University of Electronic Science and Technology of China

Displaying 1-18 of 18 results

  • White Papers // Feb 2012

    A Group-Based Data Transmission Algorithm in Delay Tolerant Sensor Networks

    This paper proposes an efficient data delivery algorithm called Group-based Data Transmission (GDT) for Delay Tolerant Mobile Sensor Networks (DTMSN). In GDT, the authors introduce the principle of node's "Group exercise" behavioral characteristics in data transmission in order to deal with the problem of mobility model used in delay tolerant...

    Provided By University of Electronic Science and Technology of China

  • White Papers // Jan 2012

    Grid-Based Selective Replication Adaptive Data Delivery Scheme for Delay Tolerant Sensor Networks

    Delay Tolerant Networks (DTNs) is a class of networks where there may not exist the end-to-end paths, and communication routes may only be available through moving. For this reason, DTNs can also be referred as Intermittently Connected Networks (ICNs). In this paper, firstly, the Random Waypoint Model (RWM) which is...

    Provided By University of Electronic Science and Technology of China

  • White Papers // Jan 2012

    Performance of Polarimetric Statistical MIMO Radar on Stealth Target Detection

    Multiple Input Multiple Output (MIMO) radar with widely separated antennas exploits spatial diversity to obtain more information about target while polarimetric radar offers improved performance by exploiting polarization diversity. The authors study a radar system that combines the gains offered by polarimetric diversity and spatial diversity, namely polarimetric statistical MIMO...

    Provided By University of Electronic Science and Technology of China

  • White Papers // Dec 2011

    Preference Location-Based Routing in Delay Tolerant Networks

    Routing in Delay Tolerant Networks (DTNs) is a challenge due to the fact that the network graph is intermittently connected. However, routing benefits considerably if one can take advantage of knowledge concerning nodes mobility, recent studies have shown that human have location visiting preferences in their daily mobility traces, considering...

    Provided By University of Electronic Science and Technology of China

  • White Papers // Dec 2011

    Tracking Moving Object Via Unscented Particle Filter in Sensor Network

    Moving object tracking is one of the typical applications in Wireless Sensor Network (WSN). As a result, a lot of important solutions have been proposed in the last decade, toward addressing different aspects of object tracking in WSN settings. This paper describes an Unscented Particle Filter (UPF) based Moving Object...

    Provided By University of Electronic Science and Technology of China

  • White Papers // Oct 2011

    A Novel Mutual Authentication Scheme Based on Fingerprint Biometric and Nonce Using Smart Cards

    In 2007, Khan-Zhang made an enhancement based on Lin-Lai's flexible biometrics remote user authentication scheme. The scheme has the merits of providing mutual authentication, no verification table, freely changing password and preventing the server spooling attack. However, this authentication scheme has been found to be vulnerable to the insider attack,...

    Provided By University of Electronic Science and Technology of China

  • White Papers // Jun 2011

    Flow-Based Travel Plan Via VANET

    As the traffic congestion increases, vehicles can make a route design aiming at minimizing the travel time through geography information provided by GPS device. However, whether the shortest route that are selected between the source and destination according to the Dijkstra algorithm is the minimum time consuming one is uncontrollable...

    Provided By University of Electronic Science and Technology of China

  • White Papers // Apr 2011

    A Novel Model for Load Balancing in Cloud Data Center

    Cloud computing is an emerging computing paradigm and rising fast with its data center's growth at an unprecedented rate. Although the development tools and techniques for the cloud have been extensively investigated, the load balancing problem has not been comprehensively studied. The traditional techniques do not fit to the cloud...

    Provided By University of Electronic Science and Technology of China

  • White Papers // Mar 2011

    Research of Discrete/Continuous Mixed Demand for Mobile Communication Tariff Under Nonlinear Pricing Frame

    This paper attempts to discuss the tariff choice behavior under non-linear pricing frame. The essay first makes a summary of the traditional theoretical, and then modify the traditional D/C model, and finally propose a theoretical model to research selecting and using behavior when facing tariffs contains variety of services under...

