Applications of Wireless Sensor devices are widely used byvarious monitoring sections such as environmental monitoring, industrialsensing, habitat modeling, healthcare and enemy movement detection systems.Researchers ...Applications of Wireless Sensor devices are widely used byvarious monitoring sections such as environmental monitoring, industrialsensing, habitat modeling, healthcare and enemy movement detection systems.Researchers were found that 16 bytes packet size (payload) requires MediaAccess Control (MAC) and globally unique network addresses overheads asmore as the payload itself which is not reasonable in most situations. Theapproach of using a unique address isn’t preferable for most Wireless SensorNetworks (WSNs) applications as well. Based on the mentioned drawbacks,the current work aims to fill the existing gap in the field area by providingtwo strategies. First, name/address solutions that assign unique addresseslocally to clustered topology-based sensor devices, reutilized in a spatialmanner, and reduce name/address size by a noticeable amount of 2.9 basedon conducted simulation test. Second, name/address solutions that assignreutilizing of names/addresses to location-unaware spanning-tree topologyin an event-driven WSNs case (that is providing minimal low latenciesand delivering addressing packet in an efficient manner). Also, to declinethe approach of needing both addresses (MAC and network) separately, itdiscloses how in a spatial manner to reutilize locally unique sensor devicename approach and could be utilized in both contexts and providing anenergy-efficient protocol for location unawareness clustered based WSNs.In comparison, an experimental simulation test performed and given theaddresses solution with less overhead in the header and 62 percent fairpayload efficiency that outperforms 34 percent less effective globally uniqueaddresses. Furthermore, the proposed work provides addresses uniquenessfor network-level without using network-wide Duplicate Address Detection(DAD) algorithm. Consequently, the current study provides a roadmap foraddressing/naming scheme to help researchers in this field of study. In general,some assumptions were taken during the work phases of this study such asnumber of Cluster Head (CH) nodes is 6% of entire sensor nodes, locationunawareness for entire sensor network and 4 bits per node address space whichconsidered as the limitation of the study.展开更多
The first tier of automotive manufacturers has faced to pressures about move,modify,updating tasks for manufacturing resources in production processes from demand response of production order sequence for motor compan...The first tier of automotive manufacturers has faced to pressures about move,modify,updating tasks for manufacturing resources in production processes from demand response of production order sequence for motor company and process innovation purpose for productivity. For meets this requirements,it has to require absolutely lead time to re-wiring of physical interface for production equipment,needs for change existing program and test over again.For prepare this constraints,it needs studying an auto-configuration functions that build for both visibility and flexibility based on the 4M(Man,Machine,Material, Method)group management which is supports from WSN (Wireless Sensor Network)of the open embedded device called M2M(Machine to Machine)and major functions of middleware including point manager for real-time device communication,real-time data management,Standard API (Application Program Interface)and application template management.To be application system to RMS (Reconfigurable Manufacturing System)for rapidly response from various orders and model from motor company that is beginning to establishing the mapping of manufacturing resources of 4M using WSN.展开更多
The first tier of automotive manufacturers has faced to pressures about move, modify, updating tasks for manufacturing resources in production processes from demand response of production order sequence for motor comp...The first tier of automotive manufacturers has faced to pressures about move, modify, updating tasks for manufacturing resources in production processes from demand response of production order sequence for motor company and process innovation purpose for productivity. For meets this requirements, it has to require absolutely lead time to re-wiring of physical interface for production equipment, needs for change existing program and test over again. For prepare this constraints, it needs studying an auto-configuration functions that build for both visibility and flexibility based on the 4M (Man, Machine, Material, Method) group management which is supports from WSN (Wireless Sensor Network) of the open embedded device called M2M (Machine to Machine) and major functions of middleware including point manager for real-time device communication, real-time data management, Standard API (Application Program Interface) and application template management. To be application system to RMS (Reconfigurable Manufacturing System) for rapidly response from various orders and model from motor company that is beginning to establishing the mapping of manufacturing resources of 4M using WSN.展开更多
