In order to support advanced vehicular Internet-of-Things(IoT)applications,information exchanges among different vehicles are required to find efficient solutions for catering to different application requirements in ...In order to support advanced vehicular Internet-of-Things(IoT)applications,information exchanges among different vehicles are required to find efficient solutions for catering to different application requirements in complex and dynamic vehicular environments.Federated learning(FL),which is a type of distributed learning technology,has been attracting great interest in recent years as it performs knowledge exchange among different network entities without a violation of user privacy.However,client selection and networking scheme for enabling FL in dynamic vehicular environments,which determines the communication delay between FL clients and the central server that aggregates the models received from the clients,is still under-explored.In this paper,we propose an edge computing-based joint client selection and networking scheme for vehicular IoT.The proposed scheme assigns some vehicles as edge vehicles by employing a distributed approach,and uses the edge vehicles as FL clients to conduct the training of local models,which learns optimal behaviors based on the interaction with environments.The clients also work as forwarder nodes in information sharing among network entities.The client selection takes into account the vehicle velocity,vehicle distribution,and the wireless link connectivity between vehicles using a fuzzy logic algorithm,resulting in an efficient learning and networking architecture.We use computer simulations to evaluate the proposed scheme in terms of the communication overhead and the information covered in learning.展开更多
The presentation method of the mechanical motion scheme must support thewhole process of conceptual design. To meet the requirement, a semantic network method is selectedto represent process level, action level, mecha...The presentation method of the mechanical motion scheme must support thewhole process of conceptual design. To meet the requirement, a semantic network method is selectedto represent process level, action level, mechanism level and relationships among them. Computeraided motion cycle chart exploration can be realized by the representation and revision of timecoordination of mechanism actions and their effect on the design scheme. The uncertain reasoningtechnology based on semantic network is applied in the mechanism types selection of the needledriving mechanism of industrial sewing mechanism, and the application indicated it is correct,useful and advance.展开更多
In IBVS (image based visual servoing), the error signal in image space should be transformed into the control signal in the input space quickly. To avoid the iterative adjustment and complicated inverse solution of im...In IBVS (image based visual servoing), the error signal in image space should be transformed into the control signal in the input space quickly. To avoid the iterative adjustment and complicated inverse solution of image Jacobian, CMAC (cerebellar model articulation controller) neural network is inserted into visual servo control loop to implement the nonlinear mapping. Two control schemes are used. Simulation results on two schemes are provided, which show a better tracking precision and stability can be achieved using scheme 2.展开更多
Network forensics is a security infrastructure,and becomes the research focus of forensic investigation.However many challenges still exist in conducting network forensics:network has produced large amounts of data;th...Network forensics is a security infrastructure,and becomes the research focus of forensic investigation.However many challenges still exist in conducting network forensics:network has produced large amounts of data;the comprehensibility of evidence extracting from collected data;the efficiency of evidence analysis methods,etc.To solve these problems,in this paper we develop a network intrusion forensics system based on transductive scheme that can detect and analyze efficiently computer crime in networked environments,and extract digital evidence automatically.At the end of the paper,we evaluate our method on a series of experiments on KDD Cup 1999 dataset.The results demonstrate that our methods are actually effective for real-time network forensics,and can provide comprehensible aid for a forensic expert.展开更多
To implement a quantificational evaluation for mechanical kinematic scheme more effectively,a multi-level and multi-objective evaluation model is presented using neural network and fuzzy theory. Firstly,the structure ...To implement a quantificational evaluation for mechanical kinematic scheme more effectively,a multi-level and multi-objective evaluation model is presented using neural network and fuzzy theory. Firstly,the structure of evaluation model is constructed according to evaluation indicator system. Then evaluation samples are generated and provided to train this model. Thus it can reflect the relation between attributive value and evaluation result,as well as the weight of evaluation indicator. Once evaluation indicators of each candidate are fuzzily quantified and fed into the trained network model,the corresponding evaluation result is outputted and the best alternative can be selected. Under this model,expert knowledge can be effectively acquired and expressed,and the quantificational evaluation can be implemented for kinematic scheme with multi-level evaluation indicator system. Several key problems on this model are discussed and an illustration has demonstrated that this model is feasible and can be regarded as a new idea for solving kinematic scheme evaluation.展开更多
