Time filter

Source Type

Niu H.,University of Tokyo | Zhu N.,GCI Science and Technology Co. | Sun L.,Xian Jiaotong University | Vasilakos A.V.,Lulea University of Technology | Sezaki K.,University of Tokyo
Wireless Networks | Year: 2015

As a promising technique for wireless networks, cooperative communications is coming to maturity in both theory and practice. The main merit of the cooperation technique is its capability in providing additional transmission links to harvest the spatial diversity gain at the physical layer. However, due to the broadcast nature of wireless medium, the diversity gain can be also freely achieved at the potential eavesdropper if the cooperation is performed blindly. To solve this problem, we propose a security-embedded opportunistic user cooperation scheme (OUCS) in this paper. The OUCS first defines a concept called secrecy-providing capability (SPC) for both the source and the cooperative relays. By comparing the values of SPC of these nodes, the OUCS jointly decides whether to cooperate and with whom to cooperate from the perspective of physical layer security. The secrecy outage performance of the OUCS is then derived. From the results we prove that full diversity can be achieved (i.e., the diversity order is N + 1 for N cooperative relays), which outperforms existing alternatives. Finally, numerical results are provided to validate the theoretical analysis. © 2015 Springer Science+Business Media New York Source

Zhu N.,GCI Science and Technology Co. | Vasilakos A.V.,Lulea University of Technology
Wireless Networks | Year: 2015

Due to reliance on batteries, energy consumption has always been of significant concern for sensor node networks. This work presents the design and implementation of a house-build experimental platform, named Energy Management System for Wireless Sensor Networks (EMrise) for the energy management and exploration on wireless sensor networks. Consisting of three parts, the SystemC-based simulation environment of EMrise enables the HW/SW co-simulation for energy evaluation on heterogeneous sensor networks. The hardware platform of EMrise is further designed to facilitate the realistic energy consumption measurement and calibration as well as accurate energy exploration. In the meantime, a generic genetic algorithm based optimization framework of EMrise is also implemented to automatically, quickly and intelligently fine tune hundreds of possible solutions for the given task to find the best suitable energy-aware tradeoffs. © 2015 Springer Science+Business Media New York Source

Du C.F.,GCI Science and Technology Co. | Xu Q.,China Unicom | Li J.H.,China Unicom
Advanced Materials Research | Year: 2014

Using feature selection and neural networks to experiment the data, then we bring a warning model of user complaints. It is the core that using the known information of network index sample to analyze and discriminate. First, the training samples need to be extract, because there are too many features in training data will have an adverse impact on machine learning classification algorithm. Using extraction method to explore the feature subset with feature, feature subset is a set of feature vectors, then the feature vectors are input into the probability neural network prediction, find out the best features quantum set. This model can be achieved using the MATLAB software, and it is operational, and it can be extended to the network quality assessment and monitoring practice. © (2014) Trans Tech Publications, Switzerland. Source

Liu F.G.,South China University of Technology | Peng Y.S.,South China University of Technology | He N.,South China University of Technology | Yang Y.Y.,South China University of Technology | And 2 more authors.
Advanced Materials Research | Year: 2013

The innovation and development of software and information technology has stimulated the mature of service-oriented architecture(SOA) platform technology, while the loosely coupled, modular, dynamic loading feature of OSGi service platform has made itself a popular architecture within the SOA community. To emb ody the advantages of the OSGi framework application with a longer lifecycle and ensure the quality of OSGi applications, we need to run a series of rigorous testing, especially integration testing. Existing tools do not support separation of testing and development, testing records playb ack or redundant test cases auto-generation. In this paper, we have analyzed the current OSGi testing techniques and tools as well as their inadequacies. Our research into OSGi testing technology has enlightened us to expand the function of the testing tools on the b asis of Pax-exam and then integrate them into the OSGi testing platform. Finally, we discuss the framework design of our OSGi integration testing platform and demonstrate the correctness and validity of the platform. © (2013) Trans Tech Publications, Switzerland. Source

Chen Q.,GCI Science and Technology Co. | Chen Q.,South China Normal University | Pei D.,Guangzhou University | Tang C.,Guangzhou University | Zhao G.,South China Normal University
Information Processing Letters | Year: 2013

Integer span program (ISP) is a monotone span program (MSP) over Z, which is introduced by Cramer and Fehr in CRYPTO 2002. ISP can be used to construct black-box secret sharing scheme (BBSSS) and linear integer secret sharing scheme (LISSS). The efficiency of ISPs is a very important research objective, as efficient ISP can be used to construct efficient BBSSS and efficient LISSS. Until now, only efficient ISPs that realize threshold access structure have been constructed, but not efficient ISPs realizing other access structures. The main contribution of this paper is that we propose an efficient ISP that realizes the hierarchical threshold access structure, to the best knowledge of the authors, which is the first efficient one for non-threshold access structure. Accordingly, with the proposed construction of efficient ISP realizing hierarchical threshold access structure, the construction of efficient non-threshold BBSSSs and LISSSs for a useful family of access structures is presented. © 2013 Published by Elsevier B.V. All rights reserved. Source

Discover hidden collaborations