Proceedings of the 3rd International Conference on Wireless Communication and Sensor Networks (WCSN 2016)

+ Advanced search
158 articles

CPRS Algorithm for Streaming Media Encryption and Its Functional Analysis for Wi-Fi Security and Rapidity

Dan Cai, Xiao-Yong Ji, Jia-Ming Pan
In order to ensure the security of the wireless network, Wi-Fi Alliance uses stream cipher algorithm RC4 to encrypt data in the security protocol WEP/WPA. RC4 is a fast algorithm but easy to break. To solve the problem, WPA2 is proposed which uses block cipher algorithm to improve the anti-crack ability...

Mobility Management Requirements for Diverse 5G Wireless Networks

Saba Qasim Jabbar, Dheyaa Jasim Kadhim, Raed Abduljabbar Aljiznawi, Naseer Hwaidi Alkhazaali
Mobile users increased demand for access to mobile communication services is accelerating the technological development towards the integration into the various modes of wireless access communications with respect to coverage, QoS assurance, implementation, operational costs supported features, etc....

Smart Helmet with Emergency Notification System-A Prototype

Sasirekha S., Joe Louis Paul I., Swamynathan S., Y. Gokul., P. Kirthana.
Motorcycles have higher rates of fatal accidents than any other automobiles in India. Hence, wearing a helmet alone is not sufficient to prevent accidents and save victims. Helmet wearing alone is not sufficient to save the life of a motor cyclist. The solution proposed in this work to address this life-threatening...

A Web Page Classification Method Based on TCP/IP Header Features

Di Huang, Xin-Yi Zhang, Qi-Wei Tang
Web page classification has wide applications. Due to various types of web pages and vast amounts of network traffic, it is difficult to classify web pages by deeply inspecting the content of each packet. This paper presents a learning-based classification method according to TCP/IP header features....

SAR Images Target Recognition Based on Wavelet and KSVD

Lei Liu, Xiang-Wei Meng, Zhao-Gen Zhong, Ke-Yuan Yu
Ship targets recognition algorithm based on wavelet domain Kernel Singular Value Decomposition(KSVD) feature extraction was proposed to deal with the problem of ship targets recognition in SAR images. Low-frequency sub-band image is obtained by two-dimension discrete wavelet decomposition of a SAR image....

Secure Relay Beamforming in Non-Regenerative Two-Way Relay Cognitive Radio Networks with Energy Harvesting Constraints

Feng-Chuang Xing, Sai Zhao, Gao-Fei Huang, Ming-Xia Lv, Gui-Yun Liu, Guo-Qi Wang, Dong Tang
In this paper, we consider the problem of nonregenerative two-way secure relay beam forming (SRB) for cognitive radio network (CRN) under the background of the simultaneous wireless information and power transfer (SWIPT). Our objective is to maximize sum rate under the transmit power constraint at the...

Wideband Spectrum Compressed Blind Sensing without Reconstruction Based on Higher-order Moment

Chuan-Hai Jiao, Yong-Cheng Li, Rui Wang
To improve the detection performance and detection speed of wideband spectrum sensing algorithms with little priori knowledge, a scheme of cooperative wideband compressed blind sensing without reconstruction based on higher-order moment (CWCBS-HOM for short) is proposed. The test statistic is extracted...

HAPS Wireless Communication Network Channel Modeling and Simulation

Xiao-Yang Liu, Chao Liu, Wan-Ping Liu, Yi-Hao Zhang, Xiao-Ping Zeng
High altitude platform station (HAPS) is a new means of wireless communication method, which operate in stratosphere whose altitude is about 20km. In order to improve the channel quality of wireless communication transmission and signal-to-noise ratio.The wirless communication network of HAPS are studied...

