High-speed rail(HSR) has formed a networked operational scale in China. Any internal or external disturbance may deviate trains’ operation from the planned schedules, resulting in primary delays or even cascading del...High-speed rail(HSR) has formed a networked operational scale in China. Any internal or external disturbance may deviate trains’ operation from the planned schedules, resulting in primary delays or even cascading delays on a network scale. Studying the delay propagation mechanism could help to improve the timetable resilience in the planning stage and realize cooperative rescheduling for dispatchers. To quickly and effectively predict the spatial-temporal range of cascading delays, this paper proposes a max-plus algebra based delay propagation model considering trains’ operation strategy and the systems’ constraints. A double-layer network based breadth-first search algorithm based on the constraint network and the timetable network is further proposed to solve the delay propagation process for different kinds of emergencies. The proposed model could deal with the delay propagation problem when emergencies occur in sections or stations and is suitable for static emergencies and dynamic emergencies. Case studies show that the proposed algorithm can significantly improve the computational efficiency of the large-scale HSR network. Moreover, the real operational data of China HSR is adopted to verify the proposed model, and the results show that the cascading delays can be timely and accurately inferred, and the delay propagation characteristics under three kinds of emergencies are unfolded.展开更多
Buses and subways are essential to urban public transportation systems and an important engine for activating high-quality urban development. Traditional multi-modal transportation networks focus on the structural fea...Buses and subways are essential to urban public transportation systems and an important engine for activating high-quality urban development. Traditional multi-modal transportation networks focus on the structural feature mining of single-layer networks or each layer, ignoring the structural association of multi-layer networks. In this paper, we examined the multi-layer structural property of the bus-subway network of Shanghai at both global and nodal scales. A dual-layer model of the city’s bus and subway system was built. Single-layer complex network indicators were also extended. The paper also explored the spatial coupling properties of the city’s bus and subway system and identified its primary traffic nodes. It was found that 1) the dual-layer network increased the network’s connectivity to a certain extent and broke through the spatial limitation in terms of physical structure, making the connection between any two locations more direct. 2) The dual-layer network changed the topological characteristics of the transit network, increasing the centrality value and bit order in degree centrality, betweenness centrality, and closeness centrality to different degrees, and making each centrality tend to converge to the city center in spatial distribution. Enhancing the management of critical network nodes would help the integrated public transportation system operate more effectively and provide higher-quality services.展开更多
The lethal brain tumor “Glioblastoma” has the propensity to grow over time. To improve patient outcomes, it is essential to classify GBM accurately and promptly in order to provide a focused and individualized treat...The lethal brain tumor “Glioblastoma” has the propensity to grow over time. To improve patient outcomes, it is essential to classify GBM accurately and promptly in order to provide a focused and individualized treatment plan. Despite this, deep learning methods, particularly Convolutional Neural Networks (CNNs), have demonstrated a high level of accuracy in a myriad of medical image analysis applications as a result of recent technical breakthroughs. The overall aim of the research is to investigate how CNNs can be used to classify GBMs using data from medical imaging, to improve prognosis precision and effectiveness. This research study will demonstrate a suggested methodology that makes use of the CNN architecture and is trained using a database of MRI pictures with this tumor. The constructed model will be assessed based on its overall performance. Extensive experiments and comparisons with conventional machine learning techniques and existing classification methods will also be made. It will be crucial to emphasize the possibility of early and accurate prediction in a clinical workflow because it can have a big impact on treatment planning and patient outcomes. The paramount objective is to not only address the classification challenge but also to outline a clear pathway towards enhancing prognosis precision and treatment effectiveness.展开更多
With the rapid development of the Internet of Things (IoT), non-Orthogonal Multiple Access (NOMA) technology and cognitive wireless network are two promising technologies to improve the spectral efficiency of the syst...With the rapid development of the Internet of Things (IoT), non-Orthogonal Multiple Access (NOMA) technology and cognitive wireless network are two promising technologies to improve the spectral efficiency of the system, which have been widely concerned in the field of wireless communication. However, due to the importance of ownership and privacy protection, the IoT system must provide corresponding security mechanisms. From the perspective of improving the transmission security of CR-NOMA system based on cognitive wireless network, and considering the shortcomings of traditional relay cooperative NOMA system, this paper mainly analyzes the eavesdropping channel model of multi-user CR-NOMA system and derives the expressions of system security and rate to improve the security performance of CR-NOMA system. The basic idea of DC planning algorithm and the scheme of sub-carrier power allocation to improve the transmission security of the system were introduced. An algorithm for DC-CR-NOMA was proposed to maximize the SSR of the system and minimize the energy loss. The simulation results show that under the same complexity, the security and speed of the system can be greatly improved compared with the traditional scheme.展开更多
