The purpose of this research work is to investigate the numerical solutions of the fractional dengue transmission model(FDTM)in the presence of Wolbachia using the stochastic-based Levenberg-Marquardt neural network(L...The purpose of this research work is to investigate the numerical solutions of the fractional dengue transmission model(FDTM)in the presence of Wolbachia using the stochastic-based Levenberg-Marquardt neural network(LM-NN)technique.The fractional dengue transmission model(FDTM)consists of 12 compartments.The human population is divided into four compartments;susceptible humans(S_(h)),exposed humans(E_(h)),infectious humans(I_(h)),and recovered humans(R_(h)).Wolbachia-infected and Wolbachia-uninfected mosquito population is also divided into four compartments:aquatic(eggs,larvae,pupae),susceptible,exposed,and infectious.We investigated three different cases of vertical transmission probability(η),namely when Wolbachia-free mosquitoes persist only(η=0.6),when both types of mosquitoes persist(η=0.8),and when Wolbachia-carrying mosquitoes persist only(η=1).The objective of this study is to investigate the effectiveness of Wolbachia in reducing dengue and presenting the numerical results by using the stochastic structure LM-NN approach with 10 hidden layers of neurons for three different cases of the fractional order derivatives(α=0.4,0.6,0.8).LM-NN approach includes a training,validation,and testing procedure to minimize the mean square error(MSE)values using the reference dataset(obtained by solving the model using the Adams-Bashforth-Moulton method(ABM).The distribution of data is 80% data for training,10% for validation,and,10% for testing purpose)results.A comprehensive investigation is accessible to observe the competence,precision,capacity,and efficiency of the suggested LM-NN approach by executing the MSE,state transitions findings,and regression analysis.The effectiveness of the LM-NN approach for solving the FDTM is demonstrated by the overlap of the findings with trustworthy measures,which achieves a precision of up to 10^(-4).展开更多
Today,with the rapid development of the internet,a large amount of information often accompanies the rapid transmission of disease outbreaks,and increasing numbers of scholars are studying the relationship between inf...Today,with the rapid development of the internet,a large amount of information often accompanies the rapid transmission of disease outbreaks,and increasing numbers of scholars are studying the relationship between information and the disease transmission process using complex networks.In fact,the disease transmission process is very complex.Besides this information,there will often be individual behavioral measures and other factors to consider.Most of the previous research has aimed to establish a two-layer network model to consider the impact of information on the transmission process of disease,rarely divided into information and behavior,respectively.To carry out a more in-depth analysis of the disease transmission process and the intrinsic influencing mechanism,this paper divides information and behavior into two layers and proposes the establishment of a complex network to study the dynamic co-evolution of information diffusion,vaccination behavior,and disease transmission.This is achieved by considering four influential relationships between adjacent layers in multilayer networks.In the information layer,the diffusion process of negative information is described,and the feedback effects of local and global vaccination are considered.In the behavioral layer,an individual's vaccination behavior is described,and the probability of an individual receiving a vaccination is influenced by two factors:the influence of negative information,and the influence of local and global disease severity.In the disease layer,individual susceptibility is considered to be influenced by vaccination behavior.The state transition equations are derived using the micro Markov chain approach(MMCA),and disease prevalence thresholds are obtained.It is demonstrated through simulation experiments that the negative information diffusion is less influenced by local vaccination behavior,and is mainly influenced by global vaccination behavior;vaccination behavior is mainly influenced by local disease conditions,and is less influenced by global disease conditions;the disease transmission threshold increases with the increasing vaccination rate;and the scale of disease transmission increases with the increasing negative information diffusion rate and decreases with the increasing vaccination rate.Finally,it is found that when individual vaccination behavior considers both the influence of negative information and disease,it can increase the disease transmission threshold and reduce the scale of disease transmission.Therefore,we should resist the diffusion of negative information,increase vaccination proportions,and take appropriate protective measures in time.展开更多
Large-scale wireless sensor networks(WSNs)play a critical role in monitoring dangerous scenarios and responding to medical emergencies.However,the inherent instability and error-prone nature of wireless links present ...Large-scale wireless sensor networks(WSNs)play a critical role in monitoring dangerous scenarios and responding to medical emergencies.However,the inherent instability and error-prone nature of wireless links present significant challenges,necessitating efficient data collection and reliable transmission services.This paper addresses the limitations of existing data transmission and recovery protocols by proposing a systematic end-to-end design tailored for medical event-driven cluster-based large-scale WSNs.The primary goal is to enhance the reliability of data collection and transmission services,ensuring a comprehensive and practical approach.Our approach focuses on refining the hop-count-based routing scheme to achieve fairness in forwarding reliability.Additionally,it emphasizes reliable data collection within clusters and establishes robust data transmission over multiple hops.These systematic improvements are designed to optimize the overall performance of the WSN in real-world scenarios.Simulation results of the proposed protocol validate its exceptional performance compared to other prominent data transmission schemes.The evaluation spans varying sensor densities,wireless channel conditions,and packet transmission rates,showcasing the protocol’s superiority in ensuring reliable and efficient data transfer.Our systematic end-to-end design successfully addresses the challenges posed by the instability of wireless links in large-scaleWSNs.By prioritizing fairness,reliability,and efficiency,the proposed protocol demonstrates its efficacy in enhancing data collection and transmission services,thereby offering a valuable contribution to the field of medical event-drivenWSNs.展开更多
