The virtual backbone is an approach for solving routing problems in wireless ad hoc and sensor networks. A connected dominating set (CDS) was proposed as a virtual backbone to improve the performance of wireless netwo...The virtual backbone is an approach for solving routing problems in wireless ad hoc and sensor networks. A connected dominating set (CDS) was proposed as a virtual backbone to improve the performance of wireless networks. The quality of a virtual backbone is measured not only by approximation factor, which is the ratio of its size to that of minimum CDS, but also time complexity and message complexity. In this paper, a distributed algorithm is presented to construct a minimum CDS for ad hoc and sensor networks. By destroying triangular loops in the virtual backbone, the proposed algorithm can effectively construct a CDS with smaller size. Moreover, our algorithm, which is fully localized, has a constant approximation ratio, linear message and time complexity, and low implementation complexity. The simulation results and theoretical analysis show that our algorithm has better efficiency and performance than conventional approaches.展开更多
In typical Wi-Fi based indoor positioning systems employing fingerprint model,plentiful fingerprints need to be trained by trained experts or technician,which extends labor costs and restricts their promotion.In this ...In typical Wi-Fi based indoor positioning systems employing fingerprint model,plentiful fingerprints need to be trained by trained experts or technician,which extends labor costs and restricts their promotion.In this paper,a novel approach based on crowd paths to solve this problem is presented,which collects and constructs automatically fingerprints database for anonymous buildings through common crowd customers.However,the accuracy degradation problem may be introduced as crowd customers are not professional trained and equipped.Therefore,we define two concepts:fixed landmark and hint landmark,to rectify the fingerprint database in the practical system,in which common corridor crossing points serve as fixed landmark and cross point among different crowd paths serve as hint landmark.Machinelearning techniques are utilized for short range approximation around fixed landmarks and fuzzy logic decision technology is applied for searching hint landmarks in crowd traces space.Besides,the particle filter algorithm is also introduced to smooth the sample points in crowd paths.We implemented the approach on off-the-shelf smartphones and evaluate the performance.Experimental results indicate that the approach can availably construct WiFi fingerprint database without reduce the localization accuracy.展开更多
The growth and evolution of the knowledge network in supply chain can be characterized by dynamic growth clustering and non-homogeneous degree distribution.The networks with the above characteristics are also known as...The growth and evolution of the knowledge network in supply chain can be characterized by dynamic growth clustering and non-homogeneous degree distribution.The networks with the above characteristics are also known as scale-free networks.In this paper,the knowledge network model in supply chain is established,in which the preferential attachment mechanism based on the node strength is adopted to simulate the growth and evolution of the network.The nodes in the network have a certain preference in the choice of a knowledge partner.On the basis of the network model,the robustness of the three network models based on different preferential attachment strategies is investigated.The robustness is also referred to as tolerances when the nodes are subjected to random destruction and malicious damage.The simulation results of this study show that the improved network has higher connectivity and stability.展开更多
[ Objective] The aim was to study the optimum extraction condition of dietary fiber of wheat bran and to discuss its influence on viscosity-elasticity of noodle dough with added extracts. [ Methed] Influences of a-amy...[ Objective] The aim was to study the optimum extraction condition of dietary fiber of wheat bran and to discuss its influence on viscosity-elasticity of noodle dough with added extracts. [ Methed] Influences of a-amylase, alkaline concentration, alkaline hydrolysis time and temperature on water holding capability and swelling capacity of dietary fiber were evaluated using single-factor test and orthogonal test. Effects of added dietary fiber from wheat bran on dough absorption ratio, rupture stress of dough and creep resistance were studied. [ Result] When the hydrolysis condi-tions of wheat bran were 0.4% a-amylase at 75 ℃ for 60 rain, further alkaline conditions were 5% sodium hydroxide for 60 min at 65 ℃, dietary fi-ber exhibited fine water holding capability and swelling capacity. The addition of 3%-5% dietary fiber from wheat bran into dough had little influence on the water absorption ratio of noodle, rupture stress of dough, creep resistance and can make functional noodle with rich dietary fiber from wheat bran. [Coonclusion] The study provided reference for the comprehensive utilization of wheat bran and development of functional product.展开更多
The user association and wireless backhaul bandwidth allocation for a two-tier heterogeneous network (HetNet) in the mil- limeter wave (mmWave) band is proposed in this article. The two-tier HetNet is built up wit...The user association and wireless backhaul bandwidth allocation for a two-tier heterogeneous network (HetNet) in the mil- limeter wave (mmWave) band is proposed in this article. The two-tier HetNet is built up with a macro base station (MBS) and several small cell SBSs, where the MBS is assumed to be equipped with large-scale antenna arrays but the SBSs only have single-antenna capa- bility and they rely on the wireless link to the MBS for backhaul. The sum of logarithmic user rate, which is established according to the result of multi-user Multiple Input Mul- tiple Output (MIMO) downlink employing Zero-Force Beamforming (ZFBF), is chosen as the network utility for the objective func- tion. And a distributed optimization algorithm based on primal and dual decomposition is used to jointly optimize the user association variable xj,z and the wireless backhaul band- width factor α. Simulation results reveal that the distributed optimization algorithm jointly optimizing two variables outperforms the con- ventional SINR-based user association strate- gies.展开更多
