The restoration of the riparian vegetation disturbed by human activities is one of the hotspots of watershed ecology. Through interpreting the images of Remote Sensing in 1985 and 1999, the basic information of forest...The restoration of the riparian vegetation disturbed by human activities is one of the hotspots of watershed ecology. Through interpreting the images of Remote Sensing in 1985 and 1999, the basic information of forest resources of Lushuihe Forest Bureau, which is a typical forest area of Changbai Mountain, was obtained with support of GIS. By dividing Land covers of Lushuihe area into 10 types (water body, residential land, stump land, farming land, wetland, mature conifer forest, midlife conifer forest, mature broadleaf forest, midlife broadleaf forest, and man-made young forest) and dividing the riparian zone into four buffers (in turn, 1000, 2000, 3000, 4000 m away from the river), the changes of riparian forest resources during 1985-1999 were analyzed. The results showed that the deforestation intension has obviously decreased and the whole environment has been evidently improved, but the riparian ecosystem was still flimsy. In buffer 1, 2, 3, the area of midlife conifer forest increased largely, but the areas of other types of land covers all decreased. Midlife conifer forest had a comparatively good status in the three buffers. In buffer 4, midlife conifer forest, mature conifer forest, and mature broadleaf forest formed a forest-age rank that is helpful to stabilize the forest ecosystem and exert its functions. Area percentage of wetland decreased in buffer 1, buffer 2, and buffer 3, even in buffer 4 in which forest ecosystem rehabilitated comparatively well, so protecting and rehabilitating wetland is a very difficult task.展开更多
A new structure IGBT is proposed for reducing the power dissipation.It features a composite voltage-sustaining layer which includes a n-type buffer layer formed by ultra-deep diffusion and a transparent backside emitt...A new structure IGBT is proposed for reducing the power dissipation.It features a composite voltage-sustaining layer which includes a n-type buffer layer formed by ultra-deep diffusion and a transparent backside emitter formed by boron implantation.Working in a deep punch-through state during its normal operating condition,it still possesses all the characteristics of the robust non-punch-through IGBT (NPT-IGBT).With a chip-thickness thinner than that of the NPT-IGBT,the new structure presents a better trade-off relationship between the on-state voltage-drop and the turn-off loss.Experimental results show that the power loss of the new structure IGBT is 40% lower than that of the NPT-IGBT.展开更多
A simplified integer overflow detection method based on path relaxation is described for avoiding buffer overflow triggered by integer overflow. When the integer overflow refers to the size of the buffer allocated dyn...A simplified integer overflow detection method based on path relaxation is described for avoiding buffer overflow triggered by integer overflow. When the integer overflow refers to the size of the buffer allocated dynamically, this kind of integer overflow is most likely to trigger buffer overflow. Based on this discovery, through lightly static program analysis, the solution traces the key variables referring to the size of a buffer allocated dynamically and it maintains the upper bound and lower bound of these variables. After the constraint information of these traced variables is inserted into the original program, this method tests the program with test cases through path relaxation, which means that it not only reports the errors revealed by the current runtime value of traced variables contained in the test case, but it also examines the errors possibly occurring under the same execution path with all the possible values of the traced variables. The effectiveness of this method is demonstrated in a case study. Compared with the traditional buffer overflow detection methods, this method reduces the burden of detection and improves efficiency.展开更多
In opportunistic networks, most existing buffer management policies including scheduling and passive dropping policies are mainly for routing protocols. In this paper, we proposed a Utility-based Buffer Management str...In opportunistic networks, most existing buffer management policies including scheduling and passive dropping policies are mainly for routing protocols. In this paper, we proposed a Utility-based Buffer Management strategy(UBM) for data dissemination in opportunistic networks. In UBM, we first design a method of computing the utility values of caching messages according to the interest of nodes and the delivery probability of messages, and then propose an overall buffer management policy based on the utility. UBM driven by receivers completely implements not only caching policies, passive and proactive dropping policies, but also scheduling policies of senders. Simulation results show that, compared with some classical dropping strategies, UBM can obtain higher delivery ratio and lower delay latency by using smaller network cost.展开更多
