首页 > 最新文献

J. Networks最新文献

英文 中文
Social Relation Based Cache Distribution Policy in Wireless Mobile Networks 基于社会关系的无线移动网络缓存分配策略
Pub Date : 2014-04-09 DOI: 10.4304/jnw.9.9.2279-2288
Lei Yang, Yifang Qin, Xu Zhou, Hongjia Li, S. Ci, Hui Tang
Recent advances in intelligent mobile terminal result in the rapid development of wireless mobile networks, which has inherently properties of high access time, low bandwidth and other shortcoming that pull down the Quality of Service (QoS). Cache technologies are considered as the most favorable tools for dealing with the problems of wireless traffic flow, having attracted tremendous interest from both the engineering and academic fields. However, most of the algorithms and tools developed are essentially based on descriptive models instead of predictive models, which are not capable of processing content traffic in the optimal way for wireless users with strong social characteristics. In this paper, a novel social relation based cache distribution policy is proposed, by which not only interaction among network users is used to detect the influential users among them, but also inherent friend relationships are used to predict desirable contents. These features are utilized to assist cache distribution among caching servers in advance for the purpose of serving the future needs of wireless mobile users. Evaluation analyzes the realistic network dataset, and the simulation results demonstrate the superior performance of the proposed optimization framework over existing systems
随着智能移动终端技术的不断发展,无线移动网络发展迅速,但其固有的接入时间长、带宽低等缺点降低了服务质量(QoS)。高速缓存技术被认为是解决无线通信流问题的最有利的工具,引起了工程界和学术界的极大兴趣。然而,大多数开发的算法和工具本质上都是基于描述性模型,而不是基于预测模型,无法以最优的方式处理具有较强社交特征的无线用户的内容流量。本文提出了一种新的基于社会关系的缓存分配策略,该策略不仅利用网络用户之间的交互关系来检测其中有影响力的用户,而且利用固有的朋友关系来预测期望的内容。这些特性用于预先在缓存服务器之间协助缓存分发,以满足无线移动用户的未来需求。对实际网络数据集进行了评估分析,仿真结果表明所提出的优化框架优于现有系统
{"title":"Social Relation Based Cache Distribution Policy in Wireless Mobile Networks","authors":"Lei Yang, Yifang Qin, Xu Zhou, Hongjia Li, S. Ci, Hui Tang","doi":"10.4304/jnw.9.9.2279-2288","DOIUrl":"https://doi.org/10.4304/jnw.9.9.2279-2288","url":null,"abstract":"Recent advances in intelligent mobile terminal result in the rapid development of wireless mobile networks, which has inherently properties of high access time, low bandwidth and other shortcoming that pull down the Quality of Service (QoS). Cache technologies are considered as the most favorable tools for dealing with the problems of wireless traffic flow, having attracted tremendous interest from both the engineering and academic fields. However, most of the algorithms and tools developed are essentially based on descriptive models instead of predictive models, which are not capable of processing content traffic in the optimal way for wireless users with strong social characteristics. In this paper, a novel social relation based cache distribution policy is proposed, by which not only interaction among network users is used to detect the influential users among them, but also inherent friend relationships are used to predict desirable contents. These features are utilized to assist cache distribution among caching servers in advance for the purpose of serving the future needs of wireless mobile users. Evaluation analyzes the realistic network dataset, and the simulation results demonstrate the superior performance of the proposed optimization framework over existing systems","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"9 1 1","pages":"2279-2288"},"PeriodicalIF":0.0,"publicationDate":"2014-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83408019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Inverse Shortest Path Problem on an Uncertain Graph 不确定图上的逆最短路径问题
Pub Date : 2014-04-09 DOI: 10.4304/jnw.9.9.2353-2359
Jian Zhou, F. Yang, Ke Wang
The inverse shortest path problem is to minimize the modification on the edge weights such that a predetermined path becomes the shortest one from the origin to the destination with respect to the new edge weights. In this paper, the inverse shortest path problem is considered on a graph with uncertain edge weights. It is shown that the model of the uncertain inverse shortest path problem can be transformed into a deterministic counterpart and then be solved efficiently. A numerical example is presented as well for illustration.
