The introduction of new technologies has increased communication network coverage and the number of associating nodes in dynamic communication networks(DCN).As the network has the characteristics like decentralized an...The introduction of new technologies has increased communication network coverage and the number of associating nodes in dynamic communication networks(DCN).As the network has the characteristics like decentralized and dynamic,few nodes in the network may not associate with other nodes.These uncooperative nodes also known as selfish nodes corrupt the performance of the cooperative nodes.Namely,the nodes cause congestion,high delay,security concerns,and resource depletion.This study presents an effective selfish node detection method to address these problems.The Price of Anarchy(PoA)and the Price of Stability(PoS)in Game Theory with the Presence of Nash Equilibrium(NE)are discussed for the Selfish Node Detection.This is a novel experiment to detect selfish nodes in a network using PoA.Moreover,the least response dynamic-based Capacitated Selfish Resource Allocation(CSRA)game is introduced to improve resource usage among the nodes.The suggested strategy is simulated using the Solar Winds simulator,and the simulation results show that,when compared to earlier methods,the new scheme offers promising performance in terms of delivery rate,delay,and throughput.展开更多
This paper analyzes a novel Kite Runner of Khaled Hosseini, published in 2003. It is the first novel of Hosseini which had been one of the bestselling in New York Times ranking list. It studies Hassan's tragedy fr...This paper analyzes a novel Kite Runner of Khaled Hosseini, published in 2003. It is the first novel of Hosseini which had been one of the bestselling in New York Times ranking list. It studies Hassan's tragedy from three aspects, including the social environment in Afghanistan, the loyalty of Hassan, and the selfishness of Amir. Besides, it also discusses the friendship and betrayal between two boys-Hassan and Amir. Finally, the terrible life of Hassan in Afghanistan is under investigated.展开更多
Opportunistic Mobile Social Networks(OMSNs)are kind of Delay Tolerant Networks(DTNs)that leverage characteristics of Mobile Ad Hoc Networks(MANETs)and Social Networks,particularly the social features,to boost performa...Opportunistic Mobile Social Networks(OMSNs)are kind of Delay Tolerant Networks(DTNs)that leverage characteristics of Mobile Ad Hoc Networks(MANETs)and Social Networks,particularly the social features,to boost performance of routing algorithms.Users in OMSNs communicate to share and disseminate data to meet needs for variety of applications.Such networks have attracted tremendous attention lately due to the data transmission requirement from emerging applications such as IoT and smart city initiatives.Devices carried by human is the carrier of message transmission,so the social features of human can be used to improve the ability of data transmission.In this paper,we conduct a comparative survey on routing algorithms in OMSNs.We first analyze routing algorithms based on three social features.Since node selfishness is not really considered previously in aforementioned routing algorithms,but has significant impact on network performance,we treat node selfishness as another social feature,classify and elaborate routing algorithms based on incentive mechanism.To assess the impact of social features on routing algorithms,we conducted simulation for six routing algorithms and analyzed the simulation result.Finally,we conclude the paper with challenges on design of routing in OMSNs and point out some future research directions.展开更多
The Scarlet Letter is a tragedy itself.Dimmesdale,the number one hero in the tragedy,is doomed to be a tragic character.He commits adultery with Hester,which should be punished by law.But because of his cowardice and ...The Scarlet Letter is a tragedy itself.Dimmesdale,the number one hero in the tragedy,is doomed to be a tragic character.He commits adultery with Hester,which should be punished by law.But because of his cowardice and selfishness and Hester' protection,he escaped from the punishment of the law.Because he is selfish,cowardly,hypocitical,and lonely,he has hidden his sin for seven years.And because he is kind,he finally stands up actively and takes the responsibility,which belongs to him.At that time,he dies an honest true man.Through the analysis of Dimmesdale' s characteristics,we can know his inner world,and we will be more sympathetic to him.展开更多
Socio-biology has become popular with Wilson and Dawkins.How to theorize human evolution and selfishness?One must recognize the frequent occurrence of war in human civilization.Hobbes and Spinoza were realist recogniz...Socio-biology has become popular with Wilson and Dawkins.How to theorize human evolution and selfishness?One must recognize the frequent occurrence of war in human civilization.Hobbes and Spinoza were realist recognizing selfishness.Now,mankind faces both climate change and nuclear confrontation.The only remedy is intergovernmental coordination.But it is slow characterized by myopia and opportunism as well as egoism.Tocqueville stated that Napoleon“democratized”war arriving with 10 times as many soldiers as feudal kings,increasing human misery even more.Could human evolution come to an end?展开更多
Not So Cooperative Caching(NSCC) considers a network comprised of selfish nodes; each is with caching capability and an objective of reducing its own access cost by fetching data from its local cache or from neighbori...Not So Cooperative Caching(NSCC) considers a network comprised of selfish nodes; each is with caching capability and an objective of reducing its own access cost by fetching data from its local cache or from neighboring caches. These nodes would cooperate in caching and share cached content if and only if they each benefit. The challenges are to determine what objects to cache at each node and to implement the system in the context of Information Centric Networking(ICN). This work includes both a solution for the NSCC problem and a design and implementation of an NSCC system in Named Data Networking(NDN), a large effort that exemplifies ICN. Our design applies NDN synchronization protocol to facilitate the information exchange among nodes, adopts group key encryption to control data access within the NSCC group, and offers an error checker to detect error events in the system. Our approach is validated by deploying the system we developed on Planet Lab.展开更多
