In cyberspace security,the privacy in location-based services(LBSs) becomes more critical. In previous solutions,a trusted third party(TTP) was usually employed to provide disturbance or obfuscation,but it may become ...In cyberspace security,the privacy in location-based services(LBSs) becomes more critical. In previous solutions,a trusted third party(TTP) was usually employed to provide disturbance or obfuscation,but it may become the single point of failure or service bottleneck. In order to cope with this drawback,we focus on another important class,establishing anonymous group through short-range communication to achieve k-anonymity with collaborative users. Along with the analysis of existing algorithms,we found users in the group must share the same maximum anonymity degree,and they could not ease the process of preservation in a lower one. To cope with this problem,we proposed a random-QBE algorithm to put up with personalized anonymity in user collaboration algorithms,and this algorithm could preserve both query privacy and location privacy. Then we studied the attacks from passive and active adversaries and used entropy to measure user's privacy level. Finally,experimental evaluations further verify its effectiveness and efficiency.展开更多
Intelligent transportation system (ITS) has become a popular research topic to meet the increased demands of transportation safety,traffic efficiency,comfort in the journey and environment protection,etc. ITS applicat...Intelligent transportation system (ITS) has become a popular research topic to meet the increased demands of transportation safety,traffic efficiency,comfort in the journey and environment protection,etc. ITS applications impose higher requirements on wireless communication systems. For example,safety-related ITS services must always be low latency and entertainment-related ITS services need high data rate. The ITS dedicated short range communications (DSRC) technology to support the safetyrelated application is still under development, while long term evolution (LTE),as the next generation mobile communication systems,offers an efficient communication platform for ITS information exchange , which can meet most ITS services requirements of latency,data rate as well as communication range. In this paper,based on the time-division duplex (TDD) mode of LTE,i.e. TD-LTE,an enhanced TD-LTE network architecture is introduced to better support safety-related ITS application with low latency requirement,and some enhanced access schemes of TD-LTE are proposed to improve the performance of supporting the high-speed IP-based ITS applications in hotspots. At last,two practical application scenarios of enhanced TD-LTE systems are given.展开更多
Device-to-Device(D2D) communication has been proposed as a promising implementation of green communication to benefit the existed cellular network.In order to limit cross-tier interference while explore the gain of sh...Device-to-Device(D2D) communication has been proposed as a promising implementation of green communication to benefit the existed cellular network.In order to limit cross-tier interference while explore the gain of short-range communication,we devise a series of distributed power control(DPC) schemes for energy conservation(EC)and enhancement of radio resource utilization in the hybrid system.Firstly,a constrained opportunistic power control model is built up to take advantage of the interference avoidance methodology in the presence of service requirement and power constraint.Then,biasing scheme and admission control are added to evade ineffective power consumption and maintain the feasibility of the system.Upon feasibility,a non-cooperative game is further formulated to exploit the profit in EC with minor influence on spectral efficiency(SE).The convergence of the DPC schemes is validated and their performance is confirmed via simulation results.展开更多
Sign Writing, a writing system for sign language, is becoming a useful and convenient communication aid for people who are deaf. Principally, people who are deaf find it difficult to communicate with the hearing commu...Sign Writing, a writing system for sign language, is becoming a useful and convenient communication aid for people who are deaf. Principally, people who are deaf find it difficult to communicate with the hearing community and due to recent technological advancement they communicate amongst themselves and with the hearing community via text messaging on mobile phones. Existing messaging function is limited to writing based on the Roman alphabets or pictographic languages like Mandarin; writing in signs is deemed to be deficient in a mobile context. Hence, the aim of this paper is to examine the feasibility of writing and reading text messages in signs as an alternative communication mean besides Short Messaging Service (SMS). Initial experimental results have significantly exemplified that sign writing gains well acceptance and is preferred among the hearing-impaired community to communicate within or between the hearing communities.展开更多
Traffic flow prediction is an important component for real-time traffic-adaptive signal control in urban arterial networks.By exploring available detector and signal controller information from neighboring intersectio...Traffic flow prediction is an important component for real-time traffic-adaptive signal control in urban arterial networks.By exploring available detector and signal controller information from neighboring intersections,a dynamic data-driven flow prediction model was developed.The model consists of two prediction components based on the signal states(red or green) for each movement at an upstream intersection.The characteristics of each signal state were carefully examined and the corresponding travel time from the upstream intersection to the approach in question at the downstream intersection was predicted.With an online turning proportion estimation method,along with the predicted travel times,the anticipated vehicle arrivals can be forecasted at the downstream intersection.The model performance was tested at a set of two signalized intersections located in the city of Gainesville,Florida,USA,using the CORSIM microscopic simulation package.Analysis results show that the model agrees well with empirical arrival data measured at 10 s intervals within an acceptable range of 10%-20%,and show a normal distribution.It is reasonably believed that the model has potential applicability for use in truly proactive real-time traffic adaptive signal control systems.展开更多
This paper puts forward adaptive anti collision algorithm based on two fork tree decomposition. New search algorithm built on the basis of binary-tree algorithm, using the uniqueness of the label EPC, to estimate the ...This paper puts forward adaptive anti collision algorithm based on two fork tree decomposition. New search algorithm built on the basis of binary-tree algorithm, using the uniqueness of the label EPC, to estimate the distribution of label by slot allocation, the huge and complicated two fork tree is decomposed into several simple binary-tree by search the collision slots for binary-tree, so, it can simplifies the search process. The algorithm fully considers4 important performance parameters of the reader paging times, transmission delay, energy consumption and throughput label, the simulation results show that, the improved anti-collision algorithm is obviously improved performance than other two fork tree algorithm, it is more suitable for RFID anti-collision protocols.展开更多
基金supported by the National Natural Science Foundation of China (Grant No.61472097)the Specialized Research Fund for the Doctoral Program of Higher Education(Grant No.20132304110017)+1 种基金the Natural Science Foundation of Heilongjiang Province of China (Grant No.F2015022)the Fujian Provincial Key Laboratory of Network Security and Cryptology Research Fund (Fujian Normal University) (No.15003)
文摘In cyberspace security,the privacy in location-based services(LBSs) becomes more critical. In previous solutions,a trusted third party(TTP) was usually employed to provide disturbance or obfuscation,but it may become the single point of failure or service bottleneck. In order to cope with this drawback,we focus on another important class,establishing anonymous group through short-range communication to achieve k-anonymity with collaborative users. Along with the analysis of existing algorithms,we found users in the group must share the same maximum anonymity degree,and they could not ease the process of preservation in a lower one. To cope with this problem,we proposed a random-QBE algorithm to put up with personalized anonymity in user collaboration algorithms,and this algorithm could preserve both query privacy and location privacy. Then we studied the attacks from passive and active adversaries and used entropy to measure user's privacy level. Finally,experimental evaluations further verify its effectiveness and efficiency.