The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure ...The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure domains like oil and gas supply,intelligent transportation,power grids,and autonomous agriculture,it is essential to guarantee the confidentiality,integrity,and authenticity of data collected and exchanged.However,the limited resources coupled with the heterogeneity of IoT devices make it inefficient or sometimes infeasible to achieve secure data transmission using traditional cryptographic techniques.Consequently,designing a lightweight secure data transmission scheme is becoming essential.In this article,we propose lightweight secure data transmission(LSDT)scheme for IoT environments.LSDT consists of three phases and utilizes an effective combination of symmetric keys and the Elliptic Curve Menezes-Qu-Vanstone asymmetric key agreement protocol.We design the simulation environment and experiments to evaluate the performance of the LSDT scheme in terms of communication and computation costs.Security and performance analysis indicates that the LSDT scheme is secure,suitable for IoT applications,and performs better in comparison to other related security schemes.展开更多
With the acceleration of urbanization,the demand for water supply and drainage pipe networks has increased significantly.In the planning of urban construction,it is necessary to optimize the design of the water supply...With the acceleration of urbanization,the demand for water supply and drainage pipe networks has increased significantly.In the planning of urban construction,it is necessary to optimize the design of the water supply and drainage system pipe network to effectively save energy while providing residents with more accessible water resources.Therefore,the municipal water supply and drainage system and the water transmission methods should be designed according to the geographical conditions of the city.In this paper,we mainly analyze the design of municipal water supply and drainage systems and the selection of water transmission methods.Besides,the optimization of the water supply and drainage network zoning process and pipe network maintenance is also discussed,so as to provide a reference for municipal water supply and drainage work.展开更多
Blockchain technology has witnessed a burgeoning integration into diverse realms of economic and societal development.Nevertheless,scalability challenges,characterized by diminished broadcast efficiency,heightened com...Blockchain technology has witnessed a burgeoning integration into diverse realms of economic and societal development.Nevertheless,scalability challenges,characterized by diminished broadcast efficiency,heightened communication overhead,and escalated storage costs,have significantly constrained the broad-scale application of blockchain.This paper introduces a novel Encode-and CRT-based Scalability Scheme(ECSS),meticulously refined to enhance both block broadcasting and storage.Primarily,ECSS categorizes nodes into distinct domains,thereby reducing the network diameter and augmenting transmission efficiency.Secondly,ECSS streamlines block transmission through a compact block protocol and robust RS coding,which not only reduces the size of broadcasted blocks but also ensures transmission reliability.Finally,ECSS utilizes the Chinese remainder theorem,designating the block body as the compression target and mapping it to multiple modules to achieve efficient storage,thereby alleviating the storage burdens on nodes.To evaluate ECSS’s performance,we established an experimental platformand conducted comprehensive assessments.Empirical results demonstrate that ECSS attains superior network scalability and stability,reducing communication overhead by an impressive 72% and total storage costs by a substantial 63.6%.展开更多
Due to the limited uplink capability in heterogeneousnetworks (HetNets), the decoupled uplinkand downlink access (DUDA) mode has recently beenproposed to improve the uplink performance. In thispaper, the random discon...Due to the limited uplink capability in heterogeneousnetworks (HetNets), the decoupled uplinkand downlink access (DUDA) mode has recently beenproposed to improve the uplink performance. In thispaper, the random discontinuous transmission (DTX)at user equipment (UE) is adopted to reduce the interferencecorrelation across different time slots. By utilizingstochastic geometry, we analytically derive themean local delay and energy efficiency (EE) of an uplinkHetNet with UE random DTX scheme under theDUDA mode. These expressions are further approximatedas closed forms under reasonable assumptions.Our results reveal that under the DUDA mode, there isan optimal EE with respect to mute probability underthe finite local delay constraint. In addition, with thesame finite mean local delay as under the coupled uplinkand downlink access (CUDA) mode, the HetNetsunder the DUDA mode can achieve a higher EE witha lower mute probability.展开更多
This paper studies the coordinated planning of transmission tasks in the heterogeneous space networks to enable efficient sharing of ground stations cross satellite systems.Specifically,we first formulate the coordina...This paper studies the coordinated planning of transmission tasks in the heterogeneous space networks to enable efficient sharing of ground stations cross satellite systems.Specifically,we first formulate the coordinated planning problem into a mixed integer liner programming(MILP)problem based on time expanded graph.Then,the problem is transferred and reformulated into a consensus optimization framework which can be solved by satellite systems parallelly.With alternating direction method of multipliers(ADMM),a semi-distributed coordinated transmission task planning algorithm is proposed,in which each satellite system plans its own tasks based on local information and limited communication with the coordination center.Simulation results demonstrate that compared with the centralized and fully-distributed methods,the proposed semi-distributed coordinated method can strike a better balance among task complete rate,complexity,and the amount of information required to be exchanged.展开更多
The coronavirus disease 2019(COVID-19)pandemic has greatly damaged human society,but the origins and early transmission patterns of the severe acute respiratory syndrome coronavirus 2(SARS-CoV-2)pathogen remain unclea...The coronavirus disease 2019(COVID-19)pandemic has greatly damaged human society,but the origins and early transmission patterns of the severe acute respiratory syndrome coronavirus 2(SARS-CoV-2)pathogen remain unclear.Here,we reconstructed the transmission networks of SARS-CoV-2 during the first three and six months since its first report based on ancestor-offspring relationships using BANAL-52-referenced mutations.We explored the position(i.e.,root,middle,or tip)of early detected samples in the evolutionary tree of SARS-CoV-2.In total,6799 transmission chains and 1766 transmission networks were reconstructed,with chain lengths ranging from 1-9 nodes.The root node samples of the 1766 transmission networks were from 58 countries or regions and showed no common ancestor,indicating the occurrence of many independent or parallel transmissions of SARS-CoV-2 when first detected(i.e.,all samples were located at the tip position of the evolutionary tree).No root node sample was found in any sample(n=31,all from the Chinese mainland)collected in the first 15 days from 24 December 2019.Results using six-month data or RaTG13-referenced mutation data were similar.The reconstruction method was verified using a simulation approach.Our results suggest that SARS-CoV-2 may have already been spreading independently worldwide before the outbreak of COVID-19 in Wuhan,China.Thus,a comprehensive global survey of human and animal samples is essential to explore the origins of SARS-CoV-2 and its natural reservoirs and hosts.展开更多
