This is the second of a three-part series of papers which presents the principle and architecture of the CRNM, a trajectory-oriented, carriageway-based road network data model. The first part of the series has introdu...This is the second of a three-part series of papers which presents the principle and architecture of the CRNM, a trajectory-oriented, carriageway-based road network data model. The first part of the series has introduced a general background of building trajectory-oriented road network data models, including motivation, related works, and basic concepts. Based on it, this paper describs the CRNM in detail. At first, the notion of basic roadway entity is proposed and discussed. Secondly, carriageway is selected as the basic roadway entity after compared with other kinds of roadway, and approaches to representing other roadways with carriageways are introduced. At last, an overall architecture of the CRNM is proposed.展开更多
HashQuery,a Hash-area-based data dissemination protocol,was designed in wireless sensor networks. Using a Hash function which uses time as the key,both mobile sinks and sensors can determine the same Hash area. The se...HashQuery,a Hash-area-based data dissemination protocol,was designed in wireless sensor networks. Using a Hash function which uses time as the key,both mobile sinks and sensors can determine the same Hash area. The sensors can send the information about the events that they monitor to the Hash area and the mobile sinks need only to query that area instead of flooding among the whole network,and thus much energy can be saved. In addition,the location of the Hash area changes over time so as to balance the energy consumption in the whole network. Theoretical analysis shows that the proposed protocol can be energy-efficient and simulation studies further show that when there are 5 sources and 5 sinks in the network,it can save at least 50% energy compared with the existing two-tier data dissemination(TTDD) protocol,especially in large-scale wireless sensor networks.展开更多
In sensor networks,the adversaries can inject false data reports from compromised nodes.Previous approaches to filter false reports,e.g.,SEF,only verify the correctness of the message authentication code (MACs) carrie...In sensor networks,the adversaries can inject false data reports from compromised nodes.Previous approaches to filter false reports,e.g.,SEF,only verify the correctness of the message authentication code (MACs) carried in each data report on intermediate nodes,thus cannot filter out fake reports that are forged in a collaborative manner by a group of compromised nodes,even if these compromised nodes distribute in different geographical areas.Furthermore,if the adversary obtains keys from enough (e.g.,more than t in SEF) distinct key partitions,it then can successfully forge a data report without being detected en-route.A neighbor information based false report filtering scheme (NFFS) in wireless sensor networks was presented.In NFFS,each node distributes its neighbor information to some other nodes after deployment.When a report is generated for an observed event,it must carry the IDs and the MACs from t detecting nodes.Each forwarding node checks not only the correctness of the MACs carried in the report,but also the legitimacy of the relative position of these detecting nodes.Analysis and simulation results demonstrate that NFFS can resist collaborative false data injection attacks efficiently,and thus can tolerate much more compromised nodes than existing schemes.展开更多
Most academic information has its creator, that is, a subject who has created the information. The subject can be an individual, a group, or an institution, and can be a nation depending on the nature of the relevant ...Most academic information has its creator, that is, a subject who has created the information. The subject can be an individual, a group, or an institution, and can be a nation depending on the nature of the relevant information. Most web data are composed of a title, an author, and contents. A paper which is under the academic information category has metadata including a title, an author, keyword, abstract, data about publication, place of publication, ISSN, and the like. A patent has metadata including the title, an applicant, an inventor, an attorney, IPC, number of application, and claims of the invention. Most web-based academic information services enable users to search the information by processing the meta-information. An important element is to search information by using the author field which corresponds to a personal name. This study suggests a method of efficient indexing and using the adjacent operation result ranking algorithm to which phrase search-based boosting elements are applied, and thus improving the accuracy of the search results of author name. This method can be effectively applied to providing accurate search results in the academic information services.展开更多
Face-to-face communication is very important skill to share intentions. However, many people in the modem world feel that they are deficient in face-to-face communication. So, we feel that it is necessary to support t...Face-to-face communication is very important skill to share intentions. However, many people in the modem world feel that they are deficient in face-to-face communication. So, we feel that it is necessary to support their face-to-face communication using information technologies. We have developed a topic-providing system that can infer behaviors from daily life and provides users with information about their conversation partner, including that on his hometown, hobbies and life logs when face-to-face communication is initiated. The life logs are details about a user's life, and are generated using a Bayesian network on the basis of sensor data provided by our system. This system enables users to access other users' information of behaviors from the accumulated life logs and it utilizes this infbrmation to generate topics for conversation. We evaluated the accuracy with which proposal system inferred behaviors to confirm whether exact life log generation is possible. And we also evaluated the proposed system by administering a questionnaire to confirm whether the proposed system can support face-to-face communication.展开更多
In this paper, we conduct research on the O2O mode and corresponding influence on the online and offline Internet marketing. Precision marketing is on the basis of fully understanding of consumer information, accordin...In this paper, we conduct research on the O2O mode and corresponding influence on the online and offline Internet marketing. Precision marketing is on the basis of fully understanding of consumer information, according to its characteristics and primary preferences targeted to carry out the one-to-one marketing. Mobile Internet users are mostly fixed which can be the new network technology in-depth insight into consumer interest and demand, and to establish for each specific customer database. Based on the analysis of customer data, then according to the characteristics of the different customers and the preference information such as the precision marketing, at the same time which can also according to customer' s feedback information targeted adjustment of products and the marketing, in order to better meet the needs of customers. Our research combines the O2O concepts and the technique to propose the novel marketing paradigm which is of great importance.展开更多
文摘This is the second of a three-part series of papers which presents the principle and architecture of the CRNM, a trajectory-oriented, carriageway-based road network data model. The first part of the series has introduced a general background of building trajectory-oriented road network data models, including motivation, related works, and basic concepts. Based on it, this paper describs the CRNM in detail. At first, the notion of basic roadway entity is proposed and discussed. Secondly, carriageway is selected as the basic roadway entity after compared with other kinds of roadway, and approaches to representing other roadways with carriageways are introduced. At last, an overall architecture of the CRNM is proposed.
