The design and evaluation of accelerated transmission (AT) systems in peer-to-peer networks for data transmission are introduced. Based on transfer control protocol (TCP) and peer-to-peer (P2P) substrate network...The design and evaluation of accelerated transmission (AT) systems in peer-to-peer networks for data transmission are introduced. Based on transfer control protocol (TCP) and peer-to-peer (P2P) substrate networks, AT can select peers of high performance quality, monitor the transfer status of each peer, dynamically adjust the transmission velocity and react to connection degradation with high accuracy and low overhead. The system performance is evaluated by simulations, and the interrelationship between network flow, bandwidth utilities and network throughput is analyzed. Owing to the collaborative operation of neighboring peers, AT accelerates the process of data transmission and the collective network performance is much more satisfactory.展开更多
Edge devices in Internet of Things(IoT)applications can form peers to communicate in peer-to-peer(P2P)networks over P2P protocols.Using P2P networks ensures scalability and removes the need for centralized management....Edge devices in Internet of Things(IoT)applications can form peers to communicate in peer-to-peer(P2P)networks over P2P protocols.Using P2P networks ensures scalability and removes the need for centralized management.However,due to the open nature of P2P networks,they often suffer from the existence of malicious peers,especially malicious peers that unite in groups to raise each other’s ratings.This compromises users’safety and makes them lose their confidence about the files or services they are receiving.To address these challenges,we propose a neural networkbased algorithm,which uses the advantages of a machine learning algorithm to identify whether or not a peer is malicious.In this paper,a neural network(NN)was chosen as the machine learning algorithm due to its efficiency in classification.The experiments showed that the NNTrust algorithm is more effective and has a higher potential of reducing the number of invalid files and increasing success rates than other well-known trust management systems.展开更多
Peer-to-Peer(P2P)electricity trading is a significant research area that offers maximum fulfilment for both prosumer and consumer.It also decreases the quantity of line loss incurred in Smart Grid(SG).But,uncertainiti...Peer-to-Peer(P2P)electricity trading is a significant research area that offers maximum fulfilment for both prosumer and consumer.It also decreases the quantity of line loss incurred in Smart Grid(SG).But,uncertainities in demand and supply of the electricity might lead to instability in P2P market for both prosumer and consumer.In recent times,numerous Machine Learning(ML)-enabled load predictive techniques have been developed,while most of the existing studies did not consider its implicit features,optimal parameter selection,and prediction stability.In order to overcome fulfill this research gap,the current research paper presents a new Multi-Objective Grasshopper Optimisation Algorithm(MOGOA)with Deep Extreme Learning Machine(DELM)-based short-term load predictive technique i.e.,MOGOA-DELM model for P2P Energy Trading(ET)in SGs.The proposed MOGOA-DELM model involves four distinct stages of operations namely,data cleaning,Feature Selection(FS),prediction,and parameter optimization.In addition,MOGOA-based FS technique is utilized in the selection of optimum subset of features.Besides,DELM-based predictive model is also applied in forecasting the load requirements.The proposed MOGOA model is also applied in FS and the selection of optimalDELM parameters to improve the predictive outcome.To inspect the effectual outcome of the proposed MOGOA-DELM model,a series of simulations was performed using UK Smart Meter dataset.In the experimentation procedure,the proposed model achieved the highest accuracy of 85.80%and the results established the superiority of the proposed model in predicting the testing data.展开更多
Peer to Peer systems are emerging as one of the most popular Internet applications. Structured Peer to Peer overlay networks use identifier based routing algorithms to allow robustness, load balancing, and distrib...Peer to Peer systems are emerging as one of the most popular Internet applications. Structured Peer to Peer overlay networks use identifier based routing algorithms to allow robustness, load balancing, and distributed lookup needed in this environment. However, identifier based routing that is independent of Internet topology tends to be of low efficiency. Aimed at improving the routing efficiency, the super proximity routing algorithms presented in this paper combine Internet topology and overlay routing table in choosing the next hop. Experimental results showed that the algorithms greatly improve the efficiency of Peer to Peer routing.展开更多