In recent years, the impact of information diffusion and individual behavior adoption patterns on epidemic transmission in complex networks has received significant attention. In the immunization behavior adoption pro...In recent years, the impact of information diffusion and individual behavior adoption patterns on epidemic transmission in complex networks has received significant attention. In the immunization behavior adoption process, different individuals often make behavioral decisions in different ways, and it is of good practical importance to study the influence of individual heterogeneity on the behavior adoption process. In this paper, we propose a three-layer coupled model to analyze the process of co-evolution of official information diffusion, immunization behavior adoption and epidemic transmission in multiplex networks, focusing on individual heterogeneity in behavior adoption patterns. Specifically, we investigate the impact of the credibility of social media and the risk sensitivity of the population on behavior adoption in further study of the effect of heterogeneity of behavior adoption on epidemic transmission. Then we use the microscopic Markov chain approach to describe the dynamic process and capture the evolution of the epidemic threshold. Finally, we conduct extensive simulations to prove our findings. Our results suggest that enhancing the credibility of social media can raise the epidemic transmission threshold, making it effective at controlling epidemic transmission during the dynamic process. In addition, improving an individuals' risk sensitivity, and thus their taking effective protective measures, can also reduce the number of infected individuals and delay the epidemic outbreak. Our study explores the role of individual heterogeneity in behavior adoption in real networks, more clearly models the effect of the credibility of social media and risk sensitivity of the population on the epidemic transmission dynamic, and provides a useful reference for managers to formulate epidemic control and prevention policies.展开更多
The transmission capacity of gas pipeline networks should be calculated and allocated to deal with the capacity booking with shippers. Technical capacities, which depend on the gas flow distribution at routes or inter...The transmission capacity of gas pipeline networks should be calculated and allocated to deal with the capacity booking with shippers. Technical capacities, which depend on the gas flow distribution at routes or interchange points, are calculated with a multiobjective optimization model and form a Pareto solution set in the entry/exit or point-to-point regime. Then, the commercial capacities, which can be directly applied in capacity booking, are calculated with single-objective optimization models that are transformed from the above multiobjective model based on three allocation rules and the demand of shippers.Next, peak-shaving capacities, which are daily oversupply or overdelivery amounts at inlets or deliveries,are calculated with two-stage transient optimization models. Considering the hydraulic process of a pipeline network and operating schemes of compressor stations, all the above models are mixed-integer nonlinear programming problems. Finally, a case study is made to demonstrate the ability of the models.展开更多
Mobile Industrial Internet of Things(IIoT)applications have achieved the explosive growth in recent years.The mobile IIoT has flourished and become the backbone of the industry,laying a solid foundation for the interc...Mobile Industrial Internet of Things(IIoT)applications have achieved the explosive growth in recent years.The mobile IIoT has flourished and become the backbone of the industry,laying a solid foundation for the interconnection of all things.The variety of application scenarios has brought serious challenges to mobile IIoT networks,which face complex and changeable communication environments.Ensuring data secure transmission is critical for mobile IIoT networks.This paper investigates the data secure transmission performance prediction of mobile IIoT networks.To cut down computational complexity,we propose a data secure transmission scheme employing Transmit Antenna Selection(TAS).The novel secrecy performance expressions are first derived.Then,to realize real-time secrecy analysis,we design an improved Convolutional Neural Network(CNN)model,and propose an intelligent data secure transmission performance prediction algorithm.For mobile signals,the important features may be removed by the pooling layers.This will lead to negative effects on the secrecy performance prediction.A novel nine-layer improved CNN model is designed.Out of the input and output layers,it removes the pooling layer and contains six convolution layers.Elman,Back-Propagation(BP)and LeNet methods are employed to compare with the proposed algorithm.Through simulation analysis,good prediction accuracy is achieved by the CNN algorithm.The prediction accuracy obtains a 59%increase.展开更多
As the Internet of Things(IoT)advances,machine-type devices are densely deployed and massive networks such as ultra-dense networks(UDNs)are formed.Various devices attend to the network to transmit data using machine-t...As the Internet of Things(IoT)advances,machine-type devices are densely deployed and massive networks such as ultra-dense networks(UDNs)are formed.Various devices attend to the network to transmit data using machine-type communication(MTC),whereby numerous,various are generated.MTC devices generally have resource constraints and use wireless communication.In this kind of network,data aggregation is a key function to provide transmission efficiency.It can reduce the number of transmitted data in the network,and this leads to energy saving and reducing transmission delays.In order to effectively operate data aggregation in UDNs,it is important to select an aggregation point well.The total number of transmitted data may vary,depending on the aggregation point to which the data are delivered.Therefore,in this paper,we propose a novel data aggregation scheme to select the appropriate aggregation point and describe the data transmission method applying the proposed aggregation scheme.In addition,we evaluate the proposed scheme with extensive computer simulations.Better performances in the proposed scheme are achieved compared to the conventional approach.展开更多