逆最短路径问题是使边权的修改最小,使预定路径相对于新的边权成为从起点到目的地的最短路径。研究了边权不确定图上的逆最短路径问题。结果表明,不确定逆最短路径问题模型可以转化为确定逆最短路径问题模型,从而有效地求解。最后给出了一个数值算例。
{"title":"An Inverse Shortest Path Problem on an Uncertain Graph","authors":"Jian Zhou, F. Yang, Ke Wang","doi":"10.4304/jnw.9.9.2353-2359","DOIUrl":"https://doi.org/10.4304/jnw.9.9.2353-2359","url":null,"abstract":"The inverse shortest path problem is to minimize the modification on the edge weights such that a predetermined path becomes the shortest one from the origin to the destination with respect to the new edge weights. In this paper, the inverse shortest path problem is considered on a graph with uncertain edge weights. It is shown that the model of the uncertain inverse shortest path problem can be transformed into a deterministic counterpart and then be solved efficiently. A numerical example is presented as well for illustration.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"69 1","pages":"2353-2359"},"PeriodicalIF":0.0,"publicationDate":"2014-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78960271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Evolutionary Game Analysis of Knowledge Sharing in Asymmetric Upstream and Downstream Enterprises of Supply Chain 非对称供应链上下游企业知识共享的演化博弈分析
Pub Date : 2014-04-09 DOI: 10.4304/jnw.9.9.2490-2497
Hengshan Zong, Guozhu Jia, Feng Jin, Jili Kong
As the core of the production means of enterprises, knowledge has become the strategic resource of the supply chain. Through the knowledge sharing among the enterprises in the supply chain, the efficiency of knowledge innovation and application can be improved. In this paper, based on the state-of-the-art literature, the evolutionary game model of asymmetric upstream and downstream enterprises in the supply chain is built; the dynamic evolutionary process and the influencing factors of the selection of knowledge sharing strategies are analyzed. Based on those analysis, the results show that selecting knowledge sharing strategy in the upstream and downstream enterprises are affected by the factors: the cost coefficient of knowledge sharing, the risk coefficient of knowledge sharing, the gap between the amount of knowledge sharing of enterprises, which have negative correlation to selecting knowledge sharing strategy in the upstream and downstream enterprises; the coefficient of gains in social relationships, the synergistic effect coefficient of knowledge sharing, the incentive and punishment factor of knowledge sharing, which have positive correlation to selecting knowledge sharing strategy. On the basis of these factors, the concrete measures to promote knowledge sharing are put forward. This research has a positive significance for remodeling and strengthening the supply chain core advantages in the era of knowledge economy
知识作为企业生产资料的核心,已经成为供应链的战略资源。通过供应链企业之间的知识共享,可以提高知识创新和应用的效率。本文在文献研究的基础上,建立了不对称供应链上下游企业的演化博弈模型;分析了知识共享策略选择的动态演化过程和影响因素。分析结果表明,上下游企业知识共享战略的选择受知识共享成本系数、知识共享风险系数、企业间知识共享量差距等因素的影响,它们与上下游企业知识共享战略的选择呈负相关关系;社会关系收益系数、知识共享的协同效应系数、知识共享的奖惩因子与知识共享策略的选择呈正相关。在此基础上,提出了促进知识共享的具体措施。本研究对知识经济时代供应链核心优势的重塑和强化具有积极意义
{"title":"Evolutionary Game Analysis of Knowledge Sharing in Asymmetric Upstream and Downstream Enterprises of Supply Chain","authors":"Hengshan Zong, Guozhu Jia, Feng Jin, Jili Kong","doi":"10.4304/jnw.9.9.2490-2497","DOIUrl":"https://doi.org/10.4304/jnw.9.9.2490-2497","url":null,"abstract":"As the core of the production means of enterprises, knowledge has become the strategic resource of the supply chain. Through the knowledge sharing among the enterprises in the supply chain, the efficiency of knowledge innovation and application can be improved. In this paper, based on the state-of-the-art literature, the evolutionary game model of asymmetric upstream and downstream enterprises in the supply chain is built; the dynamic evolutionary process and the influencing factors of the selection of knowledge sharing strategies are analyzed. Based on those analysis, the results show that selecting knowledge sharing strategy in the upstream and downstream enterprises are affected by the factors: the cost coefficient of knowledge sharing, the risk coefficient of knowledge sharing, the gap between the amount of knowledge sharing of enterprises, which have negative correlation to selecting knowledge sharing strategy in the upstream and downstream enterprises; the coefficient of gains in social relationships, the synergistic effect coefficient of knowledge sharing, the incentive and punishment factor of knowledge sharing, which have positive correlation to selecting knowledge sharing strategy. On the basis of these factors, the concrete measures to promote knowledge sharing are put forward. This research has a positive significance for remodeling and strengthening the supply chain core advantages in the era of knowledge economy","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"11 1","pages":"2490-2497"},"PeriodicalIF":0.0,"publicationDate":"2014-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87193375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization Algorithm of Power Communication Network Based on the Equivalent Network 基于等效网络的电力通信网优化算法