Fuzzy Roughness Measurement Model Based on Membership Effect

Fa-Chao Li, Li-Kun Wang
Rough fuzzy set theory and fuzzy set theory are two commonly used tools in today's uncertain type of information processing. How to construct a fusion method for two kinds of uncertain information systematically has been a focus in both academic and applied fields. By analyzing the characteristics and...

Method for IP geolocation based on Path Similarity

Lian-Xing Ren
The ability to accurately determine the geographic location of an arbitrary IP address has potential in many applications. This paper presented a novel algorithm for IP geolocating based on network measurement. Considering the features of China Internet's distribution, using trace route tools, we build...

Design of Fermentation Process Monitoring and Control System Based on LabVIEW

Feng Guo, Dong-Shuai Cui, Jie Li, Jia-Yu Cui, Chun-Tao Zhang
This paper focuses on the commonly used glass fermentation tank in biological fermentation, aiming at improving and optimizing the current monitoring process of biological fermentation. Based on the LabVIEW platform, we have designed a set of monitoring system to study biological fermentation process....

Critical Inforamtion Detection for the Prevention and Control of Burst Cybercrime Events Under the Background of Big Data

Cheng-De Zhang, Yan-Peng Pan
With the popularity of computer and internet, cybercrime is rampant. However, the characteristics of internet making it more difficult to monitor the cybercrime, such as openness anonymity high speed and across localization. In this paper, we propose a new method to prevent cybercrime. Critical Information...

A Cloud TOPSIS Method for Multiple Criteria Decision Making with Interval Number

Tie-Dan Wang, Ding-Hong Peng, Xiao-Shi Shao
In order to ensure the accuracy of decision-making, need to be integrated the inevitable uncertainty information and fuzzy information into their decision-making process. In view of this, this paper proposed a Cloud TOPSIS method with the decision matrix contained the uncertainty and fuzziness information...

Evaluation of the Rural Informatization in China under the Background of the Construction of New Socialist Countryside

Yong-Jiang Lei, Cheng-Yi Huang, Cong-Gang Fang, Ruo-Heng Tian
The paper presents a method (Improved Fuzzy Analytic Hierarchy Process) to evaluate the development of rural informatization over the past decade in China. This article developed a rural informatization evaluation system including Rural informatization infrastructure, Rural informatization technology...

Fast Handover Algorithm Based on DAD-Less Mechanism for Hierarchical Mobile IPv6

Jia-Bao Fang, Zhen-Xing Wang, Lian-Cheng Zhang
A fast handover algorithm using DAD-Less mechanism for hierarchical mobile IPv6 was proposed for the problem of mobile node handover latency by duplicate address detection in HMIPv6 in order to improve the performance of handover for HMIPv6. The IP address allocation mechanism and new interface identifier...

Cache Management Based on Node Status in Delay Tolerant Networks

Jun-She Wang, Bin Zhang
Delay Tolerant Network (DTN) is a kind of wireless network with limited resources and often occurs congestion. The effective cache management can make full use of the network resources and reduce the network congestion. Therefore, aiming at the deficiency of the current research of cache management,...

Survey on Mobility Model of Opportunistic Networks

Sheng Zhang, Ming-Hui Yao, Xin Wang, Imran Khan
Opportunistic networks is a kind of self-organizing networks which does not need the complete communication paths between the source node and the destination node. They transfer messages through communication opportunities arising from nodes movement. Because the message transmission opportunity depends...

Frequency Estimation of Weighted Signals Based On DFT Interpolation Algorithm

Chang-Gui Xie
It is generally demanded for strict frequency estimation of sinusoidal signal in a good many engineering practice situations. This paper puts forward an iterative frequency estimation algorithm on strength of the interpolation of Fourier coefficients of weighted samples. The algorithm is practically...

The development status and Countermeasures of cross border e-commerce in China

Ting Han, Ji-Shun Niu, Yan Guo
Cross-border e-commerce has been subverting the traditional model of import and export, and will become a new growth point for China's foreign trade in the future. The emergence and development of cross-border e-commerce benefits from four aspects, including the needs of economic development, consumer...

