scispace - formally typeset
Search or ask a question

Showing papers presented at "WASE International Conference on Information Engineering in 2009"


Proceedings ArticleDOI
10 Jul 2009
TL;DR: A hybrid PSO (AMPSO) to solve this problem by applying a novel adaptive mutation operator by achieving better results than the standard PSO,PSO with Gaussian mutation and PSO with Cauchy mutation on most test cases.
Abstract: Particle swarm optimization (PSO) has shown its good performance in many optimization problems. However, PSO could often easily fall into local minima because the particles could quickly converge to a position by the attraction of the best particles. Under this circumstance, all the particles could hardly be improved. This paper presents a hybrid PSO (AMPSO) to solve this problem by applying a novel adaptive mutation operator. Experimental results on 8 well-known benchmark functions show that the AMPSO achieves better results than the standard PSO, PSO with Gaussian mutation and PSO with Cauchy mutation on most test cases.

139 citations


Proceedings ArticleDOI
10 Jul 2009
TL;DR: A new ultralightweight RFID authentication protocol with mutual authentication that requires only simple bit-wise operations and can resist various attacks.
Abstract: Due to the well-developed technology and its variety of applications, the Radio Frequency Identifications (RFIDs) become more and more popular. In many applications such as authentication, the RFID systems need security mechanism to resist all possible attacks and threats. However, most of the security mechanisms always too complex on computation or need large memory space such that they are not suit for low-cost RFIDs. In this paper, we propose a new ultralightweight RFID authentication protocol with mutual authentication. The protocol requires only simple bit-wise operations and can resist various attacks.

41 citations


Proceedings ArticleDOI
10 Jul 2009
TL;DR: In this article, an enhanced LANDMARC system with RSSI was proposed to improve the accuracy of indoor localization by placing the tracking tag and its k nearest reference tags in a set, then repeating to calibrate the target coordinate by the error corrections which obtained by members of this set.
Abstract: This paper aims to locate a tag position inside the building by using low cost device with minimal location error. The enhancement approach with Received Signal Strength Indication (RSSI) technique is proposed to achieve the target. In this paper, after introducing the existing LANDMARC system, we try to construct the relationship between RSSI and distance from Reader to Tag by experiment. Finally, an enhanced approach to reach higher accuracy of indoor localization is proposed. The proposed enhancement approach utilizes the strategy of putting the tracking tag and its k nearest reference tags in a set, then repeating to calibrate the target coordinate by the error corrections which obtained by members of this set. It is a recursive data processing approach. The calibration will continue until the tracking tag’s coordinate tend to be a stable value. Simulation and experimental comparison are also shown here to prove that the accuracy of localization is improved.

41 citations


Proceedings ArticleDOI
10 Jul 2009
TL;DR: Simulation results show the new proposed protocol EECH has outperformed LEACH on the lifetime of the networks, and a novel algorithm called EECH (Energy Efficient Clustering Hierarchy) is proposed.
Abstract: Wireless sensor networks are composed of cheap sensor nodes with limited energy resources. These networks require robust wireless communication protocols that are energy efficient in order to prolong the lifetime of the entire network. This paper studies the routing protocols and analyzes the performance of LEACH (Low-Energy Adaptive Clustering Hierarchy) in-depth. It is found that the cluster heads selecting algorithm in LEACH is not the best, because it dose not take the residual energy of the nodes into account. And when it sends data to the base station, it is in the form of one-hop routing. Then the paper made some improvement and proposed a novel algorithm called EECH (Energy Efficient Clustering Hierarchy). Simulation results show the new proposed protocol EECH has outperformed LEACH on the lifetime of the networks.

30 citations


Proceedings ArticleDOI
10 Jul 2009
TL;DR: This paper concludes many principles of the trust model by analyzing existing trust models and proposes a novel trust model including both the direct and indirect trust including recommenders’ credibility which can avoid the denigration and make indirect trust more objective.
Abstract: As traditional network security cannot meet the security requirements, the international research shows that network security is on the way to Trustworthy Internet and that the trustworthy issue becomes a hot topic in the future Internet. Trust evaluation of users’ behavior is an important part of Trustworthy Internet and a rational trust model plays a key role in the evaluation. This paper concludes many principles of the trust model by analyzing existing trust models and proposes a novel trust model including both the direct and indirect trust. In our model, the direct trust is more trustwor-thy and is weighted more with the more and more interactions and the indirect evaluation becomes less and less important. The subjective factor is considered to make the direct trust obey the principle of “rise-lowly, decline-quickly”. Furthermore, recommenders’ credibility is taken into account in the indirect trust evaluation, which can avoid the denigration and make indirect trust more objective. We also consider the process of referral of the credibility to gain more information to evaluate the indirect trust effectively. Credibility evaluation is the basis of the filtering of low credibility and the improvement of trust evaluation. Finally, several experiments are shown to illustrate the properties of the model.

