By analyzing the WWW Cache model, we bring forward a user-interest description method based on the fuzzy theory and user-interest inferential relations based on BP(baek propagation) neural network. By this method, t...By analyzing the WWW Cache model, we bring forward a user-interest description method based on the fuzzy theory and user-interest inferential relations based on BP(baek propagation) neural network. By this method, the users' interest in the WWW cache can be described and the neural network of users' interest can be constructed by positive spread of interest and the negative spread of errors. This neural network can infer the users' interest. This model is not the simple extension of the simple interest model, but the round improvement of the model and its related algorithm.展开更多
1 引言基于HTTP的WWW在信息定位和定界(informatlon locating and narrowing)上存在着单步定位和偏差定界的问题。这些问题在造成信息获取困难的同时.也造成了冗余信息传输的浪费。目前这一问题已成为关注的焦点之一。有许多工作(例如文...1 引言基于HTTP的WWW在信息定位和定界(informatlon locating and narrowing)上存在着单步定位和偏差定界的问题。这些问题在造成信息获取困难的同时.也造成了冗余信息传输的浪费。目前这一问题已成为关注的焦点之一。有许多工作(例如文[4])通过引入智能机制来提高信息检索效率,但是它关心的对象为数据库这样的良结构信息。展开更多
The Internet of Things(IoT)consists of interconnected smart devices communicating and collecting data.The Routing Protocol for Low-Power and Lossy Networks(RPL)is the standard protocol for Internet Protocol Version 6(...The Internet of Things(IoT)consists of interconnected smart devices communicating and collecting data.The Routing Protocol for Low-Power and Lossy Networks(RPL)is the standard protocol for Internet Protocol Version 6(IPv6)in the IoT.However,RPL is vulnerable to various attacks,including the sinkhole attack,which disrupts the network by manipulating routing information.This paper proposes the Unweighted Voting Method(UVM)for sinkhole node identification,utilizing three key behavioral indicators:DODAG Information Object(DIO)Transaction Frequency,Rank Harmony,and Power Consumption.These indicators have been carefully selected based on their contribution to sinkhole attack detection and other relevant features used in previous research.The UVM method employs an unweighted voting mechanism,where each voter or rule holds equal weight in detecting the presence of a sinkhole attack based on the proposed indicators.The effectiveness of the UVM method is evaluated using the COOJA simulator and compared with existing approaches.Notably,the proposed approach fulfills power consumption requirements for constrained nodes without increasing consumption due to the deployment design.In terms of detection accuracy,simulation results demonstrate a high detection rate ranging from 90%to 100%,with a low false-positive rate of 0%to 0.2%.Consequently,the proposed approach surpasses Ensemble Learning Intrusion Detection Systems by leveraging three indicators and three supporting rules.展开更多
In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to im...In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to improve IIoT service efficiency.There are two types of costs for this kind of IoT network:a communication cost and a computing cost.For service efficiency,the communication cost of data transmission should be minimized,and the computing cost in the edge cloud should be also minimized.Therefore,in this paper,the communication cost for data transmission is defined as the delay factor,and the computing cost in the edge cloud is defined as the waiting time of the computing intensity.The proposed method selects an edge cloud that minimizes the total cost of the communication and computing costs.That is,a device chooses a routing path to the selected edge cloud based on the costs.The proposed method controls the data flows in a mesh-structured network and appropriately distributes the data processing load.The performance of the proposed method is validated through extensive computer simulation.When the transition probability from good to bad is 0.3 and the transition probability from bad to good is 0.7 in wireless and edge cloud states,the proposed method reduced both the average delay and the service pause counts to about 25%of the existing method.展开更多