Combining the characteristics of peer-to-peer (P2P) and grid, a super-peer selection algorithm--SSABC is presented in the distributed network merging P2P and grid. The algorithm computes nodes capacities using their...Combining the characteristics of peer-to-peer (P2P) and grid, a super-peer selection algorithm--SSABC is presented in the distributed network merging P2P and grid. The algorithm computes nodes capacities using their resource properties provided by a grid monitoring and discovery system, such as available bandwidth, free CPU and idle memory, as well as the number of current connections and online time. when a new node joins the network and the super-peers are all saturated, it should select a new super-peer from the new node or joined nodes with the highest capacity. By theoretical analyses and simulation experiments, it is shown that super-peers selected by capacity can achieve higher query success rates and shorten the average hop count when compared with super-peers selected randomly, and they can also balance the network load when all super-peers are saturated. When the number of total nodes changes, the conclusion is still valid, which explains that the algorithm SSABC is feasible and stable.展开更多
Multi-energy systems are one of the key technologies to tackle energy crisis and environmental pollution.An energy hub(EH)is a minimum multi-energy system.Interconnection of multiple EHs through energy routers(ERs)can...Multi-energy systems are one of the key technologies to tackle energy crisis and environmental pollution.An energy hub(EH)is a minimum multi-energy system.Interconnection of multiple EHs through energy routers(ERs)can realize mutual energy assistance.This paper proposes a peer-to-peer(P2P)energy sharing strategy between EHs including ERs in an interconnected system,which is divided into two levels.In the lower level,a method of determining the charging/discharging constraints of energy storage devices is proposed.Based on the Lyapunov optimization method,virtual queues are used to model the energy storage devices and flexible loads in the system.The objective is to minimize the overall operating cost of the interconnected system.In the upper level,a non-cooperative game model is introduced to minimize the cost of purchasing power from other EHs for each EH.A best response-based method is adapted to find the Nash equilibrium.The simulation outcomes demonstrate that application of the proposed strategy can reduce operating costs of an interconnected system and each EH.On basis of a real-world dataset of interconnected EHs,both analytical and numerical results show the effectiveness of the proposed strategy.展开更多
Distributed data sources which employ taxonomy hierarchy to describe the contents of their objects are considered, and a super-peer-based semantic overlay network (SSON) is proposed for sharing and searching their d...Distributed data sources which employ taxonomy hierarchy to describe the contents of their objects are considered, and a super-peer-based semantic overlay network (SSON) is proposed for sharing and searching their data objects. In SSON, peers are dynamically clustered into many semantic clusters based on the semantics of their data objects and organized in the semantic clusters into a semantic overlay network. Each semantic cluster consists of a super-peer and more peers, and is only responsible for answering queries in its semantic subspace. A query is first routed to the appropriate semantic clusters by an efficient searching algorithm, and then it is forwarded to the specific peers that hold the relevant data objects. Experimental results indicate that SSON has good scalability and achieves a competitive trade-off between search efficiency and costs.展开更多
Active XML是一种新型的具有交换内涵数据功能的语言架构。在Active XML文档中内涵数据是通过本地或远程Web services调用方式来获取。在Peer to Peer网络中,Active XML能改善工作任务的划分和分布。然而,如果一个站点属于多个Peer to P...Active XML是一种新型的具有交换内涵数据功能的语言架构。在Active XML文档中内涵数据是通过本地或远程Web services调用方式来获取。在Peer to Peer网络中,Active XML能改善工作任务的划分和分布。然而,如果一个站点属于多个Peer to Peer网络中的一员并且这个站点提供的服务被大量站点频繁调用,这个站点就会成为整个Web服务系统的瓶颈。在本文中,我们提出了一种在Peer to Peer网络中基于AXML技术的缓存机制的良好解决方案。该方案可以利用Active XML自身特性极大的简化缓存过程。展开更多
P2P is a complex system.Many researches on P2P architecture have been done.These researches have provided valuable references for the standardization of P2P technology.However,the standardization can not be achieved b...P2P is a complex system.Many researches on P2P architecture have been done.These researches have provided valuable references for the standardization of P2P technology.However,the standardization can not be achieved because there are still some problems in existing studies.This paper proposes a 5-layer reference model which clearly defines the functionalities of each layer,and distinctly describes the interface and the relationship between layers.This model is able to clearly show the internal structure of P2P system and the working process of data flow in P2P system.Validation shows that this model is general and rational.展开更多
