This paper deals with the synthesis of Petri net supervisor enforcing the more expressive constraints including marking terms, firing vector terms and Parikh vector terms. The method is developed to handle uncontrolla...This paper deals with the synthesis of Petri net supervisor enforcing the more expressive constraints including marking terms, firing vector terms and Parikh vector terms. The method is developed to handle uncontrollable and unobservable transitions existing in the constraints. The “greater-than or equal” general constraints can also be transformed into “less-than or equal” Parikh constraints. An example is analyzed to show how the problem is solved. General constraint is first transformed into Parikh vector constraints, and Matrix-Transformation is proposed to obtain the admissible constraints without uncontrollable and unobservable transitions. Then the supervisor can be constructed based on constraints only consisting of Parikh vector terms. The method is proved to be more concise and effective than the method presented by Iordache and Moody especially when applied to large scale systems.展开更多
In this letter,Constructive Neural Networks (CNN) is used in large-scale data mining. By introducing the principle and characteristics of CNN and pointing out its deficiencies,fuzzy theory is adopted to improve the co...In this letter,Constructive Neural Networks (CNN) is used in large-scale data mining. By introducing the principle and characteristics of CNN and pointing out its deficiencies,fuzzy theory is adopted to improve the covering algorithms. The threshold of covering algorithms is redefined. "Extended area" for test samples is built. The inference of the outlier is eliminated. Furthermore,"Sphere Neighborhood (SN)" are constructed. The membership functions of test samples are given and all of the test samples are determined accordingly. The method is used to mine large wireless monitor data (about 3×107 data points),and knowledge is found effectively.展开更多
The increasing network throughput challenges the current network traffic monitor systems to have compatible high-performance data processing.The design of packet processing systems is guided by the requirements of hig...The increasing network throughput challenges the current network traffic monitor systems to have compatible high-performance data processing.The design of packet processing systems is guided by the requirements of high packet processing throughput.In this paper,we depict an in-depth research on the related techniques and an implementation of a high-performance data acquisition mechanism.Through the bottleneck analysis with the aid of queuing network model,several performance optimising methods,such as service rate increasing,queue removing and model simplification,are integrated.The experiment results indicate that this approach is capable of reducing the CPU utilization ratio while improving the efficiency of data acquisition in high-speed networks.展开更多
This paper presents a passive monitoring mechanism, loss), nodes inference (LoNI), to identify loss), nodes in wireless sensor network using end-to-end application traffic. Given topology dynamics and bandwidth co...This paper presents a passive monitoring mechanism, loss), nodes inference (LoNI), to identify loss), nodes in wireless sensor network using end-to-end application traffic. Given topology dynamics and bandwidth constraints, a space-efficient packet marking scheme is first introduced. The scheme uses a Bloom filter as a compression tool so that path information can bc piggybacked by data packets. Based on the path information, LoNI then adopts a fast algorithm to detect lossy nodes. The algorithm formulates the inference problem as a weighted set-cover problem and solves it using a greedy approach with low complexity. Simulations show that LoNI can locate about 80% of lossy nodes when lossy nodes are rare in the network. Furthermore, LoNI performs better for the lossy nodes near the sink or with higher loss rates.展开更多
This paper studies a routing protocol used in the application of collecting real-time traffic information using mobile vehicles to monitor traffic status. The biggest challenge of vehicular ad hoe network routing prot...This paper studies a routing protocol used in the application of collecting real-time traffic information using mobile vehicles to monitor traffic status. The biggest challenge of vehicular ad hoe network routing protocol lies in the mismatch between the direction of moving vehicles and routed data. In order to deal with this mismatch, a mesh based routing protocol with a two-tier network architecture is proposed. By using mesh nodes deployed at intersections, data can be routed through an optimized path which can improve the delivery ratio and reduce the consumption of network resources. The simulation uses the mobility model processed from the GPS data of taxis mnning in Shanghai urban areas. The result shows that the proposed protocol outperforms the existing flooding protocol.展开更多
基金Project supported by the National Natural Science Foundation of China (No. 60504024), Zhejiang Provincial Education Department(No. 20050905), and "151 Talent Project" of Zhejiang Province,China
文摘This paper deals with the synthesis of Petri net supervisor enforcing the more expressive constraints including marking terms, firing vector terms and Parikh vector terms. The method is developed to handle uncontrollable and unobservable transitions existing in the constraints. The “greater-than or equal” general constraints can also be transformed into “less-than or equal” Parikh constraints. An example is analyzed to show how the problem is solved. General constraint is first transformed into Parikh vector constraints, and Matrix-Transformation is proposed to obtain the admissible constraints without uncontrollable and unobservable transitions. Then the supervisor can be constructed based on constraints only consisting of Parikh vector terms. The method is proved to be more concise and effective than the method presented by Iordache and Moody especially when applied to large scale systems.
