首页 > 最新文献

2021 International Conference on Networking and Network Applications (NaNA)最新文献

英文 中文
Tetris: Near-optimal Scheduling for Multi-path Deadline-aware Transport Protocol 俄罗斯方块:多路径截止时间感知传输协议的近最优调度
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00014
Yanwen Liu, Wei Su, Lizhuang Tan
Deadline-aware Transport Protocol (DTP) is a new QUIC-based transmission protocol that provides deliver-before-deadline service. Single-path DTP is not conducive to flow fairness and does not make full use of bandwidth. Compared with single-path DTP, the decision space and the solving difficulty of multipath DTP (MPDTP) scheduling are larger. In this paper, we propose a near-optimal scheduling algorithm Tetris for MPDTP. Tetris is a block scheduler based on stream characteristics at the transmission layer. We have verified its feasibility on the simulator under the deployed heterogeneous path of different network environment. The results show that our scheduling algorithm allows data blocks to be delivered before the delivery time as much as possible. The transmission completion time has been increased by 19.53% on average, and the transmission delay of all blocks have been reduced by 11.27%.
截止日期感知传输协议(DTP)是一种基于quic的新型传输协议,提供截止日期前的交付服务。单路径DTP不利于流量公平,不能充分利用带宽。与单路径DTP相比,多路径DTP调度的决策空间和求解难度更大。本文提出了一种MPDTP的近最优调度算法Tetris。俄罗斯方块是一个基于传输层流特性的块调度程序。在不同网络环境下部署异构路径,并在模拟器上验证了其可行性。结果表明,我们的调度算法允许数据块尽可能早于交付时间交付。传输完成时间平均提高19.53%,各区块传输时延平均降低11.27%。
{"title":"Tetris: Near-optimal Scheduling for Multi-path Deadline-aware Transport Protocol","authors":"Yanwen Liu, Wei Su, Lizhuang Tan","doi":"10.1109/NaNA53684.2021.00014","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00014","url":null,"abstract":"Deadline-aware Transport Protocol (DTP) is a new QUIC-based transmission protocol that provides deliver-before-deadline service. Single-path DTP is not conducive to flow fairness and does not make full use of bandwidth. Compared with single-path DTP, the decision space and the solving difficulty of multipath DTP (MPDTP) scheduling are larger. In this paper, we propose a near-optimal scheduling algorithm Tetris for MPDTP. Tetris is a block scheduler based on stream characteristics at the transmission layer. We have verified its feasibility on the simulator under the deployed heterogeneous path of different network environment. The results show that our scheduling algorithm allows data blocks to be delivered before the delivery time as much as possible. The transmission completion time has been increased by 19.53% on average, and the transmission delay of all blocks have been reduced by 11.27%.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127626886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Beam Selection Algorithm for Beamspace HAP-MIMO Systems Based on Statistical CSI 基于统计CSI的波束空间HAP-MIMO系统波束选择算法
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00016
Shiyi Zou, Ling-ge Jiang, Pingping Ji, Chen He, Di He, Guorong Zhang
In this letter, a beam selection algorithm is put forward for beamspace high altitude platform massive multiple-input multiple-output (HAP-MIMO) systems. Specifically, the algorithm is subject to the maximization of match degree between the beams and users, which is constructed by exploiting statistical channel state information (CSI). The beam selection is partitioned into two parts. In the first part, we obtain a reduced-dimensional dominant beam set consisting of each user’s most preferred beams according to the match degree. In the second part, we formulate the selection of optimal beams from the dominant beam set as an assignment problem that can be solved by Kuhn-Munkres algorithm. Numerical results demonstrate the performance enhancement of the proposed algorithm with respect to energy efficiency.
