In this paper we prove that a space X with point countable sequential neighborhood network if and only if it is α 4 space with point countable cs network.
The hybrid routing protocol has received more attention recently than the proactive and the reactive, especially for large-scale and highly dynamic connection,in mobile ad hoc network. A crucial reason is that zone-la...The hybrid routing protocol has received more attention recently than the proactive and the reactive, especially for large-scale and highly dynamic connection,in mobile ad hoc network. A crucial reason is that zone-layered is being utilized in the complex systems.A hybrid routing algorithm which is layered zone based on adjacency connection(LZBAC) is put forward under the background of a few members in network with steady position and link. The algorithm modifies storage structure of nodes and improves routing mechanism. The theoretical analysis and simulation testing testify that the algorithm costs shorter time of route finding and less delay than others.展开更多
In sensor networks,the adversaries can inject false data reports from compromised nodes.Previous approaches to filter false reports,e.g.,SEF,only verify the correctness of the message authentication code (MACs) carrie...In sensor networks,the adversaries can inject false data reports from compromised nodes.Previous approaches to filter false reports,e.g.,SEF,only verify the correctness of the message authentication code (MACs) carried in each data report on intermediate nodes,thus cannot filter out fake reports that are forged in a collaborative manner by a group of compromised nodes,even if these compromised nodes distribute in different geographical areas.Furthermore,if the adversary obtains keys from enough (e.g.,more than t in SEF) distinct key partitions,it then can successfully forge a data report without being detected en-route.A neighbor information based false report filtering scheme (NFFS) in wireless sensor networks was presented.In NFFS,each node distributes its neighbor information to some other nodes after deployment.When a report is generated for an observed event,it must carry the IDs and the MACs from t detecting nodes.Each forwarding node checks not only the correctness of the MACs carried in the report,but also the legitimacy of the relative position of these detecting nodes.Analysis and simulation results demonstrate that NFFS can resist collaborative false data injection attacks efficiently,and thus can tolerate much more compromised nodes than existing schemes.展开更多
Based on the seismic data of near-field source from the Shandong Digital Seismic Network,this study obtained the shear-wave splitting parameters from multiple stations. The results show that dominant directions of pol...Based on the seismic data of near-field source from the Shandong Digital Seismic Network,this study obtained the shear-wave splitting parameters from multiple stations. The results show that dominant directions of polarizations of fast shear-waves reflect the spatial distribution characteristics of tectonic stress in this area,CHD and LIS stations show 2 dominant directions,and reveals that the crustal seismic anisotropy in the Shandong area is constrained by the regional stress background,local failure and structure.展开更多
Based on 49 digital seismograms recorded by 73 seismic stations in the Jiangsu Telemetered Seismic Network,the paper uses Atkinson's method to calculate the inelastic attenuation coefficient of the Jiangsu area. W...Based on 49 digital seismograms recorded by 73 seismic stations in the Jiangsu Telemetered Seismic Network,the paper uses Atkinson's method to calculate the inelastic attenuation coefficient of the Jiangsu area. We find that the frequency-dependent Q in the Jiangsu region is Q( f) = 272. 1·f^(0. 5575). We also use Moya's method to invert the 63 stations' site responses. The results show that the site responses of the 25 stations in Jiangsu are approximately 1 at a range between 1Hz and 20 Hz, which is consistent with their basements on rocks. The response curves of the site responses of the 14 underground stations are similar to each other. Their site responses show an amplification at low frequencies and minimization at high frequencies. The calculation of the Brune model on the waveform data of M_L≥2. 5 earthquakes from Jiangsu Digital Seismic Network between October 2010 and May 2015 in terms of seismic source parameters of 58 seismic waves shows that there are good correlations between seismic magnitude and other source parameters such as seismic moment, source radius and corner frequency, while the correlations between seismic magnitude and stress drop,and stress drop and source radius are not so good.展开更多