The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called M...The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called Moving Target Defense(MTD),has been proposed to provide additional selectable measures to complement traditional defense.However,MTD is unable to defeat the sophisticated attacker with fingerprint tracking ability.To overcome this limitation,we go one step beyond and show that the combination of MTD and Deception-based Cyber Defense(DCD)can achieve higher performance than either of them.In particular,we first introduce and formalize a novel attacker model named Scan and Foothold Attack(SFA)based on cyber kill chain.Afterwards,we develop probabilistic models for SFA defenses to provide a deeper analysis of the theoretical effect under different defense strategies.These models quantify attack success probability and the probability that the attacker will be deceived under various conditions,such as the size of address space,and the number of hosts,attack analysis time.Finally,the experimental results show that the actual defense effect of each strategy almost perfectly follows its probabilistic model.Also,the defense strategy of combining address mutation and fingerprint camouflage can achieve a better defense effect than the single address mutation.展开更多
To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development...To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development of mobile network application addressing,analyzes two novel addressing methods in carrier network,and puts forward a 6G endogenous application addressing scheme by integrating some of their essence into the 6G network architecture,combining the new 6G capabilities of computing&network convergence,endogenous intelligence,and communication-sensing integration.This paper further illustrates how that the proposed method works in 6G networks and gives preliminary experimental verification.展开更多
The article mainly studies the application strategy of automatic addressable single-lamp control technology in tunnel lighting.It encompasses an introduction to this technology,an analysis of the tunnel lighting syste...The article mainly studies the application strategy of automatic addressable single-lamp control technology in tunnel lighting.It encompasses an introduction to this technology,an analysis of the tunnel lighting system using automatic addressable single-lamp control technology,and outlines the main development direction for this technology in modern tunnel lighting.The aim is to offer insights that can inform the rational deployment of this technology,thereby enhancing the lighting control effectiveness in modern tunnels and meeting their specific lighting requirements more effectively.展开更多
The address term"老师"is used widely in modem society.This paper mainly studies the general use of the address term"老师".It raised the hypothesis firstly.Then some questionnaires were handed out t...The address term"老师"is used widely in modem society.This paper mainly studies the general use of the address term"老师".It raised the hypothesis firstly.Then some questionnaires were handed out to collect the data for the analysis.According to the statistics,this phenomenon is analyzed and interpreted.It is due to both psychological and social factors.展开更多
Within the scope of human beings, some addressing terms are similar. However, different addressing terms still exist,which are influenced by the background of high context communication or low context communication. A...Within the scope of human beings, some addressing terms are similar. However, different addressing terms still exist,which are influenced by the background of high context communication or low context communication. A good example is that Chinese traditional culture, a typical instance of high context communication, puts much emphasis on etiquette, which is represented in addressing terms as more complex and definite; In western, with the background of low context communication, every individual is more equal and they address each other more generally and much simpler. This paper tries to explore the addressing terms both in Chinese and in English from the perspective of frame theory.展开更多
Obama's election draws the world's attention because of his skin color,so is his inaugural address.The paper analyzes his inaugural address according to the parameter of the three metafunctions from the perspe...Obama's election draws the world's attention because of his skin color,so is his inaugural address.The paper analyzes his inaugural address according to the parameter of the three metafunctions from the perspective of systemic functional grammar:ideational,interpersonal and textual.Accordingly,transitivity system,Mood and modality,and thematic progression in the address are respectively examined.展开更多
As the process of globalization moves on,cross-cultural communication has been a part of people' s daily lives.It is quite important for people to know how to behave properly in many situations.The present study a...As the process of globalization moves on,cross-cultural communication has been a part of people' s daily lives.It is quite important for people to know how to behave properly in many situations.The present study analyses the phenomena of pragmatic failure of address forms.The study may help enhance peoples' awareness on polite address in cross-cultural communi cation and improve their communicative competence.Foreign language teachers can get implications for their teaching methods,paying more attention on cultural teaching.In addition,the author hopes that equal cultural communication and multi-cultural concept can be achieved.展开更多
In discourse analysis,different analyzer uses different ways to analyze discourse.This essay analyzes Gettysburg Address theoretically and practically based on Function Grammar proposed by M.A.K.Halliday.It aims to ex...In discourse analysis,different analyzer uses different ways to analyze discourse.This essay analyzes Gettysburg Address theoretically and practically based on Function Grammar proposed by M.A.K.Halliday.It aims to explore rather than literal meaning of the Address from different language structures by adopting some theories in Functional Grammar.展开更多