The differences between the data integration of a dynamic database grid (DBG) and that of a distributed database system are analyzed, and three kinds of data integration strategies are given on the background of DBG...The differences between the data integration of a dynamic database grid (DBG) and that of a distributed database system are analyzed, and three kinds of data integration strategies are given on the background of DBG based on Peer to Peer (P2P) framework, including the centralized data integration (CDI) strategy, the distributed data integration (DDI) strategy and the filter-based data integration (FDDI) strategy. CDI calls all the database grid services (DGSs) at a single node, DDI disperses the DGSs to multiple nodes, while FDDI schedules the data integration nodes based on filtering the keywords returned from DGSs. The performance of these three integration strategies are compared with and analyzed by simulation experiments. FDDI is more evident for filtering the keywords with data redundancy increasing. Through the reduction of large amount of data transportation, it effectively shortens the executing time for the task and improves its efficiency.展开更多
Can peer-to-peer lending platforms mitigate fraudulent behaviors?Or have lending players been acting similar to free-riders?This paper constructs a new proxy to investigate lending platform misconduct and compares the...Can peer-to-peer lending platforms mitigate fraudulent behaviors?Or have lending players been acting similar to free-riders?This paper constructs a new proxy to investigate lending platform misconduct and compares the FICO score and the LendingClub credit grade.To examine whether the lack of verification by the Fintech platform affects lenders’collection performance,I explore the recovery rate(RR)of non-performing loans through a mixed-continuous model.The regression results show that the degree of prudence taken by the lending platform in the pre-screening activity negatively affects the detection of some misreporting borrowers.I also find that the Fintech platform’s missing verification information(e.g.,annual income and employment length)affects the RR of non-performing loans,thereby hampering lenders’collection performance.展开更多
Building an Internet based tele-robotic system requires the developers beingproficient in computer theory, network technology, control theory, etc. A flexible, open structuredand module based framework for tele-contro...Building an Internet based tele-robotic system requires the developers beingproficient in computer theory, network technology, control theory, etc. A flexible, open structuredand module based framework for tele-control system is proposed on the basis of abstraction andanalysis of existing Internet-based control systems. This framework is designed following the peerto peer (P2P) distributed computing model. As a key to the system, the XML based ontology ofresources/modules/peers is discussed, so do the model for dynamically allocating of resources, basedon which the coordination among modules or peers can then be implemented. The experiment system andits experimental results prove the feasibility of the framework and its ease to use.展开更多
Media streaming delivery in wireless ad hoc networks is challenging due to the stringent resource restrictions,po-tential high loss rate and the decentralized architecture. To support long and high-quality streams,one...Media streaming delivery in wireless ad hoc networks is challenging due to the stringent resource restrictions,po-tential high loss rate and the decentralized architecture. To support long and high-quality streams,one viable approach is that a media stream is partitioned into segments,and then the segments are replicated in a network and served in a peer-to-peer(P2P) fashion. However,the searching strategy for segments is one key problem with the approach. This paper proposes a hybrid ants-like search algorithm(HASA) for P2P media streaming distribution in ad hoc networks. It takes the advantages of random walks and ants-like algorithms for searching in unstructured P2P networks,such as low transmitting latency,less jitter times,and low unnecessary traffic. We quantify the performance of our scheme in terms of response time,jitter times,and network messages for media streaming distribution. Simulation results showed that it can effectively improve the search efficiency for P2P media streaming distribution in ad hoc networks.展开更多
The letter proposes a three-layer manageable media distribution network system architecture called MSPnet, which is based on Session Initiation ProtocolIll and Peer to Peer (SIP P2P) technology. MSPnet performs appl...The letter proposes a three-layer manageable media distribution network system architecture called MSPnet, which is based on Session Initiation ProtocolIll and Peer to Peer (SIP P2P) technology. MSPnet performs application-level structured DHT routing and resource location among domains and unstructured ones in domain. Except for media distribution, it can be used to support a variety of P2P applications, including video broadcasting, video on demand, VoIP, etc. MSPnet is composed of three layers, namely, the signal control layer, the management layer, and the media transportation layer. The MSPnet prototype consists of the SIP server, the management server, the media server, and the node User Agent (UA). Results from a prototype experiment in a large-scale Internet environment show that MSPnet is feasible, scalable and manageable.展开更多
