In an era where digital technology is paramount, higher education institutions like the University of Zambia (UNZA) are employing advanced computer networks to enhance their operational capacity and offer cutting-edge...In an era where digital technology is paramount, higher education institutions like the University of Zambia (UNZA) are employing advanced computer networks to enhance their operational capacity and offer cutting-edge services to their academic fraternity. Spanning across the Great East Road campus, UNZA has established one of the most extensive computer networks in Zambia, serving a burgeoning community of over 20,000 active users through a Metropolitan Area Network (MAN). However, as the digital landscape continues to evolve, it is besieged with burgeoning challenges that threaten the very fabric of network integrity—cyber security threats and the imperatives of maintaining high Quality of Service (QoS). In an effort to mitigate these threats and ensure network efficiency, the development of a mobile application to monitor temperatures in the server room was imperative. According to L. Wei, X. Zeng, and T. Shen, the use of wireless sensory networks to monitor the temperature of train switchgear contact points represents a cost-effective solution. The system is based on wireless communication technology and is detailed in their paper, “A wireless solution for train switchgear contact temperature monitoring and alarming system based on wireless communication technology”, published in the International Journal of Communications, Network and System Sciences, vol. 8, no. 4, pp. 79-87, 2015 [1]. Therefore, in this study, a mobile application technology was explored for monitoring of temperatures in the server room in order to aid Cisco device performance. Additionally, this paper also explores the hardening of Cisco device security and QoS which are the cornerstones of this study.展开更多
Composite service provision in mobile ad hoc networks encounters great challenges and its success rate is not satisfactory because the nodes' locations are dynamic and the nodes maybe unavailable at any time.Compo...Composite service provision in mobile ad hoc networks encounters great challenges and its success rate is not satisfactory because the nodes' locations are dynamic and the nodes maybe unavailable at any time.Composite service is built through the service composition.In mobile ad hoc networks,the factors influencing the success rate of service composition are mainly the number of nodes and the time spent for the composition.The node's failure probability is proportional to the length of time the node exist in the networks.In order to improve the success rate of service composition,we take several measures.First,we split the service requirement into several segments and cluster the nodes,so that the nodes' waiting time for service composition can be reduced.Second,we propose a new node model of "one node contains multiple services" in mobile ad hoc networks.Using this type of nodes model,the number of nodes required for service composition can be reduced.These means can increase the success rate of service composition.展开更多
A network model is proposed to support service differentiation for mobile Ad Hoc networks by combining a fully distributed admission control approach and the DIFS based differentiation mechanism of IEEE802.11. It can ...A network model is proposed to support service differentiation for mobile Ad Hoc networks by combining a fully distributed admission control approach and the DIFS based differentiation mechanism of IEEE802.11. It can provide different kinds of QoS (Quality of Service) for various applications. Admission controllers determine a committed bandwidth based on the reserved bandwidth of flows and the source utilization of networks. Packets are marked when entering into networks by markers according to the committed rate. By the mark in the packet header, intermediate nodes handle the received packets in different manners to provide applications with the QoS corresponding to the pre-negotiated profile. Extensive simulation experiments showed that the proposed mechanism can provide QoS guarantee to assured service traffic and increase the channel utilization of networks.展开更多
Network Coding is a relatively new forwarding paradigm where intermediate nodes perform a store, code, and forward operation on incoming packets. Traditional forwarding approaches, which employed a store and forward o...Network Coding is a relatively new forwarding paradigm where intermediate nodes perform a store, code, and forward operation on incoming packets. Traditional forwarding approaches, which employed a store and forward operation, have not been able to approach the limit of the max-flow min-cut throughput wherein sources transmitting information over bottleneck links have to compete for access to these links. With Network Coding, multiple sources are now able to transmit packets over bottleneck links simultaneously, achieving the max-flow min-cut through-put and increasing network capacity. While the majority of the contemporary literature has focused on the performance of Network Coding from a capacity perspective, the aim of this research has taken a new direction focusing on two Quality of Service metrics, e.g., Packet Delivery Ratio (PDR) and Latency, in conjunction with Network Coding protocols in Mobile Ad Hoc Networks (MANETs). Simulations are performed on static and mobile environments to determine a Quality of Service baseline comparison between Network Coding protocols and traditional ad hoc routing protocols. The results show that the Random Linear Network Coding protocol has the lowest Latency and Dynamic Source Routing protocol has the highest PDR in the static scenarios, and show that the Random Linear Network Coding protocol has the best cumulative performance for both PDR and Latency in the mobile scenarios.展开更多
