首页 > 最新文献

2011 Third International Conference on Intelligent Networking and Collaborative Systems最新文献

英文 中文
Diffusion in Social Networks and Market Stability 社会网络中的扩散与市场稳定性
Nikos Salamanos, Dimitris Konstantopoulos
In this paper we propose a model of the evolution of a market with linear utilities in the presence of both local and global social interactions. In the scenario considered, there is a market consisting of buyers and divisible goods. In consecutive time periods, the decision of a buyer is affected by the consumption plan of his neighbors and by a global signal, the distribution of actions of all agents. Moreover, we assume that the market prices and the allocation of the goods are stabilized by the law of supply and demand. We simulate the model, along with a market equilibria algorithm, and we investigate the long time behavior of the system. Specifically, we analyze the distribution of the prices and the market share of the products, when the configuration of the network is Erdos-Renyi and Scale-free graph. The experimental results show that the long time behavior of the system is not always static. The long time states depict a periodic pattern and are sensitive to a) the initial agents' beliefs, b) the weights that each agent assigns to the local and the global factor respectively and c)the degree distribution of the nodes in the network.
在本文中,我们提出了一个具有线性效用的市场在本地和全球社会互动中演变的模型。在考虑的场景中,有一个由买家和可分商品组成的市场。在连续的时间段内,购买者的决策受到其邻居的消费计划和一个全局信号的影响,即所有代理人的行动分布。此外,我们假设市场价格和商品配置是由供求规律稳定的。我们用市场均衡算法模拟了该模型,并研究了系统的长期行为。具体来说,我们分析了当网络配置为鄂尔多斯-人意图和无标度图时,产品的价格和市场份额的分布。实验结果表明,系统的长时间行为并不总是静态的。长时间状态描述了一种周期性模式,并且对a)初始代理的信念,b)每个代理分别分配给局部和全局因子的权重以及c)网络中节点的度分布敏感。
{"title":"Diffusion in Social Networks and Market Stability","authors":"Nikos Salamanos, Dimitris Konstantopoulos","doi":"10.1109/INCoS.2011.76","DOIUrl":"https://doi.org/10.1109/INCoS.2011.76","url":null,"abstract":"In this paper we propose a model of the evolution of a market with linear utilities in the presence of both local and global social interactions. In the scenario considered, there is a market consisting of buyers and divisible goods. In consecutive time periods, the decision of a buyer is affected by the consumption plan of his neighbors and by a global signal, the distribution of actions of all agents. Moreover, we assume that the market prices and the allocation of the goods are stabilized by the law of supply and demand. We simulate the model, along with a market equilibria algorithm, and we investigate the long time behavior of the system. Specifically, we analyze the distribution of the prices and the market share of the products, when the configuration of the network is Erdos-Renyi and Scale-free graph. The experimental results show that the long time behavior of the system is not always static. The long time states depict a periodic pattern and are sensitive to a) the initial agents' beliefs, b) the weights that each agent assigns to the local and the global factor respectively and c)the degree distribution of the nodes in the network.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":"76 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130603000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Tabu Search Algorithm for Efficient Node Placement in Wireless Mesh Networks 无线Mesh网络中高效节点布局的禁忌搜索算法
F. Xhafa, C. Sánchez, Admir Barolli, M. Takizawa
Achieving network connectivity and user coverage are among the most important objectives in Wireless Mesh Networks (WMNs). These objectives are formulated as optimization problems, which unfortunately cannot be solved to optimality due to their computational hardness nature. Heuristic methods have thus been considered for such optimization problem aiming to compute near optimal solutions in reasonable amount of time. One family of heuristic methods known for their efficiency is that of local search algorithms. The methods in this family explore the solution space through a path of solutions, visited during the search process. Among methods of this family, Tabu Search (TS) has shown its superiority due to advanced mechanisms to overcome getting stuck into local optima. In this paper we present the implementation and evaluation of TS for the problem of mesh router node placement in WMNs, formulated as a bi-objective optimization problem. The optimization model consists in the maximization of the size of the giant component in the mesh routers network (for measuring network connectivity) and that of user coverage. The experimental evaluation showed the efficiency of TS in solving a variety of problem instances generated using different distributions for the mesh client nodes in WMNs.