Regional land use changes are an important part of global changes.The research on land use changes in the Three Gorges Reservoir Area of China attracts a lot of attention owing to the Three Gorges Dam building.The Thr...Regional land use changes are an important part of global changes.The research on land use changes in the Three Gorges Reservoir Area of China attracts a lot of attention owing to the Three Gorges Dam building.The Three Gorges Reservoir Area becomes one of the important research areas.This study analyzed the transforming processes and traits of each land use type and the regional differences of land use changes during the past 30 years,summarized the distribution of different land use types in different buffer zones and regresses the equation areas and different buffer distances based on buffer analyses and regression analyses,and then analyzed the transforming rules in different buffer distances,got the optimal influence distances.The research results indicate that,(1) cultivated land lies at the northwest of the reservoir and was decreasing,however,the construction land was increasing,especially the urban construction land,a large number of land was flooded because of the reservoir water level rise;(2) urban area was sprawling quickly in developed and neighboring areas,and a great deal of cultivated land and a considerable amount of grassland were occupied;in the earlier time,rural settlements occupied lots of cultivated land and a sum of forestry land in the later time;(3) the optimum influenced distances for cultivated land and forestry land were 10-35 km,and for urban and rural settlements were in 5-20 km.Overall,this research can reflect the spatial-temporal characteristics of land use changes during the 30 years,and it is helpful for urban planning and land use planning in the reservoir area.展开更多
As valuable energy in iron-and steel-making process,by-product gas is widely used in heating and technical processes in steel plant.After being used according to the technical requirements,the surplus by-product gas i...As valuable energy in iron-and steel-making process,by-product gas is widely used in heating and technical processes in steel plant.After being used according to the technical requirements,the surplus by-product gas is usually used for buffer boilers to produce steam.With the rapid development of energy conservation technology and energy consumption level,surplus gas in steel plant continues to get larger.Therefore,it is significant to organize surplus gas among buffer boilers.A dynamic programming model of that issue was established in this work,considering the ramp rate constraint of boilers and the influences of setting gasholders.Then a case study was done.It is shown that dynamic programming dispatch gets more steam generation and less specific gas consumption compared with current proportionate dispatch depending on nominal capacities of boilers.The ignored boiler ramp rate constraint was considered and its contribution to the result validity was pointed out.Finally,the significance of setting gasholders was studied.展开更多
An effective discrete artificial bee colony(DABC) algorithm is proposed for the flow shop scheduling problem with intermediate buffers(IBFSP) in order to minimize the maximum completion time(i.e makespan). The effecti...An effective discrete artificial bee colony(DABC) algorithm is proposed for the flow shop scheduling problem with intermediate buffers(IBFSP) in order to minimize the maximum completion time(i.e makespan). The effective combination of the insertion and swap operator is applied to producing neighborhood individual at the employed bee phase. The tournament selection is adopted to avoid falling into local optima, while, the optimized insert operator embeds in onlooker bee phase for further searching the neighborhood solution to enhance the local search ability of algorithm. The tournament selection with size 2 is again applied and a better selected solution will be performed destruction and construction of iterated greedy(IG) algorithm, and then the result replaces the worse one. Simulation results show that our algorithm has a better performance compared with the HDDE and CHS which were proposed recently. It provides the better known solutions for the makespan criterion to flow shop scheduling problem with limited buffers for the Car benchmark by Carlier and Rec benchmark by Reeves. The convergence curves show that the algorithm not only has faster convergence speed but also has better convergence value.展开更多
