Skip to main content

previous disabled Page of 3
and
  1. No Access

    Chapter and Conference Paper

    Application and Research in DSSS Based on Chaotic Sequence

    In this paper, chaotic sequence is produced by Logistic map. The sensitivity of initial value, relevance and run length are analyzed. Chaotic sequence and m sequence are compared in the DS-CDMA communication s...

    Wei Wang, **xian Yang, Peng Guo in Information Engineering and Applications (2012)

  2. No Access

    Chapter and Conference Paper

    Improved Algorithm Based on Gaussian Mixture Background Model

    Aimed at the disadvantage that Gaussian mixture background model is seriously affected by the sudden light change, this paper presents an improved algorithm based on Gaussian background model. By adding two st...

    Wei Wang, **nyuan Yang, Sui Zong in Proceedings of the International Conferenc… (2013)

  3. No Access

    Article

    DS2: A DHT-based substrate for distributed services

    DHT (Distributed Hash Table) algorithms are very efficient for distributed data management. As one kind of P2P overlay, DHT overlay also has the advantages of high reliability, high scalability and low cost. B...

    Lichun Li, **n Xu, Jun Wang, Wei Wang in Peer-to-Peer Networking and Applications (2013)

  4. No Access

    Article

    On the Accuracy of Packet Delay Estimation in Distributed Service Networks

    Packet delay (either one-way time or round-trip time) is a very important metric for measuring the performance of networks in a highly dynamic environment such as the Internet. Many network applications are al...

    Nafei Zhu, **gsha He, Yue Zhou, Wei Wang in Journal of Network and Systems Management (2013)

  5. No Access

    Book and Conference Proceedings

  6. No Access

    Chapter and Conference Paper

    The Design and Implementation of Linear Array Image Acquisition System

    The theory of Compressive Sensing is briefly introduced and the design of the linear array image acquisition system which is based on the Compressive Sensing is deduced. The system design includes two aspects:...

    Baoju Zhang, **ang Tong, Wei Wang, Jiazu **e in The Proceedings of the Second Internationa… (2014)

  7. No Access

    Chapter and Conference Paper

    Real Time Routing Optimization in ZigBee Hierarchical Networks

    ZigBee hierarchical routing protocol (HRP) provides a simple but reliable topology. However, the transmission paths in HRP are always not efficient, and the links keep invariant since they were determined when...

    Wei Song, Jiasong Mu, Wei Wang, Baoju Zhang in The Proceedings of the Second Internationa… (2014)

  8. No Access

    Chapter and Conference Paper

    Image Fusion Based on Compressed Sensing

    Compressive sensing (CS) has received a lot of interest due to its compression capability and lack of complexity on the sensor side. This paper presented a new image fusion based on compressed sensing. The met...

    **n Zhou, Wei Wang, Rui-an Liu in The Proceedings of the Second Internationa… (2014)

  9. No Access

    Chapter and Conference Paper

    Research on Time Triggered Ethernet Based on Deterministic Network Calculus

    In this paper, we present a service-performance network calculus model based on Time-Triggered Ethernet, a deterministic safety critical real-time network protocol, which is used in avionics systems. We firstl...

    Yu **ang, **ang Zhang, Zhenwei Li, Wei Wang in The Proceedings of the Second Internationa… (2014)

  10. No Access

    Chapter and Conference Paper

    Improved Hierarchical Topic Detection

    Due to characteristics of low centralization and the topic drift, how to analyze Internet news reports timely and effectively is more and more concerned. An improved hierarchical topic detection method is prop...

    Wei Wang, Mingyan Jiang, Dongfeng Yuan in Proceedings of the 2012 International Conf… (2014)

  11. No Access

    Chapter and Conference Paper

    Through Wall Human Detection Using Compressed UWB Radar Data

    The technology for through wall human detection with UWB radar was discussed. Due to the large amount of UWB radar data, compressive sensing theory was introduced and compressed UWB radar data can be collected...