It is known that packet collisions in wireless networks will deteriorate system performance, hence substantial efforts have been made to avoid collision in multi-user access designs. Also, there have been many studies...It is known that packet collisions in wireless networks will deteriorate system performance, hence substantial efforts have been made to avoid collision in multi-user access designs. Also, there have been many studies on throughput analysis of CSMA wireless networks. However, for a typical CSMA network in which not all nodes can sense each other, it is still not well investigated how link throughputs are affected by collisions. We note that in practical 802.11-like networks, the time is divided into mini-timeslots and packet collisions are in fact unavoidable. Thus, it is desirable to move forward to explore how collisions in such a network will affect system performance. Based on the collision-free ideal CSMA network(ICN) model, this paper attempts to analyze link throughputs when taking the backoff collisions into account and examine the effect of collisions on link throughputs. Specifically, we propose an Extended Ideal CSMA Network(EICN) model to characterize the collision effects as well as the interactions and dependency among links in the network. Based on EICN, we could directly compute link throughputs and collision probabilities. Simulations show that the EICN model is of high accuracy. Under various network topologies and protocol parameter settings, the computation error of link throughputs using EICN is kept to 4% or below. Interestingly, we find that unlike expected, the effect of collisions on link throughputs in a modest CSMA wireless network is not significant, which enriches our understanding on practical CSMA wireless networks such as Wi-Fi.展开更多
Failure of one or multiple critical nodes may partition wireless sensor networks into disjoint segments, and thus brings negative effect on the applications. We propose DCRS, a Distributed Connectivity Restoration Str...Failure of one or multiple critical nodes may partition wireless sensor networks into disjoint segments, and thus brings negative effect on the applications. We propose DCRS, a Distributed Connectivity Restoration Strategy to tolerate the failure of one critical node. Because of the energy restriction of sensor nodes, the energy overhead of the recovery process should be minimized to extend the lifetime of the network. To achieve it, we first design a novel algorithm to identify 2-critical nodes only relying on the positional information of 1-hop neighbors and some 2-hop neighbors, and then we present the criteria to select an appropriate backup for each critical node. Finally, we improve the cascaded node movement algorithm by determining whether a node can move to another non-adjacent node directly or not to reduce the number of nodes moved. The effectiveness of DCRS is validated through extensive simulation experiments.展开更多
Nowadays, because of its wide bandwidth and high communication capability, the optical fiber is more and more used for high data rate transmission of information in railway environments. Conventionally, only one servi...Nowadays, because of its wide bandwidth and high communication capability, the optical fiber is more and more used for high data rate transmission of information in railway environments. Conventionally, only one service is sent over the fiber at a time. However, many different services can be simultaneously conveyed in railway stations such as passenger information service, cellular phone, Wi-Fi... The objective of the work proposed in this paper is to demonstrate the potential benefits of transmitting radio signals over fiber in a railway environment. The main idea is to exploit the full capacity of the fiber by transmitting multiple services using the same fiber. Since, different services are operating in different frequency bands; we propose a new multiplexing technique called Mode Group Diversity Multiplexing (MGDM) to ensure the transmission of multiple services using the same fiber, without additional infrastructure. There are numerous advantages of the proposed technique, e.g., faster and reliable data exchange, high resolution video surveillance capability, high data rate information exchange in railway stations. We present, in this paper, the physical characteristics of optical fibers, performance of MGDM multiplexing technique, and the influence of the laser excitation conditions at the entrance of the fiber on the performances of the system.展开更多
Darcy's law only applying to the flow domain is extended to the entire fracture network domain including the dry domain.The partial differential equation(PDE) formulation for unconfined seepage flow problems for d...Darcy's law only applying to the flow domain is extended to the entire fracture network domain including the dry domain.The partial differential equation(PDE) formulation for unconfined seepage flow problems for discrete fracture network is established,in which a boundary condition of Signorini's type is prescribed over the potential seepage surfaces.In order to reduce the difficulty in selecting trial functions,a new variational inequality formulation is presented and mathematically proved to be equivalent to the PDE formulation.The numerical procedure based on the VI formulation is proposed and the corresponding algorithm has been developed.Since a continuous penalized Heaviside function is introduced to replace a jump function in finite element analysis,oscillation of numerical integration for facture elements cut by the free surface is eliminated and stability of numerical solution is assured.The numerical results from two typical examples demonstrate,on the one hand the effectiveness and robustness of the proposed method,and on the other hand the capability of predicting main seepage pathways in fractured rocks and flow rates out of the drainage system,which is very important for performance assessments and design optimization of complex drainage system.展开更多
