Design of control strategies for gene regulatory networks is a challenging and important topic in systems biology. In this paper, the problem of finding both a minimum set of control nodes (control inputs) and a contr...Design of control strategies for gene regulatory networks is a challenging and important topic in systems biology. In this paper, the problem of finding both a minimum set of control nodes (control inputs) and a controller is studied. A control node corresponds to a gene that expression can be controlled. Here, a Boolean network is used as a model of gene regulatory networks, and control specifications on attractors, which represent cell types or states of cells, are imposed. It is important to design a gene regulatory network that has desired attractors and has no undesired attractors. Using a matrix-based representation of BNs, this problem can be rewritten as an integer linear programming problem. Finally, the proposed method is demonstrated by a numerical example on a WNT5A network, which is related to melanoma.展开更多
Structural controllability is critical for operating and controlling large-scale complex networks. In real applications, for a given network, it is always desirable to have more selections for driver nodes which make ...Structural controllability is critical for operating and controlling large-scale complex networks. In real applications, for a given network, it is always desirable to have more selections for driver nodes which make the network structurally controllable. Different from the works in complex network field where structural controllability is often used to explore the emergence properties of complex networks at a macro level,in this paper, we investigate it for control design purpose at the application level and focus on describing and obtaining the solution space for all selections of driver nodes to guarantee structural controllability. In accord with practical applications,we define the complete selection rule set as the solution space which is composed of a series of selection rules expressed by intuitive algebraic forms. It explicitly indicates which nodes must be controlled and how many nodes need to be controlled in a node set and thus is particularly helpful for freely selecting driver nodes. Based on two algebraic criteria of structural controllability, we separately develop an input-connectivity algorithm and a relevancy algorithm to deduce selection rules for driver nodes. In order to reduce the computational complexity,we propose a pretreatment algorithm to reduce the scale of network's structural matrix efficiently, and a rearrangement algorithm to partition the matrix into several smaller ones. A general procedure is proposed to get the complete selection rule set for driver nodes which guarantee network's structural controllability. Simulation tests with efficiency analysis of the proposed algorithms are given and the result of applying the proposed procedure to some real networks is also shown, and these all indicate the validity of the proposed procedure.展开更多
This article analyzes the shift factors of the descending node local time for sun-synchronous satellites and proposes a shift control method to keep the local time shift within an allowance range. It is found that the...This article analyzes the shift factors of the descending node local time for sun-synchronous satellites and proposes a shift control method to keep the local time shift within an allowance range. It is found that the satellite orbit design and the orbit injection deviation are the causes for the initial shift velocity, whereas the atmospheric drag and the sun gravitational perturbation produce the shift acceleration. To deal with these shift factors, a shift control method is put forward, through such methods as orbit variation design, orbit altitude, and inclination keeping control. The simulation experiment and practical application have proved the effectiveness of this control method.展开更多
Since wireless links in Ad hoc networks are more fragile than those in traditional wireless networks due to route flapping,multi-node cooperation plays an important role in ensuring the quality of service( QoS). Based...Since wireless links in Ad hoc networks are more fragile than those in traditional wireless networks due to route flapping,multi-node cooperation plays an important role in ensuring the quality of service( QoS). Based on the authors' previous work,this paper proposes a receiver-controlled multi-node cooperation routing protocol,known as AODV-RCC. In this protocol,nodes form a cooperation group based on signal power. In a cooperation group,signal power between a partner and a transmitter,as well as signal power between the partner and the receiver,must be larger than the signal power between the transmitter and the receiver. Otherwise,the transmission will not benefit from cooperation. To avoid collision or congestion,each cooperation group only contains one partner. This partner offers both data and ACK cooperative retransmission. Its retransmission time should be shorter than the internal retry time of the transmitter's MAC layer,because it is better for the partner to retransmit firstly,as it offers a more reliable cooperative link. In AODV-RCC,it is the receiver that chooses the partner,because the link between the partner and the receiver is the most important. According to our simulation results,AODV-RCC shortens the end-to-end delay and increases the packet delivery ratio.展开更多
针对IEEE802.11e Medium Access Control层的QoS机制高负载时存在远端节点冲突和低优先级业务资源被耗尽的问题,提出在牺牲较小带宽的基础上增加一条忙音信道,取代CTS帧在数据信道上的广播,减少远端节点的冲突.仿真结果表明,该方案具有...针对IEEE802.11e Medium Access Control层的QoS机制高负载时存在远端节点冲突和低优先级业务资源被耗尽的问题,提出在牺牲较小带宽的基础上增加一条忙音信道,取代CTS帧在数据信道上的广播,减少远端节点的冲突.仿真结果表明,该方案具有较小的冲突概率,有效地减少了远端节点冲突.同时提出一个解决公平性问题的新思路:在避退时间发送忙音抢占信道,以期提高低优先级业务的接入概率.展开更多
