Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Any time

2020 ( 4 )

2019 ( 104 )

2018 ( 688 )

2017 ( 687 )

Custom range...

Search Results: 1 - 10 of 42592 matches for " Jiuqiang XU "
All listed articles are free for downloading (OA Articles)
Page 1 /42592
Display every page Item
An Energy Balanced Reliable Routing Metric in WSNs  [PDF]
Jian ZHU, Hai ZHAO, Jiuqiang XU
Wireless Sensor Network (WSN) , 2009, DOI: 10.4236/wsn.2009.11004
Abstract: In WSNs’ applications, not only the reliable end-to-end communications are must be ensured, but also the reduction of energy consumption and the entire network’s lifetim e should be optimized. All of the above have become to be an important way to evaluate the performance of routing protocols. In this paper, an op-timization model for WSNs’ lifetime is firstly advanced. Secondly, the shortage of ETX based routing metric is solved with the help of the optimization model. Thirdly, an energy balanced routing metric is advanced which is called EBRM in this paper. The result of simulation in NS-2 shows that, the EBRM metric can not only prolong the network’s lifetime, but also can ensure the reliable end-to-end communication.
Research on Error’s Distribution in Triangle Location Algorithm  [PDF]
Jian ZHU, Hai ZHAO, Jiuqiang XU, Yuanyuan ZHANG
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2009, DOI: 10.4236/ijcns.2009.25039
Abstract: The error will inevitably appear in triangle location in WSNs (wireless sensor networks), and the analysis of its character is very important for a reliable location algorithm. To research the error in triangle location algorithm, firstly, a triangle location model is set up; secondly, the condition of the minimal error is got based on the analysis of the location model; at last, by analyzing the condition, the law of error’s changing is ab-stracted, and its correctness is validated by some testing. The conclusions in this paper are all proved, and they provide a powerful foundation and support for reliable location algorithm’s research.
Distance Measurement Model Based on RSSI in WSN  [PDF]
Jiuqiang Xu, Wei Liu, Fenggao Lang, Yuanyuan Zhang, Chenglong Wang
Wireless Sensor Network (WSN) , 2010, DOI: 10.4236/wsn.2010.28072
Abstract: The relationship between RSSI (Received Signal Strength Indication) values and distance is the foundation and the key of ranging and positioning technologies in wireless sensor networks. Log-normal shadowing model (LNSM), as a more general signal propagation model, can better describe the relationship between the RSSI value and distance, but the parameter of variance in LNSM is depended on experiences without self-adaptability. In this paper, it is found that the variance of RSSI value changes along with distance regu- larly by analyzing a large number of experimental data. Based on the result of analysis, we proposed the relationship function of the variance of RSSI and distance, and established the log-normal shadowing model with dynamic variance (LNSM-DV). At the same time, the method of least squares(LS) was selected to es- timate the coefficients in that model, thus LNSM-DV might be adjusted dynamically according to the change of environment and be self-adaptable. The experimental results show that LNSM-DV can further reduce er- ror, and have strong self-adaptability to various environments compared with the LNSM.
Webit&NEU: An Embedded Device for the Internet of Things
Jialiang Wang,Hai Zhao,Jiuqiang Xu,Yuanguo Bi
International Journal of Distributed Sensor Networks , 2014, DOI: 10.1155/2014/839540
Abstract: The Internet of Things (IoT) is regarded as the future generation Internet, which ranges from radio frequency identification (RFID) to the ubiquitous computing systems such as wireless sensor networks and mobile ad hoc networks. With the rapid development of IoT, designing an effective low-cost embedded terminal device for the IoT become very necessary. A new embedded device, Webit&NEU, and its reduced embedded real-time operating system used for IoT are implemented by our China Liaoning Province Embedded Technique Key Laboratory in this paper. Besides, related modules in terms of RFID technique, wireless communication, and network protocol are also provided in this paper. Compared with several current solutions of connecting devices and Internet, it has the advantages of good real-time performance, light weight, and low cost. Besides, this paper also puts forward a localization algorithm for the Webit&NEU, and experimental test results in terms of real-time system ability, network communication performance, and localization algorithm show that Webit&NEU can work well and meet the actual requirements of the IoT. 1. Introduction The IoT is a new-emerging technique. After the age of Internet and wireless sensor network, people are gradually entering the era of IoT. The IoT refers to uniquely identifiable objects (things) and their virtual representations in an Internet-like structure [1]. In fact, the IoT includes technologies such as RFID, sensors, and smart devices. The concept of the IoT has become more and more popular now. RFID is often regarded as a prerequisite for the IoT [2, 3]. Supposing all objects of daily life were equipped with radio tags, thus they could be identified, tacked, and managed by computers, and then they will certainly bring great convenience to people’s lives. Embedded Internet device Webit2.0 can make the standard industry device have the ability of accessing the Internet, and it has successfully been embedded to fieldbus, industrial devices, and so forth, so people can feel free to access those devices through Internet. Webit2.0 has been successfully developed by our China Liaoning Province Embedded Technique Key Laboratory and has been large-scaly manufactured by China Shenyang Neu-era Information Technology Stock Co., Ltd [4]. It is worth noting that Webit2.0 has obtained the China's product patent (nos. ZL 00 2 52482.1 and ZL 01 2 29725.9). The design and implementation of embedded device Webit&NEU are based on Webit2.0. Besides the basic functions of Webit2.0, new functions such as RFID data processing and wireless date
