A significant obstacle in intelligent transportation systems(ITS)is the capacity to predict traffic flow.Recent advancements in deep neural networks have enabled the development of models to represent traffic flow acc...A significant obstacle in intelligent transportation systems(ITS)is the capacity to predict traffic flow.Recent advancements in deep neural networks have enabled the development of models to represent traffic flow accurately.However,accurately predicting traffic flow at the individual road level is extremely difficult due to the complex interplay of spatial and temporal factors.This paper proposes a technique for predicting short-term traffic flow data using an architecture that utilizes convolutional bidirectional long short-term memory(Conv-BiLSTM)with attention mechanisms.Prior studies neglected to include data pertaining to factors such as holidays,weather conditions,and vehicle types,which are interconnected and significantly impact the accuracy of forecast outcomes.In addition,this research incorporates recurring monthly periodic pattern data that significantly enhances the accuracy of forecast outcomes.The experimental findings demonstrate a performance improvement of 21.68%when incorporating the vehicle type feature.展开更多
The Internet of Things(IoT)has revolutionized how we interact with and gather data from our surrounding environment.IoT devices with various sensors and actuators generate vast amounts of data that can be harnessed to...The Internet of Things(IoT)has revolutionized how we interact with and gather data from our surrounding environment.IoT devices with various sensors and actuators generate vast amounts of data that can be harnessed to derive valuable insights.The rapid proliferation of Internet of Things(IoT)devices has ushered in an era of unprecedented data generation and connectivity.These IoT devices,equipped with many sensors and actuators,continuously produce vast volumes of data.However,the conventional approach of transmitting all this data to centralized cloud infrastructures for processing and analysis poses significant challenges.However,transmitting all this data to a centralized cloud infrastructure for processing and analysis can be inefficient and impractical due to bandwidth limitations,network latency,and scalability issues.This paper proposed a Self-Learning Internet Traffic Fuzzy Classifier(SLItFC)for traffic data analysis.The proposed techniques effectively utilize clustering and classification procedures to improve classification accuracy in analyzing network traffic data.SLItFC addresses the intricate task of efficiently managing and analyzing IoT data traffic at the edge.It employs a sophisticated combination of fuzzy clustering and self-learning techniques,allowing it to adapt and improve its classification accuracy over time.This adaptability is a crucial feature,given the dynamic nature of IoT environments where data patterns and traffic characteristics can evolve rapidly.With the implementation of the fuzzy classifier,the accuracy of the clustering process is improvised with the reduction of the computational time.SLItFC can reduce computational time while maintaining high classification accuracy.This efficiency is paramount in edge computing,where resource constraints demand streamlined data processing.Additionally,SLItFC’s performance advantages make it a compelling choice for organizations seeking to harness the potential of IoT data for real-time insights and decision-making.With the Self-Learning process,the SLItFC model monitors the network traffic data acquired from the IoT Devices.The Sugeno fuzzy model is implemented within the edge computing environment for improved classification accuracy.Simulation analysis stated that the proposed SLItFC achieves 94.5%classification accuracy with reduced classification time.展开更多
Encrypted traffic classification has become a hot issue in network security research.The class imbalance problem of traffic samples often causes the deterioration of Machine Learning based classifier performance.Altho...Encrypted traffic classification has become a hot issue in network security research.The class imbalance problem of traffic samples often causes the deterioration of Machine Learning based classifier performance.Although the Generative Adversarial Network(GAN)method can generate new samples by learning the feature distribution of the original samples,it is confronted with the problems of unstable training andmode collapse.To this end,a novel data augmenting approach called Graph CWGAN-GP is proposed in this paper.The traffic data is first converted into grayscale images as the input for the proposed model.Then,the minority class data is augmented with our proposed model,which is built by introducing conditional constraints and a new distance metric in typical GAN.Finally,the classical deep learning model is adopted as a classifier to classify datasets augmented by the Condition GAN(CGAN),Wasserstein GAN-Gradient Penalty(WGAN-GP)and Graph CWGAN-GP,respectively.Compared with the state-of-the-art GAN methods,the Graph CWGAN-GP cannot only control the modes of the data to be generated,but also overcome the problem of unstable training and generate more realistic and diverse samples.The experimental results show that the classification precision,recall and F1-Score of theminority class in the balanced dataset augmented in this paper have improved by more than 2.37%,3.39% and 4.57%,respectively.展开更多
