Today,with the rapid development of the internet,a large amount of information often accompanies the rapid transmission of disease outbreaks,and increasing numbers of scholars are studying the relationship between inf...Today,with the rapid development of the internet,a large amount of information often accompanies the rapid transmission of disease outbreaks,and increasing numbers of scholars are studying the relationship between information and the disease transmission process using complex networks.In fact,the disease transmission process is very complex.Besides this information,there will often be individual behavioral measures and other factors to consider.Most of the previous research has aimed to establish a two-layer network model to consider the impact of information on the transmission process of disease,rarely divided into information and behavior,respectively.To carry out a more in-depth analysis of the disease transmission process and the intrinsic influencing mechanism,this paper divides information and behavior into two layers and proposes the establishment of a complex network to study the dynamic co-evolution of information diffusion,vaccination behavior,and disease transmission.This is achieved by considering four influential relationships between adjacent layers in multilayer networks.In the information layer,the diffusion process of negative information is described,and the feedback effects of local and global vaccination are considered.In the behavioral layer,an individual's vaccination behavior is described,and the probability of an individual receiving a vaccination is influenced by two factors:the influence of negative information,and the influence of local and global disease severity.In the disease layer,individual susceptibility is considered to be influenced by vaccination behavior.The state transition equations are derived using the micro Markov chain approach(MMCA),and disease prevalence thresholds are obtained.It is demonstrated through simulation experiments that the negative information diffusion is less influenced by local vaccination behavior,and is mainly influenced by global vaccination behavior;vaccination behavior is mainly influenced by local disease conditions,and is less influenced by global disease conditions;the disease transmission threshold increases with the increasing vaccination rate;and the scale of disease transmission increases with the increasing negative information diffusion rate and decreases with the increasing vaccination rate.Finally,it is found that when individual vaccination behavior considers both the influence of negative information and disease,it can increase the disease transmission threshold and reduce the scale of disease transmission.Therefore,we should resist the diffusion of negative information,increase vaccination proportions,and take appropriate protective measures in time.展开更多
Large-scale wireless sensor networks(WSNs)play a critical role in monitoring dangerous scenarios and responding to medical emergencies.However,the inherent instability and error-prone nature of wireless links present ...Large-scale wireless sensor networks(WSNs)play a critical role in monitoring dangerous scenarios and responding to medical emergencies.However,the inherent instability and error-prone nature of wireless links present significant challenges,necessitating efficient data collection and reliable transmission services.This paper addresses the limitations of existing data transmission and recovery protocols by proposing a systematic end-to-end design tailored for medical event-driven cluster-based large-scale WSNs.The primary goal is to enhance the reliability of data collection and transmission services,ensuring a comprehensive and practical approach.Our approach focuses on refining the hop-count-based routing scheme to achieve fairness in forwarding reliability.Additionally,it emphasizes reliable data collection within clusters and establishes robust data transmission over multiple hops.These systematic improvements are designed to optimize the overall performance of the WSN in real-world scenarios.Simulation results of the proposed protocol validate its exceptional performance compared to other prominent data transmission schemes.The evaluation spans varying sensor densities,wireless channel conditions,and packet transmission rates,showcasing the protocol’s superiority in ensuring reliable and efficient data transfer.Our systematic end-to-end design successfully addresses the challenges posed by the instability of wireless links in large-scaleWSNs.By prioritizing fairness,reliability,and efficiency,the proposed protocol demonstrates its efficacy in enhancing data collection and transmission services,thereby offering a valuable contribution to the field of medical event-drivenWSNs.展开更多
The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure ...The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure domains like oil and gas supply,intelligent transportation,power grids,and autonomous agriculture,it is essential to guarantee the confidentiality,integrity,and authenticity of data collected and exchanged.However,the limited resources coupled with the heterogeneity of IoT devices make it inefficient or sometimes infeasible to achieve secure data transmission using traditional cryptographic techniques.Consequently,designing a lightweight secure data transmission scheme is becoming essential.In this article,we propose lightweight secure data transmission(LSDT)scheme for IoT environments.LSDT consists of three phases and utilizes an effective combination of symmetric keys and the Elliptic Curve Menezes-Qu-Vanstone asymmetric key agreement protocol.We design the simulation environment and experiments to evaluate the performance of the LSDT scheme in terms of communication and computation costs.Security and performance analysis indicates that the LSDT scheme is secure,suitable for IoT applications,and performs better in comparison to other related security schemes.展开更多
The purpose of this research work is to investigate the numerical solutions of the fractional dengue transmission model(FDTM)in the presence of Wolbachia using the stochastic-based Levenberg-Marquardt neural network(L...The purpose of this research work is to investigate the numerical solutions of the fractional dengue transmission model(FDTM)in the presence of Wolbachia using the stochastic-based Levenberg-Marquardt neural network(LM-NN)technique.The fractional dengue transmission model(FDTM)consists of 12 compartments.The human population is divided into four compartments;susceptible humans(S_(h)),exposed humans(E_(h)),infectious humans(I_(h)),and recovered humans(R_(h)).Wolbachia-infected and Wolbachia-uninfected mosquito population is also divided into four compartments:aquatic(eggs,larvae,pupae),susceptible,exposed,and infectious.We investigated three different cases of vertical transmission probability(η),namely when Wolbachia-free mosquitoes persist only(η=0.6),when both types of mosquitoes persist(η=0.8),and when Wolbachia-carrying mosquitoes persist only(η=1).The objective of this study is to investigate the effectiveness of Wolbachia in reducing dengue and presenting the numerical results by using the stochastic structure LM-NN approach with 10 hidden layers of neurons for three different cases of the fractional order derivatives(α=0.4,0.6,0.8).LM-NN approach includes a training,validation,and testing procedure to minimize the mean square error(MSE)values using the reference dataset(obtained by solving the model using the Adams-Bashforth-Moulton method(ABM).The distribution of data is 80% data for training,10% for validation,and,10% for testing purpose)results.A comprehensive investigation is accessible to observe the competence,precision,capacity,and efficiency of the suggested LM-NN approach by executing the MSE,state transitions findings,and regression analysis.The effectiveness of the LM-NN approach for solving the FDTM is demonstrated by the overlap of the findings with trustworthy measures,which achieves a precision of up to 10^(-4).展开更多