24 citations


Proceedings ArticleDOI
10 Jul 2009
TL;DR: An algrithom of automatic facial expression recognition is proposed based on Local Binary Patterns of local areas (LLBP) in this work, and the recognition experiment is conducted on the JAFFE facial database, which shows the realibility of the method proposed.
Abstract: Automatic facial expression recognition is one of the great challenges in facial expression recognition field. An algrithom of automatic facial expression recognition is proposed based on Local Binary Patterns of local areas (LLBP)in this work. First, the position of eye balls is fixed by projection method. Then the local areas of the eyes and mouth’s neighbourhood could be determined through the pri-knowledge of face structure. The LBP feature on the local areas is then computed as the facial feature for facial expression recognition. Finally, the recognition experiment is conducted on the JAFFE facial database, which showd the realibility of the method proposed.

22 citations


Proceedings ArticleDOI
10 Jul 2009
TL;DR: The results show that the proposed method is better than only using wavelet transform or curvelet transform to deal with noisy image, that is to say this method can get better visual effects and higher PSNR.
Abstract: Wavelet multi-resolution analysis is widely used and achieves good results in image denoising fields. Wavelet transform has unique advantages in dealing with singular point, but has some disadvantages in dealing with the borders and the line features of the image. But curvelet transform has the finest approximation of the singular curve in the image. In this paper, we combine the wavelet transform and curvelet transform to deal with the noisy image. The results show that the proposed method is better than only using wavelet transform or curvelet transform to deal with noisy image, that is to say this method can get better visual effects and higher PSNR.

20 citations


Proceedings ArticleDOI
10 Jul 2009
TL;DR: A detailed simulation model with MAC and physical layer models is used to study inter layer interactions and their performance implications, demonstrating that even though DSR and AODV share a similar behavior, the differences in the protocol mechanics can lead to significant performance differentials.
Abstract: xAd hoc networks are characterized by multi hop wireless connectivity, frequently changing network topology and the need for efficient dynamic routing protocols, compare the performance of two prominent routing protocols for mobile ad hoc networks. xDSR (dynamic source routing) and AODV (ad hoc distance vector routing). A detailed simulation model with MAC and physical layer models is used to study inter layer interactions and their performance implications, demonstrate that even though DSR and AODV share a similar behavior, the differences in the protocol mechanics can lead to significant performance differentials.

19 citations


Proceedings ArticleDOI
10 Jul 2009
TL;DR: A proactive Multipath Optimized Link State Routing Protocol (MOLSR) based on OLSR is proposed, which introduces the cross-layer concept as well as the node discovery algorithm employed to discover every node on the route to build disjoint path.
Abstract: Multipath routing which has great potential to improve network characteristics for mobile wireless networks is one of central problems nowadays. Since most of the proposed multipath algorithms are On-Demand based, they need extra feedback information that lead the delay to grow. In this paper, we propose a proactive Multipath Optimized Link State Routing Protocol (MOLSR) based on OLSR(Optimized Link State Routing Protocol), which introduces the cross-layer concept as well as the node discovery algorithm employed to discover every node on the route to build disjoint path. Simulation results show that MOLSR achieves lower delay and packet drop ratio with little more overhead than the classic OLSR algorithm.

19 citations


Proceedings ArticleDOI
10 Jul 2009
TL;DR: A ID-based proxy signature is presented, which is secure against existential forgery under adaptive chosen message and identity attack under the random oracle model, and can be reduced to the hardness of CDHP.
Abstract: Currently, ID-based PKC has attracted much attention and got manyachievements. Proxy signature allows an original signer to delegatehis private key to a proxy signer to sign some message on behalf ofthe original signer. We present a ID-based proxy signature in thispaper. The scheme is relatively efficient as there is no pairingcomputation during the Delegation and PSign phases. It is secureagainst existential forgery under adaptive chosen message andidentity attack under the random oracle model. Its security can bereduced to the hardness of CDHP.