The distinctive characteristics of unmanned aerial vehicle networks (UAVNs), including highly dynamic network topology, high mobility, and open-air wireless environments, may make UAVNs vulnerable to attacks and thr...The distinctive characteristics of unmanned aerial vehicle networks (UAVNs), including highly dynamic network topology, high mobility, and open-air wireless environments, may make UAVNs vulnerable to attacks and threats. In this study, we propose a novel trust model for UAVNs that is based on the behavior and mobility pattern of UAV nodes and the characteristics of inter-UAV channels. The proposed trust model consists of four parts: direct trust section, indirect trust section, integrated trust section, and trust update section. Based on the trust model, the concept of a secure link in UAVNs is formulated that exists only when there is both a physical link and a trust link between two UAVs. Moreover, the metrics of both the physical connectivity probability and the secure connectivity probability between two UAVs are adopted to analyze the connectivity of UAVNs. We derive accurate and analytical expressions of both the physical connectivity probability and the secure connectivity probability using stochastic geometry with or without Doppler shift. Extensive simulations show that compared with the physical connection probability with or without malicious attacks, the proposed trust model can guarantee secure communication and reliable connectivity between UAVs and enhance network performance when UAVNs face malicious attacks and other security risks.展开更多
We propose a weighted model to explain the self-organizing formation of scale-free phenomenon in nongrowth random networks. In this model, we use multiple-edges to represent the connections between vertices and define...We propose a weighted model to explain the self-organizing formation of scale-free phenomenon in nongrowth random networks. In this model, we use multiple-edges to represent the connections between vertices and define the weight of a multiple-edge as the total weights of all single-edges within it and the strength of a vertex as the sum of weights for those multiple-edges attached to it. The network evolves according to a vertex strength preferential selection mechanism. During the evolution process, the network always holds its totM number of vertices and its total number of single-edges constantly. We show analytically and numerically that a network will form steady scale-free distributions with our model. The results show that a weighted non-growth random network can evolve into scMe-free state. It is interesting that the network also obtains the character of an exponential edge weight distribution. Namely, coexistence of scale-free distribution and exponential distribution emerges.展开更多
To improve the accuracy of the vehicle crashworthiness simulation, it is necessary as well as important to integrate the valid forming effects of key parts. It has been agreed by many that one-step simulation results ...To improve the accuracy of the vehicle crashworthiness simulation, it is necessary as well as important to integrate the valid forming effects of key parts. It has been agreed by many that one-step simulation results should be used only as a qualitative trend of the part but not as an engineering result for further structural analysis, especially for a relatively complex part. The study shows that it is inaccurate to analyze the forming effects with one-step simulation based on the geometry of the final part through comparison with the incremental simulation and verification with the actual part, whether in thickness or in plastic strain. However, incremental simulation is very time consuming and infeasible in the early stage of vehicle design due to lack- ing of forming tools and process parameters. An engineering approach is proposed to meet the requirement of accuracy as well as the time efficiency, where one-step simulation is conducted based on the geometry of the transformed part instead of the fi- nN part. The geometry of the transformed part is generated by simple die design engineering and proves to offer much more accuracy than the one-step simulation based on the final part geometry.展开更多
基金The National Natural Science Foundation ofChina(No.60272082)The Important Science and Technology Key Item of Shanghai(No.05dzl5004)
文摘The virtual backbone is an approach for solving routing problems in wireless ad hoc and sensor networks. A connected dominating set (CDS) was proposed as a virtual backbone to improve the performance of wireless networks. The quality of a virtual backbone is measured not only by approximation factor, which is the ratio of its size to that of minimum CDS, but also time complexity and message complexity. In this paper, a distributed algorithm is presented to construct a minimum CDS for ad hoc and sensor networks. By destroying triangular loops in the virtual backbone, the proposed algorithm can effectively construct a CDS with smaller size. Moreover, our algorithm, which is fully localized, has a constant approximation ratio, linear message and time complexity, and low implementation complexity. The simulation results and theoretical analysis show that our algorithm has better efficiency and performance than conventional approaches.