The laminated overburden model(La Model)has been widely used for pillar design and stability analysis.As a boundary element program,the La Model program is sensitive to the boundary condition,which should be considere...The laminated overburden model(La Model)has been widely used for pillar design and stability analysis.As a boundary element program,the La Model program is sensitive to the boundary condition,which should be considered before creating the model.To eliminate the boundary effect in a La Model pillar stability analysis,a suitable boundary buffer zone is needed around the model edge.The radius of influence(R)and the abutment load extent(D)are two major factors that affect the stresses and displacements calculated in LaM odel.To determine the optimum buffer zone extent,a database of case histories was analyzed using the La Model program.Values for R and D were varied until a buffer zone having negligible influence on the pillar stability factor(SF)of the active mining zone(AMZ)was determined.展开更多
It is a challenge to verify integrity of dynamic control flows due to their dynamic and volatile nature. To meet the challenge, existing solutions usually implant an "attachment" in each control transfer. However, t...It is a challenge to verify integrity of dynamic control flows due to their dynamic and volatile nature. To meet the challenge, existing solutions usually implant an "attachment" in each control transfer. However, the attachment introduces additional cost except performance penalty. For example, the attachment must be unique or restrictedly modified. In this paper, we propose a novel approach to detect integrity of dynamic control flows by counting executed branch instructions without involving any attachment. Our solution is based on the following observation. If a control flow is compromised, the number of executed branch instructions will be abnormally increased. The cause is that intruders usually hijack control flows for malicious execution which absolutely introduces additional branch instructions. Inspired by the above observation, in this paper, we devise a novel system named DCFI- Checker, which detect integrity corruption of dynamic control flows with the support of Performance Monitoring Counter (PMC). We have developed a proof-of-concept prototype system of DCFI-Checker on Linux fedora 5. Our experiments with existing kemel rootkits and buffer overflow attack show that DCFI- Checker is effective to detect compromised dynamic control transfer, and performance evaluations indicate that performance penaltyinduced by DCFI-Checker is acceptable.展开更多
In Vehicle-to-infrastructure(V2I)communication networks,mobile users are able to access Internet services,such as video streaming,digital map downloading,database access,online gaming,and even safety services like acc...In Vehicle-to-infrastructure(V2I)communication networks,mobile users are able to access Internet services,such as video streaming,digital map downloading,database access,online gaming,and even safety services like accident alarm,traffic condition broadcast,etc.,through fixed roadside units.However,the dynamics of communication environment and frequent changing topology critically challenge the design of an efficient transport layer protocol,which makes it difficult to guarantee diverse Quality of Service(QoS) requirements for various applications.In this paper,we present a novel transport layer scheme in infrastructure based vehicular networks,and aim to resolve some challenging issues such as source transfer rate adjustment,congestion avoidance,and fairness.By precisely detecting packet losses and identifying various causes of these losses(for example,link disconnection,channel error,packet collision,buffer overflow),the proposed scheme adopts different reacting mechanisms to deal with each of the losses.Moreover,it timely monitors the buffer size of the bottleneck Road-Side Unit(RSU),and dynamically makes transfer rate feedbacks to source nodes to avoid buffer overflow or vacancy.Finally,analysis and simulation results show that the proposed scheme not only successfully reduces packet losses because of buffer overflow and link disconnection but also improves the utilization efficiency of channel resource.展开更多
Hypertext transfer protocol(HTTP) adaptive streaming(HAS) plays a key role in mobile video transmission. Considering the multi-segment and multi-rate features of HAS, this paper proposes a buffer-driven resource manag...Hypertext transfer protocol(HTTP) adaptive streaming(HAS) plays a key role in mobile video transmission. Considering the multi-segment and multi-rate features of HAS, this paper proposes a buffer-driven resource management(BDRM) method to enhance HAS quality of experience(QoE) in mobile network. Different from the traditional methods only focusing on base station side without considering the buffer, the proposed method takes both station and client sides into account and end user's buffer plays as the drive of whole schedule process. The proposed HAS QoE influencing factors are composed of initial delay, rebuffering and quality level. The BDRM method decomposes the HAS QoE maximization problem into client and base station sides separately to solve it in multicell and multi-user video playing scene in mobile network. In client side, the decision is made based on buffer probe and rate request algorithm by