This paper analyzes the characteristics of the Publish/Subscribe(Pub/Sub) system, proposes a novel Constrained number of Message Copy Pub/Sub Scheme(CMCPSS) algorithm for opportunistic networks, which can calculate the copy number of subscribe request and the response event according to the communication frequency between different nodes adaptively. Simulation results show that CMCPSS can balance well the tradeoff between the delivery ratio and network resource consumption in intermittently connected networks. CMCPSS can reduce 51% transmission times when compares with Epidemic algorithm and can reduce 45% message transmission delay when compares with Direct Transmission algorithm.
Aiming at the problem that it will cause extra costs when introducing control flow obfuscation, this paper puts forward to make use of the garbage code to carry out the control flow confusion. The branch garbage code and circulation the garbage code are used in the method and a Hash function is introduced here to control the number of insert operation, so the accuracy of the program analysis is decreased greatly and the tamper attack is hard to attain its purpose.It implements part of the algorithm and analyze its efficiency. Experimental results show that the algorithm can effectively prevent reverse engineering attacks.
Aiming at solving problems of relatively low precision, rate of coverage when using existing attribute word extraction methods, this paper adopts Baidu Baike and co-occurrence proportion of adjacent words after word segmentation to identify new domain words, decreases impact on recognition of attribute word caused by segmentation errors. This paper designs part of speech sequence templates which contain noun and noun phrase templates, verb and verb phrase templates to obtain attribute word candidates from Chinese product comments, then utilizes statistical technique and natural language processing technique to filter attribute word candidates. Experimental results show that for the 3 623 mobile phone comments, this method obtains 1 732 attribute words, the precision, recall and f-measure reach 0.565, 0.726 and 0.636, and it has good extraction performance.
This paper presents a grid growing algorithm for fast construction of Delaunay irregular network based on discrete point. In this algorithm, a grid is achieved to express discrete point uniquely based on the divide-and-conquer method, which is compressed storage in a sparse matrix, and an efficient retrieval method is established between value cell and discrete point by identification code, which is effectively to improve the efficiency of the construction of Triangular Irregular Network(TIN). According to the density of value cells, a default square search space is acquired, and it is allowed to create the square search space dynamically in the expansion process of TIN, which ensures the accuracy of the grid growing. Experimental results show that the time complexity of the proposed algorithm is O(nlogn), and the algorithm is available to both small and massive amount of discrete points.
According to the widespread use and various Quality of Service(QoS) for VANET application, an end-to-end communication software bus with callback function, registered API and communication mechanism of virtual shared memory is proposed under the guidance of design method. This software bus supports TCP, UDP AUDP(Acknowledged User Datagram Protocol) and various transport protocols extension, and is convenient for loosely coupled system integration and transparent information transmission. Simulation result indicates that the software bus is able to satisfy diverse QoS, including average delay of end to end, average jitter and packet delivery radio by setting up priority.
A Call Admission Control(CAC) scheme based on load balance is proposed to avoid the congestion due to the asymmetry of service resource requirements. Traffic is classified in this scheme. According to system’s different uplink load and downlink load situation, different method is adopted to reduce load imbalance distance of system. The aim to load balance is achieved. Numerical results demonstrate that the scheme can reduce blocking rate well and improve performance of system efficiently.
To solve the deficiency in efficiency, complication and utility of the existing main sensing algorithms, this paper analyzes a way of spectrum sensing derived on waveform, based on which it puts forward a combined detection method associated with energy sensing. According to the numerical analysis and simulation results, it concludes that the combined sensing can effectively detect the spectrum hole and meanwhile, overcome the problem of poor detection effect under low signal to noise ratio, which makes it better than waveform detection and energy detection in detection efficiency, reliability, stability and other performance.
This paper addresses the problem of Signal-to-Noise(SNR) estimation in wireless Single Input Multiple Output(SIMO) channels. It implements four algorithms of SNR estimation, expectation-maximization estimator, second-and fourth-order moments estimator, fourth-order moment estimator and sixth-order estimator, in common simulated channels and analyzes the reasons that may affect performances of the algorithms, such as the number of the antennae, modulation mode, noise power and so on. Simulated performances are compared with a published Cramer-Rao Lower Bound(CRLB). It also analyzes the complexity of the algorithms.
This paper proposes a new watermark algorithm based on the chaotic sequence to solve the security problems of Yeung-Mintzer algorithm and it has a significant improvement on the image invisibility and the tamper detection rate, while retains the other advantages. The method is intended for use in image verification applications, where one is interested in knowing whether and where the content of an image is altered maliciously. Theoretical analysis and experimental results prove that this algorithm has a great practicability and can be used for legal evidence image and medical image.
According to Data Encryption Standard(DES) key schedule characteristics and abandoning the original parity bit, this paper receives 16-rounds subkey by transposing from the remaining 56 bit. Based on the order of each subkey and absent bit, it properly sets plaintext difference and key difference, and obtains 5-rounds differential characteristic. Depending on related-key differential method, it analyzes 5-rounds DES and gets 9-rounds DES related key Boomerang attack. The attack time complexity is about 231 times encryption and decrypted operations. The data complexity is 240.
A video object watermark algorithm using Scale-Invariant Feature Transform(SIFT) features and video segmentation based on spatio-temporal information is proposed. The watermark message is embedded in Discrete Cosine Transform(DCT) domain of the detected video object region. Before embedding the watermark, the object SIFT features are detected and registered in advance. In the detecting scheme, the object is corrected by using feature matching, and the message can be detected. Experimental results show that the algorithm can well protect the video object and be robust to geometric attacks and usual signal processing attacks.