Predicting traffic flow is a crucial component of an intelligent transportation system.Precisely monitoring and predicting traffic flow remains a challenging endeavor.However,existingmethods for predicting traffic flo...Predicting traffic flow is a crucial component of an intelligent transportation system.Precisely monitoring and predicting traffic flow remains a challenging endeavor.However,existingmethods for predicting traffic flow do not incorporate various external factors or consider the spatiotemporal correlation between spatially adjacent nodes,resulting in the loss of essential information and lower forecast performance.On the other hand,the availability of spatiotemporal data is limited.This research offers alternative spatiotemporal data with three specific features as input,vehicle type(5 types),holidays(3 types),and weather(10 conditions).In this study,the proposed model combines the advantages of the capability of convolutional(CNN)layers to extract valuable information and learn the internal representation of time-series data that can be interpreted as an image,as well as the efficiency of long short-term memory(LSTM)layers for identifying short-term and long-term dependencies.Our approach may utilize the heterogeneous spatiotemporal correlation features of the traffic flowdataset to deliver better performance traffic flow prediction than existing deep learning models.The research findings show that adding spatiotemporal feature data increases the forecast’s performance;weather by 25.85%,vehicle type by 23.70%,and holiday by 14.02%.展开更多
Effective identification of traffic accident-prone points can reduce accident risks and eliminate safety hazards.This paper first systematically compares the research in Chinese and foreign literature,and proposes thr...Effective identification of traffic accident-prone points can reduce accident risks and eliminate safety hazards.This paper first systematically compares the research in Chinese and foreign literature,and proposes three types of identification indicators,namely absolute,relative and comprehensive,according to different reference standards.According to the evaluation indicators and modelling methods,the current status of research and problems in identification theory and methods are systematically summarised in terms of mathematical statistics,cluster analysis,machine learning and conflict technology.The study shows that the foreign literature focuses on the innovation of data and indicators and changes from accident point safety management to road network safety management,while the research in Chinese literature focuses on the integration of multiple identification methods and theoretical innovation.Driven by big data,the identification of traffic accident-prone points has been further developed at the meso-micro scale.Morphological image processing methods are widely used,combined with GIS platforms,to accurately mine the spatial attributes and correlations of accidents.Also,considering the spatial and temporal distribution of accidents,the identification results are also transformed from regions to specific road sections and points to achieve more accurate identification.展开更多
Determining trip purpose is an important link to explore travel rules. In this paper,we takea utomobile users in urban areas as the research object,combine unsupervised learning and supervised learningm ethods to anal...Determining trip purpose is an important link to explore travel rules. In this paper,we takea utomobile users in urban areas as the research object,combine unsupervised learning and supervised learningm ethods to analyze their travel characteristics,and focus on the classification and prediction of automobileu sers’trip purposes. However,previous studies on trip purposes mainly focused on questionnaires and GPSd ata,which cannot well reflect the characteristics of automobile travel. In order to avoid the multi-dayb ehavior variability and unobservable heterogeneity of individual characteristics ignored in traditional traffic questionnaires,traffic monitoring data from the Northern District of Qingdao are used,and the K-meansc lustering method is applied to estimate the trip purposes of automobile users. Then,Adaptive Boosting(AdaBoost)and Random Forest(RF)methods are used to classify and predict trip purposes. Finally,ther esult shows:(1)the purpose of automobile users can be mainly divided into four clusters,which includeC ommuting trips,Flexible life demand travel in daytime,Evening entertainment and leisure shopping,andT axi-based trips for the first three types of purposes,respectively;(2)the Random Forest method performss ignificantly better than AdaBoost in trip purpose prediction for higher accuracy;(3)the average predictiona ccuracy of Random Forest under hyper-parameters optimization reaches96.25%,which proves the feasibilitya nd rationality of the above clustering results.展开更多