In non-dedicated cooperative relay networks, each node is autonomous and selfish in nature, and thus spontaneous cooperation among nodes is challenged. To stimulate the selfish node to participate in cooperation, a pr...In non-dedicated cooperative relay networks, each node is autonomous and selfish in nature, and thus spontaneous cooperation among nodes is challenged. To stimulate the selfish node to participate in cooperation, a pricing-based cooperation engine using game theory was designed. Firstly, the feasible regions of the charge price and reimbursement price were deduced. Then, the non-cooperative and cooperative games were adopted to analyze the amount of bandwidth that initiating cooperation node(ICN) forwards data through participating cooperation node(PCN) and the amount of bandwidth that PCN helps ICN to relay data. Meanwhile, the Nash equilibrium solutions of cooperation bandwidth allocations(CBAs) were obtained through geometrical interpretation. Secondly, a pricing-based cooperation engine was proposed and a cooperative communication system model with cooperation engines was depicted. Finally, an algorithm based on game theory was proposed to realize the cooperation engine. The simulation results demonstrate that, compared with the system without pricing-based incentive, the proposed system can significantly improve the ICN's metric measured by bit-per-Joule and increase the PCN's revenue.展开更多
A selfish behavior detection technique is investigated to assist secure cooperative trans- mission at the physical layer. The detection technique calculates the correlation ratio between signals received from the dive...A selfish behavior detection technique is investigated to assist secure cooperative trans- mission at the physical layer. The detection technique calculates the correlation ratio between signals received from the diversity branches to determine the relay' s behavior in amplify and forward coop- eration strategy. The correlation ratio is considerably reduced because the relay' s selfish behavior makes the correlation between the received signals in the diversity branch degraded. Simulation re- sults show that the proposed mechanism can effectively detect selfish nodes and performance will be improved significantly with the destination' s detection technique.展开更多
The cumulative sum (CUSUM) algorithm is proposed to detect the selfish behavior of a node in a wireless ad hoc network. By tracing the statistics characteristic of the backoff time between successful transmissions, ...The cumulative sum (CUSUM) algorithm is proposed to detect the selfish behavior of a node in a wireless ad hoc network. By tracing the statistics characteristic of the backoff time between successful transmissions, a wireless node can distinguish if there is a selfish behavior in the wireless network. The detection efficiency is validated using a Qualnet simulator. An IEEE 802.11 wireless ad hoc network with 20 senders and 20 receivers spreading out randomly in a given area is evaluated. The well-behaved senders use minimum contention window size of 32 and maximum con- tention window size of I 024, and the selfish nodes are assumed not to use the binary exponential strategy for which the contention window sizes are both fixed as 16. The transmission radius of all nodes is 250 m. Two scenarios are investigated: a single-hop network with nodes spreading out in 100 m^100 m, and all the nodes are in the range of each other; and a multi-hop network with nodes spreading out in 1 000 m~ 1 000 m. The node can monitor the backoff time from all the other nodes and run the detection algorithms over those samples. It is noted that the threshold can significantly affect the detection time and the detection accuracy. For a given threshold of 0.3 s, the false alarm rates and the missed alarm rates are less than 5%. The detection delay is less than 1.0 s. The simulation results show that the algorithm has short detection time and high detection accuracy.展开更多
There is relatively limited knowledge concerning our understanding of how our immune system and brain take most of the available energy in a selfish manner to compensate for their own needs on priority in high energy ...There is relatively limited knowledge concerning our understanding of how our immune system and brain take most of the available energy in a selfish manner to compensate for their own needs on priority in high energy demanding situations. The main objective of this review is to understand the energy allocation to immune system and brain in infections and/or fight or flight situations. The immune system and brain behave in a selfish manner as they allocate themselves majority of the total available energy. Insulin resistance (IR) is used as a tool for energy allocation by these systems. The immune system is activated as a response to stress and infection. Similarly, the brain gets activated as a response to any external environmental impulse, anxiety, and/or mental factor. These situations need to be dealt in a way to minimize their adverse health effects. The immune system and the brain in such situations need enormous energy for activation which is derived from the energy quota otherwise allocated to other organs. This maximum flux of energy towards these systems is achieved by making rest of the organs less responsive to insulin, a condition known as IR. As immune system and brain do not depend upon insulin for uptake of glucose, these systems are benefited from IR. IR is indicated as a beneficial role ensuring maximum energy allocation to these systems for improving health and well-being.展开更多