each user separately. It guarantees the less rebuffering events and decides which HAS segment rate to fetch. While, in the base station side, the schedule of wireless resource is made to maximize the quality level of all access clients and decides the final rate pulled from HAS server. The drive of buffer and twice rate request schemes make BDRMtake full advantage of HAS's multi-segment and multi-rate features. As to the simulation results, compared with proportional fair(PF), Max C/I and traditional HAS schedule(THS) methods, the proposed BDRM method decreases rebuffering percent to 1.96% from 11.1% with PF and from 7.01% with THS and increases the mean MOS of all users to 3.94 from 3.42 with PF method and from 2.15 with Max C/I method. It also guarantees a high fairness with 0.98 from the view of objective and subjective assessment metrics.展开更多
In Delay Tolerant Networks (DTNs), establishing routing path from a source node to a destination node may not be possible, so the opportunistic routings are widely used. The energy and buffer constraints are general i...In Delay Tolerant Networks (DTNs), establishing routing path from a source node to a destination node may not be possible, so the opportunistic routings are widely used. The energy and buffer constraints are general in DTNs composed of the mobile phones or Pads. This paper proposes a novel opportunistic routing protocol, denoted by Large Opporturioty (LAOP), for the energy and buffer constrained DTNs. The objective of LAOP is to reach many receivers of a message with a small number of transmissions. By LAOP, the sender floods a message when the number of its neighbors is not less than a threshold. We compare the delivery performance of LAOP with other four widely used Delay or Disruption Tolerant Network (DTN) routing protocols, Direct Delivery, Epidemic routing, SprayAndWait and PRoPHET and demonstrate that LAOP can improve the delivery performance and decrease the delivery latency simultaneously.展开更多
Due to the road-constrained data delivery and highly dynamic topology of vehicle nodes in a Vehicular Ad Hoc Network (VANET), it is better to construct routing based on the road-to-road pattern than the traditional no...Due to the road-constrained data delivery and highly dynamic topology of vehicle nodes in a Vehicular Ad Hoc Network (VANET), it is better to construct routing based on the road-to-road pattern than the traditional node-to-node routing pattern in MANETs. However, the challenging issue is the opportunistic forwarding at intersections. Therefore, we propose a novel routing scheme, called Buffer and Switch (BAS). In BAS, each road buffers the data packets with multiple duplicates propagation in order to provide more opportunities for packet switching at intersections. Different from conventional protocols in VANETs, the propagation of duplicates in BAS is bidirectional along the routing path. Moreover, BAS's cost is much lower than other flooding-based protocols due to its spatio-temporally controlled duplicates propagation. Different from recent researches, BAS can deliver packets not only to a stationary node, but also to the stationary or mobile nodes in a specified area. We conduct the extensive simulations to evaluate the performance of BAS based on the road map of a real city collected from Google Earth. The simulation results show that BAS can outperform the existing protocols, especially when the network resources are limited.展开更多
Buffer influences the performance of production lines greatly.To solve the buffer allocation problem(BAP) in serial production lines with unreliable machines effectively,an optimization method is proposed based on an ...Buffer influences the performance of production lines greatly.To solve the buffer allocation problem(BAP) in serial production lines with unreliable machines effectively,an optimization method is proposed based on an improved ant colony optimization(IACO) algorithm.Firstly,a problem domain describing buffer allocation is structured.Then a mathematical programming model is established with an objective of maximizing throughput rate of the production line.On the basis of the descriptions mentioned above,combining with a two-opt strategy and an acceptance probability rule,an IACO algorithm is built to solve the BAP.Finally,the simulation experiments are designed to evaluate the proposed algorithm.The results indicate that the IACO algorithm is valid and practical.展开更多
We establish an equivalent cascaded semiconductor optical amplifier system model to analyze the characteristics of the double loop optical buffer (DLOB). The theoretical analysis finds that the performance of the DL...We establish an equivalent cascaded semiconductor optical amplifier system model to analyze the characteristics of the double loop optical buffer (DLOB). The theoretical analysis finds that the performance of the DLOB can be improved by inserted amplifying process in an interval of some cycles. The experiment demonstrates that the buffered cycles can be improved from 20 to 50 and the bit error rate is less than 10-9 by inserting amplifying process in an interval of about 10 cycles.展开更多