Connected and autonomous vehicles are seeing their dawn at this moment.They provide numerous benefits to vehicle owners,manufacturers,vehicle service providers,insurance companies,etc.These vehicles generate a large a...Connected and autonomous vehicles are seeing their dawn at this moment.They provide numerous benefits to vehicle owners,manufacturers,vehicle service providers,insurance companies,etc.These vehicles generate a large amount of data,which makes privacy and security a major challenge to their success.The complicated machine-led mechanics of connected and autonomous vehicles increase the risks of privacy invasion and cyber security violations for their users by making them more susceptible to data exploitation and vulnerable to cyber-attacks than any of their predecessors.This could have a negative impact on how well-liked CAVs are with the general public,give them a poor name at this early stage of their development,put obstacles in the way of their adoption and expanded use,and complicate the economic models for their future operations.On the other hand,congestion is still a bottleneck for traffic management and planning.This research paper presents a blockchain-based framework that protects the privacy of vehicle owners and provides data security by storing vehicular data on the blockchain,which will be used further for congestion detection and mitigation.Numerous devices placed along the road are used to communicate with passing cars and collect their data.The collected data will be compiled periodically to find the average travel time of vehicles and traffic density on a particular road segment.Furthermore,this data will be stored in the memory pool,where other devices will also store their data.After a predetermined amount of time,the memory pool will be mined,and data will be uploaded to the blockchain in the form of blocks that will be used to store traffic statistics.The information is then used in two different ways.First,the blockchain’s final block will provide real-time traffic data,triggering an intelligent traffic signal system to reduce congestion.Secondly,the data stored on the blockchain will provide historical,statistical data that can facilitate the analysis of traffic conditions according to past behavior.展开更多
The slow traffic system is an important component of urban transportation,and the prerequisite and necessary condition for Beijing to continue promoting“green priority”are establishing a good urban slow traffic syst...The slow traffic system is an important component of urban transportation,and the prerequisite and necessary condition for Beijing to continue promoting“green priority”are establishing a good urban slow traffic system.Shijingshan District of Beijing City is taken as a research object.By analyzing and processing population distribution data,POI data,and shared bicycle data,the shortcomings and deficiencies of the current slow traffic system in Shijingshan District are explored,and corresponding solutions are proposed,in order to provide new ideas and methods for future urban planning from the perspective of data.展开更多
Traffic count is the fundamental data source for transportation planning, management, design, and effectiveness evaluation. Recording traffic flow and counting from the recorded videos are increasingly used due to con...Traffic count is the fundamental data source for transportation planning, management, design, and effectiveness evaluation. Recording traffic flow and counting from the recorded videos are increasingly used due to convenience, high accuracy, and cost-effectiveness. Manual counting from pre-recorded video footage can be prone to inconsistencies and errors, leading to inaccurate counts. Besides, there are no standard guidelines for collecting video data and conducting manual counts from the recorded videos. This paper aims to comprehensively assess the accuracy of manual counts from pre-recorded videos and introduces guidelines for efficiently collecting video data and conducting manual counts by trained individuals. The accuracy assessment of the manual counts was conducted based on repeated counts, and the guidelines were provided from the experience of conducting a traffic survey on forty strip mall access points in Baton Rouge, Louisiana, USA. The percentage of total error, classification error, and interval error were found to be 1.05 percent, 1.08 percent, and 1.29 percent, respectively. Besides, the percent root mean square errors (RMSE) were found to be 1.13 percent, 1.21 percent, and 1.48 percent, respectively. Guidelines were provided for selecting survey sites, instruments and timeframe, fieldwork, and manual counts for an efficient traffic data collection survey.展开更多