针对波束空间高空平台大规模多输入多输出(HAP-MIMO)系统,提出了一种波束选择算法。具体而言,该算法以波束与用户匹配度最大化为目标,利用统计信道状态信息(CSI)构建波束与用户匹配度。梁的选择分为两部分。在第一部分中,我们根据匹配度得到由每个用户最喜欢的光束组成的降维优势光束集。在第二部分中,我们将从优势波束集中选择最优波束的问题表述为一个可以用Kuhn-Munkres算法求解的分配问题。数值结果表明,该算法在能效方面得到了提高。
{"title":"Beam Selection Algorithm for Beamspace HAP-MIMO Systems Based on Statistical CSI","authors":"Shiyi Zou, Ling-ge Jiang, Pingping Ji, Chen He, Di He, Guorong Zhang","doi":"10.1109/NaNA53684.2021.00016","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00016","url":null,"abstract":"In this letter, a beam selection algorithm is put forward for beamspace high altitude platform massive multiple-input multiple-output (HAP-MIMO) systems. Specifically, the algorithm is subject to the maximization of match degree between the beams and users, which is constructed by exploiting statistical channel state information (CSI). The beam selection is partitioned into two parts. In the first part, we obtain a reduced-dimensional dominant beam set consisting of each user’s most preferred beams according to the match degree. In the second part, we formulate the selection of optimal beams from the dominant beam set as an assignment problem that can be solved by Kuhn-Munkres algorithm. Numerical results demonstrate the performance enhancement of the proposed algorithm with respect to energy efficiency.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"1443 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127443524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Modified K-means User Grouping Design for HAP Massive MIMO Systems 一种改进的HAP大规模MIMO系统K-means用户分组设计
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00057
Guorong Zhang, Ling-ge Jiang, Pingping Ji, Shiyi Zou, Chen He, Di He
In this paper, we propose a new user grouping scheme for the high altitude platform (HAP) massive Multiple-Input Multiple-Output (MIMO) systems based on statistical-eigenmode (SE). It has been proved that SE makes a major contribution to signal power for HAPs. Then, a Fubini-Study distance based modified K-means (FS-MKM) user grouping method is proposed aiming at reducing intra-group interference and improving system performance. The proposed modified K-means algorithm improves the initial points selection of the original K-means algorithm. The Fubini-Study distance is obtained based on the SEs of different users. Simulation results confirm that the proposed user grouping algorithm yields significant performance enhancement.
针对高空平台(HAP)大规模多输入多输出(MIMO)系统,提出了一种基于统计特征模态(SE)的用户分组方案。事实证明,SE对HAPs的信号功率有重要贡献。然后,提出了一种基于Fubini-Study距离的改进K-means (FS-MKM)用户分组方法,以减少组内干扰,提高系统性能。改进的K-means算法改进了原K-means算法的初始点选取。Fubini-Study距离是根据不同用户的SEs得到的。仿真结果验证了所提出的用户分组算法的性能有显著提高。
{"title":"A Modified K-means User Grouping Design for HAP Massive MIMO Systems","authors":"Guorong Zhang, Ling-ge Jiang, Pingping Ji, Shiyi Zou, Chen He, Di He","doi":"10.1109/NaNA53684.2021.00057","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00057","url":null,"abstract":"In this paper, we propose a new user grouping scheme for the high altitude platform (HAP) massive Multiple-Input Multiple-Output (MIMO) systems based on statistical-eigenmode (SE). It has been proved that SE makes a major contribution to signal power for HAPs. Then, a Fubini-Study distance based modified K-means (FS-MKM) user grouping method is proposed aiming at reducing intra-group interference and improving system performance. The proposed modified K-means algorithm improves the initial points selection of the original K-means algorithm. The Fubini-Study distance is obtained based on the SEs of different users. Simulation results confirm that the proposed user grouping algorithm yields significant performance enhancement.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116689568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative study of symmetric cryptographic algorithms 对称密码算法的比较研究
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00026
Alibek Nurgaliyev, Hua Wang
This article provides an unbiased comparison of the most popular and commonly used algorithms in the field of data encryption. The capacity to secure data from various attacks, as well as the elapsed time and efficiency of data encryption, are the main features that distinguish encryption algorithms. We compared the most prevalent symmetric encryption algorithms, including DES, 3DES, Blowfish, MARS, and AES, in this study. Each algorithm was compared by processing data blocks of various sizes to estimate encryption and decryption speeds and compare entropy. The given comparison takes into account the behavior and performance of the algorithms while utilizing varied data loads because the main objective is to execute these algorithms with various settings. We also looked at characteristics including flexibility, key extension possibilities, potential attacks, entropy, and security vulnerability of the algorithms, all of which affect the cryptosystem’s efficiency.