基金This study is supported by major projects of Knowledge Innovation Program Chinese Academy of Sciences ( No. KZCX2-SW-320-3) and Institute of Applied Ecology (a grant SCXZD010-01)CAS
文摘The restoration of the riparian vegetation disturbed by human activities is one of the hotspots of watershed ecology. Through interpreting the images of Remote Sensing in 1985 and 1999, the basic information of forest resources of Lushuihe Forest Bureau, which is a typical forest area of Changbai Mountain, was obtained with support of GIS. By dividing Land covers of Lushuihe area into 10 types (water body, residential land, stump land, farming land, wetland, mature conifer forest, midlife conifer forest, mature broadleaf forest, midlife broadleaf forest, and man-made young forest) and dividing the riparian zone into four buffers (in turn, 1000, 2000, 3000, 4000 m away from the river), the changes of riparian forest resources during 1985-1999 were analyzed. The results showed that the deforestation intension has obviously decreased and the whole environment has been evidently improved, but the riparian ecosystem was still flimsy. In buffer 1, 2, 3, the area of midlife conifer forest increased largely, but the areas of other types of land covers all decreased. Midlife conifer forest had a comparatively good status in the three buffers. In buffer 4, midlife conifer forest, mature conifer forest, and mature broadleaf forest formed a forest-age rank that is helpful to stabilize the forest ecosystem and exert its functions. Area percentage of wetland decreased in buffer 1, buffer 2, and buffer 3, even in buffer 4 in which forest ecosystem rehabilitated comparatively well, so protecting and rehabilitating wetland is a very difficult task.
文摘A new structure IGBT is proposed for reducing the power dissipation.It features a composite voltage-sustaining layer which includes a n-type buffer layer formed by ultra-deep diffusion and a transparent backside emitter formed by boron implantation.Working in a deep punch-through state during its normal operating condition,it still possesses all the characteristics of the robust non-punch-through IGBT (NPT-IGBT).With a chip-thickness thinner than that of the NPT-IGBT,the new structure presents a better trade-off relationship between the on-state voltage-drop and the turn-off loss.Experimental results show that the power loss of the new structure IGBT is 40% lower than that of the NPT-IGBT.
基金The National Natural Science Foundation of China (No.60873050,60703086)the Opening Foundation of State Key Laboratory of Software Engineering in Wuhan University (No.SKLSE20080717)
文摘A simplified integer overflow detection method based on path relaxation is described for avoiding buffer overflow triggered by integer overflow. When the integer overflow refers to the size of the buffer allocated dynamically, this kind of integer overflow is most likely to trigger buffer overflow. Based on this discovery, through lightly static program analysis, the solution traces the key variables referring to the size of a buffer allocated dynamically and it maintains the upper bound and lower bound of these variables. After the constraint information of these traced variables is inserted into the original program, this method tests the program with test cases through path relaxation, which means that it not only reports the errors revealed by the current runtime value of traced variables contained in the test case, but it also examines the errors possibly occurring under the same execution path with all the possible values of the traced variables. The effectiveness of this method is demonstrated in a case study. Compared with the traditional buffer overflow detection methods, this method reduces the burden of detection and improves efficiency.
基金supported by the National Natural Science Fund of China under Grant No. 61472097the Education Ministry Doctoral Research Foundation of China (20132304110017)the International Exchange Program of Harbin Engineering University for Innovation-oriented Talents Cultivation
文摘In opportunistic networks, most existing buffer management policies including scheduling and passive dropping policies are mainly for routing protocols. In this paper, we proposed a Utility-based Buffer Management strategy(UBM) for data dissemination in opportunistic networks. In UBM, we first design a method of computing the utility values of caching messages according to the interest of nodes and the delivery probability of messages, and then propose an overall buffer management policy based on the utility. UBM driven by receivers completely implements not only caching policies, passive and proactive dropping policies, but also scheduling policies of senders. Simulation results show that, compared with some classical dropping strategies, UBM can obtain higher delivery ratio and lower delay latency by using smaller network cost.