基金National Science and Technology Major Project (No.2012ZX03005010-005)
文摘Intelligent transportation system (ITS) has become a popular research topic to meet the increased demands of transportation safety,traffic efficiency,comfort in the journey and environment protection,etc. ITS applications impose higher requirements on wireless communication systems. For example,safety-related ITS services must always be low latency and entertainment-related ITS services need high data rate. The ITS dedicated short range communications (DSRC) technology to support the safetyrelated application is still under development, while long term evolution (LTE),as the next generation mobile communication systems,offers an efficient communication platform for ITS information exchange , which can meet most ITS services requirements of latency,data rate as well as communication range. In this paper,based on the time-division duplex (TDD) mode of LTE,i.e. TD-LTE,an enhanced TD-LTE network architecture is introduced to better support safety-related ITS application with low latency requirement,and some enhanced access schemes of TD-LTE are proposed to improve the performance of supporting the high-speed IP-based ITS applications in hotspots. At last,two practical application scenarios of enhanced TD-LTE systems are given.
基金This work has been partly supported by National Natural Science Foundation of China,National High Technology Research and Development Program of China (863 Program)
文摘Device-to-Device(D2D) communication has been proposed as a promising implementation of green communication to benefit the existed cellular network.In order to limit cross-tier interference while explore the gain of short-range communication,we devise a series of distributed power control(DPC) schemes for energy conservation(EC)and enhancement of radio resource utilization in the hybrid system.Firstly,a constrained opportunistic power control model is built up to take advantage of the interference avoidance methodology in the presence of service requirement and power constraint.Then,biasing scheme and admission control are added to evade ineffective power consumption and maintain the feasibility of the system.Upon feasibility,a non-cooperative game is further formulated to exploit the profit in EC with minor influence on spectral efficiency(SE).The convergence of the DPC schemes is validated and their performance is confirmed via simulation results.
文摘Sign Writing, a writing system for sign language, is becoming a useful and convenient communication aid for people who are deaf. Principally, people who are deaf find it difficult to communicate with the hearing community and due to recent technological advancement they communicate amongst themselves and with the hearing community via text messaging on mobile phones. Existing messaging function is limited to writing based on the Roman alphabets or pictographic languages like Mandarin; writing in signs is deemed to be deficient in a mobile context. Hence, the aim of this paper is to examine the feasibility of writing and reading text messages in signs as an alternative communication mean besides Short Messaging Service (SMS). Initial experimental results have significantly exemplified that sign writing gains well acceptance and is preferred among the hearing-impaired community to communicate within or between the hearing communities.
基金Project(71101109) supported by the National Natural Science Foundation of China
文摘Traffic flow prediction is an important component for real-time traffic-adaptive signal control in urban arterial networks.By exploring available detector and signal controller information from neighboring intersections,a dynamic data-driven flow prediction model was developed.The model consists of two prediction components based on the signal states(red or green) for each movement at an upstream intersection.The characteristics of each signal state were carefully examined and the corresponding travel time from the upstream intersection to the approach in question at the downstream intersection was predicted.With an online turning proportion estimation method,along with the predicted travel times,the anticipated vehicle arrivals can be forecasted at the downstream intersection.The model performance was tested at a set of two signalized intersections located in the city of Gainesville,Florida,USA,using the CORSIM microscopic simulation package.Analysis results show that the model agrees well with empirical arrival data measured at 10 s intervals within an acceptable range of 10%-20%,and show a normal distribution.It is reasonably believed that the model has potential applicability for use in truly proactive real-time traffic adaptive signal control systems.
文摘This paper puts forward adaptive anti collision algorithm based on two fork tree decomposition. New search algorithm built on the basis of binary-tree algorithm, using the uniqueness of the label EPC, to estimate the distribution of label by slot allocation, the huge and complicated two fork tree is decomposed into several simple binary-tree by search the collision slots for binary-tree, so, it can simplifies the search process. The algorithm fully considers4 important performance parameters of the reader paging times, transmission delay, energy consumption and throughput label, the simulation results show that, the improved anti-collision algorithm is obviously improved performance than other two fork tree algorithm, it is more suitable for RFID anti-collision protocols.