To meet society’s needs for undergraduate students to have engineering skills and to develop students’ability to operate Linux and engage in network software development,this paper proposes the construction of a new...To meet society’s needs for undergraduate students to have engineering skills and to develop students’ability to operate Linux and engage in network software development,this paper proposes the construction of a new specialized course for network engineering major--Linux system and network programming.This paper analyzes the course’s advantages,presents the contents of this course,designs a series of teaching methods aimed at improving students’engineering ability,proposes a course assessment method that will encourage students to practice,lists the development requirements for an examination software designed for this course,and finally,presents the results of our practice in teaching this course.展开更多
We present an incremental network programming mechanism which reprograms wireless sensors quickly by transmitting the incremental changes using the Rsync algorithm;we generate the difference of the two program images ...We present an incremental network programming mechanism which reprograms wireless sensors quickly by transmitting the incremental changes using the Rsync algorithm;we generate the difference of the two program images allowing us to distribute only the key changes. Unlike previous approaches, our design does not assume any prior knowledge of the program code structure and can be applied to any hardware platform. To meet the resource constraints of wireless sensors, we tuned the Rsync algorithm which was originally made for updating binary files among powerful host machines. The sensor node processes the delivery and the decoding of the difference script separately making it easy to extend for multi-hop network programming. We are able to get a speed-up of 9.1 for changing a constant and 2.1 to 2.5 for changing a few lines in the source code.展开更多
We present a network programming mechanism that can flexibly and quickly re-task a large multi-hop network of wireless sensor nodes. Our mechanism allows each sensor node to be incrementally reprogrammed with heteroge...We present a network programming mechanism that can flexibly and quickly re-task a large multi-hop network of wireless sensor nodes. Our mechanism allows each sensor node to be incrementally reprogrammed with heterogeneous images of native program code using Rsync block comparison algorithm, point-to-point routing with the BLIP IPv6 stack, and image volume management with Deluge2. With our re-tasking method, we demonstrate an order of magnitude speed-up on small code changes over non-incremental delivery. Our mechanism also scales sub-linearly in the diameter of the network. Collectively, these advancements qualitatively change the software life cycle of the embedded networked systems.展开更多
This paper mainly introduces about how to use socket to design network program which can transfer data in different network platform in terms of TCP/IP Network Programming Standard.
The developments of modern mathematics and computer science make artificial neural networks become most useful tools in wide range of fields. Modeling methods of artificial neural networks are described in this paper...The developments of modern mathematics and computer science make artificial neural networks become most useful tools in wide range of fields. Modeling methods of artificial neural networks are described in this paper. The programming technique by using Matlab neural networks toolbox is discussed. The application in Material Hot Working of neural networks is also introduced.展开更多
The main goal of this paper is to study the following combinatorial problem : given a finite set E = (e1, e2, ...,em} and a subset family a - [S1,S2, ... ,Sk} of E , does there exist a tree T with the edge set E such ...The main goal of this paper is to study the following combinatorial problem : given a finite set E = (e1, e2, ...,em} and a subset family a - [S1,S2, ... ,Sk} of E , does there exist a tree T with the edge set E such that each induced subgraph T[Si] of Si is precisely a path (1≤i≤k) ?展开更多
Based on the definition of component ontology, an effective component classification mechanism and a facet named component relationship are proposed. Then an application domain oriented, hierarchical component organiz...Based on the definition of component ontology, an effective component classification mechanism and a facet named component relationship are proposed. Then an application domain oriented, hierarchical component organization model is established. At last a hierarchical component semantic network (HCSN) described by ontology interchange language(OIL) is presented and then its function is described. Using HCSN and cooperating with other components retrieving algorithms based on component description, other components information and their assembly or composite modes related to the key component can be found. Based on HCSN, component directory library is catalogued and a prototype system is constructed. The prototype system proves that component library organization based on this model gives guarantee to the reliability of component assembly during program mining.展开更多