This paper addresses the problem of the input design of large-scale complex networks.Two types of network components,redundant inaccessible strongly connected component(RISCC)and intermittent inaccessible strongly con...This paper addresses the problem of the input design of large-scale complex networks.Two types of network components,redundant inaccessible strongly connected component(RISCC)and intermittent inaccessible strongly connected component(IISCC)are defined,and a subnetwork called a driver network is developed.Based on these,an efficient method is proposed to find the minimum number of controlled nodes to achieve structural complete controllability of a network,in the case that each input can act on multiple state nodes.The range of the number of input nodes to achieve minimal control,and the configuration method(the connection between the input nodes and the controlled nodes)are presented.All possible input solutions can be obtained by this method.Moreover,we give an example and some experiments on real-world networks to illustrate the effectiveness of the method.展开更多
Version control is an urgent problem to be solved at present for data management. Based on the authors' hypertext data model with version control,some details about the storage strategy are discussed. A new strate...Version control is an urgent problem to be solved at present for data management. Based on the authors' hypertext data model with version control,some details about the storage strategy are discussed. A new strategy to define some key nodes within the version derivation graph is presented and some implementation details are described. At last, the performance of different strategies are compared with each other.展开更多
A healthy woman volunteered to participate as "healthy control" in a study.An increased level of procalcitonin(PCT) was detected and remained elevated on follow-up measurements.As calcitonin levels were elev...A healthy woman volunteered to participate as "healthy control" in a study.An increased level of procalcitonin(PCT) was detected and remained elevated on follow-up measurements.As calcitonin levels were elevated as well,thyroid ultrasound was performed which revealed nodes in both thyroid lobes,one of them showing metabolic activity in positron emission tomography-computed tomography scan.To exclude a malignant thyroid cancer despite the negative findings in a fine needle aspiration the patient underwent thyroidectomy and a medullary thyroid carcinoma(MTC) was detected in the right lobe.MTC is a rare endocrine tumor with a poor prognosis once having spread,therefore early detection remains a priority for the outcome.Screening parameter is serum calcitonin,in absence of infection the pro-hormone PCT can be used as a screening parameter as well with high sensitivity.展开更多
This paper is concerned with a method for forming distributed measurement and control system.A three-layer structure model based on network,physical node layer and func-tion node layer is discussed.It is designed on o...This paper is concerned with a method for forming distributed measurement and control system.A three-layer structure model based on network,physical node layer and func-tion node layer is discussed.It is designed on object-oriented software method.The model has a fine application prospect.展开更多
As part of the ongoing information revolution,smart power grid technology has become a key focus area for research into power systems.Intelligent electrical appliances are now an important component of power systems,p...As part of the ongoing information revolution,smart power grid technology has become a key focus area for research into power systems.Intelligent electrical appliances are now an important component of power systems,providing a smart power grid with increased control,stability,and safety.Based on the secure communication requirements of cloud energy storage systems,this paper presents the design and development of a node controller for a cloud energy storage network.The function division and system deployment processes were carried out to ensure the security of the communication network used for the cloud energy storage system.Safety protection measures were proposed according to the demands of the communication network,allowing the system to run safely and stably.Finally,the effectiveness of the system was verified through a client-side distributed energy storage demonstration project in Suzhou,China.The system was observed to operate safely and stably,demonstrating good peak-clipping and valley filling effects,and improving the system load characteristics.展开更多
A wireless sensor network consists of hundreds or thousands of small nodes which could either have a static or dynamic position. These nodes are deployed through normal or random distribution to report events of a par...A wireless sensor network consists of hundreds or thousands of small nodes which could either have a static or dynamic position. These nodes are deployed through normal or random distribution to report events of a particular area to the base station through sink nodes. Having limited onboard energy of sensor nodes, conservation of energy in wireless sensor network is necessary. For this purpose, a new algorithm is proposed titled Energy-Efficient-Direction-Based-Topology-Control-Algorithm (EEDBTC). In proposed algorithm<span>,</span><span><span> direction is the main concern whenever an event occurs the node will send data in the direction of base station so that less energy is consumed. The </span><span>results of the same were compared with customary dense wireless sensor</span><span> network, color based WSNs and it was observed that this algorithm is much better than previous topology control algorithms used.</span></span>展开更多
One of the fundamental properties of an ad hoc network is its connectivity. Maintaining connectivity in wireless networks is extremely difficult due to dynamic changing topology of MANETs. There are several techniques...One of the fundamental properties of an ad hoc network is its connectivity. Maintaining connectivity in wireless networks is extremely difficult due to dynamic changing topology of MANETs. There are several techniques to understand the connectivity level for a given network topology. In this paper, we examine the existing methods and discuss the issues and challenges that are still insurmountable in order to enhance the connectivity properties of wireless multi hop networks.展开更多