Pub Date : 2014-04-09 DOI: 10.4304/jnw.9.9.2474-2481
Ningzhe Xing
Electric power communication requires two nodes in the network or cable period expires, the communication network as a whole is still can continue to run. Reliable power network can provide reliable operation of electric power for dispatching communication security. Due to many key network nodes external connectivity in the electric power, communication network has only one path, so once the link damage because of emergencies, these networks because of the failure of nodes (or communication link) and power operation scheduling of exception can occur easily, thus to cause great damage to the safe operation of the whole power network. In order to improve the robustness of system in this case, this paper designed a new optimization algorithm based on the equivalent network to simplify the real network and the network analysis. This paper studies the nature of circular web spider's webs and predator characteristics, analysis of the structure characteristics of the orb web and information transfer mechanism, which constructs the network topology model of single and double artificially cobweb; all terminal reliability of the factor theorem analysis of single-layer artificial spider network topology, analysis results show that, compared with the network topology artificial spider web structure and the traditional star network, ring network, double loop network and star network, with better all terminal reliability and stronger survivability
电力通信要求两个节点在网络或电缆期限届满后,整个通信网络仍能继续运行。可靠的电网可以为调度通信安全提供电力的可靠运行。由于电力网络中许多关键节点对外连接,通信网络只有一条路径,因此一旦由于突发事件导致链路损坏,这些网络中由于节点(或通信链路)的故障而导致电力运行调度的异常就很容易发生,从而对整个电网的安全运行造成极大的损害。为了提高系统在这种情况下的鲁棒性,本文设计了一种新的基于等效网络的优化算法,简化了实际网络和网络分析。本文研究了圆网蜘蛛的网性质和捕食者的特点,分析了圆网蜘蛛的结构特点和信息传递机制,构建了单网和双网人工蛛网的网络拓扑模型;对单层人工蜘蛛网拓扑结构的全终端可靠性因素定理进行分析,分析结果表明,人工蜘蛛网结构与传统星型网、环形网、双环网和星型网的网络拓扑结构相比,具有更好的全终端可靠性和更强的生存能力
{"title":"Optimization Algorithm of Power Communication Network Based on the Equivalent Network","authors":"Ningzhe Xing","doi":"10.4304/jnw.9.9.2474-2481","DOIUrl":"https://doi.org/10.4304/jnw.9.9.2474-2481","url":null,"abstract":"Electric power communication requires two nodes in the network or cable period expires, the communication network as a whole is still can continue to run. Reliable power network can provide reliable operation of electric power for dispatching communication security. Due to many key network nodes external connectivity in the electric power, communication network has only one path, so once the link damage because of emergencies, these networks because of the failure of nodes (or communication link) and power operation scheduling of exception can occur easily, thus to cause great damage to the safe operation of the whole power network. In order to improve the robustness of system in this case, this paper designed a new optimization algorithm based on the equivalent network to simplify the real network and the network analysis. This paper studies the nature of circular web spider's webs and predator characteristics, analysis of the structure characteristics of the orb web and information transfer mechanism, which constructs the network topology model of single and double artificially cobweb; all terminal reliability of the factor theorem analysis of single-layer artificial spider network topology, analysis results show that, compared with the network topology artificial spider web structure and the traditional star network, ring network, double loop network and star network, with better all terminal reliability and stronger survivability","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"10 1","pages":"2474-2481"},"PeriodicalIF":0.0,"publicationDate":"2014-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87774996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Output Feedback Tracking Control Based on Neural Network for a Class of SISO Strict Feedback Nonlinear Systems 一类SISO严格反馈非线性系统的神经网络输出反馈跟踪控制
Pub Date : 2014-04-09 DOI: 10.4304/jnw.9.9.2521-2528
Hui Hu, Zhongxiao Hao, Pengfei Guo, Xilong Qu
The paper proposes a new output feedback tracking controller using neural network (NN) for a class of SISO strict-feedback nonlinear systems that only the output variables can be measured. The distinguished aspect of the controller is that no backstepping design is employed, and the strict-feedback systems could be transformed into the standard affine form. The gains of observer and controller are simultaneously tuned according to output tracking error based on non-separation principle design. With the universal approximation property of NN and the simultaneous parametrisation, no Lipschitz assumption and SPR condition are employed which makes the system construct simple. The proposed neural network controller can guarantee that output tracking error and all the states in the closed-loop system are the semi-globally ultimately bounded by Lyapunov approach. Finally the simulation results are used to demonstrate the effectiveness of the control scheme.
