In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of W...In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of WSNs are distributed in an intimidating region,which is non-rigid to attacks.The recent research domains of WSN deal with models to handle the WSN communications against malicious attacks and threats.In traditional models,the solution has been made for defending the networks,only to specific attacks.However,in real-time applications,the kind of attack that is launched by the adversary is not known.Additionally,on developing a security mechanism for WSN,the resource constraints of sensor nodes are also to be considered.With that note,this paper presents an Enhanced Security Model with Improved Defensive Routing Mechanism(IDRM)for defending the sensor network from various attacks.Moreover,for efficient model design,the work includes the part of feature evaluation of some general attacks of WSNs.The IDRM also includes determination of optimal secure paths and Node security for secure routing operations.The performance of the proposed model is evaluated with respect to several factors;it is found that the model has achieved better security levels and is efficient than other existing models in WSN communications.It is proven that the proposed IDRM produces 74%of PDR in average and a minimized packet drop of 38%when comparing with the existing works.展开更多
Cognitive Wireless Mesh Networks(CWMN) is a novel wireless network which combines the advantage of Cognitive Radio(CR) and wireless mesh networks.CWMN can realize seamless in-tegration of heterogeneous wireless networ...Cognitive Wireless Mesh Networks(CWMN) is a novel wireless network which combines the advantage of Cognitive Radio(CR) and wireless mesh networks.CWMN can realize seamless in-tegration of heterogeneous wireless networks and achieve better radio resource utilization.However,it is particularly vulnerable due to its features of open medium,dynamic spectrum,dynamic topology,and multi-top routing,etc..Being a dynamic positive security strategy,intrusion detection can provide powerful safeguard to CWMN.In this paper,we introduce trust mechanism into CWMN with intrusion detection and present a trust establishment model based on intrusion detection.Node trust degree and the trust degree of data transmission channels between nodes are defined and an algorithm of calcu-lating trust degree is given based on distributed detection of attack to networks.A channel assignment and routing scheme is proposed,in which selects the trusted nodes and allocates data channel with high trust degree for the transmission between neighbor nodes to establish a trusted route.Simulation re-sults indicate that the scheme can vary channel allocation and routing dynamically according to network security state so as to avoid suspect nodes and unsafe channels,and improve the packet safe delivery fraction effectively.展开更多
Failure-insensitive routing is a good mechanism to avoid packet dropping and disconnection of forwarding when some links fail, but multiple failure links may bring routing loop for the mechanism. Backtracking routing ...Failure-insensitive routing is a good mechanism to avoid packet dropping and disconnection of forwarding when some links fail, but multiple failure links may bring routing loop for the mechanism. Backtracking routing algorithm based on inverse shortest path tree rooted at destination is presented. The feasible restoration routing is obtained through searching from the start of the failure link and tracing back to the leaves of the shortest path tree with the destination as the root. The packets are forwarded from the mounted point with smaller sequence to the mount point with bigger sequence to decrease the possible of loop in case of multi-failures. The simulations and analysis indicate that backtracking routing algorithm improves the network survivability especially for large network, at the cost of the computation complexity in the same order as failure insensitive routing.展开更多
Routing is the cornerstone of network architecture, and a new routing mechanism is a requisite for constructing new network architecture. The current routing mechanism of the Internet layer is basically the single nex...Routing is the cornerstone of network architecture, and a new routing mechanism is a requisite for constructing new network architecture. The current routing mechanism of the Internet layer is basically the single next-hop routing mechanism, which is the root of transmission congestion in the network. To solve this congestion problem, a fundamental measure is to change the route selection mode of current routing mechanism to allow parallel transmission over multiple routes. Currently, Border Gateway Protocol (BGP) is the only inter-domain routing protocol used in the Internet, but the routing system using BGP suffers scalability problem. To solve the scalability issue of the current inter-domain routing system, a new hierarchical routing system, i.e. Scalable Inter-Domain Routing Architecture (s-idra), is suggested. In addition to scalability, the current routing system is facing other challenges including security, Quality of Service (QoS), multicasting, mobility and dynamic network topology. Therefore, the research on routing protocols, especially the protocol for the new network architecture, is still a tough task and has a long way to go.展开更多