实现网络连接和用户覆盖是无线网状网络(WMNs)最重要的目标之一。这些目标被表述为优化问题,不幸的是,由于其计算困难的性质,这些问题无法得到最优解。因此,启发式方法已被考虑用于此类优化问题,旨在在合理的时间内计算出接近最优的解决方案。一类以高效著称的启发式方法是局部搜索算法。该家族中的方法通过在搜索过程中访问的解路径来探索解空间。在这类方法中,禁忌搜索(TS)因其克服陷入局部最优的先进机制而显示出其优越性。在本文中,我们提出了网格路由器节点放置问题的TS实现和评估,该问题被表述为双目标优化问题。优化模型包括网状路由器网络中巨型组件(用于测量网络连通性)的大小和用户覆盖的大小的最大化。实验结果表明,TS算法可以有效地解决WMNs中网格客户端节点使用不同分布方式产生的各种问题实例。
{"title":"A Tabu Search Algorithm for Efficient Node Placement in Wireless Mesh Networks","authors":"F. Xhafa, C. Sánchez, Admir Barolli, M. Takizawa","doi":"10.1109/INCOS.2011.44","DOIUrl":"https://doi.org/10.1109/INCOS.2011.44","url":null,"abstract":"Achieving network connectivity and user coverage are among the most important objectives in Wireless Mesh Networks (WMNs). These objectives are formulated as optimization problems, which unfortunately cannot be solved to optimality due to their computational hardness nature. Heuristic methods have thus been considered for such optimization problem aiming to compute near optimal solutions in reasonable amount of time. One family of heuristic methods known for their efficiency is that of local search algorithms. The methods in this family explore the solution space through a path of solutions, visited during the search process. Among methods of this family, Tabu Search (TS) has shown its superiority due to advanced mechanisms to overcome getting stuck into local optima. In this paper we present the implementation and evaluation of TS for the problem of mesh router node placement in WMNs, formulated as a bi-objective optimization problem. The optimization model consists in the maximization of the size of the giant component in the mesh routers network (for measuring network connectivity) and that of user coverage. The experimental evaluation showed the efficiency of TS in solving a variety of problem instances generated using different distributions for the mesh client nodes in WMNs.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":"25 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129664386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Design and Implementation of a Dynamic Reconfigurable Classroom for Cooperative Learning 合作学习动态可重构课堂的设计与实现
Hideki Kondo, H. Narahara
In order to practically examine a new type of class, in which cooperative learning is taken into consideration, we designed and built a classroom. This classroom, in which furniture and a flexible ICT basis are both designed reconfigurable, supports much more complex interactions between learners than in a traditional classroom. Two months' observation of the activities in the classroom shows that many aspects of the reconfigurations have encouraged complex interactions within cooperative learning.
为了实践检验一种新型的以合作学习为核心的课堂,我们设计并搭建了一个教室。这种教室的家具和灵活的信息通信技术基础都是可重新配置的,与传统教室相比,它支持学习者之间更复杂的互动。两个月来对课堂活动的观察表明,重新配置的许多方面鼓励了合作学习中复杂的互动。
{"title":"Design and Implementation of a Dynamic Reconfigurable Classroom for Cooperative Learning","authors":"Hideki Kondo, H. Narahara","doi":"10.1109/INCoS.2011.72","DOIUrl":"https://doi.org/10.1109/INCoS.2011.72","url":null,"abstract":"In order to practically examine a new type of class, in which cooperative learning is taken into consideration, we designed and built a classroom. This classroom, in which furniture and a flexible ICT basis are both designed reconfigurable, supports much more complex interactions between learners than in a traditional classroom. Two months' observation of the activities in the classroom shows that many aspects of the reconfigurations have encouraged complex interactions within cooperative learning.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128063572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Insider Threats are Getting Worse within Industries: Isolated Secondary Backup Required 工业内部威胁越来越严重:需要独立的辅助备份
Kwangjin Bae, Sungjin Kim, Yongoo Lee, I. You, Kangbin Yim, Taeho Son
Recently, several severe cyber attacks to commercial networks and their systems have been found more frequently compared to the last half decade. According to the analysis results from the experts, most of the attacks had similar approach to reach their goal: compromising the web server and bridging to the storage server instead of direct penetrating through the firewalls within the intranet. Because web servers are usually easier to compromise than other insiders in the server farm, this unwanted approach would be common for hackers. This means that the servers in the secured server farm became unsafe and the storage server has no exception. Because of the reason, this paper introduces the concept of the secondary backup and proposes a consequent framework.