针对一类只有输出变量可测的SISO严格反馈非线性系统,提出了一种新的神经网络输出反馈跟踪控制器。该控制器的特点是不采用反步设计,将严格反馈系统转化为标准仿射形式。基于无分离原理设计,根据输出跟踪误差同时调整观测器和控制器的增益。利用神经网络的普遍逼近性质和同时参数化,不使用Lipschitz假设和SPR条件,使系统结构简单。所提出的神经网络控制器可以保证输出跟踪误差和闭环系统的所有状态都是由Lyapunov方法最终有界的半全局。最后通过仿真结果验证了该控制方案的有效性。
{"title":"Output Feedback Tracking Control Based on Neural Network for a Class of SISO Strict Feedback Nonlinear Systems","authors":"Hui Hu, Zhongxiao Hao, Pengfei Guo, Xilong Qu","doi":"10.4304/jnw.9.9.2521-2528","DOIUrl":"https://doi.org/10.4304/jnw.9.9.2521-2528","url":null,"abstract":"The paper proposes a new output feedback tracking controller using neural network (NN) for a class of SISO strict-feedback nonlinear systems that only the output variables can be measured. The distinguished aspect of the controller is that no backstepping design is employed, and the strict-feedback systems could be transformed into the standard affine form. The gains of observer and controller are simultaneously tuned according to output tracking error based on non-separation principle design. With the universal approximation property of NN and the simultaneous parametrisation, no Lipschitz assumption and SPR condition are employed which makes the system construct simple. The proposed neural network controller can guarantee that output tracking error and all the states in the closed-loop system are the semi-globally ultimately bounded by Lyapunov approach. Finally the simulation results are used to demonstrate the effectiveness of the control scheme.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"32 1","pages":"2521-2528"},"PeriodicalIF":0.0,"publicationDate":"2014-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81084235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
P2P Network Traffic Identification Based on Random Forest Algorithm 基于随机森林算法的P2P网络流量识别
Pub Date : 2014-04-09 DOI: 10.4304/jnw.9.9.2456-2461
Yajun Hou
With the rapid development of computer technique in the past decades, the emergence of P2P techniqueprompts the network computing model evolving from centralized network to distributed network. Although P2P technique has brought tremendous changes to the network technique, P2P technique also exposes a lot of problems during its implementation. If we can manage the P2P network traffic effectively,e.g. identifies and controls its traffic and distinguishes its services, then it will make great sense for research on improving the performance of network service and use efficiency. However,the traditional approaches have shown a great lack of adaptability in dealing with samples which contain heterogeneous information.large scale of samples,unnormalizeddata or uneven data distributed in high dimensional feature space. This paper is based on therelated researches, to overcomethe limitations and shortcomings of current network traffic identification; we explored network traffic identification and came up with an approach of network traffic identification based on random forest. This paper uses campus network of North China University of Water Resources and Electric Power and takes its outlet flow as sample data to experiment. The result shows that random forest is suitable for large scale of data situation, complex dimensional situation, data contain lots of heterogeneous information etc. Additionally, random forest algorithm provide broad application prospects and rich design ideas for machine learning in feature extraction, multiple class object detection and pattern recognition fields
近几十年来,随着计算机技术的飞速发展,P2P技术的出现促使网络计算模式从集中式网络向分布式网络演变。虽然P2P技术给网络技术带来了巨大的变化,但P2P技术在实现过程中也暴露出许多问题。如果我们能够有效地管理P2P网络流量,例如:对其流量进行识别和控制,对其业务进行区分,对提高网络业务性能和使用效率的研究具有重要意义。然而,传统的方法在处理包含异构信息的样本时表现出极大的适应性不足。样本规模大,数据未归一化或数据分布在高维特征空间中不均匀。本文在相关研究的基础上,克服了当前网络流量识别的局限性和不足;对网络流量识别进行了研究,提出了一种基于随机森林的网络流量识别方法。本文以华北水利电力大学校园网为例,以其出水口流量为样本数据进行实验。结果表明,随机森林适用于大数据规模、复杂维数、数据包含大量异构信息等情况。此外,随机森林算法在特征提取、多类目标检测和模式识别等领域为机器学习提供了广阔的应用前景和丰富的设计思路