The trust evaluation model of the existing P2P system is facing the attack behavior of two kinds of strategy malicious nodes: the strategic deception and the dishonest recommendation, which seriously affect the accur...The trust evaluation model of the existing P2P system is facing the attack behavior of two kinds of strategy malicious nodes: the strategic deception and the dishonest recommendation, which seriously affect the accuracy and the effectiveness of the trust evaluation of the model calculation nodes. In view of the disadvantages of the existing models, the author puts forward a trust evaluation model based on the probabilistic method. The model uses the concepts of the subjective trust relationship in the human society, and on the basis of the direct experience and the feedback information, calculate the direct trust and the recommendation trust of the nodes by using the probability statistical method. And through the identification of the importance of the direct experience, distinguish the reliability of the feedback information and recommenders, and improve the effectiveness of the trust evaluation model. The simulation experiment shows that compared with the existing trust evaluation model, this model can effectively restrain the threat of the strategic deception and the dishonesty recommendation, especially the attack of the complex cooperative cheating on the system.展开更多
The penetration of distributed renewable generationprovides green energy to the local energy system. However, theuncertainties it brings to the system are becoming more andmore unacceptable, making it difficult to eff...The penetration of distributed renewable generationprovides green energy to the local energy system. However, theuncertainties it brings to the system are becoming more andmore unacceptable, making it difficult to efficiently operate thelocal energy system. In a foreseeable future, there could bean increasing number of flexible resources, such as naturalgas power plants and interruptible demands, which providesolutions to these uncertainties. In this paper, a novel day-aheadenergy market design for the local energy system is proposed.This market allows its participants to trade day-ahead energyin a peer-to-peer approach. In addition, flexible resources canprovide up/down-ward reserves to the system through reservetrading, where the local system operator (LSO) takes chargeof reserve procurement. Then, to operate the market, a marketclearing model is proposed incorporating operating costs of theday-ahead and real time stages. A consensus-based approach isapplied which enables the market to clear in a decentralizedmethod. Finally, since the LSO bears the reserve procurementcosts as well as the operating costs in the real time stage,we then propose a cost reallocation model to transfer theexpenses to the renewables. Case studies demonstrate the validityand efficiency of the proposed market design, including localenergy trading facilitation, high and stable revenue preservation,high computation efficiency and prevention of strategic biddingbehaviors.展开更多
The growing number of popular peer to peer applications during the last five years has implied for researchers to focus on how to build trust in such very large scale distributed systems. Reputation systems have shown...The growing number of popular peer to peer applications during the last five years has implied for researchers to focus on how to build trust in such very large scale distributed systems. Reputation systems have shown to be a very good solution to build trust in presence of malicious nodes. We propose in this paper a new metric for reputation systems on top of a Distributed Hash Table that uses a notion of risk to make the applications aware of certain behaviours of malicious nodes. We show that our metric is able to significantly reduce the number of malicious transactions, and that it also provides very strong resistance to several traditional attacks of reputations systems. We also show that our solution can easily scale, and can be adapted to various Distributed Hash Tables.展开更多
As one of the most promising machine learning frameworks emerging in recent years,Federated learning(FL)has received lots of attention.The main idea of centralized FL is to train a global model by aggregating local mo...As one of the most promising machine learning frameworks emerging in recent years,Federated learning(FL)has received lots of attention.The main idea of centralized FL is to train a global model by aggregating local model parameters and maintain the private data of users locally.However,recent studies have shown that traditional centralized federated learning is vulnerable to various attacks,such as gradient attacks,where a malicious server collects local model gradients and uses them to recover the private data stored on the client.In this paper,we propose a decentralized federated learning against aTtacks(DEFEAT)framework and use it to defend the gradient attack.The decentralized structure adopted by this paper uses a peer-to-peer network to transmit,aggregate,and update local models.In DEFEAT,the participating clients only need to communicate with their single-hop neighbors to learn the global model,in which the model accuracy and communication cost during the training process of DEFEAT are well balanced.Through a series of experiments and detailed case studies on real datasets,we evaluate the excellent model performance of DEFEAT and the privacy preservation capability against gradient attacks.展开更多