A self-contained connection of wireless links that functions without any infrastructure is known as Mobile Ad Hoc Network(MANET).A MANET’s nodes could engage actively and dynamically with one another.However,MAN-ETs,...A self-contained connection of wireless links that functions without any infrastructure is known as Mobile Ad Hoc Network(MANET).A MANET’s nodes could engage actively and dynamically with one another.However,MAN-ETs,from the other side,are exposed to severe potential threats that are difficult to counter with present security methods.As a result,several safe communication protocols designed to enhance the secure interaction among MANET nodes.In this research,we offer a reputed optimal routing value among network nodes,secure computations,and misbehavior detection predicated on node’s trust levels with a Hybrid Trust based Reputation Mechanism(HTRM).In addition,the study designs a robust Public Key Infrastructure(PKI)system using the suggested trust evaluation method in terms of“key”generation,which is a crucial component of a PKI cryptosystem.We also concentrate on the solid node authenticating process that relies on pre-authentication.To ensure edge-to-edge security,we assess safe,trustworthy routes to secure computations and authenticate mobile nodes,incorporating uncertainty into the trust management solution.When compared to other protocols,our recommended approach performs better.Finally,we use simulations data and performance evaluation metrics to verify our suggested approach’s validity Our approach outperformed the competing systems in terms of overall end-to-end delay,packet delivery ratio,performance,power consumption,and key-computing time by 3.47%,3.152%,2.169%,and 3.527%,3.762%,significantly.展开更多
The microstructure evolution and mechanical properties of a ZK60 magnesium alloy produced by the semi-solid thermal transformation (SSTT) route and the recrystallization and partial melting (RAP) route were studie...The microstructure evolution and mechanical properties of a ZK60 magnesium alloy produced by the semi-solid thermal transformation (SSTT) route and the recrystallization and partial melting (RAP) route were studied, respectively. The microstructure evolution during partial remelting was studied at different temperatures for different time. The tensile mechanical properties of thixoformed components by the two routes at room temperature were examined. The results show that coalescence is dominant in the SSTT alloy and Ostwald ripening is dominant in the RAP alloy. Compared with the SSTT route, the RAP route can produce finer semi-solid microstructure under the similar isothermal holding condition. The microstructure of the RAP alloy is much more spheroidized compared with the SSTT alloy. Thixoforming for the ZK60 magnesium alloy produced by the SSTT and RAP route results in successful filling of the die, and the thixoforming process improves the mechanical properties of ZK60 magnesium alloy. The RAP alloy shows significantly advantageous mechanical properties over that of the SSTT alloy.展开更多
Four different routes of asymmetric reduction rolling were conducted on AZ31 magnesium alloy to investigate their effect on the microstructure evolution and mechanical properties. Route A is the forward rolling; while...Four different routes of asymmetric reduction rolling were conducted on AZ31 magnesium alloy to investigate their effect on the microstructure evolution and mechanical properties. Route A is the forward rolling; while during routes B and C the sheets are rotated 180o in rolling direction and normal direction, respectively; route D is the unidirectional rolling. The strain states of rolled sheets were analyzed by the finite element method, while the microstructure and texture were observed using optical microscopy, X-ray diffraction and electron back-scattered diffraction techniques, and the mechanical properties were measured by tensile test. The results show that route D produced the largest effective strain. Compared with other samples, sample D exhibited a homogeneous microstructure with fine grains as well as a weak and tilted texture, in corresponding, it performed excellent tensile properties, which suggested that route D was an effective way to enhance the strength and plasticity of AZ31 sheet.展开更多
LDoS (Low-rate Denial of Service) attack, exploiting the flaws in the congestion avoidance mechanism of TCP protocol,is periodic, stealthy, and with high efficiency. Since BGP uses TCP as a transport protocol, it is...LDoS (Low-rate Denial of Service) attack, exploiting the flaws in the congestion avoidance mechanism of TCP protocol,is periodic, stealthy, and with high efficiency. Since BGP uses TCP as a transport protocol, it is subject to LDoS attacks as well. LDoS attacks can cause table reset, route flapping of BGP protocol. A deliberately constructed distributed low-rate DOS attacks can even generate surge of updates throughout the Internet. In this paper, we investigate the promotion of attack efficiency of this novel attack, and then propose an attack model to simulate the LDoS attack. Experiments prove that this attack model can exponentially lower the attack costs and improve the attack effect.展开更多
In terms of special geological conditions of the Western Route of South-to-North Water Transfer Project, the classification method for surrounding rocks is discussed by combining with the construction method of tunnel...In terms of special geological conditions of the Western Route of South-to-North Water Transfer Project, the classification method for surrounding rocks is discussed by combining with the construction method of tunnel boring machine (TBM). The classification standard of surrounding rocks is put forward on the basis of physical simulations and engineering practices. Damage, deformation and evolution of surrounding rocks induced by TBM excavation are discussed. Meanwhile, the long-term deformation mechanisms and stability of surrounding rocks are also studied. On this basis, a three-dimensional constitutive model for interbedded sandstone slate and a fiat shell-joint element-foundation system for calculating internal forces of segment lining are established. The deformation features of surrounding rocks of deep and steep interbedded sandstone slate and their influences on internal forces of segment lining are presented. Finally, the design methods of segment lining constructed in deep and steep flysch are proposed.展开更多