Nowadays network virtualization is utterly popular.As a result,how to protect the virtual networks from attacking on the link is increasingly important.Existing schemes are mainly backup-based,which suffer from data l...Nowadays network virtualization is utterly popular.As a result,how to protect the virtual networks from attacking on the link is increasingly important.Existing schemes are mainly backup-based,which suffer from data loss and are helpless to such attacks like data tampering.To offer high security level,in this paper,we first propose a multipath and decision-making(MD) scheme which applies multipath simultaneously delivery and decision-making for protecting the virtual network.Considering different security requirement for virtual link,we devise a hybrid scheme to protect the virtual links.For the critical links,MD scheme is adopted.For the other links,we adopt the Shared Backup Scheme.Our simulation results indicate the proposed scheme can significantly increase the security level of the critical link high in the loss of less acceptance ratio.展开更多
The factual data on error of positioning in VRS GPS networks have been analyzed, where the mobile receiver is provided with VRS. The method of highly informative zone is suggested for removal of initial vagueness in s...The factual data on error of positioning in VRS GPS networks have been analyzed, where the mobile receiver is provided with VRS. The method of highly informative zone is suggested for removal of initial vagueness in selection of reference stations for purposes of development of VRS on the basis of minimum GPS network, composed of three reference stations. The recommendations on use of suggested method are given.展开更多
Research interest in sensor networks routing largely considers minimization of energy consumption as a major performance criterion to provide maximum sensors network lifetime. When considering energy conservation, rou...Research interest in sensor networks routing largely considers minimization of energy consumption as a major performance criterion to provide maximum sensors network lifetime. When considering energy conservation, routing protocols should also be designed to achieve fault tolerance in communications. Moreover, due to dynamic topology and random deployment, incorporating reliability into protocols for WSNs is very important. Hence, we propose an improved scalable clustering-based load balancing scheme (SCLB) in this paper. In SCLB scheme, scalability is achieved by dividing the network into overlapping multihop clusters each with its own cluster head node. Simulation results show that the proposed scheme achieves longer network lifetime with desirable reliability at the initial state compare with the existing multihop load balancing approach.展开更多
Nodes cooperation is a significant prerequisite for the realization of the relaying Ad Hoc.While with the development of multi-hop cellular networks, how to stimulate intermediate nodes to do the packet-forwarding des...Nodes cooperation is a significant prerequisite for the realization of the relaying Ad Hoc.While with the development of multi-hop cellular networks, how to stimulate intermediate nodes to do the packet-forwarding deserves more concerning.At present research,the incentive schemes in pure Ad Hoc and multi-hop cellular networks are analyzed and compared to classify the strengths and drawbacks of each scheme.We explain in particular what the key issues are to implement incentive schemes for cooperation. Finally,an incentive scheme based on integration of reputation and charging systems is proposed not only to block the existence of selfish nodes,but to satisfy the rational requirement of nodes.展开更多
Two significant issues in Internet-based networked control systems ( INCSs), transport performance of different protocols and security breach from Internet side, are investigated. First, for improving the performanc...Two significant issues in Internet-based networked control systems ( INCSs), transport performance of different protocols and security breach from Internet side, are investigated. First, for improving the performance of data transmission, user datagram protocol (UDP) is adopted as the main stand for controllers and plants using INCSs. Second, a dual-channel secure transmission scheme (DCSTS)based on data transmission characteristics of INCSs is proposed, in which a raw UDP channel and a secure TCP (transmission control protocol) connection making use of SSL/TLS (secure sockets layer/transport layer security) are included. Further, a networked control protocol (NCP) at application layer for supporting DCSTS between the controllers and plants in INCSs is designed, and it also aims at providing a universal communication mechanism for interoperability of devices among the networked control laboratories in Beijing Institute of Technology of China, Central South University of China and Tokyo University of Technology of Japan. By means of a networked single-degree-of-free- dom robot arm, an INCS under the new protocol and security environment is created. Compared with systems such as IPSec or SSL/TLS, which may cause more than 91% network throughput deduction, the new DCSTS protocol may yield results ten times better, being just 5.67%.展开更多
In this article,we introduce a new bi-directional dual-relay selection strategy with its bit error rate(BER)performance analysis.During the first step of the proposed strategy,two relays out of a set of N relay-nodes ...In this article,we introduce a new bi-directional dual-relay selection strategy with its bit error rate(BER)performance analysis.During the first step of the proposed strategy,two relays out of a set of N relay-nodes are selected in a way to optimize the system performance in terms of BER,based on the suggested algorithm which checks if the selected relays using the maxmin criterion are the best ones.In the second step,the chosen relay-nodes perform an orthogonal space-time coding scheme using the two-phase relaying protocol to establish a bi-directional communication between the communicating terminals,leading to a significant improvement in the achievable coding and diversity gain.To further improve the overall system performance,the selected relay-nodes apply also a digital network coding scheme.Furthermore,this paper discusses the analytical approximation of the BER performance of the proposed strategy,where we prove that the analytical results match almost perfectly the simulated ones.Finally,our simulation results show that the proposed strategy outperforms the current state-of-the-art ones.展开更多