18 citations


Proceedings ArticleDOI
10 Jul 2009
TL;DR: The proposed algorithm improved the accuracy of classification by combining the advantage ofBoosting algorithm with decision tree and proved that the property which has the smallest classification errorrate as of decision tree is equivalent to the branching method of traditional decision tree.
Abstract: A new classifier ensemble learning algorithmbased on decision tree is proposed. Ensemble learningalgorithm is one of the algorithms which have bestclassification results in many classification algorithms. Adecision tree algorithm is a kind of greedy algorithm, ituse top-down recursive way to determine the treestructure. The proposed algorithm improved theaccuracy of classification by combining the advantage ofBoosting algorithm with decision tree. The main idea is tomake full use of the advantages of ensemble learningalgorithm and decision tree. We introduce the algorithmprocession in detail. The proposed algorithm proved thatthe property which has the smallest classification errorrate as of decision tree is equivalent to the branchingmethod of traditional decision tree. The algorithm usesthe rapid classification capabilities of decision tree. In themeantime, we take into account the classificationaccuracy of joint classification. Finally, Experiments withUCI machine learning data sets show the effectiveness ofthe proposed algorithm.

Proceedings ArticleDOI
10 Jul 2009
TL;DR: An Improved Bilinear Interpolation Algorithm using the Center Coordinates of Pixels to do bilinear interpolation (IBIACCP), which can correct the color values of HDTV images by correcting the pixels’ x and y coordinates since a pixel’s colorvalue is a function of its x andY coordinates in interpolational algorithms.
Abstract: It's very hard to guarantee high image quality whenconverting standard-definition television (SDTV) images tohigh-definition television (HDTV) images because of the greatdifference of image resolution between them. Moreover, thechange in pixel shape from rectangular to square makes thetraditional image zooming methods impossible to do theconversion. Based on this reason, we propose an ImprovedBilinear Interpolation Algorithm: using the CenterCoordinates of Pixels to do bilinear interpolation (IBIACCP).This method can correct the color values of HDTV images bycorrecting the pixels’ x and y coordinates since a pixel’s colorvalue is a function of its x and y coordinates in interpolationalgorithms. Considering the huge enlarging multiples, we dosharpening treatment to the HDTV images after theinterpolation. Experiments show that IBIACCP can greatlyimprove the quality of HDTV images comparing withtraditional bilinear interpolation algorithm.

Proceedings ArticleDOI
10 Jul 2009
TL;DR: An unsupervised machine learning approach based on DBSCAN algorithm, which has three merits: minimal requirements of domain knowledge to determine the input parameters, good efficiency on large data set, and discovery of clusters with arbitrary shapes.
Abstract: In recent years, a technique based on machinelearning for Internet traffic classification has attracted more and more attentions. It not only overcomes some shortcomingsof traditional classification technique based on port number,but also does not inspect the packet payload, which involves the security and privacy. In this paper, we apply an unsupervised machine learning approach based on DBSCANalgorithm. DBSCAN algorithm has three merits: (1) minimalrequirements of domain knowledge to determine the inputparameters; (2) discovery of clusters with arbitrary shapes; (3)good efficiency on large data set. Experiment results show that DBSCAN has better effectiveness and efficiency.

Proceedings ArticleDOI
10 Jul 2009
TL;DR: In this paper, genetic algorithm is used to optimize the test cases that are generated using the category-partition and test harness patterns and the optimal test suites are devised by the method of sampling statistics.
Abstract: Software testing is an important activity of the software development process, and automated test case generation contributes to reduce cost and time efforts. In this paper, we have used genetic algorithm to optimize the test cases that are generated using the category-partition and test harness patterns. In order to investigate the effectiveness of the approach, a graph is derived using category-partition and genetic algorithm is used to optimize the test cases to cover the entire possible path. The optimal test suites are devised by the method of sampling statistics.