Emerging connected vehicle (CV) data sets have recently become commercially available, enabling analysts to develop a variety of powerful performance measures without deploying any field infrastructure. This paper pre...Emerging connected vehicle (CV) data sets have recently become commercially available, enabling analysts to develop a variety of powerful performance measures without deploying any field infrastructure. This paper presents several tools using CV data to evaluate traffic progression quality along a signalized corridor. These include both performance measures for high-level analysis as well as visualizations to examine details of the coordinated operation. With the use of CV data, it is possible to assess not only the movement of traffic on the corridor but also to consider its origin-destination (O-D) path through the corridor. Results for the real-world operation of an eight-intersection signalized arterial are presented. A series of high-level performance measures are used to evaluate overall performance by time of day, with differing results by metric. Next, the details of the operation are examined with the use of two visualization tools: a cyclic time-space diagram (TSD) and an empirical platoon progression diagram (PPD). Comparing flow visualizations developed with different included O-D paths reveals several features, such as the presence of secondary and tertiary platoons on certain sections that cannot be seen when only end-to-end journeys are included. In addition, speed heat maps are generated, providing both speed performance along the corridor and locations and the extent of the queue. The proposed visualization tools portray the corridor’s performance holistically instead of combining individual signal performance metrics. The techniques exhibited in this study are compelling for identifying locations where engineering solutions such as access management or timing plan change are required. The recent progress in infrastructure-free sensing technology has significantly increased the scope of CV data-based traffic management systems, enhancing the significance of this study. The study demonstrates the utility of CV trajectory data for obtaining high-level details of the corridor performance as well as drilling down into the minute specifics.展开更多
The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the ...The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the application of the ATC(automatic train control)network,this paper focuses on the zero trust and zero trust access strategy and the tamper-proof method of information-sharing network data.Through the improvement of ATC’s zero trust physical layer authentication and network data distributed feature differentiation calculation,this paper reconstructs the personal privacy scope authentication structure and designs a tamper-proof method of ATC’s information sharing on the Internet.From the single management authority to the unified management of data units,the systematic algorithm improvement of shared network data tamper prevention method is realized,and RDTP(Reliable Data Transfer Protocol)is selected in the network data of information sharing resources to realize the effectiveness of tamper prevention of air traffic control data during transmission.The results show that this method can reasonably avoid the tampering of information sharing on the Internet,maintain the security factors of air traffic control information sharing on the Internet,and the Central Processing Unit(CPU)utilization rate is only 4.64%,which effectively increases the performance of air traffic control data comprehensive security protection system.展开更多
With the continuous expansion of the data center network scale, changing network requirements, and increasing pressure on network bandwidth, the traditional network architecture can no longer meet people’s needs. The...With the continuous expansion of the data center network scale, changing network requirements, and increasing pressure on network bandwidth, the traditional network architecture can no longer meet people’s needs. The development of software defined networks has brought new opportunities and challenges to future networks. The data and control separation characteristics of SDN improve the performance of the entire network. Researchers have integrated SDN architecture into data centers to improve network resource utilization and performance. This paper first introduces the basic concepts of SDN and data center networks. Then it discusses SDN-based load balancing mechanisms for data centers from different perspectives. Finally, it summarizes and looks forward to the study on SDN-based load balancing mechanisms and its development trend.展开更多