With the acceleration of urbanization,the demand for water supply and drainage pipe networks has increased significantly.In the planning of urban construction,it is necessary to optimize the design of the water supply...With the acceleration of urbanization,the demand for water supply and drainage pipe networks has increased significantly.In the planning of urban construction,it is necessary to optimize the design of the water supply and drainage system pipe network to effectively save energy while providing residents with more accessible water resources.Therefore,the municipal water supply and drainage system and the water transmission methods should be designed according to the geographical conditions of the city.In this paper,we mainly analyze the design of municipal water supply and drainage systems and the selection of water transmission methods.Besides,the optimization of the water supply and drainage network zoning process and pipe network maintenance is also discussed,so as to provide a reference for municipal water supply and drainage work.展开更多
This paper studies the coordinated planning of transmission tasks in the heterogeneous space networks to enable efficient sharing of ground stations cross satellite systems.Specifically,we first formulate the coordina...This paper studies the coordinated planning of transmission tasks in the heterogeneous space networks to enable efficient sharing of ground stations cross satellite systems.Specifically,we first formulate the coordinated planning problem into a mixed integer liner programming(MILP)problem based on time expanded graph.Then,the problem is transferred and reformulated into a consensus optimization framework which can be solved by satellite systems parallelly.With alternating direction method of multipliers(ADMM),a semi-distributed coordinated transmission task planning algorithm is proposed,in which each satellite system plans its own tasks based on local information and limited communication with the coordination center.Simulation results demonstrate that compared with the centralized and fully-distributed methods,the proposed semi-distributed coordinated method can strike a better balance among task complete rate,complexity,and the amount of information required to be exchanged.展开更多
The coronavirus disease 2019(COVID-19)pandemic has greatly damaged human society,but the origins and early transmission patterns of the severe acute respiratory syndrome coronavirus 2(SARS-CoV-2)pathogen remain unclea...The coronavirus disease 2019(COVID-19)pandemic has greatly damaged human society,but the origins and early transmission patterns of the severe acute respiratory syndrome coronavirus 2(SARS-CoV-2)pathogen remain unclear.Here,we reconstructed the transmission networks of SARS-CoV-2 during the first three and six months since its first report based on ancestor-offspring relationships using BANAL-52-referenced mutations.We explored the position(i.e.,root,middle,or tip)of early detected samples in the evolutionary tree of SARS-CoV-2.In total,6799 transmission chains and 1766 transmission networks were reconstructed,with chain lengths ranging from 1-9 nodes.The root node samples of the 1766 transmission networks were from 58 countries or regions and showed no common ancestor,indicating the occurrence of many independent or parallel transmissions of SARS-CoV-2 when first detected(i.e.,all samples were located at the tip position of the evolutionary tree).No root node sample was found in any sample(n=31,all from the Chinese mainland)collected in the first 15 days from 24 December 2019.Results using six-month data or RaTG13-referenced mutation data were similar.The reconstruction method was verified using a simulation approach.Our results suggest that SARS-CoV-2 may have already been spreading independently worldwide before the outbreak of COVID-19 in Wuhan,China.Thus,a comprehensive global survey of human and animal samples is essential to explore the origins of SARS-CoV-2 and its natural reservoirs and hosts.展开更多
In recent years, the impact of information diffusion and individual behavior adoption patterns on epidemic transmission in complex networks has received significant attention. In the immunization behavior adoption pro...In recent years, the impact of information diffusion and individual behavior adoption patterns on epidemic transmission in complex networks has received significant attention. In the immunization behavior adoption process, different individuals often make behavioral decisions in different ways, and it is of good practical importance to study the influence of individual heterogeneity on the behavior adoption process. In this paper, we propose a three-layer coupled model to analyze the process of co-evolution of official information diffusion, immunization behavior adoption and epidemic transmission in multiplex networks, focusing on individual heterogeneity in behavior adoption patterns. Specifically, we investigate the impact of the credibility of social media and the risk sensitivity of the population on behavior adoption in further study of the effect of heterogeneity of behavior adoption on epidemic transmission. Then we use the microscopic Markov chain approach to describe the dynamic process and capture the evolution of the epidemic threshold. Finally, we conduct extensive simulations to prove our findings. Our results suggest that enhancing the credibility of social media can raise the epidemic transmission threshold, making it effective at controlling epidemic transmission during the dynamic process. In addition, improving an individuals' risk sensitivity, and thus their taking effective protective measures, can also reduce the number of infected individuals and delay the epidemic outbreak. Our study explores the role of individual heterogeneity in behavior adoption in real networks, more clearly models the effect of the credibility of social media and risk sensitivity of the population on the epidemic transmission dynamic, and provides a useful reference for managers to formulate epidemic control and prevention policies.展开更多
The transmission capacity of gas pipeline networks should be calculated and allocated to deal with the capacity booking with shippers. Technical capacities, which depend on the gas flow distribution at routes or inter...The transmission capacity of gas pipeline networks should be calculated and allocated to deal with the capacity booking with shippers. Technical capacities, which depend on the gas flow distribution at routes or interchange points, are calculated with a multiobjective optimization model and form a Pareto solution set in the entry/exit or point-to-point regime. Then, the commercial capacities, which can be directly applied in capacity booking, are calculated with single-objective optimization models that are transformed from the above multiobjective model based on three allocation rules and the demand of shippers.Next, peak-shaving capacities, which are daily oversupply or overdelivery amounts at inlets or deliveries,are calculated with two-stage transient optimization models. Considering the hydraulic process of a pipeline network and operating schemes of compressor stations, all the above models are mixed-integer nonlinear programming problems. Finally, a case study is made to demonstrate the ability of the models.展开更多
Mobile Industrial Internet of Things(IIoT)applications have achieved the explosive growth in recent years.The mobile IIoT has flourished and become the backbone of the industry,laying a solid foundation for the interc...Mobile Industrial Internet of Things(IIoT)applications have achieved the explosive growth in recent years.The mobile IIoT has flourished and become the backbone of the industry,laying a solid foundation for the interconnection of all things.The variety of application scenarios has brought serious challenges to mobile IIoT networks,which face complex and changeable communication environments.Ensuring data secure transmission is critical for mobile IIoT networks.This paper investigates the data secure transmission performance prediction of mobile IIoT networks.To cut down computational complexity,we propose a data secure transmission scheme employing Transmit Antenna Selection(TAS).The novel secrecy performance expressions are first derived.Then,to realize real-time secrecy analysis,we design an improved Convolutional Neural Network(CNN)model,and propose an intelligent data secure transmission performance prediction algorithm.For mobile signals,the important features may be removed by the pooling layers.This will lead to negative effects on the secrecy performance prediction.A novel nine-layer improved CNN model is designed.Out of the input and output layers,it removes the pooling layer and contains six convolution layers.Elman,Back-Propagation(BP)and LeNet methods are employed to compare with the proposed algorithm.Through simulation analysis,good prediction accuracy is achieved by the CNN algorithm.The prediction accuracy obtains a 59%increase.展开更多