基金partially sponsored by National Key Project of China (No.2012ZX03001013-003)
文摘In typical Wi-Fi based indoor positioning systems employing fingerprint model,plentiful fingerprints need to be trained by trained experts or technician,which extends labor costs and restricts their promotion.In this paper,a novel approach based on crowd paths to solve this problem is presented,which collects and constructs automatically fingerprints database for anonymous buildings through common crowd customers.However,the accuracy degradation problem may be introduced as crowd customers are not professional trained and equipped.Therefore,we define two concepts:fixed landmark and hint landmark,to rectify the fingerprint database in the practical system,in which common corridor crossing points serve as fixed landmark and cross point among different crowd paths serve as hint landmark.Machinelearning techniques are utilized for short range approximation around fixed landmarks and fuzzy logic decision technology is applied for searching hint landmarks in crowd traces space.Besides,the particle filter algorithm is also introduced to smooth the sample points in crowd paths.We implemented the approach on off-the-shelf smartphones and evaluate the performance.Experimental results indicate that the approach can availably construct WiFi fingerprint database without reduce the localization accuracy.
基金Supported by the National Natural Science Foundation of China(No.71172169)
文摘The growth and evolution of the knowledge network in supply chain can be characterized by dynamic growth clustering and non-homogeneous degree distribution.The networks with the above characteristics are also known as scale-free networks.In this paper,the knowledge network model in supply chain is established,in which the preferential attachment mechanism based on the node strength is adopted to simulate the growth and evolution of the network.The nodes in the network have a certain preference in the choice of a knowledge partner.On the basis of the network model,the robustness of the three network models based on different preferential attachment strategies is investigated.The robustness is also referred to as tolerances when the nodes are subjected to random destruction and malicious damage.The simulation results of this study show that the improved network has higher connectivity and stability.
基金Supported by National Science and Technology Fund(31171753)International Science and Technology Cooperation Program of Anhui Province(10080703035)Natural Scientific Research Fund of Universities in Anhui Province(KJ2009A109)
文摘[ Objective] The aim was to study the optimum extraction condition of dietary fiber of wheat bran and to discuss its influence on viscosity-elasticity of noodle dough with added extracts. [ Methed] Influences of a-amylase, alkaline concentration, alkaline hydrolysis time and temperature on water holding capability and swelling capacity of dietary fiber were evaluated using single-factor test and orthogonal test. Effects of added dietary fiber from wheat bran on dough absorption ratio, rupture stress of dough and creep resistance were studied. [ Result] When the hydrolysis condi-tions of wheat bran were 0.4% a-amylase at 75 ℃ for 60 rain, further alkaline conditions were 5% sodium hydroxide for 60 min at 65 ℃, dietary fi-ber exhibited fine water holding capability and swelling capacity. The addition of 3%-5% dietary fiber from wheat bran into dough had little influence on the water absorption ratio of noodle, rupture stress of dough, creep resistance and can make functional noodle with rich dietary fiber from wheat bran. [Coonclusion] The study provided reference for the comprehensive utilization of wheat bran and development of functional product.
