When computers and communication devices are available everywhere in the future, the categories of communication will expand to cover not only the man-man and the man-machine, but also the machine-machine (M2M) commun...When computers and communication devices are available everywhere in the future, the categories of communication will expand to cover not only the man-man and the man-machine, but also the machine-machine (M2M) communication. Someday, the traffic generated by machines will greatly exceed those of man-machine and man-man applications. Large numbers of M2M applications will need various wireless networks to support them. This paper introduces the characteristics, advantages and disadvantages of the currently available various wireless network technologies, including WiFi, Bluetooth, ZigBee, passive RFID and the 802.15 standard networks.展开更多
A simple and general strategy is described for preparing network supported catalyst through a one-pot synthetic procedure using supramolecular gel as template.This procedure directly attaches ligand to support during ...A simple and general strategy is described for preparing network supported catalyst through a one-pot synthetic procedure using supramolecular gel as template.This procedure directly attaches ligand to support during fabricating the support.Using this strategy,supported CuBr/di-(2-picolyl) amine catalyst with U-shaped fibrillar network was prepared and used in atom transfer radical polymerization of methyl methacrylate.XPS and SEM characterization of the catalyst revealed homogeneous distribution of ligand,sufficient reactive sites,adequate mechanical strength and macroporosity.The polymerization results demonstrated high activity and reusability of such catalyst.This strategy might be extended to other supported catalysts used in column reactors.展开更多
Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed ...Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed authentication mechanism and an optimal design method for distributed certificate authority( CA)are designed. Compared with some conventional clustering methods for network,the proposed clustering method considers the business information flow of the network and the task of the network nodes,which can decrease the communication spending between the clusters and improve the network efficiency effectively. The identity authentication protocols between the nodes in the same cluster and in different clusters are designed. From the perspective of the security of network and the availability of distributed authentication service,the definition of the secure service success rate of distributed CA is given and it is taken as the aim of the optimal design for distributed CA. The efficiency of providing the distributed certificate service successfully by the distributed CA is taken as the constraint condition of the optimal design for distributed CA. The determination method for the optimal value of the threshold is investigated. The proposed method can provide references for the optimal design for distributed CA.展开更多
In the course of network supported collaborative design, the data processing plays a very vital role. Much effort has been spent in this area, and many kinds of approaches have been proposed. Based on the correlative ...In the course of network supported collaborative design, the data processing plays a very vital role. Much effort has been spent in this area, and many kinds of approaches have been proposed. Based on the correlative materials, this paper presents extensible markup language (XML) based strategy for several important problems of data processing in network supported collaborative design, such as the representation of standard for the exchange of product model data (STEP) with XML in the product information expression and the management of XML documents using relational database. The paper gives a detailed exposition on how to clarify the mapping between XML structure and the relationship database structure and how XML-QL queries can be translated into structured query language (SQL) queries. Finally, the structure of data processing system based on XML is presented.展开更多
IPv6 is the foundation of the development of Next Generation Internet (NGI). An IPv6 network management and operations support system is necessary for real operable NGI. Presently there are no approved standards yet a...IPv6 is the foundation of the development of Next Generation Internet (NGI). An IPv6 network management and operations support system is necessary for real operable NGI. Presently there are no approved standards yet and relevant equipment interfaces are not perfect. A Network Management System (NMS) at the network layer helps implement the integrated management of a network with equipment from multiple vendors, including the network resources and topology, end-to-end network performance, network failures and customer Service Level Agreement (SLA) management. Though the NMS will finally realize pure IPv6 network management, it must be accommodated to the management of relevant IPv4 equipment. Therefore, modularized and layered structure is adopted for the NMS in order to implement its smooth transition.展开更多