In this paper, we propose a new attribute-based proxy re-encryption scheme, where a semi-trusted proxy, with some additional information, can transform a ciphertext under a set of attributes into a new ciphertext unde...In this paper, we propose a new attribute-based proxy re-encryption scheme, where a semi-trusted proxy, with some additional information, can transform a ciphertext under a set of attributes into a new ciphertext under another set of attributes on the same message, but not vice versa, furthermore, its security was proved in the standard model based on decisional bilinear Diffie-Hellman assumption. This scheme can be used to realize fine-grained selectively sharing of encrypted data, but the general proxy rencryption scheme severely can not do it, so the proposed schemecan be thought as an improvement of general traditional proxy re-encryption scheme.展开更多
Power grid vulnerability is a key issue with large blackouts, causing power disruption for millions of people. The complexity of power grid, together with excessive number of components, makes it difficult to be model...Power grid vulnerability is a key issue with large blackouts, causing power disruption for millions of people. The complexity of power grid, together with excessive number of components, makes it difficult to be modeled. Currently, researchers use complex networks to model and study the performance of power grids. In fact, power grids can be modeled into a complex network by making use of ring network topology, with substations and transmission lines denoted as nodes and edges, respectively. In this paper, three protection schemes are proposed and their effectiveness in protecting the power network under high and low-load attacks is studied. The proposed schemes, namely, Cascaded Load Cut-off (CLC), Cascaded Load Overflow (CLO) and Adaptive-Cascaded Load Overflow (A-CLO), improve the robustness of the power grids, i.e., decrease the value of critical tolerance. Simulation results show that CLC and CLO protection schemes are more effective in improving the robustness of networks than the A-CLO protection scheme. However, the CLC protection scheme is effective only at the expense that certain percentage of the network will have no power supply. Thus, results show that the CLO protection scheme dominates the other protection schemes, CLC and A-CLO, in terms of the robustness of the network, improved with the precise amount of load cut-off determined.展开更多
Rotman lens,which is a radio frequency beam-former that consists of multiple input and multiple output beam ports,can be used in industrial,scientific,and medical applications as a beam steering device.The input ports...Rotman lens,which is a radio frequency beam-former that consists of multiple input and multiple output beam ports,can be used in industrial,scientific,and medical applications as a beam steering device.The input ports collect the signals to be propagated through the lens cavity toward the output ports before being transmitted by the antenna arrays to the destination in order to enhance the error performance by optimizing the overall signal to noise ratio(SNR).In this article,a low-cost Rotman lens antenna is designed and deployed to enhance the overall performance of the conventional cooperative communication systems without needing any additional power,extra time or frequency slots.In the suggested system,the smart Rotman lens antennas generate a beam steering in the direction of the destination to maximize the received SNR at the destination by applying the proposed optimal beamforming technique.The suggested optimal beamforming technique enjoys high diversity,as well as,low encoding and decoding complexity.Furthermore,we proved the advantages of our suggested strategy through both theoretical results and simulations using Monte Carlo runs.The Monte Carlo simulations show that the suggested strategy enjoys better error performance compared to the current state-of-the-art distributed multiantenna strategies.In addition,the bit error rate(BER)curves drawn from the analytical results are closely matching to those drawn from our conducted Monte Carlo simulations.展开更多
Due to the increasing demand of energy and the need for nonconventional energy sources, distributed generation (DG) has come into play. The trend of unidirectional power flow has been gradually shifting. With new tech...Due to the increasing demand of energy and the need for nonconventional energy sources, distributed generation (DG) has come into play. The trend of unidirectional power flow has been gradually shifting. With new technology comes new challenges, the introduction of DG into the conventional power system brings various challenges;one of the major challenges is system protection under DG sources. These sources pose a significant challenge due to bidirectional flows from DGs as well as lower fault current contribution from inverter interfaced DGs. This paper reviews existing protection schemes that have been suggested for active distribution networks. Most of these protection strategies apply only to smaller distribution systems implying that they may need to be extended to larger systems with a much higher penetration of distributed generation. In the end, a potential protection scheme has also been recommended as a future work.展开更多
We investigate the synchronization of complex networks,which are impulsively coupled only at discrete instants.Based on the comparison theory of impulsive differential systems,a distributed impulsive control scheme is...We investigate the synchronization of complex networks,which are impulsively coupled only at discrete instants.Based on the comparison theory of impulsive differential systems,a distributed impulsive control scheme is proposed for complex dynamical networks to achieve synchronization.The proposed scheme not only takes into account the influence of all nodes to network synchronization,which depends on the weight of each node in the network,but also provides us with a flexible method to select the synchronized state of the network.In addition,it is unnecessary for the impulsive coupling matrix to be symmetrical.Finally,the proposed control scheme is applied to a chaotic Lorenz network and Chua's circuit network.Numerical simulations are used to illustrate the validity of this control scheme.展开更多