本文对数据加密领域中最流行和最常用的算法进行了公正的比较。保护数据免受各种攻击的能力,以及数据加密的耗时和效率,是区分加密算法的主要特征。在本研究中,我们比较了最流行的对称加密算法,包括DES、3DES、Blowfish、MARS和AES。通过处理不同大小的数据块来比较每种算法,以估计加密和解密速度并比较熵。在使用不同的数据负载时,给出的比较考虑了算法的行为和性能,因为主要目标是用不同的设置执行这些算法。我们还研究了算法的灵活性、密钥扩展可能性、潜在攻击、熵和安全漏洞等特征,所有这些都会影响密码系统的效率。
{"title":"Comparative study of symmetric cryptographic algorithms","authors":"Alibek Nurgaliyev, Hua Wang","doi":"10.1109/NaNA53684.2021.00026","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00026","url":null,"abstract":"This article provides an unbiased comparison of the most popular and commonly used algorithms in the field of data encryption. The capacity to secure data from various attacks, as well as the elapsed time and efficiency of data encryption, are the main features that distinguish encryption algorithms. We compared the most prevalent symmetric encryption algorithms, including DES, 3DES, Blowfish, MARS, and AES, in this study. Each algorithm was compared by processing data blocks of various sizes to estimate encryption and decryption speeds and compare entropy. The given comparison takes into account the behavior and performance of the algorithms while utilizing varied data loads because the main objective is to execute these algorithms with various settings. We also looked at characteristics including flexibility, key extension possibilities, potential attacks, entropy, and security vulnerability of the algorithms, all of which affect the cryptosystem’s efficiency.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121567965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Trade-off Between Privacy and Utility in Local Differential Privacy 局部差分隐私中隐私与效用的权衡
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00071
Mengqian Li, Youliang Tian, Junpeng Zhang, Dandan Fan, Dongmei Zhao
In statistical queries work, such as frequency estimation, the untrusted data collector could as an honest-but-curious (HbC) or malicious adversary to learn true values. Local differential privacy(LDP) protocols have been applied against the untrusted third party in data collecting. Nevertheless, excessive noise of LDP will reduce data utility, thus affecting the results of statistical queries. Therefore, it is significant to research the trade-off between privacy and utility. In this paper, we first measure the privacy loss by observing the maximum posterior confidence of the adversary (data collector). Then, through theoretical analysis and comparison we obtain the most suitable utility measure that is Wasserstein distance. Based on these, we introduce an originality framework for privacy-utility tradeoff framework, finding that this system conforms to the Pareto optimality state and formalizing a payoff function to find optimal equilibrium point under Pareto efficiency. Finally, we illustrate the efficacy of our system model by the Adult dataset from the UCI machine learning repository.