Opinion leaders play a critical role in network public opinion transmission, their perspectives can shape public opinion and influence policy formulation and implementation. The paper is based on SINA micro-blog, by s...Opinion leaders play a critical role in network public opinion transmission, their perspectives can shape public opinion and influence policy formulation and implementation. The paper is based on SINA micro-blog, by structural equation model, as Fudan Poisoning Event for example, On the basis of in-depth analysis of opinion leaders effect on network public opinion transmission characteristics, Explore the opinion leaders on the influence of network public opinion transmission mechanism, in order to better play a role of opinion leader's guidance of public opinion.展开更多
From the viewpoint of energy saving and improving transmission efficiency, the ZL50E wheel loader is taken as the study object. And the system model is analyzed based on the transmission system of the construction veh...From the viewpoint of energy saving and improving transmission efficiency, the ZL50E wheel loader is taken as the study object. And the system model is analyzed based on the transmission system of the construction vehicle. A new four-parameter shift schedule is presented, which can keep the torque converter working in the high efficiency area. The control algorithm based on the Elman recursive neural network is applied, and four-parameter control system is developed which is based on industrial computer. The system is used to collect data accurately and control 4D180 power-shift gearbox of ZL50E wheel loader shift timely. An experiment is done on automatic transmission test-bed, and the result indicates that the control system could reliably and safely work and improve the efficiency of hydraulic torque converter. Four-parameter shift strategy that takes into account the power consuming of the working pump has important operating significance and reflects the actual working status of construction vehicle.展开更多
Transmission network planning (TNP) is a large-scale, complex, with more non-linear discrete variables and the multi-objective constrained optimization problem. In the optimization process, the line investment, networ...Transmission network planning (TNP) is a large-scale, complex, with more non-linear discrete variables and the multi-objective constrained optimization problem. In the optimization process, the line investment, network reliability and the network loss are the main objective of transmission network planning. Combined with set pair analysis (SPA), particle swarm optimization (PSO), neural network (NN), a hybrid particle swarm optimization model was established with neural network and set pair analysis for transmission network planning (HPNS). Firstly, the contact degree of set pair analysis was introduced, the traditional goal set was converted into the collection of the three indicators including the identity degree, difference agree and contrary degree. On this bases, using shi(H), the three objective optimization problem was converted into single objective optimization problem. Secondly, using the fast and efficient search capabilities of PSO, the transmission network planning model based on set pair analysis was optimized. In the process of optimization, by improving the BP neural network constantly training so that the value of the fitness function of PSO becomes smaller in order to obtain the optimization program fitting the three objectives better. Finally, compared HPNS with PSO algorithm and the classic genetic algorithm, HPNS increased about 23% efficiency than THA, raised about 3.7% than PSO and improved about 2.96% than GA.展开更多
The problem of guaranteed cost active fault-tolerant controller (AFTC) design for networked control systems (NCSs) with both packet dropout and transmission delay is studied in this paper. Considering the packet d...The problem of guaranteed cost active fault-tolerant controller (AFTC) design for networked control systems (NCSs) with both packet dropout and transmission delay is studied in this paper. Considering the packet dropout and transmission delay, a piecewise constant controller is adopted. With a guaranteed cost function, optimal controllers whose number is equal to the number of actuators are designed, and the design process is formulated as a convex optimal problem that can be solved by existing software. The control strategy is proposed as follows: when actuator failures appear, the fault detection and isolation unit sends out the information to the controller choosing strategy, and then the optimal stabilizing controller with the smallest guaranteed cost value is chosen. Two illustrative examples are given to demonstrate the effectiveness of the proposed approach. By comparing with the existing methods, it can be seen that our method has a better performance.展开更多
The delay tolerant network(DTN) is an emerging concept, which is used to describe the network, where the communication link may disrupt frequently. To cope with this problem, the DTN uses the store-carry-forward(SCF) ...The delay tolerant network(DTN) is an emerging concept, which is used to describe the network, where the communication link may disrupt frequently. To cope with this problem, the DTN uses the store-carry-forward(SCF) transmission mode. With this policy, the messages in the DTN are transmitted based on the nodes' cooperation. However, the nodes may be selfish, so the source has to pay certain rewards for others to get their help. This paper studies the optimal incentive policy to maximize the source's final utility. First, it models the message spreading process as several ordinary differential equations(ODEs) based on the meanfield approximation. Then, it mathematically gets the optimal policy and explores the structure of the policy. Finally, it checks the accuracy of the ODEs model and shows the advantages of the optimal policy through simulation and theoretical results respectively.展开更多
Recently, network coding has been applied to the loss recovery of reliable broadcast transmission in wireless networks. Since it was proved that fi nding the optimal set of lost packets for XOR-ing is a complex NP-com...Recently, network coding has been applied to the loss recovery of reliable broadcast transmission in wireless networks. Since it was proved that fi nding the optimal set of lost packets for XOR-ing is a complex NP-complete problem, the available time-based retransmission scheme and its enhanced retransmission scheme have exponential computational complexity and thus are not scalable to large networks. In this paper, we present an efficient heuristic scheme based on hypergraph coloring and also its enhanced heuristic scheme to improve the transmission efficiency. Basically, our proposed schemes fi rst create a hypergraph according to the packet-loss matrix. Then our schemes solve the problem of generating XORed packets by coloring the edges of hypergraph. Extensive simulation results demonstrate that, the heuristic scheme based on hypergraph coloring and its enhanced scheme can achieve almost the same transmission efficiency as the available ones, but have much lower computational complexity, which is very important for the wireless devices without high computation capacity.展开更多