In wireless sensor networks, due to the energy and resource constraints, nodes may be unwilling to forward packets for their neighbors. This can render severe deteriorations in the network performance and malfunctions...In wireless sensor networks, due to the energy and resource constraints, nodes may be unwilling to forward packets for their neighbors. This can render severe deteriorations in the network performance and malfunctions of the system. To tackle such selfish behaviors and enhance the cooperation among sensors, based on reputation and energy consumption of each node, we present a utility function to punish the malicious nodes and encourage cooperation among nodes. Specifically, we firstly give a mixed strategy Nash equilibrium solution for the two nodes. Then we extend the model to multi-nodes scenario. With the unity function, each sensor’s reputation is evaluated according to its degree of cooperation. The extensive simulation results have shown the effectiveness of the mechanism, in that the cooperative behaviors are encouraged, which can ensure the normal functioning of the network system.展开更多
A MANET is a cooperative network in which each node has dual responsibilities of forwarding and routing thus node strength is a major factor because a lesser number of nodes reduces network performance. The existing r...A MANET is a cooperative network in which each node has dual responsibilities of forwarding and routing thus node strength is a major factor because a lesser number of nodes reduces network performance. The existing reputation based methods have limitation due to their stricter punishment strategy because they isolate nodes from network participation having lesser reputation value and thus reduce the total strength of nodes in a network. In this paper we have proposed a mathematical model for the classification of nodes in MANETs using adaptive decision boundary. This model classifies nodes in two classes: selfish and regular node as well as it assigns the grade to individual nodes. The grade is computed by counting how many passes are required to classify a node and it is used to define the punishment strategy as well as enhances the reputation definition of traditional reputation based mechanisms. Our work provides the extent of noncooperation that a network can allow depending on the current strength of nodes for the given scenario and thus includes selfish nodes in network participation with warning messages. We have taken a leader node for reputation calculation and classification which saves energy of other nodes as energy is a major challenge of MANET. The leader node finally sends the warning message to low grade nodes and broadcasts the classification list in the MANET that is considered in the routing activity.展开更多
Undoubtedly,Tess of the D'Urbervilles,the masterpiece of Thomas Hardy,is a precious diamond shining in the worldliterature.Through Tess' s short and miserable life,the main characters Alec,Angel,her parents an...Undoubtedly,Tess of the D'Urbervilles,the masterpiece of Thomas Hardy,is a precious diamond shining in the worldliterature.Through Tess' s short and miserable life,the main characters Alec,Angel,her parents and even herself directly lead toher tragical ending.This thesis will analyze those people's characters detailedly and systematically.Meanwhile,it will explain howthey influence and change Tess greatly.Tess' s destiny is thoroughly changed when she accidentally meets Alec.He owns Tess byunlawful sexual intercourse due to his man's selfish desire.Later,when Tess tells Angel her experience with Alec and her baby,hetotally collapsed,disappointed,distressed and his open-minded behavior disappears.The angel is so man-centered that he consid-ers his dignity and advantages in the first position.Her parents are incapable,ignorant and vainglorious and simple-minded.Tess' shonesty,sincerity and dignity also lead to her tragedy.When she has no way to take care of her family,she doesn't choose to con-tact Angel but go back to Alec's bosom because she thinks that Angel has decided to terminate their relationship.Since all abovementioned,people are social animal and always receive their surrounding's impact on them whether actively or subjectively.Dur-ing Tess' s short and desperate life,the people she has recognized or contacted with are limited.Those main characters,Alec,An-gel,Tess' s parents and herself directly lead to her tragical destiny.展开更多
The main intention of developing cognitive radio technology is to solve the spectrum deficiency problem by allocating the spectrum dynamically to the unlicensed clients. An important aim of any wireless network is to ...The main intention of developing cognitive radio technology is to solve the spectrum deficiency problem by allocating the spectrum dynamically to the unlicensed clients. An important aim of any wireless network is to secure communication. It is to help the unlicensed clients to utilize the maximum available licensed bandwidth, and the cognitive network is designed for opportunistic communication technology. Selfish attacks cause serious security problem because they significantly deteriorate the performance of a cognitive network. In this paper, the selfish attacks have been identified using cooperative neighboring cognitive radio ad hoc network (COOPON). A novel technique has been proposed as ICOOPON (improvised COOPON), which shows improved performance in selfish attack detection as compared to existing technique. A comparative study has been presented to find the efficiency of proposed technique. The parameters used are throughput, packet delivery ratio and end to end delay.展开更多