{"title":"P2P Network Traffic Identification Based on Random Forest Algorithm","authors":"Yajun Hou","doi":"10.4304/jnw.9.9.2456-2461","DOIUrl":"https://doi.org/10.4304/jnw.9.9.2456-2461","url":null,"abstract":"With the rapid development of computer technique in the past decades, the emergence of P2P techniqueprompts the network computing model evolving from centralized network to distributed network. Although P2P technique has brought tremendous changes to the network technique, P2P technique also exposes a lot of problems during its implementation. If we can manage the P2P network traffic effectively,e.g. identifies and controls its traffic and distinguishes its services, then it will make great sense for research on improving the performance of network service and use efficiency. However,the traditional approaches have shown a great lack of adaptability in dealing with samples which contain heterogeneous information.large scale of samples,unnormalizeddata or uneven data distributed in high dimensional feature space. This paper is based on therelated researches, to overcomethe limitations and shortcomings of current network traffic identification; we explored network traffic identification and came up with an approach of network traffic identification based on random forest. This paper uses campus network of North China University of Water Resources and Electric Power and takes its outlet flow as sample data to experiment. The result shows that random forest is suitable for large scale of data situation, complex dimensional situation, data contain lots of heterogeneous information etc. Additionally, random forest algorithm provide broad application prospects and rich design ideas for machine learning in feature extraction, multiple class object detection and pattern recognition fields","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"28 1","pages":"2456-2461"},"PeriodicalIF":0.0,"publicationDate":"2014-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87405323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Study on the Survival of Wireless Sensor Networks Based on Hierarchical Topology Control Method 基于层次拓扑控制方法的无线传感器网络生存研究
Pub Date : 2014-04-09 DOI: 10.4304/jnw.9.9.2482-2489
Hongdong Zhang, Yuli Song
Wireless sensor network (WSN) is composed of a large number of sensor nodes, it can real-time monitor and collect various information of monitored objects and passed to the user for analysis and use. This paper studies and designs a hierarchical WSN network management architecture and communication model, focus on the wireless sensor network topology control mechanism and based on the analysis of the existing hierarchical topology control algorithms. On the introduction of node load, the judgment method and the backup cluster head, design a load balancing topology control algorithm, the cluster management WSN, effectively balance the node energy consumption, reducing the number of network clusters, and the cluster head failure. Design of WSN network management protocol has a simple data type, operation type and the format of the message level HWSNMP, the improved MER protocol code to PDU code, the coded data length ratio after using the BER code length is reduced by 10%. Based on the hierarchical structure as the research object and energy-saving topology, a comprehensive analysis of the LEACH algorithm in layered structures (physical model, algorithm), and compares the advantages and disadvantages and the existing typical algorithms based on LEACH, the cluster algorithm based on node energy balance, balance the node energy consumption to meet the clusters in the theory history