文摘The purpose of this research work is to investigate the numerical solutions of the fractional dengue transmission model(FDTM)in the presence of Wolbachia using the stochastic-based Levenberg-Marquardt neural network(LM-NN)technique.The fractional dengue transmission model(FDTM)consists of 12 compartments.The human population is divided into four compartments;susceptible humans(S_(h)),exposed humans(E_(h)),infectious humans(I_(h)),and recovered humans(R_(h)).Wolbachia-infected and Wolbachia-uninfected mosquito population is also divided into four compartments:aquatic(eggs,larvae,pupae),susceptible,exposed,and infectious.We investigated three different cases of vertical transmission probability(η),namely when Wolbachia-free mosquitoes persist only(η=0.6),when both types of mosquitoes persist(η=0.8),and when Wolbachia-carrying mosquitoes persist only(η=1).The objective of this study is to investigate the effectiveness of Wolbachia in reducing dengue and presenting the numerical results by using the stochastic structure LM-NN approach with 10 hidden layers of neurons for three different cases of the fractional order derivatives(α=0.4,0.6,0.8).LM-NN approach includes a training,validation,and testing procedure to minimize the mean square error(MSE)values using the reference dataset(obtained by solving the model using the Adams-Bashforth-Moulton method(ABM).The distribution of data is 80% data for training,10% for validation,and,10% for testing purpose)results.A comprehensive investigation is accessible to observe the competence,precision,capacity,and efficiency of the suggested LM-NN approach by executing the MSE,state transitions findings,and regression analysis.The effectiveness of the LM-NN approach for solving the FDTM is demonstrated by the overlap of the findings with trustworthy measures,which achieves a precision of up to 10^(-4).
基金Project supported by the National Natural Science Foundation of China (Grant Nos. 72174121 and 71774111)the Program for Professor of Special Appointment (Eastern Scholar) at Shanghai Institutions of Higher Learningthe Natural Science Foundation of Shanghai (Grant No. 21ZR1444100)
文摘Today,with the rapid development of the internet,a large amount of information often accompanies the rapid transmission of disease outbreaks,and increasing numbers of scholars are studying the relationship between information and the disease transmission process using complex networks.In fact,the disease transmission process is very complex.Besides this information,there will often be individual behavioral measures and other factors to consider.Most of the previous research has aimed to establish a two-layer network model to consider the impact of information on the transmission process of disease,rarely divided into information and behavior,respectively.To carry out a more in-depth analysis of the disease transmission process and the intrinsic influencing mechanism,this paper divides information and behavior into two layers and proposes the establishment of a complex network to study the dynamic co-evolution of information diffusion,vaccination behavior,and disease transmission.This is achieved by considering four influential relationships between adjacent layers in multilayer networks.In the information layer,the diffusion process of negative information is described,and the feedback effects of local and global vaccination are considered.In the behavioral layer,an individual's vaccination behavior is described,and the probability of an individual receiving a vaccination is influenced by two factors:the influence of negative information,and the influence of local and global disease severity.In the disease layer,individual susceptibility is considered to be influenced by vaccination behavior.The state transition equations are derived using the micro Markov chain approach(MMCA),and disease prevalence thresholds are obtained.It is demonstrated through simulation experiments that the negative information diffusion is less influenced by local vaccination behavior,and is mainly influenced by global vaccination behavior;vaccination behavior is mainly influenced by local disease conditions,and is less influenced by global disease conditions;the disease transmission threshold increases with the increasing vaccination rate;and the scale of disease transmission increases with the increasing negative information diffusion rate and decreases with the increasing vaccination rate.Finally,it is found that when individual vaccination behavior considers both the influence of negative information and disease,it can increase the disease transmission threshold and reduce the scale of disease transmission.Therefore,we should resist the diffusion of negative information,increase vaccination proportions,and take appropriate protective measures in time.
文摘Large-scale wireless sensor networks(WSNs)play a critical role in monitoring dangerous scenarios and responding to medical emergencies.However,the inherent instability and error-prone nature of wireless links present significant challenges,necessitating efficient data collection and reliable transmission services.This paper addresses the limitations of existing data transmission and recovery protocols by proposing a systematic end-to-end design tailored for medical event-driven cluster-based large-scale WSNs.The primary goal is to enhance the reliability of data collection and transmission services,ensuring a comprehensive and practical approach.Our approach focuses on refining the hop-count-based routing scheme to achieve fairness in forwarding reliability.Additionally,it emphasizes reliable data collection within clusters and establishes robust data transmission over multiple hops.These systematic improvements are designed to optimize the overall performance of the WSN in real-world scenarios.Simulation results of the proposed protocol validate its exceptional performance compared to other prominent data transmission schemes.The evaluation spans varying sensor densities,wireless channel conditions,and packet transmission rates,showcasing the protocol’s superiority in ensuring reliable and efficient data transfer.Our systematic end-to-end design successfully addresses the challenges posed by the instability of wireless links in large-scaleWSNs.By prioritizing fairness,reliability,and efficiency,the proposed protocol demonstrates its efficacy in enhancing data collection and transmission services,thereby offering a valuable contribution to the field of medical event-drivenWSNs.
基金support of the Interdisciplinary Research Center for Intelligent Secure Systems(IRC-ISS)Internal Fund Grant#INSS2202.