As the Internet of Things(IoT)advances,machine-type devices are densely deployed and massive networks such as ultra-dense networks(UDNs)are formed.Various devices attend to the network to transmit data using machine-t...As the Internet of Things(IoT)advances,machine-type devices are densely deployed and massive networks such as ultra-dense networks(UDNs)are formed.Various devices attend to the network to transmit data using machine-type communication(MTC),whereby numerous,various are generated.MTC devices generally have resource constraints and use wireless communication.In this kind of network,data aggregation is a key function to provide transmission efficiency.It can reduce the number of transmitted data in the network,and this leads to energy saving and reducing transmission delays.In order to effectively operate data aggregation in UDNs,it is important to select an aggregation point well.The total number of transmitted data may vary,depending on the aggregation point to which the data are delivered.Therefore,in this paper,we propose a novel data aggregation scheme to select the appropriate aggregation point and describe the data transmission method applying the proposed aggregation scheme.In addition,we evaluate the proposed scheme with extensive computer simulations.Better performances in the proposed scheme are achieved compared to the conventional approach.展开更多
We investigate the impact of pairwise and group interactions on the spread of epidemics through an activity-driven model based on time-dependent networks.The effects of pairwise/group interaction proportion and pairwi...We investigate the impact of pairwise and group interactions on the spread of epidemics through an activity-driven model based on time-dependent networks.The effects of pairwise/group interaction proportion and pairwise/group interaction intensity are explored by extensive simulation and theoretical analysis.It is demonstrated that altering the group interaction proportion can either hinder or enhance the spread of epidemics,depending on the relative social intensity of group and pairwise interactions.As the group interaction proportion decreases,the impact of reducing group social intensity diminishes.The ratio of group and pairwise social intensity can affect the effect of group interaction proportion on the scale of infection.A weak heterogeneous activity distribution can raise the epidemic threshold,and reduce the scale of infection.These results benefit the design of epidemic control strategy.展开更多
Blockchain technology has witnessed a burgeoning integration into diverse realms of economic and societal development.Nevertheless,scalability challenges,characterized by diminished broadcast efficiency,heightened com...Blockchain technology has witnessed a burgeoning integration into diverse realms of economic and societal development.Nevertheless,scalability challenges,characterized by diminished broadcast efficiency,heightened communication overhead,and escalated storage costs,have significantly constrained the broad-scale application of blockchain.This paper introduces a novel Encode-and CRT-based Scalability Scheme(ECSS),meticulously refined to enhance both block broadcasting and storage.Primarily,ECSS categorizes nodes into distinct domains,thereby reducing the network diameter and augmenting transmission efficiency.Secondly,ECSS streamlines block transmission through a compact block protocol and robust RS coding,which not only reduces the size of broadcasted blocks but also ensures transmission reliability.Finally,ECSS utilizes the Chinese remainder theorem,designating the block body as the compression target and mapping it to multiple modules to achieve efficient storage,thereby alleviating the storage burdens on nodes.To evaluate ECSS’s performance,we established an experimental platformand conducted comprehensive assessments.Empirical results demonstrate that ECSS attains superior network scalability and stability,reducing communication overhead by an impressive 72% and total storage costs by a substantial 63.6%.展开更多
Due to the limited uplink capability in heterogeneousnetworks (HetNets), the decoupled uplinkand downlink access (DUDA) mode has recently beenproposed to improve the uplink performance. In thispaper, the random discon...Due to the limited uplink capability in heterogeneousnetworks (HetNets), the decoupled uplinkand downlink access (DUDA) mode has recently beenproposed to improve the uplink performance. In thispaper, the random discontinuous transmission (DTX)at user equipment (UE) is adopted to reduce the interferencecorrelation across different time slots. By utilizingstochastic geometry, we analytically derive themean local delay and energy efficiency (EE) of an uplinkHetNet with UE random DTX scheme under theDUDA mode. These expressions are further approximatedas closed forms under reasonable assumptions.Our results reveal that under the DUDA mode, there isan optimal EE with respect to mute probability underthe finite local delay constraint. In addition, with thesame finite mean local delay as under the coupled uplinkand downlink access (CUDA) mode, the HetNetsunder the DUDA mode can achieve a higher EE witha lower mute probability.展开更多
Recently, network coding has been applied to the loss recovery of reliable broadcast transmission in wireless networks. Since it was proved that fi nding the optimal set of lost packets for XOR-ing is a complex NP-com...Recently, network coding has been applied to the loss recovery of reliable broadcast transmission in wireless networks. Since it was proved that fi nding the optimal set of lost packets for XOR-ing is a complex NP-complete problem, the available time-based retransmission scheme and its enhanced retransmission scheme have exponential computational complexity and thus are not scalable to large networks. In this paper, we present an efficient heuristic scheme based on hypergraph coloring and also its enhanced heuristic scheme to improve the transmission efficiency. Basically, our proposed schemes fi rst create a hypergraph according to the packet-loss matrix. Then our schemes solve the problem of generating XORed packets by coloring the edges of hypergraph. Extensive simulation results demonstrate that, the heuristic scheme based on hypergraph coloring and its enhanced scheme can achieve almost the same transmission efficiency as the available ones, but have much lower computational complexity, which is very important for the wireless devices without high computation capacity.展开更多
The paper proposes a decentralized concurrent transmission strategy in shared channels based on an incomplete information game in Ad Hoc networks.Based on the nodal channel quality,the game can work out a channel gain...The paper proposes a decentralized concurrent transmission strategy in shared channels based on an incomplete information game in Ad Hoc networks.Based on the nodal channel quality,the game can work out a channel gain threshold,which decides the candidates for taking part in the concurrent transmission.The utility formula is made for maximizing the overall throughput based on channel quality variation.For an achievable Bayesian Nash equilibrium(BNE) solution,this paper further prices the selfish players in utility functions for attempting to improve the channel gain one-sidedly.Accordingly,this game allows each node to distributedly decide whether to transmit concurrently with others depending on the Nash equilibrium(NE).Besides,to make the proposed game practical,this paper next presents an efficient particle swarm optimization(PSO) model to fasten the otherwise very slow convergence procedure due to the large computational complexity.Numerical results show the proposed approach is feasible to increase concurrent transmission opportunities for active nodes and the convergence can be swiftly obtained with a few of iteration times by the proposed PSO algorithm.展开更多
