Curvature-driven diffusion (CDD) principles were used to develop a novel gradient based image restora- tion algorithm. The algorithm fills in blocks of missing data in a wireless image after transmission through the n...Curvature-driven diffusion (CDD) principles were used to develop a novel gradient based image restora- tion algorithm. The algorithm fills in blocks of missing data in a wireless image after transmission through the network. When images are transmitted over fading channels, especially in the severe circum- stances of a coal mine, blocks of the image may be destroyed by the effects of noise. Instead of using com- mon retransmission query protocols the lost data is reconstructed by using the adaptive curvature-driven diffusion (ACDD) image restoration algorithm in the gradient domain of the destroyed image. Missing blocks are restored by the method in two steps: In step one, the missing blocks are filled in the gradient domain by the ACDD algorithm; in step two, and the image is reconstructed from the reformed gradients by solving a Poisson equation. The proposed method eliminates the staircase effect and accelerates the convergence rate. This is demonstrated by experimental results.展开更多
The co-channel interference modeling is vital for evaluating the secrecy performance in random wireless networks,where the legitimate nodes and eavesdroppers are randomly distributed.In this paper,a new interference m...The co-channel interference modeling is vital for evaluating the secrecy performance in random wireless networks,where the legitimate nodes and eavesdroppers are randomly distributed.In this paper,a new interference model is proposed from the userdominant perspective.The model can provide a better analytical assessment of secrecy performance with interference coordination for the presence of eavesdroppers.The typical legitimate is assumed to be located at the origin,and chooses the closest base station(BS) as its serving BS.The field of interferers is obtained by excluding the desired BSs(including the serving BS and its cooperative BS(s)).In contract with the exiting interference model,it is assumed that desired BSs and interferers belong to the same Poisson Point Process(PPP),and eavesdroppers are distributed according to another independent PPP.Based on this model,the average secrecy transmission capacity is derived in simply analytical forms with interference coordination.Analysis and simulation results show that the secrecy performance can be significantly enhanced by exploiting interference coordination.Furthermore,the average secrecy transmission capacity increases with increasing number of cooperative BSs.展开更多
The design, manufacture and deployment of embedded systems become increasingly complex and multidisciplinary process. Before the steps of manufacturing and deployment, a simulation and validation phase is necessary. G...The design, manufacture and deployment of embedded systems become increasingly complex and multidisciplinary process. Before the steps of manufacturing and deployment, a simulation and validation phase is necessary. Given the increasing complexity of systems such as telecommunications systems, control systems and others, a specific simulation and validation process must take place. This simulation ideally made in a single development environment should cover different areas and all components of the system. In this paper, the authors briefly describe the behavioral models of the elements of a large scale WSN (wireless sensors network) used to create simulator, focusing specifically on the model of the transmission channel, and how it can retrieve results from the behavioral simulator. In side to legacy network simulator, for the testing and modeling of communication protocols, this simulator should not omit WSN specific aspect, in accuracy it covers the modeling of node platforms, protocols, and real world phenomena.展开更多
It has been demonstrated that either Channel Allocation (CA) or Relay Selection (RS) can improve the performance in relaying networks separately. However, there is little work concerning their combination in multi...It has been demonstrated that either Channel Allocation (CA) or Relay Selection (RS) can improve the performance in relaying networks separately. However, there is little work concerning their combination in multi-cell uplink scenarios. In this paper, we investigate the issue which considers the CA and RS to optimize the system transmission rate in an uplink scenario, while maintaining the resource distribution fairness among users. This is first formulated as an optimization problem for a linear cellular system, where the same frequency channels can be reused in different cells. Based on the link and co-channel interference conditions, two low-complexity CA and RS schemes are then proposed with different decomposition se quences. Finally, numerical results are con ducted to verify the effectiveness of the pro posed CA and RS methods. Simulations re suits show that the proposed methods can yield significant improvements in system per formance in terms of average sum rate.展开更多
基金supported by the National High-Tech Research and Development Program of China (No. 2008AA062200)the National Natural Science Foundation of China (No.60802077)the Fundamental Research Funds for the Central Universities (No. 2010QNA43)
文摘Curvature-driven diffusion (CDD) principles were used to develop a novel gradient based image restora- tion algorithm. The algorithm fills in blocks of missing data in a wireless image after transmission through the network. When images are transmitted over fading channels, especially in the severe circum- stances of a coal mine, blocks of the image may be destroyed by the effects of noise. Instead of using com- mon retransmission query protocols the lost data is reconstructed by using the adaptive curvature-driven diffusion (ACDD) image restoration algorithm in the gradient domain of the destroyed image. Missing blocks are restored by the method in two steps: In step one, the missing blocks are filled in the gradient domain by the ACDD algorithm; in step two, and the image is reconstructed from the reformed gradients by solving a Poisson equation. The proposed method eliminates the staircase effect and accelerates the convergence rate. This is demonstrated by experimental results.
基金This work is supported by the National Natural Science Foundation for Distinguished Young Scholar of China under Grant No. 61325006 and the National High-tech Research and Development Program of China under Grant No. 2014AA01A701.
文摘The co-channel interference modeling is vital for evaluating the secrecy performance in random wireless networks,where the legitimate nodes and eavesdroppers are randomly distributed.In this paper,a new interference model is proposed from the userdominant perspective.The model can provide a better analytical assessment of secrecy performance with interference coordination for the presence of eavesdroppers.The typical legitimate is assumed to be located at the origin,and chooses the closest base station(BS) as its serving BS.The field of interferers is obtained by excluding the desired BSs(including the serving BS and its cooperative BS(s)).In contract with the exiting interference model,it is assumed that desired BSs and interferers belong to the same Poisson Point Process(PPP),and eavesdroppers are distributed according to another independent PPP.Based on this model,the average secrecy transmission capacity is derived in simply analytical forms with interference coordination.Analysis and simulation results show that the secrecy performance can be significantly enhanced by exploiting interference coordination.Furthermore,the average secrecy transmission capacity increases with increasing number of cooperative BSs.
文摘The design, manufacture and deployment of embedded systems become increasingly complex and multidisciplinary process. Before the steps of manufacturing and deployment, a simulation and validation phase is necessary. Given the increasing complexity of systems such as telecommunications systems, control systems and others, a specific simulation and validation process must take place. This simulation ideally made in a single development environment should cover different areas and all components of the system. In this paper, the authors briefly describe the behavioral models of the elements of a large scale WSN (wireless sensors network) used to create simulator, focusing specifically on the model of the transmission channel, and how it can retrieve results from the behavioral simulator. In side to legacy network simulator, for the testing and modeling of communication protocols, this simulator should not omit WSN specific aspect, in accuracy it covers the modeling of node platforms, protocols, and real world phenomena.
基金supported by the Key Project of State Key Laboratory of Rail Traffic and Control under Grant No.RCS2012ZZ004the Fundamental Research Funds for the Central Universities under Grant No. 2013YJS025
文摘It has been demonstrated that either Channel Allocation (CA) or Relay Selection (RS) can improve the performance in relaying networks separately. However, there is little work concerning their combination in multi-cell uplink scenarios. In this paper, we investigate the issue which considers the CA and RS to optimize the system transmission rate in an uplink scenario, while maintaining the resource distribution fairness among users. This is first formulated as an optimization problem for a linear cellular system, where the same frequency channels can be reused in different cells. Based on the link and co-channel interference conditions, two low-complexity CA and RS schemes are then proposed with different decomposition se quences. Finally, numerical results are con ducted to verify the effectiveness of the pro posed CA and RS methods. Simulations re suits show that the proposed methods can yield significant improvements in system per formance in terms of average sum rate.