An RF-based Method for Passive Localization of Targets in Wireless Networks

Zhi-Yong Yang, Ming Gao, Lin-Lan Liu
Device-free means targets not carrying any device. Localization and tracking of device-free targets has attracted much attention due to its potential applications where the targets are not cooperative, such as safe guard system. In this paper, we propose a simple Line-Of-Sight (LOS) model and Hierarchical...

An Improved Algorithm for Indoor Location

Xiao-Feng Liu, Dong-Xu Zhang, Si-Qi An, Xu Sun
In order to improve the accuracy and efficiency of indoor location, an improved algorithm of indoor location is proposed in this paper, which is much easier and faster to achieve by a common hardware. The proposed algorithm based on the isosceles triangle layout is much more convenient to extend the...

A Distributed Solution for Fair Bandwidth Distribution among Data Flows in Wireless Networks

Ji-Yu Chen, Shi-Ping Chen
In wireless networks, it is important to ensure fairness among data flows in their access to network bandwidth. Providing end-to-end fairness in mobile networks is particularly challenging. This paper proposes a packet tagging and prioritized scheduling scheme that achieves fairness under network dynamics,...

A Remote Monitoring and Decision-Making System for the Vehicle Rental

De Long, Jian-Jun Yi, Fei-xiang Xu, Xiao-Ming Zhu
Vehicle rental service is being developed greatly in recent 10 years. A remote monitoring and decision-making system is proposed in this paper. This system can help the lessors to supervise their vehicles in real time. It also facilitates the customers to acquire the real time status of the rented vehicle,...

A Time-Slot Routing Protocol for Smart Home

Xiao Tian, Nan Chen, Xian-Deng He
By adopting ad hoc technique, the routing protocol of data network can be realized in smart home system. Due to the features of low moving speed, less number of nodes and high data rate, few present ad-hoc protocols are suitable for smart home data network. In order to make up the deficiencies of present...

Fast Single Image Haze Removal Method based on Atmospheric Scattering Model

De-Wei Huang, Ke-Xin Chen, Jian-Qiang Lu, Wei-Xing Wang
In this paper, we propose an effective and efficient method to remove haze from a single input image. We first remove fine details from the minimum channel of RGB channels by a low-pass filter and then use it as a rough estimation of the transmission map. Then, we refine the rough estimation by using...

R/S Analysis in Mobile Social Networks

Wei Zheng, Kang Zhao
In this paper, a R/S analysis method based on clustering coefficient time series is presented to testify the mobile social networks (MSNs) is fractal and organized. It is found that MSNs are fractal in the scale of clustering coefficient. Then use the Hurst exponent to make some simple forecasts if the...

A New Designated Verifier Proxy Signature in Standard Model

Li-Hong Guo, Hai-Tao Wu, Qing Yang
Proxy signature schemes have been suggested for use in a number of applications, so the security of proxy signature scheme is more and more important. However, at present, almost all the proxy signature schemas were proven secure in the random oracle model, which has received a lot of criticism. Recently,...

Finite Element Method on Contact Problem of Non-newtonian Fluid Material

Lu-Lu Ma, Lei Hou
In this paper, we use finite element method to study contact problem of non-Newtonian fluid material. We focus on Cauchy equation which describes the velocity changes in the flow field. The space domain is discrete by Lagrange interpolation function with 16-point bicubic elements. The time domain is...

Analysis of Inter-Satellite Terahertz Communication Link

Yuan-Ming Ding, Shan Gao, Xin Shi, Hao Wu
The domestic and foreign status of terahertz wireless communication is introduced, and the paper analyzes the feasibility of ultra high speed short range and high speed long range inter-satellite terahertz communication. The capacity of inter-satellite terahertz communication system under the ideal additive...