Handling service access in a cloud environment has been identified as a critical challenge in the modern internet world due to the increased rate of intrusion attacks.To address such threats towards cloud services,num...Handling service access in a cloud environment has been identified as a critical challenge in the modern internet world due to the increased rate of intrusion attacks.To address such threats towards cloud services,numerous techniques exist that mitigate the service threats according to different metrics.The rule-based approaches are unsuitable for new threats,whereas trust-based systems estimate trust value based on behavior,flow,and other features.However,the methods suffer from mitigating intrusion attacks at a higher rate.This article presents a novel Multi Fractal Trust Evaluation Model(MFTEM)to overcome these deficiencies.The method involves analyzing service growth,network growth,and quality of service growth.The process estimates the user’s trust in various ways and the support of the user in achieving higher service performance by calculating Trusted Service Support(TSS).Also,the user’s trust in supporting network stream by computing Trusted Network Support(TNS).Similarly,the user’s trust in achieving higher throughput is analyzed by computing Trusted QoS Support(TQS).Using all these measures,the method adds the Trust User Score(TUS)value to decide on the clearance of user requests.The proposed MFTEM model improves intrusion detection accuracy with higher performance.展开更多
Nowadays in the medicalfield,imaging techniques such as Optical Coherence Tomography(OCT)are mainly used to identify retinal diseases.In this paper,the Central Serous Chorio Retinopathy(CSCR)image is analyzed for vari...Nowadays in the medicalfield,imaging techniques such as Optical Coherence Tomography(OCT)are mainly used to identify retinal diseases.In this paper,the Central Serous Chorio Retinopathy(CSCR)image is analyzed for various stages and then compares the difference between CSCR before as well as after treatment using different application methods.Thefirst approach,which was focused on image quality,improves medical image accuracy.An enhancement algorithm was implemented to improve the OCT image contrast and denoise purpose called Boosted Anisotropic Diffusion with an Unsharp Masking Filter(BADWUMF).The classifier used here is tofigure out whether the OCT image is a CSCR case or not.150 images are checked for this research work(75 abnormal from Optical Coherence Tomography Image Retinal Database,in-house clinical database,and 75 normal images).This article explicitly decides that the approaches suggested aid the ophthalmologist with the precise retinal analysis and hence the risk factors to be minimized.The total precision is 90 percent obtained from the Two Class Support Vector Machine(TCSVM)classifier and 93.3 percent is obtained from Shallow Neural Network with the Powell-Beale(SNNWPB)classifier using the MATLAB 2019a program.展开更多
Public security emergency is a public crisis event, and we cannot anticipate the specific time, actual scale, specific situation and influence depth of emergencies. If the emergencies are not under control, the crisis...Public security emergency is a public crisis event, and we cannot anticipate the specific time, actual scale, specific situation and influence depth of emergencies. If the emergencies are not under control, the crisis will get worse and its destructive energy will be released quickly.Structure box is an invisible closed system which is constructed by local politics, economy, and culture. Namely, structure box is local social ecological environment. Structure box is a closed area which is full of anger. Therefore, in such environment with too much pressure, we need an outlet to release pressure. Anger is the social and psychological basis of the emotional resonance of onlooker, when the fuse incident occurred, so that the widespread anger in structure box will find the spotlight. The words and actions of the leaders in the informal group will produce a great social infection and circulatory response, and groups’ stirring will cause emotional resonance which is easy to burst. Thus, irrational behavior may caused by people. This processcan use five links to describe: occurrence of fuse events, information diffusion, emotional resonance, situational catalysis, control failure, and occurrence of public security emergency. This is the occurrence mechanism of public security emergency.展开更多
In this paper, a support vector machine-based multi-model predictive control is proposed, in which SVM classification combines well with SVM regression. At first, each working environment is modeled by SVM regression ...In this paper, a support vector machine-based multi-model predictive control is proposed, in which SVM classification combines well with SVM regression. At first, each working environment is modeled by SVM regression and the support vector machine network-based model predictive control (SVMN-MPC) algorithm corresponding to each environment is developed, and then a multi-class SVM model is established to recognize multiple operating conditions. As for control, the current environment is identified by the multi-class SVM model and then the corresponding SVMN-MPC controller is activated at each sampling instant. The proposed modeling, switching and controller design is demonstrated in simulation results.展开更多
In this letter, we analyze the drawback of tail-dropping contention resolution in optical burst switched networks. Once contention occurs, we adopt modified head-dropping policy to resolve contention. This policy drop...In this letter, we analyze the drawback of tail-dropping contention resolution in optical burst switched networks. Once contention occurs, we adopt modified head-dropping policy to resolve contention. This policy drops the head of the contending burst only if the overlapping region of the two bursts is less than the whole contending burst size, otherwise drops the whole contending burst. In order to have a better support of differentiated service, a new burst assembly policy, namely, Priority-based proportional mixed burst assembly, is proposed. Simulation results show that the proposed scheme performs very well in terms of performance metrics such as the times of contention and packet loss probability.展开更多