在统计查询工作中,例如频率估计,不受信任的数据收集器可以作为诚实但好奇(HbC)或恶意对手来学习真实值。在数据收集过程中,采用LDP (Local differential privacy)协议来对抗不可信的第三方。然而,过多的LDP噪声会降低数据的效用,从而影响统计查询的结果。因此,研究隐私与效用之间的权衡具有重要意义。在本文中,我们首先通过观察对手(数据收集器)的最大后验置信度来度量隐私损失。然后,通过理论分析和比较,得出了最合适的效用度量,即沃瑟斯坦距离。在此基础上,我们引入了隐私-效用权衡框架的独创性框架,发现该系统符合帕累托最优状态,并形式化了一个支付函数来寻找帕累托效率下的最优平衡点。最后,我们通过UCI机器学习存储库中的成人数据集来说明我们的系统模型的有效性。
{"title":"The Trade-off Between Privacy and Utility in Local Differential Privacy","authors":"Mengqian Li, Youliang Tian, Junpeng Zhang, Dandan Fan, Dongmei Zhao","doi":"10.1109/NaNA53684.2021.00071","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00071","url":null,"abstract":"In statistical queries work, such as frequency estimation, the untrusted data collector could as an honest-but-curious (HbC) or malicious adversary to learn true values. Local differential privacy(LDP) protocols have been applied against the untrusted third party in data collecting. Nevertheless, excessive noise of LDP will reduce data utility, thus affecting the results of statistical queries. Therefore, it is significant to research the trade-off between privacy and utility. In this paper, we first measure the privacy loss by observing the maximum posterior confidence of the adversary (data collector). Then, through theoretical analysis and comparison we obtain the most suitable utility measure that is Wasserstein distance. Based on these, we introduce an originality framework for privacy-utility tradeoff framework, finding that this system conforms to the Pareto optimality state and formalizing a payoff function to find optimal equilibrium point under Pareto efficiency. Finally, we illustrate the efficacy of our system model by the Adult dataset from the UCI machine learning repository.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121349315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dual attention mechanism object tracking algorithm based on Fully-convolutional Siamese network 基于全卷积Siamese网络的双注意机制目标跟踪算法
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00056
Sugang Ma, Zixian Zhang, Lei Zhang, Yanping Chen, Xiaobao Yang, Lei Pu, Z. Hou
In an effort to the problem of insufficient tracking performance of the Fully-convolutional Siamese network (SiamFC) in complex scenarios, a dual attention mechanism object tracking algorithm based on the Fully-convolutional Siamese network is proposed to improve the generalization capability of the tracker by ameliorating the robustness of the template characteristics. Firstly, a global context attention module is appended after the backbone network of SiamFC to ameliorate the power of original feature extraction from two dimensions of spatial and channel. Then, a coordinate attention module is introduced to augment the capability of feature extraction in the channel dimension. Finally, the model of the proposed algorithm is trained on the Got-10k dataset. Five related algorithms are tested on the OTB2015 dataset, the results of experiments manifest that our algorithm outperforms the baseline trackers, the success and precision rate of the proposed algorithm are improved by 3.3% and 6.3%. The average tracking speed is 145FPS, which can demand the requirement of real-time tracking.
针对全卷积Siamese网络在复杂场景下跟踪性能不足的问题,提出了一种基于全卷积Siamese网络的双注意机制目标跟踪算法,通过改善模板特征的鲁棒性来提高跟踪器的泛化能力。首先,在SiamFC骨干网基础上增加全局上下文关注模块,从空间和信道两个维度改进原始特征提取能力;然后,引入坐标关注模块,增强通道维度的特征提取能力。最后,在Got-10k数据集上对算法模型进行训练。在OTB2015数据集上对五种相关算法进行了测试,实验结果表明,我们的算法优于基线跟踪器,算法的成功率和准确率分别提高了3.3%和6.3%。平均跟踪速度为145FPS,可以满足实时跟踪的要求。
{"title":"Dual attention mechanism object tracking algorithm based on Fully-convolutional Siamese network","authors":"Sugang Ma, Zixian Zhang, Lei Zhang, Yanping Chen, Xiaobao Yang, Lei Pu, Z. Hou","doi":"10.1109/NaNA53684.2021.00056","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00056","url":null,"abstract":"In an effort to the problem of insufficient tracking performance of the Fully-convolutional Siamese network (SiamFC) in complex scenarios, a dual attention mechanism object tracking algorithm based on the Fully-convolutional Siamese network is proposed to improve the generalization capability of the tracker by ameliorating the robustness of the template characteristics. Firstly, a global context attention module is appended after the backbone network of SiamFC to ameliorate the power of original feature extraction from two dimensions of spatial and channel. Then, a coordinate attention module is introduced to augment the capability of feature extraction in the channel dimension. Finally, the model of the proposed algorithm is trained on the Got-10k dataset. Five related algorithms are tested on the OTB2015 dataset, the results of experiments manifest that our algorithm outperforms the baseline trackers, the success and precision rate of the proposed algorithm are improved by 3.3% and 6.3%. The average tracking speed is 145FPS, which can demand the requirement of real-time tracking.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115009769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A permission generation and configuration method based on Rules and FP-Growth algorithm 一种基于规则和FP-Growth算法的权限生成和配置方法
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00092
Lei Zhu, Ziheng Zhang, Xinhong Hei, Yichuan Wang, Ziliang Yang, Feixiong Hu, Ping He
With the development of computer technology, lots of enterprises had begun to build a data platform, and the data and its services already paly the import role in enterprises. However, the guarantee the data security is the primary task of platform, and data access control, especially the fine-grained access control model, had become an important means to enhance the security of platform. In this paper, we propose a data access permission configuration method based on rules and FP-growth. Specifically, FP-Growth algorithm is first used to obtain the frequent items and the association relations of data, which can be transformed into the enumerable permission configuration items. Then, the correspondence and frequency of data items are calculated to acquire the frequent items, the permission configuration acting on the data table columns is obtained according to the frequency of used data items. By filtering the strong association relation, the data items that are more closely related in the association relation and the corresponding data item values are finally obtained, and they are converted into the permission configuration that acts on the rows of the data table. The proposed method has been tested and verified to meet business needs, and the performance consumption is below the threshold. Moreover, it is feasible to utilize classical data mining algorithms to generate permission configuration, which has begun to apply the Blueking Data Platform.