Artificial neural networks (ANNs) and genetic programming (GP) have recently been used for the estimation of hydraulic data. In this study, they were used as alternative tools to estimate the characteristics of hy...Artificial neural networks (ANNs) and genetic programming (GP) have recently been used for the estimation of hydraulic data. In this study, they were used as alternative tools to estimate the characteristics of hydraulic jumps, such as the free surface location and energy dissipation. The dimensionless hydraulic parameters, including jump depth, jump length, and energy dissipation, were determined as functions of the Froude number and the height and length of corrugations. The estimations of the ANN and GP models were found to be in good agreement with the measured data. The results of the ANN model were compared with those of the GP model, showing that the proposed ANN models are much more accurate than the GP models.展开更多
Approaches based on integer linear programming have been recently proposed for topology optimization in wireless sensor networks. They are, however, based on over-theoretical, unrealistic models. Our aim is to show th...Approaches based on integer linear programming have been recently proposed for topology optimization in wireless sensor networks. They are, however, based on over-theoretical, unrealistic models. Our aim is to show that it is possible to accommodate realistic models for energy consumption and communication protocols into integer linear programming. We analyze the maximum lifetime broadcasting topology problem and we present realistic models that are also shown to provide efficient and practical solving tools. We present a strategy to substantially speed up the convergence of the solving process of our algorithm. This strategy introduces a practical drawback, however, in the characteristics of the optimal solutions retrieved. A method to overcome this drawback is discussed. Computational experiments are reported.展开更多
As the exertion development (PUAP) develop in Rejang Lebong Regency in Bengkulu province which had been started since 2008 by giving a kind of fund aid called Bantuan Langsung Masyarakat (BLM PUAP), to Gapoktan (Gabun...As the exertion development (PUAP) develop in Rejang Lebong Regency in Bengkulu province which had been started since 2008 by giving a kind of fund aid called Bantuan Langsung Masyarakat (BLM PUAP), to Gapoktan (Gabungan Kelompok Tani) or an organization of farmers such by giving some money as the capital used for 1) food plant cultiva-tion, horticulture, animal husbandry, plantation, and2) non-cultivation exertion such as;home industry of agriculture, small marketing scale and another agriculture exertion. By the approach which had been done is hoped to get the important result, on the other way the role of analysis factor (Social Network Analysis) from all undertaking stakeholders programs PUAP to be relevance steps aimed to understand the relation or connectivity from all factors in the network and also the role of factor inside the network itself be the relevance steps in arranging the strategy and work intention from the realization stage of PUAP program for the continuity of the realization program in the future (finding the good strategy) which aimed to develop the program of PUAP in Rejang Lebong Regency in Bengkulu Province, and to be a reference from doing the program as a national program in Indonesia.展开更多
The homomorphic hash algorithm(HHA)is introduced to help on-the-fly verify the vireless sensor network(WSN)over-the-air programming(OAP)data based on rateless codes.The receiver calculates the hash value of a group of...The homomorphic hash algorithm(HHA)is introduced to help on-the-fly verify the vireless sensor network(WSN)over-the-air programming(OAP)data based on rateless codes.The receiver calculates the hash value of a group of data by homomorphic hash function,and then it compares the hash value with the receiving message digest.Because the feedback channel is deliberately removed during the distribution process,the rateless codes are often vulnerable when they face security issues such as packets contamination or attack.This method prevents contaminating or attack on rateless codes and reduces the potential risks of decoding failure.Compared with the SHA1 and MD5,HHA,which has a much shorter message digest,will deliver more data.The simulation results show that to transmit and verify the same amount of OAP data,HHA method sends 17.9% to 23.1%fewer packets than MD5 and SHA1 under different packet loss rates.展开更多
<strong>Background:</strong> To ensure quality and relevance of Postgraduate Programs are a commitment of the National Quality Postgraduate Programs (PNPC), and those from UNAM. Then, the self-evaluation o...<strong>Background:</strong> To ensure quality and relevance of Postgraduate Programs are a commitment of the National Quality Postgraduate Programs (PNPC), and those from UNAM. Then, the self-evaluation of the Masters in Nursing Program (PME) is necessary for it to be part of the PNPC. This study focuses on self-evaluation of implementation mechanisms to assure effective communication and collaboration with and among graduated alumni. <strong>Methods:</strong> The research was qualitative, exploratory and descriptive. An informed consent was signed by four informants, graduated from the seventeenth generation of PME. Data collection from a focal group and descriptive data analysis by atlas.ti from guidance questions that were contrasted with the scale value from PME curriculum. <strong>Results:</strong> Four categories emerged from PME graduated alumni: Category <strong>I</strong>, Professional academic performance, Category<strong> II</strong>, International activities attendance, Category <strong>III</strong>, Academic networks, and Category <strong>IV</strong>, Higher satisfaction of international activities.