In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of W...In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of WSNs are distributed in an intimidating region,which is non-rigid to attacks.The recent research domains of WSN deal with models to handle the WSN communications against malicious attacks and threats.In traditional models,the solution has been made for defending the networks,only to specific attacks.However,in real-time applications,the kind of attack that is launched by the adversary is not known.Additionally,on developing a security mechanism for WSN,the resource constraints of sensor nodes are also to be considered.With that note,this paper presents an Enhanced Security Model with Improved Defensive Routing Mechanism(IDRM)for defending the sensor network from various attacks.Moreover,for efficient model design,the work includes the part of feature evaluation of some general attacks of WSNs.The IDRM also includes determination of optimal secure paths and Node security for secure routing operations.The performance of the proposed model is evaluated with respect to several factors;it is found that the model has achieved better security levels and is efficient than other existing models in WSN communications.It is proven that the proposed IDRM produces 74%of PDR in average and a minimized packet drop of 38%when comparing with the existing works.展开更多
Failure-insensitive routing is a good mechanism to avoid packet dropping and disconnection of forwarding when some links fail, but multiple failure links may bring routing loop for the mechanism. Backtracking routing ...Failure-insensitive routing is a good mechanism to avoid packet dropping and disconnection of forwarding when some links fail, but multiple failure links may bring routing loop for the mechanism. Backtracking routing algorithm based on inverse shortest path tree rooted at destination is presented. The feasible restoration routing is obtained through searching from the start of the failure link and tracing back to the leaves of the shortest path tree with the destination as the root. The packets are forwarded from the mounted point with smaller sequence to the mount point with bigger sequence to decrease the possible of loop in case of multi-failures. The simulations and analysis indicate that backtracking routing algorithm improves the network survivability especially for large network, at the cost of the computation complexity in the same order as failure insensitive routing.展开更多
Routing is the cornerstone of network architecture, and a new routing mechanism is a requisite for constructing new network architecture. The current routing mechanism of the Internet layer is basically the single nex...Routing is the cornerstone of network architecture, and a new routing mechanism is a requisite for constructing new network architecture. The current routing mechanism of the Internet layer is basically the single next-hop routing mechanism, which is the root of transmission congestion in the network. To solve this congestion problem, a fundamental measure is to change the route selection mode of current routing mechanism to allow parallel transmission over multiple routes. Currently, Border Gateway Protocol (BGP) is the only inter-domain routing protocol used in the Internet, but the routing system using BGP suffers scalability problem. To solve the scalability issue of the current inter-domain routing system, a new hierarchical routing system, i.e. Scalable Inter-Domain Routing Architecture (s-idra), is suggested. In addition to scalability, the current routing system is facing other challenges including security, Quality of Service (QoS), multicasting, mobility and dynamic network topology. Therefore, the research on routing protocols, especially the protocol for the new network architecture, is still a tough task and has a long way to go.展开更多
Significant efforts have been made in revealing the mechanism of thaumasite formation in concrete, which continues to be fraught with ambiguities and dissension. Chemical method was employed to synthesize pure C3S, C2...Significant efforts have been made in revealing the mechanism of thaumasite formation in concrete, which continues to be fraught with ambiguities and dissension. Chemical method was employed to synthesize pure C3S, C2S, C3A, ettringite, and thaumasite, and X-ray diffraction(XRD), Raman spectroscopy and infrared spectroscopy(IR) were used to identify thaumasite from other hydrates. To investigate the direct route of thaumasite formation, C3S, C2S, gypsum, and calcium carbonate were used to prepare a cement paste so that the interference of ettringite formation can be avoided. The indirect route of thaumasite formation was also studied by considering the effect of C3A or ettringite content on thaumasite formation. Results show that thaumasite can be definitely generated in the absence of aluminium-bearing minerals or ettringite under appropriate conditions, while the ettringite presence promotes the thaumasite formation. No evidences support the heterogeneous nucleation route in this work. It is concluded that the method mentioned in this work can surely be used to investigate the mechanism of thaumasite formation, and thaumasite can form by both direct and woodfordite routes.展开更多
According to the high operating costs and a large number of energy waste in the current data center network architectures, we propose a kind of trusted flow preemption scheduling combining the energy-saving routing me...According to the high operating costs and a large number of energy waste in the current data center network architectures, we propose a kind of trusted flow preemption scheduling combining the energy-saving routing mechanism based on typical data center network architecture. The mechanism can make the network flow in its exclusive network link bandwidth and transmission path, which can improve the link utilization and the use of the network energy efficiency. Meanwhile, we apply trusted computing to guarantee the high security, high performance and high fault-tolerant routing forwarding service, which helps improving the average completion time of network flow.展开更多