Proceedings ArticleDOI
10 Jul 2009
TL;DR: A flexible business process customization framework to solve problems caused by Orchestrating SaaS business process through BPEL specifications is proposed.
Abstract: With the rapid development of Internet and the gradual maturity of SOA, SaaS has become a popular software service mode. This paper proposes a flexible business process customization framework to solve problems caused byorchestrating SaaS business process through BPEL specifications. The framework is fully independent of BPEL engine and web services, which can realize a series of functions as following: enabling the tenant to customize service and process during defining process, verifying and checking the correctness of process logic while deploying process, modifying dynamically, substituting services andhandling abnormal situations according to the rules provided by tenants or the framework automatically at the runtime of process.

Proceedings ArticleDOI
10 Jul 2009
TL;DR: The findings show that TAM seems more suitable for general purpose context and usability test seems more reasonable and consistency for task-based context.
Abstract: In the past, most studies used Technology Acceptance Model (TAM) to test the degree of technology acceptance and usability test to measure the task performance respectively. However, the relationship between TAM and usability has not been addressed. In this paper, an E-learning task was tested and validated with PDA. The findings show that TAM seems more suitable for general purpose context and usability test seems more reasonable and consistency for task-based context.

Proceedings ArticleDOI
10 Jul 2009
TL;DR: In this article, a NFE model is constructed to analyze the heating steady thermal stress in a ZrO2/FGM/Ti-6Al-4V composite ECBF plate considered temperature dependency.
Abstract: A NFE model is constructed to analyze the heating steady thermal stress in a ZrO2/FGM/Ti-6Al-4V composite ECBF plate considered temperature dependency. From numerical calculation, when T0=300K Ta=670 and Tb=1 070K, the stress distributions in the plate were obtained. The results are as follows. The change of the FGM layer thickness is little effect on the stress in metal layer. Compared with M=0.1, when M=10, the stress difference on the ceramic surface is 133.9MPa, and the tensile stress at the interface between FGM and ceramic layers reduces by 52.3%. Compared with A=3.99, when A=0, the tensile stress on the ceramic surface reduces by 96.2%. When T0=300K, Ta=700K, compared with Tb=1 800K, when Tb=1 050K, the tensile stress in the plate reduces by 84.1%, and the maximum stress difference on the surface of ceramics is 1610.8MPa. Compared with the nongraded two-layered ceramic/metal composite plate, the thermal stress of ZrO2/FGM/Ti-6Al-4V composite ECBF plate is very gentle and smooth. The stress in graded three-layered composite plate considered temperature dependency becomes small obviously, and the maximum tensile stress on the metal surface reduces by 30.1%, and the maximum compressive stress on the ceramic surface reduces by 9.49%. The results provide the foundations of theoretical calculation for the design and application of the composite plate.

Proceedings ArticleDOI
10 Jul 2009
TL;DR: Simulations and related analyses show that in large-scale Ad hoc network, the routing protocols can significantly improve the efficiency of the route extend the network's lifetime.
Abstract: Ad hoc mobile network is a highly dynamic wireless network, routing is the key issues in application. The most of current routing protocols perform not well on energy-saving, for which a improved energy-saving AODV is proposed. The protocol proposes a strategy for energy levels and improved Hello mechanisms. Simulations and related analyses show that in large-scale Ad hoc network, the routing protocols can significantly improve the efficiency of the route extend the network's lifetime.

Proceedings ArticleDOI
10 Jul 2009
TL;DR: An adaptive multi-objective genetic algorithm is proposed to design the cognitive radio engine, and adaptive mutation mechanism and the elite strategy is introduced into the proposed algorithm in order to improve the performance.
Abstract: The radio frequency spectrum is a scarce natural resource, so it is very important to use the spectrum efficiently. Cognitive radio, which can greatly improve the spectrum utilization, is able to adjust the transmit parameters according to the environment. In this paper, an adaptive multi-objective genetic algorithm is proposed to design the cognitive radio engine. In order to improve the performance of the algorithm, adaptive mutation mechanism and the elite strategy is introduced into the proposed algorithm. Moreover, the proposed algorithm is used to design a cognitive radio engine in a multi-carrier system with ten sub-carriers. The simulation results show that the proposed algorithm is feasible and effective.