A novel decentralized service composition protocol was presented based on quality of service (QoS) for mobile ad hoc networks (MANETs).A service composition in MANETs is considered as a service path discovery in a ser...A novel decentralized service composition protocol was presented based on quality of service (QoS) for mobile ad hoc networks (MANETs).A service composition in MANETs is considered as a service path discovery in a service network.Based on the concept of source routing,the protocol integrates route discovery, service discovery and service composition and utilizes a constrained flooding approach to discover the optimal service path.A service path maintenance mechanism was exploited to recover broken service paths.Simulation experiments demonstrate that the proposed protocol outperforms existing service composition protocols.展开更多
As mobile networks become high speed and attain an all-IP structure, more services are possible. This brings about many new security requirements that traditional security programs cannot handle. This paper analyzes s...As mobile networks become high speed and attain an all-IP structure, more services are possible. This brings about many new security requirements that traditional security programs cannot handle. This paper analyzes security threats and the needs of 3G/4G mobile networks, and then proposes a novel protection scheme for them based on their whole structure. In this scheme, a trusted computing environment is constructed on the mobile terminal side by combining software validity verification with access control. At the security management center, security services such as validity verification and integrity check are provided to mobile terminals. In this way, terminals and the network as a whole are secured to a much greater extent. This paper also highlights problems to be addressed in future research and development.展开更多
This paper pays its attention on Chinese mobile Internet service( MIS). Chinese MIS is developing so rapidly that the research on the mechanism of the formation of MIS assessment makes significant sense and therefore ...This paper pays its attention on Chinese mobile Internet service( MIS). Chinese MIS is developing so rapidly that the research on the mechanism of the formation of MIS assessment makes significant sense and therefore the three layers construct of the artificial neural network( ANN) theory is applied to address the problem. The final research model contains MIS features including personalization,localization,reachability,connectivity,convenience and ubiquity as the input layer variables,perceived MIS quality and MIS satisfaction as the hidden layer variables and reuse intention as the output layer variable. MIS risk is identified as the mediating variable. Theoretically,the framework is robust and reveals the mechanism of how customers evaluate a certain mobile Internet service. Practically,the model based on ANN should shed some light on how to understand and improve customer perceived mobile Internet service for both MIS giants and new comers.展开更多
Jitter is one of the most important issues for multimedia real time services in future mobile ad hoc networks(MANET). A thorough theoretical analysis of the destination buffer for smoothing the jitter of the real ti...Jitter is one of the most important issues for multimedia real time services in future mobile ad hoc networks(MANET). A thorough theoretical analysis of the destination buffer for smoothing the jitter of the real time service in MANET is given. The theoretical results are applied in moderate populated ad hoc networks in our simulation, the simulation results show that by predicting and adjusting destination buffer in our way, Jitter will be alleviated in large part and this will contribute much to the quality of service (QOS) in MANET.展开更多
In E-Commerce, consumers and service suppliers can find the services through the searching of Mobile Agents (MA). The suppliers disassemble the service requests of consumers into the sub-requests. Then suppliers respo...In E-Commerce, consumers and service suppliers can find the services through the searching of Mobile Agents (MA). The suppliers disassemble the service requests of consumers into the sub-requests. Then suppliers respond the sub-requests cooperatively. Thus the Service Supply Chain (SSC) can be formed. But the existing bottom-up and up-bottom supply chain formation fashions cannot be adapted to the SSC in distributed environment of E-Commerce. Task Dependency Network is exploited to illustrate the service relationship among consumers and suppliers. The formation of SSC with some simulations is elaborated. Then the influence on the formation of SSC caused by the type of service suppliers, the quantities of MA and its variety in number is elucidated.展开更多
In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to im...In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to improve IIoT service efficiency.There are two types of costs for this kind of IoT network:a communication cost and a computing cost.For service efficiency,the communication cost of data transmission should be minimized,and the computing cost in the edge cloud should be also minimized.Therefore,in this paper,the communication cost for data transmission is defined as the delay factor,and the computing cost in the edge cloud is defined as the waiting time of the computing intensity.The proposed method selects an edge cloud that minimizes the total cost of the communication and computing costs.That is,a device chooses a routing path to the selected edge cloud based on the costs.The proposed method controls the data flows in a mesh-structured network and appropriately distributes the data processing load.The performance of the proposed method is validated through extensive computer simulation.When the transition probability from good to bad is 0.3 and the transition probability from bad to good is 0.7 in wireless and edge cloud states,the proposed method reduced both the average delay and the service pause counts to about 25%of the existing method.展开更多