Wireless Mesh Networks (WMNs) are vulnerable to various security threats because of their special infrastructure and communication mode, wherein insider attacks are the most challenging issue. To address this problem ...Wireless Mesh Networks (WMNs) are vulnerable to various security threats because of their special infrastructure and communication mode, wherein insider attacks are the most challenging issue. To address this problem and protect innocent users from malicious attacks, it is important to encourage cooperation and deter malicious behaviors. Reputation systems constitute a major category of techniques used for managing trust in distributed networks, and they are effective in characterizing and quantifying a node's behavior for WMNs. However, conventional layered reputation mechanisms ignore several key factors of reputation in other layers; therefore, they cannot provide optimal performance and accurate malicious node identification and isolation for WMNs. In this paper, we propose a novel dynamic reputation mechanism, SLCRM, which couples reputation systems with a cross-layer design and node-security-rating classification techniques to dynamically detect and restrict insider attacks. Simulation results show that in terms of network throughput, packet delivery ratio, malicious nodes identification, and success rates, SLCRM implements security protection against insider attacks in a more dynamic, effective, and efficient manner than the subjective logic and uncertainty-based reputation model and the familiarity-based reputation model.展开更多
This study proposes a tractable approach to analyze the physical-layer security in the downlink of a multi-tier heterogeneous cellular network. This method is based on stochastic geometry, has low computational comple...This study proposes a tractable approach to analyze the physical-layer security in the downlink of a multi-tier heterogeneous cellular network. This method is based on stochastic geometry, has low computational complexity, and uses the two-dimensional Poisson point process to model the locations of K-tier base stations and receivers, including those of legitimate users and eavesdroppers. Then, the achievable secrecy rates for an arbitrary user are determined and the upper and lower bounds of secrecy coverage probability derived on the condition that cross-tier interference is the main contributor to aggregate interference. Finally, our analysis results reveal the innate connections between information-theoretic security and the spatial densities of legitimate and malicious nodes.展开更多
In RFID(Radio Frequency IDentification)system,when multiple tags are in the operating range of one reader and send their information to the reader simultaneously,the signals of these tags are superimposed in the air,w...In RFID(Radio Frequency IDentification)system,when multiple tags are in the operating range of one reader and send their information to the reader simultaneously,the signals of these tags are superimposed in the air,which results in a collision and leads to the degrading of tags identifying efficiency.To improve the multiple tags’identifying efficiency due to collision,a physical layer network coding based binary search tree algorithm(PNBA)is proposed in this paper.PNBA pushes the conflicting signal information of multiple tags into a stack,which is discarded by the traditional anti-collision algorithm.In addition,physical layer network coding is exploited by PNBA to obtain unread tag information through the decoding operation of physical layer network coding using the conflicting information in the stack.Therefore,PNBA reduces the number of interactions between reader and tags,and improves the tags identification efficiency.Theoretical analysis and simulation results using MATLAB demonstrate that PNBA reduces the number of readings,and improve RFID identification efficiency.Especially,when the number of tags to be identified is 100,the average needed reading number of PNBA is 83%lower than the basic binary search tree algorithm,43%lower than reverse binary search tree algorithm,and its reading efficiency reaches 0.93.展开更多
To integrate the satellite communications with the LTE/5G services, the concept of Hybrid Satellite Terrestrial Relay Networks(HSTRNs) has been proposed. In this paper, we investigate the secure transmission in a HSTR...To integrate the satellite communications with the LTE/5G services, the concept of Hybrid Satellite Terrestrial Relay Networks(HSTRNs) has been proposed. In this paper, we investigate the secure transmission in a HSTRN where the eavesdropper can wiretap the transmitted messages from both the satellite and the intermediate relays. To effectively protect the message from wiretapping in these two phases, we consider cooperative jamming by the relays, where the jamming signals are optimized to maximize the secrecy rate under the total power constraint of relays. In the first phase, the Maximal Ratio Transmission(MRT) scheme is used to maximize the secrecy rate, while in the second phase, by interpolating between the sub-optimal MRT scheme and the null-space projection scheme, the optimal scheme can be obtained via an efficient one-dimensional searching method. Simulation results show that when the number of cooperative relays is small, the performance of the optimal scheme significantly outperforms that of MRT and null-space projection scheme. When the number of relays increases, the performance of the null-space projection approaches that of the optimal one.展开更多
In multi-layer satellite-terrestrial network, Contact Graph Routing(CGR) uses the contact information among satellites to compute routes. However, due to the resource constraints in satellites, it is extravagant to co...In multi-layer satellite-terrestrial network, Contact Graph Routing(CGR) uses the contact information among satellites to compute routes. However, due to the resource constraints in satellites, it is extravagant to configure lots of the potential contacts into contact plans. What's more, a huge contact plan makes the computing more complex, which further increases computing time. As a result, how to design an efficient contact plan becomes crucial for multi-layer satellite network, which usually has a large scaled topology. In this paper, we propose a distributed contact plan design scheme for multi-layer satellite network by dividing a large contact plan into several partial parts. Meanwhile, a duration based inter-layer contact selection algorithm is proposed to handle contacts disruption problem. The performance of the proposed design was evaluated on our Identifier/Locator split based satellite-terrestrial network testbed with 79 simulation nodes. Experiments showed that the proposed design is able to reduce the data delivery delay.展开更多