基金Project(07JJ1010) supported by Hunan Provincial Natural Science Foundation of ChinaProjects(2006AA01Z202, 2006AA01Z199) supported by the National High-Tech Research and Development Program of China+2 种基金Project(7002102) supported by the City University of Hong Kong, Strategic Research Grant (SRG)Project(IRT-0661) supported by the Program for Changjiang Scholars and Innovative Research Team in UniversityProject(NCET-06-0686) supported by the Program for New Century Excellent Talents in University
文摘HashQuery,a Hash-area-based data dissemination protocol,was designed in wireless sensor networks. Using a Hash function which uses time as the key,both mobile sinks and sensors can determine the same Hash area. The sensors can send the information about the events that they monitor to the Hash area and the mobile sinks need only to query that area instead of flooding among the whole network,and thus much energy can be saved. In addition,the location of the Hash area changes over time so as to balance the energy consumption in the whole network. Theoretical analysis shows that the proposed protocol can be energy-efficient and simulation studies further show that when there are 5 sources and 5 sinks in the network,it can save at least 50% energy compared with the existing two-tier data dissemination(TTDD) protocol,especially in large-scale wireless sensor networks.
基金Projects(61173169,61103203,70921001)supported by the National Natural Science Foundation of ChinaProject(NCET-10-0798)supported by Program for New Century Excellent Talents in University of China
文摘In sensor networks,the adversaries can inject false data reports from compromised nodes.Previous approaches to filter false reports,e.g.,SEF,only verify the correctness of the message authentication code (MACs) carried in each data report on intermediate nodes,thus cannot filter out fake reports that are forged in a collaborative manner by a group of compromised nodes,even if these compromised nodes distribute in different geographical areas.Furthermore,if the adversary obtains keys from enough (e.g.,more than t in SEF) distinct key partitions,it then can successfully forge a data report without being detected en-route.A neighbor information based false report filtering scheme (NFFS) in wireless sensor networks was presented.In NFFS,each node distributes its neighbor information to some other nodes after deployment.When a report is generated for an observed event,it must carry the IDs and the MACs from t detecting nodes.Each forwarding node checks not only the correctness of the MACs carried in the report,but also the legitimacy of the relative position of these detecting nodes.Analysis and simulation results demonstrate that NFFS can resist collaborative false data injection attacks efficiently,and thus can tolerate much more compromised nodes than existing schemes.
文摘Most academic information has its creator, that is, a subject who has created the information. The subject can be an individual, a group, or an institution, and can be a nation depending on the nature of the relevant information. Most web data are composed of a title, an author, and contents. A paper which is under the academic information category has metadata including a title, an author, keyword, abstract, data about publication, place of publication, ISSN, and the like. A patent has metadata including the title, an applicant, an inventor, an attorney, IPC, number of application, and claims of the invention. Most web-based academic information services enable users to search the information by processing the meta-information. An important element is to search information by using the author field which corresponds to a personal name. This study suggests a method of efficient indexing and using the adjacent operation result ranking algorithm to which phrase search-based boosting elements are applied, and thus improving the accuracy of the search results of author name. This method can be effectively applied to providing accurate search results in the academic information services.
文摘Face-to-face communication is very important skill to share intentions. However, many people in the modem world feel that they are deficient in face-to-face communication. So, we feel that it is necessary to support their face-to-face communication using information technologies. We have developed a topic-providing system that can infer behaviors from daily life and provides users with information about their conversation partner, including that on his hometown, hobbies and life logs when face-to-face communication is initiated. The life logs are details about a user's life, and are generated using a Bayesian network on the basis of sensor data provided by our system. This system enables users to access other users' information of behaviors from the accumulated life logs and it utilizes this infbrmation to generate topics for conversation. We evaluated the accuracy with which proposal system inferred behaviors to confirm whether exact life log generation is possible. And we also evaluated the proposed system by administering a questionnaire to confirm whether the proposed system can support face-to-face communication.
文摘In this paper, we conduct research on the O2O mode and corresponding influence on the online and offline Internet marketing. Precision marketing is on the basis of fully understanding of consumer information, according to its characteristics and primary preferences targeted to carry out the one-to-one marketing. Mobile Internet users are mostly fixed which can be the new network technology in-depth insight into consumer interest and demand, and to establish for each specific customer database. Based on the analysis of customer data, then according to the characteristics of the different customers and the preference information such as the precision marketing, at the same time which can also according to customer' s feedback information targeted adjustment of products and the marketing, in order to better meet the needs of customers. Our research combines the O2O concepts and the technique to propose the novel marketing paradigm which is of great importance.