无线传感器网络(WSN)由大量的传感器节点组成,它可以实时监控和收集被监控对象的各种信息并传递给用户进行分析和使用。本文研究并设计了一种分层的WSN网络管理体系结构和通信模型,重点研究了无线传感器网络的拓扑控制机制,并在分析现有分层拓扑控制算法的基础上。在引入节点负载、判断方法和备份簇头的基础上,设计了负载均衡的拓扑控制算法,实现了WSN的集群管理,有效地平衡了节点的能耗,减少了网络簇的数量,以及簇头故障的发生。设计的WSN网络管理协议具有简单的数据类型、操作类型和消息级别的格式HWSNMP,将改进的MER协议码改为PDU码,采用BER码后编码的数据长度比减少了10%。本文以分层结构和节能拓扑为研究对象,全面分析了分层结构中的LEACH算法(物理模型、算法),并与现有的基于LEACH算法的典型算法的优缺点进行了比较,其中基于节点能量平衡的聚类算法,在理论史上兼顾节点能量消耗以满足聚类
{"title":"Study on the Survival of Wireless Sensor Networks Based on Hierarchical Topology Control Method","authors":"Hongdong Zhang, Yuli Song","doi":"10.4304/jnw.9.9.2482-2489","DOIUrl":"https://doi.org/10.4304/jnw.9.9.2482-2489","url":null,"abstract":"Wireless sensor network (WSN) is composed of a large number of sensor nodes, it can real-time monitor and collect various information of monitored objects and passed to the user for analysis and use. This paper studies and designs a hierarchical WSN network management architecture and communication model, focus on the wireless sensor network topology control mechanism and based on the analysis of the existing hierarchical topology control algorithms. On the introduction of node load, the judgment method and the backup cluster head, design a load balancing topology control algorithm, the cluster management WSN, effectively balance the node energy consumption, reducing the number of network clusters, and the cluster head failure. Design of WSN network management protocol has a simple data type, operation type and the format of the message level HWSNMP, the improved MER protocol code to PDU code, the coded data length ratio after using the BER code length is reduced by 10%. Based on the hierarchical structure as the research object and energy-saving topology, a comprehensive analysis of the LEACH algorithm in layered structures (physical model, algorithm), and compares the advantages and disadvantages and the existing typical algorithms based on LEACH, the cluster algorithm based on node energy balance, balance the node energy consumption to meet the clusters in the theory history","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"1 1","pages":"2482-2489"},"PeriodicalIF":0.0,"publicationDate":"2014-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88323142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Empirical Measurement and Analysis of I2P Routers I2P路由器的实证测量与分析
Pub Date : 2014-04-09 DOI: 10.4304/jnw.9.9.2269-2278
Peipeng Liu, Lihong Wang, Qingfeng Tan, Quangang Li, Xuebin Wang, Jinqiao Shi
With the increased focus on Internet privacy, especially after the exposure of PRISM(an Internet surveillance program), anonymous communication have been getting more and more attentions. One of the most widely used anonymous communication systems is I2P(Invisible Internet Project). And as opposed to Tor’s(another popular anonymous communication system) directory-based approach, which provides a centralized directory server to manage the overall ‘view’ of the network, I2P is fully distributed and self organizing, which aims to avoid attackers’ enumeration of all I2P’s routers. In this paper, based on I2P’s operating mechanism, we presented two passive and two active methods to discover I2P routers. In a more than two week’s collecting experiment, about 25640 routers were discovered everyday, which turned out to be an almost full coverage(94.9%) of the I2P network compared with the data announced on the official website [1]. And based on the routers collected, this paper further made a preliminary analysis of both the I2P network’s overall status and its security. The result showed that I2P is a well structured P2P network, while some powerful attackers operating several routers are still possible to perform compromise attack to break I2P users’ anonymity given the current I2P’s security mechanism. Finally, this paper discussed some countermeasures to improve the security of the I2P network.