To increase airspace capacity, alleviate flight delay,and improve network robustness, an optimization method ofmulti-layer air transportation networks is put forward based onLaplacian energy maximization. The effectiv...To increase airspace capacity, alleviate flight delay,and improve network robustness, an optimization method ofmulti-layer air transportation networks is put forward based onLaplacian energy maximization. The effectiveness of takingLaplacian energy as a measure of network robustness isvalidated through numerical experiments. The flight routesaddificm optimization model is proposed with the principle ofmaximizing Laplacian energy. Three methods including thedepth-first search (DFS) algorithm, greedy algorithm andMonte-Carlo tree search (MCTS) algorithm are applied tosolve the proposed problem. The trade-off between systemperformance and computational efficiency is compared throughsimulation experiments. Finally, a case study on Chineseairport network (CAN) is conducted using the proposedmodel. Through encapsulating it into multi-layer infrastructurevia k-core decomposition algorithm, Laplacian energymaximization for the sub-networks is discussed which canprovide a useful tool for the decision-makers to optimize therobustness of the air transoortation network on different scales.展开更多
This paper explores the intra-layer synchronization in duplex networks with different topologies within layers and different inner coupling patterns between, within, and across layers. Based on the Lyapunov stability ...This paper explores the intra-layer synchronization in duplex networks with different topologies within layers and different inner coupling patterns between, within, and across layers. Based on the Lyapunov stability method, we prove theoretically that the duplex network can achieve intra-layer synchronization under some appropriate conditions, and give the thresholds of coupling strength within layers for different types of inner coupling matrices across layers. Interestingly,for a certain class of coupling matrices across layers, it needs larger coupling strength within layers to ensure the intra-layer synchronization when the coupling strength across layers become larger, intuitively opposing the fact that the intra-layer synchronization is seemly independent of the coupling strength across layers. Finally, numerical simulations further verify the theoretical results.展开更多
In order to improve the physical layer security of the device-to-device(D2D)cellular network,we propose a collaborative scheme for the transmit antenna selection and the optimal D2D pair establishment based on deep le...In order to improve the physical layer security of the device-to-device(D2D)cellular network,we propose a collaborative scheme for the transmit antenna selection and the optimal D2D pair establishment based on deep learning.Due to the mobility of users,using the current channel state information to select a transmit antenna or establish a D2D pair for the next time slot cannot ensure secure communication.Therefore,in this paper,we utilize the Echo State Network(ESN)to select the transmit antenna and the Long Short-Term Memory(LSTM)to establish the D2D pair.The simulation results show that the LSTMbased and ESN-based collaboration scheme can effectively improve the security capacity of the cellular network with D2D and increase the life of the base station.展开更多
It is unpractical to learn the optimal structure of a big Bayesian network(BN)by exhausting the feasible structures,since the number of feasible structures is super exponential on the number of nodes.This paper propos...It is unpractical to learn the optimal structure of a big Bayesian network(BN)by exhausting the feasible structures,since the number of feasible structures is super exponential on the number of nodes.This paper proposes an approach to layer nodes of a BN by using the conditional independence testing.The parents of a node layer only belong to the layer,or layers who have priority over the layer.When a set of nodes has been layered,the number of feasible structures over the nodes can be remarkably reduced,which makes it possible to learn optimal BN structures for bigger sizes of nodes by accurate algorithms.Integrating the dynamic programming(DP)algorithm with the layering approach,we propose a hybrid algorithm—layered optimal learning(LOL)to learn BN structures.Benefitted by the layering approach,the complexity of the DP algorithm reduces to O(ρ2^n?1)from O(n2^n?1),whereρ<n.Meanwhile,the memory requirements for storing intermediate results are limited to O(C k#/k#^2 )from O(Cn/n^2 ),where k#<n.A case study on learning a standard BN with 50 nodes is conducted.The results demonstrate the superiority of the LOL algorithm,with respect to the Bayesian information criterion(BIC)score criterion,over the hill-climbing,max-min hill-climbing,PC,and three-phrase dependency analysis algorithms.展开更多
Discusses the application of artificial neural network for MIROSOT, introduces a layered model of BP network of soccer robot for learning basic behavior and cooperative behavior, and concludes from experimental result...Discusses the application of artificial neural network for MIROSOT, introduces a layered model of BP network of soccer robot for learning basic behavior and cooperative behavior, and concludes from experimental results that the model is effective.展开更多
A layered network model for optical transport networks is proposed in this paper,which involves Internet Protocol(IP) ,Synchronous Digital Hierarchy(SDH) and Wavelength Division Mul-tiplexing(WDM) layers. The strategy...A layered network model for optical transport networks is proposed in this paper,which involves Internet Protocol(IP) ,Synchronous Digital Hierarchy(SDH) and Wavelength Division Mul-tiplexing(WDM) layers. The strategy of Dynamic Joint Routing and Resource Allocation(DJRRA) and its algorithm description are also presented for the proposed layered network model. DJRRA op-timizes the bandwidth usage of interface links between different layers and the logic links inside all layers. The simulation results show that DJRRA can reduce the blocking probability and increase network throughput effectively,which is in contrast to the classical separate sequential routing and resource allocation solutions.展开更多
