This article puts forward a new scheme to control message redundancy efficiently in delay tolerant mobile Ad-hoc networks (MANET). The class of networks generally lacks end-to-end connectivity. In order to improve t...This article puts forward a new scheme to control message redundancy efficiently in delay tolerant mobile Ad-hoc networks (MANET). The class of networks generally lacks end-to-end connectivity. In order to improve the efficiency that messages are delivered successfully, multiple message copies routing protocols are usually used, but the network load is increased due to a large number of message redundancies. In the study, by using counter method, every node adds an encounter counter based on epidemic routing scheme. The counter records the number which the node encounters other nodes with the same message copy. If the counter of a node reaches tbe installed threshold, the node removes the copy. Theoretical analysis gives a lower bound of threshold in delay tolerant MANET. According to the lower bound of threshold, a rational threshold is installed in real environment. With proposed scheme message copies decrease obviously and are removed completely finally. The successful delivery efficiency is still the same as epidemic routing and the redundant copies are efficiently controlled to a relatively low level Computer simulations give the variation of message copies concerning different thresholds in fast and slow mobility scenes.展开更多
In communication alarm correlation analysis,traditional association rules generation(ARG) algorithm usually has low efficiency and high error rate.This paper proposes an alarm correlation rules generation algorithm ba...In communication alarm correlation analysis,traditional association rules generation(ARG) algorithm usually has low efficiency and high error rate.This paper proposes an alarm correlation rules generation algorithm based on the confidence covered value.Confidence covered value method can judge whether a rule is redundant or not scientific After the rules that based on weighted frequent patterns(WFPs) generated,the association rules were deleted by the confidence covered value,in order to delete the redundant rules and keep the rules with more information.Experiments show that the alarm correlation rules generation algorithm based on the confidence covered value has higher efficiency than the traditional method,and can effectively remove redundant rules.Thus it is very suitable for telecommunication alarm association rules processing.展开更多
基金supported by the Hi-Tech Research and Development Program of China (2007AA01Z429,2007AA01Z405)the National Natural Science Foundation of China (60702059,60872041,11061035)
文摘This article puts forward a new scheme to control message redundancy efficiently in delay tolerant mobile Ad-hoc networks (MANET). The class of networks generally lacks end-to-end connectivity. In order to improve the efficiency that messages are delivered successfully, multiple message copies routing protocols are usually used, but the network load is increased due to a large number of message redundancies. In the study, by using counter method, every node adds an encounter counter based on epidemic routing scheme. The counter records the number which the node encounters other nodes with the same message copy. If the counter of a node reaches tbe installed threshold, the node removes the copy. Theoretical analysis gives a lower bound of threshold in delay tolerant MANET. According to the lower bound of threshold, a rational threshold is installed in real environment. With proposed scheme message copies decrease obviously and are removed completely finally. The successful delivery efficiency is still the same as epidemic routing and the redundant copies are efficiently controlled to a relatively low level Computer simulations give the variation of message copies concerning different thresholds in fast and slow mobility scenes.
基金Project of Sichuan Provincial Department of Education,China(No.13Z215)the Foundation of Scientific Research of Chengdu University of Information Technology,China(No.J201405)+1 种基金the Project of Sichuan Provincial Department of Science and Technology,China(No.2015JY0047)the Open Research Subject of Key Laboratory of Signal and Information Processing,China(No.szjj 2015-070)
文摘In communication alarm correlation analysis,traditional association rules generation(ARG) algorithm usually has low efficiency and high error rate.This paper proposes an alarm correlation rules generation algorithm based on the confidence covered value.Confidence covered value method can judge whether a rule is redundant or not scientific After the rules that based on weighted frequent patterns(WFPs) generated,the association rules were deleted by the confidence covered value,in order to delete the redundant rules and keep the rules with more information.Experiments show that the alarm correlation rules generation algorithm based on the confidence covered value has higher efficiency than the traditional method,and can effectively remove redundant rules.Thus it is very suitable for telecommunication alarm association rules processing.