共查询到20条相似文献,搜索用时 0 毫秒
1.
2.
Medium Access Control is an important component in cognitive radio that allow secondary users to identify and access spectrum opportunity without interfering with primary users. In this paper, a queueing model to analyze the performances of the secondary users in a cognitive radio network is presented. The queueing model considers the transmissions of a secondary system where a Medium Access Control algorithm is used to enable the secondary users to sense and access the channels. Also, a simple scheduler is employed to assign transmission time slots to the secondary users. Because the value of the system parameters can be perturbed and cannot be determined precisely, the analysis is extended to take uncertainty into account. In this case, a robust optimization method to study the Markov chain with uncertainty is applied to obtain the stationary probabilities of the queueing model under uncertainty. The lower and upper bounds of performance measures are obtained and compared with the nominal value. Copyright © 2012 John Wiley & Sons, Ltd. 相似文献
3.
4.
Weixing JI;Yuanhong HUO;Yizhuo WANG;Yujin GAO;Feng SHI 《电子学报:英文版》2017,26(6):1118-1124
Existing decompilers use rule-based algorithms to transform unstructured Control flow graph (CFG) into equivalent high-level programming language constructs with \"goto\" statements. One problem of such approaches is that they generate a large number of \"goto\"s in the output code, which reduce the readability and hinder the understanding of input binaries. A global search algorithm is proposed based on structural analysis. This algorithm restructures a CFG and generates fewer number of \"goto\" statements than the rule-based algorithm does. We also present a Genetic algorithm (GA) for the global search approach to locate near optimal solutions for large CFGs. Evaluation results on a set of real CFGs show that the genetic algorithm-based heuristic for global search is capable of finding high-quality solutions. 相似文献
5.
6.
LIU Jiang WANG Guoqing HUANG Tao CHEN Jianya LIU Yunjie 《中国通信》2014,(10):88-95
To reduce network redundancy, in- network caching is considered in many future Internet architectures, such as Information Centric Networking. In in-network caching system, the item sojourn time of LRU (Least Recently Used) replacement policy is an important issue for two reasons: firstly, LRU is one of the most common used cache policy; secondly, item sojourn time is positively correlated to the hit probability, so this metric parameter could be useful to design the caching system. However, to the best of our knowledge, the sojourn time hasn't been studied theoretically so far. In this paper, we first model the LRU cache policy by Markov chain. Then an approximate closed- form expression of the item expectation sojourn time is provided through the theory of stochastic service system, which is a function of the item request rates and cache size. Finally, extensive simulation results are illustrated to show that the expression is a good approximation of the item sojourn time. 相似文献
7.
贝叶斯网是不确定知识表示及推理的主要方法之一,BNs结构中的因果关系在知识建模中起到十分关键的作用,因此确定BNs中弧的方向是一重要问题.目前已有的方法存在以下问题:(1)算法计算复杂性高;(2)将统计不可分的弧定向,可能与领域知识不符.本文提出一种结合条件独立测试和打分搜索的BNs弧定向方法.该方法仅执行零阶和一阶条件独立测试,执行次数为多项式级;打分搜索可分解为局部子图的搜索,提高了算法的效率.算法输出结果为最大链图,该图仅对统计可分的弧进行定向,对统计不可分的弧保留无向的特性.这种结果更准确的表现了数据中蕴含的因果关系,便于结合领域知识进行建模. 相似文献
8.
基于马尔科夫理论建立的N阶马尔科夫链模型,模拟了长春和新乡地区的降雨衰减时间序列,比较了长春和新乡地区单个模拟和实测雨衰时间序列的概率分布;分别统计了长春和新乡地区50组模拟雨衰时间序列的百分概率分布,并与国际电信联盟无线电通信研究组(ITU-R)提供的卫星轨道位置为92°E、频率为12.5 GHz在线极化情况下长春和新乡雨区不同降雨衰减值下的时间百分概率进行了比较,一致性很好,从而验证了N阶马尔可夫链模型在中国部分地区的可用性。模拟结果对我国在Ku及以上频段通信卫星的抗衰落技术的发展具有重要的应用价值。 相似文献
9.
10.
Cun Yue Li-Mei Xu 《中国电子科技》2007,5(3):278-282
A new and convenient method is presented to calculate the total sensitivity indices defined by variance-based sensitivity analysis. By decomposing the output variance using error propagation equations, this method can transform the "double-loop" sampling procedure into "single-loop" one and obviously reduce the computation cost of analysis. In contrast with Sobors and Fourier amplitude sensitivity test (FAST) method, which is limited in non-correlated variables, the new approach is suitable for correlated input variables. An application in semiconductor assembling and test manufacturing (ATM) factory indicates that this approach has a good performance in additive model and simple non-additive model. 相似文献
11.
Jyh‐Horng Wen Jee‐Wey Wang Jyh‐Yeuan Chang 《International Journal of Communication Systems》2000,13(5):405-421
The integration of voice and data services over PACS systems using a movable boundary scheme is studied. First, we use the theory of discrete‐time Markov chain to analyse the system; then, an approximate analysis using the continuous‐time Markov chain model is conducted. For the initial access of voice calls we consider two distinct schemes: at most one idle slot being marked available, and all the idle slots being marked available. Numerical results show that the performance difference for voice calls between both schemes is trivial, but the former scheme offers a performance advantage for data calls over the latter scheme. Besides, the performance obtained by the continuous‐time Markov model is very close to that obtained by the discrete‐time Markov model. This finding suggests the effectiveness of the usage of the continuous‐time Markov model, which can dramatically simplify the analysis. Copyright © 2000 John Wiley & Sons, Ltd. 相似文献
12.
