您的位置: 专家智库 > >

国家自然科学基金(61170065)

作品数:11 被引量:37H指数:4
相关作者:王汝传杨洋郎贤波张殿超季一木更多>>
相关机构:南京邮电大学南京广播电视大学江苏省无线传感网高技术研究重点实验室更多>>
发文基金:国家自然科学基金江苏省自然科学基金江苏省科技支撑计划项目更多>>
相关领域:自动化与计算机技术电子电信更多>>

文献类型

  • 10篇期刊文章
  • 1篇会议论文

领域

  • 11篇自动化与计算...
  • 4篇电子电信

主题

  • 2篇隐私
  • 2篇位置隐私
  • 2篇保护方法
  • 2篇LBS
  • 1篇隐私保护
  • 1篇算法并行化
  • 1篇匿名
  • 1篇终端控制
  • 1篇网络
  • 1篇位置隐私保护
  • 1篇无线传感
  • 1篇无线传感网
  • 1篇无线传感网络
  • 1篇淋浴系统
  • 1篇流数据
  • 1篇节能
  • 1篇节能减排
  • 1篇决策树
  • 1篇决策树分类
  • 1篇基于位置服务

机构

  • 4篇南京邮电大学
  • 2篇南京广播电视...
  • 1篇教育部
  • 1篇江苏省无线传...

作者

  • 3篇王汝传
  • 2篇杨洋
  • 1篇季一木
  • 1篇张殿超
  • 1篇郎贤波
  • 1篇陈云芳
  • 1篇王晨
  • 1篇王琳琳
  • 1篇耿路

传媒

  • 3篇Journa...
  • 2篇The Jo...
  • 1篇计算机研究与...
  • 1篇计算机应用
  • 1篇南京师大学报...
  • 1篇Wuhan ...
  • 1篇徐州工程学院...