    Provided By University of Electronic Science and Technology of China

  • White Papers // Jan 2011

    Exponential Stability and Periodicity of a Class of Cellular Neural Networks With Time-Varying Delays

    The problem of exponential stability and periodicity for a class of Delayed Cellular Neural Networks (DCNNs) with time-varying delays is investigated. By dividing the network state variables into subgroups according to the characters of the neural networks, some sufficient conditions for exponential stability and periodicity are derived via the methods...

    Provided By University of Electronic Science and Technology of China

  • White Papers // Sep 2010

    Encoded Packet-Assisted Rescue Approach to Reliable Unicast in Wireless Networks

    Recently, there has been a growing interest of using network coding to support reliable unicast over an error-prone channel. However, previous network coding schemes focused only on native packets and ignored the role of encoded packets. In this paper, the authors develop an efficient retransmission approach with network coding method,...

    Provided By University of Electronic Science and Technology of China

  • White Papers // Sep 2010

    An Efficient Retransmission Based on Network Coding With Unicast Flows

    Recently, network coding technique has emerged as a promising approach that supports reliable transmission over wireless loss channels. In existing protocols where users have no interest in considering the encoded packets they had over coding or decoding operations, this rule is inefficient and expensive. This paper studies the impact of...

    Provided By University of Electronic Science and Technology of China

  • White Papers // Aug 2010

    A Resource Allocation Algorithm in Cognitive Radio Networks Based on Cooperative Game Theory Approach

    In cognitive networks, the parameters of radios were adapted to achieve end-to-end or network objectives such as spectral or energy efficiency, reliability, or throughput maximization. In these networks, the licensed spectrum and dynamic spectrum sharing based on opportunistic communication play an important role of resource allocation. Since the resource allocation...

    Provided By University of Electronic Science and Technology of China

  • White Papers // Jan 2010

    Analyzing the Factors Affecting Network Lifetime for Cluster-Based Wireless Sensor Networks

    Cluster-based wireless sensor networks enable the efficient utilization of the limited energy resources of the deployed sensor nodes and hence prolong the node as well as network lifetime. Low Energy Adaptive Clustering Hierarchy (LEACH) is one of the most promising clustering protocols proposed for wireless sensor networks. This paper provides...

    Provided By University of Electronic Science and Technology of China

  • White Papers // Jan 2010

    Identity-Based Threshold Signature Secure in the Standard Model

    Recently, design of IDentity-based (ID-based) threshold signature schemes which are efficient and provably secure in the standard model has drawn great concerns. In this paper, an ID-based threshold signature scheme based on Paterson and Schuldt's signature scheme is presented. The proposed construction is proved secure in the standard model and...

    Provided By University of Electronic Science and Technology of China

  • White Papers // Oct 2009

    Extracting contour lines from topographic maps based on cartography and graphics knowledge

    This paper addresses the problem of contour line extraction from scanned topographic maps in poor condition. A novel method is developed, using knowledge of cartography and graphics to extract contours by removing other layers which overlay the contours, and reconstructing the contour lines. The contributions of this paper are the...

    Provided By University of Electronic Science and Technology of China

  • White Papers // Sep 2009

    Cloud Computing: Architecture for Efficient Provision of Services

    Reliability, efficiency (in term of time consumption) and effectiveness in resources utilization are the desired quality attributes of cloud scheduling system, the main purpose of which is to execute jobs optimally, i.e. with minimum average waiting, turnaround and response time. Replication provides improved availability, decreased bandwidth use, increased fault tolerance,...

    Provided By University of Electronic Science and Technology of China

  • White Papers // Nov 2008

    Soft-Output MIMO MMSE V-BLAST Detector Under ML Channel Estimation and Channel Correlation

    In practical wireless Multiple-Input Multiple-Output (MIMO) communications system, the channel estimation must be imperfect. Unfortunately, the channel estimation errors have not been taken into account by existing soft-output MIMO Minimum Mean Square Error (MMSE) Vertical Bell Lab Space Time (VBLAST) detectors when calculating the Log-Likelihood Ratio (LLR) of each coded...

