查看更多>>摘要:In this paper, the consensus tracking problem of leader-following nonlinear control time-delay multiagent systems with directed communication topology is addressed. An improved high-order iterative learning control scheme with time-delay is proposed, where the local information between agents is considered. The uniformly global Lipschitz condition is applied to deal with the nonlinear dynamics. Then, a sufficient condition is driven, which guarantees that all the following agents track the trajectory of leader. Also, the convergence of proposed control protocol is analyzed by the norm theory. Finally, two cases are provided to illustrate the validity of theoretical results.
Hafeez AnwarFarman UllahAta Ur RehmanRehmat Ullah...
9页
查看更多>>摘要:We propose drowsiness detection in real-time surveillance videos by determining if a person's eyes are open or closed. As a first step, the face of the subject is detected in the image. In the detected face, the eyes are localized and filtered with an extended Sobel operator to detect the curvature of the eyelids. Once the curves are detected, concavity is used to tell whether the eyelids are closed or open. Consequently, a concave upward curve means the eyelid is closed whereas a concave downwards curve means the eye is open. The proposed method is also implemented on hardware in order to be used in real-time scenarios, such as driver drowsiness detection. The evaluation of the proposed method used three image datasets, where images in the first dataset have a uniform background. The proposed method achieved classification accuracy of up to 95% on this dataset. Another benchmark dataset used has significant variations based on face deformations. With this dataset, our method achieved classification accuracy of 70%. A real-time video dataset of people driving the car was also used, where the proposed method achieved 95% accuracy, thus showing its feasibility for use in real-time scenarios.
查看更多>>摘要:This paper exploits a self-powered secondary relay to not only maintain but also secure communications between a secondary source and a secondary destination in cognitive radio networks when source-destination channel is unavailable. The relay scavenges energy from radio frequency (RF) signals of the primary transmitter and the secondary source and consumes the scavenged energy for its relaying activity. Under the maximum transmit power constraint, Rayleigh fading, the primary outage constraint, and the interference from the primary transmitter, this paper suggests an accurate closed-form expression of the secrecy outage probability to promptly assess the security performance of relaying communications in energy scavenging cognitive networks. The validity of the proposed expression is verified by computer simulations. Numerous results demonstrate the security performance saturation in the range of large maximum transmit power or high required outage probability of primary users. Moreover, the security performance is a function of several system parameters among which the relay's position, the power splitting factor, and the time splitting factor can be optimized to achieve the minimum secrecy outage probability.
查看更多>>摘要:Crowdsourcing is the perfect show of collective intelligence, and the key of finishing perfectly the crowdsourcing task is to allocate the appropriate task to the appropriate worker. Now the most of crowdsourcing platforms select tasks through tasks search, but it is short of individual recommendation of tasks. Tag-semantic task recommendation model based on deep learning is proposed in the paper. In this paper, the similarity of word vectors is computed, and the semantic tags similar matrix database is established based on the Word2vec deep learning. The task recommending model is established based on semantic tags to achieve the individual recommendation of crowdsourcing tasks. Through computing the similarity of tags, the relevance between task and worker is obtained, which improves the robustness of task recommendation. Through conducting comparison experiments on Tianpeng web dataset, the effectiveness and applicability of the proposed model are verified.
查看更多>>摘要:Authentication protocol verification is a difficult problem. The problem of "state space explosion" has always been inevitable in the field of verification. Using inductive characteristics, we combine mathematical induction and model detection technology to solve the problem of "state space explosion" in verifying the OSK protocol and VOSK protocol of RFID system. In this paper, the security and privacy of protocols in RFID systems are studied and analysed to verify the effectiveness of the combination of mathematical induction and model detection. We design a (r,s,t)-security experiment on the basis of privacy experiments in the RFID system according to the IND-CPA security standard in cryptography, using mathematical induction to validate the OSK protocol and VOSK protocol. Finally, the following conclusions are presented. The OSK protocol cannot resist denial of service attacks or replay attacks. The VOSK protocol cannot resist denial of service attacks but can resist replay attacks. When there is no limit on communication, the OSK protocol and VOSK protocol possess (r,s,t)-privacy; that is to say they can resist denial of service attacks.