As fossil fuel stocks are being depleted,alternative sources of energy must be explored.Consequently,traditional thermal power plants must coexist with renewable resources,such as wind,solar,and hydro units,and all-da...As fossil fuel stocks are being depleted,alternative sources of energy must be explored.Consequently,traditional thermal power plants must coexist with renewable resources,such as wind,solar,and hydro units,and all-day planning and operation techniques are necessary to safeguard nature while meeting the current demand.The fundamental components of contemporary power systems are the simultaneous decrease in generation costs and increase in the available transfer capacity(ATC)of current systems.Thermal units are linked to sources of renewable energy such as hydro,wind,and solar power,and are set up to run for 24 h.By contrast,new research reports that various chaotic maps are merged with various existing optimization methodologies to obtain better results than those without the inclusion of chaos.Chaos seems to increase the performance and convergence properties of existing optimization approaches.In this study,selfish animal tendencies,mathematically represented as selfish herd optimizers,were hybridized with chaotic phenomena and used to improve ATC and/or reduce generation costs,creating a multi-objective optimization problem.To evaluate the performance of the proposed hybridized optimization technique,an optimal power flow-based ATC was enforced under various hydro-thermal-solar-wind conditions,that is,the renewable energy source-thermal scheduling concept,on IEEE 9-bus,IEEE 39-bus,and Indian Northern Region Power Grid 246-bus test systems.The findings show that the proposed technique outperforms existing well-established optimization strategies.展开更多
Since the late 1970s China has implemented sweeping economic reforms for almost 40 years. At the same time, it has not officially adjusted its previous moral code. As a result, the country is now faced with a widespre...Since the late 1970s China has implemented sweeping economic reforms for almost 40 years. At the same time, it has not officially adjusted its previous moral code. As a result, the country is now faced with a widespread moral crisis characterized by greed and anomie. To offer a remedy for this crisis in his novel The Door of the Sheep (1999), Li Peifu, a noted writer from Henan Province, creates a village leader intent on maintaining his authoritative moral position as a shepherd by restraining his corporeal desires and exercising his authority on his flock and for his flock. In a subsequent novel entitled pervasive moral disorientation in a village where nobody assumes a pastoral position. The present article analyzes these two novels in connection with the sociopolitical environment of contemporary China. Special attention will be paid to Li's interpretation of human selfishness as the root cause of the moral crisis and his attempt to offer a politically feasible and morally effective solution.展开更多
As an extension of wireless ad hoc and sensor networks, wireless mesh networks(WMNs) are employed as an emerging key solution for wireless broadband connectivity improvement. Due to the lack of physical security guara...As an extension of wireless ad hoc and sensor networks, wireless mesh networks(WMNs) are employed as an emerging key solution for wireless broadband connectivity improvement. Due to the lack of physical security guarantees, WMNs are susceptible to various kinds of attack. In this paper, we focus on node social selfish attack, which decreases network performance significantly. Since this type of attack is not obvious to detect, we propose a security routing scheme based on social network and reputation evaluation to solve this attack issue. First, we present a dynamic reputation model to evaluate a node's routing behavior, from which we can identify selfish attacks and selfish nodes. Furthermore, a social characteristic evaluation model is studied to evaluate the social relationship among nodes. Groups are built based on the similarity of node social status and we can get a secure routing based on these social groups of nodes. In addition, in our scheme, nodes are encouraged to enter into multiple groups and friend nodes are recommended to join into groups to reduce the possibility of isolated nodes. Simulation results demonstrate that our scheme is able to reflect node security status, and routings are chosen and adjusted according to security status timely and accurately so that the safety and reliability of routing are improved.展开更多
In this paper,we provide a new theoretical framework of pyramid Markov processes to solve some open and fundamental problems of blockchain selfish mining under a rigorous mathematical setting.We first describe a more ...In this paper,we provide a new theoretical framework of pyramid Markov processes to solve some open and fundamental problems of blockchain selfish mining under a rigorous mathematical setting.We first describe a more general model of blockchain selfish mining with both a two-block leading competitive criterion and a new economic incentive mechanism.Then we establish a pyramid Markov process and show that it is irreducible and positive recurrent,and its stationary probability vector is matrix-geometric with an explicitly representable rate matrix.Also,we use the stationary probability vector to study the influence of orphan blocks on the waste of computing resource.Next,we set up a pyramid Markov reward process to investigate the long-run average mining profits of the honest and dishonest mining pools,respectively.As a by-product,we build one-dimensional Markov reward processes and provide some new interesting interpretation on the Markov chain and the revenue analysis reported in the seminal work by Eyal and Sirer(2014).Note that the pyramid Markov(reward)processes can open up a new avenue in the study of blockchain selfish mining.Thus we hope that the methodology and results developed in this paper shed light on the blockchain selfish mining such that a series of promising research can be developed potentially.展开更多