<strong> Conclusions:</strong> It is concluded that self-evaluation shows a graduate’s vision of conditions and networks where PME develops. Masters in Nursing Program fulfills graduates expectancy to create networks, which will contribute to knowledge and recognition of professional practice, as well as on the area’ opportunities opening for better contributions.展开更多
Network virtualization is known as a promising technology to tackle the ossification of current Internet and will play an important role in the future network area. Virtual network embedding(VNE) is a key issue in net...Network virtualization is known as a promising technology to tackle the ossification of current Internet and will play an important role in the future network area. Virtual network embedding(VNE) is a key issue in network virtualization. VNE is NP-hard and former VNE algorithms are mostly heuristic in the literature.VNE exact algorithms have been developed in recent years. However, the constraints of exact VNE are only node capacity and link bandwidth.Based on these, this paper presents an exact VNE algorithm, ILP-LC, which is based on Integer Linear Programming(ILP), for embedding virtual network request with location constraints. This novel algorithm is aiming at mapping virtual network request(VNR) successfully as many as possible and consuming less substrate resources.The topology of each VNR is randomly generated by Waxman model. Simulation results show that the proposed ILP-LC algorithm outperforms the typical heuristic algorithms in terms of the VNR acceptance ratio, at least 15%.展开更多
This paper analyzes the pipe network system of oil-gas collection and transportation for offshore oilfield development. A '0-1' integer linear programming model is constructed to optimize the investment of sea...This paper analyzes the pipe network system of oil-gas collection and transportation for offshore oilfield development. A '0-1' integer linear programming model is constructed to optimize the investment of seabed pipe network. The mathematical model is solved by the spanning tree method of graph theory and network analysis. All spanning trees of a network graph compose all the feasible solutions of the mathematical model. The optimal solution of the model is the spanning tree with the minimum cost among all spanning trees. This method can be used to optimize the seabed pipe network system and give a minimum cost plan for the development of offshore marginal oilfield groups.展开更多
The features of the floating gate devices as analog memory have been investigatedexperimentally.Programming properties of the devices,compatibility and endurance of program-ming,and programming methods are presented i...The features of the floating gate devices as analog memory have been investigatedexperimentally.Programming properties of the devices,compatibility and endurance of program-ming,and programming methods are presented in this paper.The results illustrate that thedevice can be used to store the analog weights for the neural networks,and the method that thestored value is adjusted continuously to approach to a given analog values is a rather practicalmethod for storing weights of neural networks.展开更多
基金supported by the Teaching Research and Reform Project of Qingdao University of Technology under Grant 2024-10335040。
文摘To meet society’s needs for undergraduate students to have engineering skills and to develop students’ability to operate Linux and engage in network software development,this paper proposes the construction of a new specialized course for network engineering major--Linux system and network programming.This paper analyzes the course’s advantages,presents the contents of this course,designs a series of teaching methods aimed at improving students’engineering ability,proposes a course assessment method that will encourage students to practice,lists the development requirements for an examination software designed for this course,and finally,presents the results of our practice in teaching this course.
文摘We present an incremental network programming mechanism which reprograms wireless sensors quickly by transmitting the incremental changes using the Rsync algorithm;we generate the difference of the two program images allowing us to distribute only the key changes. Unlike previous approaches, our design does not assume any prior knowledge of the program code structure and can be applied to any hardware platform. To meet the resource constraints of wireless sensors, we tuned the Rsync algorithm which was originally made for updating binary files among powerful host machines. The sensor node processes the delivery and the decoding of the difference script separately making it easy to extend for multi-hop network programming. We are able to get a speed-up of 9.1 for changing a constant and 2.1 to 2.5 for changing a few lines in the source code.
