An Ad hoc network is composed of wireless mobile nodes.Because there is no other wired infrastructure such as base stations,the ad hoc network,unlike other wireless networks such as Wireless Local Area Network(WLAN),h...An Ad hoc network is composed of wireless mobile nodes.Because there is no other wired infrastructure such as base stations,the ad hoc network,unlike other wireless networks such as Wireless Local Area Network(WLAN),has to face attacks from both the control plane and the data plane.Ad hoc should ensure the routing security on the control plane,and the secure forwarding of packets on the data plane.The distributed network protocol should operate safely,and peer-to-peer nodes should have trusting relations for each other.For this purpose,a complete security solution should include three parts:security on the control plane,security on the data plane,and security of key management.展开更多
A Silk Road Think Tank Association Thematic Cloud Forum hosted by Silk Road Think Tank Association and co-organized by China Center for Contemporary World Studies(CCCWS)of International Department,CPC Central Committe...A Silk Road Think Tank Association Thematic Cloud Forum hosted by Silk Road Think Tank Association and co-organized by China Center for Contemporary World Studies(CCCWS)of International Department,CPC Central Committee and Chongyang Institute of Financial Studies,Renmin University of China was held in Beijing on April 24,2020.展开更多
Following is an interview by staff reporters of the Human Rights magazine with Zheng Silin, Chinese minister of labor and social security. The interview was meant in part to celebrate the tenth anniversary of the impl...Following is an interview by staff reporters of the Human Rights magazine with Zheng Silin, Chinese minister of labor and social security. The interview was meant in part to celebrate the tenth anniversary of the implementation of the Labor Law of the People's Republic of China that falls on January 1,2005. We are publishing this transcript with a view to providing our readers with information about how China has worked persistently to protect citizens' right to work and social security and the achievements it has made in this regard. We need to remind our readers of the fact that back in March 2004, the National People's Congress, China's highest legislature, approved a recommendation for revision of China's Constitution. In accordance with the recommendation, the Constitution had one more clause added: The state shall establish and improve a social security system commensurate to the level of the economic and social development.展开更多
The article describes the layered model of physical network and information security, and the establishment of the mobile Internet’s security framework based on its network architecture. The mobile Internet has three...The article describes the layered model of physical network and information security, and the establishment of the mobile Internet’s security framework based on its network architecture. The mobile Internet has three parts, i.e. terminal, network and service system, each of which can be studied in four layers of the network and information security, namely, the equipment/environment security layer, the service and application security layer, the information security layer and the information content security layer.展开更多
B. Network Architectures This section describes the main types of industrial and utility communication network topologies and protocols, in preparation for the discussion of specific security issues in the later secti...B. Network Architectures This section describes the main types of industrial and utility communication network topologies and protocols, in preparation for the discussion of specific security issues in the later sections. Communication networks for industrial automation are typically built in hierarchi-展开更多
The US Department of Defense (DoD) routinely uses wireless sensor networks (WSNs) for military tactical communications. Sensor node die-out has a significant impact on the topology of a tactical WSN. This is probl...The US Department of Defense (DoD) routinely uses wireless sensor networks (WSNs) for military tactical communications. Sensor node die-out has a significant impact on the topology of a tactical WSN. This is problematic for military applications where situational data is critical to tactical decision making. To increase the amount of time all sensor nodes remain active within the network and to control the network topology tactically, energy efficient routing mechanisms must be employed. In this paper, we aim to provide realistic insights on the practical advantages and disadvantages of using established routing techniques for tactical WSNs. We investigate the following established routing algorithms: direct routing, minimum transmission energy (MTE), Low Energy Adaptive Cluster Head routing (LEACH), and zone clustering. Based on the node die out statistics observed with these algorithms and the topological impact the node die outs have on the network, we develop a novel, energy efficient zone clustering algorithm called EZone. Via extensive simulations using MATLAB, we analyze the effectiveness of these algorithms on network performance for single and multiple gateway scenarios and show that the EZone algorithm tactically controls the topology of the network, thereby maintaining significant service area coverage when compared to the other routing algorithms.展开更多
A novel neural network based on iterated unscented Kalman filter (IUKF) algorithm is established to model and com- pensate for the fiber optic gyro (FOG) bias drift caused by temperature. In the network, FOG tempe...A novel neural network based on iterated unscented Kalman filter (IUKF) algorithm is established to model and com- pensate for the fiber optic gyro (FOG) bias drift caused by temperature. In the network, FOG temperature and its gradient are set as input and the FOG bias drift is set as the expected output. A 2-5-1 network trained with IUKF algorithm is established. The IUKF algorithm is developed on the basis of the unscented Kalman filter (UKF). The weight and bias vectors of the hidden layer are set as the state of the UKF and its process and measurement equations are deduced according to the network architecture. To solve the unavoidable estimation deviation of the mean and covariance of the states in the UKF algorithm, iterative computation is introduced into the UKF after the measurement update. While the measure- ment noise R is extended into the state vectors before iteration in order to meet the statistic orthogonality of estimate and mea- surement noise. The IUKF algorithm can provide the optimized estimation for the neural network because of its state expansion and iteration. Temperature rise (-20-20℃) and drop (70-20℃) tests for FOG are carried out in an attemperator. The temperature drift model is built with neural network, and it is trained respectively with BP, UKF and IUKF algorithms. The results prove that the proposed model has higher precision compared with the back- propagation (BP) and UKF network models.展开更多