基金supported by NSFC under Grant (61725101 and 61771036)the ZTE Corporation, State Key Lab of Rail Traffic Control and Safety Project under Grant (RCS2017ZZ004 and RCS2017ZT008)+1 种基金Beijing Natural Science Foundation under Grant L161009supported by the Open Research Fund of National Mobile Communications Research Laboratory, Southeast University, under grant 2015D04
文摘The user association and wireless backhaul bandwidth allocation for a two-tier heterogeneous network (HetNet) in the mil- limeter wave (mmWave) band is proposed in this article. The two-tier HetNet is built up with a macro base station (MBS) and several small cell SBSs, where the MBS is assumed to be equipped with large-scale antenna arrays but the SBSs only have single-antenna capa- bility and they rely on the wireless link to the MBS for backhaul. The sum of logarithmic user rate, which is established according to the result of multi-user Multiple Input Mul- tiple Output (MIMO) downlink employing Zero-Force Beamforming (ZFBF), is chosen as the network utility for the objective func- tion. And a distributed optimization algorithm based on primal and dual decomposition is used to jointly optimize the user association variable xj,z and the wireless backhaul band- width factor α. Simulation results reveal that the distributed optimization algorithm jointly optimizing two variables outperforms the con- ventional SINR-based user association strate- gies.
基金partially supported by the National Natural Science Foundation of China under Grant 61571178,Grant 61771315 and Grant 61501160
文摘It is known that packet collisions in wireless networks will deteriorate system performance, hence substantial efforts have been made to avoid collision in multi-user access designs. Also, there have been many studies on throughput analysis of CSMA wireless networks. However, for a typical CSMA network in which not all nodes can sense each other, it is still not well investigated how link throughputs are affected by collisions. We note that in practical 802.11-like networks, the time is divided into mini-timeslots and packet collisions are in fact unavoidable. Thus, it is desirable to move forward to explore how collisions in such a network will affect system performance. Based on the collision-free ideal CSMA network(ICN) model, this paper attempts to analyze link throughputs when taking the backoff collisions into account and examine the effect of collisions on link throughputs. Specifically, we propose an Extended Ideal CSMA Network(EICN) model to characterize the collision effects as well as the interactions and dependency among links in the network. Based on EICN, we could directly compute link throughputs and collision probabilities. Simulations show that the EICN model is of high accuracy. Under various network topologies and protocol parameter settings, the computation error of link throughputs using EICN is kept to 4% or below. Interestingly, we find that unlike expected, the effect of collisions on link throughputs in a modest CSMA wireless network is not significant, which enriches our understanding on practical CSMA wireless networks such as Wi-Fi.
文摘Failure of one or multiple critical nodes may partition wireless sensor networks into disjoint segments, and thus brings negative effect on the applications. We propose DCRS, a Distributed Connectivity Restoration Strategy to tolerate the failure of one critical node. Because of the energy restriction of sensor nodes, the energy overhead of the recovery process should be minimized to extend the lifetime of the network. To achieve it, we first design a novel algorithm to identify 2-critical nodes only relying on the positional information of 1-hop neighbors and some 2-hop neighbors, and then we present the criteria to select an appropriate backup for each critical node. Finally, we improve the cascaded node movement algorithm by determining whether a node can move to another non-adjacent node directly or not to reduce the number of nodes moved. The effectiveness of DCRS is validated through extensive simulation experiments.
文摘Nowadays, because of its wide bandwidth and high communication capability, the optical fiber is more and more used for high data rate transmission of information in railway environments. Conventionally, only one service is sent over the fiber at a time. However, many different services can be simultaneously conveyed in railway stations such as passenger information service, cellular phone, Wi-Fi... The objective of the work proposed in this paper is to demonstrate the potential benefits of transmitting radio signals over fiber in a railway environment. The main idea is to exploit the full capacity of the fiber by transmitting multiple services using the same fiber. Since, different services are operating in different frequency bands; we propose a new multiplexing technique called Mode Group Diversity Multiplexing (MGDM) to ensure the transmission of multiple services using the same fiber, without additional infrastructure. There are numerous advantages of the proposed technique, e.g., faster and reliable data exchange, high resolution video surveillance capability, high data rate information exchange in railway stations. We present, in this paper, the physical characteristics of optical fibers, performance of MGDM multiplexing technique, and the influence of the laser excitation conditions at the entrance of the fiber on the performances of the system.