A model of mobile peer to peer (P2P) network architecture based on agent for mobile value-added services is proposed in this paper. By using this model, wireless devices can build a P2P network dynamically, and then t...A model of mobile peer to peer (P2P) network architecture based on agent for mobile value-added services is proposed in this paper. By using this model, wireless devices can build a P2P network dynamically, and then they can access and transmit information peer to peer. An ontologybased semantic information description method is also proposed for the mobile wireless devices. The merit of this method is to enhance search efficiency. Moreover, a small system, called CellChat, has been implemented based on this model in the lab environment. Experimental results are provided to show that the benefi ts of the proposed method. This method will become an effective solution for mobile value-added services in 3G network.展开更多
Differently from the general online social network(OSN),locationbased mobile social network(LMSN),which seamlessly integrates mobile computing and social computing technologies,has unique characteristics of temporal,s...Differently from the general online social network(OSN),locationbased mobile social network(LMSN),which seamlessly integrates mobile computing and social computing technologies,has unique characteristics of temporal,spatial and social correlation.Recommending friends instantly based on current location of users in the real world has become increasingly popular in LMSN.However,the existing friend recommendation methods based on topological structures of a social network or non-topological information such as similar user profiles cannot well address the instant making friends in the real world.In this article,we analyze users' check-in behavior in a real LMSN site named Gowalla.According to this analysis,we present an approach of recommending friends instantly for LMSN users by considering the real-time physical location proximity,offline behavior similarity and friendship network information in the virtual community simultaneously.This approach effectively bridges the gap between the offline behavior of users in the real world and online friendship network information in the virtual community.Finally,we use the real user check-in dataset of Gowalla to verify the effectiveness of our approach.展开更多
Mobile broadband(MBB)networks are expanding rapidly to deliver higher data speeds.The fifth-generation cellular network promises enhanced-MBB with high-speed data rates,low power connectivity,and ultralow latency vide...Mobile broadband(MBB)networks are expanding rapidly to deliver higher data speeds.The fifth-generation cellular network promises enhanced-MBB with high-speed data rates,low power connectivity,and ultralow latency video streaming.However,existing cellular networks are unable to perform well due to high latency and low bandwidth,which degrades the performance of various applications.As a result,monitoring and evaluation of the performance of these network-supported services is critical.Mobile network providers optimize and monitor their network performance to ensure the highest quality of service to their end-users.This paper proposes a Bayesian model to estimate the minimum opinion score(MOS)of video streaming services for any particular cellular network.The MOS is the most commonly used metric to assess the quality of experience.The proposed Bayesian model consists of several input data,namely,round-trip time,stalling load,and bite rates.It was examined and evaluated using several test data sizes with various performance metrics.Simulation results show the proposed Bayesian network achieved higher accuracy overall test data sizes than a neural network.The proposed Bayesian network obtained a remarkable overall accuracy of 90.36%and outperformed the neural network.展开更多
本文提出了一种基于Mobile Agent的服务移动性系统(MASM,Mobile Agent Based Service Mobility),并在模拟环境中加以实现.MASM系统充分利用了Mobile Agent和Java技术的优势,提出了用“打点”和模块化等技术设计Mo-bile Agent的新方法,...本文提出了一种基于Mobile Agent的服务移动性系统(MASM,Mobile Agent Based Service Mobility),并在模拟环境中加以实现.MASM系统充分利用了Mobile Agent和Java技术的优势,提出了用“打点”和模块化等技术设计Mo-bile Agent的新方法,从而有效地减少了网络传输负载,灵活地实现了跨不同网络的服务移动.本文着重在MASM系统和Mobile Agent结构设计上以及具体服务移动的实现上.展开更多
In this paper, a novel admission scheme is proposed which provides high degrees of quality of service (QoS) guarantees for multimedia traffic carried in mobile networks. The proposed scheme combines the admission cont...In this paper, a novel admission scheme is proposed which provides high degrees of quality of service (QoS) guarantees for multimedia traffic carried in mobile networks. The proposed scheme combines the admission control and bandwidth reservation to guarantee QoS requirements. It considers both local information and remote information to determine whether to accept or reject a connection. In order to embody the characteristics of the algorithms proposed in the article, two traditional algorithms of admission control are used for comparison. In the end of the paper the simulation analyses are given and the results show that the proposed algorithm can adjust the bandwidth according to the current status of networks and decrease the probability of connections forcibly dropped. The most important thing is that the algorithm is based on the multimedia communications and can guarantee the QoS of real time connections through decreasing the bandwidth of non real time connections.展开更多