This paper describes the deployment optimization technology and the cross-layer design of a surveil-lance WSN system applied in relic protection.Facing the typical technical challenges in the applicationcontext of rel...This paper describes the deployment optimization technology and the cross-layer design of a surveil-lance WSN system applied in relic protection.Facing the typical technical challenges in the applicationcontext of relic protection,we firstly propose a deployment technology based on ant colony optimization al-gorithm(DT-ACO)to overcome the difficulties in communication connectivity and sensing coverage.Meanwhile,DT-ACO minimizes the overall cost of the system as much as possible.Secondly we proposea novel power-aware cross-layer scheme(PACS)to facilitate adjustable system lifetime and surveillanceaccuracy.The performance analysis shows that we achieve lower device cost,significant extension of thesystem lifetime and improvement on the data delivery rate compared with the traditional methods.展开更多
Artificial neural networks (ANN), being a sophisticated type of information processing system by imitating the neural system of human brain, can be used to investigate the effects of concentration of flux solution, te...Artificial neural networks (ANN), being a sophisticated type of information processing system by imitating the neural system of human brain, can be used to investigate the effects of concentration of flux solution, temperature of liquid aluminium, temperture of tools and pressure on thickness of the intermetallic layer at the interface between steel and aluminium under solid-liquid pressure bonding of steel and aluminium perfectly. The optimum thickness has been determined according to the value of the optimum shearing strength.展开更多
We investigate the problem of how to minimize the energy consumption in multi-hop Wireless Sensor Network (WSN),under the constraint of end-to-end reliability Quality of Seervice (QoS) requirement.Based on the investi...We investigate the problem of how to minimize the energy consumption in multi-hop Wireless Sensor Network (WSN),under the constraint of end-to-end reliability Quality of Seervice (QoS) requirement.Based on the investigation,we jointly consider the routing,relay selection and power allocation algorithm,and present a novel distributed cross-layer strategy using opportunistic relaying scheme for cooperative communication.The results show that under the same QoS requirement,the proposed cross-layer strategy performs better than other cross-layer cooperative communication algorithms in energy efficiency.We also investigated the impact of several parameters on the energy efficiency of the cooperative communication in WSNs,thus can be used to provide guidelines to decide when and how to apply cooperation for a given setup.展开更多
A kind of second order algorithm--recursive approximate Newton algorithm was given by Karayiannis. The algorithm was simplified when it was formulated. Especially, the simplification to matrix Hessian was very reluct...A kind of second order algorithm--recursive approximate Newton algorithm was given by Karayiannis. The algorithm was simplified when it was formulated. Especially, the simplification to matrix Hessian was very reluctant, which led to the loss of valuable information and affected performance of the algorithm to certain extent. For multi layer feed forward neural networks, the second order back propagation recursive algorithm based generalized cost criteria was proposed. It is proved that it is equivalent to Newton recursive algorithm and has a second order convergent rate. The performance and application prospect are analyzed. Lots of simulation experiments indicate that the calculation of the new algorithm is almost equivalent to the recursive least square multiple algorithm. The algorithm and selection of networks parameters are significant and the performance is more excellent than BP algorithm and the second order learning algorithm that was given by Karayiannis.展开更多
In this paper,we study cross-layer scheduling scheme on multimedia application which considers both streaming traffic and data traffic over cognitive ad hoc networks.A cross-layer design is proposed to optimize SU'...In this paper,we study cross-layer scheduling scheme on multimedia application which considers both streaming traffic and data traffic over cognitive ad hoc networks.A cross-layer design is proposed to optimize SU's utility,which is used as an approach to balance the transmission efficiency and heterogeneous traffic in cognitive ad hoc networks.A framework is provided for utility-based optimal subcarrier assignment,power allocation strategy and corresponding modulation scheme,subject to the interference threshold to primary user(PU) and total transmit power constraint.Bayesian learning is adopted in subcarrier allocation strategy to avoid collision and alleviate the burden of information exchange on limited common control channel(CCC).In addition,the M/G/l queuing model is also introduced to analyze the expected delay of streaming traffic.Numerical results are given to demonstrate that the proposed scheme significantly reduces the blocking probability and outperforms the mentioned single-channel dynamic resource scheduling by almost 8%in term of system utility.展开更多
基金supported by the National Natural Science Foundation of China (U1834211, 61925302, 62103033)the Open Research Fund of the State Key Laboratory for Management and Control of Complex Systems (20210104)。
文摘High-speed rail(HSR) has formed a networked operational scale in China. Any internal or external disturbance may deviate trains’ operation from the planned schedules, resulting in primary delays or even cascading delays on a network scale. Studying the delay propagation mechanism could help to improve the timetable resilience in the planning stage and realize cooperative rescheduling for dispatchers. To quickly and effectively predict the spatial-temporal range of cascading delays, this paper proposes a max-plus algebra based delay propagation model considering trains’ operation strategy and the systems’ constraints. A double-layer network based breadth-first search algorithm based on the constraint network and the timetable network is further proposed to solve the delay propagation process for different kinds of emergencies. The proposed model could deal with the delay propagation problem when emergencies occur in sections or stations and is suitable for static emergencies and dynamic emergencies. Case studies show that the proposed algorithm can significantly improve the computational efficiency of the large-scale HSR network. Moreover, the real operational data of China HSR is adopted to verify the proposed model, and the results show that the cascading delays can be timely and accurately inferred, and the delay propagation characteristics under three kinds of emergencies are unfolded.