With reference to sensor node architectures, we consider the problem of supporting forms of memory protection through a hardware/compiler approach that takes advantage of a low-cost protection circuitry inside the mic...With reference to sensor node architectures, we consider the problem of supporting forms of memory protection through a hardware/compiler approach that takes advantage of a low-cost protection circuitry inside the microcontroller, interposed between the processor and the storage devices. Our design effort complies with the stringent limitations existing in these architectures in terms of hardware complexity, available storage and energy consumption. Rather that precluding deliberately harmful programs from producing their effects, our solution is aimed at limiting the spread of programming errors outside the memory scope of the running program. The discussion evaluates the resulting protection environment from a number of salient viewpoints that include the implementation of common protection paradigms, efficiency in the distribution and revocation of access privileges, and the lack of a privileged (kernel) mode.展开更多
The complexity of software system has been increasing with software evolution, which affects the stability of software structure. Most of the existing measurement methods focus on the analysis of the macro-characteris...The complexity of software system has been increasing with software evolution, which affects the stability of software structure. Most of the existing measurement methods focus on the analysis of the macro-characteristics of the network topology, but lacked a certain depth and expansion to explore the nature of the complexity of the software structure, for this purpose, the complex network control theory was applied to the study of software network controllability. Firstly, the Source-Driver (SD) model was established based on the system control theory, the driver node sets were obtained by the minimum input theorem in the control process of software network topology;Then the relationship between the degree and center degree, the relationship between the in-degree and the out-degree of the software network topology were further analyzed owing to the non-uniqueness of the driver node sets;Finally, the values of the four indicators in the software system were compared. Experimental results show that the driver node sets in the software networks are mainly composed of nodes with low degree values, but it does not mean that the nodes whose in-degree values and out-degree values are also low;The action on control nodes and driver nodes are not random, the controllability of the driver nodes is closely related to the in-degree, when selecting the driver node sets, the network topology characteristics should be considered comprehensively, and the nodes with high degree and center degree are the first choice. The results have important guiding significance for the control, maintenance and redesign of software architecture.展开更多
文摘Design of control strategies for gene regulatory networks is a challenging and important topic in systems biology. In this paper, the problem of finding both a minimum set of control nodes (control inputs) and a controller is studied. A control node corresponds to a gene that expression can be controlled. Here, a Boolean network is used as a model of gene regulatory networks, and control specifications on attractors, which represent cell types or states of cells, are imposed. It is important to design a gene regulatory network that has desired attractors and has no undesired attractors. Using a matrix-based representation of BNs, this problem can be rewritten as an integer linear programming problem. Finally, the proposed method is demonstrated by a numerical example on a WNT5A network, which is related to melanoma.
基金supported by the National Science Foundation of China(61333009,61473317,61433002,61521063,61590924,61673366)the National High Technology Research and Development Program of China(2015AA043102)
文摘Structural controllability is critical for operating and controlling large-scale complex networks. In real applications, for a given network, it is always desirable to have more selections for driver nodes which make the network structurally controllable. Different from the works in complex network field where structural controllability is often used to explore the emergence properties of complex networks at a macro level,in this paper, we investigate it for control design purpose at the application level and focus on describing and obtaining the solution space for all selections of driver nodes to guarantee structural controllability. In accord with practical applications,we define the complete selection rule set as the solution space which is composed of a series of selection rules expressed by intuitive algebraic forms. It explicitly indicates which nodes must be controlled and how many nodes need to be controlled in a node set and thus is particularly helpful for freely selecting driver nodes. Based on two algebraic criteria of structural controllability, we separately develop an input-connectivity algorithm and a relevancy algorithm to deduce selection rules for driver nodes. In order to reduce the computational complexity,we propose a pretreatment algorithm to reduce the scale of network's structural matrix efficiently, and a rearrangement algorithm to partition the matrix into several smaller ones. A general procedure is proposed to get the complete selection rule set for driver nodes which guarantee network's structural controllability. Simulation tests with efficiency analysis of the proposed algorithms are given and the result of applying the proposed procedure to some real networks is also shown, and these all indicate the validity of the proposed procedure.