最近,与过去五年相比,对商业网络及其系统的几次严重网络攻击已经被发现得更加频繁。根据专家的分析结果,大多数攻击都采用类似的方法来达到目标:破坏web服务器并桥接到存储服务器,而不是直接穿透内部网内的防火墙。由于web服务器通常比服务器群中的其他内部人员更容易被入侵,因此这种不受欢迎的方法对黑客来说很常见。这意味着受保护服务器群中的服务器变得不安全,存储服务器也不例外。基于此,本文引入了二次备份的概念,并提出了相应的框架。
{"title":"Insider Threats are Getting Worse within Industries: Isolated Secondary Backup Required","authors":"Kwangjin Bae, Sungjin Kim, Yongoo Lee, I. You, Kangbin Yim, Taeho Son","doi":"10.1109/INCoS.2011.165","DOIUrl":"https://doi.org/10.1109/INCoS.2011.165","url":null,"abstract":"Recently, several severe cyber attacks to commercial networks and their systems have been found more frequently compared to the last half decade. According to the analysis results from the experts, most of the attacks had similar approach to reach their goal: compromising the web server and bridging to the storage server instead of direct penetrating through the firewalls within the intranet. Because web servers are usually easier to compromise than other insiders in the server farm, this unwanted approach would be common for hackers. This means that the servers in the secured server farm became unsafe and the storage server has no exception. Because of the reason, this paper introduces the concept of the secondary backup and proposes a consequent framework.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126007190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hexagonal Resonator in Two Dimensional Photonic Crystal Structure 二维光子晶体结构中的六方谐振腔
H. Maeda, Hiroyuki Terashima, Yongmei Zhang, T. Shinohara
Propagation and filtering characteristics of two dimensional pillar-type photonic crystal wave guide with hexagonal resonator were experimentally demonstrated. Measurement was done by using a scale model in microwave frequency with lattice period P=26.5 mm, diameter of pillar phi=7.5 mm and its dielectric constant epsilon_r=36.0 around 4 GHz. First, single isolated wave guide was set up by using line-defect in array of pillars. After confirming wave guide operation in frequency range between 3.6 and 4.2 GHz, a hexagonal resonator which have side length of 4P along with center of resonator wave guide, was situated between a pair of input/output wave guides. The hexagonal resonator showed frequency dependent transmission characteristics to output ports at frequencies corresponding to lambda_g as propagating wave. Applying good separation characteristics with respect to input frequency, this resonator circuit is available for signal drop device for wavelength division multiplexing (WDM) system.