基金The National Natural Science Foundation of China(No60573133)the National Basic Research Program of China (973Program) (No2003CB314801)
文摘The design and evaluation of accelerated transmission (AT) systems in peer-to-peer networks for data transmission are introduced. Based on transfer control protocol (TCP) and peer-to-peer (P2P) substrate networks, AT can select peers of high performance quality, monitor the transfer status of each peer, dynamically adjust the transmission velocity and react to connection degradation with high accuracy and low overhead. The system performance is evaluated by simulations, and the interrelationship between network flow, bandwidth utilities and network throughput is analyzed. Owing to the collaborative operation of neighboring peers, AT accelerates the process of data transmission and the collective network performance is much more satisfactory.
文摘Edge devices in Internet of Things(IoT)applications can form peers to communicate in peer-to-peer(P2P)networks over P2P protocols.Using P2P networks ensures scalability and removes the need for centralized management.However,due to the open nature of P2P networks,they often suffer from the existence of malicious peers,especially malicious peers that unite in groups to raise each other’s ratings.This compromises users’safety and makes them lose their confidence about the files or services they are receiving.To address these challenges,we propose a neural networkbased algorithm,which uses the advantages of a machine learning algorithm to identify whether or not a peer is malicious.In this paper,a neural network(NN)was chosen as the machine learning algorithm due to its efficiency in classification.The experiments showed that the NNTrust algorithm is more effective and has a higher potential of reducing the number of invalid files and increasing success rates than other well-known trust management systems.
基金The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through Research Groups under grant number(RGP.1/282/42)This work is also supported by the Faculty of Computer Science and Information Technology,University of Malaya,under Postgraduate Research Grant(PG035-2016A).
文摘Peer-to-Peer(P2P)electricity trading is a significant research area that offers maximum fulfilment for both prosumer and consumer.It also decreases the quantity of line loss incurred in Smart Grid(SG).But,uncertainities in demand and supply of the electricity might lead to instability in P2P market for both prosumer and consumer.In recent times,numerous Machine Learning(ML)-enabled load predictive techniques have been developed,while most of the existing studies did not consider its implicit features,optimal parameter selection,and prediction stability.In order to overcome fulfill this research gap,the current research paper presents a new Multi-Objective Grasshopper Optimisation Algorithm(MOGOA)with Deep Extreme Learning Machine(DELM)-based short-term load predictive technique i.e.,MOGOA-DELM model for P2P Energy Trading(ET)in SGs.The proposed MOGOA-DELM model involves four distinct stages of operations namely,data cleaning,Feature Selection(FS),prediction,and parameter optimization.In addition,MOGOA-based FS technique is utilized in the selection of optimum subset of features.Besides,DELM-based predictive model is also applied in forecasting the load requirements.The proposed MOGOA model is also applied in FS and the selection of optimalDELM parameters to improve the predictive outcome.To inspect the effectual outcome of the proposed MOGOA-DELM model,a series of simulations was performed using UK Smart Meter dataset.In the experimentation procedure,the proposed model achieved the highest accuracy of 85.80%and the results established the superiority of the proposed model in predicting the testing data.
文摘Peer to Peer systems are emerging as one of the most popular Internet applications. Structured Peer to Peer overlay networks use identifier based routing algorithms to allow robustness, load balancing, and distributed lookup needed in this environment. However, identifier based routing that is independent of Internet topology tends to be of low efficiency. Aimed at improving the routing efficiency, the super proximity routing algorithms presented in this paper combine Internet topology and overlay routing table in choosing the next hop. Experimental results showed that the algorithms greatly improve the efficiency of Peer to Peer routing.