Optimal Slot Allocation Method for ITE Systems

Bin Zeng, Rui Wang
To achieve better performance and bandwidth in the mobile communication, some vendors have already introduced LTE service. The following issues concerning LTE such as performance estimation, throughput analysis, quality of service, voice/data integration are of great interest for deep research. Therefore,...

A Method of Extending Document Collaborative Editing Function of Netdisks in Cloud Environment

Yi-Na Qiao, Yun-Mei Shi
Nowadays,netdisks have played an important role in our life. The main problem of those netdisks is that they generally provide functions of file storage and retrieve, but fail to support document collaborative editing. In this paper, we analyse architectures of the general netdisks and propose a method...

Geological Cloud Platform Based on Micro Service Architecture

Shi-Jie Peng, Zhi-Ting Zhang, Chong-Long Wu
This paper analyses the main problems of the data sharing and application services of geological survey in China, and analyses the current situation of the research of the domestic and foreign qualitative cloud and big data. China Geological Survey service targets and construction of mainstream cloud...

Optimality Conditions for Discrete Optimal Control Problems

Fang-Di Kong
In this paper we consider the optimality conditions for the following discrete optimal control problem: minimize subject to The necessary and sufficient condition for all feasible solutions satisfying the necessary optimality condition to be optimal solutions of the above problem is established.

Design of Intelligent Parking System Based on Cloud Platform

Juan Fang, Ze-Qing Chang, Yan-Jin Cheng, Min Cai, Ju Li, Zeng-Jun Chen
With the increasing number of private cars in urban areas year by year, the problems such as parking difficulties and traffic congestion become the new trend of urban development, the informationization is supposed as an important means to solve the problem of urban parking. It is researched on urban...

A Routing Algorithm Based on Hybrid Antenna for Wireless Sensor Networks in Large Area

Jiang-Peng Weng, Hua-Qiang Chen, Feng-Lian Tie, Bao-Xia Sun, Wei-Xing Wang
Periodically collecting information and then transmit to a remote base station (BS) is one of the most important applications of sensor networks. But the energy restriction of battery makes this difficult, especially in large area. In order to improve the lifetime of networks in large area, we propose...

A Low Cost Posture Monitoring System Based on an Ambient Light Sensor Network

Yu-Jia Sun, Ji-Yan Yu, Xiao-Ming Wang, Neil Nergmann
This paper applies wireless sensor networks to monitoring sitting condition (presence and posture). Specifically, we develop a sitting condition monitoring system based on an ambient light sensor network. As the system is hard to be modeled, a feature learning experiment has been conducted to learn about...

Improving Image Resolution by 45-Degree Tilting-Mode Sampling

Jing Yu, Le-Le Yao, Zhen-Chun Chang, Wei-Dong Sun
A pushbroom sensor consists of a line of sensors arranged perpendicular to the flight direction of the spacecraft. The earth's surface is imaged as the spacecraft flies forward. Supermode sampling using a pair of linear arrays in quincunx arrangement has been implemented on the SPOT5 earth observation...

Advances in the Temperature Sensitivity of Soil Respiration and Carbon Balance

Xiang Huang
Global warming has led to a positive feedback loop between global carbon cycle and climate system, which will help answer regional climate change and global carbon balance. The sensitivity of soil respiration to temperature change (Q10) is a very important parameter in the regulation of regional and...

Effects of High Slag Accumulation on the Stability of Underground Tunnels

Gui-wu Han, Liu-Zheng Liang, Yin Li
In this paper one underground storage cavern's stability is studied, on the condition of high-piled-slag right over the tunnels. The finite element software ANSYS is used as a tool solving the overlying loads's effects to underground rock mass. The calculation results show that, due to the reason that...

Analysis on the Critical Condition of Active Fault Instability and the Parameters of the Interface Model

Yan-Qiong Liu, Pei-Xuan Liu, Ji-Sheng Zhao, Hong-Suai Liu
In this paper, earthquake triggering is described as the process of local instability of system in mathematical and physical way. And critical instability conditions of the fault in analysis domain are given. Based on elastic-plastic theory general constitutive relationship of the fault plane is derived....

