In this letter,Constructive Neural Networks (CNN) is used in large-scale data mining. By introducing the principle and characteristics of CNN and pointing out its deficiencies,fuzzy theory is adopted to improve the co...In this letter,Constructive Neural Networks (CNN) is used in large-scale data mining. By introducing the principle and characteristics of CNN and pointing out its deficiencies,fuzzy theory is adopted to improve the covering algorithms. The threshold of covering algorithms is redefined. "Extended area" for test samples is built. The inference of the outlier is eliminated. Furthermore,"Sphere Neighborhood (SN)" are constructed. The membership functions of test samples are given and all of the test samples are determined accordingly. The method is used to mine large wireless monitor data (about 3×107 data points),and knowledge is found effectively.展开更多
A knowledge-based network for Section Yidong Bridge,Dongyang River,one tributary of Qiantang River,Zhejiang Province,China,is established in order to model water quality in areas under small data.Then,based on normal ...A knowledge-based network for Section Yidong Bridge,Dongyang River,one tributary of Qiantang River,Zhejiang Province,China,is established in order to model water quality in areas under small data.Then,based on normal transformation of variables with routine monitoring data and normal assumption of variables without routine monitoring data,a conditional linear Gaussian Bayesian network is constructed.A "two-constraint selection" procedure is proposed to estimate potential parameter values under small data.Among all potential parameter values,the ones that are most probable are selected as the "representatives".Finally,the risks of pollutant concentration exceeding national water quality standards are calculated and pollution reduction decisions for decision-making reference are proposed.The final results show that conditional linear Gaussian Bayesian network and "two-constraint selection" procedure are very useful in evaluating risks when there is limited data and can help managers to make sound decisions under small data.展开更多
In order to avoid internal attacks during data aggregation in wireless sensor networks, a grid-based network architecture fit for monitoring is designed and the algorithms for network division, initialization and grid...In order to avoid internal attacks during data aggregation in wireless sensor networks, a grid-based network architecture fit for monitoring is designed and the algorithms for network division, initialization and grid tree construction are presented. The characteristics of on-off attacks are first studied and monitoring mechanisms are then designed for sensor nodes. A Fast Detection and Slow Recovery (FDSR) algorithm is proposed to prevent on-off attacks by observing the behaviors of the nodes and computing reputations. A recovery mechanism is designed to isolate malicious nodes by identifying the new roles of nodes and updating the grid tree. In the experiments, some situations of on-off attacks are simulated and the results are compared with other approaches. The experimental results indicate that our approach can detect malicious nodes effectively and guarantee secure data aggregation with acceptable energy consumption.展开更多
The deployment of underwater networks allows researchers to collect explorative and monitoring data on underwater ecosystems.The acoustic medium has been widely adopted in current research and commercial uses,while th...The deployment of underwater networks allows researchers to collect explorative and monitoring data on underwater ecosystems.The acoustic medium has been widely adopted in current research and commercial uses,while the optical medium remains experimental only.According to our survey onthe properties of acoustic and optical communicationsand preliminary simulation results have shown significant trade-offs between bandwidth,propagation delay,power consumption,and effective communication range.We propose a hybrid solution that combines the use of acoustic and optical communication in order to overcome the bandwidth limitation of the acoustic channel by enabling optical communicationwith the help of acoustic-assisted alignment between optical transmitters and receivers.展开更多
基金Supported by the National Natural Science Foundation of China (No.60135010)partially supported by the National Grand Fundamental Research 973 Program of China (No.G1998030509).
文摘In this letter,Constructive Neural Networks (CNN) is used in large-scale data mining. By introducing the principle and characteristics of CNN and pointing out its deficiencies,fuzzy theory is adopted to improve the covering algorithms. The threshold of covering algorithms is redefined. "Extended area" for test samples is built. The inference of the outlier is eliminated. Furthermore,"Sphere Neighborhood (SN)" are constructed. The membership functions of test samples are given and all of the test samples are determined accordingly. The method is used to mine large wireless monitor data (about 3×107 data points),and knowledge is found effectively.
基金Project(50809058)supported by the National Natural Science Foundation of China
文摘A knowledge-based network for Section Yidong Bridge,Dongyang River,one tributary of Qiantang River,Zhejiang Province,China,is established in order to model water quality in areas under small data.Then,based on normal transformation of variables with routine monitoring data and normal assumption of variables without routine monitoring data,a conditional linear Gaussian Bayesian network is constructed.A "two-constraint selection" procedure is proposed to estimate potential parameter values under small data.Among all potential parameter values,the ones that are most probable are selected as the "representatives".Finally,the risks of pollutant concentration exceeding national water quality standards are calculated and pollution reduction decisions for decision-making reference are proposed.The final results show that conditional linear Gaussian Bayesian network and "two-constraint selection" procedure are very useful in evaluating risks when there is limited data and can help managers to make sound decisions under small data.
基金This work was supported by the National Natural Science Foundation of China under Grant No. 60873199.
文摘In order to avoid internal attacks during data aggregation in wireless sensor networks, a grid-based network architecture fit for monitoring is designed and the algorithms for network division, initialization and grid tree construction are presented. The characteristics of on-off attacks are first studied and monitoring mechanisms are then designed for sensor nodes. A Fast Detection and Slow Recovery (FDSR) algorithm is proposed to prevent on-off attacks by observing the behaviors of the nodes and computing reputations. A recovery mechanism is designed to isolate malicious nodes by identifying the new roles of nodes and updating the grid tree. In the experiments, some situations of on-off attacks are simulated and the results are compared with other approaches. The experimental results indicate that our approach can detect malicious nodes effectively and guarantee secure data aggregation with acceptable energy consumption.
基金supported in part by the US National Science Foundation under Grant No. 1205757 Northrop Grumman Corporation
文摘The deployment of underwater networks allows researchers to collect explorative and monitoring data on underwater ecosystems.The acoustic medium has been widely adopted in current research and commercial uses,while the optical medium remains experimental only.According to our survey onthe properties of acoustic and optical communicationsand preliminary simulation results have shown significant trade-offs between bandwidth,propagation delay,power consumption,and effective communication range.We propose a hybrid solution that combines the use of acoustic and optical communication in order to overcome the bandwidth limitation of the acoustic channel by enabling optical communicationwith the help of acoustic-assisted alignment between optical transmitters and receivers.