基金supported by the National Science and Technology Support Project(Grant No.2006BAB15B03)
文摘Regional land use changes are an important part of global changes.The research on land use changes in the Three Gorges Reservoir Area of China attracts a lot of attention owing to the Three Gorges Dam building.The Three Gorges Reservoir Area becomes one of the important research areas.This study analyzed the transforming processes and traits of each land use type and the regional differences of land use changes during the past 30 years,summarized the distribution of different land use types in different buffer zones and regresses the equation areas and different buffer distances based on buffer analyses and regression analyses,and then analyzed the transforming rules in different buffer distances,got the optimal influence distances.The research results indicate that,(1) cultivated land lies at the northwest of the reservoir and was decreasing,however,the construction land was increasing,especially the urban construction land,a large number of land was flooded because of the reservoir water level rise;(2) urban area was sprawling quickly in developed and neighboring areas,and a great deal of cultivated land and a considerable amount of grassland were occupied;in the earlier time,rural settlements occupied lots of cultivated land and a sum of forestry land in the later time;(3) the optimum influenced distances for cultivated land and forestry land were 10-35 km,and for urban and rural settlements were in 5-20 km.Overall,this research can reflect the spatial-temporal characteristics of land use changes during the 30 years,and it is helpful for urban planning and land use planning in the reservoir area.
基金Project(L2012082)supported by the Science and Technology Research Funds of Liaoning Provincial Education Department,China
文摘As valuable energy in iron-and steel-making process,by-product gas is widely used in heating and technical processes in steel plant.After being used according to the technical requirements,the surplus by-product gas is usually used for buffer boilers to produce steam.With the rapid development of energy conservation technology and energy consumption level,surplus gas in steel plant continues to get larger.Therefore,it is significant to organize surplus gas among buffer boilers.A dynamic programming model of that issue was established in this work,considering the ramp rate constraint of boilers and the influences of setting gasholders.Then a case study was done.It is shown that dynamic programming dispatch gets more steam generation and less specific gas consumption compared with current proportionate dispatch depending on nominal capacities of boilers.The ignored boiler ramp rate constraint was considered and its contribution to the result validity was pointed out.Finally,the significance of setting gasholders was studied.
基金Projects(61174040,61104178,61374136) supported by the National Natural Science Foundation of ChinaProject(12JC1403400) supported by Shanghai Commission of Science and Technology,ChinaProject supported by the Fundamental Research Funds for the Central Universities,China
文摘An effective discrete artificial bee colony(DABC) algorithm is proposed for the flow shop scheduling problem with intermediate buffers(IBFSP) in order to minimize the maximum completion time(i.e makespan). The effective combination of the insertion and swap operator is applied to producing neighborhood individual at the employed bee phase. The tournament selection is adopted to avoid falling into local optima, while, the optimized insert operator embeds in onlooker bee phase for further searching the neighborhood solution to enhance the local search ability of algorithm. The tournament selection with size 2 is again applied and a better selected solution will be performed destruction and construction of iterated greedy(IG) algorithm, and then the result replaces the worse one. Simulation results show that our algorithm has a better performance compared with the HDDE and CHS which were proposed recently. It provides the better known solutions for the makespan criterion to flow shop scheduling problem with limited buffers for the Car benchmark by Carlier and Rec benchmark by Reeves. The convergence curves show that the algorithm not only has faster convergence speed but also has better convergence value.
文摘The laminated overburden model(La Model)has been widely used for pillar design and stability analysis.As a boundary element program,the La Model program is sensitive to the boundary condition,which should be considered before creating the model.To eliminate the boundary effect in a La Model pillar stability analysis,a suitable boundary buffer zone is needed around the model edge.The radius of influence(R)and the abutment load extent(D)are two major factors that affect the stresses and displacements calculated in LaM odel.To determine the optimum buffer zone extent,a database of case histories was analyzed using the La Model program.Values for R and D were varied until a buffer zone having negligible influence on the pillar stability factor(SF)of the active mining zone(AMZ)was determined.