Opportunistic networks are random networks and do not communicate with each other among respective communication areas.This situation leads to great difficulty in message transfer.This paper proposes a reducing energy...Opportunistic networks are random networks and do not communicate with each other among respective communication areas.This situation leads to great difficulty in message transfer.This paper proposes a reducing energy consumption optimal selection of path transmission(OSPT) routing algorithm in opportunistic networks.This algorithm designs a dynamic random network topology,creates a dynamic link,and realizes an optimized selected path.This algorithm solves a problem that nodes are unable to deliver messages for a long time in opportunistic networks.According to the simulation experiment,OSPT improves deliver ratio,and reduces energy consumption,cache time and transmission delay compared with the Epidemic Algorithm and Spray and Wait Algorithm in opportunistic networks.展开更多
We study the transmission capacities of two coexisting spread-spectrum wireless networks (a primary network vs. a secondary network) that operate in the same geographic region and share the same spectrum. We defi ne t...We study the transmission capacities of two coexisting spread-spectrum wireless networks (a primary network vs. a secondary network) that operate in the same geographic region and share the same spectrum. We defi ne transmission capacity as the product among the density of transmissions, the transmission rate, and the successful transmission probability. The primary (PR) network has a higher priority to access the spectrum without particular considerations for the secondary (SR) network, while the SR network limits its interference to the PR network by carefully controlling the density ofits transmitters. Considering two types of spread-spectrum transmission schemes (FH-CDMA and DS-CDMA) and the channel inversion power control mechanism, we quantify the transmission capacities for these two networks based on asymptotic analysis. Our results show that if the PR network permits a small increase ofits outage probability, the sum transmission capacities of the two networks (i.e., the overall spectrumefficiency per unit area) will be boosted significantly over that of a single network.展开更多
With the increasing demand for marine exploration, underwater acoustic sensor networks (UASNs) are prone to have the characteristics of large-scale, long term monitoring, and high data traffic load. Underwater media a...With the increasing demand for marine exploration, underwater acoustic sensor networks (UASNs) are prone to have the characteristics of large-scale, long term monitoring, and high data traffic load. Underwater media access control (MAC) protocols, which allow multiple users to share the common medium fairly and efficiently, are essential for the performance of UASNs. However, the design of MAC protocols is confronted with the challenges of spatial unfairness, data eruption, and low energy efficiency. In this paper, we propose a novel data concurrent transmission (DCT) MAC protocol, which is able to exploit long propagation delay and conduct concurrent transmission. Specifically, we present the theoretical performance analysis of the proposed MAC protocol in detail and give an analytical solution of the success concurrent transmission probability between nodes. In addition, simulation results are provided to demonstrate that our proposed protocol is appropriate for UASNs and can significantly improve the performance in terms of network throughput and energy consumption. Finally, we give some typical future applications of UASNs and discuss the demands on MAC protocol design.展开更多
To the existing spectrum sharing schemes in wireless-powered cognitive wireless sensor networks,the protocols are limited to either separate the primary and the secondary transmission or allow the secondary user to tr...To the existing spectrum sharing schemes in wireless-powered cognitive wireless sensor networks,the protocols are limited to either separate the primary and the secondary transmission or allow the secondary user to transmit signals in a time slot when it forwards the primary signal.In order to address this limitation,a novel cooperative spectrum sharing scheme is proposed,where the secondary transmission is multiplexed with both the primary transmission and the relay transmission.Specifically,the process of transmission is on a three-phase time-switching relaying basis.In the first phase,a cognitive sensor node SU1 scavenges energy from the primary transmission.In the second phase,another sensor node SU2 and primary transmitter simultaneously transmit signals to the SU1.In the third phase,the node SU1 can assist the primary transmission to acquire the opportunity of spectrum sharing.Joint decoding and interference cancellation technique is adopted at the receivers to retrieve the desired signals.We further derive the closed-form expressions for the outage probabilities of both the primary and secondary systems.Moreover,we address optimization of energy harvesting duration and power allocation coefficient strategy under performance criteria.An effective algorithm is then presented to solve the optimization problem.Simulation results demonstrate that with the optimized solutions,the sensor nodes with the proposed cooperative spectrum sharing scheme can utilize the spectrum in a more efficient manner without deteriorating the performance of the primary transmission,as compared with the existing one-directional scheme in the literature.展开更多
基金Project supported by the National Natural Science Foundation of China (Grant Nos. 72174121 and 71774111)the Program for Professor of Special Appointment (Eastern Scholar) at Shanghai Institutions of Higher Learningthe Natural Science Foundation of Shanghai (Grant No. 21ZR1444100)
文摘Today,with the rapid development of the internet,a large amount of information often accompanies the rapid transmission of disease outbreaks,and increasing numbers of scholars are studying the relationship between information and the disease transmission process using complex networks.In fact,the disease transmission process is very complex.Besides this information,there will often be individual behavioral measures and other factors to consider.Most of the previous research has aimed to establish a two-layer network model to consider the impact of information on the transmission process of disease,rarely divided into information and behavior,respectively.To carry out a more in-depth analysis of the disease transmission process and the intrinsic influencing mechanism,this paper divides information and behavior into two layers and proposes the establishment of a complex network to study the dynamic co-evolution of information diffusion,vaccination behavior,and disease transmission.This is achieved by considering four influential relationships between adjacent layers in multilayer networks.In the information layer,the diffusion process of negative information is described,and the feedback effects of local and global vaccination are considered.In the behavioral layer,an individual's vaccination behavior is described,and the probability of an individual receiving a vaccination is influenced by two factors:the influence of negative information,and the influence of local and global disease severity.In the disease layer,individual susceptibility is considered to be influenced by vaccination behavior.The state transition equations are derived using the micro Markov chain approach(MMCA),and disease prevalence thresholds are obtained.It is demonstrated through simulation experiments that the negative information diffusion is less influenced by local vaccination behavior,and is mainly influenced by global vaccination behavior;vaccination behavior is mainly influenced by local disease conditions,and is less influenced by global disease conditions;the disease transmission threshold increases with the increasing vaccination rate;and the scale of disease transmission increases with the increasing negative information diffusion rate and decreases with the increasing vaccination rate.Finally,it is found that when individual vaccination behavior considers both the influence of negative information and disease,it can increase the disease transmission threshold and reduce the scale of disease transmission.Therefore,we should resist the diffusion of negative information,increase vaccination proportions,and take appropriate protective measures in time.