Transposable elements (TEs) are self-replicating, mobile DNA sequences which constitute a significant fraction of eukaryotic genomes. They are generally considered selfish DNA, as their replication and random insert...Transposable elements (TEs) are self-replicating, mobile DNA sequences which constitute a significant fraction of eukaryotic genomes. They are generally considered selfish DNA, as their replication and random insertion may have deleterious effects on genome functionalities, although some beneficial effects and evolutionary potential have been recognized. Short interspersed elements (SINEs) are non-autonomous TEs with a modular structure: a small RNA-related head, a body, and a long interspersed element-related tail. Despite their high turnover rate and de novo emergence, the body may retain highly conserved domains (HCDs) shared among divergent SINE families: in metazoans, at least nine HCD-SINEs have been recognized. Data mining on public molecular databases allowed the retrieval of 16 new HCD-SINE families from cnidarian, molluscs, arthropods, and vertebrates. Tracking the ancestry of HCDs on the metazoan phylogeny revealed that some of them date back to the Radiata-Bilateria split. Moreover, phylogenetic and age versus divergence analyses of the most ancient HCDs suggested that long-term vertical inheritance is the rule, with few horizontal transfer events. We suggest that the evolutionary conservation of HCDs may be linked to their potential to serve as recombination hotspots. This indirectly affects host genomes by maintaining active and diverse SINE lineages, whose insertions may impact (either positively or negatively) on the evolution of the genome.展开更多
文摘The introduction of new technologies has increased communication network coverage and the number of associating nodes in dynamic communication networks(DCN).As the network has the characteristics like decentralized and dynamic,few nodes in the network may not associate with other nodes.These uncooperative nodes also known as selfish nodes corrupt the performance of the cooperative nodes.Namely,the nodes cause congestion,high delay,security concerns,and resource depletion.This study presents an effective selfish node detection method to address these problems.The Price of Anarchy(PoA)and the Price of Stability(PoS)in Game Theory with the Presence of Nash Equilibrium(NE)are discussed for the Selfish Node Detection.This is a novel experiment to detect selfish nodes in a network using PoA.Moreover,the least response dynamic-based Capacitated Selfish Resource Allocation(CSRA)game is introduced to improve resource usage among the nodes.The suggested strategy is simulated using the Solar Winds simulator,and the simulation results show that,when compared to earlier methods,the new scheme offers promising performance in terms of delivery rate,delay,and throughput.
文摘This paper analyzes a novel Kite Runner of Khaled Hosseini, published in 2003. It is the first novel of Hosseini which had been one of the bestselling in New York Times ranking list. It studies Hassan's tragedy from three aspects, including the social environment in Afghanistan, the loyalty of Hassan, and the selfishness of Amir. Besides, it also discusses the friendship and betrayal between two boys-Hassan and Amir. Finally, the terrible life of Hassan in Afghanistan is under investigated.
基金This work was supported by National Natural Science Foundation of China(No.61672106)Natural Science Foundation of Beijing,China(L192023).
文摘Opportunistic Mobile Social Networks(OMSNs)are kind of Delay Tolerant Networks(DTNs)that leverage characteristics of Mobile Ad Hoc Networks(MANETs)and Social Networks,particularly the social features,to boost performance of routing algorithms.Users in OMSNs communicate to share and disseminate data to meet needs for variety of applications.Such networks have attracted tremendous attention lately due to the data transmission requirement from emerging applications such as IoT and smart city initiatives.Devices carried by human is the carrier of message transmission,so the social features of human can be used to improve the ability of data transmission.In this paper,we conduct a comparative survey on routing algorithms in OMSNs.We first analyze routing algorithms based on three social features.Since node selfishness is not really considered previously in aforementioned routing algorithms,but has significant impact on network performance,we treat node selfishness as another social feature,classify and elaborate routing algorithms based on incentive mechanism.To assess the impact of social features on routing algorithms,we conducted simulation for six routing algorithms and analyzed the simulation result.Finally,we conclude the paper with challenges on design of routing in OMSNs and point out some future research directions.
文摘The Scarlet Letter is a tragedy itself.Dimmesdale,the number one hero in the tragedy,is doomed to be a tragic character.He commits adultery with Hester,which should be punished by law.But because of his cowardice and selfishness and Hester' protection,he escaped from the punishment of the law.Because he is selfish,cowardly,hypocitical,and lonely,he has hidden his sin for seven years.And because he is kind,he finally stands up actively and takes the responsibility,which belongs to him.At that time,he dies an honest true man.Through the analysis of Dimmesdale' s characteristics,we can know his inner world,and we will be more sympathetic to him.
文摘Socio-biology has become popular with Wilson and Dawkins.How to theorize human evolution and selfishness?One must recognize the frequent occurrence of war in human civilization.Hobbes and Spinoza were realist recognizing selfishness.Now,mankind faces both climate change and nuclear confrontation.The only remedy is intergovernmental coordination.But it is slow characterized by myopia and opportunism as well as egoism.Tocqueville stated that Napoleon“democratized”war arriving with 10 times as many soldiers as feudal kings,increasing human misery even more.Could human evolution come to an end?