文摘Buses and subways are essential to urban public transportation systems and an important engine for activating high-quality urban development. Traditional multi-modal transportation networks focus on the structural feature mining of single-layer networks or each layer, ignoring the structural association of multi-layer networks. In this paper, we examined the multi-layer structural property of the bus-subway network of Shanghai at both global and nodal scales. A dual-layer model of the city’s bus and subway system was built. Single-layer complex network indicators were also extended. The paper also explored the spatial coupling properties of the city’s bus and subway system and identified its primary traffic nodes. It was found that 1) the dual-layer network increased the network’s connectivity to a certain extent and broke through the spatial limitation in terms of physical structure, making the connection between any two locations more direct. 2) The dual-layer network changed the topological characteristics of the transit network, increasing the centrality value and bit order in degree centrality, betweenness centrality, and closeness centrality to different degrees, and making each centrality tend to converge to the city center in spatial distribution. Enhancing the management of critical network nodes would help the integrated public transportation system operate more effectively and provide higher-quality services.
文摘The lethal brain tumor “Glioblastoma” has the propensity to grow over time. To improve patient outcomes, it is essential to classify GBM accurately and promptly in order to provide a focused and individualized treatment plan. Despite this, deep learning methods, particularly Convolutional Neural Networks (CNNs), have demonstrated a high level of accuracy in a myriad of medical image analysis applications as a result of recent technical breakthroughs. The overall aim of the research is to investigate how CNNs can be used to classify GBMs using data from medical imaging, to improve prognosis precision and effectiveness. This research study will demonstrate a suggested methodology that makes use of the CNN architecture and is trained using a database of MRI pictures with this tumor. The constructed model will be assessed based on its overall performance. Extensive experiments and comparisons with conventional machine learning techniques and existing classification methods will also be made. It will be crucial to emphasize the possibility of early and accurate prediction in a clinical workflow because it can have a big impact on treatment planning and patient outcomes. The paramount objective is to not only address the classification challenge but also to outline a clear pathway towards enhancing prognosis precision and treatment effectiveness.
文摘With the rapid development of the Internet of Things (IoT), non-Orthogonal Multiple Access (NOMA) technology and cognitive wireless network are two promising technologies to improve the spectral efficiency of the system, which have been widely concerned in the field of wireless communication. However, due to the importance of ownership and privacy protection, the IoT system must provide corresponding security mechanisms. From the perspective of improving the transmission security of CR-NOMA system based on cognitive wireless network, and considering the shortcomings of traditional relay cooperative NOMA system, this paper mainly analyzes the eavesdropping channel model of multi-user CR-NOMA system and derives the expressions of system security and rate to improve the security performance of CR-NOMA system. The basic idea of DC planning algorithm and the scheme of sub-carrier power allocation to improve the transmission security of the system were introduced. An algorithm for DC-CR-NOMA was proposed to maximize the SSR of the system and minimize the energy loss. The simulation results show that under the same complexity, the security and speed of the system can be greatly improved compared with the traditional scheme.
基金supported by the Program for Changjiang Scholars and Innovative Research Team in University under Grant No.IRT1078the Key Program of NSFC-Guangdong Union Foundation under Grant No.U1135002+1 种基金Major National S&T Program under Grant No.2011ZX03005-002the Fundamental Research Funds for the Central Universities under Grant No.JY10000903001
文摘Wireless Mesh Networks (WMNs) are vulnerable to various security threats because of their special infrastructure and communication mode, wherein insider attacks are the most challenging issue. To address this problem and protect innocent users from malicious attacks, it is important to encourage cooperation and deter malicious behaviors. Reputation systems constitute a major category of techniques used for managing trust in distributed networks, and they are effective in characterizing and quantifying a node's behavior for WMNs. However, conventional layered reputation mechanisms ignore several key factors of reputation in other layers; therefore, they cannot provide optimal performance and accurate malicious node identification and isolation for WMNs. In this paper, we propose a novel dynamic reputation mechanism, SLCRM, which couples reputation systems with a cross-layer design and node-security-rating classification techniques to dynamically detect and restrict insider attacks. Simulation results show that in terms of network throughput, packet delivery ratio, malicious nodes identification, and success rates, SLCRM implements security protection against insider attacks in a more dynamic, effective, and efficient manner than the subjective logic and uncertainty-based reputation model and the familiarity-based reputation model.