文摘We present a network programming mechanism that can flexibly and quickly re-task a large multi-hop network of wireless sensor nodes. Our mechanism allows each sensor node to be incrementally reprogrammed with heterogeneous images of native program code using Rsync block comparison algorithm, point-to-point routing with the BLIP IPv6 stack, and image volume management with Deluge2. With our re-tasking method, we demonstrate an order of magnitude speed-up on small code changes over non-incremental delivery. Our mechanism also scales sub-linearly in the diameter of the network. Collectively, these advancements qualitatively change the software life cycle of the embedded networked systems.
文摘This paper mainly introduces about how to use socket to design network program which can transfer data in different network platform in terms of TCP/IP Network Programming Standard.
文摘The developments of modern mathematics and computer science make artificial neural networks become most useful tools in wide range of fields. Modeling methods of artificial neural networks are described in this paper. The programming technique by using Matlab neural networks toolbox is discussed. The application in Material Hot Working of neural networks is also introduced.
基金Supported by the National Natural Science Foundation of China
文摘The main goal of this paper is to study the following combinatorial problem : given a finite set E = (e1, e2, ...,em} and a subset family a - [S1,S2, ... ,Sk} of E , does there exist a tree T with the edge set E such that each induced subgraph T[Si] of Si is precisely a path (1≤i≤k) ?
文摘Based on the definition of component ontology, an effective component classification mechanism and a facet named component relationship are proposed. Then an application domain oriented, hierarchical component organization model is established. At last a hierarchical component semantic network (HCSN) described by ontology interchange language(OIL) is presented and then its function is described. Using HCSN and cooperating with other components retrieving algorithms based on component description, other components information and their assembly or composite modes related to the key component can be found. Based on HCSN, component directory library is catalogued and a prototype system is constructed. The prototype system proves that component library organization based on this model gives guarantee to the reliability of component assembly during program mining.
文摘Artificial neural networks (ANNs) and genetic programming (GP) have recently been used for the estimation of hydraulic data. In this study, they were used as alternative tools to estimate the characteristics of hydraulic jumps, such as the free surface location and energy dissipation. The dimensionless hydraulic parameters, including jump depth, jump length, and energy dissipation, were determined as functions of the Froude number and the height and length of corrugations. The estimations of the ANN and GP models were found to be in good agreement with the measured data. The results of the ANN model were compared with those of the GP model, showing that the proposed ANN models are much more accurate than the GP models.
文摘Approaches based on integer linear programming have been recently proposed for topology optimization in wireless sensor networks. They are, however, based on over-theoretical, unrealistic models. Our aim is to show that it is possible to accommodate realistic models for energy consumption and communication protocols into integer linear programming. We analyze the maximum lifetime broadcasting topology problem and we present realistic models that are also shown to provide efficient and practical solving tools. We present a strategy to substantially speed up the convergence of the solving process of our algorithm. This strategy introduces a practical drawback, however, in the characteristics of the optimal solutions retrieved. A method to overcome this drawback is discussed. Computational experiments are reported.
文摘As the exertion development (PUAP) develop in Rejang Lebong Regency in Bengkulu province which had been started since 2008 by giving a kind of fund aid called Bantuan Langsung Masyarakat (BLM PUAP), to Gapoktan (Gabungan Kelompok Tani) or an organization of farmers such by giving some money as the capital used for 1) food plant cultiva-tion, horticulture, animal husbandry, plantation, and2) non-cultivation exertion such as;home industry of agriculture, small marketing scale and another agriculture exertion. By the approach which had been done is hoped to get the important result, on the other way the role of analysis factor (Social Network Analysis) from all undertaking stakeholders programs PUAP to be relevance steps aimed to understand the relation or connectivity from all factors in the network and also the role of factor inside the network itself be the relevance steps in arranging the strategy and work intention from the realization stage of PUAP program for the continuity of the realization program in the future (finding the good strategy) which aimed to develop the program of PUAP in Rejang Lebong Regency in Bengkulu Province, and to be a reference from doing the program as a national program in Indonesia.