基金The National High Technology Research and Development Program of China (863 Program) (No.2007AA01Z422)the NaturalFoundation of Anhui Provincial Education Department (No.2006KJ041B,KJ2007B073)
文摘Combining the characteristics of peer-to-peer (P2P) and grid, a super-peer selection algorithm--SSABC is presented in the distributed network merging P2P and grid. The algorithm computes nodes capacities using their resource properties provided by a grid monitoring and discovery system, such as available bandwidth, free CPU and idle memory, as well as the number of current connections and online time. when a new node joins the network and the super-peers are all saturated, it should select a new super-peer from the new node or joined nodes with the highest capacity. By theoretical analyses and simulation experiments, it is shown that super-peers selected by capacity can achieve higher query success rates and shorten the average hop count when compared with super-peers selected randomly, and they can also balance the network load when all super-peers are saturated. When the number of total nodes changes, the conclusion is still valid, which explains that the algorithm SSABC is feasible and stable.
基金supported by National Natural Science Foundation of China under Grant 52061635104.
文摘Multi-energy systems are one of the key technologies to tackle energy crisis and environmental pollution.An energy hub(EH)is a minimum multi-energy system.Interconnection of multiple EHs through energy routers(ERs)can realize mutual energy assistance.This paper proposes a peer-to-peer(P2P)energy sharing strategy between EHs including ERs in an interconnected system,which is divided into two levels.In the lower level,a method of determining the charging/discharging constraints of energy storage devices is proposed.Based on the Lyapunov optimization method,virtual queues are used to model the energy storage devices and flexible loads in the system.The objective is to minimize the overall operating cost of the interconnected system.In the upper level,a non-cooperative game model is introduced to minimize the cost of purchasing power from other EHs for each EH.A best response-based method is adapted to find the Nash equilibrium.The simulation outcomes demonstrate that application of the proposed strategy can reduce operating costs of an interconnected system and each EH.On basis of a real-world dataset of interconnected EHs,both analytical and numerical results show the effectiveness of the proposed strategy.
基金The National Natural Science Foundation of China(No60573089)the Natural Science Foundation of Liaoning Province(No20052031)the National High Technology Research and Develop-ment Program of China (863Program)(No2006AA09Z139)
文摘Distributed data sources which employ taxonomy hierarchy to describe the contents of their objects are considered, and a super-peer-based semantic overlay network (SSON) is proposed for sharing and searching their data objects. In SSON, peers are dynamically clustered into many semantic clusters based on the semantics of their data objects and organized in the semantic clusters into a semantic overlay network. Each semantic cluster consists of a super-peer and more peers, and is only responsible for answering queries in its semantic subspace. A query is first routed to the appropriate semantic clusters by an efficient searching algorithm, and then it is forwarded to the specific peers that hold the relevant data objects. Experimental results indicate that SSON has good scalability and achieves a competitive trade-off between search efficiency and costs.
文摘Active XML是一种新型的具有交换内涵数据功能的语言架构。在Active XML文档中内涵数据是通过本地或远程Web services调用方式来获取。在Peer to Peer网络中,Active XML能改善工作任务的划分和分布。然而,如果一个站点属于多个Peer to Peer网络中的一员并且这个站点提供的服务被大量站点频繁调用,这个站点就会成为整个Web服务系统的瓶颈。在本文中,我们提出了一种在Peer to Peer网络中基于AXML技术的缓存机制的良好解决方案。该方案可以利用Active XML自身特性极大的简化缓存过程。
基金supported in part by National Basic Research Program of China ("973 Program") under contract No.2007CB311106in part by the Special Funds for Key Program of National Standardization Committee of China No.TC260-JCYJ-W1-2008042
文摘P2P is a complex system.Many researches on P2P architecture have been done.These researches have provided valuable references for the standardization of P2P technology.However,the standardization can not be achieved because there are still some problems in existing studies.This paper proposes a 5-layer reference model which clearly defines the functionalities of each layer,and distinctly describes the interface and the relationship between layers.This model is able to clearly show the internal structure of P2P system and the working process of data flow in P2P system.Validation shows that this model is general and rational.