Significant efforts have been made in revealing the mechanism of thaumasite formation in concrete, which continues to be fraught with ambiguities and dissension. Chemical method was employed to synthesize pure C3S, C2...Significant efforts have been made in revealing the mechanism of thaumasite formation in concrete, which continues to be fraught with ambiguities and dissension. Chemical method was employed to synthesize pure C3S, C2S, C3A, ettringite, and thaumasite, and X-ray diffraction(XRD), Raman spectroscopy and infrared spectroscopy(IR) were used to identify thaumasite from other hydrates. To investigate the direct route of thaumasite formation, C3S, C2S, gypsum, and calcium carbonate were used to prepare a cement paste so that the interference of ettringite formation can be avoided. The indirect route of thaumasite formation was also studied by considering the effect of C3A or ettringite content on thaumasite formation. Results show that thaumasite can be definitely generated in the absence of aluminium-bearing minerals or ettringite under appropriate conditions, while the ettringite presence promotes the thaumasite formation. No evidences support the heterogeneous nucleation route in this work. It is concluded that the method mentioned in this work can surely be used to investigate the mechanism of thaumasite formation, and thaumasite can form by both direct and woodfordite routes.展开更多
Opportunistic Mobile Social Networks(OMSNs)are kind of Delay Tolerant Networks(DTNs)that leverage characteristics of Mobile Ad Hoc Networks(MANETs)and Social Networks,particularly the social features,to boost performa...Opportunistic Mobile Social Networks(OMSNs)are kind of Delay Tolerant Networks(DTNs)that leverage characteristics of Mobile Ad Hoc Networks(MANETs)and Social Networks,particularly the social features,to boost performance of routing algorithms.Users in OMSNs communicate to share and disseminate data to meet needs for variety of applications.Such networks have attracted tremendous attention lately due to the data transmission requirement from emerging applications such as IoT and smart city initiatives.Devices carried by human is the carrier of message transmission,so the social features of human can be used to improve the ability of data transmission.In this paper,we conduct a comparative survey on routing algorithms in OMSNs.We first analyze routing algorithms based on three social features.Since node selfishness is not really considered previously in aforementioned routing algorithms,but has significant impact on network performance,we treat node selfishness as another social feature,classify and elaborate routing algorithms based on incentive mechanism.To assess the impact of social features on routing algorithms,we conducted simulation for six routing algorithms and analyzed the simulation result.Finally,we conclude the paper with challenges on design of routing in OMSNs and point out some future research directions.展开更多
The security problems of wireless sensor networks (WSN) have attracted people’s wide attention. In this paper, after we have summarized the existing security problems and solutions in WSN, we find that the insider at...The security problems of wireless sensor networks (WSN) have attracted people’s wide attention. In this paper, after we have summarized the existing security problems and solutions in WSN, we find that the insider attack to WSN is hard to solve. Insider attack is different from outsider attack, because it can’t be solved by the traditional encryption and message authentication. Therefore, a reliable secure routing protocol should be proposed in order to defense the insider attack. In this paper, we focus on insider selective forwarding attack. The existing detection mechanisms, such as watchdog, multipath retreat, neighbor-based monitoring and so on, have both advantages and disadvantages. According to their characteristics, we proposed a secure routing protocol based on monitor node and trust mechanism. The reputation value is made up with packet forwarding rate and node’s residual energy. So this detection and routing mechanism is universal because it can take account of both the safety and lifetime of network. Finally, we use OPNET simulation to verify the performance of our algorithm.展开更多
Network security and energy consumption are deemed to be two important components of wireless and mobile ad hoc networks(WMANets).There are various routing attacks which harm Ad Hoc networks.This is because of the uns...Network security and energy consumption are deemed to be two important components of wireless and mobile ad hoc networks(WMANets).There are various routing attacks which harm Ad Hoc networks.This is because of the unsecure wireless communication,resource constrained capabilities and dynamic topology.In order to cope with these issues,Ad Hoc On-Demand Distance Vector(AODV)routing protocol can be used to remain the normal networks functionality and to adjust data transmission by defending the networks against black hole attacks.The proposed system,in this work,identifies the optimal route from sender to collector,prioritizing the number of jumps,the battery life,and security,which are fundamental prerequisites.Researches have proposed various plans for detecting the shortest route,as well as ensuring energy conversions and defense against threats and attacks.In this regard,the packet drop attack is one of the most destructive attack against WMANet communication and hence merits special attention.This type of attack may allow the attacker to take control of the attacked hubs,which may lost packets or transmitted information via a wrong route during the packets journey from a source hub to a target one.Hence,a new routing protocol method has been proposed in this study.It applies the concept of energy saving systems to conserve energy that is not required by the system.The proposed method for energy aware detection and prevention of packet drop attacks in mobile ad hoc networks is termed the Ad Hoc On-Demand and Distance Vector–Packet Drop Battling Mechanism(AODV–PDBM).展开更多
