As one of the most simple and effective single image dehazing methods, the dark channel prior(DCP) algorithm has been widely applied. However, the algorithm does not work for pixels similar to airlight(e.g., snowy gro...As one of the most simple and effective single image dehazing methods, the dark channel prior(DCP) algorithm has been widely applied. However, the algorithm does not work for pixels similar to airlight(e.g., snowy ground or a white wall), resulting in underestimation of the transmittance of some local scenes. To address that problem, we propose an image dehazing method by incorporating Markov random field(MRF) with the DCP. The DCP explicitly represents the input image observation in the MRF model obtained by the transmittance map. The key idea is that the sparsely distributed wrongly estimated transmittance can be corrected by properly characterizing the spatial dependencies between the neighboring pixels of the transmittances that are well estimated and those that are wrongly estimated. To that purpose, the energy function of the MRF model is designed. The estimation of the initial transmittance map is pixel-based using the DCP, and the segmentation on the transmittance map is employed to separate the foreground and background, thereby avoiding the block effect and artifacts at the depth discontinuity. Given the limited number of labels obtained by clustering, the smoothing term in the MRF model can properly smooth the transmittance map without an extra refinement filter. Experimental results obtained by using terrestrial and underwater images are given.展开更多
A random allocation scheme for SDMA systems is proposed with a goal of more efficient dynamic allocation. Based on theoretical analysis and derivation, the blocking probability of the proposed scheme is calculated and...A random allocation scheme for SDMA systems is proposed with a goal of more efficient dynamic allocation. Based on theoretical analysis and derivation, the blocking probability of the proposed scheme is calculated and compared with those of the ftrst duplicate (FD) and duplicate last (DL) schemes with different state-independent probabilities (p,) of acquring a dupicate channel suecessfully and 5 resources; moreover, a more realistic performance analysis of the random scheme is made with state-dependent ps in the SDMA/CDMA environment. The results show that the random scheme has a similar allocation pefformace to the FD and DL schemes, but is simpler than them in computation and scheduling.展开更多
The truncated binary exponential back-off algorithm is one of the most effective methods applied in collision resolution process of random multi-access channel.In this study,two new strategies are presented to improve...The truncated binary exponential back-off algorithm is one of the most effective methods applied in collision resolution process of random multi-access channel.In this study,two new strategies are presented to improve the capability of the truncated binary exponential back-off algorithm.In the new strategies,the sizes of the initial window size or the operating window sizes are adjusted dynamically,which always bring a significant improvement for the self-adaptability of the original algorithm.A series of experiments are simulated and the results verify that the new strategies can make the implementation more stable and effective than the original algorithm.展开更多
Demand assignment MAC protocols have been used widely in wireless networks. It can effectively utilize wireless bandwidth. Some strategies can he used by demand assignment MAC protocols to further improve their effici...Demand assignment MAC protocols have been used widely in wireless networks. It can effectively utilize wireless bandwidth. Some strategies can he used by demand assignment MAC protocols to further improve their efficiency. The concept of transmit probability is introduced. This concept allows a request slot to be assigned to many different traffic classes at the same time. Based on it, the dynamic random channel reservation (DRCR) protocol is proposed. The DRCR protocol operates dynamically by observing the traffic conditions. It uses information about the recent traffic conditions to assign transmit probability with which an mobile station can select request slots with lower traffic. The performance of DRCR is evaluated and compared with RSCA. The results show that DRCR is more stable than RSCA, it offers shorter delays of requests than RSCA and can relieve heavily stressed traffic classes faster than RSCA.展开更多
Cloud computing involves remote server deployments with public net-work infrastructures that allow clients to access computational resources.Virtual Machines(VMs)are supplied on requests and launched without interacti...Cloud computing involves remote server deployments with public net-work infrastructures that allow clients to access computational resources.Virtual Machines(VMs)are supplied on requests and launched without interactions from service providers.Intruders can target these servers and establish malicious con-nections on VMs for carrying out attacks on other clustered VMs.The existing system has issues with execution time and false-positive rates.Hence,the overall system performance is degraded considerably.The proposed approach is designed to eliminate Cross-VM side attacks and VM escape and hide the server’s position so that the opponent cannot track the target server beyond a certain point.Every request is passed from source to destination via one broadcast domain to confuse the opponent and avoid them from tracking the server’s position.Allocation of SECURITY Resources accepts a safety game in a simple format as input andfinds the best coverage vector for the opponent using a Stackelberg Equilibrium(SSE)technique.A Mixed Integer Linear Programming(MILP)framework is used in the algorithm.The VM challenge is reduced by afirewall-based controlling mechanism combining behavior-based detection and signature-based virus detection.The pro-posed method is focused on detecting malware attacks effectively and providing better security for the VMs.Finally,the experimental results indicate that the pro-posed security method is efficient.It consumes minimum execution time,better false positive rate,accuracy,and memory usage than the conventional approach.展开更多