文摘Large-scale wireless sensor networks(WSNs)play a critical role in monitoring dangerous scenarios and responding to medical emergencies.However,the inherent instability and error-prone nature of wireless links present significant challenges,necessitating efficient data collection and reliable transmission services.This paper addresses the limitations of existing data transmission and recovery protocols by proposing a systematic end-to-end design tailored for medical event-driven cluster-based large-scale WSNs.The primary goal is to enhance the reliability of data collection and transmission services,ensuring a comprehensive and practical approach.Our approach focuses on refining the hop-count-based routing scheme to achieve fairness in forwarding reliability.Additionally,it emphasizes reliable data collection within clusters and establishes robust data transmission over multiple hops.These systematic improvements are designed to optimize the overall performance of the WSN in real-world scenarios.Simulation results of the proposed protocol validate its exceptional performance compared to other prominent data transmission schemes.The evaluation spans varying sensor densities,wireless channel conditions,and packet transmission rates,showcasing the protocol’s superiority in ensuring reliable and efficient data transfer.Our systematic end-to-end design successfully addresses the challenges posed by the instability of wireless links in large-scaleWSNs.By prioritizing fairness,reliability,and efficiency,the proposed protocol demonstrates its efficacy in enhancing data collection and transmission services,thereby offering a valuable contribution to the field of medical event-drivenWSNs.
基金support of the Interdisciplinary Research Center for Intelligent Secure Systems(IRC-ISS)Internal Fund Grant#INSS2202.
文摘The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure domains like oil and gas supply,intelligent transportation,power grids,and autonomous agriculture,it is essential to guarantee the confidentiality,integrity,and authenticity of data collected and exchanged.However,the limited resources coupled with the heterogeneity of IoT devices make it inefficient or sometimes infeasible to achieve secure data transmission using traditional cryptographic techniques.Consequently,designing a lightweight secure data transmission scheme is becoming essential.In this article,we propose lightweight secure data transmission(LSDT)scheme for IoT environments.LSDT consists of three phases and utilizes an effective combination of symmetric keys and the Elliptic Curve Menezes-Qu-Vanstone asymmetric key agreement protocol.We design the simulation environment and experiments to evaluate the performance of the LSDT scheme in terms of communication and computation costs.Security and performance analysis indicates that the LSDT scheme is secure,suitable for IoT applications,and performs better in comparison to other related security schemes.
文摘The purpose of this research work is to investigate the numerical solutions of the fractional dengue transmission model(FDTM)in the presence of Wolbachia using the stochastic-based Levenberg-Marquardt neural network(LM-NN)technique.The fractional dengue transmission model(FDTM)consists of 12 compartments.The human population is divided into four compartments;susceptible humans(S_(h)),exposed humans(E_(h)),infectious humans(I_(h)),and recovered humans(R_(h)).Wolbachia-infected and Wolbachia-uninfected mosquito population is also divided into four compartments:aquatic(eggs,larvae,pupae),susceptible,exposed,and infectious.We investigated three different cases of vertical transmission probability(η),namely when Wolbachia-free mosquitoes persist only(η=0.6),when both types of mosquitoes persist(η=0.8),and when Wolbachia-carrying mosquitoes persist only(η=1).The objective of this study is to investigate the effectiveness of Wolbachia in reducing dengue and presenting the numerical results by using the stochastic structure LM-NN approach with 10 hidden layers of neurons for three different cases of the fractional order derivatives(α=0.4,0.6,0.8).LM-NN approach includes a training,validation,and testing procedure to minimize the mean square error(MSE)values using the reference dataset(obtained by solving the model using the Adams-Bashforth-Moulton method(ABM).The distribution of data is 80% data for training,10% for validation,and,10% for testing purpose)results.A comprehensive investigation is accessible to observe the competence,precision,capacity,and efficiency of the suggested LM-NN approach by executing the MSE,state transitions findings,and regression analysis.The effectiveness of the LM-NN approach for solving the FDTM is demonstrated by the overlap of the findings with trustworthy measures,which achieves a precision of up to 10^(-4).
文摘With the acceleration of urbanization,the demand for water supply and drainage pipe networks has increased significantly.In the planning of urban construction,it is necessary to optimize the design of the water supply and drainage system pipe network to effectively save energy while providing residents with more accessible water resources.Therefore,the municipal water supply and drainage system and the water transmission methods should be designed according to the geographical conditions of the city.In this paper,we mainly analyze the design of municipal water supply and drainage systems and the selection of water transmission methods.Besides,the optimization of the water supply and drainage network zoning process and pipe network maintenance is also discussed,so as to provide a reference for municipal water supply and drainage work.