随着人们对网络隐私的日益关注,特别是在棱镜(PRISM)网络监控项目曝光后,匿名通信受到越来越多的关注。最广泛使用的匿名通信系统之一是I2P(隐形互联网计划)。与Tor(另一种流行的匿名通信系统)基于目录的方法相反,它提供了一个集中的目录服务器来管理网络的整体“视图”,I2P是完全分布式和自组织的,旨在避免攻击者枚举所有I2P的路由器。本文基于I2P的运行机制,提出了两种被动和主动发现I2P路由器的方法。在为期两周多的收集实验中,每天发现约25640台路由器,与官方网站公布的数据相比,几乎达到了I2P网络的全覆盖(94.9%)[1]。并在收集到的路由器的基础上,进一步对I2P网络的总体状况和安全性进行了初步分析。结果表明,I2P是一个结构良好的P2P网络,但在现有的安全机制下,一些操作多台路由器的强大攻击者仍有可能对I2P用户的匿名性进行妥协攻击。最后,本文讨论了提高I2P网络安全性的对策。
{"title":"Empirical Measurement and Analysis of I2P Routers","authors":"Peipeng Liu, Lihong Wang, Qingfeng Tan, Quangang Li, Xuebin Wang, Jinqiao Shi","doi":"10.4304/jnw.9.9.2269-2278","DOIUrl":"https://doi.org/10.4304/jnw.9.9.2269-2278","url":null,"abstract":"With the increased focus on Internet privacy, especially after the exposure of PRISM(an Internet surveillance program), anonymous communication have been getting more and more attentions. One of the most widely used anonymous communication systems is I2P(Invisible Internet Project). And as opposed to Tor’s(another popular anonymous communication system) directory-based approach, which provides a centralized directory server to manage the overall ‘view’ of the network, I2P is fully distributed and self organizing, which aims to avoid attackers’ enumeration of all I2P’s routers. In this paper, based on I2P’s operating mechanism, we presented two passive and two active methods to discover I2P routers. In a more than two week’s collecting experiment, about 25640 routers were discovered everyday, which turned out to be an almost full coverage(94.9%) of the I2P network compared with the data announced on the official website [1]. And based on the routers collected, this paper further made a preliminary analysis of both the I2P network’s overall status and its security. The result showed that I2P is a well structured P2P network, while some powerful attackers operating several routers are still possible to perform compromise attack to break I2P users’ anonymity given the current I2P’s security mechanism. Finally, this paper discussed some countermeasures to improve the security of the I2P network.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"12 1","pages":"2269-2278"},"PeriodicalIF":0.0,"publicationDate":"2014-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81722786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
An Auto-Matching Model with Pattern Recognition Using Bayesian Classifier for Parallel Programming on A Multi-Core Processor 基于贝叶斯分类器的模式识别自动匹配模型在多核处理器上的并行编程
Pub Date : 2014-04-09 DOI: 10.4304/jnw.9.9.2556-2566
Kete Wang, Lisheng Wang, Xinkao Liao, George Albert
The emerging multi-core processor architecture has greatly escalated scientific computing, but, at the same time, made parallel programming increasingly complex and challenging. In this paper, the use of the Auto Parallel Classification (APC) model in an Object-Oriented Parallel Model (OOPModel) environment is demonstrated. A designed module provides a traversal and a reduction of the DAG task graph. The parallel characteristics vectors, which are analyzed according to Naive Bayesian classification theory, are critical parameters for matching and generating parallel design patterns and various skeletal frameworks. Through extensive experimentation, it is demonstrated, that by using the Map-Reduce pattern to develop a minimum-sort algorithm, in conjunction with the APC model, we can achieve a reduction in the complexity of parallel programming and the minimization of errors. Most importantly, through scientific experimentation, this document will further demonstrate that correct computational results and movements toward linear speed-up can be accomplished.
新兴的多核处理器体系结构极大地提升了科学计算的水平,但同时也使并行编程变得越来越复杂和具有挑战性。本文演示了自动并行分类(APC)模型在面向对象并行模型(OOPModel)环境中的应用。设计的模块提供DAG任务图的遍历和简化。根据朴素贝叶斯分类理论分析的并行特征向量是匹配和生成并行设计模式和各种骨架框架的关键参数。通过大量的实验证明,通过使用Map-Reduce模式开发一种最小排序算法,结合APC模型,我们可以实现并行编程复杂性的降低和错误的最小化。最重要的是,通过科学实验,本文将进一步证明正确的计算结果和线性加速的运动是可以实现的。
{"title":"An Auto-Matching Model with Pattern Recognition Using Bayesian Classifier for Parallel Programming on A Multi-Core Processor","authors":"Kete Wang, Lisheng Wang, Xinkao Liao, George Albert","doi":"10.4304/jnw.9.9.2556-2566","DOIUrl":"https://doi.org/10.4304/jnw.9.9.2556-2566","url":null,"abstract":"The emerging multi-core processor architecture has greatly escalated scientific computing, but, at the same time, made parallel programming increasingly complex and challenging. In this paper, the use of the Auto Parallel Classification (APC) model in an Object-Oriented Parallel Model (OOPModel) environment is demonstrated. A designed module provides a traversal and a reduction of the DAG task graph. The parallel characteristics vectors, which are analyzed according to Naive Bayesian classification theory, are critical parameters for matching and generating parallel design patterns and various skeletal frameworks. Through extensive experimentation, it is demonstrated, that by using the Map-Reduce pattern to develop a minimum-sort algorithm, in conjunction with the APC model, we can achieve a reduction in the complexity of parallel programming and the minimization of errors. Most importantly, through scientific experimentation, this document will further demonstrate that correct computational results and movements toward linear speed-up can be accomplished.