This letter proposes a new burst assembly technique for supporting QoS in optical burst switching (OBS) networks. It consists of the adaptive-threshold burst assembly mechanism and QoS-based random offset-time scheme....This letter proposes a new burst assembly technique for supporting QoS in optical burst switching (OBS) networks. It consists of the adaptive-threshold burst assembly mechanism and QoS-based random offset-time scheme. The assembly mechanism, which is fit well to multi-class burst assembly, not only matches with IP QoS mechanism based on packet classification, and also utilizes fairly and efficiently assembly capacity. Based on token-bucket model and burst segment selective discard (BSSD), the offset-time scheme can smooth the traffic to support OBS QoS. The simulation results show that the technique can improve the performance in terms of packet loss probability (PLP).展开更多
In order to have a better support of differentiated service, we propose Priority-based mixed burst assembly, in which packets of different priorities are assembled in a burst with an assigned proportion, and the prior...In order to have a better support of differentiated service, we propose Priority-based mixed burst assembly, in which packets of different priorities are assembled in a burst with an assigned proportion, and the priorities are lined in an ascending order in a burst from head to tail. Simulation results show that the proposed scheme performs very well in terms of latency and packet loss probability.展开更多
This paper presents a nonlinear model predictive control(NMPC) approach based on support vector machine(SVM) and genetic algorithm(GA) for multiple-input multiple-output(MIMO) nonlinear systems.Individual SVM is used ...This paper presents a nonlinear model predictive control(NMPC) approach based on support vector machine(SVM) and genetic algorithm(GA) for multiple-input multiple-output(MIMO) nonlinear systems.Individual SVM is used to approximate each output of the controlled plant Then the model is used in MPC control scheme to predict the outputs of the controlled plant.The optimal control sequence is calculated using GA with elite preserve strategy.Simulation results of a typical MIMO nonlinear system show that this method has a good ability of set points tracking and disturbance rejection.展开更多
The dynamic capacitated location allocation problem in the military supportive network(DCLAP-MSN) is a representative of combinative optimization problems,and its optimization process is complicated.For this reason,...The dynamic capacitated location allocation problem in the military supportive network(DCLAP-MSN) is a representative of combinative optimization problems,and its optimization process is complicated.For this reason,a dynamic capacitated location allocation model is provided firstly.Then,a hybrid heuristic algorithm which combines genetic algorithm,repair algorithm of solutions and greedy search,is proposed as the solving method.The optimization performance is improved by effectively integrating the repair algorithm of solutions and greedy search with genetic optimization.The experiment results indicate that the proposed algorithm is a feasible and effective method for the problem.展开更多
To make full use of the gas resource, stabilize the pipe network pressure, and obtain higher economic benefits in the iron and steel industry, the surplus gas prediction and scheduling models were proposed. Before app...To make full use of the gas resource, stabilize the pipe network pressure, and obtain higher economic benefits in the iron and steel industry, the surplus gas prediction and scheduling models were proposed. Before applying the forecasting techniques, a support vector classifier was first used to classify the data, and then the filtering was used to create separate trend and volatility sequences. After forecasting, the Markov chain transition probability matrix was introduced to adjust the residual. Simulation results using surplus gas data from an iron and steel enterprise demonstrate that the constructed SVC-HP-ENN-LSSVM-MC prediction model prediction is accurate, and that the classification accuracy is high under different conditions. Based on this, the scheduling model was constructed for surplus gas operating, and it has been used to investigate the comprehensive measures for managing the operational probabilistic risk and optimize the economic benefit at various working conditions and implementations. It has extended the concepts of traditional surplus gas dispatching systems, and provides a method for enterprises to determine optimal schedules.展开更多
Various methods of tyre modelling are implemented from pure theoretical to empirical or semi-empirical models based on experimental results. A new way of representing tyre data obtained from measurements is presented ...Various methods of tyre modelling are implemented from pure theoretical to empirical or semi-empirical models based on experimental results. A new way of representing tyre data obtained from measurements is presented via support vector machines (SVMs). The feasibility of applying SVMs to steady-state tyre modelling is investigated by comparison with three-layer backpropagation (BP) neural network at pure slip and combined slip. The results indicate SVMs outperform the BP neural network in modelling the tyre characteristics with better generalization performance. The SVMsqyre is implemented in 8-DOF vehicle model for vehicle dynamics simulation by means of the PAC 2002 Magic Formula as reference. The SVMs-tyre can be a competitive and accurate method to model a tyre for vehicle dynamics simuLation.展开更多
文摘When computers and communication devices are available everywhere in the future, the categories of communication will expand to cover not only the man-man and the man-machine, but also the machine-machine (M2M) communication. Someday, the traffic generated by machines will greatly exceed those of man-machine and man-man applications. Large numbers of M2M applications will need various wireless networks to support them. This paper introduces the characteristics, advantages and disadvantages of the currently available various wireless network technologies, including WiFi, Bluetooth, ZigBee, passive RFID and the 802.15 standard networks.