In this paper, proton transfer mechanism of alanine induced by Zn2+ was investiga- ted by the CCSD/6-31++G**//B3LYP/6-31++G** method. Six neutral complexes and one ampho- teric complex were optimized, among w...In this paper, proton transfer mechanism of alanine induced by Zn2+ was investiga- ted by the CCSD/6-31++G**//B3LYP/6-31++G** method. Six neutral complexes and one ampho- teric complex were optimized, among which the amphoteric complex was the most stable with binding energy of 201.92 kcal·mol-1. In addition, the rotation of intramolecular single bond leads to the neutral configuration conversion, in which the rotation energy barriers of C–C single bonds are lower than 10.51 kcal·mol-1, and those of C–O single bonds range among 9.53~17.50 kcal·mol-1. On the other hand, the proton transfers among the carboxylic oxygen atoms can also result in the neutral configuration conversion, whose energy barriers of forward/back reaction are 53.90 and 32.46 kcal·mol-1, respectively. In detail, the proton transfers from carboxylic group to amino lead to their configuration conversion from neutral to amphoteric. Furthermore, under the catalysis of Zn2+, there was no energy barrier in this reaction. The conversion route from the most stable neutral configuration Ⅱ to the most stable amphoteric configuration I was: Ⅱ→Ⅱ-Ⅲ→Ⅲ→Ⅲ-Ⅵ→Ⅵ→Ⅴ-Ⅵ→Ⅴ→Ⅰ-Ⅴ→Ⅰ,with the energy barrier to be 64.64 kcal·mol-1.展开更多
An ants-based on-demand routing algorithm (AORA) specialized for mobile ad hoc networks is proposed. AORA measures the network's traffic information including delivery time, route energy etc. by the continuous deli...An ants-based on-demand routing algorithm (AORA) specialized for mobile ad hoc networks is proposed. AORA measures the network's traffic information including delivery time, route energy etc. by the continuous delivery of data packets, then calculates the compositive parameter for each route which can be seen as the stigmity and uses it to choose the comparatively optimal route in real time. To adjust the weight of each traffic information, the algorithm can meet the different demand of the network's user. Multipath source self repair routing (MSSRR) algorithm and dynamic source routing (DSR) can be seen as the special samples of AORA. The routing overhead is not increased in this algorithm. By using simulation, it can be seen that the performance of AORA is better than that of DSR in all scenarios obviously, especially the delivery fraction is increased by more than 100 96.展开更多
Based on the analyses of geodetic deformation datum, the concepts of real datum and relative datum of displacements associated with an earthquake are put foward. Introducting a deformation datum parameter into model p...Based on the analyses of geodetic deformation datum, the concepts of real datum and relative datum of displacements associated with an earthquake are put foward. Introducting a deformation datum parameter into model parameter vector can enable the reference station to be set in the epicentral areas. Two improved inversionmethods, the deformation datum parameter (DDP) method and deformation difference (DD) method, are advanced in this paper. They are further applied to dislocation model inversion of the 1990 Gonghe Ms7.0 earthquake. The inversion results inferred by using the two methods are well consistent with each other, which basically reflect the source geometry and the slip of the causative fault.展开更多
In an ad hoc network, it is usually difficult to optimize the assignment of network routing resources using a single type of routing protocol due to the differences in network scale, node moving mode and node distribu...In an ad hoc network, it is usually difficult to optimize the assignment of network routing resources using a single type of routing protocol due to the differences in network scale, node moving mode and node distribution. Therefore, it is desirable to have nodes run multiple routing protocols simultaneously so that more than one protocols can be chosen to work jointly. For this purpose, a multiple routing platform for Ad hoc networks is proposed on a higher level of current routing protocols. In order to ensure the security of the platform, a security mechanism and its formal analysis by BAN logic is given. The simulation results of the network performance demonstrate that the proposed multi-routing platform is practicable in some complex applications.展开更多
Multipath Protocol Label Switching (MPLS) is a routing mechanism (technology) used in modern telecommunication networks, which is built as a multi-service network with a certain Quality of Service (QoS). To maintain t...Multipath Protocol Label Switching (MPLS) is a routing mechanism (technology) used in modern telecommunication networks, which is built as a multi-service network with a certain Quality of Service (QoS). To maintain the required QoS in such complicated networks, the Traffic Engineering (TE) should be equipped with optimum traffic management, routing mechanism, and switching operations, which are what this paper tackles, where the TE is identified as the optimal distribution of flows in the existing network. In this paper, an effective multipath routing mathematical model is developed based on several previous mechanisms to ensure the guaranteed desired QoS and loading balance according to the Telecommunication Network Systems (TCS) resources, to achieve the optimum TE, and hence improving the network usage efficiency. Moreover, the obtained mathematical optimization algorithm results are provided through the relative equations. Indeed the developed routing mathematical model in this paper is suitable for the dynamic distribution of information flows, which is the main improvement in the TE achieved in this work.展开更多