Fast resources discovery and high Quality of Service(QoS) guarantee are the key determinants for efficient Mobile P2P(MP2P) video sharing.In this paper,we propose a CrossLayer and One-Hop Neighbour-Assisted Video Shar...Fast resources discovery and high Quality of Service(QoS) guarantee are the key determinants for efficient Mobile P2P(MP2P) video sharing.In this paper,we propose a CrossLayer and One-Hop Neighbour-Assisted Video Sharing(CNVS) solution in Mobile Ad Hoc Networks(MANETs).By making use of crosslayer approaches to bridge the overlay and the MAC layer and with the help of dissemination assisted by one-hop neighbours,CNVS intelligently builds the resource-centric self-organization node cluster group.In order to meet the QoS requirement,by making use of video resources access cost model,each peer can disconnect a less efficient connection with the original supplier and choose a peer that provides a low access cost as the new supplier.Simulation results also show how CNVS achieves lower average end-to-end delay,less average number of hops for video data delivery,lower routing overhead and packet loss rate,and higher network throughput than another state-of-the-art solution.展开更多
For Peer-to-Peer (P2P) streaming services in mobile networks, the selection of appropriate neighbour peers from candidate peers with demanding data is an important approach to improve Quality-of-Service (QoS). This pa...For Peer-to-Peer (P2P) streaming services in mobile networks, the selection of appropriate neighbour peers from candidate peers with demanding data is an important approach to improve Quality-of-Service (QoS). This paper proposes a novel Effective Capacity Peer Selection (ECPS) scheme based on effective capacity. In the ECPS scheme, the neighbour peer selection problem was modeled using the Multiple Attribute Decision Making (MADM) theory, which considered multiple factors of candidate peers, including Signal to Interference and Noise Ratio (SINR), residency time, power level, security, moving speed, and effective capacity. This model could increase the suitability of ECPS for wireless mobile environments. Then, the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) was used to solve the MADM problem and identify the preferred neighbour peers. Simulation results show that the ECPS scheme can improve the network throughput, reduce packet delay by about 82%, and almost double the packet delivery ratio of the mobile P2P streaming service.展开更多
This paper constructs a new spectrum of networks by means of the matrix of link-state ofthe network,which can reveal the characteristics of the correlation between the degrees of the network.Also,the computation of th...This paper constructs a new spectrum of networks by means of the matrix of link-state ofthe network,which can reveal the characteristics of the correlation between the degrees of the network.Also,the computation of this spectrum of networks is usually more feasible and more efficient due tothe much lower order of its matrix of link-state than its adjacent matrix in practice.Some estimatesfor the bounds of the key eigenvalues in the spectrum are obtained,the corresponding inequalities arepresented and proved.For the sake of its application,the authors define spectrum of networks in twoways,and all theorems are given in parallel for both kinds of definition.In addition,the authors finda symmetry in the spectrum,which is relative to the characteristic of structure of its network to someextent.展开更多
Address-resolution protocol (ARP) is an important protocol of data link layers that aims to obtain the corresponding relationship between Internet Protocol (IP) and Media Access Control (MAC) addresses. Traditio...Address-resolution protocol (ARP) is an important protocol of data link layers that aims to obtain the corresponding relationship between Internet Protocol (IP) and Media Access Control (MAC) addresses. Traditional ARPs (address-resolution and neighbor-discovery protocols) do not consider the existence of malicious nodes, which reveals destination addresses in the resolution process. Thus, these traditional protocols allow malicious nodes to easily carry out attacks, such as man-in-the-middle attack and denial-of-service attack. To overcome these weaknesses, we propose an anonymous-address-resolution (AS-AR) protocol. AS-AR does not publicize the destination address in the address-resolution process and hides the IP and MAC addresses of the source node, The malicious node cannot obtain the addresses of the destination and the node which initiates the address resolution; thus, it cannot attack. Analyses and experiments show that AS-AR has a higher security level than existing security methods, such as secure-neighbor discovery.展开更多
文摘In this paper we prove that a space X with point countable sequential neighborhood network if and only if it is α 4 space with point countable cs network.