基金Supported by the National High-Technology Re-search and Development Program of China(2003AA414210) the National Natural Science Foundation of China (60573090)
文摘The differences between the data integration of a dynamic database grid (DBG) and that of a distributed database system are analyzed, and three kinds of data integration strategies are given on the background of DBG based on Peer to Peer (P2P) framework, including the centralized data integration (CDI) strategy, the distributed data integration (DDI) strategy and the filter-based data integration (FDDI) strategy. CDI calls all the database grid services (DGSs) at a single node, DDI disperses the DGSs to multiple nodes, while FDDI schedules the data integration nodes based on filtering the keywords returned from DGSs. The performance of these three integration strategies are compared with and analyzed by simulation experiments. FDDI is more evident for filtering the keywords with data redundancy increasing. Through the reduction of large amount of data transportation, it effectively shortens the executing time for the task and improves its efficiency.
文摘Can peer-to-peer lending platforms mitigate fraudulent behaviors?Or have lending players been acting similar to free-riders?This paper constructs a new proxy to investigate lending platform misconduct and compares the FICO score and the LendingClub credit grade.To examine whether the lack of verification by the Fintech platform affects lenders’collection performance,I explore the recovery rate(RR)of non-performing loans through a mixed-continuous model.The regression results show that the degree of prudence taken by the lending platform in the pre-screening activity negatively affects the detection of some misreporting borrowers.I also find that the Fintech platform’s missing verification information(e.g.,annual income and employment length)affects the RR of non-performing loans,thereby hampering lenders’collection performance.
基金This project is supported by National Natural Science Foundation of China (No.50305035).
文摘Building an Internet based tele-robotic system requires the developers beingproficient in computer theory, network technology, control theory, etc. A flexible, open structuredand module based framework for tele-control system is proposed on the basis of abstraction andanalysis of existing Internet-based control systems. This framework is designed following the peerto peer (P2P) distributed computing model. As a key to the system, the XML based ontology ofresources/modules/peers is discussed, so do the model for dynamically allocating of resources, basedon which the coordination among modules or peers can then be implemented. The experiment system andits experimental results prove the feasibility of the framework and its ease to use.
基金Project supported by the National Natural Science Foundation of China (No. 60302004)the Natural Science Foundation of HubeiProvince, China (No. 2005ABA264)
文摘Media streaming delivery in wireless ad hoc networks is challenging due to the stringent resource restrictions,po-tential high loss rate and the decentralized architecture. To support long and high-quality streams,one viable approach is that a media stream is partitioned into segments,and then the segments are replicated in a network and served in a peer-to-peer(P2P) fashion. However,the searching strategy for segments is one key problem with the approach. This paper proposes a hybrid ants-like search algorithm(HASA) for P2P media streaming distribution in ad hoc networks. It takes the advantages of random walks and ants-like algorithms for searching in unstructured P2P networks,such as low transmitting latency,less jitter times,and low unnecessary traffic. We quantify the performance of our scheme in terms of response time,jitter times,and network messages for media streaming distribution. Simulation results showed that it can effectively improve the search efficiency for P2P media streaming distribution in ad hoc networks.
基金Partially supported by National Advanced Technology Research Development Plan 863 Program (2005AA121130)Tsinghua University Media and Net-work Technology Ministry of Education-Microsoft Lab Fund, and CNGI 2006 Apoplectic Demonstration project.
文摘The letter proposes a three-layer manageable media distribution network system architecture called MSPnet, which is based on Session Initiation ProtocolIll and Peer to Peer (SIP P2P) technology. MSPnet performs application-level structured DHT routing and resource location among domains and unstructured ones in domain. Except for media distribution, it can be used to support a variety of P2P applications, including video broadcasting, video on demand, VoIP, etc. MSPnet is composed of three layers, namely, the signal control layer, the management layer, and the media transportation layer. The MSPnet prototype consists of the SIP server, the management server, the media server, and the node User Agent (UA). Results from a prototype experiment in a large-scale Internet environment show that MSPnet is feasible, scalable and manageable.