The ability of power system to survive the transition from preloading state to the gradual increase in load and thereafter reach an acceptable operational condition is an indication of transient stability of the syste...The ability of power system to survive the transition from preloading state to the gradual increase in load and thereafter reach an acceptable operational condition is an indication of transient stability of the system. The study analyzed load shedding scheme through the use of empirical measurement tools and load-flow simulation techniques. It was geared towards determining effective load shedding strategies to reduce unnecessary overload in order to achieve dynamic stability of the electric power network in the Export Free Trade Zone, Calabar, Nigeria. From the tests and the measurements taken, it was observed that the real and reactive powers from the generator and the mechanical power from the turbine engine were stable when the load shedding controller was switched on, as compared to when it was off. The engine speed, the bus-bar frequency and the output voltage of the generator stabilized within a shorter time (about 8 seconds) when the controller was switched on than when it was on the off condition. Also, there were noticeable fluctuations in the speed of the remaining two generators. It became stable at about 12 seconds after the loss. The variations were 0.3 per cent of the nominal speed value. The excitation voltage fluctuated from 1.2 (pu) to 4.5 (pu) when the bus voltage dipped as a result of additional load. It then came down and stabilized at 1.8 (pu) after few swings. This confirmed that the stability of power system is much enhanced when load shedding controllers are effectively configured on the network.展开更多
Efficient and reliable subcarrier power joint allocation is served as a promising problem in cognitive OFDM-based Cognitive Radio Networks (CRN). This paper focuses on optimal subcarrier allocation for OFDM-based CRN....Efficient and reliable subcarrier power joint allocation is served as a promising problem in cognitive OFDM-based Cognitive Radio Networks (CRN). This paper focuses on optimal subcarrier allocation for OFDM-based CRN. We mainly propose subcarrier allocation scheme denoted as Worst Subcarrier Avoiding Water-filling (WSAW), which is based on Rate Adaptive (RA) criterion and three constraints are considered in CRN. The algorithm divides the assignment procedure into two phases. The first phase is an initial subcarrier allocation based on the idea of avoiding selecting the worst subcarrier in order to maximize the transmission rate; while the second phase is an iterative adjustment process which is realized by swapping pairs of subcarriers between arbitrary users. The proposed scheme could assign subcarriers in accordance with channel coherence time. Hence, real time subcarrier allocation could be implemented. Simulation results show that, comparing with the similar existing algorithms, the proposed scheme could achieve larger capacity and a near-optimal BER performance.展开更多
There are various types of pyramid schemes that have inflicted or are inflicting losses on many people in the world.We propose a pyramid scheme model which has the principal characters of many pyramid schemes that hav...There are various types of pyramid schemes that have inflicted or are inflicting losses on many people in the world.We propose a pyramid scheme model which has the principal characters of many pyramid schemes that have appeared in recent years: promising high returns, rewarding the participants for recruiting the next generation of participants, and the organizer takes all of the money away when they find that the money from the new participants is not enough to pay the previous participants interest and rewards.We assume that the pyramid scheme is carried out in the tree network, Erd?s–Réney(ER) random network, Strogatz–Watts(SW) small-world network, or Barabasi–Albert(BA) scale-free network.We then give the analytical results of the generations that the pyramid scheme can last in these cases.We also use our model to analyze a pyramid scheme in the real world and we find that the connections between participants in the pyramid scheme may constitute a SW small-world network.展开更多
Sensor network basically has many intrinsic limitations such as energy consumption, sensor coverage and connectivity, and sensor processing capability. Tracking a moving target in clusters of sensor network online wit...Sensor network basically has many intrinsic limitations such as energy consumption, sensor coverage and connectivity, and sensor processing capability. Tracking a moving target in clusters of sensor network online with less complexity algorithm and computational burden is our ultimate goal. Particle filtering (PF) technique, augmenting handoff and K-means classification of measurement data, is proposed to tackle the tracking mission in a sensor network. The handoff decision, an alternative to multi-hop transmission, is implemented for switching between clusters of sensor nodes through received signal strength indication (RSSI) measurements. The measurements being used in particle filter processing are RSSI and time of arrival (TOA). While non-line-of-sight (NLOS) is the dominant bias in tracking estimation/accuracy, it can be easily resolved simply by incorporating K-means classification method in PF processing without any priori identification of LOS/NLOS. Simulation using clusters of sensor nodes in a sensor network is conducted. The dependency of tracking performance with computational cost versus number of particles used in PF processing is also investigated.展开更多
基金This research was supported in part by the National Natural Science Foundation of China under Grant No.62062031 and 61877053in part by Inner Mongolia natural science foundation grant number 2019MS06035,and Inner Mongolia Science and Technology Major Project,China+1 种基金in part by ROIS NII Open Collaborative Research 21S0601in part by JSPS KAKENHI grant numbers 18KK0279,19H04093,20H00592,and 21H03424.