基金supported in part by the NSF China under Grant(61701365,61801365,62001347)in part by Natural Science Foundation of Shaanxi Province(2020JQ-686)+4 种基金in part by the China Postdoctoral Science Foundation under Grant(2018M643581,2019TQ0210,2019TQ0241,2020M673344)in part by Young Talent fund of University Association for Science and Technology in Shaanxi,China(20200112)in part by Key Research and Development Program in Shaanxi Province of China(2021GY066)in part by Postdoctoral Foundation in Shaanxi Province of China(2018BSHEDZZ47)the Fundamental Research Funds for the Central Universities。
文摘This paper studies the coordinated planning of transmission tasks in the heterogeneous space networks to enable efficient sharing of ground stations cross satellite systems.Specifically,we first formulate the coordinated planning problem into a mixed integer liner programming(MILP)problem based on time expanded graph.Then,the problem is transferred and reformulated into a consensus optimization framework which can be solved by satellite systems parallelly.With alternating direction method of multipliers(ADMM),a semi-distributed coordinated transmission task planning algorithm is proposed,in which each satellite system plans its own tasks based on local information and limited communication with the coordination center.Simulation results demonstrate that compared with the centralized and fully-distributed methods,the proposed semi-distributed coordinated method can strike a better balance among task complete rate,complexity,and the amount of information required to be exchanged.
基金supported by the Ministry of Science and Technology of the People’s Republic of China(2021YFC0863400)Institute of Zoology,Chinese Academy of Sciences(E0517111,E122G611)。
文摘The coronavirus disease 2019(COVID-19)pandemic has greatly damaged human society,but the origins and early transmission patterns of the severe acute respiratory syndrome coronavirus 2(SARS-CoV-2)pathogen remain unclear.Here,we reconstructed the transmission networks of SARS-CoV-2 during the first three and six months since its first report based on ancestor-offspring relationships using BANAL-52-referenced mutations.We explored the position(i.e.,root,middle,or tip)of early detected samples in the evolutionary tree of SARS-CoV-2.In total,6799 transmission chains and 1766 transmission networks were reconstructed,with chain lengths ranging from 1-9 nodes.The root node samples of the 1766 transmission networks were from 58 countries or regions and showed no common ancestor,indicating the occurrence of many independent or parallel transmissions of SARS-CoV-2 when first detected(i.e.,all samples were located at the tip position of the evolutionary tree).No root node sample was found in any sample(n=31,all from the Chinese mainland)collected in the first 15 days from 24 December 2019.Results using six-month data or RaTG13-referenced mutation data were similar.The reconstruction method was verified using a simulation approach.Our results suggest that SARS-CoV-2 may have already been spreading independently worldwide before the outbreak of COVID-19 in Wuhan,China.Thus,a comprehensive global survey of human and animal samples is essential to explore the origins of SARS-CoV-2 and its natural reservoirs and hosts.
基金Project supported by the National Natural Science Foundation of China (Grant Nos. 72174121 and 71774111)the Program for Professor of Special Appointment (Eastern Scholar) at Shanghai Institutions of Higher Learningthe Natural Science Foundation of Shanghai (Grant No. 21ZR1444100)。
文摘In recent years, the impact of information diffusion and individual behavior adoption patterns on epidemic transmission in complex networks has received significant attention. In the immunization behavior adoption process, different individuals often make behavioral decisions in different ways, and it is of good practical importance to study the influence of individual heterogeneity on the behavior adoption process. In this paper, we propose a three-layer coupled model to analyze the process of co-evolution of official information diffusion, immunization behavior adoption and epidemic transmission in multiplex networks, focusing on individual heterogeneity in behavior adoption patterns. Specifically, we investigate the impact of the credibility of social media and the risk sensitivity of the population on behavior adoption in further study of the effect of heterogeneity of behavior adoption on epidemic transmission. Then we use the microscopic Markov chain approach to describe the dynamic process and capture the evolution of the epidemic threshold. Finally, we conduct extensive simulations to prove our findings. Our results suggest that enhancing the credibility of social media can raise the epidemic transmission threshold, making it effective at controlling epidemic transmission during the dynamic process. In addition, improving an individuals' risk sensitivity, and thus their taking effective protective measures, can also reduce the number of infected individuals and delay the epidemic outbreak. Our study explores the role of individual heterogeneity in behavior adoption in real networks, more clearly models the effect of the credibility of social media and risk sensitivity of the population on the epidemic transmission dynamic, and provides a useful reference for managers to formulate epidemic control and prevention policies.
文摘The transmission capacity of gas pipeline networks should be calculated and allocated to deal with the capacity booking with shippers. Technical capacities, which depend on the gas flow distribution at routes or interchange points, are calculated with a multiobjective optimization model and form a Pareto solution set in the entry/exit or point-to-point regime. Then, the commercial capacities, which can be directly applied in capacity booking, are calculated with single-objective optimization models that are transformed from the above multiobjective model based on three allocation rules and the demand of shippers.Next, peak-shaving capacities, which are daily oversupply or overdelivery amounts at inlets or deliveries,are calculated with two-stage transient optimization models. Considering the hydraulic process of a pipeline network and operating schemes of compressor stations, all the above models are mixed-integer nonlinear programming problems. Finally, a case study is made to demonstrate the ability of the models.
基金supported by the National Natural Science Foundation of China(No.62201313)the Opening Foundation of Fujian Key Laboratory of Sensing and Computing for Smart Cities(Xiamen University)(No.SCSCKF202101)the Open Project of Fujian Provincial Key Laboratory of Information Processing and Intelligent Control(Minjiang University)(No.MJUKF-IPIC202206).