    Provided By University of Electronic Science and Technology of China

  • White Papers // Jan 2011

    Exponential Stability and Periodicity of a Class of Cellular Neural Networks With Time-Varying Delays

    The problem of exponential stability and periodicity for a class of Delayed Cellular Neural Networks (DCNNs) with time-varying delays is investigated. By dividing the network state variables into subgroups according to the characters of the neural networks, some sufficient conditions for exponential stability and periodicity are derived via the methods...

    Provided By University of Electronic Science and Technology of China

  • White Papers // Apr 2011

    A Novel Model for Load Balancing in Cloud Data Center

    Cloud computing is an emerging computing paradigm and rising fast with its data center's growth at an unprecedented rate. Although the development tools and techniques for the cloud have been extensively investigated, the load balancing problem has not been comprehensively studied. The traditional techniques do not fit to the cloud...

    Provided By University of Electronic Science and Technology of China

  • White Papers // Sep 2010

    An Efficient Retransmission Based on Network Coding With Unicast Flows

    Recently, network coding technique has emerged as a promising approach that supports reliable transmission over wireless loss channels. In existing protocols where users have no interest in considering the encoded packets they had over coding or decoding operations, this rule is inefficient and expensive. This paper studies the impact of...

    Provided By University of Electronic Science and Technology of China

  • White Papers // Sep 2010

    Encoded Packet-Assisted Rescue Approach to Reliable Unicast in Wireless Networks

    Recently, there has been a growing interest of using network coding to support reliable unicast over an error-prone channel. However, previous network coding schemes focused only on native packets and ignored the role of encoded packets. In this paper, the authors develop an efficient retransmission approach with network coding method,...

    Provided By University of Electronic Science and Technology of China

  • White Papers // Jan 2010

    Analyzing the Factors Affecting Network Lifetime for Cluster-Based Wireless Sensor Networks

    Cluster-based wireless sensor networks enable the efficient utilization of the limited energy resources of the deployed sensor nodes and hence prolong the node as well as network lifetime. Low Energy Adaptive Clustering Hierarchy (LEACH) is one of the most promising clustering protocols proposed for wireless sensor networks. This paper provides...

    Provided By University of Electronic Science and Technology of China

  • White Papers // Oct 2011

    A Novel Mutual Authentication Scheme Based on Fingerprint Biometric and Nonce Using Smart Cards

    In 2007, Khan-Zhang made an enhancement based on Lin-Lai's flexible biometrics remote user authentication scheme. The scheme has the merits of providing mutual authentication, no verification table, freely changing password and preventing the server spooling attack. However, this authentication scheme has been found to be vulnerable to the insider attack,...

    Provided By University of Electronic Science and Technology of China

  • White Papers // Oct 2009

    Extracting contour lines from topographic maps based on cartography and graphics knowledge

    This paper addresses the problem of contour line extraction from scanned topographic maps in poor condition. A novel method is developed, using knowledge of cartography and graphics to extract contours by removing other layers which overlay the contours, and reconstructing the contour lines. The contributions of this paper are the...

    Provided By University of Electronic Science and Technology of China

  • White Papers // Jan 2010

    Identity-Based Threshold Signature Secure in the Standard Model

    Recently, design of IDentity-based (ID-based) threshold signature schemes which are efficient and provably secure in the standard model has drawn great concerns. In this paper, an ID-based threshold signature scheme based on Paterson and Schuldt's signature scheme is presented. The proposed construction is proved secure in the standard model and...

    Provided By University of Electronic Science and Technology of China

  • White Papers // Nov 2008

    Soft-Output MIMO MMSE V-BLAST Detector Under ML Channel Estimation and Channel Correlation

    In practical wireless Multiple-Input Multiple-Output (MIMO) communications system, the channel estimation must be imperfect. Unfortunately, the channel estimation errors have not been taken into account by existing soft-output MIMO Minimum Mean Square Error (MMSE) Vertical Bell Lab Space Time (VBLAST) detectors when calculating the Log-Likelihood Ratio (LLR) of each coded...