实验证明了六方腔二维柱型光子晶体波导的传输和滤波特性。在4 GHz左右,采用晶格周期P=26.5 mm,柱直径phi=7.5 mm,介电常数epsilon_r=36.0的微波频率比例模型进行测量。首先,利用柱阵中的线缺陷建立了单隔离波导;在确定波导在3.6 ~ 4.2 GHz频率范围内工作后,在一对输入/输出波导之间放置一个沿谐振腔波导中心边长为4P的六角形谐振腔。六角形谐振器在lambda_g作为传播波对应的频率处显示出与输出端口频率相关的传输特性。该谐振电路具有良好的输入频率分离特性,可用于波分复用(WDM)系统的信号下降器件。
{"title":"Hexagonal Resonator in Two Dimensional Photonic Crystal Structure","authors":"H. Maeda, Hiroyuki Terashima, Yongmei Zhang, T. Shinohara","doi":"10.1109/INCoS.2011.99","DOIUrl":"https://doi.org/10.1109/INCoS.2011.99","url":null,"abstract":"Propagation and filtering characteristics of two dimensional pillar-type photonic crystal wave guide with hexagonal resonator were experimentally demonstrated. Measurement was done by using a scale model in microwave frequency with lattice period P=26.5 mm, diameter of pillar phi=7.5 mm and its dielectric constant epsilon_r=36.0 around 4 GHz. First, single isolated wave guide was set up by using line-defect in array of pillars. After confirming wave guide operation in frequency range between 3.6 and 4.2 GHz, a hexagonal resonator which have side length of 4P along with center of resonator wave guide, was situated between a pair of input/output wave guides. The hexagonal resonator showed frequency dependent transmission characteristics to output ports at frequencies corresponding to lambda_g as propagating wave. Applying good separation characteristics with respect to input frequency, this resonator circuit is available for signal drop device for wavelength division multiplexing (WDM) system.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126732069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Implementation of Activity Recognition from Accelerometers on Mobile Phones 基于加速度计的手机活动识别的实现
Go Hirakawa, T. Nwe, Yuichi Hattori, Sozo Inoue
In this paper, we propose an experimental implementation of activity recognition feature on the activity information gathering system named ALKAN. In this experiment, we develop activity recognition algorithm using machine learning on server system, and port it onto client system on mobile phone. We also confirmed the feasibility of real-time activity recognition with actual mobile phone.
本文提出了一种基于活动信息采集系统ALKAN的活动识别特征的实验实现。在本实验中,我们利用机器学习在服务器系统上开发了活动识别算法,并将其移植到手机客户端系统上。我们还用实际的手机验证了实时活动识别的可行性。
{"title":"Implementation of Activity Recognition from Accelerometers on Mobile Phones","authors":"Go Hirakawa, T. Nwe, Yuichi Hattori, Sozo Inoue","doi":"10.1109/INCoS.2011.103","DOIUrl":"https://doi.org/10.1109/INCoS.2011.103","url":null,"abstract":"In this paper, we propose an experimental implementation of activity recognition feature on the activity information gathering system named ALKAN. In this experiment, we develop activity recognition algorithm using machine learning on server system, and port it onto client system on mobile phone. We also confirmed the feasibility of real-time activity recognition with actual mobile phone.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":"4 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113972553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MS2HM: A Multimedia Service Session Handoff Method between Heterogeneous Wireless Networks MS2HM:异构无线网络间多媒体业务会话切换方法
Yulong Shen, Zhiwei Zhang, Jianfeng Ma, Qingqi Pei, Qijian Xu, H. Yin
The IMS (IP Multimedia Subsystem) can provide multimedia services between heterogeneous wireless networks. But the efficiency of the service session handoff will bring a significant impact to user experience. For the integration of heterogeneous wireless networks, we propose a SIP-based multimedia service session handoff method named MS2HM. To reduce the handoff delay between heterogeneous wireless networks, the MS2HM uses the methods of advance registration and old-new address temporary matching. We modeled the node processing delay and network transmission delay, and analyze the total delay and the packet loss rate of the MS2HM. The MS2HM can meet the low delay and low packet loss rate requirements of IMS service session handoff between heterogeneous wireless networks, and ensure the QoS of the IMS services.