文摘Mobile Industrial Internet of Things(IIoT)applications have achieved the explosive growth in recent years.The mobile IIoT has flourished and become the backbone of the industry,laying a solid foundation for the interconnection of all things.The variety of application scenarios has brought serious challenges to mobile IIoT networks,which face complex and changeable communication environments.Ensuring data secure transmission is critical for mobile IIoT networks.This paper investigates the data secure transmission performance prediction of mobile IIoT networks.To cut down computational complexity,we propose a data secure transmission scheme employing Transmit Antenna Selection(TAS).The novel secrecy performance expressions are first derived.Then,to realize real-time secrecy analysis,we design an improved Convolutional Neural Network(CNN)model,and propose an intelligent data secure transmission performance prediction algorithm.For mobile signals,the important features may be removed by the pooling layers.This will lead to negative effects on the secrecy performance prediction.A novel nine-layer improved CNN model is designed.Out of the input and output layers,it removes the pooling layer and contains six convolution layers.Elman,Back-Propagation(BP)and LeNet methods are employed to compare with the proposed algorithm.Through simulation analysis,good prediction accuracy is achieved by the CNN algorithm.The prediction accuracy obtains a 59%increase.
基金supported by the National Research Foundation of Korea(NRF)grant funded by the Korea Government(MSIT)(No.2021R1C1C1013133)this work was supported by the Soonchunhyang University Research Fund(No.20210442).
文摘As the Internet of Things(IoT)advances,machine-type devices are densely deployed and massive networks such as ultra-dense networks(UDNs)are formed.Various devices attend to the network to transmit data using machine-type communication(MTC),whereby numerous,various are generated.MTC devices generally have resource constraints and use wireless communication.In this kind of network,data aggregation is a key function to provide transmission efficiency.It can reduce the number of transmitted data in the network,and this leads to energy saving and reducing transmission delays.In order to effectively operate data aggregation in UDNs,it is important to select an aggregation point well.The total number of transmitted data may vary,depending on the aggregation point to which the data are delivered.Therefore,in this paper,we propose a novel data aggregation scheme to select the appropriate aggregation point and describe the data transmission method applying the proposed aggregation scheme.In addition,we evaluate the proposed scheme with extensive computer simulations.Better performances in the proposed scheme are achieved compared to the conventional approach.
基金This work was supported by the National Natural Science Foundation of China(Grant No.12072340)the China Postdoctoral Science Foundation(Grant No.2022M720727)the Jiangsu Funding Program for Excellent Postdoctoral Talent(Grant No.2022ZB130).
文摘We investigate the impact of pairwise and group interactions on the spread of epidemics through an activity-driven model based on time-dependent networks.The effects of pairwise/group interaction proportion and pairwise/group interaction intensity are explored by extensive simulation and theoretical analysis.It is demonstrated that altering the group interaction proportion can either hinder or enhance the spread of epidemics,depending on the relative social intensity of group and pairwise interactions.As the group interaction proportion decreases,the impact of reducing group social intensity diminishes.The ratio of group and pairwise social intensity can affect the effect of group interaction proportion on the scale of infection.A weak heterogeneous activity distribution can raise the epidemic threshold,and reduce the scale of infection.These results benefit the design of epidemic control strategy.
文摘Blockchain technology has witnessed a burgeoning integration into diverse realms of economic and societal development.Nevertheless,scalability challenges,characterized by diminished broadcast efficiency,heightened communication overhead,and escalated storage costs,have significantly constrained the broad-scale application of blockchain.This paper introduces a novel Encode-and CRT-based Scalability Scheme(ECSS),meticulously refined to enhance both block broadcasting and storage.Primarily,ECSS categorizes nodes into distinct domains,thereby reducing the network diameter and augmenting transmission efficiency.Secondly,ECSS streamlines block transmission through a compact block protocol and robust RS coding,which not only reduces the size of broadcasted blocks but also ensures transmission reliability.Finally,ECSS utilizes the Chinese remainder theorem,designating the block body as the compression target and mapping it to multiple modules to achieve efficient storage,thereby alleviating the storage burdens on nodes.To evaluate ECSS’s performance,we established an experimental platformand conducted comprehensive assessments.Empirical results demonstrate that ECSS attains superior network scalability and stability,reducing communication overhead by an impressive 72% and total storage costs by a substantial 63.6%.
基金supported in part by the National Key R&D Program of China under Grant 2021YFB 2900304the Shenzhen Science and Technology Program under Grants KQTD20190929172545139 and ZDSYS20210623091808025.
文摘Due to the limited uplink capability in heterogeneousnetworks (HetNets), the decoupled uplinkand downlink access (DUDA) mode has recently beenproposed to improve the uplink performance. In thispaper, the random discontinuous transmission (DTX)at user equipment (UE) is adopted to reduce the interferencecorrelation across different time slots. By utilizingstochastic geometry, we analytically derive themean local delay and energy efficiency (EE) of an uplinkHetNet with UE random DTX scheme under theDUDA mode. These expressions are further approximatedas closed forms under reasonable assumptions.Our results reveal that under the DUDA mode, there isan optimal EE with respect to mute probability underthe finite local delay constraint. In addition, with thesame finite mean local delay as under the coupled uplinkand downlink access (CUDA) mode, the HetNetsunder the DUDA mode can achieve a higher EE witha lower mute probability.
基金supported by the National Natural Science Foundation of China (60502046, 60573034)863 Foundation of China (2007AA01Z215)
文摘Recently, network coding has been applied to the loss recovery of reliable broadcast transmission in wireless networks. Since it was proved that fi nding the optimal set of lost packets for XOR-ing is a complex NP-complete problem, the available time-based retransmission scheme and its enhanced retransmission scheme have exponential computational complexity and thus are not scalable to large networks. In this paper, we present an efficient heuristic scheme based on hypergraph coloring and also its enhanced heuristic scheme to improve the transmission efficiency. Basically, our proposed schemes fi rst create a hypergraph according to the packet-loss matrix. Then our schemes solve the problem of generating XORed packets by coloring the edges of hypergraph. Extensive simulation results demonstrate that, the heuristic scheme based on hypergraph coloring and its enhanced scheme can achieve almost the same transmission efficiency as the available ones, but have much lower computational complexity, which is very important for the wireless devices without high computation capacity.
