A navigator in this case aims to control the mobile sensor to get close to the moving target from any initial position. Since the target maneuvers are not known a priori to the controller, solving the problem requires a real-time strategy. The joint problem of mobile sensor navigation and mobile target tracking based on a […]
VM multiplexing resource allocation scheme to manage decentralized resources
The design of our dynamic optimal proportional-share resource allocation method, which leverages the proportional share model.The key idea to redistribute available resources among running tasks dynamically, such that these tasks could use up the maximum capacity of each resource in a node (i.e., up to cðpsÞ), while each task’s execution time can be further minimized […]
Anonymization by sequential clustering for privacy-preservation in social networks
The problem of privacy-preservation in social networks.The distributed setting in which the network data is split between several data holders. Networks are structures that describe a set of entities and the relations between them. A social network, for example, provides information on individuals in some population and the links between them, which may describe relations […]
Data-intensive wireless Sensor networks
WSNs have been deployed in a variety of data intensive applications including micro-climate and habitat monitoring, precision agriculture, and audio/video surveillance. A moderate-size WSN can gather up to 1 Gb/year from a biological habitat . Due to the limited storage capacity of sensor nodes, most data must be transmitted to the base station for archiving […]
RDH techniques using directly for encrypted images
Reversible data hiding (RDH) in images is a technique, by which the original cover can be losslessly recovered after the embedded message is extracted. This important technique is widely used in medical imagery, military imagery and law forensics, where no distortion of the original cover is allowed. Since first introduced, RDH has attracted considerable research […]
Analyzing the Wisconsin Breast Cancer (WDBC) Data Set
In classification problems, the main goal is to derive an accurate representative data model that can correctly classify new test data instances. The accuracy of the classification model can be affected by the presence of outliers in a data set and the inability to correctly classify data records near the boundary. Considering the first case […]
Pricing model for cloud computing in waiting time distribution
Power dissipation and circuit delay in digital CMOS circuits can be accurately modeled by simple equations,even for complex microprocessor circuits. CMOS circuits have dynamic, static, and short-circuit power dissipation; however, the dominant component in a well-designed circuit is dynamic power consumption P. Cloud computing is quickly becoming an effective and efficient way of computing resources […]
Policy based management is a very effective method to protect sensitive information
Policy administration is the key to protecting or operating information systems. Only after a legitimate policy set is designed, can the systems run correctly. This paper proposes a policy mechanism CPA under the current trust model, where a professional policy administrator or group is absent. Recently, the security of the Android platform becomes a hotspot […]
PACKET-BY-PACKET ADAPTIVE ROUTING AND SCHEDULING ALGORITHM FOR NETWORKS
They present our adaptive routing and scheduling algorithm. Packet-by-Packet Adaptive Routing for Networks—PARN for ease for repeated reference later. A introduce the queue structure that is used in PARN. The back-pressure algorithm introduced in has been widely studied in the literature. While the ideas behind scheduling using the weights suggested in that paper have been […]
Mobile users to collect the network-wide data
We consider the problem of ubiquitous data collection by the mobile user in a wireless sensor network. The mobile user uses a handheld device to communicate with sensor nodes in the network. The mobile user roams within the network and instantly accesses network-wide data on a need basis. For instance, in the aforementioned GreenOrbs project, […]
- « Previous Page
- 1
- 2
- 3
- 4
- 5
- 6
- …
- 14
- Next Page »