IMS (IP多媒体子系统)能够在异构无线网络之间提供多媒体业务。但是服务会话切换的效率会给用户体验带来很大的影响。针对异构无线网络的集成问题,提出了一种基于sip协议的多媒体业务会话切换方法MS2HM。为了减少异构无线网络之间的切换延迟,MS2HM采用了提前注册和新旧地址临时匹配的方法。建立了节点处理时延和网络传输时延模型,分析了MS2HM的总时延和丢包率。MS2HM能够满足异构无线网络间IMS业务会话切换的低时延、低丢包率要求,保证IMS业务的QoS。
{"title":"MS2HM: A Multimedia Service Session Handoff Method between Heterogeneous Wireless Networks","authors":"Yulong Shen, Zhiwei Zhang, Jianfeng Ma, Qingqi Pei, Qijian Xu, H. Yin","doi":"10.1109/INCoS.2011.121","DOIUrl":"https://doi.org/10.1109/INCoS.2011.121","url":null,"abstract":"The IMS (IP Multimedia Subsystem) can provide multimedia services between heterogeneous wireless networks. But the efficiency of the service session handoff will bring a significant impact to user experience. For the integration of heterogeneous wireless networks, we propose a SIP-based multimedia service session handoff method named MS2HM. To reduce the handoff delay between heterogeneous wireless networks, the MS2HM uses the methods of advance registration and old-new address temporary matching. We modeled the node processing delay and network transmission delay, and analyze the total delay and the packet loss rate of the MS2HM. The MS2HM can meet the low delay and low packet loss rate requirements of IMS service session handoff between heterogeneous wireless networks, and ensure the QoS of the IMS services.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131661202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Development of Network User Authentication Gateway System Using "High Performance Packet Processing Engine" 基于“高性能包处理引擎”的网络用户认证网关系统开发
Yuki Wakamizu, M. Otani, Kenzi Watanabe
In recent years, there have been to studied to construct a new network infrastructure for accepting evolved network technology. There is a research of controlling the network by "Flow". Flow is used a combination of layers of L4 from L2, to identify the communication network traffic. High Performance Packet Processing Engine (HPPPE), that FUJITSU developed, is one of the next generation packet processing engine. This system can process data from low-layer up to high-layer according to the format of the data being used per service. HPPPE provides service functions as add-on. In Saga University, user authentication system for using network named Open gate has been developed and used widely from 2001. In this study, we have developed network user authentication gateway system like Open gate using "HPPPE". This system determines using the network and ending the network based on "Flow".
近年来,人们一直在研究如何构建一种新的网络基础设施,以适应不断发展的网络技术。有一种用“流”来控制网络的研究。流量是使用L4层从L2层的组合,来识别通信网络的流量。HPPPE (High Performance Packet Processing Engine)是富士通开发的下一代包处理引擎之一。该系统可以根据每个服务使用的数据格式从底层到高层进行数据处理。HPPPE作为附加组件提供业务功能。Saga大学从2001年开始开发了Open gate网络用户认证系统,并得到了广泛的应用。在本研究中,我们利用“HPPPE”技术开发了Open gate这样的网络用户认证网关系统。本系统根据“流量”来确定网络的使用和结束。
{"title":"Development of Network User Authentication Gateway System Using \"High Performance Packet Processing Engine\"","authors":"Yuki Wakamizu, M. Otani, Kenzi Watanabe","doi":"10.1109/INCoS.2011.4","DOIUrl":"https://doi.org/10.1109/INCoS.2011.4","url":null,"abstract":"In recent years, there have been to studied to construct a new network infrastructure for accepting evolved network technology. There is a research of controlling the network by \"Flow\". Flow is used a combination of layers of L4 from L2, to identify the communication network traffic. High Performance Packet Processing Engine (HPPPE), that FUJITSU developed, is one of the next generation packet processing engine. This system can process data from low-layer up to high-layer according to the format of the data being used per service. HPPPE provides service functions as add-on. In Saga University, user authentication system for using network named Open gate has been developed and used widely from 2001. In this study, we have developed network user authentication gateway system like Open gate using \"HPPPE\". This system determines using the network and ending the network based on \"Flow\".","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":"132 S225","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113972681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile Ad-hoc Network Routing Protocols Performance Evaluation Using NS-3 Simulator 基于NS-3模拟器的移动自组网路由协议性能评估
Makoto Ikeda, M. Hiyama, Elis Kulla, L. Barolli
Wireless networks have become increasingly popular. They can provide mobile users with ubiquitous communication capability and information access regardless of locations. In this paper, we evaluate the throughput of wireless multihop networks by simulations. For simulations, we used ns-3 network simulator considering Ad hoc On-Demand Distance Vector (AODV), Optimized Link State Routing (OLSR) and Destination-Sequenced Distance-Vector (DSDV) routing protocols. We also evaluate the average throughput, the average packets received rate and the percentage of Constant Bit Rate (CBR) for different area sizes and different number of nodes. The evaluation results show that OLSR has the best performance than other protocols for smaller area.