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"33 1","pages":"2556-2566"},"PeriodicalIF":0.0,"publicationDate":"2014-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87908043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SOFERS: Scenario Ontology for Emergency Response System SOFERS:应急响应系统的场景本体
Pub Date : 2014-04-09 DOI: 10.4304/jnw.9.9.2529-2535
Yu Liu, Shihong Chen, Yunhua Wang
with the ability to assist people to make reasonable decisions in an emergency, scenario-response paradigm has been widely regarded as one of the most effective emergency management models. In order to promote the processing capacity of scenario information for Emergency Response System (ERS), a new kind of scenario ontology is proposed in this paper. Following the well-known modeling primitives, the scenario ontology is constructed on the basis of PROTON (Proto Ontology), the reference layer ontology of FactForge that includes some central datasets of Linked Open Data (LOD). The event module, scenario module and mitigation module comprise the core level scenario ontology, defined with some core concepts and relations, which can be reused in the domain level scenario ontology. Considering earthquake is a representative emergency, we analyze the scenario information required by decision makers in some earthquakes, and design the scenario ontology of earthquake as an example in the domain level scenario ontologies. To show the validity of the scenario ontology, we implement the scenario ontology of earthquake with Protege and develop a prototype system, which can retrieve some parts of scenario information from FactForge and provide a visualization interface for decision makers to browse the scenario instances involved in an earthquake
情景响应模式具有帮助人们在紧急情况下做出合理决策的能力,被广泛认为是最有效的应急管理模式之一。为了提高应急响应系统(ERS)对场景信息的处理能力,提出了一种新的场景本体。场景本体是在FactForge的参考层本体PROTON (Proto ontology)的基础上构建的,该本体遵循著名的建模原语,包含一些关联开放数据(LOD)的中心数据集。事件模块、场景模块和缓解模块组成核心级场景本体,定义了一些核心概念和关系,可在域级场景本体中重用。考虑到地震是一种具有代表性的突发事件,分析了一些地震中决策者所需的情景信息,并在领域级情景本体中以地震为例设计了地震情景本体。为了证明场景本体的有效性,我们利用Protege实现了地震场景本体,并开发了一个原型系统,该系统可以从FactForge中检索部分场景信息,为决策者提供一个可视化界面来浏览地震所涉及的场景实例
{"title":"SOFERS: Scenario Ontology for Emergency Response System","authors":"Yu Liu, Shihong Chen, Yunhua Wang","doi":"10.4304/jnw.9.9.2529-2535","DOIUrl":"https://doi.org/10.4304/jnw.9.9.2529-2535","url":null,"abstract":"with the ability to assist people to make reasonable decisions in an emergency, scenario-response paradigm has been widely regarded as one of the most effective emergency management models. In order to promote the processing capacity of scenario information for Emergency Response System (ERS), a new kind of scenario ontology is proposed in this paper. Following the well-known modeling primitives, the scenario ontology is constructed on the basis of PROTON (Proto Ontology), the reference layer ontology of FactForge that includes some central datasets of Linked Open Data (LOD). The event module, scenario module and mitigation module comprise the core level scenario ontology, defined with some core concepts and relations, which can be reused in the domain level scenario ontology. Considering earthquake is a representative emergency, we analyze the scenario information required by decision makers in some earthquakes, and design the scenario ontology of earthquake as an example in the domain level scenario ontologies. To show the validity of the scenario ontology, we implement the scenario ontology of earthquake with Protege and develop a prototype system, which can retrieve some parts of scenario information from FactForge and provide a visualization interface for decision makers to browse the scenario instances involved in an earthquake","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"16 1","pages":"2529-2535"},"PeriodicalIF":0.0,"publicationDate":"2014-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79007679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
J. Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1