Garbage Collection of Virtual Object in IoT

Ze-Yi Zhao, Dong Wang
Since the Internet of Things has become more and more popular, the number of devices in IoT increase at a rapid clip. Some Researches introduced virtual object to enrich the management of the devices. Therefore, virtual object life cycles will need to be thoroughly managed, so that when their usage changes...

A Row-column Hybrid Storage Approach based on Massively Parallel Processing

Qiao Sun, Lan-Mei Fu, Peng Wu, Jia-Song Sun
Massively parallel processing architecture, as a common parallel processing server architecture, is widely used in the field of mathematical modeling and database processing which require a lot of computing. This architecture can complete the calls of multiple processors by the coordination, which can...

Enhanced k-anonymity Privacy Protection Scheme in Continuous LBS Queries

Wei Wang, Wen-Hong Zhao, Zhong Cheng, Xing-Hua Li
The existing anonymous region construction schemes based on continuous Location-based service (LBS) queries do not solve the temporal and spatial relationship of common user sets in adjacent anonymous regions. The attacker can reduce the anonymous region and reduce the common user set by the Maximum...

The Remote Wifi Investigation of Network and Forensics System for Police Based on Raspberry Pi

Yang Liu, Dian-Jie Lu, Xing-Yue Li
This project brings forward the design of the remote WiFi investigation of network and forensics system for police based on Raspberry Pi. It can realize remote control in a few hundred meters away, and aim at the traffic data in the suspects' WiFi networks to gather the evidence. The contents of the...

Design of Power Quality Monitoring System Based on Wireless Network

Ke-Li Duan
In order to improve the real-time power quality monitoring, this paper presents a power quality monitoring system based on ZigBee, mainly comprising three parts, these are the monitoring system of power quality, composition data communications and monitoring center. Power system operation of power quality...

Hardware Accelerating Design Of Image Matching With FNCC Similarity Measure Algorithm

Xiong-Bo Zhao, Song-Ling Wu, Liang-Liang Liu
Similarity measure is a usual image processing algorithm, which is decisive for the quality of image registration. And Fast Normalized Cross Correlation(FNCC) is one of the most common similarity matching algorithm. However, it is computationally intensive and very time consuming which limits its application....

Green Video Streaming in LTE Networks: A Client-Side Method for Power Efficiency of Mobile Devices

Jing-Yu Zhang, Yuan-Yi Chen, Xiao-Dong Meng, Chen-Tao Wu, Li-Ting Xu, Riaz Ali
Nowadays mobile data traffic is soaring gradually year by year, the total monthly mobile data traffic (includes uplink and downlink) has come to more than 3,500 Petabytes and the growing trend is continuing. Video streaming demand is the significant contributor of cellular network data traffic, it accounted...

A Variable-Parameter Coding Scheme Based on LDPC

Ling Zhao, Zhong Li, Man-Jie Zhu
The paper proposes a channel coding system with both error correction performance and security performance. The implementation of security performance is to construct a cluster of parity check matrices with the same structure and to replace check matrices constantly in the coding process, which can be...

Joint Cooperative Diversity and Network Coding for Wireless Video Streaming

Gang Wang, Zhi-Yi Qu, Yong-Wen Li
The letter introduces random linear network coding (RLNC) based cooperative diversity transmission scheme to guarantee reliable wireless video streaming transmission. For Rayleigh block fading channel, RLNC assisted direct communication method increases packet reliability at high signal-to-noise ratio...

A Performance Optimization Model for Voice over IP Networks

Yao Lu, Rui Wang
In order to provide the same or better service quality in the Internet than traditional circuit-switched telephone network, there exist a number of issues to be dealt with that have hampered it in the Internet. These need good network planning and capacity management algorithms. The network performance...