文摘The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure domains like oil and gas supply,intelligent transportation,power grids,and autonomous agriculture,it is essential to guarantee the confidentiality,integrity,and authenticity of data collected and exchanged.However,the limited resources coupled with the heterogeneity of IoT devices make it inefficient or sometimes infeasible to achieve secure data transmission using traditional cryptographic techniques.Consequently,designing a lightweight secure data transmission scheme is becoming essential.In this article,we propose lightweight secure data transmission(LSDT)scheme for IoT environments.LSDT consists of three phases and utilizes an effective combination of symmetric keys and the Elliptic Curve Menezes-Qu-Vanstone asymmetric key agreement protocol.We design the simulation environment and experiments to evaluate the performance of the LSDT scheme in terms of communication and computation costs.Security and performance analysis indicates that the LSDT scheme is secure,suitable for IoT applications,and performs better in comparison to other related security schemes.
文摘With the acceleration of urbanization,the demand for water supply and drainage pipe networks has increased significantly.In the planning of urban construction,it is necessary to optimize the design of the water supply and drainage system pipe network to effectively save energy while providing residents with more accessible water resources.Therefore,the municipal water supply and drainage system and the water transmission methods should be designed according to the geographical conditions of the city.In this paper,we mainly analyze the design of municipal water supply and drainage systems and the selection of water transmission methods.Besides,the optimization of the water supply and drainage network zoning process and pipe network maintenance is also discussed,so as to provide a reference for municipal water supply and drainage work.
文摘Blockchain technology has witnessed a burgeoning integration into diverse realms of economic and societal development.Nevertheless,scalability challenges,characterized by diminished broadcast efficiency,heightened communication overhead,and escalated storage costs,have significantly constrained the broad-scale application of blockchain.This paper introduces a novel Encode-and CRT-based Scalability Scheme(ECSS),meticulously refined to enhance both block broadcasting and storage.Primarily,ECSS categorizes nodes into distinct domains,thereby reducing the network diameter and augmenting transmission efficiency.Secondly,ECSS streamlines block transmission through a compact block protocol and robust RS coding,which not only reduces the size of broadcasted blocks but also ensures transmission reliability.Finally,ECSS utilizes the Chinese remainder theorem,designating the block body as the compression target and mapping it to multiple modules to achieve efficient storage,thereby alleviating the storage burdens on nodes.To evaluate ECSS’s performance,we established an experimental platformand conducted comprehensive assessments.Empirical results demonstrate that ECSS attains superior network scalability and stability,reducing communication overhead by an impressive 72% and total storage costs by a substantial 63.6%.
基金supported in part by the National Key R&D Program of China under Grant 2021YFB 2900304the Shenzhen Science and Technology Program under Grants KQTD20190929172545139 and ZDSYS20210623091808025.
文摘Due to the limited uplink capability in heterogeneousnetworks (HetNets), the decoupled uplinkand downlink access (DUDA) mode has recently beenproposed to improve the uplink performance. In thispaper, the random discontinuous transmission (DTX)at user equipment (UE) is adopted to reduce the interferencecorrelation across different time slots. By utilizingstochastic geometry, we analytically derive themean local delay and energy efficiency (EE) of an uplinkHetNet with UE random DTX scheme under theDUDA mode. These expressions are further approximatedas closed forms under reasonable assumptions.Our results reveal that under the DUDA mode, there isan optimal EE with respect to mute probability underthe finite local delay constraint. In addition, with thesame finite mean local delay as under the coupled uplinkand downlink access (CUDA) mode, the HetNetsunder the DUDA mode can achieve a higher EE witha lower mute probability.
基金supported in part by the NSF China under Grant(61701365,61801365,62001347)in part by Natural Science Foundation of Shaanxi Province(2020JQ-686)+4 种基金in part by the China Postdoctoral Science Foundation under Grant(2018M643581,2019TQ0210,2019TQ0241,2020M673344)in part by Young Talent fund of University Association for Science and Technology in Shaanxi,China(20200112)in part by Key Research and Development Program in Shaanxi Province of China(2021GY066)in part by Postdoctoral Foundation in Shaanxi Province of China(2018BSHEDZZ47)the Fundamental Research Funds for the Central Universities。
文摘This paper studies the coordinated planning of transmission tasks in the heterogeneous space networks to enable efficient sharing of ground stations cross satellite systems.Specifically,we first formulate the coordinated planning problem into a mixed integer liner programming(MILP)problem based on time expanded graph.Then,the problem is transferred and reformulated into a consensus optimization framework which can be solved by satellite systems parallelly.With alternating direction method of multipliers(ADMM),a semi-distributed coordinated transmission task planning algorithm is proposed,in which each satellite system plans its own tasks based on local information and limited communication with the coordination center.Simulation results demonstrate that compared with the centralized and fully-distributed methods,the proposed semi-distributed coordinated method can strike a better balance among task complete rate,complexity,and the amount of information required to be exchanged.