A new thermal ring-opening polymerization technique for 1, 1, 3, 3-tetra-ph enyl-1, 3-disilacyclobutane (TPDC) based on the use of metal nanoparticles produced by pulsed laser ablation was investigated. This method ...A new thermal ring-opening polymerization technique for 1, 1, 3, 3-tetra-ph enyl-1, 3-disilacyclobutane (TPDC) based on the use of metal nanoparticles produced by pulsed laser ablation was investigated. This method facilitates the synthesis of polydiphenysilylenemethyle (PDPhSM) thin film, which is difficult to make by conventional methods because of its insolubility and high melting point. TPDC was first evaporated on silicon substrates and then exposed to metal nanoparticles deposition by pulsed laser ablation prior to heat treatment.The TPDC films with metal nanoparticles were heated in an electric furnace in air atmosphere to induce ring-opening polymerization of TPDC. The film thicknesses before and after polymerization were measured by a stylus profilometer. Since the polymerization process competes with re-evaporation of TPDC during the heating, the thickness ratio of the polymer to the monomer was defined as the polymerization efficiency, which depends greatly on the technology conditions. Therefore, a well trained radial base function neural network model was constructed to approach the complex nonlinear relationship. Moreover, a particle swarm algorithm was firstly introduced to search for an optimum technology directly from RBF neural network model. This ensures that the fabrication of thin film with appropriate properties using pulsed laser ablation requires no in-depth understanding of the entire behavior of the technology conditions.展开更多
One of the important aspects of seamless communication for ubiquitous computing is the dynamic selection of the best access network for a multimodal device in a heterogeneous wireless environment. In this paper, we co...One of the important aspects of seamless communication for ubiquitous computing is the dynamic selection of the best access network for a multimodal device in a heterogeneous wireless environment. In this paper, we consider available bandwidth as a dynamic parameter to select the network in heterogeneous environments. A bootstrap approximation based technique is firstly utilized to estimate the available bandwidth and compare it with hidden Markov model based estimation to check its accuracy. It is then used for the selection of the best suitable network in the heterogeneous environment consisting of 2G and 3G standards based wireless networks. The proposed algorithm is implemented in temporal and spatial domains to check its robustness. The numerical results show that the proposed algorithm gives improved performance in terms of estimation error (less than 15%), overhead (varies from 0.45% to 72.91%) and reliability (approx. 99%)as compared to the existing algorithm.展开更多
基金This work was funded by the National Basic Research Program (973 Program) of China under Grant 2007CB310704.
文摘An Ad hoc network is composed of wireless mobile nodes.Because there is no other wired infrastructure such as base stations,the ad hoc network,unlike other wireless networks such as Wireless Local Area Network(WLAN),has to face attacks from both the control plane and the data plane.Ad hoc should ensure the routing security on the control plane,and the secure forwarding of packets on the data plane.The distributed network protocol should operate safely,and peer-to-peer nodes should have trusting relations for each other.For this purpose,a complete security solution should include three parts:security on the control plane,security on the data plane,and security of key management.
文摘A Silk Road Think Tank Association Thematic Cloud Forum hosted by Silk Road Think Tank Association and co-organized by China Center for Contemporary World Studies(CCCWS)of International Department,CPC Central Committee and Chongyang Institute of Financial Studies,Renmin University of China was held in Beijing on April 24,2020.
文摘Following is an interview by staff reporters of the Human Rights magazine with Zheng Silin, Chinese minister of labor and social security. The interview was meant in part to celebrate the tenth anniversary of the implementation of the Labor Law of the People's Republic of China that falls on January 1,2005. We are publishing this transcript with a view to providing our readers with information about how China has worked persistently to protect citizens' right to work and social security and the achievements it has made in this regard. We need to remind our readers of the fact that back in March 2004, the National People's Congress, China's highest legislature, approved a recommendation for revision of China's Constitution. In accordance with the recommendation, the Constitution had one more clause added: The state shall establish and improve a social security system commensurate to the level of the economic and social development.
基金supported by the National HighTechnology Research and Development Programof China ("863" Program) under Grant No.2008AA01A204
文摘The article describes the layered model of physical network and information security, and the establishment of the mobile Internet’s security framework based on its network architecture. The mobile Internet has three parts, i.e. terminal, network and service system, each of which can be studied in four layers of the network and information security, namely, the equipment/environment security layer, the service and application security layer, the information security layer and the information content security layer.