随着计算机技术的发展,许多企业已经开始搭建数据平台,数据及其服务已经在企业中扮演着重要的角色。然而,保证数据安全是平台的首要任务,数据访问控制,特别是细粒度访问控制模型,已成为增强平台安全性的重要手段。本文提出了一种基于规则和fp增长的数据访问权限配置方法。首先使用FP-Growth算法获取数据的频繁项和关联关系,并将其转化为可枚举的权限配置项。然后,计算数据项的对应关系和频率,获得频繁项,根据数据项的使用频率,得到作用在数据表列上的权限配置。通过对强关联关系的过滤,最终获得关联关系中相关度较高的数据项及其对应的数据项值,并将其转换为作用于数据表行上的权限配置。所提出的方法经过测试和验证,满足业务需求,性能消耗低于阈值。此外,利用经典的数据挖掘算法生成权限配置是可行的,这已经开始在蓝king数据平台上得到应用。
{"title":"A permission generation and configuration method based on Rules and FP-Growth algorithm","authors":"Lei Zhu, Ziheng Zhang, Xinhong Hei, Yichuan Wang, Ziliang Yang, Feixiong Hu, Ping He","doi":"10.1109/NaNA53684.2021.00092","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00092","url":null,"abstract":"With the development of computer technology, lots of enterprises had begun to build a data platform, and the data and its services already paly the import role in enterprises. However, the guarantee the data security is the primary task of platform, and data access control, especially the fine-grained access control model, had become an important means to enhance the security of platform. In this paper, we propose a data access permission configuration method based on rules and FP-growth. Specifically, FP-Growth algorithm is first used to obtain the frequent items and the association relations of data, which can be transformed into the enumerable permission configuration items. Then, the correspondence and frequency of data items are calculated to acquire the frequent items, the permission configuration acting on the data table columns is obtained according to the frequency of used data items. By filtering the strong association relation, the data items that are more closely related in the association relation and the corresponding data item values are finally obtained, and they are converted into the permission configuration that acts on the rows of the data table. The proposed method has been tested and verified to meet business needs, and the performance consumption is below the threshold. Moreover, it is feasible to utilize classical data mining algorithms to generate permission configuration, which has begun to apply the Blueking Data Platform.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117009880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spectrum Utilization Improvement for Multi-Channel Cognitive Radio Networks with Energy Harvesting 基于能量收集的多信道认知无线网络频谱利用率改进
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00009
Wendi Sun, Xiaoying Liu, Kechen Zheng, Yang Xu, Jia Liu
Motivated by the dilemma in the multi-channel spectrum sensing by the multi-antenna user, this paper focuses on the scheme of spectrum sensing and energy harvesting to coordinate the time scheduling and energy management in the cognitive radio networks (CRNs), where a secondary transmitter (ST) exploits spectrum holes to transmit data through multichannel. To improve spectrum utilization efficiency, we investigate how the ST selects channels for sensing based on the residual energy, and adjusts the time scheduling of energy harvesting and data transmission with respect to the sensing results. To address this problem, we propose an adaptive scheme concerning spectrum sensing, channel selection, energy harvesting, and data transmission (SCED) for the ST. Moreover, we formulate the optimization of spectrum utilization efficiency as a Markov decision process (MDP) problem, which is challenging due to the system space and action space. Furthermore, we solve the MDP problem by a proposed value iteration algorithm. Numerical results show that the spectrum utilization efficiency under the SCED scheme is better than that under other schemes.
