Pub Date : 2012-01-01DOI: 10.3969/J.ISSN.1000-3428.2012.15.020
Zhang Ming, Wang Jing-zhuo, Dong Zijian
In order to reduce node energy consumption and improve channel utilization,an energy-efficient Medium Access Control(MAC) algorithm based on cluster for Wireless Sensor Network(WSN) called EEC-MAC is proposed.It adopts time-slot factor based on TDMA to adjust slot size to reduce data transmission delay and allows a longer sleep time for the part of nodes which have no data transmission to save energy,and forms a slot order by the residual energy coefficient to reduce the state conversion energy consumption.It uses CSMA/CA mechanism to communicate with cluster heads.Simulation results show that EEC-MAC has a better energy saving,a smaller average network delay and a longer lifetime.
{"title":"MAC Energy-efficient Algorithm in Wireless Sensor Network Based on Clustering","authors":"Zhang Ming, Wang Jing-zhuo, Dong Zijian","doi":"10.3969/J.ISSN.1000-3428.2012.15.020","DOIUrl":"https://doi.org/10.3969/J.ISSN.1000-3428.2012.15.020","url":null,"abstract":"In order to reduce node energy consumption and improve channel utilization,an energy-efficient Medium Access Control(MAC) algorithm based on cluster for Wireless Sensor Network(WSN) called EEC-MAC is proposed.It adopts time-slot factor based on TDMA to adjust slot size to reduce data transmission delay and allows a longer sleep time for the part of nodes which have no data transmission to save energy,and forms a slot order by the residual energy coefficient to reduce the state conversion energy consumption.It uses CSMA/CA mechanism to communicate with cluster heads.Simulation results show that EEC-MAC has a better energy saving,a smaller average network delay and a longer lifetime.","PeriodicalId":64641,"journal":{"name":"计算机工程","volume":"38 1","pages":"70-73"},"PeriodicalIF":0.0,"publicationDate":"2012-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70067178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-01-01DOI: 10.1109/icams.2010.5552956
Hu Zhao-wei
This paper analyzes the problems of implicit places and implicit transitions.In view of the shortage of a algoritm to resolve the implicit problems,a+~* algorithm is presented.In this algorithm,the implicit tasks are marked in another style,the model are constructed by the dependency of the tasks.It uses CPN Tools to general log files and mines the logs by ProM and a+~* algorithm.The simulation results validate the efficiency of the algorithm.
{"title":"Research of Implicit Problems in Workflow Mining","authors":"Hu Zhao-wei","doi":"10.1109/icams.2010.5552956","DOIUrl":"https://doi.org/10.1109/icams.2010.5552956","url":null,"abstract":"This paper analyzes the problems of implicit places and implicit transitions.In view of the shortage of a algoritm to resolve the implicit problems,a+~* algorithm is presented.In this algorithm,the implicit tasks are marked in another style,the model are constructed by the dependency of the tasks.It uses CPN Tools to general log files and mines the logs by ProM and a+~* algorithm.The simulation results validate the efficiency of the algorithm.","PeriodicalId":64641,"journal":{"name":"计算机工程","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2008-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1109/icams.2010.5552956","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"62298462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-01-01DOI: 10.1109/icnpcw.2007.4351603
Qi Hong-man
Several QoS technologies are presented,one single technology can not solve the QoS problem perfectly.A new QoS model is brought forward,which integrates MPLS traffic engineering,DiffServ and IntServ.Design philosophy and implementation technique of this model are brought forward.Simulations about this model in NS2 are done.Compared with MPLS network,network delay is shortened and packets loss rate is decreased by 20% in proposed model.
{"title":"QoS Model of Next Generation Network Based on MPLS","authors":"Qi Hong-man","doi":"10.1109/icnpcw.2007.4351603","DOIUrl":"https://doi.org/10.1109/icnpcw.2007.4351603","url":null,"abstract":"Several QoS technologies are presented,one single technology can not solve the QoS problem perfectly.A new QoS model is brought forward,which integrates MPLS traffic engineering,DiffServ and IntServ.Design philosophy and implementation technique of this model are brought forward.Simulations about this model in NS2 are done.Compared with MPLS network,network delay is shortened and packets loss rate is decreased by 20% in proposed model.","PeriodicalId":64641,"journal":{"name":"计算机工程","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2008-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1109/icnpcw.2007.4351603","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"62310807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-08-14DOI: 10.1109/ICNSC.2006.1673132
Xue Yanxiang
This paper analyzes and contrasts the difference between conventional access control objects and share device resources.It presents device resource characteristics,such as time-dependent permit diversity privilege,access capacity and process-dependent.According to the four key characteristics and role-based access control model,it introduces several concepts such as dynamic actor,permanent role and device access policy etc.A remote device access control(RDAC) model is presented.This model satisfies the requirement for describing online device and access control.