文摘The trust evaluation model of the existing P2P system is facing the attack behavior of two kinds of strategy malicious nodes: the strategic deception and the dishonest recommendation, which seriously affect the accuracy and the effectiveness of the trust evaluation of the model calculation nodes. In view of the disadvantages of the existing models, the author puts forward a trust evaluation model based on the probabilistic method. The model uses the concepts of the subjective trust relationship in the human society, and on the basis of the direct experience and the feedback information, calculate the direct trust and the recommendation trust of the nodes by using the probability statistical method. And through the identification of the importance of the direct experience, distinguish the reliability of the feedback information and recommenders, and improve the effectiveness of the trust evaluation model. The simulation experiment shows that compared with the existing trust evaluation model, this model can effectively restrain the threat of the strategic deception and the dishonesty recommendation, especially the attack of the complex cooperative cheating on the system.
基金the National Key R&D Program of China(No.2018YFB0905000)Science and Technology Project of SGCC(No.SGTJDK00DWJS1800232)National Natural Science Foundation of China(51777155)。
文摘The penetration of distributed renewable generationprovides green energy to the local energy system. However, theuncertainties it brings to the system are becoming more andmore unacceptable, making it difficult to efficiently operate thelocal energy system. In a foreseeable future, there could bean increasing number of flexible resources, such as naturalgas power plants and interruptible demands, which providesolutions to these uncertainties. In this paper, a novel day-aheadenergy market design for the local energy system is proposed.This market allows its participants to trade day-ahead energyin a peer-to-peer approach. In addition, flexible resources canprovide up/down-ward reserves to the system through reservetrading, where the local system operator (LSO) takes chargeof reserve procurement. Then, to operate the market, a marketclearing model is proposed incorporating operating costs of theday-ahead and real time stages. A consensus-based approach isapplied which enables the market to clear in a decentralizedmethod. Finally, since the LSO bears the reserve procurementcosts as well as the operating costs in the real time stage,we then propose a cost reallocation model to transfer theexpenses to the renewables. Case studies demonstrate the validityand efficiency of the proposed market design, including localenergy trading facilitation, high and stable revenue preservation,high computation efficiency and prevention of strategic biddingbehaviors.
基金supported by an INRIA/CONICYT French-Chilean cooperation project under Grant No.INRIA0703
文摘The growing number of popular peer to peer applications during the last five years has implied for researchers to focus on how to build trust in such very large scale distributed systems. Reputation systems have shown to be a very good solution to build trust in presence of malicious nodes. We propose in this paper a new metric for reputation systems on top of a Distributed Hash Table that uses a notion of risk to make the applications aware of certain behaviours of malicious nodes. We show that our metric is able to significantly reduce the number of malicious transactions, and that it also provides very strong resistance to several traditional attacks of reputations systems. We also show that our solution can easily scale, and can be adapted to various Distributed Hash Tables.
基金partially supported by U.S.National Science Foundation(1912753,2011845).
文摘As one of the most promising machine learning frameworks emerging in recent years,Federated learning(FL)has received lots of attention.The main idea of centralized FL is to train a global model by aggregating local model parameters and maintain the private data of users locally.However,recent studies have shown that traditional centralized federated learning is vulnerable to various attacks,such as gradient attacks,where a malicious server collects local model gradients and uses them to recover the private data stored on the client.In this paper,we propose a decentralized federated learning against aTtacks(DEFEAT)framework and use it to defend the gradient attack.The decentralized structure adopted by this paper uses a peer-to-peer network to transmit,aggregate,and update local models.In DEFEAT,the participating clients only need to communicate with their single-hop neighbors to learn the global model,in which the model accuracy and communication cost during the training process of DEFEAT are well balanced.Through a series of experiments and detailed case studies on real datasets,we evaluate the excellent model performance of DEFEAT and the privacy preservation capability against gradient attacks.