文摘In order to support advanced vehicular Internet-of-Things(IoT)applications,information exchanges among different vehicles are required to find efficient solutions for catering to different application requirements in complex and dynamic vehicular environments.Federated learning(FL),which is a type of distributed learning technology,has been attracting great interest in recent years as it performs knowledge exchange among different network entities without a violation of user privacy.However,client selection and networking scheme for enabling FL in dynamic vehicular environments,which determines the communication delay between FL clients and the central server that aggregates the models received from the clients,is still under-explored.In this paper,we propose an edge computing-based joint client selection and networking scheme for vehicular IoT.The proposed scheme assigns some vehicles as edge vehicles by employing a distributed approach,and uses the edge vehicles as FL clients to conduct the training of local models,which learns optimal behaviors based on the interaction with environments.The clients also work as forwarder nodes in information sharing among network entities.The client selection takes into account the vehicle velocity,vehicle distribution,and the wireless link connectivity between vehicles using a fuzzy logic algorithm,resulting in an efficient learning and networking architecture.We use computer simulations to evaluate the proposed scheme in terms of the communication overhead and the information covered in learning.
基金This Project is supported by National Natural Science Foundation of China(No.59875058).
文摘The presentation method of the mechanical motion scheme must support thewhole process of conceptual design. To meet the requirement, a semantic network method is selectedto represent process level, action level, mechanism level and relationships among them. Computeraided motion cycle chart exploration can be realized by the representation and revision of timecoordination of mechanism actions and their effect on the design scheme. The uncertain reasoningtechnology based on semantic network is applied in the mechanism types selection of the needledriving mechanism of industrial sewing mechanism, and the application indicated it is correct,useful and advance.
基金This project is supported by National Natural Science Foundation of China (No.59990470).
文摘In IBVS (image based visual servoing), the error signal in image space should be transformed into the control signal in the input space quickly. To avoid the iterative adjustment and complicated inverse solution of image Jacobian, CMAC (cerebellar model articulation controller) neural network is inserted into visual servo control loop to implement the nonlinear mapping. Two control schemes are used. Simulation results on two schemes are provided, which show a better tracking precision and stability can be achieved using scheme 2.
基金supported by the National Natural Science Foundation of China under Grant No.60903166 and 61170262the National High-Tech Research and Development Plan of China under Grant Nos.2012AA012506+4 种基金Specialized Research Fund for the Doctoral Program of Higher Education of China under Grant No.20121103120032the Humanity and Social Science Youth Foundation of Ministry of Education of China under Grant No.13YJCZH065General Program of Science and Technology Development Project of Beijing Municipal Education Commission of China under Grant No.km201410005012the Research on Education and Teaching of Beijing University of Technology under Grant No.ER2013C24Open Research Fund of Beijing Key Laboratory of Trusted Computing
文摘Network forensics is a security infrastructure,and becomes the research focus of forensic investigation.However many challenges still exist in conducting network forensics:network has produced large amounts of data;the comprehensibility of evidence extracting from collected data;the efficiency of evidence analysis methods,etc.To solve these problems,in this paper we develop a network intrusion forensics system based on transductive scheme that can detect and analyze efficiently computer crime in networked environments,and extract digital evidence automatically.At the end of the paper,we evaluate our method on a series of experiments on KDD Cup 1999 dataset.The results demonstrate that our methods are actually effective for real-time network forensics,and can provide comprehensible aid for a forensic expert.
基金Supported by the Shanxi Natural Science Foundation under contract number 20041070 and Natural Science Foundation of north u-niversity of China .