{"title":"A Security Model for Online Accessing to Share Devices","authors":"Xue Yanxiang","doi":"10.1109/ICNSC.2006.1673132","DOIUrl":"https://doi.org/10.1109/ICNSC.2006.1673132","url":null,"abstract":"This paper analyzes and contrasts the difference between conventional access control objects and share device resources.It presents device resource characteristics,such as time-dependent permit diversity privilege,access capacity and process-dependent.According to the four key characteristics and role-based access control model,it introduces several concepts such as dynamic actor,permanent role and device access policy etc.A remote device access control(RDAC) model is presented.This model satisfies the requirement for describing online device and access control.","PeriodicalId":64641,"journal":{"name":"计算机工程","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2006-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1109/ICNSC.2006.1673132","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"62310817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-10-01DOI: 10.1007/S11771-005-0025-X
S. Zhu, P. Cui, Cheng-guo Shen, Ying Guo
{"title":"Scanner external calibration algorithm based on fixed point in robot remanufacturing system","authors":"S. Zhu, P. Cui, Cheng-guo Shen, Ying Guo","doi":"10.1007/S11771-005-0025-X","DOIUrl":"https://doi.org/10.1007/S11771-005-0025-X","url":null,"abstract":"","PeriodicalId":64641,"journal":{"name":"计算机工程","volume":"12 1","pages":"133-137"},"PeriodicalIF":0.0,"publicationDate":"2005-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/S11771-005-0025-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"53082738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-05-01DOI: 10.1142/9789812702654_0157
Qing-hua Zhang, Jiming Zheng
The efficient realization of Rijndael algorithm is always a hotpot in research. This paper at first analyzes encryption process of Rijndael, and then it puts forward speedy encryption means based on check-table. The chief method is constructing s-table and mixcolumn-list. By checking table or list twice and 12 times simple circle shift and sum modulo 2, the encrypting of the plaintext can be realized. Thereby the realization efficiency of Rijndael algorithm is improved. At the same time this paper analyzes the excellent performances of Rijndael algorithm in contrast to DES.
{"title":"Efficient Realization of Rijndael and Its Performance Analysis","authors":"Qing-hua Zhang, Jiming Zheng","doi":"10.1142/9789812702654_0157","DOIUrl":"https://doi.org/10.1142/9789812702654_0157","url":null,"abstract":"The efficient realization of Rijndael algorithm is always a hotpot in research. This paper at first analyzes encryption process of Rijndael, and then it puts forward speedy encryption means based on check-table. The chief method is constructing s-table and mixcolumn-list. By checking table or list twice and 12 times simple circle shift and sum modulo 2, the encrypting of the plaintext can be realized. Thereby the realization efficiency of Rijndael algorithm is improved. At the same time this paper analyzes the excellent performances of Rijndael algorithm in contrast to DES.","PeriodicalId":64641,"journal":{"name":"计算机工程","volume":"1 1","pages":"1051-1058"},"PeriodicalIF":0.0,"publicationDate":"2004-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"64017996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-01-01DOI: 10.1109/icosp.2004.1441502
Cheng Ying
This paper proposes a wavelet based optimal algorithm for image fusion. The algorithm aims at solving problem of preserving spatial and spectrum information at the same time. First it enhances respectively low frequency of multi spectral image and high frequency of high resolution image through wavelet transform. Then, it fuses them. So this approach optimizes traditional wavelet transform fusion method. Through the experiment merging images data of different SAR and TM image to the same object from different resolution images data, the result shows this approach reduces blocking effects while holding actively spectrum information. It provides a more satisfactory fusion outcome.
{"title":"An Optimal Algorithm of Multi-sensor Image Fusion Based on Wavelet Transform","authors":"Cheng Ying","doi":"10.1109/icosp.2004.1441502","DOIUrl":"https://doi.org/10.1109/icosp.2004.1441502","url":null,"abstract":"This paper proposes a wavelet based optimal algorithm for image fusion. The algorithm aims at solving problem of preserving spatial and spectrum information at the same time. First it enhances respectively low frequency of multi spectral image and high frequency of high resolution image through wavelet transform. Then, it fuses them. So this approach optimizes traditional wavelet transform fusion method. Through the experiment merging images data of different SAR and TM image to the same object from different resolution images data, the result shows this approach reduces blocking effects while holding actively spectrum information. It provides a more satisfactory fusion outcome.","PeriodicalId":64641,"journal":{"name":"计算机工程","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2004-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1109/icosp.2004.1441502","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"62310844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-11-02DOI: 10.1109/ICMLC.2003.1260027
Jianming Zhang, Liang-min Wang, Dejiao Niu, Y. Zhan
Locating the lip in video sequences is one of the primary steps of the automatic lipreading system. In this paper a new approach to lip detection, which is based on Red Exclusion and Fisher transform, is presented. In this approach, firstly, we locate face region with skin-color model and motion correlation, then trisect the face image and take into account the lowest part, in which the lip lies, for the next processing. Secondly, we exclude R-component in RGB color space, then use G-component and B-component as the Fisher transform vector to enhance the lip image. Finally, in the enhanced image, we adaptively set the threshold to separate the lip color and the skin color in the light of the normal distribution of the gray value histogram. The experimental results showed that this fast approach is very efficient in detecting the whole lip and not affected by illuminant and different speakers.
{"title":"Research and implementation of a real time approach to lip detection in video sequences","authors":"Jianming Zhang, Liang-min Wang, Dejiao Niu, Y. Zhan","doi":"10.1109/ICMLC.2003.1260027","DOIUrl":"https://doi.org/10.1109/ICMLC.2003.1260027","url":null,"abstract":"Locating the lip in video sequences is one of the primary steps of the automatic lipreading system. In this paper a new approach to lip detection, which is based on Red Exclusion and Fisher transform, is presented. In this approach, firstly, we locate face region with skin-color model and motion correlation, then trisect the face image and take into account the lowest part, in which the lip lies, for the next processing. Secondly, we exclude R-component in RGB color space, then use G-component and B-component as the Fisher transform vector to enhance the lip image. Finally, in the enhanced image, we adaptively set the threshold to separate the lip color and the skin color in the light of the normal distribution of the gray value histogram. The experimental results showed that this fast approach is very efficient in detecting the whole lip and not affected by illuminant and different speakers.","PeriodicalId":64641,"journal":{"name":"计算机工程","volume":"5 1","pages":"2795-2799 Vol.5"},"PeriodicalIF":0.0,"publicationDate":"2003-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1109/ICMLC.2003.1260027","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"62310666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}