基金Supported by the National Science and Technology Support Program(Y2140161A5)the National High Technology Research and Development Program of China(863Program)(O812041A04)
文摘The homomorphic hash algorithm(HHA)is introduced to help on-the-fly verify the vireless sensor network(WSN)over-the-air programming(OAP)data based on rateless codes.The receiver calculates the hash value of a group of data by homomorphic hash function,and then it compares the hash value with the receiving message digest.Because the feedback channel is deliberately removed during the distribution process,the rateless codes are often vulnerable when they face security issues such as packets contamination or attack.This method prevents contaminating or attack on rateless codes and reduces the potential risks of decoding failure.Compared with the SHA1 and MD5,HHA,which has a much shorter message digest,will deliver more data.The simulation results show that to transmit and verify the same amount of OAP data,HHA method sends 17.9% to 23.1%fewer packets than MD5 and SHA1 under different packet loss rates.
文摘<strong>Background:</strong> To ensure quality and relevance of Postgraduate Programs are a commitment of the National Quality Postgraduate Programs (PNPC), and those from UNAM. Then, the self-evaluation of the Masters in Nursing Program (PME) is necessary for it to be part of the PNPC. This study focuses on self-evaluation of implementation mechanisms to assure effective communication and collaboration with and among graduated alumni. <strong>Methods:</strong> The research was qualitative, exploratory and descriptive. An informed consent was signed by four informants, graduated from the seventeenth generation of PME. Data collection from a focal group and descriptive data analysis by atlas.ti from guidance questions that were contrasted with the scale value from PME curriculum. <strong>Results:</strong> Four categories emerged from PME graduated alumni: Category <strong>I</strong>, Professional academic performance, Category<strong> II</strong>, International activities attendance, Category <strong>III</strong>, Academic networks, and Category <strong>IV</strong>, Higher satisfaction of international activities.<strong> Conclusions:</strong> It is concluded that self-evaluation shows a graduate’s vision of conditions and networks where PME develops. Masters in Nursing Program fulfills graduates expectancy to create networks, which will contribute to knowledge and recognition of professional practice, as well as on the area’ opportunities opening for better contributions.
基金supported by the National Basic Research Program of China(973 Program)under Grant 2013CB329005
文摘Network virtualization is known as a promising technology to tackle the ossification of current Internet and will play an important role in the future network area. Virtual network embedding(VNE) is a key issue in network virtualization. VNE is NP-hard and former VNE algorithms are mostly heuristic in the literature.VNE exact algorithms have been developed in recent years. However, the constraints of exact VNE are only node capacity and link bandwidth.Based on these, this paper presents an exact VNE algorithm, ILP-LC, which is based on Integer Linear Programming(ILP), for embedding virtual network request with location constraints. This novel algorithm is aiming at mapping virtual network request(VNR) successfully as many as possible and consuming less substrate resources.The topology of each VNR is randomly generated by Waxman model. Simulation results show that the proposed ILP-LC algorithm outperforms the typical heuristic algorithms in terms of the VNR acceptance ratio, at least 15%.
文摘This paper analyzes the pipe network system of oil-gas collection and transportation for offshore oilfield development. A '0-1' integer linear programming model is constructed to optimize the investment of seabed pipe network. The mathematical model is solved by the spanning tree method of graph theory and network analysis. All spanning trees of a network graph compose all the feasible solutions of the mathematical model. The optimal solution of the model is the spanning tree with the minimum cost among all spanning trees. This method can be used to optimize the seabed pipe network system and give a minimum cost plan for the development of offshore marginal oilfield groups.
文摘The features of the floating gate devices as analog memory have been investigatedexperimentally.Programming properties of the devices,compatibility and endurance of program-ming,and programming methods are presented in this paper.The results illustrate that thedevice can be used to store the analog weights for the neural networks,and the method that thestored value is adjusted continuously to approach to a given analog values is a rather practicalmethod for storing weights of neural networks.