基金support from the National Natural Science Foundation of China(Nos.20574041 and 20874055)Hi-tech Research and Development Program(863 plan) of China(No.2009AA062903)
文摘A simple and general strategy is described for preparing network supported catalyst through a one-pot synthetic procedure using supramolecular gel as template.This procedure directly attaches ligand to support during fabricating the support.Using this strategy,supported CuBr/di-(2-picolyl) amine catalyst with U-shaped fibrillar network was prepared and used in atom transfer radical polymerization of methyl methacrylate.XPS and SEM characterization of the catalyst revealed homogeneous distribution of ligand,sufficient reactive sites,adequate mechanical strength and macroporosity.The polymerization results demonstrated high activity and reusability of such catalyst.This strategy might be extended to other supported catalysts used in column reactors.
基金National Natural Science Foundation of China(No.61271152)Natural Science Foundation of Hebei Province,China(No.F2012506008)the Original Innovation Foundation of Ordnance Engineering College,China(No.YSCX0903)
文摘Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed authentication mechanism and an optimal design method for distributed certificate authority( CA)are designed. Compared with some conventional clustering methods for network,the proposed clustering method considers the business information flow of the network and the task of the network nodes,which can decrease the communication spending between the clusters and improve the network efficiency effectively. The identity authentication protocols between the nodes in the same cluster and in different clusters are designed. From the perspective of the security of network and the availability of distributed authentication service,the definition of the secure service success rate of distributed CA is given and it is taken as the aim of the optimal design for distributed CA. The efficiency of providing the distributed certificate service successfully by the distributed CA is taken as the constraint condition of the optimal design for distributed CA. The determination method for the optimal value of the threshold is investigated. The proposed method can provide references for the optimal design for distributed CA.
基金supported by National High Technology Research and Development Program of China (863 Program) (No. AA420060)
文摘In the course of network supported collaborative design, the data processing plays a very vital role. Much effort has been spent in this area, and many kinds of approaches have been proposed. Based on the correlative materials, this paper presents extensible markup language (XML) based strategy for several important problems of data processing in network supported collaborative design, such as the representation of standard for the exchange of product model data (STEP) with XML in the product information expression and the management of XML documents using relational database. The paper gives a detailed exposition on how to clarify the mapping between XML structure and the relationship database structure and how XML-QL queries can be translated into structured query language (SQL) queries. Finally, the structure of data processing system based on XML is presented.
文摘IPv6 is the foundation of the development of Next Generation Internet (NGI). An IPv6 network management and operations support system is necessary for real operable NGI. Presently there are no approved standards yet and relevant equipment interfaces are not perfect. A Network Management System (NMS) at the network layer helps implement the integrated management of a network with equipment from multiple vendors, including the network resources and topology, end-to-end network performance, network failures and customer Service Level Agreement (SLA) management. Though the NMS will finally realize pure IPv6 network management, it must be accommodated to the management of relevant IPv4 equipment. Therefore, modularized and layered structure is adopted for the NMS in order to implement its smooth transition.