无线网络变得越来越流行。它们可以为移动用户提供无处不在的通信能力和信息访问,而不受位置的限制。本文通过仿真来评估无线多跳网络的吞吐量。为了进行模拟,我们使用ns-3网络模拟器考虑了Ad hoc按需距离矢量(AODV),优化链路状态路由(OLSR)和目的地顺序距离矢量(DSDV)路由协议。我们还评估了不同区域大小和不同节点数量下的平均吞吐量、平均数据包接收率和恒定比特率(CBR)的百分比。评价结果表明,在较小的区域内,OLSR具有较好的性能。
{"title":"Mobile Ad-hoc Network Routing Protocols Performance Evaluation Using NS-3 Simulator","authors":"Makoto Ikeda, M. Hiyama, Elis Kulla, L. Barolli","doi":"10.1109/INCoS.2011.119","DOIUrl":"https://doi.org/10.1109/INCoS.2011.119","url":null,"abstract":"Wireless networks have become increasingly popular. They can provide mobile users with ubiquitous communication capability and information access regardless of locations. In this paper, we evaluate the throughput of wireless multihop networks by simulations. For simulations, we used ns-3 network simulator considering Ad hoc On-Demand Distance Vector (AODV), Optimized Link State Routing (OLSR) and Destination-Sequenced Distance-Vector (DSDV) routing protocols. We also evaluate the average throughput, the average packets received rate and the percentage of Constant Bit Rate (CBR) for different area sizes and different number of nodes. The evaluation results show that OLSR has the best performance than other protocols for smaller area.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":"342 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124230311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Linked Data in Disaster Mitigation and Preparedness 减灾和备灾中的关联数据
Thushari Silva, V. Wuwongse, H. Sharma
The development of information systems which simulate disaster preparedness and mitigation activities requires integration of large amount of data from different diversified data sources. The goal of our work is to provide an effective way to integrate such different, distributed data sources that would bring them into a standardized and exchangeable common data format and then to publish them as Linked Open Data (LOD). We describe different sets of published data sources and how they are interconnected with other sources in the LOD cloud in order to develop an information system which simulates disaster mitigation processes. Examples are provided in order to demonstrate the benefits of this system to vulnerable people and emergency management teams as well as other organizations involved in disaster management.
开发模拟备灾和减灾活动的信息系统需要整合来自不同数据源的大量数据。我们工作的目标是提供一种有效的方法来集成这些不同的分布式数据源,将它们转化为标准化的、可交换的通用数据格式,然后将它们作为链接开放数据(LOD)发布。我们描述了不同的发布数据源集,以及它们如何与LOD云中的其他数据源相互连接,以便开发一个模拟减灾过程的信息系统。举例说明这一系统对弱势群体、应急管理小组以及其他参与灾害管理的组织的好处。
{"title":"Linked Data in Disaster Mitigation and Preparedness","authors":"Thushari Silva, V. Wuwongse, H. Sharma","doi":"10.1109/INCoS.2011.113","DOIUrl":"https://doi.org/10.1109/INCoS.2011.113","url":null,"abstract":"The development of information systems which simulate disaster preparedness and mitigation activities requires integration of large amount of data from different diversified data sources. The goal of our work is to provide an effective way to integrate such different, distributed data sources that would bring them into a standardized and exchangeable common data format and then to publish them as Linked Open Data (LOD). We describe different sets of published data sources and how they are interconnected with other sources in the LOD cloud in order to develop an information system which simulates disaster mitigation processes. Examples are provided in order to demonstrate the benefits of this system to vulnerable people and emergency management teams as well as other organizations involved in disaster management.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124428372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2011 Third International Conference on Intelligent Networking and Collaborative Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1