文摘To implement a quantificational evaluation for mechanical kinematic scheme more effectively,a multi-level and multi-objective evaluation model is presented using neural network and fuzzy theory. Firstly,the structure of evaluation model is constructed according to evaluation indicator system. Then evaluation samples are generated and provided to train this model. Thus it can reflect the relation between attributive value and evaluation result,as well as the weight of evaluation indicator. Once evaluation indicators of each candidate are fuzzily quantified and fed into the trained network model,the corresponding evaluation result is outputted and the best alternative can be selected. Under this model,expert knowledge can be effectively acquired and expressed,and the quantificational evaluation can be implemented for kinematic scheme with multi-level evaluation indicator system. Several key problems on this model are discussed and an illustration has demonstrated that this model is feasible and can be regarded as a new idea for solving kinematic scheme evaluation.
基金supported by Foundation for Innovative Research Groups of the National Natural Science Foundation of China(61521003)National Key Research and Development Plan(2016YFB0800101)National Natural Science Foundation of China(61602509)
文摘Nowadays network virtualization is utterly popular.As a result,how to protect the virtual networks from attacking on the link is increasingly important.Existing schemes are mainly backup-based,which suffer from data loss and are helpless to such attacks like data tampering.To offer high security level,in this paper,we first propose a multipath and decision-making(MD) scheme which applies multipath simultaneously delivery and decision-making for protecting the virtual network.Considering different security requirement for virtual link,we devise a hybrid scheme to protect the virtual links.For the critical links,MD scheme is adopted.For the other links,we adopt the Shared Backup Scheme.Our simulation results indicate the proposed scheme can significantly increase the security level of the critical link high in the loss of less acceptance ratio.
文摘The factual data on error of positioning in VRS GPS networks have been analyzed, where the mobile receiver is provided with VRS. The method of highly informative zone is suggested for removal of initial vagueness in selection of reference stations for purposes of development of VRS on the basis of minimum GPS network, composed of three reference stations. The recommendations on use of suggested method are given.
文摘Research interest in sensor networks routing largely considers minimization of energy consumption as a major performance criterion to provide maximum sensors network lifetime. When considering energy conservation, routing protocols should also be designed to achieve fault tolerance in communications. Moreover, due to dynamic topology and random deployment, incorporating reliability into protocols for WSNs is very important. Hence, we propose an improved scalable clustering-based load balancing scheme (SCLB) in this paper. In SCLB scheme, scalability is achieved by dividing the network into overlapping multihop clusters each with its own cluster head node. Simulation results show that the proposed scheme achieves longer network lifetime with desirable reliability at the initial state compare with the existing multihop load balancing approach.
基金supported by National "863" High Technology Research and Development Program Foundation(No.2006AA01Z208)Six Talented Eminence Foundation of Jiangsu Province+1 种基金Natural Science Foundation of Jiangsu Province(No. BK2004149)Green-Blue Academic Talented Project Foundation of Jiangsu Province
文摘Nodes cooperation is a significant prerequisite for the realization of the relaying Ad Hoc.While with the development of multi-hop cellular networks, how to stimulate intermediate nodes to do the packet-forwarding deserves more concerning.At present research,the incentive schemes in pure Ad Hoc and multi-hop cellular networks are analyzed and compared to classify the strengths and drawbacks of each scheme.We explain in particular what the key issues are to implement incentive schemes for cooperation. Finally,an incentive scheme based on integration of reputation and charging systems is proposed not only to block the existence of selfish nodes,but to satisfy the rational requirement of nodes.
文摘Two significant issues in Internet-based networked control systems ( INCSs), transport performance of different protocols and security breach from Internet side, are investigated. First, for improving the performance of data transmission, user datagram protocol (UDP) is adopted as the main stand for controllers and plants using INCSs. Second, a dual-channel secure transmission scheme (DCSTS)based on data transmission characteristics of INCSs is proposed, in which a raw UDP channel and a secure TCP (transmission control protocol) connection making use of SSL/TLS (secure sockets layer/transport layer security) are included. Further, a networked control protocol (NCP) at application layer for supporting DCSTS between the controllers and plants in INCSs is designed, and it also aims at providing a universal communication mechanism for interoperability of devices among the networked control laboratories in Beijing Institute of Technology of China, Central South University of China and Tokyo University of Technology of Japan. By means of a networked single-degree-of-free- dom robot arm, an INCS under the new protocol and security environment is created. Compared with systems such as IPSec or SSL/TLS, which may cause more than 91% network throughput deduction, the new DCSTS protocol may yield results ten times better, being just 5.67%.
基金This work was supported by College of Engineering and Technology,the American University of the Middle East,Kuwait.Homepage:https://www.aum.edu.kw.