基金The work is supported in part by the National Natural Science Foundation of China,Natural Science Foundation of Beijing,National 863 High-Tech Research Development Program of China
文摘It is a challenge to verify integrity of dynamic control flows due to their dynamic and volatile nature. To meet the challenge, existing solutions usually implant an "attachment" in each control transfer. However, the attachment introduces additional cost except performance penalty. For example, the attachment must be unique or restrictedly modified. In this paper, we propose a novel approach to detect integrity of dynamic control flows by counting executed branch instructions without involving any attachment. Our solution is based on the following observation. If a control flow is compromised, the number of executed branch instructions will be abnormally increased. The cause is that intruders usually hijack control flows for malicious execution which absolutely introduces additional branch instructions. Inspired by the above observation, in this paper, we devise a novel system named DCFI- Checker, which detect integrity corruption of dynamic control flows with the support of Performance Monitoring Counter (PMC). We have developed a proof-of-concept prototype system of DCFI-Checker on Linux fedora 5. Our experiments with existing kemel rootkits and buffer overflow attack show that DCFI- Checker is effective to detect compromised dynamic control transfer, and performance evaluations indicate that performance penaltyinduced by DCFI-Checker is acceptable.
基金ACKNOWLEDGEMENT This work was partially supported by the Na- tional Natural Science Foundation of China under Grant No. 61101121 the Fundamental Research Funds for the Central Universities of China under Grant No. N110404002+2 种基金 the Key Laboratory Project Funds of Shenyang Ligong University under Grant No. 4771004kfs03 the Educational Committee of Liaoning Province Science and Technology Research Projects under Grant No. L2013096 the National Sci- ence and Technology Support Program under Grant No. 2012BAH82F04.
文摘In Vehicle-to-infrastructure(V2I)communication networks,mobile users are able to access Internet services,such as video streaming,digital map downloading,database access,online gaming,and even safety services like accident alarm,traffic condition broadcast,etc.,through fixed roadside units.However,the dynamics of communication environment and frequent changing topology critically challenge the design of an efficient transport layer protocol,which makes it difficult to guarantee diverse Quality of Service(QoS) requirements for various applications.In this paper,we present a novel transport layer scheme in infrastructure based vehicular networks,and aim to resolve some challenging issues such as source transfer rate adjustment,congestion avoidance,and fairness.By precisely detecting packet losses and identifying various causes of these losses(for example,link disconnection,channel error,packet collision,buffer overflow),the proposed scheme adopts different reacting mechanisms to deal with each of the losses.Moreover,it timely monitors the buffer size of the bottleneck Road-Side Unit(RSU),and dynamically makes transfer rate feedbacks to source nodes to avoid buffer overflow or vacancy.Finally,analysis and simulation results show that the proposed scheme not only successfully reduces packet losses because of buffer overflow and link disconnection but also improves the utilization efficiency of channel resource.
基金supported by the 863 project (Grant No. 2014AA01A701) Beijing Natural Science Foundation (Grant No. 4152047)
文摘Hypertext transfer protocol(HTTP) adaptive streaming(HAS) plays a key role in mobile video transmission. Considering the multi-segment and multi-rate features of HAS, this paper proposes a buffer-driven resource management(BDRM) method to enhance HAS quality of experience(QoE) in mobile network. Different from the traditional methods only focusing on base station side without considering the buffer, the proposed method takes both station and client sides into account and end user's buffer plays as the drive of whole schedule process. The proposed HAS QoE influencing factors are composed of initial delay, rebuffering and quality level. The BDRM method decomposes the HAS QoE maximization problem into client and base station sides separately to solve it in multicell and multi-user video playing scene in mobile network. In client side, the decision is made based on buffer probe and rate request algorithm by each user separately. It guarantees the less rebuffering events and decides which HAS segment rate to fetch. While, in the base station side, the schedule of wireless resource is made to maximize the quality level of all access clients and decides the final rate pulled from HAS server. The drive of buffer and twice rate request schemes make BDRMtake full advantage of HAS's multi-segment and multi-rate features. As to the simulation results, compared with proportional fair(PF), Max C/I and traditional HAS schedule(THS) methods, the proposed BDRM method decreases rebuffering percent to 1.96% from 11.1% with PF and from 7.01% with THS and increases the mean MOS of all users to 3.94 from 3.42 with PF method and from 2.15 with Max C/I method. It also guarantees a high fairness with 0.98 from the view of objective and subjective assessment metrics.