文摘Handling service access in a cloud environment has been identified as a critical challenge in the modern internet world due to the increased rate of intrusion attacks.To address such threats towards cloud services,numerous techniques exist that mitigate the service threats according to different metrics.The rule-based approaches are unsuitable for new threats,whereas trust-based systems estimate trust value based on behavior,flow,and other features.However,the methods suffer from mitigating intrusion attacks at a higher rate.This article presents a novel Multi Fractal Trust Evaluation Model(MFTEM)to overcome these deficiencies.The method involves analyzing service growth,network growth,and quality of service growth.The process estimates the user’s trust in various ways and the support of the user in achieving higher service performance by calculating Trusted Service Support(TSS).Also,the user’s trust in supporting network stream by computing Trusted Network Support(TNS).Similarly,the user’s trust in achieving higher throughput is analyzed by computing Trusted QoS Support(TQS).Using all these measures,the method adds the Trust User Score(TUS)value to decide on the clearance of user requests.The proposed MFTEM model improves intrusion detection accuracy with higher performance.
文摘Nowadays in the medicalfield,imaging techniques such as Optical Coherence Tomography(OCT)are mainly used to identify retinal diseases.In this paper,the Central Serous Chorio Retinopathy(CSCR)image is analyzed for various stages and then compares the difference between CSCR before as well as after treatment using different application methods.Thefirst approach,which was focused on image quality,improves medical image accuracy.An enhancement algorithm was implemented to improve the OCT image contrast and denoise purpose called Boosted Anisotropic Diffusion with an Unsharp Masking Filter(BADWUMF).The classifier used here is tofigure out whether the OCT image is a CSCR case or not.150 images are checked for this research work(75 abnormal from Optical Coherence Tomography Image Retinal Database,in-house clinical database,and 75 normal images).This article explicitly decides that the approaches suggested aid the ophthalmologist with the precise retinal analysis and hence the risk factors to be minimized.The total precision is 90 percent obtained from the Two Class Support Vector Machine(TCSVM)classifier and 93.3 percent is obtained from Shallow Neural Network with the Powell-Beale(SNNWPB)classifier using the MATLAB 2019a program.
文摘Public security emergency is a public crisis event, and we cannot anticipate the specific time, actual scale, specific situation and influence depth of emergencies. If the emergencies are not under control, the crisis will get worse and its destructive energy will be released quickly.Structure box is an invisible closed system which is constructed by local politics, economy, and culture. Namely, structure box is local social ecological environment. Structure box is a closed area which is full of anger. Therefore, in such environment with too much pressure, we need an outlet to release pressure. Anger is the social and psychological basis of the emotional resonance of onlooker, when the fuse incident occurred, so that the widespread anger in structure box will find the spotlight. The words and actions of the leaders in the informal group will produce a great social infection and circulatory response, and groups’ stirring will cause emotional resonance which is easy to burst. Thus, irrational behavior may caused by people. This processcan use five links to describe: occurrence of fuse events, information diffusion, emotional resonance, situational catalysis, control failure, and occurrence of public security emergency. This is the occurrence mechanism of public security emergency.
基金the 973 Program of China (No.2002CB312200)the National Science Foundation of China (No.60574019)
文摘In this paper, a support vector machine-based multi-model predictive control is proposed, in which SVM classification combines well with SVM regression. At first, each working environment is modeled by SVM regression and the support vector machine network-based model predictive control (SVMN-MPC) algorithm corresponding to each environment is developed, and then a multi-class SVM model is established to recognize multiple operating conditions. As for control, the current environment is identified by the multi-class SVM model and then the corresponding SVMN-MPC controller is activated at each sampling instant. The proposed modeling, switching and controller design is demonstrated in simulation results.
基金This work was partially supported by the National Natural Science Foundation of China under Grant No. 69990540.
文摘In this letter, we analyze the drawback of tail-dropping contention resolution in optical burst switched networks. Once contention occurs, we adopt modified head-dropping policy to resolve contention. This policy drops the head of the contending burst only if the overlapping region of the two bursts is less than the whole contending burst size, otherwise drops the whole contending burst. In order to have a better support of differentiated service, a new burst assembly policy, namely, Priority-based proportional mixed burst assembly, is proposed. Simulation results show that the proposed scheme performs very well in terms of performance metrics such as the times of contention and packet loss probability.