文摘In this article,we introduce a new bi-directional dual-relay selection strategy with its bit error rate(BER)performance analysis.During the first step of the proposed strategy,two relays out of a set of N relay-nodes are selected in a way to optimize the system performance in terms of BER,based on the suggested algorithm which checks if the selected relays using the maxmin criterion are the best ones.In the second step,the chosen relay-nodes perform an orthogonal space-time coding scheme using the two-phase relaying protocol to establish a bi-directional communication between the communicating terminals,leading to a significant improvement in the achievable coding and diversity gain.To further improve the overall system performance,the selected relay-nodes apply also a digital network coding scheme.Furthermore,this paper discusses the analytical approximation of the BER performance of the proposed strategy,where we prove that the analytical results match almost perfectly the simulated ones.Finally,our simulation results show that the proposed strategy outperforms the current state-of-the-art ones.
基金the Natural Science Foundation of Shandong Province (Y2007G37)the Science and Technology Development Program of Shandong Province (2007GG10001012)
文摘In this paper, we propose a new attribute-based proxy re-encryption scheme, where a semi-trusted proxy, with some additional information, can transform a ciphertext under a set of attributes into a new ciphertext under another set of attributes on the same message, but not vice versa, furthermore, its security was proved in the standard model based on decisional bilinear Diffie-Hellman assumption. This scheme can be used to realize fine-grained selectively sharing of encrypted data, but the general proxy rencryption scheme severely can not do it, so the proposed schemecan be thought as an improvement of general traditional proxy re-encryption scheme.
文摘Power grid vulnerability is a key issue with large blackouts, causing power disruption for millions of people. The complexity of power grid, together with excessive number of components, makes it difficult to be modeled. Currently, researchers use complex networks to model and study the performance of power grids. In fact, power grids can be modeled into a complex network by making use of ring network topology, with substations and transmission lines denoted as nodes and edges, respectively. In this paper, three protection schemes are proposed and their effectiveness in protecting the power network under high and low-load attacks is studied. The proposed schemes, namely, Cascaded Load Cut-off (CLC), Cascaded Load Overflow (CLO) and Adaptive-Cascaded Load Overflow (A-CLO), improve the robustness of the power grids, i.e., decrease the value of critical tolerance. Simulation results show that CLC and CLO protection schemes are more effective in improving the robustness of networks than the A-CLO protection scheme. However, the CLC protection scheme is effective only at the expense that certain percentage of the network will have no power supply. Thus, results show that the CLO protection scheme dominates the other protection schemes, CLC and A-CLO, in terms of the robustness of the network, improved with the precise amount of load cut-off determined.
基金The article has been supported by the College of Engineering and Technology,American University of the Middle East,Kuwait.Homepage:https://www.aum.edu.kw.
文摘Rotman lens,which is a radio frequency beam-former that consists of multiple input and multiple output beam ports,can be used in industrial,scientific,and medical applications as a beam steering device.The input ports collect the signals to be propagated through the lens cavity toward the output ports before being transmitted by the antenna arrays to the destination in order to enhance the error performance by optimizing the overall signal to noise ratio(SNR).In this article,a low-cost Rotman lens antenna is designed and deployed to enhance the overall performance of the conventional cooperative communication systems without needing any additional power,extra time or frequency slots.In the suggested system,the smart Rotman lens antennas generate a beam steering in the direction of the destination to maximize the received SNR at the destination by applying the proposed optimal beamforming technique.The suggested optimal beamforming technique enjoys high diversity,as well as,low encoding and decoding complexity.Furthermore,we proved the advantages of our suggested strategy through both theoretical results and simulations using Monte Carlo runs.The Monte Carlo simulations show that the suggested strategy enjoys better error performance compared to the current state-of-the-art distributed multiantenna strategies.In addition,the bit error rate(BER)curves drawn from the analytical results are closely matching to those drawn from our conducted Monte Carlo simulations.
文摘Due to the increasing demand of energy and the need for nonconventional energy sources, distributed generation (DG) has come into play. The trend of unidirectional power flow has been gradually shifting. With new technology comes new challenges, the introduction of DG into the conventional power system brings various challenges;one of the major challenges is system protection under DG sources. These sources pose a significant challenge due to bidirectional flows from DGs as well as lower fault current contribution from inverter interfaced DGs. This paper reviews existing protection schemes that have been suggested for active distribution networks. Most of these protection strategies apply only to smaller distribution systems implying that they may need to be extended to larger systems with a much higher penetration of distributed generation. In the end, a potential protection scheme has also been recommended as a future work.