基金sponsored by the National Grand Fundamental Research 973 program of China under Grant No.2009CB320505the National Nature Science Foundation of China under Grant No. 60973123+1 种基金the Technology Support Program (Industry) of Jiangsu under Grant No.BE2011173Prospective Research Project on Future Networks of Jiangsu Future Networks Innovation Institute under Grant No.BY2013095-5-03
文摘Not So Cooperative Caching(NSCC) considers a network comprised of selfish nodes; each is with caching capability and an objective of reducing its own access cost by fetching data from its local cache or from neighboring caches. These nodes would cooperate in caching and share cached content if and only if they each benefit. The challenges are to determine what objects to cache at each node and to implement the system in the context of Information Centric Networking(ICN). This work includes both a solution for the NSCC problem and a design and implementation of an NSCC system in Named Data Networking(NDN), a large effort that exemplifies ICN. Our design applies NDN synchronization protocol to facilitate the information exchange among nodes, adopts group key encryption to control data access within the NSCC group, and offers an error checker to detect error events in the system. Our approach is validated by deploying the system we developed on Planet Lab.
基金Project(61201143)supported by the National Natural Science Foundation of China
文摘In non-dedicated cooperative relay networks, each node is autonomous and selfish in nature, and thus spontaneous cooperation among nodes is challenged. To stimulate the selfish node to participate in cooperation, a pricing-based cooperation engine using game theory was designed. Firstly, the feasible regions of the charge price and reimbursement price were deduced. Then, the non-cooperative and cooperative games were adopted to analyze the amount of bandwidth that initiating cooperation node(ICN) forwards data through participating cooperation node(PCN) and the amount of bandwidth that PCN helps ICN to relay data. Meanwhile, the Nash equilibrium solutions of cooperation bandwidth allocations(CBAs) were obtained through geometrical interpretation. Secondly, a pricing-based cooperation engine was proposed and a cooperative communication system model with cooperation engines was depicted. Finally, an algorithm based on game theory was proposed to realize the cooperation engine. The simulation results demonstrate that, compared with the system without pricing-based incentive, the proposed system can significantly improve the ICN's metric measured by bit-per-Joule and increase the PCN's revenue.
基金Supported by the National High Technology Research and Development Program of China("863"Program) (2009AA011507)
文摘A selfish behavior detection technique is investigated to assist secure cooperative trans- mission at the physical layer. The detection technique calculates the correlation ratio between signals received from the diversity branches to determine the relay' s behavior in amplify and forward coop- eration strategy. The correlation ratio is considerably reduced because the relay' s selfish behavior makes the correlation between the received signals in the diversity branch degraded. Simulation re- sults show that the proposed mechanism can effectively detect selfish nodes and performance will be improved significantly with the destination' s detection technique.
基金Supported by National Natural Science Foundation of China (No. 60702038)National High Technology Research and Development Program of China ("863"Program, No. 2007AA01Z220)Cultivation Fund of Innovation Project,Ministry of Education of China (No. 708024)
文摘The cumulative sum (CUSUM) algorithm is proposed to detect the selfish behavior of a node in a wireless ad hoc network. By tracing the statistics characteristic of the backoff time between successful transmissions, a wireless node can distinguish if there is a selfish behavior in the wireless network. The detection efficiency is validated using a Qualnet simulator. An IEEE 802.11 wireless ad hoc network with 20 senders and 20 receivers spreading out randomly in a given area is evaluated. The well-behaved senders use minimum contention window size of 32 and maximum con- tention window size of I 024, and the selfish nodes are assumed not to use the binary exponential strategy for which the contention window sizes are both fixed as 16. The transmission radius of all nodes is 250 m. Two scenarios are investigated: a single-hop network with nodes spreading out in 100 m^100 m, and all the nodes are in the range of each other; and a multi-hop network with nodes spreading out in 1 000 m~ 1 000 m. The node can monitor the backoff time from all the other nodes and run the detection algorithms over those samples. It is noted that the threshold can significantly affect the detection time and the detection accuracy. For a given threshold of 0.3 s, the false alarm rates and the missed alarm rates are less than 5%. The detection delay is less than 1.0 s. The simulation results show that the algorithm has short detection time and high detection accuracy.
文摘There is relatively limited knowledge concerning our understanding of how our immune system and brain take most of the available energy in a selfish manner to compensate for their own needs on priority in high energy demanding situations. The main objective of this review is to understand the energy allocation to immune system and brain in infections and/or fight or flight situations. The immune system and brain behave in a selfish manner as they allocate themselves majority of the total available energy. Insulin resistance (IR) is used as a tool for energy allocation by these systems. The immune system is activated as a response to stress and infection. Similarly, the brain gets activated as a response to any external environmental impulse, anxiety, and/or mental factor. These situations need to be dealt in a way to minimize their adverse health effects. The immune system and the brain in such situations need enormous energy for activation which is derived from the energy quota otherwise allocated to other organs. This maximum flux of energy towards these systems is achieved by making rest of the organs less responsive to insulin, a condition known as IR. As immune system and brain do not depend upon insulin for uptake of glucose, these systems are benefited from IR. IR is indicated as a beneficial role ensuring maximum energy allocation to these systems for improving health and well-being.