At the initial rolling temperature of 250 to 400 ℃, AZ31B magnesium alloy sheets were hot rolled by four different rolling routes. Microstructures and mechanical properties of the hot-rolled magnesium alloy sheets we...At the initial rolling temperature of 250 to 400 ℃, AZ31B magnesium alloy sheets were hot rolled by four different rolling routes. Microstructures and mechanical properties of the hot-rolled magnesium alloy sheets were analyzed by optical microscope and tensile tests respectively. Based on the Hall-Petch relation, considering the average grain size and grain size distribution, the nonlinear fitting analysis between the tensile strength and average grain size was carried on, and then the prediction model of tensile strength of hot-rolled AZ31B magnesium alloy sheet was established. The results indicate that, by rolling with multi-pass cross rolling, uniform, fine and equiaxial grain microstructures can be produced, the anisotropy of hot-rolled magnesium sheet can also be effectively weakened. Strong correlation was observed between the average grain size and tensile property of the hot-rolled magnesium alloy sheet. Grain size distribution coefficient d(CV) was introduced to reflect the dispersion degree about a set of grain size data, and then the Hall-Petch relation was perfected. Ultimately, the prediction accuracy of tensile strength of multi-pass hot-rolled AZ31B magnesium alloy was improved, and the prediction of tensile property can be performed by the model.展开更多
Glacial outburst floods(GLOFs) in alpine regions tend to be relatively complicated, multi-stage catastrophes, capable of causing significant geomorphologic changes in channel surroundings and posing severe threats t...Glacial outburst floods(GLOFs) in alpine regions tend to be relatively complicated, multi-stage catastrophes, capable of causing significant geomorphologic changes in channel surroundings and posing severe threats to infrastructure and the safety and livelihoods of human communities. GLOF disasters have been observed and potential hazards can be foreseen due to the newly formed glacial lakes or the expansion of existing ones in the Poiqu River Basin in Tibet, China. Here we presented a synthesis of GLOF-related studies including triggering mechanism(s), dam breach modeling, and flood routing simulation that have been employed to reconstruct or forecast GLOF hydrographs. We provided a framework for probability-based GLOFs simulation and hazard mapping in the Poiqu River Basin according to available knowledge. We also discussed the uncertainties and challenges in the model chains, which may form the basis for further research.展开更多
Many ant colony routing (ACR) algorithms have been presented in recent years, but few have studied the problem that ants will get stuck with probability in any terminal host when they are searching paths to route pa...Many ant colony routing (ACR) algorithms have been presented in recent years, but few have studied the problem that ants will get stuck with probability in any terminal host when they are searching paths to route packets around a network. The problem has to be faced when designing and implementing the ACR algorithm. This article analyzes in detail the differences between the ACR and the ant colony optimization (ACO). Besides, particular restrictions on the ACR are pointed out and the three causes of ant being-stuck problem are obtained. Furthermore, this article proposes a new ant searching mechanism through dual path-checking and online routing loop removing by every intermediate node an ant visited and the destination host respectively, to solve the problem of ant being stuck and routing loop simultaneously. The result of numerical simulation is abstracted from one real network. Compared with existing two typical ACR algorithms, it shows that the proposed algorithm can settle the problem of ant being stuck and achieve more effective searching outcome for optimization path.展开更多
Designing reliability differentiated services for missions with different reliability requirements has become a hot topic in wireless sensor networks.Combined with a location-based routing mechanism,a quantified model...Designing reliability differentiated services for missions with different reliability requirements has become a hot topic in wireless sensor networks.Combined with a location-based routing mechanism,a quantified model without full network topology is proposed to evaluate reliability.By introducing a virtual reference point,the data transfer is limited in a specified area.The reliability function of the area is given.A detailed analysis shows that the function increases quadratically with the distance between the source node and the reference node.A reliability differentiated service mechanism is then proposed.The simulation results show the efficiency of the proposed mechanism.展开更多
文摘In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of WSNs are distributed in an intimidating region,which is non-rigid to attacks.The recent research domains of WSN deal with models to handle the WSN communications against malicious attacks and threats.In traditional models,the solution has been made for defending the networks,only to specific attacks.However,in real-time applications,the kind of attack that is launched by the adversary is not known.Additionally,on developing a security mechanism for WSN,the resource constraints of sensor nodes are also to be considered.With that note,this paper presents an Enhanced Security Model with Improved Defensive Routing Mechanism(IDRM)for defending the sensor network from various attacks.Moreover,for efficient model design,the work includes the part of feature evaluation of some general attacks of WSNs.The IDRM also includes determination of optimal secure paths and Node security for secure routing operations.The performance of the proposed model is evaluated with respect to several factors;it is found that the model has achieved better security levels and is efficient than other existing models in WSN communications.It is proven that the proposed IDRM produces 74%of PDR in average and a minimized packet drop of 38%when comparing with the existing works.