年份

  • 1篇2020
  • 1篇2017
  • 2篇2016
  • 1篇2014
  • 5篇2013
  • 1篇2012
11 条 记 录,以下是 1-10
排序方式:
增强现实中基于位置安全性的LBS位置隐私保护方法被引量:4
2020年
为了解决基于位置的服务(LBS)和增强现实(AR)技术快速发展带来的用户位置隐私泄露的隐患,分析了现有的位置隐私保护方法的优缺点,提出基于位置安全性的位置隐私保护方法。将区域安全度和伪装区域引入该方法中,将提示某区域是否需要保护这一度量标准定义为区域安全度,非安全区域(即需要给予保护的区域)的区域安全度设置为1,安全区域(即不需要保护的区域)设置为0,通过扩大区域安全度和识别等级来计算位置安全度。实验结果表明,该方法与未引入位置安全性的方法相比降低了平均定位误差,提高了平均安全性,从而有效地保护了用户的位置隐私,提高了LBS的服务质量。
杨洋王汝传
关键词:位置隐私保护
增强现实中基于LBS的矩形区域K-匿名位置隐私保护方法被引量:5
2016年
基于位置服务(LBS)和增强现实技术快速发展的同时,促进了基于位置服务的应用范围扩大,同时也带来了用户位置隐私泄露的隐患.因此,如何确保基于位置服务中数据的安全性,成为该项技术推广应用的关键问题.本文借助k-匿名法,提出矩形区域k-匿名法,将k-匿名法的理念引入该方法中,实验结果表明该方法提高了相对匿名度和匿名区域面积,从而有效地保护了用户的位置隐私.
杨洋王汝传
关键词:位置隐私
ENERGY EFFICIENT DISTRIBUTED STEGANOGRAPHY FOR SECURE COMMUNICATION IN WIRELESS MULTIMEDIA SENSOR NETWORKS被引量:1
2013年
A secure communication mechanism is necessary in the applications of Wireless Multimedia Sensor Networks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, given the limited technological resources (in term of energy, computation, bandwidth, and storage) of sensor nodes, security and privacy policies have to be combined with energy-aware algorithms and distributed processing of multimedia contents in WMSNs. To solve these problems in this paper, an energy efficient distributed steganography scheme, which combines steganography technique with the concept of distributed computing, is proposed for secure communication in WMSNs. The simulation results show that the proposed method can achieve considerable energy efficiency while assuring the communication security simultaneously.
Lin QiaominWang RuchuanYe NingWang Zhongqin
智能控制型社区淋浴系统
2012年
针对现有淋浴设备存在的不足,提出一种移动终端控制的自动加热淋浴系统.系统成功地从光追踪随动太阳能供电、合理预设温度提示、PID模糊控制自动加热(移动终端控制)等角度实现了淋浴系统智能控制和最大限度节能目标.从淋浴节能系统整体设计、温度建模处理、移动终端智能控制等方面详细阐述其设计流程.通过理论计算和实验数据分析验证了其实用性和先进性.
王琳琳陈云芳耿路王晨
关键词:节能减排无线传感网络
Node correlation clustering algorithm for wireless multimedia sensor networks based on overlapped FoVs被引量:8
2013年
In this paper, a clustering algorithm is proposed based on the high correlation among the overlapped field of views for the wireless multimedia sensor networks. Firstly, by calculating the area of the overlapped field of views (FoVs) based on the gird method, node correlations have been obtained. Then, the algorithm utilizes the node correlations to partition the network region in which there are high correlation multimedia sensor nodes. Meanwhile, in order to minimize the energy consumption for transmitting images, the strategy of the cluster heads election is proposed based on the cost estimation, which consists of signal strength and residual energy as well as the node correlation. Simulation results show that the proposed algorithm can balance the energy consumption and extend the network lifetime effectively.
ZHANG Qian-yanWANG Ru-chuanSHA ChaoHUANG Hai-ping
关键词:CLUSTERING
A NEW APPROACH TO DVC COMBINED WITH ROI EXTRACTION AND RESIDUAL VIDEO CODING FOR MULTIMEDIA SENSOR NETWORKS
2013年
The Wyner-Ziv distributed video coding scheme is characterized for its intraframe encoder and interframe decoder which can also approach the efficiency of an interframe encoder-decoder system. In Wyner-Ziv residual coding of video, the residual of a frame with respect to a reference frame is Wyner-Ziv encoded, which can reduces the input entropy and leads to a higher coding efficiency than directly encoding the original frame. In this paper, we propose a new approach of residual coding combined with Region Of Interest (ROI) extraction. Experimental results show that, the proposed scheme achieves better rate-distortion performance compared to conventional Wyner-Ziv coding scheme.
Lin ZhaoxiaoSun LijuanXiao FuWang Ruchuan
Design and implementation of the supermarket shopping system based on RFID and Sketchup
Now the supermarket is people’s main shopping place, a wide variety of goods in the supermarket has brought gr...
H.XuY.Z.LiW.W.ShenR.C.Wang
关键词:RFIDSKETCHUP
Energy-efficient node deployment strategy for wireless sensor networks被引量:1
2013年
To balancing energy consumption in wireless sensor networks, we proposed a fixed time interval node broadcasting scheme under variational acceleration straight-line movement model. Simulation results show that the approach proposed in this paper has a superior performance on energy consumption balance compared to uniform broadcasting methods.
SHA ChaoWANG Ru-chuan
面向流数据的决策树分类算法并行化被引量:16
2017年
随着云计算、物联网等技术的兴起,流数据作为一种新型的大数据形态广泛存在于电信、互联网、金融等领域.与传统静态数据相比,大数据环境下的流数据具有快速、连续和随时间变化等特点.同时数据流的隐含分布变化会带来概念漂移问题.为了适应大数据环境下流数据分类算法的要求,必须对传统的静态离线数据分类算法进行改进,提出基于分布式计算平台Storm的P-HT并行化算法.算法在满足Storm流处理平台要求基础上,通过滑动窗口机制、替代子树机制和并行化处理,提高了算法的灵活性和通用性,并且能良好地适应数据流的概念漂移.最后通过实验验证该算法的有效性和高效性,结果表明在与传统C4.5算法相比精度没有降低的情况下,改进的P-HT算法具有更大的吞吐量和更快的处理速度.
季一木张永潘郎贤波张殿超王汝传
关键词:流数据C4.5算法
A NEW PRIVACY-PRESERVING EUCLID-DISTANCE PROTOCOL AND ITS APPLICATIONS IN WSNS
2013年
Recently, privacy concerns become an increasingly critical issue. Secure multi-party computation plays an important role in privacy-preserving. Secure multi-party computational geometry is a new field of secure multi-party computation. In this paper, we devote to investigating the solutions to some secure geometric problems in a cooperative environment. The problem is collaboratively computing the Euclid-distance between two private vectors without disclosing the private input to each other. A general privacy-preserving Euclid-distance protocol is firstly presented as a building block and is proved to be secure and efficient in the comparison with the previous methods. And we proposed a new protocol for the application in Wireless Sensor Networks (WSNs), based on the novel Euclid-distance protocol and Density-Based Clustering Protocol (DBCP), so that the nodes from two sides can compute cooperatively to divide them into clusters without disclosing their location information to the opposite side.
Chen PingJi YimuWang RuchuanHuang HaipingZhang Dan
关键词:PRIVACY-PRESERVING
共2页<12>
聚类工具0