The urban transit routing problem (UTRP) involves the construction of route sets on existing road networks to cater for the transit demand efficiently. This is an NP-hard problem, where the generation of candidate rou...The urban transit routing problem (UTRP) involves the construction of route sets on existing road networks to cater for the transit demand efficiently. This is an NP-hard problem, where the generation of candidate route sets can lead to a number of potential routes being discarded on the grounds of infeasibility. This paper presents a new repair mechanism to complement the existing terminal repair and the make-small-change operators in dealing with the infeasibility of the candidate route set. When solving the UTRP, the general aim is to determine a set of transit route networks that achieves a minimum total cost for both the passenger and the operator. With this in mind, we propose a differential evolution (DE) algorithm for solving the UTRP with a specific objective of minimizing the average travel time of all served passengers. Computational experiments are performed on the basis of benchmark Mandl’s Swiss network. Computational results from the proposed repair mechanism are comparable with the existing repair mechanisms. Furthermore, the combined repair mechanisms of all three operators produced very promising results. In addition, the proposed DE algorithm outperformed most of the published results in the literature.展开更多
文摘In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of WSNs are distributed in an intimidating region,which is non-rigid to attacks.The recent research domains of WSN deal with models to handle the WSN communications against malicious attacks and threats.In traditional models,the solution has been made for defending the networks,only to specific attacks.However,in real-time applications,the kind of attack that is launched by the adversary is not known.Additionally,on developing a security mechanism for WSN,the resource constraints of sensor nodes are also to be considered.With that note,this paper presents an Enhanced Security Model with Improved Defensive Routing Mechanism(IDRM)for defending the sensor network from various attacks.Moreover,for efficient model design,the work includes the part of feature evaluation of some general attacks of WSNs.The IDRM also includes determination of optimal secure paths and Node security for secure routing operations.The performance of the proposed model is evaluated with respect to several factors;it is found that the model has achieved better security levels and is efficient than other existing models in WSN communications.It is proven that the proposed IDRM produces 74%of PDR in average and a minimized packet drop of 38%when comparing with the existing works.
基金Supported by the National High Technology Research and Development Program (No. 2009AA011504)
文摘Cognitive Wireless Mesh Networks(CWMN) is a novel wireless network which combines the advantage of Cognitive Radio(CR) and wireless mesh networks.CWMN can realize seamless in-tegration of heterogeneous wireless networks and achieve better radio resource utilization.However,it is particularly vulnerable due to its features of open medium,dynamic spectrum,dynamic topology,and multi-top routing,etc..Being a dynamic positive security strategy,intrusion detection can provide powerful safeguard to CWMN.In this paper,we introduce trust mechanism into CWMN with intrusion detection and present a trust establishment model based on intrusion detection.Node trust degree and the trust degree of data transmission channels between nodes are defined and an algorithm of calcu-lating trust degree is given based on distributed detection of attack to networks.A channel assignment and routing scheme is proposed,in which selects the trusted nodes and allocates data channel with high trust degree for the transmission between neighbor nodes to establish a trusted route.Simulation re-sults indicate that the scheme can vary channel allocation and routing dynamically according to network security state so as to avoid suspect nodes and unsafe channels,and improve the packet safe delivery fraction effectively.
基金Supported by the National Natural Science Foundation of China (60502028)
文摘Failure-insensitive routing is a good mechanism to avoid packet dropping and disconnection of forwarding when some links fail, but multiple failure links may bring routing loop for the mechanism. Backtracking routing algorithm based on inverse shortest path tree rooted at destination is presented. The feasible restoration routing is obtained through searching from the start of the failure link and tracing back to the leaves of the shortest path tree with the destination as the root. The packets are forwarded from the mounted point with smaller sequence to the mount point with bigger sequence to decrease the possible of loop in case of multi-failures. The simulations and analysis indicate that backtracking routing algorithm improves the network survivability especially for large network, at the cost of the computation complexity in the same order as failure insensitive routing.
基金the National BasicResearch Program of China ("973" Program)under Grant 2007CB307102the National HighTechnology Research and Development Programof China ("863" Program) under Grant2007AA01Z212.
文摘Routing is the cornerstone of network architecture, and a new routing mechanism is a requisite for constructing new network architecture. The current routing mechanism of the Internet layer is basically the single next-hop routing mechanism, which is the root of transmission congestion in the network. To solve this congestion problem, a fundamental measure is to change the route selection mode of current routing mechanism to allow parallel transmission over multiple routes. Currently, Border Gateway Protocol (BGP) is the only inter-domain routing protocol used in the Internet, but the routing system using BGP suffers scalability problem. To solve the scalability issue of the current inter-domain routing system, a new hierarchical routing system, i.e. Scalable Inter-Domain Routing Architecture (s-idra), is suggested. In addition to scalability, the current routing system is facing other challenges including security, Quality of Service (QoS), multicasting, mobility and dynamic network topology. Therefore, the research on routing protocols, especially the protocol for the new network architecture, is still a tough task and has a long way to go.