基金Supported by the National Natural Science Foundation of China (60502028)
文摘Failure-insensitive routing is a good mechanism to avoid packet dropping and disconnection of forwarding when some links fail, but multiple failure links may bring routing loop for the mechanism. Backtracking routing algorithm based on inverse shortest path tree rooted at destination is presented. The feasible restoration routing is obtained through searching from the start of the failure link and tracing back to the leaves of the shortest path tree with the destination as the root. The packets are forwarded from the mounted point with smaller sequence to the mount point with bigger sequence to decrease the possible of loop in case of multi-failures. The simulations and analysis indicate that backtracking routing algorithm improves the network survivability especially for large network, at the cost of the computation complexity in the same order as failure insensitive routing.
基金the National BasicResearch Program of China ("973" Program)under Grant 2007CB307102the National HighTechnology Research and Development Programof China ("863" Program) under Grant2007AA01Z212.
文摘Routing is the cornerstone of network architecture, and a new routing mechanism is a requisite for constructing new network architecture. The current routing mechanism of the Internet layer is basically the single next-hop routing mechanism, which is the root of transmission congestion in the network. To solve this congestion problem, a fundamental measure is to change the route selection mode of current routing mechanism to allow parallel transmission over multiple routes. Currently, Border Gateway Protocol (BGP) is the only inter-domain routing protocol used in the Internet, but the routing system using BGP suffers scalability problem. To solve the scalability issue of the current inter-domain routing system, a new hierarchical routing system, i.e. Scalable Inter-Domain Routing Architecture (s-idra), is suggested. In addition to scalability, the current routing system is facing other challenges including security, Quality of Service (QoS), multicasting, mobility and dynamic network topology. Therefore, the research on routing protocols, especially the protocol for the new network architecture, is still a tough task and has a long way to go.
基金Funded by the National Natural Science Foundation of China(Nos.51272222 and 51132010)
文摘Significant efforts have been made in revealing the mechanism of thaumasite formation in concrete, which continues to be fraught with ambiguities and dissension. Chemical method was employed to synthesize pure C3S, C2S, C3A, ettringite, and thaumasite, and X-ray diffraction(XRD), Raman spectroscopy and infrared spectroscopy(IR) were used to identify thaumasite from other hydrates. To investigate the direct route of thaumasite formation, C3S, C2S, gypsum, and calcium carbonate were used to prepare a cement paste so that the interference of ettringite formation can be avoided. The indirect route of thaumasite formation was also studied by considering the effect of C3A or ettringite content on thaumasite formation. Results show that thaumasite can be definitely generated in the absence of aluminium-bearing minerals or ettringite under appropriate conditions, while the ettringite presence promotes the thaumasite formation. No evidences support the heterogeneous nucleation route in this work. It is concluded that the method mentioned in this work can surely be used to investigate the mechanism of thaumasite formation, and thaumasite can form by both direct and woodfordite routes.
基金supported by the National Natural Science Foundation of China(The key trusted running technologies for the sensing nodes in Internet of things: 61501007The outstanding personnel training program of Beijing municipal Party Committee Organization Department (The Research of Trusted Computing environment for Internet of things in Smart City: 2014000020124G041
文摘According to the high operating costs and a large number of energy waste in the current data center network architectures, we propose a kind of trusted flow preemption scheduling combining the energy-saving routing mechanism based on typical data center network architecture. The mechanism can make the network flow in its exclusive network link bandwidth and transmission path, which can improve the link utilization and the use of the network energy efficiency. Meanwhile, we apply trusted computing to guarantee the high security, high performance and high fault-tolerant routing forwarding service, which helps improving the average completion time of network flow.