基金supported in part by National Natural Science Foundation of China under Grant No.61401510,61521003National High-tech R&D Program(863 Program)under Grant No.2015AA01A708
文摘This study proposes a tractable approach to analyze the physical-layer security in the downlink of a multi-tier heterogeneous cellular network. This method is based on stochastic geometry, has low computational complexity, and uses the two-dimensional Poisson point process to model the locations of K-tier base stations and receivers, including those of legitimate users and eavesdroppers. Then, the achievable secrecy rates for an arbitrary user are determined and the upper and lower bounds of secrecy coverage probability derived on the condition that cross-tier interference is the main contributor to aggregate interference. Finally, our analysis results reveal the innate connections between information-theoretic security and the spatial densities of legitimate and malicious nodes.
基金the National Natural Science Foundation of China under Grant 61502411Natural Science Foundation of Jiangsu Province under Grant BK20150432 and BK20151299+7 种基金Natural Science Research Project for Universities of Jiangsu Province under Grant 15KJB520034China Postdoctoral Science Foundation under Grant 2015M581843Jiangsu Provincial Qinglan ProjectTeachers Overseas Study Program of Yancheng Institute of TechnologyJiangsu Provincial Government Scholarship for Overseas StudiesTalents Project of Yancheng Institute of Technology under Grant KJC2014038“2311”Talent Project of Yancheng Institute of TechnologyOpen Fund of Modern Agricultural Resources Intelligent Management and Application Laboratory of Huzhou Normal University.
文摘In RFID(Radio Frequency IDentification)system,when multiple tags are in the operating range of one reader and send their information to the reader simultaneously,the signals of these tags are superimposed in the air,which results in a collision and leads to the degrading of tags identifying efficiency.To improve the multiple tags’identifying efficiency due to collision,a physical layer network coding based binary search tree algorithm(PNBA)is proposed in this paper.PNBA pushes the conflicting signal information of multiple tags into a stack,which is discarded by the traditional anti-collision algorithm.In addition,physical layer network coding is exploited by PNBA to obtain unread tag information through the decoding operation of physical layer network coding using the conflicting information in the stack.Therefore,PNBA reduces the number of interactions between reader and tags,and improves the tags identification efficiency.Theoretical analysis and simulation results using MATLAB demonstrate that PNBA reduces the number of readings,and improve RFID identification efficiency.Especially,when the number of tags to be identified is 100,the average needed reading number of PNBA is 83%lower than the basic binary search tree algorithm,43%lower than reverse binary search tree algorithm,and its reading efficiency reaches 0.93.
基金supported in part by the National Natural Science Foundation of China under Grant No.61871032in part by Chinese Ministry of Education-China Mobile Communication Corporation Research Fund under Grant MCM20170101in part by the Open Research Fund of Key Laboratory of Cognitive Radio and Information Processing,Ministry of Education (Guilin University of Electronic Technology) under Grant CRKL190204
文摘To integrate the satellite communications with the LTE/5G services, the concept of Hybrid Satellite Terrestrial Relay Networks(HSTRNs) has been proposed. In this paper, we investigate the secure transmission in a HSTRN where the eavesdropper can wiretap the transmitted messages from both the satellite and the intermediate relays. To effectively protect the message from wiretapping in these two phases, we consider cooperative jamming by the relays, where the jamming signals are optimized to maximize the secrecy rate under the total power constraint of relays. In the first phase, the Maximal Ratio Transmission(MRT) scheme is used to maximize the secrecy rate, while in the second phase, by interpolating between the sub-optimal MRT scheme and the null-space projection scheme, the optimal scheme can be obtained via an efficient one-dimensional searching method. Simulation results show that when the number of cooperative relays is small, the performance of the optimal scheme significantly outperforms that of MRT and null-space projection scheme. When the number of relays increases, the performance of the null-space projection approaches that of the optimal one.
基金supported by National High Technology of China ("863 program") under Grant No. 2015AA015702NSAF under Grant No. U1530118+1 种基金NSFC under Grant No. 61602030National Basic Research Program of China ("973 program") under Grant No. 2013CB329101
文摘In multi-layer satellite-terrestrial network, Contact Graph Routing(CGR) uses the contact information among satellites to compute routes. However, due to the resource constraints in satellites, it is extravagant to configure lots of the potential contacts into contact plans. What's more, a huge contact plan makes the computing more complex, which further increases computing time. As a result, how to design an efficient contact plan becomes crucial for multi-layer satellite network, which usually has a large scaled topology. In this paper, we propose a distributed contact plan design scheme for multi-layer satellite network by dividing a large contact plan into several partial parts. Meanwhile, a duration based inter-layer contact selection algorithm is proposed to handle contacts disruption problem. The performance of the proposed design was evaluated on our Identifier/Locator split based satellite-terrestrial network testbed with 79 simulation nodes. Experiments showed that the proposed design is able to reduce the data delivery delay.