文摘A self-contained connection of wireless links that functions without any infrastructure is known as Mobile Ad Hoc Network(MANET).A MANET’s nodes could engage actively and dynamically with one another.However,MAN-ETs,from the other side,are exposed to severe potential threats that are difficult to counter with present security methods.As a result,several safe communication protocols designed to enhance the secure interaction among MANET nodes.In this research,we offer a reputed optimal routing value among network nodes,secure computations,and misbehavior detection predicated on node’s trust levels with a Hybrid Trust based Reputation Mechanism(HTRM).In addition,the study designs a robust Public Key Infrastructure(PKI)system using the suggested trust evaluation method in terms of“key”generation,which is a crucial component of a PKI cryptosystem.We also concentrate on the solid node authenticating process that relies on pre-authentication.To ensure edge-to-edge security,we assess safe,trustworthy routes to secure computations and authenticate mobile nodes,incorporating uncertainty into the trust management solution.When compared to other protocols,our recommended approach performs better.Finally,we use simulations data and performance evaluation metrics to verify our suggested approach’s validity Our approach outperformed the competing systems in terms of overall end-to-end delay,packet delivery ratio,performance,power consumption,and key-computing time by 3.47%,3.152%,2.169%,and 3.527%,3.762%,significantly.
文摘The microstructure evolution and mechanical properties of a ZK60 magnesium alloy produced by the semi-solid thermal transformation (SSTT) route and the recrystallization and partial melting (RAP) route were studied, respectively. The microstructure evolution during partial remelting was studied at different temperatures for different time. The tensile mechanical properties of thixoformed components by the two routes at room temperature were examined. The results show that coalescence is dominant in the SSTT alloy and Ostwald ripening is dominant in the RAP alloy. Compared with the SSTT route, the RAP route can produce finer semi-solid microstructure under the similar isothermal holding condition. The microstructure of the RAP alloy is much more spheroidized compared with the SSTT alloy. Thixoforming for the ZK60 magnesium alloy produced by the SSTT and RAP route results in successful filling of the die, and the thixoforming process improves the mechanical properties of ZK60 magnesium alloy. The RAP alloy shows significantly advantageous mechanical properties over that of the SSTT alloy.
基金Project(51471041)supported by the National Natural Science Foundation of China
文摘Four different routes of asymmetric reduction rolling were conducted on AZ31 magnesium alloy to investigate their effect on the microstructure evolution and mechanical properties. Route A is the forward rolling; while during routes B and C the sheets are rotated 180o in rolling direction and normal direction, respectively; route D is the unidirectional rolling. The strain states of rolled sheets were analyzed by the finite element method, while the microstructure and texture were observed using optical microscopy, X-ray diffraction and electron back-scattered diffraction techniques, and the mechanical properties were measured by tensile test. The results show that route D produced the largest effective strain. Compared with other samples, sample D exhibited a homogeneous microstructure with fine grains as well as a weak and tilted texture, in corresponding, it performed excellent tensile properties, which suggested that route D was an effective way to enhance the strength and plasticity of AZ31 sheet.
文摘LDoS (Low-rate Denial of Service) attack, exploiting the flaws in the congestion avoidance mechanism of TCP protocol,is periodic, stealthy, and with high efficiency. Since BGP uses TCP as a transport protocol, it is subject to LDoS attacks as well. LDoS attacks can cause table reset, route flapping of BGP protocol. A deliberately constructed distributed low-rate DOS attacks can even generate surge of updates throughout the Internet. In this paper, we investigate the promotion of attack efficiency of this novel attack, and then propose an attack model to simulate the LDoS attack. Experiments prove that this attack model can exponentially lower the attack costs and improve the attack effect.
基金Supported by the National Key Technology R&D Program in the 11th Five-year Plan of China (2006BAB04A06)
文摘In terms of special geological conditions of the Western Route of South-to-North Water Transfer Project, the classification method for surrounding rocks is discussed by combining with the construction method of tunnel boring machine (TBM). The classification standard of surrounding rocks is put forward on the basis of physical simulations and engineering practices. Damage, deformation and evolution of surrounding rocks induced by TBM excavation are discussed. Meanwhile, the long-term deformation mechanisms and stability of surrounding rocks are also studied. On this basis, a three-dimensional constitutive model for interbedded sandstone slate and a fiat shell-joint element-foundation system for calculating internal forces of segment lining are established. The deformation features of surrounding rocks of deep and steep interbedded sandstone slate and their influences on internal forces of segment lining are presented. Finally, the design methods of segment lining constructed in deep and steep flysch are proposed.