This paper pays its attention on Chinese mobile Internet service( MIS). Chinese MIS is developing so rapidly that the research on the mechanism of the formation of MIS assessment makes significant sense and therefore ...This paper pays its attention on Chinese mobile Internet service( MIS). Chinese MIS is developing so rapidly that the research on the mechanism of the formation of MIS assessment makes significant sense and therefore the three layers construct of the artificial neural network( ANN) theory is applied to address the problem. The final research model contains MIS features including personalization,localization,reachability,connectivity,convenience and ubiquity as the input layer variables,perceived MIS quality and MIS satisfaction as the hidden layer variables and reuse intention as the output layer variable. MIS risk is identified as the mediating variable. Theoretically,the framework is robust and reveals the mechanism of how customers evaluate a certain mobile Internet service. Practically,the model based on ANN should shed some light on how to understand and improve customer perceived mobile Internet service for both MIS giants and new comers.展开更多
Electric vehicles (EVs) are an emerging type of mobile intelligent power consumption devices in Smart Grid as new green transport tools. In order to provide a powerful automation and intelligence support for wide area...Electric vehicles (EVs) are an emerging type of mobile intelligent power consumption devices in Smart Grid as new green transport tools. In order to provide a powerful automation and intelligence support for wide area electric vehicles energy service network, we analyze the network infrastructure and communications demands of various terminals, devices and monitoring systems distributed in wide area electric vehicle energy service network. According to interactive user services scenarios and energy operations intelligent monitoring, we propose multimode communication integration architecture for wide area electric vehicle energy service network by means of the fusion of the Internet of Things (IoT) technology. Then, we design different networking schemes in access networks and backbone transmission networks meeting multi-scene and multi-operation interaction requirements. The networking schemes will provide efficient technical support to implement intelligent, cross-regional, interactive energy services for electric vehicle users.展开更多
With ever-increasing applications of IoT, and due to the heterogeneous and bursty nature of these applications, scalability has become an important research issue in building cloud-based IoT/M2M systems. This research...With ever-increasing applications of IoT, and due to the heterogeneous and bursty nature of these applications, scalability has become an important research issue in building cloud-based IoT/M2M systems. This research proposes a dynamic SDN-based network slicing mechanism to tackle the scalability problems caused by such heterogeneity and fluctuation of IoT application requirements. The proposed method can automatically create a network slice on-the-fly for each new type of IoT application and adjust the QoS characteristics of the slice dynamically according to the changing requirements </span><span style="font-family:Verdana;">of an IoT application. Validated with extensive experiments, the proposed me</span><span style="font-family:Verdana;">chanism demonstrates better platform scalability when compared to a static slicing system.展开更多
基金Supported bythe Outstanding Young Young Scientist’s Fund ofthe National Natural Science Foundation of China (60303024) ,the National Natu-ral Science Foundation of China (90412003) , National Grand Fundamental Re-search 973 Programof China (2002CB312000) , Doctor Foundation of Ministry ofEducation(20020286004) , Opening Foundation of Jiangsu Key Laboratory of Com-puter Information Processing Technology in Soochow University, Natural ScienceResearch Planfor Jiang Su High School(04kjb520096) ,Doctor Foundatoin of Nan-jing University of Posts and Telecommunications(2003-02)
文摘By analyzing the WWW Cache model, we bring forward a user-interest description method based on the fuzzy theory and user-interest inferential relations based on BP(baek propagation) neural network. By this method, the users' interest in the WWW cache can be described and the neural network of users' interest can be constructed by positive spread of interest and the negative spread of errors. This neural network can infer the users' interest. This model is not the simple extension of the simple interest model, but the round improvement of the model and its related algorithm.
文摘1 引言基于HTTP的WWW在信息定位和定界(informatlon locating and narrowing)上存在着单步定位和偏差定界的问题。这些问题在造成信息获取困难的同时.也造成了冗余信息传输的浪费。目前这一问题已成为关注的焦点之一。有许多工作(例如文[4])通过引入智能机制来提高信息检索效率,但是它关心的对象为数据库这样的良结构信息。
基金funded by the Deanship of Scientific Research at Najran University for this research through a Grant(NU/RG/SERC/12/50)under the Research Groups at Najran University,Saudi Arabia.