    Wei Wang, Baoju Zhang, Jiasong Mu in The Proceedings of the Second Internationa… (2014)

  12. No Access

    Chapter and Conference Paper

    Storage and Analysis of Simulation Data Based on ADO and Visual C++

    The purpose of simulation is to reduce the number of actual experiments, and to minimize development costs and improve development efficiency. Simulation system is an integrated, complex system. Each parameter...

    Wei Wang in Proceedings of the 2012 International Conference on Cybernetics and Informatics (2014)

  13. No Access

    Chapter and Conference Paper

    Simplified Hybrid Routing Protocol in Low Complexity ZigBee Network

    The hierarchical routing protocol (HRP) and Z-AODV routing are two options in ZigBee networks. However, the advantages of them, such as the simplicity in HRP and the global shortest path in Z-AODV, are alterna...

    Jiasong Mu, Wei Wang, Baoju Zhang in The Proceedings of the Second Internationa… (2014)

  14. No Access

    Chapter and Conference Paper

    Minimal Global Hops Algorithm for Energy Balancing in ZigBee Hierarchical Network

    Low power consumption is one of the most significant property and pursuing object for ZigBee networks. Because of the multi-hop mechanism in wireless communication, the nodes are always uneven used from the ov...

    Jiasong Mu, Wei Wang, Baoju Zhang, Wei Song in The Proceedings of the Second Internationa… (2014)

  15. No Access

    Chapter and Conference Paper

    On-Line Anomaly Detection in Big Data Based on Compressive Sensing

    The definitions of anomaly detection and big data were presented. Due to the sampling and storage burden of anomaly detection in big data, compressive sensing theory was introduced and used in anomaly detectio...

    Wei Wang, Dunqiang Lu, **n Zhou, Baoju Zhang in The Proceedings of the Second Internationa… (2014)

  16. No Access

    Chapter and Conference Paper

    Research on Privacy Protection of WHOIS Information in DNS

    WHOIS service allows people to ask the current registrant some Internet resources. WHOIS service has become an indispensable information service in the DNS. Unfortunately, WHOIS information is often available ...

    Wei Zhang, Wei Wang, **nchang Zhang, Huiling Shi in Computer Science and its Applications (2015)

  17. No Access

    Article

    VD-PSO: An efficient mobile sink routing algorithm in wireless sensor networks

    Efficient energy consumption is crucial for energy constrained networks such as Wireless Sensor Networks (WSN). Using a mobile sink to collect the data of the nodes is a good method to balance the energy level...

    Wei Wang, Haoshan Shi, Dajun Wu, Pengyu Huang in Peer-to-Peer Networking and Applications (2017)

  18. No Access

    Article

    Secure ultra-lightweight RFID mutual authentication protocol based on transparent computing for IoV

    Transparent Computing (TC) has become a promising paradigm in the network computing era, the appearance of Transparent Computing have a real impact on the industry. A growing number of cars on the road, in ord...

    Kai Fan, Wei Wang, Wei Jiang, Hui Li in Peer-to-Peer Networking and Applications (2018)

  19. No Access

    Chapter and Conference Paper

    Modeling and Optimization for Sky Wave Propagation Loss Model Based on Enumerative Algorithm

    Sky wave propagation is one of the important methods to transmit signal and is widely used in ship broadcast communication. In order to analyze the multi-hop system and optimize the emission angle of sky-wave ...

    Yuming Gu, Zhenyu Na, **ao Liu, Huahan Zhang in Communications, Signal Processing, and Sys… (2019)

  20. No Access

    Article

    Load scheduling for distributed edge computing: A communication-computation tradeoff

    Due to the intensive computation requirements of emerging applications and the limited computational capability of edge computing servers, the computation task must be executed on multiple edge servers in a di...

    Minghui Zhao, Wei Wang, Yitu Wang in Peer-to-Peer Networking and Applications (2019)

previous disabled Page of 3