文摘B. Network Architectures This section describes the main types of industrial and utility communication network topologies and protocols, in preparation for the discussion of specific security issues in the later sections. Communication networks for industrial automation are typically built in hierarchi-
文摘The US Department of Defense (DoD) routinely uses wireless sensor networks (WSNs) for military tactical communications. Sensor node die-out has a significant impact on the topology of a tactical WSN. This is problematic for military applications where situational data is critical to tactical decision making. To increase the amount of time all sensor nodes remain active within the network and to control the network topology tactically, energy efficient routing mechanisms must be employed. In this paper, we aim to provide realistic insights on the practical advantages and disadvantages of using established routing techniques for tactical WSNs. We investigate the following established routing algorithms: direct routing, minimum transmission energy (MTE), Low Energy Adaptive Cluster Head routing (LEACH), and zone clustering. Based on the node die out statistics observed with these algorithms and the topological impact the node die outs have on the network, we develop a novel, energy efficient zone clustering algorithm called EZone. Via extensive simulations using MATLAB, we analyze the effectiveness of these algorithms on network performance for single and multiple gateway scenarios and show that the EZone algorithm tactically controls the topology of the network, thereby maintaining significant service area coverage when compared to the other routing algorithms.
基金supported by the National Natural Science Foundation of China(6110418440904018)+3 种基金the National Key Scientific Instrument and Equipment Development Project(2011YQ12004502)the Research Foundation of General Armament Department(201300000008)the Doctor Innovation Fund of Naval University of Engineering(HGBSCXJJ2011008)the Youth Natural Science Foundation of Naval University of Engineering(HGDQNJJ12028)
文摘A novel neural network based on iterated unscented Kalman filter (IUKF) algorithm is established to model and com- pensate for the fiber optic gyro (FOG) bias drift caused by temperature. In the network, FOG temperature and its gradient are set as input and the FOG bias drift is set as the expected output. A 2-5-1 network trained with IUKF algorithm is established. The IUKF algorithm is developed on the basis of the unscented Kalman filter (UKF). The weight and bias vectors of the hidden layer are set as the state of the UKF and its process and measurement equations are deduced according to the network architecture. To solve the unavoidable estimation deviation of the mean and covariance of the states in the UKF algorithm, iterative computation is introduced into the UKF after the measurement update. While the measure- ment noise R is extended into the state vectors before iteration in order to meet the statistic orthogonality of estimate and mea- surement noise. The IUKF algorithm can provide the optimized estimation for the neural network because of its state expansion and iteration. Temperature rise (-20-20℃) and drop (70-20℃) tests for FOG are carried out in an attemperator. The temperature drift model is built with neural network, and it is trained respectively with BP, UKF and IUKF algorithms. The results prove that the proposed model has higher precision compared with the back- propagation (BP) and UKF network models.
基金Funded by the Zhejiang Provincial Natural Science Foundation of China(No.R405031)Jiaxing Science Planning Project(2009 2007)the Educa-tion Department of Zhejiang Province (No.20051441)
文摘A new thermal ring-opening polymerization technique for 1, 1, 3, 3-tetra-ph enyl-1, 3-disilacyclobutane (TPDC) based on the use of metal nanoparticles produced by pulsed laser ablation was investigated. This method facilitates the synthesis of polydiphenysilylenemethyle (PDPhSM) thin film, which is difficult to make by conventional methods because of its insolubility and high melting point. TPDC was first evaporated on silicon substrates and then exposed to metal nanoparticles deposition by pulsed laser ablation prior to heat treatment.The TPDC films with metal nanoparticles were heated in an electric furnace in air atmosphere to induce ring-opening polymerization of TPDC. The film thicknesses before and after polymerization were measured by a stylus profilometer. Since the polymerization process competes with re-evaporation of TPDC during the heating, the thickness ratio of the polymer to the monomer was defined as the polymerization efficiency, which depends greatly on the technology conditions. Therefore, a well trained radial base function neural network model was constructed to approach the complex nonlinear relationship. Moreover, a particle swarm algorithm was firstly introduced to search for an optimum technology directly from RBF neural network model. This ensures that the fabrication of thin film with appropriate properties using pulsed laser ablation requires no in-depth understanding of the entire behavior of the technology conditions.
文摘One of the important aspects of seamless communication for ubiquitous computing is the dynamic selection of the best access network for a multimodal device in a heterogeneous wireless environment. In this paper, we consider available bandwidth as a dynamic parameter to select the network in heterogeneous environments. A bootstrap approximation based technique is firstly utilized to estimate the available bandwidth and compare it with hidden Markov model based estimation to check its accuracy. It is then used for the selection of the best suitable network in the heterogeneous environment consisting of 2G and 3G standards based wireless networks. The proposed algorithm is implemented in temporal and spatial domains to check its robustness. The numerical results show that the proposed algorithm gives improved performance in terms of estimation error (less than 15%), overhead (varies from 0.45% to 72.91%) and reliability (approx. 99%)as compared to the existing algorithm.