With the rapid development of technologies such as big data and cloud computing,data communication and data computing in the form of exponential growth have led to a large amount of energy consumption in data centers....With the rapid development of technologies such as big data and cloud computing,data communication and data computing in the form of exponential growth have led to a large amount of energy consumption in data centers.Globally,data centers will become the world’s largest users of energy consumption,with the ratio rising from 3%in 2017 to 4.5%in 2025.Due to its unique climate and energy-saving advantages,the high-latitude area in the Pan-Arctic region has gradually become a hotspot for data center site selection in recent years.In order to predict and analyze the future energy consumption and carbon emissions of global data centers,this paper presents a new method based on global data center traffic and power usage effectiveness(PUE)for energy consumption prediction.Firstly,global data center traffic growth is predicted based on the Cisco’s research.Secondly,the dynamic global average PUE and the high latitude PUE based on Romonet simulation model are obtained,and then global data center energy consumption with two different scenarios,the decentralized scenario and the centralized scenario,is analyzed quantitatively via the polynomial fitting method.The simulation results show that,in 2030,the global data center energy consumption and carbon emissions are reduced by about 301 billion kWh and 720 million tons CO2 in the centralized scenario compared with that of the decentralized scenario,which confirms that the establishment of data centers in the Pan-Arctic region in the future can effectively relief the climate change and energy problems.This study provides support for global energy consumption prediction,and guidance for the layout of future global data centers from the perspective of energy consumption.Moreover,it provides support of the feasibility of the integration of energy and information networks under the Global Energy Interconnection conception.展开更多
The application and development of a wide-area measurement system(WAMS)has enabled many applications and led to several requirements based on dynamic measurement data.Such data are transmitted as big data information ...The application and development of a wide-area measurement system(WAMS)has enabled many applications and led to several requirements based on dynamic measurement data.Such data are transmitted as big data information flow.To ensure effective transmission of wide-frequency electrical information by the communication protocol of a WAMS,this study performs real-time traffic monitoring and analysis of the data network of a power information system,and establishes corresponding network optimization strategies to solve existing transmission problems.This study utilizes the traffic analysis results obtained using the current real-time dynamic monitoring system to design an optimization strategy,covering the optimization in three progressive levels:the underlying communication protocol,source data,and transmission process.Optimization of the system structure and scheduling optimization of data information are validated to be feasible and practical via tests.展开更多
Accurate prediction of road traffic flow is a significant part in the intelligent transportation systems.Accurate prediction can alleviate traffic congestion,and reduce environmental pollution.For the management depar...Accurate prediction of road traffic flow is a significant part in the intelligent transportation systems.Accurate prediction can alleviate traffic congestion,and reduce environmental pollution.For the management department,it can make effective use of road resources.For individuals,it can help people plan their own travel paths,avoid congestion,and save time.Owing to complex factors on the road,such as damage to the detector and disturbances from environment,the measured traffic volume can contain noise.Reducing the influence of noise on traffic flow prediction is a piece of very important work.Therefore,in this paper we propose a combination algorithm of denoising and BILSTM to effectively improve the performance of traffic flow prediction.At the same time,three denoising algorithms are compared to find the best combination mode.In this paper,the wavelet(WL) denoising scheme,the empirical mode decomposition(EMD) denoising scheme,and the ensemble empirical mode decomposition(EEMD) denoising scheme are all introduced to suppress outliers in traffic flow data.In addition,we combine the denoising schemes with bidirectional long short-term memory(BILSTM)network to predict the traffic flow.The data in this paper are cited from performance measurement system(PeMS).We choose three kinds of road data(mainline,off ramp,on ramp) to predict traffic flow.The results for mainline show that data denoising can improve prediction accuracy.Moreover,prediction accuracy of BILSTM+EEMD scheme is the highest in the three methods(BILSTM+WL,BILSTM+EMD,BILSTM+EEMD).The results for off ramp and on ramp show the same performance as the results for mainline.It is indicated that this model is suitable for different road sections and long-term prediction.展开更多