基金Supported by the National Natural Science Foundation of China (No.60135010)partially supported by the National Grand Fundamental Research 973 Program of China (No.G1998030509).
文摘In this letter,Constructive Neural Networks (CNN) is used in large-scale data mining. By introducing the principle and characteristics of CNN and pointing out its deficiencies,fuzzy theory is adopted to improve the covering algorithms. The threshold of covering algorithms is redefined. "Extended area" for test samples is built. The inference of the outlier is eliminated. Furthermore,"Sphere Neighborhood (SN)" are constructed. The membership functions of test samples are given and all of the test samples are determined accordingly. The method is used to mine large wireless monitor data (about 3×107 data points),and knowledge is found effectively.
基金ACKNOWLEDGEMENT This project was supported by the National Natural Science Foundation of China under Grant No. 61170262 the National High Tech- nology Research and Development Program of China (863 Program) under Grants No. 2012AA012506, No. 2012AA012901, No. 2012- AA012903+5 种基金 the Specialised Research Fund for the Doctoral Program of Higher Education of China under Grant No. 20121103120032 the Humanity and Social Science Youth Founda- tion of Ministry of Education of China under Grant No. 13YJCZH065 the Opening Project of Key Lab of Information Network Security of Ministry of Public Security (The Third Re- search Institute of Ministry of Public Security) under Grant No. C13613 the China Postdoc- toral Science Foundation, General Program of Science and Technology Development Project of Beijing Municipal Education Commission of China under Grant No. km201410005012 the Research on Education and Teaching of Beijing University of Technology under Grant No. ER2013C24 the Beijing Municipal Natu- ral Science Foundation, Sponsored by Hunan Postdoctoral Scientific Program, Open Re- search Fund of Beijing Key Laboratory of Trusted Computing.
文摘The increasing network throughput challenges the current network traffic monitor systems to have compatible high-performance data processing.The design of packet processing systems is guided by the requirements of high packet processing throughput.In this paper,we depict an in-depth research on the related techniques and an implementation of a high-performance data acquisition mechanism.Through the bottleneck analysis with the aid of queuing network model,several performance optimising methods,such as service rate increasing,queue removing and model simplification,are integrated.The experiment results indicate that this approach is capable of reducing the CPU utilization ratio while improving the efficiency of data acquisition in high-speed networks.
文摘This paper presents a passive monitoring mechanism, loss), nodes inference (LoNI), to identify loss), nodes in wireless sensor network using end-to-end application traffic. Given topology dynamics and bandwidth constraints, a space-efficient packet marking scheme is first introduced. The scheme uses a Bloom filter as a compression tool so that path information can bc piggybacked by data packets. Based on the path information, LoNI then adopts a fast algorithm to detect lossy nodes. The algorithm formulates the inference problem as a weighted set-cover problem and solves it using a greedy approach with low complexity. Simulations show that LoNI can locate about 80% of lossy nodes when lossy nodes are rare in the network. Furthermore, LoNI performs better for the lossy nodes near the sink or with higher loss rates.
基金Supported by the National Basic Research Program of China (No. 2006CB303000)the National Natural Science Foundation of China (No. 60773091, F020303).
文摘This paper studies a routing protocol used in the application of collecting real-time traffic information using mobile vehicles to monitor traffic status. The biggest challenge of vehicular ad hoe network routing protocol lies in the mismatch between the direction of moving vehicles and routed data. In order to deal with this mismatch, a mesh based routing protocol with a two-tier network architecture is proposed. By using mesh nodes deployed at intersections, data can be routed through an optimized path which can improve the delivery ratio and reduce the consumption of network resources. The simulation uses the mobility model processed from the GPS data of taxis mnning in Shanghai urban areas. The result shows that the proposed protocol outperforms the existing flooding protocol.