文摘In wireless sensor networks, due to the energy and resource constraints, nodes may be unwilling to forward packets for their neighbors. This can render severe deteriorations in the network performance and malfunctions of the system. To tackle such selfish behaviors and enhance the cooperation among sensors, based on reputation and energy consumption of each node, we present a utility function to punish the malicious nodes and encourage cooperation among nodes. Specifically, we firstly give a mixed strategy Nash equilibrium solution for the two nodes. Then we extend the model to multi-nodes scenario. With the unity function, each sensor’s reputation is evaluated according to its degree of cooperation. The extensive simulation results have shown the effectiveness of the mechanism, in that the cooperative behaviors are encouraged, which can ensure the normal functioning of the network system.
文摘A MANET is a cooperative network in which each node has dual responsibilities of forwarding and routing thus node strength is a major factor because a lesser number of nodes reduces network performance. The existing reputation based methods have limitation due to their stricter punishment strategy because they isolate nodes from network participation having lesser reputation value and thus reduce the total strength of nodes in a network. In this paper we have proposed a mathematical model for the classification of nodes in MANETs using adaptive decision boundary. This model classifies nodes in two classes: selfish and regular node as well as it assigns the grade to individual nodes. The grade is computed by counting how many passes are required to classify a node and it is used to define the punishment strategy as well as enhances the reputation definition of traditional reputation based mechanisms. Our work provides the extent of noncooperation that a network can allow depending on the current strength of nodes for the given scenario and thus includes selfish nodes in network participation with warning messages. We have taken a leader node for reputation calculation and classification which saves energy of other nodes as energy is a major challenge of MANET. The leader node finally sends the warning message to low grade nodes and broadcasts the classification list in the MANET that is considered in the routing activity.
文摘Undoubtedly,Tess of the D'Urbervilles,the masterpiece of Thomas Hardy,is a precious diamond shining in the worldliterature.Through Tess' s short and miserable life,the main characters Alec,Angel,her parents and even herself directly lead toher tragical ending.This thesis will analyze those people's characters detailedly and systematically.Meanwhile,it will explain howthey influence and change Tess greatly.Tess' s destiny is thoroughly changed when she accidentally meets Alec.He owns Tess byunlawful sexual intercourse due to his man's selfish desire.Later,when Tess tells Angel her experience with Alec and her baby,hetotally collapsed,disappointed,distressed and his open-minded behavior disappears.The angel is so man-centered that he consid-ers his dignity and advantages in the first position.Her parents are incapable,ignorant and vainglorious and simple-minded.Tess' shonesty,sincerity and dignity also lead to her tragedy.When she has no way to take care of her family,she doesn't choose to con-tact Angel but go back to Alec's bosom because she thinks that Angel has decided to terminate their relationship.Since all abovementioned,people are social animal and always receive their surrounding's impact on them whether actively or subjectively.Dur-ing Tess' s short and desperate life,the people she has recognized or contacted with are limited.Those main characters,Alec,An-gel,Tess' s parents and herself directly lead to her tragical destiny.
文摘The main intention of developing cognitive radio technology is to solve the spectrum deficiency problem by allocating the spectrum dynamically to the unlicensed clients. An important aim of any wireless network is to secure communication. It is to help the unlicensed clients to utilize the maximum available licensed bandwidth, and the cognitive network is designed for opportunistic communication technology. Selfish attacks cause serious security problem because they significantly deteriorate the performance of a cognitive network. In this paper, the selfish attacks have been identified using cooperative neighboring cognitive radio ad hoc network (COOPON). A novel technique has been proposed as ICOOPON (improvised COOPON), which shows improved performance in selfish attack detection as compared to existing technique. A comparative study has been presented to find the efficiency of proposed technique. The parameters used are throughput, packet delivery ratio and end to end delay.
文摘As fossil fuel stocks are being depleted,alternative sources of energy must be explored.Consequently,traditional thermal power plants must coexist with renewable resources,such as wind,solar,and hydro units,and all-day planning and operation techniques are necessary to safeguard nature while meeting the current demand.The fundamental components of contemporary power systems are the simultaneous decrease in generation costs and increase in the available transfer capacity(ATC)of current systems.Thermal units are linked to sources of renewable energy such as hydro,wind,and solar power,and are set up to run for 24 h.By contrast,new research reports that various chaotic maps are merged with various existing optimization methodologies to obtain better results than those without the inclusion of chaos.Chaos seems to increase the performance and convergence properties of existing optimization approaches.In this study,selfish animal tendencies,mathematically represented as selfish herd optimizers,were hybridized with chaotic phenomena and used to improve ATC and/or reduce generation costs,creating a multi-objective optimization problem.To evaluate the performance of the proposed hybridized optimization technique,an optimal power flow-based ATC was enforced under various hydro-thermal-solar-wind conditions,that is,the renewable energy source-thermal scheduling concept,on IEEE 9-bus,IEEE 39-bus,and Indian Northern Region Power Grid 246-bus test systems.The findings show that the proposed technique outperforms existing well-established optimization strategies.