摘要针对多天线用户多通道频谱感知的困境,研究了认知无线网络(crn)中二次发射机(ST)利用频谱漏洞进行多通道数据传输的频谱感知和能量收集方案,以协调时间调度和能量管理。为了提高频谱利用效率,我们研究了ST如何根据剩余能量选择传感通道,并根据传感结果调整能量收集和数据传输的时间调度。为了解决这一问题,我们提出了一种st的频谱感知、信道选择、能量收集和数据传输(SCED)自适应方案,并将频谱利用效率的优化描述为马尔可夫决策过程(MDP)问题,该问题由于系统空间和动作空间的限制而具有挑战性。在此基础上,提出了一种数值迭代算法来求解MDP问题。数值结果表明,SCED方案下的频谱利用效率优于其他方案。
{"title":"Spectrum Utilization Improvement for Multi-Channel Cognitive Radio Networks with Energy Harvesting","authors":"Wendi Sun, Xiaoying Liu, Kechen Zheng, Yang Xu, Jia Liu","doi":"10.1109/NaNA53684.2021.00009","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00009","url":null,"abstract":"Motivated by the dilemma in the multi-channel spectrum sensing by the multi-antenna user, this paper focuses on the scheme of spectrum sensing and energy harvesting to coordinate the time scheduling and energy management in the cognitive radio networks (CRNs), where a secondary transmitter (ST) exploits spectrum holes to transmit data through multichannel. To improve spectrum utilization efficiency, we investigate how the ST selects channels for sensing based on the residual energy, and adjusts the time scheduling of energy harvesting and data transmission with respect to the sensing results. To address this problem, we propose an adaptive scheme concerning spectrum sensing, channel selection, energy harvesting, and data transmission (SCED) for the ST. Moreover, we formulate the optimization of spectrum utilization efficiency as a Markov decision process (MDP) problem, which is challenging due to the system space and action space. Furthermore, we solve the MDP problem by a proposed value iteration algorithm. Numerical results show that the spectrum utilization efficiency under the SCED scheme is better than that under other schemes.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126667398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-saving mechanism based on tidal characteristic in computing power network 计算能力网络中基于潮汐特性的节能机制
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00033
Ran Pang, Hui Li, Yuefeng Ji, Guangquan Wang, Chang Cao
In the Computing power network, based on the tidal characteristic of computing power nodes, with the goal of reducing the overall network energy consumption, the classification between tidal computing power nodes and non-tidal computing power nodes is proposed. This paper also proposes a new anycast routing algorithm with weighted wakeup routing penalty for tidal computing power nodes in sleep state. The simulation results show that the proposed anycast routing algorithm with tidal node classification and wake-up penalty weighted can effectively reduce energy consumption under the premise of meeting the service delay requirements.