基金supported by the National Natural Science Foundation of China (Grant No. 51079110)the National Basic Research Program of China ("973" Project) (Grant No. 2011CB013506)
文摘Darcy's law only applying to the flow domain is extended to the entire fracture network domain including the dry domain.The partial differential equation(PDE) formulation for unconfined seepage flow problems for discrete fracture network is established,in which a boundary condition of Signorini's type is prescribed over the potential seepage surfaces.In order to reduce the difficulty in selecting trial functions,a new variational inequality formulation is presented and mathematically proved to be equivalent to the PDE formulation.The numerical procedure based on the VI formulation is proposed and the corresponding algorithm has been developed.Since a continuous penalized Heaviside function is introduced to replace a jump function in finite element analysis,oscillation of numerical integration for facture elements cut by the free surface is eliminated and stability of numerical solution is assured.The numerical results from two typical examples demonstrate,on the one hand the effectiveness and robustness of the proposed method,and on the other hand the capability of predicting main seepage pathways in fractured rocks and flow rates out of the drainage system,which is very important for performance assessments and design optimization of complex drainage system.
基金Project supported by the National Natural Science Foundation of China(No.61631003)
文摘The distinctive characteristics of unmanned aerial vehicle networks (UAVNs), including highly dynamic network topology, high mobility, and open-air wireless environments, may make UAVNs vulnerable to attacks and threats. In this study, we propose a novel trust model for UAVNs that is based on the behavior and mobility pattern of UAV nodes and the characteristics of inter-UAV channels. The proposed trust model consists of four parts: direct trust section, indirect trust section, integrated trust section, and trust update section. Based on the trust model, the concept of a secure link in UAVNs is formulated that exists only when there is both a physical link and a trust link between two UAVs. Moreover, the metrics of both the physical connectivity probability and the secure connectivity probability between two UAVs are adopted to analyze the connectivity of UAVNs. We derive accurate and analytical expressions of both the physical connectivity probability and the secure connectivity probability using stochastic geometry with or without Doppler shift. Extensive simulations show that compared with the physical connection probability with or without malicious attacks, the proposed trust model can guarantee secure communication and reliable connectivity between UAVs and enhance network performance when UAVNs face malicious attacks and other security risks.
基金Supported by the National Natural Science Foundation of China under Grant No.60874080the Commonweal Application Technique Research Project of Zhejiang Province under Grant No.2012C2316the Open Project of State Key Lab of Industrial Control Technology of Zhejiang University under Grant No.ICT1107
文摘We propose a weighted model to explain the self-organizing formation of scale-free phenomenon in nongrowth random networks. In this model, we use multiple-edges to represent the connections between vertices and define the weight of a multiple-edge as the total weights of all single-edges within it and the strength of a vertex as the sum of weights for those multiple-edges attached to it. The network evolves according to a vertex strength preferential selection mechanism. During the evolution process, the network always holds its totM number of vertices and its total number of single-edges constantly. We show analytically and numerically that a network will form steady scale-free distributions with our model. The results show that a weighted non-growth random network can evolve into scMe-free state. It is interesting that the network also obtains the character of an exponential edge weight distribution. Namely, coexistence of scale-free distribution and exponential distribution emerges.
基金supported from the National Natural Science Foundation of China (Grant No. 51005144)the Innovation Program of Shanghai Municipal Education Commission and Shanghai Automotive Industry Science and Technology Development Foundation (Grant No. 1009)
文摘To improve the accuracy of the vehicle crashworthiness simulation, it is necessary as well as important to integrate the valid forming effects of key parts. It has been agreed by many that one-step simulation results should be used only as a qualitative trend of the part but not as an engineering result for further structural analysis, especially for a relatively complex part. The study shows that it is inaccurate to analyze the forming effects with one-step simulation based on the geometry of the final part through comparison with the incremental simulation and verification with the actual part, whether in thickness or in plastic strain. However, incremental simulation is very time consuming and infeasible in the early stage of vehicle design due to lack- ing of forming tools and process parameters. An engineering approach is proposed to meet the requirement of accuracy as well as the time efficiency, where one-step simulation is conducted based on the geometry of the transformed part instead of the fi- nN part. The geometry of the transformed part is generated by simple die design engineering and proves to offer much more accuracy than the one-step simulation based on the final part geometry.