基金supported by the Ministry of Science and Technology of the People’s Republic of China(2021YFC0863400)Institute of Zoology,Chinese Academy of Sciences(E0517111,E122G611)。
文摘The coronavirus disease 2019(COVID-19)pandemic has greatly damaged human society,but the origins and early transmission patterns of the severe acute respiratory syndrome coronavirus 2(SARS-CoV-2)pathogen remain unclear.Here,we reconstructed the transmission networks of SARS-CoV-2 during the first three and six months since its first report based on ancestor-offspring relationships using BANAL-52-referenced mutations.We explored the position(i.e.,root,middle,or tip)of early detected samples in the evolutionary tree of SARS-CoV-2.In total,6799 transmission chains and 1766 transmission networks were reconstructed,with chain lengths ranging from 1-9 nodes.The root node samples of the 1766 transmission networks were from 58 countries or regions and showed no common ancestor,indicating the occurrence of many independent or parallel transmissions of SARS-CoV-2 when first detected(i.e.,all samples were located at the tip position of the evolutionary tree).No root node sample was found in any sample(n=31,all from the Chinese mainland)collected in the first 15 days from 24 December 2019.Results using six-month data or RaTG13-referenced mutation data were similar.The reconstruction method was verified using a simulation approach.Our results suggest that SARS-CoV-2 may have already been spreading independently worldwide before the outbreak of COVID-19 in Wuhan,China.Thus,a comprehensive global survey of human and animal samples is essential to explore the origins of SARS-CoV-2 and its natural reservoirs and hosts.
基金Project supported by the National Natural Science Foundation of China (Grant Nos. 72174121 and 71774111)the Program for Professor of Special Appointment (Eastern Scholar) at Shanghai Institutions of Higher Learningthe Natural Science Foundation of Shanghai (Grant No. 21ZR1444100)。
文摘In recent years, the impact of information diffusion and individual behavior adoption patterns on epidemic transmission in complex networks has received significant attention. In the immunization behavior adoption process, different individuals often make behavioral decisions in different ways, and it is of good practical importance to study the influence of individual heterogeneity on the behavior adoption process. In this paper, we propose a three-layer coupled model to analyze the process of co-evolution of official information diffusion, immunization behavior adoption and epidemic transmission in multiplex networks, focusing on individual heterogeneity in behavior adoption patterns. Specifically, we investigate the impact of the credibility of social media and the risk sensitivity of the population on behavior adoption in further study of the effect of heterogeneity of behavior adoption on epidemic transmission. Then we use the microscopic Markov chain approach to describe the dynamic process and capture the evolution of the epidemic threshold. Finally, we conduct extensive simulations to prove our findings. Our results suggest that enhancing the credibility of social media can raise the epidemic transmission threshold, making it effective at controlling epidemic transmission during the dynamic process. In addition, improving an individuals' risk sensitivity, and thus their taking effective protective measures, can also reduce the number of infected individuals and delay the epidemic outbreak. Our study explores the role of individual heterogeneity in behavior adoption in real networks, more clearly models the effect of the credibility of social media and risk sensitivity of the population on the epidemic transmission dynamic, and provides a useful reference for managers to formulate epidemic control and prevention policies.
文摘The transmission capacity of gas pipeline networks should be calculated and allocated to deal with the capacity booking with shippers. Technical capacities, which depend on the gas flow distribution at routes or interchange points, are calculated with a multiobjective optimization model and form a Pareto solution set in the entry/exit or point-to-point regime. Then, the commercial capacities, which can be directly applied in capacity booking, are calculated with single-objective optimization models that are transformed from the above multiobjective model based on three allocation rules and the demand of shippers.Next, peak-shaving capacities, which are daily oversupply or overdelivery amounts at inlets or deliveries,are calculated with two-stage transient optimization models. Considering the hydraulic process of a pipeline network and operating schemes of compressor stations, all the above models are mixed-integer nonlinear programming problems. Finally, a case study is made to demonstrate the ability of the models.
基金supported by the National Natural Science Foundation of China(No.62201313)the Opening Foundation of Fujian Key Laboratory of Sensing and Computing for Smart Cities(Xiamen University)(No.SCSCKF202101)the Open Project of Fujian Provincial Key Laboratory of Information Processing and Intelligent Control(Minjiang University)(No.MJUKF-IPIC202206).
文摘Mobile Industrial Internet of Things(IIoT)applications have achieved the explosive growth in recent years.The mobile IIoT has flourished and become the backbone of the industry,laying a solid foundation for the interconnection of all things.The variety of application scenarios has brought serious challenges to mobile IIoT networks,which face complex and changeable communication environments.Ensuring data secure transmission is critical for mobile IIoT networks.This paper investigates the data secure transmission performance prediction of mobile IIoT networks.To cut down computational complexity,we propose a data secure transmission scheme employing Transmit Antenna Selection(TAS).The novel secrecy performance expressions are first derived.Then,to realize real-time secrecy analysis,we design an improved Convolutional Neural Network(CNN)model,and propose an intelligent data secure transmission performance prediction algorithm.For mobile signals,the important features may be removed by the pooling layers.This will lead to negative effects on the secrecy performance prediction.A novel nine-layer improved CNN model is designed.Out of the input and output layers,it removes the pooling layer and contains six convolution layers.Elman,Back-Propagation(BP)and LeNet methods are employed to compare with the proposed algorithm.Through simulation analysis,good prediction accuracy is achieved by the CNN algorithm.The prediction accuracy obtains a 59%increase.
基金supported by the National Research Foundation of Korea(NRF)grant funded by the Korea Government(MSIT)(No.2021R1C1C1013133)this work was supported by the Soonchunhyang University Research Fund(No.20210442).
文摘As the Internet of Things(IoT)advances,machine-type devices are densely deployed and massive networks such as ultra-dense networks(UDNs)are formed.Various devices attend to the network to transmit data using machine-type communication(MTC),whereby numerous,various are generated.MTC devices generally have resource constraints and use wireless communication.In this kind of network,data aggregation is a key function to provide transmission efficiency.It can reduce the number of transmitted data in the network,and this leads to energy saving and reducing transmission delays.In order to effectively operate data aggregation in UDNs,it is important to select an aggregation point well.The total number of transmitted data may vary,depending on the aggregation point to which the data are delivered.Therefore,in this paper,we propose a novel data aggregation scheme to select the appropriate aggregation point and describe the data transmission method applying the proposed aggregation scheme.In addition,we evaluate the proposed scheme with extensive computer simulations.Better performances in the proposed scheme are achieved compared to the conventional approach.