基金This work was supported by National Hi-Tech Research and Development Program of China (863 Program) under contract No. 2002AA122021.
文摘This letter proposes a new burst assembly technique for supporting QoS in optical burst switching (OBS) networks. It consists of the adaptive-threshold burst assembly mechanism and QoS-based random offset-time scheme. The assembly mechanism, which is fit well to multi-class burst assembly, not only matches with IP QoS mechanism based on packet classification, and also utilizes fairly and efficiently assembly capacity. Based on token-bucket model and burst segment selective discard (BSSD), the offset-time scheme can smooth the traffic to support OBS QoS. The simulation results show that the technique can improve the performance in terms of packet loss probability (PLP).
基金This work is partially supported by the National Natural Science Foundation of China under contract 69990540.
文摘In order to have a better support of differentiated service, we propose Priority-based mixed burst assembly, in which packets of different priorities are assembled in a burst with an assigned proportion, and the priorities are lined in an ascending order in a burst from head to tail. Simulation results show that the proposed scheme performs very well in terms of latency and packet loss probability.
基金Supported by the National Natural Science Foundation of China(21076179)the National Basic Research Program of China(2012CB720500)
文摘This paper presents a nonlinear model predictive control(NMPC) approach based on support vector machine(SVM) and genetic algorithm(GA) for multiple-input multiple-output(MIMO) nonlinear systems.Individual SVM is used to approximate each output of the controlled plant Then the model is used in MPC control scheme to predict the outputs of the controlled plant.The optimal control sequence is calculated using GA with elite preserve strategy.Simulation results of a typical MIMO nonlinear system show that this method has a good ability of set points tracking and disturbance rejection.
基金supported by the National Natural Science Foundation of China (70971132)the Elite Plan Program of National University of Defense Technology
文摘The dynamic capacitated location allocation problem in the military supportive network(DCLAP-MSN) is a representative of combinative optimization problems,and its optimization process is complicated.For this reason,a dynamic capacitated location allocation model is provided firstly.Then,a hybrid heuristic algorithm which combines genetic algorithm,repair algorithm of solutions and greedy search,is proposed as the solving method.The optimization performance is improved by effectively integrating the repair algorithm of solutions and greedy search with genetic optimization.The experiment results indicate that the proposed algorithm is a feasible and effective method for the problem.
基金Project(51204082)supported by the National Natural Science Foundation of ChinaProject(KKSY201458118)supported by the Talent Cultivation Project of Kuning University of Science and Technology,China
文摘To make full use of the gas resource, stabilize the pipe network pressure, and obtain higher economic benefits in the iron and steel industry, the surplus gas prediction and scheduling models were proposed. Before applying the forecasting techniques, a support vector classifier was first used to classify the data, and then the filtering was used to create separate trend and volatility sequences. After forecasting, the Markov chain transition probability matrix was introduced to adjust the residual. Simulation results using surplus gas data from an iron and steel enterprise demonstrate that the constructed SVC-HP-ENN-LSSVM-MC prediction model prediction is accurate, and that the classification accuracy is high under different conditions. Based on this, the scheduling model was constructed for surplus gas operating, and it has been used to investigate the comprehensive measures for managing the operational probabilistic risk and optimize the economic benefit at various working conditions and implementations. It has extended the concepts of traditional surplus gas dispatching systems, and provides a method for enterprises to determine optimal schedules.
基金This project is supported by Shanghai Automobile Industry Corporation Technology Foundation, China(No.0224).
文摘Various methods of tyre modelling are implemented from pure theoretical to empirical or semi-empirical models based on experimental results. A new way of representing tyre data obtained from measurements is presented via support vector machines (SVMs). The feasibility of applying SVMs to steady-state tyre modelling is investigated by comparison with three-layer backpropagation (BP) neural network at pure slip and combined slip. The results indicate SVMs outperform the BP neural network in modelling the tyre characteristics with better generalization performance. The SVMsqyre is implemented in 8-DOF vehicle model for vehicle dynamics simulation by means of the PAC 2002 Magic Formula as reference. The SVMs-tyre can be a competitive and accurate method to model a tyre for vehicle dynamics simuLation.