基金Project supported by the Young Scientists Fund of the National Natural Sciene Foundation of China (Grant No. Q20111309)the Key Program of Education Department of Hubei Province,China (Grant No. D20101304)
文摘We investigate the synchronization of complex networks,which are impulsively coupled only at discrete instants.Based on the comparison theory of impulsive differential systems,a distributed impulsive control scheme is proposed for complex dynamical networks to achieve synchronization.The proposed scheme not only takes into account the influence of all nodes to network synchronization,which depends on the weight of each node in the network,but also provides us with a flexible method to select the synchronized state of the network.In addition,it is unnecessary for the impulsive coupling matrix to be symmetrical.Finally,the proposed control scheme is applied to a chaotic Lorenz network and Chua's circuit network.Numerical simulations are used to illustrate the validity of this control scheme.
文摘The ability of power system to survive the transition from preloading state to the gradual increase in load and thereafter reach an acceptable operational condition is an indication of transient stability of the system. The study analyzed load shedding scheme through the use of empirical measurement tools and load-flow simulation techniques. It was geared towards determining effective load shedding strategies to reduce unnecessary overload in order to achieve dynamic stability of the electric power network in the Export Free Trade Zone, Calabar, Nigeria. From the tests and the measurements taken, it was observed that the real and reactive powers from the generator and the mechanical power from the turbine engine were stable when the load shedding controller was switched on, as compared to when it was off. The engine speed, the bus-bar frequency and the output voltage of the generator stabilized within a shorter time (about 8 seconds) when the controller was switched on than when it was on the off condition. Also, there were noticeable fluctuations in the speed of the remaining two generators. It became stable at about 12 seconds after the loss. The variations were 0.3 per cent of the nominal speed value. The excitation voltage fluctuated from 1.2 (pu) to 4.5 (pu) when the bus voltage dipped as a result of additional load. It then came down and stabilized at 1.8 (pu) after few swings. This confirmed that the stability of power system is much enhanced when load shedding controllers are effectively configured on the network.
基金Supported by the National Natural Science Foundation of China (NSFC) (No. 61102066)the China Postdoctoral Science Foundation (Grant No. 2012M511365)the Scientific Research Project of Zhejiang Provincial Education Department (No. Y201119890)
文摘Efficient and reliable subcarrier power joint allocation is served as a promising problem in cognitive OFDM-based Cognitive Radio Networks (CRN). This paper focuses on optimal subcarrier allocation for OFDM-based CRN. We mainly propose subcarrier allocation scheme denoted as Worst Subcarrier Avoiding Water-filling (WSAW), which is based on Rate Adaptive (RA) criterion and three constraints are considered in CRN. The algorithm divides the assignment procedure into two phases. The first phase is an initial subcarrier allocation based on the idea of avoiding selecting the worst subcarrier in order to maximize the transmission rate; while the second phase is an iterative adjustment process which is realized by swapping pairs of subcarriers between arbitrary users. The proposed scheme could assign subcarriers in accordance with channel coherence time. Hence, real time subcarrier allocation could be implemented. Simulation results show that, comparing with the similar existing algorithms, the proposed scheme could achieve larger capacity and a near-optimal BER performance.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.71771204 and 91546201)
文摘There are various types of pyramid schemes that have inflicted or are inflicting losses on many people in the world.We propose a pyramid scheme model which has the principal characters of many pyramid schemes that have appeared in recent years: promising high returns, rewarding the participants for recruiting the next generation of participants, and the organizer takes all of the money away when they find that the money from the new participants is not enough to pay the previous participants interest and rewards.We assume that the pyramid scheme is carried out in the tree network, Erd?s–Réney(ER) random network, Strogatz–Watts(SW) small-world network, or Barabasi–Albert(BA) scale-free network.We then give the analytical results of the generations that the pyramid scheme can last in these cases.We also use our model to analyze a pyramid scheme in the real world and we find that the connections between participants in the pyramid scheme may constitute a SW small-world network.
文摘Sensor network basically has many intrinsic limitations such as energy consumption, sensor coverage and connectivity, and sensor processing capability. Tracking a moving target in clusters of sensor network online with less complexity algorithm and computational burden is our ultimate goal. Particle filtering (PF) technique, augmenting handoff and K-means classification of measurement data, is proposed to tackle the tracking mission in a sensor network. The handoff decision, an alternative to multi-hop transmission, is implemented for switching between clusters of sensor nodes through received signal strength indication (RSSI) measurements. The measurements being used in particle filter processing are RSSI and time of arrival (TOA). While non-line-of-sight (NLOS) is the dominant bias in tracking estimation/accuracy, it can be easily resolved simply by incorporating K-means classification method in PF processing without any priori identification of LOS/NLOS. Simulation using clusters of sensor nodes in a sensor network is conducted. The dependency of tracking performance with computational cost versus number of particles used in PF processing is also investigated.