    Provided By University of Electronic Science and Technology of China

  • White Papers // Aug 2010

    A Resource Allocation Algorithm in Cognitive Radio Networks Based on Cooperative Game Theory Approach

    In cognitive networks, the parameters of radios were adapted to achieve end-to-end or network objectives such as spectral or energy efficiency, reliability, or throughput maximization. In these networks, the licensed spectrum and dynamic spectrum sharing based on opportunistic communication play an important role of resource allocation. Since the resource allocation...

    Provided By University of Electronic Science and Technology of China

  • White Papers // Dec 2011

    Tracking Moving Object Via Unscented Particle Filter in Sensor Network

    Moving object tracking is one of the typical applications in Wireless Sensor Network (WSN). As a result, a lot of important solutions have been proposed in the last decade, toward addressing different aspects of object tracking in WSN settings. This paper describes an Unscented Particle Filter (UPF) based Moving Object...

    Provided By University of Electronic Science and Technology of China

  • White Papers // Dec 2011

    Preference Location-Based Routing in Delay Tolerant Networks

    Routing in Delay Tolerant Networks (DTNs) is a challenge due to the fact that the network graph is intermittently connected. However, routing benefits considerably if one can take advantage of knowledge concerning nodes mobility, recent studies have shown that human have location visiting preferences in their daily mobility traces, considering...

    Provided By University of Electronic Science and Technology of China

  • White Papers // Mar 2011

    Research of Discrete/Continuous Mixed Demand for Mobile Communication Tariff Under Nonlinear Pricing Frame

    This paper attempts to discuss the tariff choice behavior under non-linear pricing frame. The essay first makes a summary of the traditional theoretical, and then modify the traditional D/C model, and finally propose a theoretical model to research selecting and using behavior when facing tariffs contains variety of services under...

    Provided By University of Electronic Science and Technology of China

  • White Papers // Jan 2012

    Grid-Based Selective Replication Adaptive Data Delivery Scheme for Delay Tolerant Sensor Networks

    Delay Tolerant Networks (DTNs) is a class of networks where there may not exist the end-to-end paths, and communication routes may only be available through moving. For this reason, DTNs can also be referred as Intermittently Connected Networks (ICNs). In this paper, firstly, the Random Waypoint Model (RWM) which is...

    Provided By University of Electronic Science and Technology of China

  • White Papers // Jan 2012

    Performance of Polarimetric Statistical MIMO Radar on Stealth Target Detection

    Multiple Input Multiple Output (MIMO) radar with widely separated antennas exploits spatial diversity to obtain more information about target while polarimetric radar offers improved performance by exploiting polarization diversity. The authors study a radar system that combines the gains offered by polarimetric diversity and spatial diversity, namely polarimetric statistical MIMO...

    Provided By University of Electronic Science and Technology of China

  • White Papers // Feb 2012

    A Group-Based Data Transmission Algorithm in Delay Tolerant Sensor Networks

    This paper proposes an efficient data delivery algorithm called Group-based Data Transmission (GDT) for Delay Tolerant Mobile Sensor Networks (DTMSN). In GDT, the authors introduce the principle of node's "Group exercise" behavioral characteristics in data transmission in order to deal with the problem of mobility model used in delay tolerant...

    Provided By University of Electronic Science and Technology of China

  • White Papers // Jun 2011

    Flow-Based Travel Plan Via VANET

    As the traffic congestion increases, vehicles can make a route design aiming at minimizing the travel time through geography information provided by GPS device. However, whether the shortest route that are selected between the source and destination according to the Dijkstra algorithm is the minimum time consuming one is uncontrollable...

    Provided By University of Electronic Science and Technology of China

  • White Papers // Sep 2009

    Cloud Computing: Architecture for Efficient Provision of Services

    Reliability, efficiency (in term of time consumption) and effectiveness in resources utilization are the desired quality attributes of cloud scheduling system, the main purpose of which is to execute jobs optimally, i.e. with minimum average waiting, turnaround and response time. Replication provides improved availability, decreased bandwidth use, increased fault tolerance,...

    Provided By University of Electronic Science and Technology of China