13.
Currently, only a few lane detection methods focus on the dynamic characteristics of a video. In continuous prediction, single-frame detection results produce different degrees of jitter, resulting in poor robustness. We propose a new fast video instance lane detection network, called MT-Net, based on space–time memory and template matching. Memory templates were used to establish feature associations between past and current frames from a local–global perspective to mitigate jitter from scene changes and other disturbances. Moreover, we also investigated the sources and spreading mechanism of memory errors. We designed new query frame and memory encoders to obtain higher-precision memory and query frame features. The experimental results showed that, compared with state-of-the-art models, the proposed model can reduce the number of parameters by 62.28% and the unnecessary jitter and unstable factors in muti-frame lane prediction results by 12.70%, and increases the muti-frame lane detection speed by 1.79. Our proposed methods has obvious advantages in maintaining multi-frame instance lane stability and reducing errors. 相似文献
14.
Mir Hamza Mahmood Cheng-Chun Chang Daewon Jung Zhi-Hong Mao Hyuk Lim Heung-No Lee 《AEUE-International Journal of Electronics and Communications》2010,64(11):1031-1041
Conventional IEEE 802.11 medium access control (MAC) protocol discourages simultaneous transmission to avoid collisions. With fast advances in physical layer technologies, multi-user detection (MUD) capable receivers which can detect multiple frames from different users simultaneously become available. If we are to utilize them in today's wireless LAN, however, it is not entirely clear how we should change the MAC and how much benefit is available and can be obtained by doing so. The primary objective of this paper is to investigate such questions. We approach this objective by developing a new throughput expression for 802.11 distributed coordination function (DCF). The derived expression has been verified in simulation. We show that significant throughput gain can be garnered with slight modification in 802.11 DCF. 相似文献
15.
《电子学报:英文版》2024,33(1)
Cross-platform binary code similarity detection aims at detecting whether two or more pieces of bina-ry code are similar or not.Existing approaches that combine control flow graphs(CFGs)-based function representa-tion and graph convolutional network(GCN)-based similarity analysis are the best-performing ones.Due to a large amount of convolutional computation and the loss of structural information,the use of convolution networks will in-evitably bring problems such as high overhead and sometimes inaccuracy.To address these issues,we propose a fast cross-platform binary code similarity detection framework that takes advantage of natural language processing(NLP)and inductive graph neural network(GNN)for basic blocks embedding and function representation respectively by simulating extracting structural features and temporal features.GNN's node-centric and small batch is a suitable training way for large CFGs,it can greatly reduce computational overhead.Various NLP basic block embedding models and GNNs are evaluated.Experimental results show that the scheme with long short term memory(LSTM)for basic blocks embedding and inductive learning-based GraphSAGE(GAE)for function representation outperforms the state-of-the-art works.In our framework,we can take only 45%overhead.Improve efficiency significantly with a small performance trade-off. 相似文献
16.
17.
PHP脚本语言是一种当前比较流行的服务端脚本语言,多用来开发Web应用程序。文中介绍了一种针对PHP的静态缺陷分析方法,能有效检测出PHP中常见安全缺陷,如SQL注入、XSS等,文中给出了对当前比较流行的几个开源PHP工程的检测结果,其中大部分缺陷是可以远程利用的。 相似文献
18.
19.
I.A. Ali S. Moiron M. Fleury M. Ghanbari 《Journal of Visual Communication and Image Representation》2013,24(4):486-498
Insertion of a cyclic intra-refresh line is a lightweight way of mitigating spatio-temporal error propagation in a video stream transmitted over a mobile network. This paper presents low-complexity yet effective prioritization based on slice position within a video frame relative to the cyclic refresh line. Two prioritization schemes are compared. The first is a region-based method, while the second, which is packet-based, improves packet classification. Experimental results indicate that, the packet-based scheme can achieve video quality gains of up to 4 dB, compared to when the scheme is not used. The proposed schemes require no decoder modifications and do not introduce an increase in bitrate or in computational complexity. 相似文献
20.
I. Seoane E. CalleJ.A. Hernández J. SegoviaR. Romeral P. VilàM. Urueña M. Manzano 《Optical Switching and Networking》2012,9(1):39-51
Network reliability and resilience has become a key design parameter for network operators and Internet service providers. These often seek ways to have their networks fully operational for at least 99.999% of the time, regardless of the number and type of failures that may occur in their networks.This article presents a continuous-time Markov chain model to characterise the propagation of failures in optical GMPLS rings. Two types of failures are considered depending on whether they affect only the control plane, or both the control and data planes of the node. Additionally, it is assumed that control failures propagate along the ring infecting neighbouring nodes, as stated by the Susceptible-Infected-Disabled (SID) propagation model taken from epidemic-based propagation models. A few numerical examples are performed to demonstrate that the CTMC model provides a set of guidelines for selecting the appropriate repair rates in order to attain specific availability requirements, both in the control plane and the data plane. 相似文献