文摘Since the late 1970s China has implemented sweeping economic reforms for almost 40 years. At the same time, it has not officially adjusted its previous moral code. As a result, the country is now faced with a widespread moral crisis characterized by greed and anomie. To offer a remedy for this crisis in his novel The Door of the Sheep (1999), Li Peifu, a noted writer from Henan Province, creates a village leader intent on maintaining his authoritative moral position as a shepherd by restraining his corporeal desires and exercising his authority on his flock and for his flock. In a subsequent novel entitled pervasive moral disorientation in a village where nobody assumes a pastoral position. The present article analyzes these two novels in connection with the sociopolitical environment of contemporary China. Special attention will be paid to Li's interpretation of human selfishness as the root cause of the moral crisis and his attempt to offer a politically feasible and morally effective solution.
基金supported in part by National Natural Science Foundation of China(Grant Nos.61302071,61471109,61502075)Fundamental Research Funds for the Central Universities(Grant Nos.N150404015,DUT15QY06,DUT15RC(3)009)+2 种基金China Postdoctoral Science Foundation Funded Project(Grant No.2015M580224)Liaoning Province Doctor Startup Fund(Grant No.201501166)State Key Laboratory for Novel Software Technology,Nanjing University(Grant No.KFKT2015B12)
文摘As an extension of wireless ad hoc and sensor networks, wireless mesh networks(WMNs) are employed as an emerging key solution for wireless broadband connectivity improvement. Due to the lack of physical security guarantees, WMNs are susceptible to various kinds of attack. In this paper, we focus on node social selfish attack, which decreases network performance significantly. Since this type of attack is not obvious to detect, we propose a security routing scheme based on social network and reputation evaluation to solve this attack issue. First, we present a dynamic reputation model to evaluate a node's routing behavior, from which we can identify selfish attacks and selfish nodes. Furthermore, a social characteristic evaluation model is studied to evaluate the social relationship among nodes. Groups are built based on the similarity of node social status and we can get a secure routing based on these social groups of nodes. In addition, in our scheme, nodes are encouraged to enter into multiple groups and friend nodes are recommended to join into groups to reduce the possibility of isolated nodes. Simulation results demonstrate that our scheme is able to reflect node security status, and routings are chosen and adjusted according to security status timely and accurately so that the safety and reliability of routing are improved.
基金This work is supported by the National Key R&D Program of China under Grant No.2020AAA0103801Quanlin Li is supported by the National Natural Science Foundation of China under Grant Nos.71671158 and 71932002+1 种基金the Beijing Social Science Foundation Research Base Project under Grant No.19JDGLA004Xiaole Wu is supported by the National Natural Science Foundation of China under Grant No.72025102.
文摘In this paper,we provide a new theoretical framework of pyramid Markov processes to solve some open and fundamental problems of blockchain selfish mining under a rigorous mathematical setting.We first describe a more general model of blockchain selfish mining with both a two-block leading competitive criterion and a new economic incentive mechanism.Then we establish a pyramid Markov process and show that it is irreducible and positive recurrent,and its stationary probability vector is matrix-geometric with an explicitly representable rate matrix.Also,we use the stationary probability vector to study the influence of orphan blocks on the waste of computing resource.Next,we set up a pyramid Markov reward process to investigate the long-run average mining profits of the honest and dishonest mining pools,respectively.As a by-product,we build one-dimensional Markov reward processes and provide some new interesting interpretation on the Markov chain and the revenue analysis reported in the seminal work by Eyal and Sirer(2014).Note that the pyramid Markov(reward)processes can open up a new avenue in the study of blockchain selfish mining.Thus we hope that the methodology and results developed in this paper shed light on the blockchain selfish mining such that a series of promising research can be developed potentially.
文摘Transposable elements (TEs) are self-replicating, mobile DNA sequences which constitute a significant fraction of eukaryotic genomes. They are generally considered selfish DNA, as their replication and random insertion may have deleterious effects on genome functionalities, although some beneficial effects and evolutionary potential have been recognized. Short interspersed elements (SINEs) are non-autonomous TEs with a modular structure: a small RNA-related head, a body, and a long interspersed element-related tail. Despite their high turnover rate and de novo emergence, the body may retain highly conserved domains (HCDs) shared among divergent SINE families: in metazoans, at least nine HCD-SINEs have been recognized. Data mining on public molecular databases allowed the retrieval of 16 new HCD-SINE families from cnidarian, molluscs, arthropods, and vertebrates. Tracking the ancestry of HCDs on the metazoan phylogeny revealed that some of them date back to the Radiata-Bilateria split. Moreover, phylogenetic and age versus divergence analyses of the most ancient HCDs suggested that long-term vertical inheritance is the rule, with few horizontal transfer events. We suggest that the evolutionary conservation of HCDs may be linked to their potential to serve as recombination hotspots. This indirectly affects host genomes by maintaining active and diverse SINE lineages, whose insertions may impact (either positively or negatively) on the evolution of the genome.