Honorific and depreciatory address forms, as an indispensable part of speech communication, occur in all languages. But due to the cultural diversity, different languages require different laws and regularities in the...Honorific and depreciatory address forms, as an indispensable part of speech communication, occur in all languages. But due to the cultural diversity, different languages require different laws and regularities in the choice of them. This paper is firstly to make a contrastive analysis of honorific and depreciatory address forms in Chinese, English and Japanese, then explore the different basic values in Chinese, American and Japanese culture and discuss their influences on honorific and depreciatory address forms in the hope of a better understanding of their pragmatic and cultural differences and an avoidance of miscommunication in intercultural interactions.展开更多
文摘Applications of Wireless Sensor devices are widely used byvarious monitoring sections such as environmental monitoring, industrialsensing, habitat modeling, healthcare and enemy movement detection systems.Researchers were found that 16 bytes packet size (payload) requires MediaAccess Control (MAC) and globally unique network addresses overheads asmore as the payload itself which is not reasonable in most situations. Theapproach of using a unique address isn’t preferable for most Wireless SensorNetworks (WSNs) applications as well. Based on the mentioned drawbacks,the current work aims to fill the existing gap in the field area by providingtwo strategies. First, name/address solutions that assign unique addresseslocally to clustered topology-based sensor devices, reutilized in a spatialmanner, and reduce name/address size by a noticeable amount of 2.9 basedon conducted simulation test. Second, name/address solutions that assignreutilizing of names/addresses to location-unaware spanning-tree topologyin an event-driven WSNs case (that is providing minimal low latenciesand delivering addressing packet in an efficient manner). Also, to declinethe approach of needing both addresses (MAC and network) separately, itdiscloses how in a spatial manner to reutilize locally unique sensor devicename approach and could be utilized in both contexts and providing anenergy-efficient protocol for location unawareness clustered based WSNs.In comparison, an experimental simulation test performed and given theaddresses solution with less overhead in the header and 62 percent fairpayload efficiency that outperforms 34 percent less effective globally uniqueaddresses. Furthermore, the proposed work provides addresses uniquenessfor network-level without using network-wide Duplicate Address Detection(DAD) algorithm. Consequently, the current study provides a roadmap foraddressing/naming scheme to help researchers in this field of study. In general,some assumptions were taken during the work phases of this study such asnumber of Cluster Head (CH) nodes is 6% of entire sensor nodes, locationunawareness for entire sensor network and 4 bits per node address space whichconsidered as the limitation of the study.
基金supported by the Industry Foundation project from the Ministry of Knowledge Economy in the Korean Government.
文摘The first tier of automotive manufacturers has faced to pressures about move,modify,updating tasks for manufacturing resources in production processes from demand response of production order sequence for motor company and process innovation purpose for productivity. For meets this requirements,it has to require absolutely lead time to re-wiring of physical interface for production equipment,needs for change existing program and test over again.For prepare this constraints,it needs studying an auto-configuration functions that build for both visibility and flexibility based on the 4M(Man,Machine,Material, Method)group management which is supports from WSN (Wireless Sensor Network)of the open embedded device called M2M(Machine to Machine)and major functions of middleware including point manager for real-time device communication,real-time data management,Standard API (Application Program Interface)and application template management.To be application system to RMS (Reconfigurable Manufacturing System)for rapidly response from various orders and model from motor company that is beginning to establishing the mapping of manufacturing resources of 4M using WSN.
文摘The first tier of automotive manufacturers has faced to pressures about move, modify, updating tasks for manufacturing resources in production processes from demand response of production order sequence for motor company and process innovation purpose for productivity. For meets this requirements, it has to require absolutely lead time to re-wiring of physical interface for production equipment, needs for change existing program and test over again. For prepare this constraints, it needs studying an auto-configuration functions that build for both visibility and flexibility based on the 4M (Man, Machine, Material, Method) group management which is supports from WSN (Wireless Sensor Network) of the open embedded device called M2M (Machine to Machine) and major functions of middleware including point manager for real-time device communication, real-time data management, Standard API (Application Program Interface) and application template management. To be application system to RMS (Reconfigurable Manufacturing System) for rapidly response from various orders and model from motor company that is beginning to establishing the mapping of manufacturing resources of 4M using WSN.