基金Funded by the National Natural Science Foundation of China(Nos.51272222 and 51132010)
文摘Significant efforts have been made in revealing the mechanism of thaumasite formation in concrete, which continues to be fraught with ambiguities and dissension. Chemical method was employed to synthesize pure C3S, C2S, C3A, ettringite, and thaumasite, and X-ray diffraction(XRD), Raman spectroscopy and infrared spectroscopy(IR) were used to identify thaumasite from other hydrates. To investigate the direct route of thaumasite formation, C3S, C2S, gypsum, and calcium carbonate were used to prepare a cement paste so that the interference of ettringite formation can be avoided. The indirect route of thaumasite formation was also studied by considering the effect of C3A or ettringite content on thaumasite formation. Results show that thaumasite can be definitely generated in the absence of aluminium-bearing minerals or ettringite under appropriate conditions, while the ettringite presence promotes the thaumasite formation. No evidences support the heterogeneous nucleation route in this work. It is concluded that the method mentioned in this work can surely be used to investigate the mechanism of thaumasite formation, and thaumasite can form by both direct and woodfordite routes.
基金This work was supported by National Natural Science Foundation of China(No.61672106)Natural Science Foundation of Beijing,China(L192023).
文摘Opportunistic Mobile Social Networks(OMSNs)are kind of Delay Tolerant Networks(DTNs)that leverage characteristics of Mobile Ad Hoc Networks(MANETs)and Social Networks,particularly the social features,to boost performance of routing algorithms.Users in OMSNs communicate to share and disseminate data to meet needs for variety of applications.Such networks have attracted tremendous attention lately due to the data transmission requirement from emerging applications such as IoT and smart city initiatives.Devices carried by human is the carrier of message transmission,so the social features of human can be used to improve the ability of data transmission.In this paper,we conduct a comparative survey on routing algorithms in OMSNs.We first analyze routing algorithms based on three social features.Since node selfishness is not really considered previously in aforementioned routing algorithms,but has significant impact on network performance,we treat node selfishness as another social feature,classify and elaborate routing algorithms based on incentive mechanism.To assess the impact of social features on routing algorithms,we conducted simulation for six routing algorithms and analyzed the simulation result.Finally,we conclude the paper with challenges on design of routing in OMSNs and point out some future research directions.
文摘The security problems of wireless sensor networks (WSN) have attracted people’s wide attention. In this paper, after we have summarized the existing security problems and solutions in WSN, we find that the insider attack to WSN is hard to solve. Insider attack is different from outsider attack, because it can’t be solved by the traditional encryption and message authentication. Therefore, a reliable secure routing protocol should be proposed in order to defense the insider attack. In this paper, we focus on insider selective forwarding attack. The existing detection mechanisms, such as watchdog, multipath retreat, neighbor-based monitoring and so on, have both advantages and disadvantages. According to their characteristics, we proposed a secure routing protocol based on monitor node and trust mechanism. The reputation value is made up with packet forwarding rate and node’s residual energy. So this detection and routing mechanism is universal because it can take account of both the safety and lifetime of network. Finally, we use OPNET simulation to verify the performance of our algorithm.
文摘Network security and energy consumption are deemed to be two important components of wireless and mobile ad hoc networks(WMANets).There are various routing attacks which harm Ad Hoc networks.This is because of the unsecure wireless communication,resource constrained capabilities and dynamic topology.In order to cope with these issues,Ad Hoc On-Demand Distance Vector(AODV)routing protocol can be used to remain the normal networks functionality and to adjust data transmission by defending the networks against black hole attacks.The proposed system,in this work,identifies the optimal route from sender to collector,prioritizing the number of jumps,the battery life,and security,which are fundamental prerequisites.Researches have proposed various plans for detecting the shortest route,as well as ensuring energy conversions and defense against threats and attacks.In this regard,the packet drop attack is one of the most destructive attack against WMANet communication and hence merits special attention.This type of attack may allow the attacker to take control of the attacked hubs,which may lost packets or transmitted information via a wrong route during the packets journey from a source hub to a target one.Hence,a new routing protocol method has been proposed in this study.It applies the concept of energy saving systems to conserve energy that is not required by the system.The proposed method for energy aware detection and prevention of packet drop attacks in mobile ad hoc networks is termed the Ad Hoc On-Demand and Distance Vector–Packet Drop Battling Mechanism(AODV–PDBM).