Proceedings ArticleDOI
10 Jul 2009
TL;DR: The integrated aircraft fuel fault diagnostic expert system which solves the problems of knowledge representation and knowledge acquisition of traditional expert system is realized and the hardware-in-loop simulation results show that the expert system diagnoses the fault in accessories rapidly and accurately.
Abstract: Theories of expert system and fuzzy artificial neural network (ANN) are applied to solve the problem of fault diagnosis in the aircraft fuel system. A multilayer neural network model of the aircraft fuel system is put forward and the integrated aircraft fuel fault diagnostic expert system which solves the problems of knowledge representation and knowledge acquisition of traditional expert system is realized. The hardware-in-loop simulation results show that the expert system diagnoses the fault in accessories rapidly and accurately and it is proved that the expert system is significative and helpful for further development in the aircraft fuel fault diagnosis.

Proceedings ArticleDOI
10 Jul 2009
TL;DR: In this paper, quantum algorithms for solving an instance of the subset-sum problem are proposed and a NMR experiment for the simplest subset- Sum problem is performed to test the theory.
Abstract: In this paper, quantum algorithms for solving an instance of the subset-sum problem is proposed and a NMR experiment for the simplest subset-sum problem to test our theory is also performed.

Proceedings ArticleDOI
10 Jul 2009
TL;DR: This paper presented a new gait identification and authentication method based on Haar wavelet and Radon transform, which can improve the rate of recognition by further optimization.
Abstract: This paper presented a new gait identification and authentication method based on Haar wavelet and Radon transform. This method consists of two stages, gait modeling and recognition. In the first stage, images extracted from video sequences are pre-processed into binary silhouette. In terms of gait cycle, they are divided into 4 states, in each of which the distinct images are selected. The horizontal and vertical features are acquired by Haar wavelet, and then feature vectors are obtained respectively by Radon transform. In the second stage, probe sequences are fed. After feature transform of image sequence, the value of similarity can be obtained by comparing probe vectors with gallery ones and optimized to give gait recognition. Consequently, we can improve the rate of recognition by further optimization.

Proceedings ArticleDOI
10 Jul 2009
TL;DR: Experimental results demonstrate that the proposed TWSVM-based CAD system offers a very satisfactory performance for mass detection in digitizing mammograms and compares with previous SVM- based classifier, it provides higher classification accuracy and computational speed.
Abstract: —Mass in mammogram can be an indicator of breast cancer In this work we propose a new approach using Twin Support Vector Machine (TWSVM) for automated detection of mass in digital mammograms This algorithm finds two hyperplanes to classify data points into different classes according to the relevance between a given point and either plane It works much faster than original SVM classifier The proposed scheme is evaluated by a data set of 100 clinical mammograms from DDSM Experimental results demonstrate that the proposed TWSVM-based CAD system offers a very satisfactory performance for mass detection in digitizing mammograms Compare with previous SVM-based classifier, it provides higher classification accuracy and computational speed

Proceedings ArticleDOI
10 Jul 2009
TL;DR: A Semantic Web Service Description Model (WSDM4S) and its formal description based on SHOIN+(D) are proposed, which attempt to offer an effective model for description, publication, discovery, composition, and execution of Web services based on semantic description.
Abstract: Semantic Web Service technology provides a strong support for automation software development based on Web service. By analyzing the existing description models and methods of semantic Web service, a Semantic Web Service Description Model (WSDM4S) and its formal description based on SHOIN+(D) are proposed, which attempt to offer an effective model for description, publication, discovery, composition, and execution of Web services based on semantic description. And a Semantic Web Service Description Language (WSDL4S) based on XML is designed to support the WSDM4S. Based on WSDL4S, Web Services could be packaged into basic semantic unit of semantic software development.

Proceedings ArticleDOI
10 Jul 2009
TL;DR: A real-time intrusion detection model based on SOM algorithm is presented, which takes the system call process as studying object to illustrate the performance of this model, and shows that intrusion detection of anomalous based SOM not only meets requirements, but also has a strong nature of real- time.
Abstract: In this paper, we first introduce the principle of SOM algorithm, and then study the real-time intrusion detection system, finding it is not very good in the real-time intrusion detection system. Regarding this problem, this paper presents a real-time intrusion detection model based on SOM algorithm, and takes the system call process as studying object to illustrate the performance of this model. Finally, we compared the detection ability of SOM algorithm with other intrusion detection models by simulation experiment, and the experiment shows that intrusion detection of anomalous based SOM not only meets requirements, but also has a strong nature of real-time, and the nature of real-time of the anomaly intrusion detection model based on SOM is 100 times higher than that of the Forrest and Lee’s method.