查看更多>>摘要:As the density of wireless LANs increases, performance degradation caused by hidden terminals and exposed terminals becomes significant. These problems come from carrier sensing based medium access control used in current wireless LANs. Hidden terminals are created if carrier sense threshold is too high, whereas exposed terminals are created if carrier sense threshold is too low. A good threshold depends on how far nodes are placed from their destinations, but that cannot be controlled by the system. In this paper, we propose a simple scheme that makes use of multiple channels. Multiple channels could be utilized by equipping multiple radios or using advanced hardware such as SDR to divide a single channel into multiple channels. Nodes are assigned channels based on their estimated distance from the AP. Once the assignment is done, carrier sense threshold for the channel is selected so that as many concurrent transmissions take place as possible, while preventing hidden terminals. Simulation results show that the proposed mechanism achieves significantly higher throughput without causing starvation at the edge nodes.
查看更多>>摘要:Due to the dynamically changing topology of Internet of Vehicles (IoV), it is a challenging issue to achieve efficient data dissemination in IoV. This paper considers strongly connected IoV with a number of heterogenous vehicular nodes to disseminate information and studies distributed replication-based data dissemination algorithms to improve the performance of data dissemination. Accordingly, two data replication algorithms, a deterministic algorithm and a distributed randomised algorithm, are proposed. In the proposed algorithms, the number of message copies spread in the network is limited and the network will be balanced after a series of average operations among the nodes. The number of communication stages needed for network balance shows the complexity of network convergence as well as network convergence speed. It is proved that the network can achieve a balanced status after a finite number of communication stages. Meanwhile, the upper and lower bounds of the time complexity are derived when the distributed randomised algorithm is applied. Detailed mathematical results show that the network can be balanced quickly in complete graph; thus highly efficient data dissemination can be guaranteed in dense IoV. Simulation results present that the proposed randomised algorithm outperforms the present schemes in terms of transmissions and dissemination delay.
查看更多>>摘要:Due to data loss and sparse sampling methods utilized in WSNs to reduce energy consumption, reconstructing the raw sensed data from partial data is an indispensable operation. In this paper, a real-time data recovery method is proposed using the spatiotemporal correlation among WSN data. Specifically, by introducing the historical data, joint low-rank constraint and temporal stability are utilized to further exploit the data spatiotemporal correlation. Furthermore, an algorithm based on the alternating direction method of multipliers is described to solve the resultant optimization problem efficiently. The simulation results show that the proposed method outperforms the state-of-the-art methods for different types of signal in the network.
Muhammad Sajjad KhanMuhammad JibranInsoo KooSu Min Kim...
9页
查看更多>>摘要:Cognitive radio (CR) is being considered as a vital technology to provide solution to spectrum scarcity in next generation network, by efficiently utilizing the vacant spectrum of the licensed users. Cooperative spectrum sensing in cognitive radio network has a promising performance compared to the individual sensing. However, the existence of the malicious users' attack highly degrades the performance of the cognitive radio networks by sending falsified data also known as spectrum sensing data falsification (SSDF) to the fusion center. In this paper, we propose a double adaptive thresholding technique in order to differentiate legitimate users from doubtful and malicious users. Prior to the double adaptive approach, the maximal ratio combining (MRC) scheme is utilized to assign weight to each user such that the legitimate users experience higher weights than the malicious users. Double adaptive threshold is applied to give a fair chance to the doubtful users to ensure their credibility. A doubtful user that fails the double adaptive threshold test is declared as a malicious user. The results of the legitimate users are combined at the fusion center by utilizing Dempster-Shafer (DS) evidence theory. Effectiveness of the proposed scheme is proved through simulations by comparing with the existing schemes.
Maria Jesus AlgarIsaac Martin de DiegoAlberto Fernandez-IsabelMiguel Angel Monjas...
11页
查看更多>>摘要:Voice transmission is no longer the main usage of mobile phones. Data transmissions, in particular Internet access, are very common actions that we might perform with these devices. However, the spectacular growth of the mobile data demand in 5G mobile communication systems leads to a reduction of the resources assigned to each device. Therefore, to avoid situations in which the Quality of Experience (QoE) would be negatively affected, an automated system for degradation detection of video streaming is proposed. This approach is named QoE Management for Mobile Users (QoEMU). QoEMU is composed of several modules to perform a real-time analysis of the network traffic, select a mitigation action according to the information of the traffic and to some predefined policies, and apply these actions. In order to perform such tasks, the best Key Performance Indicators (KPIs) for a given set of video traces are selected. A QoE Model is trained to define a global QoE for the set of traces. When an alert regarding degradation in the quality appears, a proper mitigation plan is activated to mitigate this situation. The performance of QoEMU has been evaluated over a degradation situation experiments with different video users.