基金This work was supported in part by Research fund from Educational Committee of China (No104086)
文摘The hybrid routing protocol has received more attention recently than the proactive and the reactive, especially for large-scale and highly dynamic connection,in mobile ad hoc network. A crucial reason is that zone-layered is being utilized in the complex systems.A hybrid routing algorithm which is layered zone based on adjacency connection(LZBAC) is put forward under the background of a few members in network with steady position and link. The algorithm modifies storage structure of nodes and improves routing mechanism. The theoretical analysis and simulation testing testify that the algorithm costs shorter time of route finding and less delay than others.
基金Projects(61173169,61103203,70921001)supported by the National Natural Science Foundation of ChinaProject(NCET-10-0798)supported by Program for New Century Excellent Talents in University of China
文摘In sensor networks,the adversaries can inject false data reports from compromised nodes.Previous approaches to filter false reports,e.g.,SEF,only verify the correctness of the message authentication code (MACs) carried in each data report on intermediate nodes,thus cannot filter out fake reports that are forged in a collaborative manner by a group of compromised nodes,even if these compromised nodes distribute in different geographical areas.Furthermore,if the adversary obtains keys from enough (e.g.,more than t in SEF) distinct key partitions,it then can successfully forge a data report without being detected en-route.A neighbor information based false report filtering scheme (NFFS) in wireless sensor networks was presented.In NFFS,each node distributes its neighbor information to some other nodes after deployment.When a report is generated for an observed event,it must carry the IDs and the MACs from t detecting nodes.Each forwarding node checks not only the correctness of the MACs carried in the report,but also the legitimacy of the relative position of these detecting nodes.Analysis and simulation results demonstrate that NFFS can resist collaborative false data injection attacks efficiently,and thus can tolerate much more compromised nodes than existing schemes.
基金sponsored by the Natural Science of Shandong Province(ZH2014DQ019)Earthquake Science and Technology Spark Plan(XH15026)+1 种基金Key Foundation Program of Earthquake Administration of Shandong Province(JJ1407Y)the Contract Program of Earthquake Administration of Shandong Province(15Y102)
文摘Based on the seismic data of near-field source from the Shandong Digital Seismic Network,this study obtained the shear-wave splitting parameters from multiple stations. The results show that dominant directions of polarizations of fast shear-waves reflect the spatial distribution characteristics of tectonic stress in this area,CHD and LIS stations show 2 dominant directions,and reveals that the crustal seismic anisotropy in the Shandong area is constrained by the regional stress background,local failure and structure.
基金jointly sponsored by the“Science for Earthquake Resilience(1730801)the Youth Fund Program of Earthquake Administration of Jiangsu Province,China(201405)
文摘Based on 49 digital seismograms recorded by 73 seismic stations in the Jiangsu Telemetered Seismic Network,the paper uses Atkinson's method to calculate the inelastic attenuation coefficient of the Jiangsu area. We find that the frequency-dependent Q in the Jiangsu region is Q( f) = 272. 1·f^(0. 5575). We also use Moya's method to invert the 63 stations' site responses. The results show that the site responses of the 25 stations in Jiangsu are approximately 1 at a range between 1Hz and 20 Hz, which is consistent with their basements on rocks. The response curves of the site responses of the 14 underground stations are similar to each other. Their site responses show an amplification at low frequencies and minimization at high frequencies. The calculation of the Brune model on the waveform data of M_L≥2. 5 earthquakes from Jiangsu Digital Seismic Network between October 2010 and May 2015 in terms of seismic source parameters of 58 seismic waves shows that there are good correlations between seismic magnitude and other source parameters such as seismic moment, source radius and corner frequency, while the correlations between seismic magnitude and stress drop,and stress drop and source radius are not so good.