This paper proposes a new Linear Discriminant Analysis(LDA) for face recognition based on the graph embedding and regularization. The unsupervised optimal class separate criterion is built, and it proposes a method to get this projection vector on the graph embedding frame. It can get a huge save of computational consumption and utilize the class information of samples more effectively. Experimental results demonstrate the effectiveness and efficiency of this method.
This paper constructs parallel model based on Open Multi-processing(OpenMP) and parallel model based on Message Passing Interface(MPI) in multi-core environment, and constructs parallel model based on MPI and parallel model based on MPI+OpenMP in the multi-core clusters. The preferred strategy of dynamic ant colony and the strategy of sub-cycle exchange are presented. Finding optimized path of road is used to compare the three models. Experimental results show that MPI-based model run faster and get higher speedup than OpenMP-based model. In multi-core environment, hybrid model of MPI+OpenMP gets higher speedup than MPI-based model with more processes.
This paper presents an online adjusting method of Proportion Integration Differentiation(PID) parameters based on Quantum Neural Networks(QNNs). By designing a controlled quantum rotation gate, a quantum neuron model is constructed, including two kinds of design parameters: rotation angle of qubits phase and its control range. A quantum neural networks model based on quantum neuron is proposed. By using gradient descent algorithm, a learning algorithm of the model is designed. Experimental results show that both the adjusting ability and the stability of QNNs model are superior to that of the Back Propagation(BP) networks.
In the multi-platform multi-sensor tracking system, this paper presents a deviation registration and target tracking algorithm with a fading factor. A new registration deviation model is built based on the deviation registration and the target stats, a fading factor is introduced to tracking process in order to improve the system robust, due to it can be fast response to abrupt change of states. Simulated results show that the algorithm can make the system deviation estimates rapidly converge to near the real value, and it has good adaptability and can improve the system’s overall tracking precision when the deviation is mutation.
In the image registration process, the computational complexity is the major problem of the traditional Hausdorff distance algorithm. This paper proposes an image registration fast algorithm based on Hausdorff distance. Edge examination to the reference image and the image is registration, and then chooses a template, sets a variable threshold to improve the Hausdorff distance algorithm so as to reduce the amount of unnecessary to achieve rapid match. According to the matched data, it carries on the scale transformation and the rotation operation to the image, enables two images registration in the space. Experimental result proves that, comparing with the traditional matching algorithm, the computational complexity reduced greatly.
To solve the problem of spectral deviation for Time-Varying Auto-Regressive(TVAR) model parametric spectrum estimation, this paper proposes a TVAR parameter estimation method based on Genetic Algorithm(GA) and combined objective function and the method is used to model the flight vibration time series and its spectrum estimation. An initial estimation of the parameters is acquired by the U-C algorithm; through modern spectrum estimation theory and the necessary condition of extreme value for continuous function, a constraint equation of model parameters is derived and a combined adaptability function is constructed; the GA is used to optimize the initial parameter estimation. Application results verifies the efficiency of the method.
Fast motion estimation algorithm based on the inputted stream information is proposed for the down-sizing video transcoding. The predicted motion vector is synthesized by using the motion vectors and coefficients of the inputted stream. The conformity of the motion vectors in the related region is analyzed. The search strategy of motion estimation is adjusted according to the predicted motion vector, the conformity and the frame activity. Experimental results show that, this algorithm reduces above 20% of encoder time as compared to the diamond search algorithm, while it maintains a reasonable video quality. It also achieves higher performance and better quality than AMVR-DIM algorithm.
Aiming at the not timely monitoring for the change of temperature and humidity when grain is in store, which causes the grain in a moldy condition, this paper accomplishes the monitoring system for condition of stored-grain which combines temperature and humidity inspection, and the wireless data transmission by WSN technology. It introduces the system architecture, hardware and software design and monitoring platform design. Proved through practice, this system is featured for high stability, anti-sepsis, mould proof, lightning protection, low-consuming and low-cost, which ensures the storage security effectively.
Test Vectors Applied by Circuit-under-test itself(TVAC) is a new Built-in Self-test(BIST) scheme. Two different TVAC structures for synchronous full scan sequential circuits are presented. Experimental results on ISCAS89 benchmark circuits demonstrate that, compared with the weighted-random-pattern test and Circular Self-test Path(CSTP) method, the TVAC scheme can reach higher fault coverage with smaller test vectors.
On the basis of the analysis for Intergroup Complementary(IGC) code and zero correlation zone complementary code, a modified IGC code is proposed to adapt M-ary orthogonal code spreading spectrum system or quasi-synchronous CDMA system. Theoretical research and simulation results show that the main advantages of the modified IGC code are as following: The code sets of the modified IGC code is more than IGC code under the same code length. The zero correlation zone length is longer than the intergroup IGC code, but shorter than the intergroup IGC code. Under the same code length, the auto-correlation performance of the modified IGC code is better than that of the IGC code, and both are of similar cross-correlation performance.
For detecting the potential common errors of integrated circuit designs quickly and efficiently, this paper introduces a novel error defection approach based on static analysis. The proposed approach can find errors, such as deadlocks in state machines, errors in pin configuration, by automatically deriving information about the behavior of Register-Transfer Level(RTL) design under verification. Experimental results show that compared with other verification methods, the static method can find errors automatically, efficiently and accurately. It can be reused for any other RTL design to detect errors before simulation.