基金Funded by the National Natural Science Foundation of China(No.U1510131)the Key Research and Development Projects of Shanxi Province(No.201603D121010)+1 种基金the Science and Technology Project of Jincheng City(No.20155010)the Project of Young Scholar of Shanxi Province and the Leading Talent Project of Innovative Entrepreneurial Team of Jiangsu Province and the Program for the Top Young Academic Leaders of Higher Learning Institutions of Shanxi(TYAL)
文摘At the initial rolling temperature of 250 to 400 ℃, AZ31B magnesium alloy sheets were hot rolled by four different rolling routes. Microstructures and mechanical properties of the hot-rolled magnesium alloy sheets were analyzed by optical microscope and tensile tests respectively. Based on the Hall-Petch relation, considering the average grain size and grain size distribution, the nonlinear fitting analysis between the tensile strength and average grain size was carried on, and then the prediction model of tensile strength of hot-rolled AZ31B magnesium alloy sheet was established. The results indicate that, by rolling with multi-pass cross rolling, uniform, fine and equiaxial grain microstructures can be produced, the anisotropy of hot-rolled magnesium sheet can also be effectively weakened. Strong correlation was observed between the average grain size and tensile property of the hot-rolled magnesium alloy sheet. Grain size distribution coefficient d(CV) was introduced to reflect the dispersion degree about a set of grain size data, and then the Hall-Petch relation was perfected. Ultimately, the prediction accuracy of tensile strength of multi-pass hot-rolled AZ31B magnesium alloy was improved, and the prediction of tensile property can be performed by the model.
基金funded by the National Key Technology Research and Development Programthe Key Basic Research Program of the Ministry of Science and Technology of China (2012BAC19B07, 2013FY111400)the National Natural Science Foundation of China (41190084)
文摘Glacial outburst floods(GLOFs) in alpine regions tend to be relatively complicated, multi-stage catastrophes, capable of causing significant geomorphologic changes in channel surroundings and posing severe threats to infrastructure and the safety and livelihoods of human communities. GLOF disasters have been observed and potential hazards can be foreseen due to the newly formed glacial lakes or the expansion of existing ones in the Poiqu River Basin in Tibet, China. Here we presented a synthesis of GLOF-related studies including triggering mechanism(s), dam breach modeling, and flood routing simulation that have been employed to reconstruct or forecast GLOF hydrographs. We provided a framework for probability-based GLOFs simulation and hazard mapping in the Poiqu River Basin according to available knowledge. We also discussed the uncertainties and challenges in the model chains, which may form the basis for further research.
基金supported by the Youth Science and Technology Special Fund of Heilongjiang Province (QC05C13).
文摘Many ant colony routing (ACR) algorithms have been presented in recent years, but few have studied the problem that ants will get stuck with probability in any terminal host when they are searching paths to route packets around a network. The problem has to be faced when designing and implementing the ACR algorithm. This article analyzes in detail the differences between the ACR and the ant colony optimization (ACO). Besides, particular restrictions on the ACR are pointed out and the three causes of ant being-stuck problem are obtained. Furthermore, this article proposes a new ant searching mechanism through dual path-checking and online routing loop removing by every intermediate node an ant visited and the destination host respectively, to solve the problem of ant being stuck and routing loop simultaneously. The result of numerical simulation is abstracted from one real network. Compared with existing two typical ACR algorithms, it shows that the proposed algorithm can settle the problem of ant being stuck and achieve more effective searching outcome for optimization path.
基金supported by the National Hi-Tech Research and Development Program of China (Nos.2007AA01Z429,2007AA01Z405)the National Natural Science Foundation of China (Grant Nos.60633020,60573036,60702059,60503012,90204012,and 60803151)the Scientific and Technical Key Program of Tianjin (No.06YFGZGX17500).
文摘Designing reliability differentiated services for missions with different reliability requirements has become a hot topic in wireless sensor networks.Combined with a location-based routing mechanism,a quantified model without full network topology is proposed to evaluate reliability.By introducing a virtual reference point,the data transfer is limited in a specified area.The reliability function of the area is given.A detailed analysis shows that the function increases quadratically with the distance between the source node and the reference node.A reliability differentiated service mechanism is then proposed.The simulation results show the efficiency of the proposed mechanism.