基金The National Natural Science Foundation of China(No.61573098,71401072)the Natural Science Foundation of Jiangsu Province(No.BK20130814)
文摘To increase airspace capacity, alleviate flight delay,and improve network robustness, an optimization method ofmulti-layer air transportation networks is put forward based onLaplacian energy maximization. The effectiveness of takingLaplacian energy as a measure of network robustness isvalidated through numerical experiments. The flight routesaddificm optimization model is proposed with the principle ofmaximizing Laplacian energy. Three methods including thedepth-first search (DFS) algorithm, greedy algorithm andMonte-Carlo tree search (MCTS) algorithm are applied tosolve the proposed problem. The trade-off between systemperformance and computational efficiency is compared throughsimulation experiments. Finally, a case study on Chineseairport network (CAN) is conducted using the proposedmodel. Through encapsulating it into multi-layer infrastructurevia k-core decomposition algorithm, Laplacian energymaximization for the sub-networks is discussed which canprovide a useful tool for the decision-makers to optimize therobustness of the air transoortation network on different scales.
基金Project supported in part by the National Natural Science Foundation of China(Grant Nos.61573004 and 11501221)the Promotion Program for Young and Middle-aged Teacher in Science and Technology Research of Huaqiao University(Grant No.ZQN-YX301)+1 种基金the Program for New Century Excellent Talents in Fujian Province University in 2016the Project of Education and Scientific Research for Middle and Young Teachers in Fujian Province,China(Grant Nos.JAT170027 and JA15030)
文摘This paper explores the intra-layer synchronization in duplex networks with different topologies within layers and different inner coupling patterns between, within, and across layers. Based on the Lyapunov stability method, we prove theoretically that the duplex network can achieve intra-layer synchronization under some appropriate conditions, and give the thresholds of coupling strength within layers for different types of inner coupling matrices across layers. Interestingly,for a certain class of coupling matrices across layers, it needs larger coupling strength within layers to ensure the intra-layer synchronization when the coupling strength across layers become larger, intuitively opposing the fact that the intra-layer synchronization is seemly independent of the coupling strength across layers. Finally, numerical simulations further verify the theoretical results.
基金supported in part by the Aerospace Science and Technology Innovation Fund of China Aerospace Science and Technology Corporationin part by the Shanghai Aerospace Science and Technology Innovation Fund (No. SAST2018045, SAST2016034, SAST2017049)+1 种基金in part by the China Fundamental Research Fund for the Central Universities (No. 3102018QD096)in part by the Seed Foundation of Innovation and Creation for Graduate Students in Northwestern Polytechnical University (No. ZZ2019024)
文摘In order to improve the physical layer security of the device-to-device(D2D)cellular network,we propose a collaborative scheme for the transmit antenna selection and the optimal D2D pair establishment based on deep learning.Due to the mobility of users,using the current channel state information to select a transmit antenna or establish a D2D pair for the next time slot cannot ensure secure communication.Therefore,in this paper,we utilize the Echo State Network(ESN)to select the transmit antenna and the Long Short-Term Memory(LSTM)to establish the D2D pair.The simulation results show that the LSTMbased and ESN-based collaboration scheme can effectively improve the security capacity of the cellular network with D2D and increase the life of the base station.
基金supported by the National Natural Science Foundation of China(61573285)
文摘It is unpractical to learn the optimal structure of a big Bayesian network(BN)by exhausting the feasible structures,since the number of feasible structures is super exponential on the number of nodes.This paper proposes an approach to layer nodes of a BN by using the conditional independence testing.The parents of a node layer only belong to the layer,or layers who have priority over the layer.When a set of nodes has been layered,the number of feasible structures over the nodes can be remarkably reduced,which makes it possible to learn optimal BN structures for bigger sizes of nodes by accurate algorithms.Integrating the dynamic programming(DP)algorithm with the layering approach,we propose a hybrid algorithm—layered optimal learning(LOL)to learn BN structures.Benefitted by the layering approach,the complexity of the DP algorithm reduces to O(ρ2^n?1)from O(n2^n?1),whereρ<n.Meanwhile,the memory requirements for storing intermediate results are limited to O(C k#/k#^2 )from O(Cn/n^2 ),where k#<n.A case study on learning a standard BN with 50 nodes is conducted.The results demonstrate the superiority of the LOL algorithm,with respect to the Bayesian information criterion(BIC)score criterion,over the hill-climbing,max-min hill-climbing,PC,and three-phrase dependency analysis algorithms.
文摘Discusses the application of artificial neural network for MIROSOT, introduces a layered model of BP network of soccer robot for learning basic behavior and cooperative behavior, and concludes from experimental results that the model is effective.