Improving controllability of complex networks by rewiring links regularly
Jiuqiang Xu,Jinfa Wang,Hai Zhao,Siyuan Jia
Computer Science , 2014,
Abstract: Network science have constantly been in the focus of research for the last decade, with considerable advances in the controllability of their structural. However, much less effort has been devoted to study that how to improve the controllability of complex networks. In this paper, a new algorithm is proposed to improve the controllability of complex networks by rewiring links regularly which transforms the network structure. Then it is demonstrated that our algorithm is very effective after numerical simulation experiment on typical network models (Erd\"os-R\'enyi and scale-free network). We find that our algorithm is mainly determined by the average degree and positive correlation of in-degree and out-degree of network and it has nothing to do with the network size. Furthermore, we analyze and discuss the correlation between controllability of complex networks and degree distribution index: power-law exponent and heterogeneity
Multiscale contrast image fusion scheme with performance measures
Xinman Zhang,Jiuqiang Han
Optica Applicata , 2004,
Abstract: A new method of image fusion from various sensing modalities is proposed. This method adopts a perceptual fusion operator by using a sequence of multiscale contrast pyramid images. The method is tested by merging parallel registered visible and infrared images. Several performance measures clearly indicate that this method outperforms the other three approaches producing better visual effects.
Efficient iris segmentation method with support vector domain description
Rongnian Tang,Jiuqiang Han,Xinman Zhang
Optica Applicata , 2009,
Abstract: With the aim to improve the performance of iris segmentation method to process images with heterogeneous characteristics, the authors introduce a new method inspired by the support vector domain description (SVDD). A local geometric moment function is used to extract shape features of the iris borders. Then, these features are fed into the trained SVDD classifier for borders recognition followed by the application of Hough transform to solve circumference parameters of iris. The performance of the proposed method and the most cited methods, Daugman’s method and Wilders’ method, had been tested on the UBIRIS database. Compared with the two existing methods, our proposal is not only comparable to them when the iris image has good quality, but has better segmentation performance in the case of poor quality images. The experimental results show that the method proposed does have a higher robustness and is less dependent on the quality of raw iris image.
An effective iris location method with high robustness
Rongnian Tang,Jiuqiang Han,Xinman Zhang
Optica Applicata , 2007,
Abstract: Now, iris recognition is a topical issue. This paper focuses on iris location, which is an important stage in iris recognition, and develops a new method for that purpose. Use has been made of dilation operator in order to suppress the interference of eyelash, and support vector machines (SVM) classifier has been employed to identify the iris boundary. The results of experiment carried out on iris image database showed the method proposed to have an encouraging performance. Compared with the traditional methods, those of Daugman and Wildes, this method offers a higher correct location ratio and is more computationally efficient.
Restoration and fusion optimization scheme of multifocus image using genetic search strategies
Xinman Zhang,Jiuqiang Han,Peifei Liu
Optica Applicata , 2005,
Abstract: A novel and optimal algorithm is presented that is suitable for multifocus image fusion. A synergistic combination of segmentation techniques and genetic search strategies is employed in salience analysis of contrast feature-vision system. Some evaluation measures are suggested and applied to compare the performance of different fusion schemes. Two cases of the generated test images are discussed and extensive experiments demonstrate that in one case most fused images achieve reconstruction or optimized effects with respect to the reference image when the focus objectives are not overlapped blurred, and in the other case this method produces better results outperforming other conventional methods when the focus objectives are overlapped blurred. It is therefore shown that the performance of the fusion algorithm proposed optimizes further the fused image globally accomplishing absolute restoration or optimized fusion of multifocus image to the reference image. This algorithm is also suitable for the digital camera images of real scene and gets to be optimized well.
Minimax Probability Machine Multialgorithmic Fusion for Iris Recognition
Fenghua Wang,Xianghua Yao,Jiuqiang Han
Information Technology Journal , 2007,
Abstract: This study presents an iris recognition method based on multialgorithmic fusion. Fusion of multiple algorithms for biometric verification performance improvement has received considerable attention. The proposed method combines two kinds of iris recognition algorithms: one is based on phase information and the other is based on zero-crossing representation. Two algorithms are fused at the matching score level and a novel fusion strategy based on Minimax Probability Machine (MPM) is applied to generate a fused score which is used to make the final decision. The experimental results on CASIA and UBIRIS iris image databases show that the proposed multialgorithmic fusion method can bring obvious performance improvement compared to the individual recognition algorithm. The comparison among all fusion strategies also demonstrates that the fusion strategy based on MPM can achieve better performance than traditional fusion strategies.
Page 1 /42592
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.