文摘In an era where digital technology is paramount, higher education institutions like the University of Zambia (UNZA) are employing advanced computer networks to enhance their operational capacity and offer cutting-edge services to their academic fraternity. Spanning across the Great East Road campus, UNZA has established one of the most extensive computer networks in Zambia, serving a burgeoning community of over 20,000 active users through a Metropolitan Area Network (MAN). However, as the digital landscape continues to evolve, it is besieged with burgeoning challenges that threaten the very fabric of network integrity—cyber security threats and the imperatives of maintaining high Quality of Service (QoS). In an effort to mitigate these threats and ensure network efficiency, the development of a mobile application to monitor temperatures in the server room was imperative. According to L. Wei, X. Zeng, and T. Shen, the use of wireless sensory networks to monitor the temperature of train switchgear contact points represents a cost-effective solution. The system is based on wireless communication technology and is detailed in their paper, “A wireless solution for train switchgear contact temperature monitoring and alarming system based on wireless communication technology”, published in the International Journal of Communications, Network and System Sciences, vol. 8, no. 4, pp. 79-87, 2015 [1]. Therefore, in this study, a mobile application technology was explored for monitoring of temperatures in the server room in order to aid Cisco device performance. Additionally, this paper also explores the hardening of Cisco device security and QoS which are the cornerstones of this study.
基金ACKNOWLEDGEMENT This research is supported by the National Grand Fundamental Research 973 Program of China under Grant No. 2011CB302506, 2012CB315802 National Key Technology Research and Development Program of China (Grant No. 2012BAH94F02)+3 种基金 National High-tech R&D Program of China (863 Program) under Grant No. 2013AA102301 National Natural Science Foundation of China under Grant No. 61132001, 61171102) Program for New Century Excellent Talents in University (Grant No. NCET-11-0592) Project of New Generation Broad band Wireless Networks under Grant No. 2011ZX03002-002-01. The technology development and experiment of innovative networks architecture (CNGI-12- 03-007).
文摘Composite service provision in mobile ad hoc networks encounters great challenges and its success rate is not satisfactory because the nodes' locations are dynamic and the nodes maybe unavailable at any time.Composite service is built through the service composition.In mobile ad hoc networks,the factors influencing the success rate of service composition are mainly the number of nodes and the time spent for the composition.The node's failure probability is proportional to the length of time the node exist in the networks.In order to improve the success rate of service composition,we take several measures.First,we split the service requirement into several segments and cluster the nodes,so that the nodes' waiting time for service composition can be reduced.Second,we propose a new node model of "one node contains multiple services" in mobile ad hoc networks.Using this type of nodes model,the number of nodes required for service composition can be reduced.These means can increase the success rate of service composition.
文摘A network model is proposed to support service differentiation for mobile Ad Hoc networks by combining a fully distributed admission control approach and the DIFS based differentiation mechanism of IEEE802.11. It can provide different kinds of QoS (Quality of Service) for various applications. Admission controllers determine a committed bandwidth based on the reserved bandwidth of flows and the source utilization of networks. Packets are marked when entering into networks by markers according to the committed rate. By the mark in the packet header, intermediate nodes handle the received packets in different manners to provide applications with the QoS corresponding to the pre-negotiated profile. Extensive simulation experiments showed that the proposed mechanism can provide QoS guarantee to assured service traffic and increase the channel utilization of networks.
文摘Network Coding is a relatively new forwarding paradigm where intermediate nodes perform a store, code, and forward operation on incoming packets. Traditional forwarding approaches, which employed a store and forward operation, have not been able to approach the limit of the max-flow min-cut throughput wherein sources transmitting information over bottleneck links have to compete for access to these links. With Network Coding, multiple sources are now able to transmit packets over bottleneck links simultaneously, achieving the max-flow min-cut through-put and increasing network capacity. While the majority of the contemporary literature has focused on the performance of Network Coding from a capacity perspective, the aim of this research has taken a new direction focusing on two Quality of Service metrics, e.g., Packet Delivery Ratio (PDR) and Latency, in conjunction with Network Coding protocols in Mobile Ad Hoc Networks (MANETs). Simulations are performed on static and mobile environments to determine a Quality of Service baseline comparison between Network Coding protocols and traditional ad hoc routing protocols. The results show that the Random Linear Network Coding protocol has the lowest Latency and Dynamic Source Routing protocol has the highest PDR in the static scenarios, and show that the Random Linear Network Coding protocol has the best cumulative performance for both PDR and Latency in the mobile scenarios.