基金the Science & Technology Foundation of Huawei Ltd. (No.YJCB2005040SW)the Creative Foundation of Xidian University (No.05030).
文摘A layered network model for optical transport networks is proposed in this paper,which involves Internet Protocol(IP) ,Synchronous Digital Hierarchy(SDH) and Wavelength Division Mul-tiplexing(WDM) layers. The strategy of Dynamic Joint Routing and Resource Allocation(DJRRA) and its algorithm description are also presented for the proposed layered network model. DJRRA op-timizes the bandwidth usage of interface links between different layers and the logic links inside all layers. The simulation results show that DJRRA can reduce the blocking probability and increase network throughput effectively,which is in contrast to the classical separate sequential routing and resource allocation solutions.
基金Supported by the National High Technology Research and Development Programme of China ( No. 2006AA01Z215)the National Natural Science Foundation of China (No. 60572060+2 种基金 60533110)the National Basic Research Program of China (973)( No. 2006CB303000)the CAS Innovation Proiect (No. KGCX2-YW-110-3)
文摘This paper describes the deployment optimization technology and the cross-layer design of a surveil-lance WSN system applied in relic protection.Facing the typical technical challenges in the applicationcontext of relic protection,we firstly propose a deployment technology based on ant colony optimization al-gorithm(DT-ACO)to overcome the difficulties in communication connectivity and sensing coverage.Meanwhile,DT-ACO minimizes the overall cost of the system as much as possible.Secondly we proposea novel power-aware cross-layer scheme(PACS)to facilitate adjustable system lifetime and surveillanceaccuracy.The performance analysis shows that we achieve lower device cost,significant extension of thesystem lifetime and improvement on the data delivery rate compared with the traditional methods.
文摘Artificial neural networks (ANN), being a sophisticated type of information processing system by imitating the neural system of human brain, can be used to investigate the effects of concentration of flux solution, temperature of liquid aluminium, temperture of tools and pressure on thickness of the intermetallic layer at the interface between steel and aluminium under solid-liquid pressure bonding of steel and aluminium perfectly. The optimum thickness has been determined according to the value of the optimum shearing strength.
基金Supported by the 100 Top-Talents Program of Chinese Academic of Sciences (No. 99M2008M02)
文摘We investigate the problem of how to minimize the energy consumption in multi-hop Wireless Sensor Network (WSN),under the constraint of end-to-end reliability Quality of Seervice (QoS) requirement.Based on the investigation,we jointly consider the routing,relay selection and power allocation algorithm,and present a novel distributed cross-layer strategy using opportunistic relaying scheme for cooperative communication.The results show that under the same QoS requirement,the proposed cross-layer strategy performs better than other cross-layer cooperative communication algorithms in energy efficiency.We also investigated the impact of several parameters on the energy efficiency of the cooperative communication in WSNs,thus can be used to provide guidelines to decide when and how to apply cooperation for a given setup.
文摘A kind of second order algorithm--recursive approximate Newton algorithm was given by Karayiannis. The algorithm was simplified when it was formulated. Especially, the simplification to matrix Hessian was very reluctant, which led to the loss of valuable information and affected performance of the algorithm to certain extent. For multi layer feed forward neural networks, the second order back propagation recursive algorithm based generalized cost criteria was proposed. It is proved that it is equivalent to Newton recursive algorithm and has a second order convergent rate. The performance and application prospect are analyzed. Lots of simulation experiments indicate that the calculation of the new algorithm is almost equivalent to the recursive least square multiple algorithm. The algorithm and selection of networks parameters are significant and the performance is more excellent than BP algorithm and the second order learning algorithm that was given by Karayiannis.
基金This work was supported by the National Natural Science Foundations of China (Grant No. 61201143), the Fundamental Research Fund for the Central Universities (Grant No. HIT. NSRIF. 2010091), the National Science Foundation for Post-doctoral Scientists of China (Grant No. 2012M510956), and the Post-doc- toral Fund of Heilongjiang Province (GrantNo. LBHZ11128).
文摘In this paper,we study cross-layer scheduling scheme on multimedia application which considers both streaming traffic and data traffic over cognitive ad hoc networks.A cross-layer design is proposed to optimize SU's utility,which is used as an approach to balance the transmission efficiency and heterogeneous traffic in cognitive ad hoc networks.A framework is provided for utility-based optimal subcarrier assignment,power allocation strategy and corresponding modulation scheme,subject to the interference threshold to primary user(PU) and total transmit power constraint.Bayesian learning is adopted in subcarrier allocation strategy to avoid collision and alleviate the burden of information exchange on limited common control channel(CCC).In addition,the M/G/l queuing model is also introduced to analyze the expected delay of streaming traffic.Numerical results are given to demonstrate that the proposed scheme significantly reduces the blocking probability and outperforms the mentioned single-channel dynamic resource scheduling by almost 8%in term of system utility.