基金supported by the National Natural Science Foundation of China (No.61571407)。
文摘As one of the most simple and effective single image dehazing methods, the dark channel prior(DCP) algorithm has been widely applied. However, the algorithm does not work for pixels similar to airlight(e.g., snowy ground or a white wall), resulting in underestimation of the transmittance of some local scenes. To address that problem, we propose an image dehazing method by incorporating Markov random field(MRF) with the DCP. The DCP explicitly represents the input image observation in the MRF model obtained by the transmittance map. The key idea is that the sparsely distributed wrongly estimated transmittance can be corrected by properly characterizing the spatial dependencies between the neighboring pixels of the transmittances that are well estimated and those that are wrongly estimated. To that purpose, the energy function of the MRF model is designed. The estimation of the initial transmittance map is pixel-based using the DCP, and the segmentation on the transmittance map is employed to separate the foreground and background, thereby avoiding the block effect and artifacts at the depth discontinuity. Given the limited number of labels obtained by clustering, the smoothing term in the MRF model can properly smooth the transmittance map without an extra refinement filter. Experimental results obtained by using terrestrial and underwater images are given.
文摘A random allocation scheme for SDMA systems is proposed with a goal of more efficient dynamic allocation. Based on theoretical analysis and derivation, the blocking probability of the proposed scheme is calculated and compared with those of the ftrst duplicate (FD) and duplicate last (DL) schemes with different state-independent probabilities (p,) of acquring a dupicate channel suecessfully and 5 resources; moreover, a more realistic performance analysis of the random scheme is made with state-dependent ps in the SDMA/CDMA environment. The results show that the random scheme has a similar allocation pefformace to the FD and DL schemes, but is simpler than them in computation and scheduling.
基金This work was supported by the National Natural Science Foundation of China(No.10371097).
文摘The truncated binary exponential back-off algorithm is one of the most effective methods applied in collision resolution process of random multi-access channel.In this study,two new strategies are presented to improve the capability of the truncated binary exponential back-off algorithm.In the new strategies,the sizes of the initial window size or the operating window sizes are adjusted dynamically,which always bring a significant improvement for the self-adaptability of the original algorithm.A series of experiments are simulated and the results verify that the new strategies can make the implementation more stable and effective than the original algorithm.
文摘Demand assignment MAC protocols have been used widely in wireless networks. It can effectively utilize wireless bandwidth. Some strategies can he used by demand assignment MAC protocols to further improve their efficiency. The concept of transmit probability is introduced. This concept allows a request slot to be assigned to many different traffic classes at the same time. Based on it, the dynamic random channel reservation (DRCR) protocol is proposed. The DRCR protocol operates dynamically by observing the traffic conditions. It uses information about the recent traffic conditions to assign transmit probability with which an mobile station can select request slots with lower traffic. The performance of DRCR is evaluated and compared with RSCA. The results show that DRCR is more stable than RSCA, it offers shorter delays of requests than RSCA and can relieve heavily stressed traffic classes faster than RSCA.
文摘Cloud computing involves remote server deployments with public net-work infrastructures that allow clients to access computational resources.Virtual Machines(VMs)are supplied on requests and launched without interactions from service providers.Intruders can target these servers and establish malicious con-nections on VMs for carrying out attacks on other clustered VMs.The existing system has issues with execution time and false-positive rates.Hence,the overall system performance is degraded considerably.The proposed approach is designed to eliminate Cross-VM side attacks and VM escape and hide the server’s position so that the opponent cannot track the target server beyond a certain point.Every request is passed from source to destination via one broadcast domain to confuse the opponent and avoid them from tracking the server’s position.Allocation of SECURITY Resources accepts a safety game in a simple format as input andfinds the best coverage vector for the opponent using a Stackelberg Equilibrium(SSE)technique.A Mixed Integer Linear Programming(MILP)framework is used in the algorithm.The VM challenge is reduced by afirewall-based controlling mechanism combining behavior-based detection and signature-based virus detection.The pro-posed method is focused on detecting malware attacks effectively and providing better security for the VMs.Finally,the experimental results indicate that the pro-posed security method is efficient.It consumes minimum execution time,better false positive rate,accuracy,and memory usage than the conventional approach.