基金The National Natural Science Foundation of China(No.60503041)The Shanghai Commission of Science and Technology/International Cooperative Project(No.05SN07114)
文摘A novel decentralized service composition protocol was presented based on quality of service (QoS) for mobile ad hoc networks (MANETs).A service composition in MANETs is considered as a service path discovery in a service network.Based on the concept of source routing,the protocol integrates route discovery, service discovery and service composition and utilizes a constrained flooding approach to discover the optimal service path.A service path maintenance mechanism was exploited to recover broken service paths.Simulation experiments demonstrate that the proposed protocol outperforms existing service composition protocols.
基金funded by the National High-Technology Research and Development Program of China"(863"Program)under Grant No.2009AA01Z427
文摘As mobile networks become high speed and attain an all-IP structure, more services are possible. This brings about many new security requirements that traditional security programs cannot handle. This paper analyzes security threats and the needs of 3G/4G mobile networks, and then proposes a novel protection scheme for them based on their whole structure. In this scheme, a trusted computing environment is constructed on the mobile terminal side by combining software validity verification with access control. At the security management center, security services such as validity verification and integrity check are provided to mobile terminals. In this way, terminals and the network as a whole are secured to a much greater extent. This paper also highlights problems to be addressed in future research and development.
文摘This paper pays its attention on Chinese mobile Internet service( MIS). Chinese MIS is developing so rapidly that the research on the mechanism of the formation of MIS assessment makes significant sense and therefore the three layers construct of the artificial neural network( ANN) theory is applied to address the problem. The final research model contains MIS features including personalization,localization,reachability,connectivity,convenience and ubiquity as the input layer variables,perceived MIS quality and MIS satisfaction as the hidden layer variables and reuse intention as the output layer variable. MIS risk is identified as the mediating variable. Theoretically,the framework is robust and reveals the mechanism of how customers evaluate a certain mobile Internet service. Practically,the model based on ANN should shed some light on how to understand and improve customer perceived mobile Internet service for both MIS giants and new comers.
文摘Jitter is one of the most important issues for multimedia real time services in future mobile ad hoc networks(MANET). A thorough theoretical analysis of the destination buffer for smoothing the jitter of the real time service in MANET is given. The theoretical results are applied in moderate populated ad hoc networks in our simulation, the simulation results show that by predicting and adjusting destination buffer in our way, Jitter will be alleviated in large part and this will contribute much to the quality of service (QOS) in MANET.
文摘In E-Commerce, consumers and service suppliers can find the services through the searching of Mobile Agents (MA). The suppliers disassemble the service requests of consumers into the sub-requests. Then suppliers respond the sub-requests cooperatively. Thus the Service Supply Chain (SSC) can be formed. But the existing bottom-up and up-bottom supply chain formation fashions cannot be adapted to the SSC in distributed environment of E-Commerce. Task Dependency Network is exploited to illustrate the service relationship among consumers and suppliers. The formation of SSC with some simulations is elaborated. Then the influence on the formation of SSC caused by the type of service suppliers, the quantities of MA and its variety in number is elucidated.
基金supported by the National Research Foundation of Korea (NRF) grant funded by the Korea Government (MSIT) (No.2021R1C1C1013133)supported by the Institute of Information and Communications Technology Planning and Evaluation (IITP)grant funded by the Korea Government (MSIT) (RS-2022-00167197,Development of Intelligent 5G/6G Infrastructure Technology for The Smart City)supported by the Soonchunhyang University Research Fund.
文摘In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to improve IIoT service efficiency.There are two types of costs for this kind of IoT network:a communication cost and a computing cost.For service efficiency,the communication cost of data transmission should be minimized,and the computing cost in the edge cloud should be also minimized.Therefore,in this paper,the communication cost for data transmission is defined as the delay factor,and the computing cost in the edge cloud is defined as the waiting time of the computing intensity.The proposed method selects an edge cloud that minimizes the total cost of the communication and computing costs.That is,a device chooses a routing path to the selected edge cloud based on the costs.The proposed method controls the data flows in a mesh-structured network and appropriately distributes the data processing load.The performance of the proposed method is validated through extensive computer simulation.When the transition probability from good to bad is 0.3 and the transition probability from bad to good is 0.7 in wireless and edge cloud states,the proposed method reduced both the average delay and the service pause counts to about 25%of the existing method.