Proceedings ArticleDOI
10 Jul 2009
TL;DR: A method combined K-means clustering algorithm and mathematical morphology is presented and shows that the method presented is accurate, automatic and robust in the segmentation of microarray image processing.
Abstract: Complementary DNA microarray technology is a powerful tool in many areas. Usually a two channel microarray Red–Green (RG) image is obtained. Due to the nature of cDNA microarray technology, a number of impairments affect the cDNA microarray image before the analysis such as identification of differentially expressed genes. Microarray image processing plays a crucial role in the extraction and quantitative analysis of the relative abundance of the DNA product. In this paper, a method combined K-means clustering algorithm and mathematical morphology is presented. Mathematical morphology is a useful tool for extracting image components. K-means clustering algorithm has a good performance in the segmentation of microarray image processing. The result of the experiment shows that the method presented in this paper is accurate, automatic and robust.

Proceedings ArticleDOI
10 Jul 2009
TL;DR: The theoretical analysis and simulation research result shows that the new two-dimension PID fuzzy controller, namely incremental fuzzy PD+ fuzzy ID, possesses the feature of non-linearity besides that of the traditional PID controller.
Abstract: The PID fuzzy controller is fallen into one-dimension, two-dimension and three-dimension one in terms of structure, among which the two-dimension PID fuzzy controller is the most popular one. Based on these methods, a new two-dimension PID fuzzy controller, namely incremental fuzzy PD+ fuzzy ID is put forward. By comparing the illustration of the fuzzy PD and fuzzy ID, the conclusion that the two corresponding fuzzy control rules are similar is reached. The theoretical analysis shows that the PID fuzzy controller possesses the feature of non-linearity besides that of the traditional PID controller. The simulation research result shows that its control feature is better than that of the fuzzy PI and the conventional PID controller

Proceedings ArticleDOI
10 Jul 2009
TL;DR: Thissystem has MVC architecture, which is a mutil-tier system including presentation layer, business layer, datapersistence layer and database layer, which can separate codes, and improve maintainability and reuse of the system.
Abstract: If some small libraries use traditional librarymanagement system, they maybe waste resources. Inorder to this problem, a library management systembased on struts and hibernate frame is put forward. Thissystem has MVC architecture. It is a mutil-tier systemincluding presentation layer, business layer, datapersistence layer and database layer, which can separatecodes, and improve maintainability and reuse of thesystem.

Proceedings ArticleDOI
10 Jul 2009
TL;DR: In this article, a model of solar cells based on its output characteristic is built by using LabVIEW as software, and the output characteristics of silicon solar cells and the maximum power point tracking system are simulated under different solar radiations.
Abstract: By using LabVIEW as software, a model of solar cells based on its output characteristic is built. The output characteristics of silicon solar cells and the maximum power point tracking system are simulated under different solar radiations. The influence of the internal resistance to the maximum power point and the fill factor of silicon solar cells are also simulated. The simulation results verify the nonlinear output characteristic of silicon solar cell and the system is proved to be very effective in determining the most appropriate load to stabilize the maximum power point of the cell. It is also proved by the results that the internal resistance is a key factor to the maximum power point and the fill factor of solar cells.

Proceedings ArticleDOI
10 Jul 2009
TL;DR: Transmission rate performance is investigated under the peak and average interference constraints and simulation results show that the transmission rate of cognitive radio link can be improved by cooperation, especially when the power of the direct link is limited.
Abstract: Cognitive radio has been considered as a promisingparadigm to achieve efficient spectrum usage by allowing the coexistence of the primary and secondary networks. Onefundamental challenge is to ensure the quality of service (QoS) of the primary link while maximizing the transmission rate of the secondary links. In this paper, we investigate cooperation based spectrum access at the secondary networks. If the QoS requirement of primary link is stringent, low power is allowed at the cognitive radio user and the transmission rate is limited. It is beneficial that the cognitive radio user obtains cooperation from the surrounding users to increase the rate. The best relay which provides the maximal transmission rate is selected for cooperation. The transmission rate performance is investigated under the peak and average interference constraints (IC). Thesimulation results show that the transmission rate of cognitive radio link can be improved by cooperation, especially when the power of the direct link is limited. The achieved transmission rate under the average IC is higher than that under the peak IC, due to power adaptation between the transmitter and relay. And higher gain can be obtained as the number of potential relays increases.