基金supported by the National Natural Science Foundation of China (6120113361172055+6 种基金60832005U083500461072067)the Postdoctoral Science Foundation of China (20100481323)the Program for New Century Excellent Talents (NCET-11-0691)the "111 Project"of China (B08038)the Foundation of Guangxi Key Lab of Wireless Wideband Communication & Signal Processing (11105)
文摘The paper proposes a decentralized concurrent transmission strategy in shared channels based on an incomplete information game in Ad Hoc networks.Based on the nodal channel quality,the game can work out a channel gain threshold,which decides the candidates for taking part in the concurrent transmission.The utility formula is made for maximizing the overall throughput based on channel quality variation.For an achievable Bayesian Nash equilibrium(BNE) solution,this paper further prices the selfish players in utility functions for attempting to improve the channel gain one-sidedly.Accordingly,this game allows each node to distributedly decide whether to transmit concurrently with others depending on the Nash equilibrium(NE).Besides,to make the proposed game practical,this paper next presents an efficient particle swarm optimization(PSO) model to fasten the otherwise very slow convergence procedure due to the large computational complexity.Numerical results show the proposed approach is feasible to increase concurrent transmission opportunities for active nodes and the convergence can be swiftly obtained with a few of iteration times by the proposed PSO algorithm.
基金Supported by the National Natural Science Foundation of China(No.61379057,61073186,61309001,61379110,61103202)Doctoral Fund of Ministry of Education of China(No.20120162130008)the National Basic Research Program of China(973 Program)(No.2014CB046305)
文摘Opportunistic networks are random networks and do not communicate with each other among respective communication areas.This situation leads to great difficulty in message transfer.This paper proposes a reducing energy consumption optimal selection of path transmission(OSPT) routing algorithm in opportunistic networks.This algorithm designs a dynamic random network topology,creates a dynamic link,and realizes an optimized selected path.This algorithm solves a problem that nodes are unable to deliver messages for a long time in opportunistic networks.According to the simulation experiment,OSPT improves deliver ratio,and reduces energy consumption,cache time and transmission delay compared with the Epidemic Algorithm and Spray and Wait Algorithm in opportunistic networks.
基金supported in part by the China 863 Program grants 2007AA10Z235, 2007AA01Z179, 2006BAJ09B05, 2008BADA0B05the NSFC grants 60972073, 60871042, 60872049, and 60971082+1 种基金the China National Great Science Specifi c Project grant 2009ZX03003-011the China 973 Program grant 2009CB320407
文摘We study the transmission capacities of two coexisting spread-spectrum wireless networks (a primary network vs. a secondary network) that operate in the same geographic region and share the same spectrum. We defi ne transmission capacity as the product among the density of transmissions, the transmission rate, and the successful transmission probability. The primary (PR) network has a higher priority to access the spectrum without particular considerations for the secondary (SR) network, while the SR network limits its interference to the PR network by carefully controlling the density ofits transmitters. Considering two types of spread-spectrum transmission schemes (FH-CDMA and DS-CDMA) and the channel inversion power control mechanism, we quantify the transmission capacities for these two networks based on asymptotic analysis. Our results show that if the PR network permits a small increase ofits outage probability, the sum transmission capacities of the two networks (i.e., the overall spectrumefficiency per unit area) will be boosted significantly over that of a single network.
基金supported in part by the National Natural Science Foundation of China under Grant 62171405in part by the National Science Fund for Distinguished Young Scholars under Grant 62225114
文摘With the increasing demand for marine exploration, underwater acoustic sensor networks (UASNs) are prone to have the characteristics of large-scale, long term monitoring, and high data traffic load. Underwater media access control (MAC) protocols, which allow multiple users to share the common medium fairly and efficiently, are essential for the performance of UASNs. However, the design of MAC protocols is confronted with the challenges of spatial unfairness, data eruption, and low energy efficiency. In this paper, we propose a novel data concurrent transmission (DCT) MAC protocol, which is able to exploit long propagation delay and conduct concurrent transmission. Specifically, we present the theoretical performance analysis of the proposed MAC protocol in detail and give an analytical solution of the success concurrent transmission probability between nodes. In addition, simulation results are provided to demonstrate that our proposed protocol is appropriate for UASNs and can significantly improve the performance in terms of network throughput and energy consumption. Finally, we give some typical future applications of UASNs and discuss the demands on MAC protocol design.
基金Project (61201086) supported by the National Natural Science Foundation of ChinaProject (201506375060) supported by the China Scholarship Council+2 种基金Project (2013B090500007) supported by Guangdong Provincial Science and Technology Project,ChinaProject (2014509102205) supported by the Dongguan Municipal Project on the Integration of Industry,Education and Research,ChinaProject (2017GK5019) supported by 2017 Hunan-Tech&Innovation Investment Project,China
文摘To the existing spectrum sharing schemes in wireless-powered cognitive wireless sensor networks,the protocols are limited to either separate the primary and the secondary transmission or allow the secondary user to transmit signals in a time slot when it forwards the primary signal.In order to address this limitation,a novel cooperative spectrum sharing scheme is proposed,where the secondary transmission is multiplexed with both the primary transmission and the relay transmission.Specifically,the process of transmission is on a three-phase time-switching relaying basis.In the first phase,a cognitive sensor node SU1 scavenges energy from the primary transmission.In the second phase,another sensor node SU2 and primary transmitter simultaneously transmit signals to the SU1.In the third phase,the node SU1 can assist the primary transmission to acquire the opportunity of spectrum sharing.Joint decoding and interference cancellation technique is adopted at the receivers to retrieve the desired signals.We further derive the closed-form expressions for the outage probabilities of both the primary and secondary systems.Moreover,we address optimization of energy harvesting duration and power allocation coefficient strategy under performance criteria.An effective algorithm is then presented to solve the optimization problem.Simulation results demonstrate that with the optimized solutions,the sensor nodes with the proposed cooperative spectrum sharing scheme can utilize the spectrum in a more efficient manner without deteriorating the performance of the primary transmission,as compared with the existing one-directional scheme in the literature.