基金supported by the China Postdotoral Science Foundation(20060401004)
文摘This article analyzes the shift factors of the descending node local time for sun-synchronous satellites and proposes a shift control method to keep the local time shift within an allowance range. It is found that the satellite orbit design and the orbit injection deviation are the causes for the initial shift velocity, whereas the atmospheric drag and the sun gravitational perturbation produce the shift acceleration. To deal with these shift factors, a shift control method is put forward, through such methods as orbit variation design, orbit altitude, and inclination keeping control. The simulation experiment and practical application have proved the effectiveness of this control method.
基金Sponsored by the Natural Scientific Research Innovation Foundation in Harbin Institute of Technology(Grant No.HIT.NSRIF.2013029)the National Science and Technology Major Project(Grant No.2012ZX03004003)+1 种基金the National Basic Research Development Program of China(973 Program)(Grant No.2013CB329003)the National Natural Science Foundation of China(Grant No.61201148 and No.61101123)
文摘Since wireless links in Ad hoc networks are more fragile than those in traditional wireless networks due to route flapping,multi-node cooperation plays an important role in ensuring the quality of service( QoS). Based on the authors' previous work,this paper proposes a receiver-controlled multi-node cooperation routing protocol,known as AODV-RCC. In this protocol,nodes form a cooperation group based on signal power. In a cooperation group,signal power between a partner and a transmitter,as well as signal power between the partner and the receiver,must be larger than the signal power between the transmitter and the receiver. Otherwise,the transmission will not benefit from cooperation. To avoid collision or congestion,each cooperation group only contains one partner. This partner offers both data and ACK cooperative retransmission. Its retransmission time should be shorter than the internal retry time of the transmitter's MAC layer,because it is better for the partner to retransmit firstly,as it offers a more reliable cooperative link. In AODV-RCC,it is the receiver that chooses the partner,because the link between the partner and the receiver is the most important. According to our simulation results,AODV-RCC shortens the end-to-end delay and increases the packet delivery ratio.
文摘针对IEEE802.11e Medium Access Control层的QoS机制高负载时存在远端节点冲突和低优先级业务资源被耗尽的问题,提出在牺牲较小带宽的基础上增加一条忙音信道,取代CTS帧在数据信道上的广播,减少远端节点的冲突.仿真结果表明,该方案具有较小的冲突概率,有效地减少了远端节点冲突.同时提出一个解决公平性问题的新思路:在避退时间发送忙音抢占信道,以期提高低优先级业务的接入概率.
基金supported in part by the National Natural Science Foundation of China(U1808205,62173079)the Natural Science Foundation of Hebei Province of China(F2000501005)。
文摘This paper addresses the problem of the input design of large-scale complex networks.Two types of network components,redundant inaccessible strongly connected component(RISCC)and intermittent inaccessible strongly connected component(IISCC)are defined,and a subnetwork called a driver network is developed.Based on these,an efficient method is proposed to find the minimum number of controlled nodes to achieve structural complete controllability of a network,in the case that each input can act on multiple state nodes.The range of the number of input nodes to achieve minimal control,and the configuration method(the connection between the input nodes and the controlled nodes)are presented.All possible input solutions can be obtained by this method.Moreover,we give an example and some experiments on real-world networks to illustrate the effectiveness of the method.
文摘Version control is an urgent problem to be solved at present for data management. Based on the authors' hypertext data model with version control,some details about the storage strategy are discussed. A new strategy to define some key nodes within the version derivation graph is presented and some implementation details are described. At last, the performance of different strategies are compared with each other.