基金This work was supported by the National Natural Science Foundation of China under Grants No. 61100208, No. 61100205 the Natural Science Foundation of Jiangsu under Grant No. BK2011169. Pietro lio was supported by the EU FP7 project RECOGNITION: Relevance and Cognition for Self-Awareness in a Content-Centric Intemet.
文摘In Delay Tolerant Networks (DTNs), establishing routing path from a source node to a destination node may not be possible, so the opportunistic routings are widely used. The energy and buffer constraints are general in DTNs composed of the mobile phones or Pads. This paper proposes a novel opportunistic routing protocol, denoted by Large Opporturioty (LAOP), for the energy and buffer constrained DTNs. The objective of LAOP is to reach many receivers of a message with a small number of transmissions. By LAOP, the sender floods a message when the number of its neighbors is not less than a threshold. We compare the delivery performance of LAOP with other four widely used Delay or Disruption Tolerant Network (DTN) routing protocols, Direct Delivery, Epidemic routing, SprayAndWait and PRoPHET and demonstrate that LAOP can improve the delivery performance and decrease the delivery latency simultaneously.
基金supported by the National Natural Science Foundation of China under Grants No. 60903155,No. 60903156,No.60903158,No. 61003229the Fundamental Research Funds for the Central Universities under Grants No. ZYGX2009J063, No.ZYGX2010J074
文摘Due to the road-constrained data delivery and highly dynamic topology of vehicle nodes in a Vehicular Ad Hoc Network (VANET), it is better to construct routing based on the road-to-road pattern than the traditional node-to-node routing pattern in MANETs. However, the challenging issue is the opportunistic forwarding at intersections. Therefore, we propose a novel routing scheme, called Buffer and Switch (BAS). In BAS, each road buffers the data packets with multiple duplicates propagation in order to provide more opportunities for packet switching at intersections. Different from conventional protocols in VANETs, the propagation of duplicates in BAS is bidirectional along the routing path. Moreover, BAS's cost is much lower than other flooding-based protocols due to its spatio-temporally controlled duplicates propagation. Different from recent researches, BAS can deliver packets not only to a stationary node, but also to the stationary or mobile nodes in a specified area. We conduct the extensive simulations to evaluate the performance of BAS based on the road map of a real city collected from Google Earth. The simulation results show that BAS can outperform the existing protocols, especially when the network resources are limited.
基金Supported by the National Natural Science Foundation of China(No.61273035,71471135)
文摘Buffer influences the performance of production lines greatly.To solve the buffer allocation problem(BAP) in serial production lines with unreliable machines effectively,an optimization method is proposed based on an improved ant colony optimization(IACO) algorithm.Firstly,a problem domain describing buffer allocation is structured.Then a mathematical programming model is established with an objective of maximizing throughput rate of the production line.On the basis of the descriptions mentioned above,combining with a two-opt strategy and an acceptance probability rule,an IACO algorithm is built to solve the BAP.Finally,the simulation experiments are designed to evaluate the proposed algorithm.The results indicate that the IACO algorithm is valid and practical.
基金Supported by National Natural Science Foundation of China under Grant Nos 60672004 and 60877057, and the National High-Tech Research and Development Program of China under Grant No 2007AA01Z270.
文摘We establish an equivalent cascaded semiconductor optical amplifier system model to analyze the characteristics of the double loop optical buffer (DLOB). The theoretical analysis finds that the performance of the DLOB can be improved by inserted amplifying process in an interval of some cycles. The experiment demonstrates that the buffered cycles can be improved from 20 to 50 and the bit error rate is less than 10-9 by inserting amplifying process in an interval of about 10 cycles.