基金supported by the National Key Research and Development Program of China(No.2016YFB0800601)the Key Program of NSFC-Tongyong Union Foundation(No.U1636209)+1 种基金the National Natural Science Foundation of China(61602358)the Key Research and Development Programs of Shaanxi(No.2019ZDLGY13-04,No.2019ZDLGY13-07)。
文摘The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called Moving Target Defense(MTD),has been proposed to provide additional selectable measures to complement traditional defense.However,MTD is unable to defeat the sophisticated attacker with fingerprint tracking ability.To overcome this limitation,we go one step beyond and show that the combination of MTD and Deception-based Cyber Defense(DCD)can achieve higher performance than either of them.In particular,we first introduce and formalize a novel attacker model named Scan and Foothold Attack(SFA)based on cyber kill chain.Afterwards,we develop probabilistic models for SFA defenses to provide a deeper analysis of the theoretical effect under different defense strategies.These models quantify attack success probability and the probability that the attacker will be deceived under various conditions,such as the size of address space,and the number of hosts,attack analysis time.Finally,the experimental results show that the actual defense effect of each strategy almost perfectly follows its probabilistic model.Also,the defense strategy of combining address mutation and fingerprint camouflage can achieve a better defense effect than the single address mutation.
基金supported by the National Key R&D Program of China(Project Number:2022YFB2902100).
文摘To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development of mobile network application addressing,analyzes two novel addressing methods in carrier network,and puts forward a 6G endogenous application addressing scheme by integrating some of their essence into the 6G network architecture,combining the new 6G capabilities of computing&network convergence,endogenous intelligence,and communication-sensing integration.This paper further illustrates how that the proposed method works in 6G networks and gives preliminary experimental verification.
文摘The article mainly studies the application strategy of automatic addressable single-lamp control technology in tunnel lighting.It encompasses an introduction to this technology,an analysis of the tunnel lighting system using automatic addressable single-lamp control technology,and outlines the main development direction for this technology in modern tunnel lighting.The aim is to offer insights that can inform the rational deployment of this technology,thereby enhancing the lighting control effectiveness in modern tunnels and meeting their specific lighting requirements more effectively.
文摘The address term"老师"is used widely in modem society.This paper mainly studies the general use of the address term"老师".It raised the hypothesis firstly.Then some questionnaires were handed out to collect the data for the analysis.According to the statistics,this phenomenon is analyzed and interpreted.It is due to both psychological and social factors.
文摘Within the scope of human beings, some addressing terms are similar. However, different addressing terms still exist,which are influenced by the background of high context communication or low context communication. A good example is that Chinese traditional culture, a typical instance of high context communication, puts much emphasis on etiquette, which is represented in addressing terms as more complex and definite; In western, with the background of low context communication, every individual is more equal and they address each other more generally and much simpler. This paper tries to explore the addressing terms both in Chinese and in English from the perspective of frame theory.
文摘Obama's election draws the world's attention because of his skin color,so is his inaugural address.The paper analyzes his inaugural address according to the parameter of the three metafunctions from the perspective of systemic functional grammar:ideational,interpersonal and textual.Accordingly,transitivity system,Mood and modality,and thematic progression in the address are respectively examined.
文摘As the process of globalization moves on,cross-cultural communication has been a part of people' s daily lives.It is quite important for people to know how to behave properly in many situations.The present study analyses the phenomena of pragmatic failure of address forms.The study may help enhance peoples' awareness on polite address in cross-cultural communi cation and improve their communicative competence.Foreign language teachers can get implications for their teaching methods,paying more attention on cultural teaching.In addition,the author hopes that equal cultural communication and multi-cultural concept can be achieved.
文摘In discourse analysis,different analyzer uses different ways to analyze discourse.This essay analyzes Gettysburg Address theoretically and practically based on Function Grammar proposed by M.A.K.Halliday.It aims to explore rather than literal meaning of the Address from different language structures by adopting some theories in Functional Grammar.
文摘Honorific and depreciatory address forms, as an indispensable part of speech communication, occur in all languages. But due to the cultural diversity, different languages require different laws and regularities in the choice of them. This paper is firstly to make a contrastive analysis of honorific and depreciatory address forms in Chinese, English and Japanese, then explore the different basic values in Chinese, American and Japanese culture and discuss their influences on honorific and depreciatory address forms in the hope of a better understanding of their pragmatic and cultural differences and an avoidance of miscommunication in intercultural interactions.