文摘A healthy woman volunteered to participate as "healthy control" in a study.An increased level of procalcitonin(PCT) was detected and remained elevated on follow-up measurements.As calcitonin levels were elevated as well,thyroid ultrasound was performed which revealed nodes in both thyroid lobes,one of them showing metabolic activity in positron emission tomography-computed tomography scan.To exclude a malignant thyroid cancer despite the negative findings in a fine needle aspiration the patient underwent thyroidectomy and a medullary thyroid carcinoma(MTC) was detected in the right lobe.MTC is a rare endocrine tumor with a poor prognosis once having spread,therefore early detection remains a priority for the outcome.Screening parameter is serum calcitonin,in absence of infection the pro-hormone PCT can be used as a screening parameter as well with high sensitivity.
文摘This paper is concerned with a method for forming distributed measurement and control system.A three-layer structure model based on network,physical node layer and func-tion node layer is discussed.It is designed on object-oriented software method.The model has a fine application prospect.
基金supported by the Technical Project of the State Grid Corporation of China(research and demonstration application of key technology of energy storage cloud for mobile energy storage application of electric vehicles 5419-201971217a-0-0-00)。
文摘As part of the ongoing information revolution,smart power grid technology has become a key focus area for research into power systems.Intelligent electrical appliances are now an important component of power systems,providing a smart power grid with increased control,stability,and safety.Based on the secure communication requirements of cloud energy storage systems,this paper presents the design and development of a node controller for a cloud energy storage network.The function division and system deployment processes were carried out to ensure the security of the communication network used for the cloud energy storage system.Safety protection measures were proposed according to the demands of the communication network,allowing the system to run safely and stably.Finally,the effectiveness of the system was verified through a client-side distributed energy storage demonstration project in Suzhou,China.The system was observed to operate safely and stably,demonstrating good peak-clipping and valley filling effects,and improving the system load characteristics.
文摘A wireless sensor network consists of hundreds or thousands of small nodes which could either have a static or dynamic position. These nodes are deployed through normal or random distribution to report events of a particular area to the base station through sink nodes. Having limited onboard energy of sensor nodes, conservation of energy in wireless sensor network is necessary. For this purpose, a new algorithm is proposed titled Energy-Efficient-Direction-Based-Topology-Control-Algorithm (EEDBTC). In proposed algorithm<span>,</span><span><span> direction is the main concern whenever an event occurs the node will send data in the direction of base station so that less energy is consumed. The </span><span>results of the same were compared with customary dense wireless sensor</span><span> network, color based WSNs and it was observed that this algorithm is much better than previous topology control algorithms used.</span></span>
文摘One of the fundamental properties of an ad hoc network is its connectivity. Maintaining connectivity in wireless networks is extremely difficult due to dynamic changing topology of MANETs. There are several techniques to understand the connectivity level for a given network topology. In this paper, we examine the existing methods and discuss the issues and challenges that are still insurmountable in order to enhance the connectivity properties of wireless multi hop networks.
文摘With reference to sensor node architectures, we consider the problem of supporting forms of memory protection through a hardware/compiler approach that takes advantage of a low-cost protection circuitry inside the microcontroller, interposed between the processor and the storage devices. Our design effort complies with the stringent limitations existing in these architectures in terms of hardware complexity, available storage and energy consumption. Rather that precluding deliberately harmful programs from producing their effects, our solution is aimed at limiting the spread of programming errors outside the memory scope of the running program. The discussion evaluates the resulting protection environment from a number of salient viewpoints that include the implementation of common protection paradigms, efficiency in the distribution and revocation of access privileges, and the lack of a privileged (kernel) mode.
文摘The complexity of software system has been increasing with software evolution, which affects the stability of software structure. Most of the existing measurement methods focus on the analysis of the macro-characteristics of the network topology, but lacked a certain depth and expansion to explore the nature of the complexity of the software structure, for this purpose, the complex network control theory was applied to the study of software network controllability. Firstly, the Source-Driver (SD) model was established based on the system control theory, the driver node sets were obtained by the minimum input theorem in the control process of software network topology;Then the relationship between the degree and center degree, the relationship between the in-degree and the out-degree of the software network topology were further analyzed owing to the non-uniqueness of the driver node sets;Finally, the values of the four indicators in the software system were compared. Experimental results show that the driver node sets in the software networks are mainly composed of nodes with low degree values, but it does not mean that the nodes whose in-degree values and out-degree values are also low;The action on control nodes and driver nodes are not random, the controllability of the driver nodes is closely related to the in-degree, when selecting the driver node sets, the network topology characteristics should be considered comprehensively, and the nodes with high degree and center degree are the first choice. The results have important guiding significance for the control, maintenance and redesign of software architecture.