文摘The Internet of Things(IoT)consists of interconnected smart devices communicating and collecting data.The Routing Protocol for Low-Power and Lossy Networks(RPL)is the standard protocol for Internet Protocol Version 6(IPv6)in the IoT.However,RPL is vulnerable to various attacks,including the sinkhole attack,which disrupts the network by manipulating routing information.This paper proposes the Unweighted Voting Method(UVM)for sinkhole node identification,utilizing three key behavioral indicators:DODAG Information Object(DIO)Transaction Frequency,Rank Harmony,and Power Consumption.These indicators have been carefully selected based on their contribution to sinkhole attack detection and other relevant features used in previous research.The UVM method employs an unweighted voting mechanism,where each voter or rule holds equal weight in detecting the presence of a sinkhole attack based on the proposed indicators.The effectiveness of the UVM method is evaluated using the COOJA simulator and compared with existing approaches.Notably,the proposed approach fulfills power consumption requirements for constrained nodes without increasing consumption due to the deployment design.In terms of detection accuracy,simulation results demonstrate a high detection rate ranging from 90%to 100%,with a low false-positive rate of 0%to 0.2%.Consequently,the proposed approach surpasses Ensemble Learning Intrusion Detection Systems by leveraging three indicators and three supporting rules.
基金supported by the National Research Foundation of Korea (NRF) grant funded by the Korea Government (MSIT) (No.2021R1C1C1013133)supported by the Institute of Information and Communications Technology Planning and Evaluation (IITP)grant funded by the Korea Government (MSIT) (RS-2022-00167197,Development of Intelligent 5G/6G Infrastructure Technology for The Smart City)supported by the Soonchunhyang University Research Fund.
文摘In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to improve IIoT service efficiency.There are two types of costs for this kind of IoT network:a communication cost and a computing cost.For service efficiency,the communication cost of data transmission should be minimized,and the computing cost in the edge cloud should be also minimized.Therefore,in this paper,the communication cost for data transmission is defined as the delay factor,and the computing cost in the edge cloud is defined as the waiting time of the computing intensity.The proposed method selects an edge cloud that minimizes the total cost of the communication and computing costs.That is,a device chooses a routing path to the selected edge cloud based on the costs.The proposed method controls the data flows in a mesh-structured network and appropriately distributes the data processing load.The performance of the proposed method is validated through extensive computer simulation.When the transition probability from good to bad is 0.3 and the transition probability from bad to good is 0.7 in wireless and edge cloud states,the proposed method reduced both the average delay and the service pause counts to about 25%of the existing method.
文摘This paper pays its attention on Chinese mobile Internet service( MIS). Chinese MIS is developing so rapidly that the research on the mechanism of the formation of MIS assessment makes significant sense and therefore the three layers construct of the artificial neural network( ANN) theory is applied to address the problem. The final research model contains MIS features including personalization,localization,reachability,connectivity,convenience and ubiquity as the input layer variables,perceived MIS quality and MIS satisfaction as the hidden layer variables and reuse intention as the output layer variable. MIS risk is identified as the mediating variable. Theoretically,the framework is robust and reveals the mechanism of how customers evaluate a certain mobile Internet service. Practically,the model based on ANN should shed some light on how to understand and improve customer perceived mobile Internet service for both MIS giants and new comers.
文摘Electric vehicles (EVs) are an emerging type of mobile intelligent power consumption devices in Smart Grid as new green transport tools. In order to provide a powerful automation and intelligence support for wide area electric vehicles energy service network, we analyze the network infrastructure and communications demands of various terminals, devices and monitoring systems distributed in wide area electric vehicle energy service network. According to interactive user services scenarios and energy operations intelligent monitoring, we propose multimode communication integration architecture for wide area electric vehicle energy service network by means of the fusion of the Internet of Things (IoT) technology. Then, we design different networking schemes in access networks and backbone transmission networks meeting multi-scene and multi-operation interaction requirements. The networking schemes will provide efficient technical support to implement intelligent, cross-regional, interactive energy services for electric vehicle users.
文摘With ever-increasing applications of IoT, and due to the heterogeneous and bursty nature of these applications, scalability has become an important research issue in building cloud-based IoT/M2M systems. This research proposes a dynamic SDN-based network slicing mechanism to tackle the scalability problems caused by such heterogeneity and fluctuation of IoT application requirements. The proposed method can automatically create a network slice on-the-fly for each new type of IoT application and adjust the QoS characteristics of the slice dynamically according to the changing requirements </span><span style="font-family:Verdana;">of an IoT application. Validated with extensive experiments, the proposed me</span><span style="font-family:Verdana;">chanism demonstrates better platform scalability when compared to a static slicing system.