基金supported by New Biological and Chemical Technology Key Laboratory of Tangshan(12150224B-2)Science Foundation of Tangshan Normal University(2013D02)
文摘In this paper, proton transfer mechanism of alanine induced by Zn2+ was investiga- ted by the CCSD/6-31++G**//B3LYP/6-31++G** method. Six neutral complexes and one ampho- teric complex were optimized, among which the amphoteric complex was the most stable with binding energy of 201.92 kcal·mol-1. In addition, the rotation of intramolecular single bond leads to the neutral configuration conversion, in which the rotation energy barriers of C–C single bonds are lower than 10.51 kcal·mol-1, and those of C–O single bonds range among 9.53~17.50 kcal·mol-1. On the other hand, the proton transfers among the carboxylic oxygen atoms can also result in the neutral configuration conversion, whose energy barriers of forward/back reaction are 53.90 and 32.46 kcal·mol-1, respectively. In detail, the proton transfers from carboxylic group to amino lead to their configuration conversion from neutral to amphoteric. Furthermore, under the catalysis of Zn2+, there was no energy barrier in this reaction. The conversion route from the most stable neutral configuration Ⅱ to the most stable amphoteric configuration I was: Ⅱ→Ⅱ-Ⅲ→Ⅲ→Ⅲ-Ⅵ→Ⅵ→Ⅴ-Ⅵ→Ⅴ→Ⅰ-Ⅴ→Ⅰ,with the energy barrier to be 64.64 kcal·mol-1.
文摘An ants-based on-demand routing algorithm (AORA) specialized for mobile ad hoc networks is proposed. AORA measures the network's traffic information including delivery time, route energy etc. by the continuous delivery of data packets, then calculates the compositive parameter for each route which can be seen as the stigmity and uses it to choose the comparatively optimal route in real time. To adjust the weight of each traffic information, the algorithm can meet the different demand of the network's user. Multipath source self repair routing (MSSRR) algorithm and dynamic source routing (DSR) can be seen as the special samples of AORA. The routing overhead is not increased in this algorithm. By using simulation, it can be seen that the performance of AORA is better than that of DSR in all scenarios obviously, especially the delivery fraction is increased by more than 100 96.
文摘Based on the analyses of geodetic deformation datum, the concepts of real datum and relative datum of displacements associated with an earthquake are put foward. Introducting a deformation datum parameter into model parameter vector can enable the reference station to be set in the epicentral areas. Two improved inversionmethods, the deformation datum parameter (DDP) method and deformation difference (DD) method, are advanced in this paper. They are further applied to dislocation model inversion of the 1990 Gonghe Ms7.0 earthquake. The inversion results inferred by using the two methods are well consistent with each other, which basically reflect the source geometry and the slip of the causative fault.
文摘In an ad hoc network, it is usually difficult to optimize the assignment of network routing resources using a single type of routing protocol due to the differences in network scale, node moving mode and node distribution. Therefore, it is desirable to have nodes run multiple routing protocols simultaneously so that more than one protocols can be chosen to work jointly. For this purpose, a multiple routing platform for Ad hoc networks is proposed on a higher level of current routing protocols. In order to ensure the security of the platform, a security mechanism and its formal analysis by BAN logic is given. The simulation results of the network performance demonstrate that the proposed multi-routing platform is practicable in some complex applications.
文摘Multipath Protocol Label Switching (MPLS) is a routing mechanism (technology) used in modern telecommunication networks, which is built as a multi-service network with a certain Quality of Service (QoS). To maintain the required QoS in such complicated networks, the Traffic Engineering (TE) should be equipped with optimum traffic management, routing mechanism, and switching operations, which are what this paper tackles, where the TE is identified as the optimal distribution of flows in the existing network. In this paper, an effective multipath routing mathematical model is developed based on several previous mechanisms to ensure the guaranteed desired QoS and loading balance according to the Telecommunication Network Systems (TCS) resources, to achieve the optimum TE, and hence improving the network usage efficiency. Moreover, the obtained mathematical optimization algorithm results are provided through the relative equations. Indeed the developed routing mathematical model in this paper is suitable for the dynamic distribution of information flows, which is the main improvement in the TE achieved in this work.
文摘The urban transit routing problem (UTRP) involves the construction of route sets on existing road networks to cater for the transit demand efficiently. This is an NP-hard problem, where the generation of candidate route sets can lead to a number of potential routes being discarded on the grounds of infeasibility. This paper presents a new repair mechanism to complement the existing terminal repair and the make-small-change operators in dealing with the infeasibility of the candidate route set. When solving the UTRP, the general aim is to determine a set of transit route networks that achieves a minimum total cost for both the passenger and the operator. With this in mind, we propose a differential evolution (DE) algorithm for solving the UTRP with a specific objective of minimizing the average travel time of all served passengers. Computational experiments are performed on the basis of benchmark Mandl’s Swiss network. Computational results from the proposed repair mechanism are comparable with the existing repair mechanisms. Furthermore, the combined repair mechanisms of all three operators produced very promising results. In addition, the proposed DE algorithm outperformed most of the published results in the literature.