be reused effectively.
基金Important National Science & Technology Specific Projects"New Generation Broadband Wireless Mobile Communication"2010 project"TD-LTE Large-Scale Technical Trial "( No. 2010ZX03002-009)
文摘The development of mobile internet and internet of things brings the vigorous developing data service, which increases need of bandwidth sharply. Operators strive to develop the data service oriented LTE(long term evolution)technology, especially TD-LTE (time division-LTE) technology adopting the spectral asymmetric. This paper analyzed details of TD-LTE system networking, and studied the feasibility of TD-LTE and TD-SCDMA(TD-synchronous code division multiple access) system with the same spectrum. At last, the paper provided suggestions on networking of TD-LTE system.
文摘The paper proposes a novel approach for fine frequency synchronization of OFDM syn- chronization systems in multi-path channels. Maximum Likelihood (ML) function of frequency offsets including integral and decimal parts in frequency domain is developed according to the law of great number to eliminate the noise impact of the signal. When the timing delay close to the actual time, the proposed function produces a deep valley indicating frequency offset when large Valley-Square- Error (VSE) appears. Coarse timing offset can also be detected when function’s Valley-Square-Error (VSE) is maximized. Simulation results shows that the proposed algorithm gives very robust estimation of frequency offset, and a coarse timing offset estimation.
基金supported in part by the National Science Council,Taiwan,"R.O.C.",under grant no.NSC 101-2221-E-164-019 and NSC 101-2221-E-164-020
文摘Long Term Evolution(LTE) and IEEE 802.16 WiMAX are competing access network technologies adopted in 4G wireless networks in recent years.LTE complies with3 GPP standards whereas 802.16 WiMAX is regulated by the Institute of Electrical and Electronics Engineers(IEEE).Although WiMAX is already operating commercially in Taiwan,the system is limited to an independent new system that is incompatible with the current 3G system.Hence,the cost of implementing the WiMAX system is relatively high,this being an impediment to its rapid uptake and widespread use.On the other hand,LTE conforms to 3GPP that is supported by telecommunication manufacturers and operators and is,moreover,backward compatible with 3G/UMTS cellular systems.The LTE specifications define how user equipment(UE) connects and communicates with evolved Node B(eNB) base stations.The enhanced version,LTE-Advanced,adds a new entity called the relay node(RN) to widen service coverage,although this change has resulted in a more complex architecture.Mobility management and data forwarding are essential components in wireless mobile networking.This paper focuses on the efficient handover procedure in LTE-Advanced networks,and proposes a Smart Forwarding mechanism to improve the handover performance.Simulation studies show that the proposed Smart Forwarding scheme employs a better operational transmission path that effectively reduces handover latency and signal overhead.
文摘NTP is nowadays the most widely used distributed network time protocol, which aims at synchronizing the clocks of computers in a network and keeping the accuracy and validation of the time information which is transmitted in the network. Without automatic configuration mechanism, the stability and flexibility of the synchronization network built upon NTP protocol are not satisfying. P2P’s resource discovery mechanism is used to look for time sources in a synchronization network, and according to the network environment and node’s quality, the synchronization network is constructed dynamically.
文摘The paper study the software and hardware principles of ultrasonic ranging reversing radar, design the vehicle reversing radar based on intelligent node of CAN bus, realize data communication and resource sharing with other intelligent nodes of the reversing radar. The experimental results show that, the design can achieve the expected technical indicators design, measurement precision and the reliability is high, which has certain guiding significance in the design of the car reversing radar, has wide application prospect and practical significance in the function of the extended CAN bus communication messages design and automotive CAN network.
文摘The popularity of technology has allowed universities to make changes through their educational system in recent years. Some transitioned from face-to-face instruction to online instruction. The aim of this study is to investigate the perceptions of both the instructors and the students as regards second language acquisition through online education at a rural university. The study was implemented in the context of teaching and learning English as a second language in an online education environment. The course material is based on The Net Languages Learning Platform, which is available at http://ide.yok.gov.tr/, and the course level is general English pre-elementary. Both quantitative and qualitative methods were used in this study. For quantitative data collection, a questionnaire was employed to understand the reasons for low student attendance on online courses. For qualitative research method, observation was carried out, and interviews are designed as data collection techniques. Purposive selection was used for selection of the participants. The findings revealed that online education needs to be modified. The students are eager to improve their second language competencies; however, they do not want to waste their time on an easy course level.
文摘With the economic development and the popularity of application of electronic computer, electronic commerce has rapid development. More and more commerce and key business has been carried on the lnternet because Internet has the features of interaction, openness, sharing and so on. However, during the daily commerce, people worry about the security of the network system. So a new technology which can detect the unusual behavior in time has been invented in order to protect the security of network system. The system of intrusion detection needs a lot of new technology to protect the data of the network system. The application of data mining technology in the system of intrusion detection can provide a better assistant to the users to analyze the data and improve the accuracy of the checking system.
文摘Experimentation data of perspex glass sheet cutting, using CO2 laser, with missing values were modelled with semi-supervised artificial neural networks. Factorial design of experiment was selected for the verification of orthogonal array based model prediction. It shows improvement in modelling of edge quality and kerf width by applying semi-supervised learning algorithm, based on novel error assessment on simulations. The results are expected to depict better prediction on average by utilizing the systematic randomized techniques to initialize the neural network weights and increase the number of initialization. Missing values handling is difficult with statistical tools and supervised learning techniques; on the other hand, semi-supervised learning generates better results with the smallest datasets even with missing values.
文摘In this paper, a new algorithm HCOUNT + is proposed to find frequent items over data stream based on the HCOUNT algorithm. The new algorithm adopts aided measures to improve the precision of HCOUNT greatly. In addition,HCOUNT + is introduced to time critical applications and a novel sliding windows-based algorithm SL-HCOUNT + is proposed to mine the most frequent items occurring recently.This algorithm uses limited memory (nB · (1 +α) · e/ε·In(-M/lnρ)(α〈1) counters), requires constant processing time per packet (only (1+α) · ln(-M/lnρ(α〈1)) counters are updated), makes only one pass over the streaming data,and is shown to work well in the experimental results.
文摘In this paper, we conduct research on the O2O mode and corresponding influence on the online and offline Internet marketing. Precision marketing is on the basis of fully understanding of consumer information, according to its characteristics and primary preferences targeted to carry out the one-to-one marketing. Mobile Internet users are mostly fixed which can be the new network technology in-depth insight into consumer interest and demand, and to establish for each specific customer database. Based on the analysis of customer data, then according to the characteristics of the different customers and the preference information such as the precision marketing, at the same time which can also according to customer' s feedback information targeted adjustment of products and the marketing, in order to better meet the needs of customers. Our research combines the O2O concepts and the technique to propose the novel marketing paradigm which is of great importance.
基金National Natural Science Foundations of China ( No.60774059, No.60834002)the Excellent Discipline Head Plan Project of Shanghai, China (No.08XD14018)
文摘In control system, tag table is like a dictionary mapping tagname to address. Therefore, applications on workstation may use tagname to access different data in system. Normally tag table generated by configuration software will transfer to other workstation in system manually after system configuration, which is inconvenient and failible. The development of peer-to-peer (P2P) network technology and the realization of control system based on P2P network make the auto distn'bution of tag table possible. In this paper based on file sharing technology the presented method realizes the auto distn'bution of tag table.