The conventional channel selection approach in cognitive radio network is random selection of the transmission channel based on the channel characteristics while neglecting the channel quality requirement of the video streaming at the application layer. Aiming at solving this problem, a cross-layer optimized channel selection method targeting on the video streaming quality optimization was presented. Via minimizing the end-to-end video distortion, the video encoding quantization parameter at the application layer and the adaptive modulation and channel coding as well as the specific transmission channel at the physical layer were jointly selected. A large number of video transmission simulation experiments were made for the proposed algorithm over the multi-channel cognitive radio networks. The experimental results show that this kind of cross-layer optimized channel selection approach can efficiently improve the objective quality of second user video streaming more than 1.5 dB over the cross-layer optimization without channel-selection method over cognitive radio networks.
During the procedure of smart meter production, electric power enterprises have noticed the fact that there exist significant differences between sample meters used to check and batch meters for large numbers of production. Lots of batch meters either have an unstable working state or become quality rejected, resulting from lack of detection. Maintenance of these meters causes unnecessary expense. Aiming at this problem, a smart meter software function test scheme was formulated and an embedded smart meter code reversal model was figured out. Taking obtaining system operating characteristics via analysis of smart meter kernel program as main idea, the model operated a software function difference test on smart meter with disassembly technology as means to analyze smart meter firmware code function. The model included three modules, namely firmware code extraction, firmware code disassembly and software function comparison. A Single-step Disassembly Algorithm (SDA) was adopted in firmware code disassembly module based on traditional linear sweep and recursive scanning algorithm. It has remarkable effects when applying the model to sample and batch meters identification. Meanwhile, the model can control function and quality error within 20 percent when maintaining meters of used and to be used.
This paper proposed a liner programming model to deal with the Quay Crane (QC) allocation and scheduling problem for single ship under the circumstance of fixed berth allocation. With the aim of minimizing the working time of the ship at berth, the model considered not only the disruptive waiting time when the quay cranes were working, but also the workload balance between the cranes. And an Improved Ant Colony Optimization (IACO) algorithm with the embedding of a solution space split strategy was presented to solve the model. The experimental results show that the proper allocation and scheduling of quay cranes from the model in this paper can averagely save 31.86% of the crane resource compared with full application of all available cranes. When comparing to the solution solved by Lingo, the results from IACO algorithm have an average deviation of 5.23%, while the average CPU (Central Processing Unit) computational time is reduced by 78.7%, which shows the feasibility and validity of the proposed model and the algorithm.
To solve the problem of active attack on steganographic system, the counterwork relationship was modeled between steganographier and active attacker. The steganographic game with embedding rate and error rate as the payoff function was proposed. With the basic theory of two-person finite zero-sum game, the equilibrium between steganographier and active attacker was analyzed and the method to obtain their strategies in equilibrium was given. Then an example case was solved to demonstrate the ideas presented in the model. This model not only provides the theoretic basis for steganographier and active attacker to determine their optimal strategies, but also brings some guidance for designing steganographic algorithms robust to active attack.