在计算能力网络中,基于计算能力节点的潮汐特性,以降低网络整体能耗为目标,提出潮汐计算能力节点与非潮汐计算能力节点的分类。针对处于休眠状态的潮汐计算能力节点,提出了一种新的带加权唤醒补偿的任播路由算法。仿真结果表明,提出的潮汐节点分类和唤醒惩罚加权的任播路由算法能够在满足业务延迟要求的前提下有效降低能耗。
{"title":"Energy-saving mechanism based on tidal characteristic in computing power network","authors":"Ran Pang, Hui Li, Yuefeng Ji, Guangquan Wang, Chang Cao","doi":"10.1109/NaNA53684.2021.00033","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00033","url":null,"abstract":"In the Computing power network, based on the tidal characteristic of computing power nodes, with the goal of reducing the overall network energy consumption, the classification between tidal computing power nodes and non-tidal computing power nodes is proposed. This paper also proposes a new anycast routing algorithm with weighted wakeup routing penalty for tidal computing power nodes in sleep state. The simulation results show that the proposed anycast routing algorithm with tidal node classification and wake-up penalty weighted can effectively reduce energy consumption under the premise of meeting the service delay requirements.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125451604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
CD-SR: A Real-time Anomaly Detection Framework for Continuous Concept Drift CD-SR:连续概念漂移的实时异常检测框架
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00040
Zhongyi Ding, Shujie Yang, Zhaoyang Liu, Tengchao Ma, Zichen Feng, Mingze Wang
System administrators need to monitor various metrics (network traffic, NTP offset, etc.) of their internal services in real-time as a way to determine whether anomalies occur in the system. Traditional Spectral Residual (SR) anomaly detection methods do not take into account the interference of certain human factors (e.g., changes in personal preferences) in certain scenarios, i.e., concept drift. In these scenarios, the accuracy of anomaly detection is bound to be affected. In order to guarantee the availability and stability of network services, we propose an intelligent and pervasive anomaly detection strategy, CD-SR. First, we use the traditional SR model and the SVM method to train the time series that have not drifted to determine the threshold value. Then, to solve the problem of the pervasiveness of application scenarios, we use a drift detection model to find the time series where concept drift occurs. Finally, the sequence where the concept drift occurs is imported into the drift adaptation model to complete the replacement of the old and new concepts, the data is processed in real-time, and the replaced data is detected again in the detection model for anomalies. In the experimental stage, we obtained several data metrics using the cloud platform system built by Openstack, and by comparing several mainstream anomaly detection algorithms, our method obtained superior results.
系统管理员需要实时监控其内部服务的各种指标(网络流量、NTP偏移量等),以确定系统中是否发生异常。传统的光谱残差(Spectral Residual, SR)异常检测方法没有考虑到某些人为因素(如个人偏好的变化)在某些场景下的干扰,即概念漂移。在这种情况下,异常检测的准确性必然会受到影响。为了保证网络服务的可用性和稳定性,我们提出了一种智能、普适的异常检测策略CD-SR。首先,我们使用传统的SR模型和SVM方法对未漂移的时间序列进行训练,确定阈值。然后,为了解决应用场景的普遍性问题,我们使用漂移检测模型来寻找发生概念漂移的时间序列。最后,将发生概念漂移的序列导入漂移自适应模型中,完成新旧概念的替换,对数据进行实时处理,替换后的数据在异常检测模型中再次检测。在实验阶段,我们利用Openstack搭建的云平台系统获得了多个数据指标,通过对比几种主流的异常检测算法,我们的方法获得了较好的结果。
{"title":"CD-SR: A Real-time Anomaly Detection Framework for Continuous Concept Drift","authors":"Zhongyi Ding, Shujie Yang, Zhaoyang Liu, Tengchao Ma, Zichen Feng, Mingze Wang","doi":"10.1109/NaNA53684.2021.00040","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00040","url":null,"abstract":"System administrators need to monitor various metrics (network traffic, NTP offset, etc.) of their internal services in real-time as a way to determine whether anomalies occur in the system. Traditional Spectral Residual (SR) anomaly detection methods do not take into account the interference of certain human factors (e.g., changes in personal preferences) in certain scenarios, i.e., concept drift. In these scenarios, the accuracy of anomaly detection is bound to be affected. In order to guarantee the availability and stability of network services, we propose an intelligent and pervasive anomaly detection strategy, CD-SR. First, we use the traditional SR model and the SVM method to train the time series that have not drifted to determine the threshold value. Then, to solve the problem of the pervasiveness of application scenarios, we use a drift detection model to find the time series where concept drift occurs. Finally, the sequence where the concept drift occurs is imported into the drift adaptation model to complete the replacement of the old and new concepts, the data is processed in real-time, and the replaced data is detected again in the detection model for anomalies. In the experimental stage, we obtained several data metrics using the cloud platform system built by Openstack, and by comparing several mainstream anomaly detection algorithms, our method obtained superior results.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125079718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 International Conference on Networking and Network Applications (NaNA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1