文摘Opinion leaders play a critical role in network public opinion transmission, their perspectives can shape public opinion and influence policy formulation and implementation. The paper is based on SINA micro-blog, by structural equation model, as Fudan Poisoning Event for example, On the basis of in-depth analysis of opinion leaders effect on network public opinion transmission characteristics, Explore the opinion leaders on the influence of network public opinion transmission mechanism, in order to better play a role of opinion leader's guidance of public opinion.
基金supported by Research Fund for Doctoral Program of Higher Education of China (No.20020183003)
文摘From the viewpoint of energy saving and improving transmission efficiency, the ZL50E wheel loader is taken as the study object. And the system model is analyzed based on the transmission system of the construction vehicle. A new four-parameter shift schedule is presented, which can keep the torque converter working in the high efficiency area. The control algorithm based on the Elman recursive neural network is applied, and four-parameter control system is developed which is based on industrial computer. The system is used to collect data accurately and control 4D180 power-shift gearbox of ZL50E wheel loader shift timely. An experiment is done on automatic transmission test-bed, and the result indicates that the control system could reliably and safely work and improve the efficiency of hydraulic torque converter. Four-parameter shift strategy that takes into account the power consuming of the working pump has important operating significance and reflects the actual working status of construction vehicle.
基金Projects(70373017 70572090) supported by the National Natural Science Foundation of China
文摘Transmission network planning (TNP) is a large-scale, complex, with more non-linear discrete variables and the multi-objective constrained optimization problem. In the optimization process, the line investment, network reliability and the network loss are the main objective of transmission network planning. Combined with set pair analysis (SPA), particle swarm optimization (PSO), neural network (NN), a hybrid particle swarm optimization model was established with neural network and set pair analysis for transmission network planning (HPNS). Firstly, the contact degree of set pair analysis was introduced, the traditional goal set was converted into the collection of the three indicators including the identity degree, difference agree and contrary degree. On this bases, using shi(H), the three objective optimization problem was converted into single objective optimization problem. Secondly, using the fast and efficient search capabilities of PSO, the transmission network planning model based on set pair analysis was optimized. In the process of optimization, by improving the BP neural network constantly training so that the value of the fitness function of PSO becomes smaller in order to obtain the optimization program fitting the three objectives better. Finally, compared HPNS with PSO algorithm and the classic genetic algorithm, HPNS increased about 23% efficiency than THA, raised about 3.7% than PSO and improved about 2.96% than GA.
基金supported by National Outstanding Youth Foundation (No. 60525303)National Natural Science Foundation of China(No. 60704009)+1 种基金Key Project for Natural Science Research of Hebei Education Department (No. ZD200908)the Doctor Fund of YanShan University (No. B203)
文摘The problem of guaranteed cost active fault-tolerant controller (AFTC) design for networked control systems (NCSs) with both packet dropout and transmission delay is studied in this paper. Considering the packet dropout and transmission delay, a piecewise constant controller is adopted. With a guaranteed cost function, optimal controllers whose number is equal to the number of actuators are designed, and the design process is formulated as a convex optimal problem that can be solved by existing software. The control strategy is proposed as follows: when actuator failures appear, the fault detection and isolation unit sends out the information to the controller choosing strategy, and then the optimal stabilizing controller with the smallest guaranteed cost value is chosen. Two illustrative examples are given to demonstrate the effectiveness of the proposed approach. By comparing with the existing methods, it can be seen that our method has a better performance.
基金supported by the National Nature Science Foundation of China(61871388)
文摘The delay tolerant network(DTN) is an emerging concept, which is used to describe the network, where the communication link may disrupt frequently. To cope with this problem, the DTN uses the store-carry-forward(SCF) transmission mode. With this policy, the messages in the DTN are transmitted based on the nodes' cooperation. However, the nodes may be selfish, so the source has to pay certain rewards for others to get their help. This paper studies the optimal incentive policy to maximize the source's final utility. First, it models the message spreading process as several ordinary differential equations(ODEs) based on the meanfield approximation. Then, it mathematically gets the optimal policy and explores the structure of the policy. Finally, it checks the accuracy of the ODEs model and shows the advantages of the optimal policy through simulation and theoretical results respectively.
基金supported by the National Natural Science Foundation of China (60502046, 60573034)863 Foundation of China (2007AA01Z215)
文摘Recently, network coding has been applied to the loss recovery of reliable broadcast transmission in wireless networks. Since it was proved that fi nding the optimal set of lost packets for XOR-ing is a complex NP-complete problem, the available time-based retransmission scheme and its enhanced retransmission scheme have exponential computational complexity and thus are not scalable to large networks. In this paper, we present an efficient heuristic scheme based on hypergraph coloring and also its enhanced heuristic scheme to improve the transmission efficiency. Basically, our proposed schemes fi rst create a hypergraph according to the packet-loss matrix. Then our schemes solve the problem of generating XORed packets by coloring the edges of hypergraph. Extensive simulation results demonstrate that, the heuristic scheme based on hypergraph coloring and its enhanced scheme can achieve almost the same transmission efficiency as the available ones, but have much lower computational complexity, which is very important for the wireless devices without high computation capacity.