基金funded by the Special Funds for Key Program of China No. 2009ZX01039-002-001-07
文摘A model of mobile peer to peer (P2P) network architecture based on agent for mobile value-added services is proposed in this paper. By using this model, wireless devices can build a P2P network dynamically, and then they can access and transmit information peer to peer. An ontologybased semantic information description method is also proposed for the mobile wireless devices. The merit of this method is to enhance search efficiency. Moreover, a small system, called CellChat, has been implemented based on this model in the lab environment. Experimental results are provided to show that the benefi ts of the proposed method. This method will become an effective solution for mobile value-added services in 3G network.
基金National Key Basic Research Program of China (973 Program) under Grant No.2012CB315802 and No.2013CB329102.National Natural Science Foundation of China under Grant No.61171102 and No.61132001.New generation broadband wireless mobile communication network Key Projects for Science and Technology Development under Grant No.2011ZX03002-002-01,Beijing Nova Program under Grant No.2008B50 and Beijing Higher Education Young Elite Teacher Project under Grant No.YETP0478
文摘Differently from the general online social network(OSN),locationbased mobile social network(LMSN),which seamlessly integrates mobile computing and social computing technologies,has unique characteristics of temporal,spatial and social correlation.Recommending friends instantly based on current location of users in the real world has become increasingly popular in LMSN.However,the existing friend recommendation methods based on topological structures of a social network or non-topological information such as similar user profiles cannot well address the instant making friends in the real world.In this article,we analyze users' check-in behavior in a real LMSN site named Gowalla.According to this analysis,we present an approach of recommending friends instantly for LMSN users by considering the real-time physical location proximity,offline behavior similarity and friendship network information in the virtual community simultaneously.This approach effectively bridges the gap between the offline behavior of users in the real world and online friendship network information in the virtual community.Finally,we use the real user check-in dataset of Gowalla to verify the effectiveness of our approach.
基金The research leading to these results has received funding from The Research Council(TRC)of the Sultanate of Oman under the Block Funding Program with Agreement No.TRC/BFP/ASU/01/2019.
文摘Mobile broadband(MBB)networks are expanding rapidly to deliver higher data speeds.The fifth-generation cellular network promises enhanced-MBB with high-speed data rates,low power connectivity,and ultralow latency video streaming.However,existing cellular networks are unable to perform well due to high latency and low bandwidth,which degrades the performance of various applications.As a result,monitoring and evaluation of the performance of these network-supported services is critical.Mobile network providers optimize and monitor their network performance to ensure the highest quality of service to their end-users.This paper proposes a Bayesian model to estimate the minimum opinion score(MOS)of video streaming services for any particular cellular network.The MOS is the most commonly used metric to assess the quality of experience.The proposed Bayesian model consists of several input data,namely,round-trip time,stalling load,and bite rates.It was examined and evaluated using several test data sizes with various performance metrics.Simulation results show the proposed Bayesian network achieved higher accuracy overall test data sizes than a neural network.The proposed Bayesian network obtained a remarkable overall accuracy of 90.36%and outperformed the neural network.
文摘本文提出了一种基于Mobile Agent的服务移动性系统(MASM,Mobile Agent Based Service Mobility),并在模拟环境中加以实现.MASM系统充分利用了Mobile Agent和Java技术的优势,提出了用“打点”和模块化等技术设计Mo-bile Agent的新方法,从而有效地减少了网络传输负载,灵活地实现了跨不同网络的服务移动.本文着重在MASM系统和Mobile Agent结构设计上以及具体服务移动的实现上.
文摘In this paper, a novel admission scheme is proposed which provides high degrees of quality of service (QoS) guarantees for multimedia traffic carried in mobile networks. The proposed scheme combines the admission control and bandwidth reservation to guarantee QoS requirements. It considers both local information and remote information to determine whether to accept or reject a connection. In order to embody the characteristics of the algorithms proposed in the article, two traditional algorithms of admission control are used for comparison. In the end of the paper the simulation analyses are given and the results show that the proposed algorithm can adjust the bandwidth according to the current status of networks and decrease the probability of connections forcibly dropped. The most important thing is that the algorithm is based on the multimedia communications and can guarantee the QoS of real time connections through decreasing the bandwidth of non real time connections.