基金supported in part by the National High Technical Research and Development Program of China (863 Program) under Grant No. 2011AA010701the National KeyBasic Research Program of China (973 Program)under Grant No. 2013CB329102+4 种基金the National Natural Science Foundation of China under Grants No. 61001122,No. 61003283,No. 61232017the Natural Science Foundation of Jiangsu Province under Grant No. BK2011171the Natural Science Foundation of Jiangxi,China under Grant No. 20122BAB201042the Fundamental Research Funds for the Central Universities under Grant No. 2012RC0603the Science Foundation Ireland under Grant No. 10/CE/I1855 to Lero-the Irish Software Engineering Research Centre
文摘Fast resources discovery and high Quality of Service(QoS) guarantee are the key determinants for efficient Mobile P2P(MP2P) video sharing.In this paper,we propose a CrossLayer and One-Hop Neighbour-Assisted Video Sharing(CNVS) solution in Mobile Ad Hoc Networks(MANETs).By making use of crosslayer approaches to bridge the overlay and the MAC layer and with the help of dissemination assisted by one-hop neighbours,CNVS intelligently builds the resource-centric self-organization node cluster group.In order to meet the QoS requirement,by making use of video resources access cost model,each peer can disconnect a less efficient connection with the original supplier and choose a peer that provides a low access cost as the new supplier.Simulation results also show how CNVS achieves lower average end-to-end delay,less average number of hops for video data delivery,lower routing overhead and packet loss rate,and higher network throughput than another state-of-the-art solution.
基金supported in part by the National Natural Science Foundation of China under Grant No. 60902047the Fundamental Research Funds for the Central Universities under Grant No. BUPT2013RC0111
文摘For Peer-to-Peer (P2P) streaming services in mobile networks, the selection of appropriate neighbour peers from candidate peers with demanding data is an important approach to improve Quality-of-Service (QoS). This paper proposes a novel Effective Capacity Peer Selection (ECPS) scheme based on effective capacity. In the ECPS scheme, the neighbour peer selection problem was modeled using the Multiple Attribute Decision Making (MADM) theory, which considered multiple factors of candidate peers, including Signal to Interference and Noise Ratio (SINR), residency time, power level, security, moving speed, and effective capacity. This model could increase the suitability of ECPS for wireless mobile environments. Then, the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) was used to solve the MADM problem and identify the preferred neighbour peers. Simulation results show that the ECPS scheme can improve the network throughput, reduce packet delay by about 82%, and almost double the packet delivery ratio of the mobile P2P streaming service.
基金supported by the Key Project for Fundamental Research of STCSM under Grant No. 06JC14057
文摘This paper constructs a new spectrum of networks by means of the matrix of link-state ofthe network,which can reveal the characteristics of the correlation between the degrees of the network.Also,the computation of this spectrum of networks is usually more feasible and more efficient due tothe much lower order of its matrix of link-state than its adjacent matrix in practice.Some estimatesfor the bounds of the key eigenvalues in the spectrum are obtained,the corresponding inequalities arepresented and proved.For the sake of its application,the authors define spectrum of networks in twoways,and all theorems are given in parallel for both kinds of definition.In addition,the authors finda symmetry in the spectrum,which is relative to the characteristic of structure of its network to someextent.
基金Project supported by the National Natural Science Foundation of China (No. 61472100)
文摘Address-resolution protocol (ARP) is an important protocol of data link layers that aims to obtain the corresponding relationship between Internet Protocol (IP) and Media Access Control (MAC) addresses. Traditional ARPs (address-resolution and neighbor-discovery protocols) do not consider the existence of malicious nodes, which reveals destination addresses in the resolution process. Thus, these traditional protocols allow malicious nodes to easily carry out attacks, such as man-in-the-middle attack and denial-of-service attack. To overcome these weaknesses, we propose an anonymous-address-resolution (AS-AR) protocol. AS-AR does not publicize the destination address in the address-resolution process and hides the IP and MAC addresses of the source node, The malicious node cannot obtain the addresses of the destination and the node which initiates the address resolution; thus, it cannot attack. Analyses and experiments show that AS-AR has a higher security level than existing security methods, such as secure-neighbor discovery.