To provide Artificial Intelligence(AI)services such as object detection,Internet of Things(IoT)sensor devices should be able to send a large amount of data such as images and videos.However,this inevitably causes IoT ...To provide Artificial Intelligence(AI)services such as object detection,Internet of Things(IoT)sensor devices should be able to send a large amount of data such as images and videos.However,this inevitably causes IoT networks to be severely overloaded.In this paper,therefore,we propose a novel oneM2M-compliant Artificial Intelligence of Things(AIoT)system for reducing overall data traffic and offering object detection.It consists of some IoT sensor devices with random sampling functions controlled by a compressed sensing(CS)rate,an IoT edge gateway with CS recovery and domain transform functions related to compressed sensing,and a YOLOv5 deep learning function for object detection,and an IoT server.By analyzing the effects of compressed sensing on data traffic reduction in terms of data rate per IoT sensor device,we showed that the proposed AIoT system can reduce the overall data traffic by changing compressed sensing rates of random sampling functions in IoT sensor devices.In addition,we analyzed the effects of the compressed sensing on YOLOv5 object detection in terms of performance metrics such as recall,precision,mAP50,and mAP,and found that recall slightly decreases but precision remains almost constant even though the compressed sensing rate decreases and that mAP50 and mAP are gradually degraded according to the decreased compressed sensing rate.Consequently,if proper compressed sensing rates are chosen,the proposed AIoT system will reduce the overall data traffic without significant performance degradation of YOLOv5.展开更多
Greening Internet is an important issue now, which studies the way to reduce the increas- ing energy expenditure. Our work focuses on the network infrastructure and considers its energy awareness in traffic routing. W...Greening Internet is an important issue now, which studies the way to reduce the increas- ing energy expenditure. Our work focuses on the network infrastructure and considers its energy awareness in traffic routing. We formulate the model by traffic engineering to achieve link rate a- daption, and also predict traffic matrices to pre- serve network stability. However, we realize that there is a tradeoff between network performance and energy efficiency, which is an obvious issue as Internet grows larger and larger. An essential cause is the huge traffic, and thus we try to fred its so- lution from a novel architecture called Named Data Networking (NDN) which tent in edge routers and can flexibly cache con- decrease the backbone traffic. We combine our methods with NDN, and finally improve both the network performance and the energy efficiency. Our work shows that it is effective, necessary and feasible to consider green- ing idea in the design of future Internet.展开更多
Local arterials can be significantly impacted by diversions from adjacent work zones. These diversions often occur on unofficial detour routes due to guidance received on personal navigation devices. Often, these rout...Local arterials can be significantly impacted by diversions from adjacent work zones. These diversions often occur on unofficial detour routes due to guidance received on personal navigation devices. Often, these routes do not have sufficien<span style="font-family:Verdana;">t sensing or communication equipment to obtain infrastructure-based tra</span><span style="font-family:Verdana;">ffic signal performance measures, so other data sources are required to identify locations being significantly affected by diversions. This paper examines the network impact caused by the start of an 18-month closure of the I-65/70 interchange (North Split), which usually serves approximately 214,000 vehicles per day in Indianapolis, IN. In anticipation of some proportion of the public diverting from official detour routes to local streets, a connected vehicle monitoring program was established to provide daily performances measures for over 100 intersections in the area without the need for vehicle sensing equipment. This study reports on 13 of the most impacted signals on an alternative arterial to identify locations and time of day where operations are most degraded, so that decision makers have quantitative information to make informed adjustments to the system. Individual vehicle movements at the studied locations are analyzed to estimate changes in volume, split failures, downstream blockage, arrivals on green, and travel times. Over 130,000 trajectories were analyzed in an 11-week period. Weekly afternoon peak period volumes increased by approximately 455%, split failures increased 3%, downstream blockage increased 10%, arrivals on green decreased 16%, and travel time increase 74%. The analysis performed in this paper will serve as a framework for any agency that wants to assess traffic signal performance at hundreds of locations with little or no existing sensing or communication infrastructure to prioritize tactical retiming and/or longer-term infrastructure investments.</span>展开更多
This study developed a new methodology for analyzing the risk level of marine spill accidents from two perspectives,namely,marine traffic density and sensitive resources.Through a case study conducted in Busan,South K...This study developed a new methodology for analyzing the risk level of marine spill accidents from two perspectives,namely,marine traffic density and sensitive resources.Through a case study conducted in Busan,South Korea,detailed procedures of the methodology were proposed and its scalability was confirmed.To analyze the risk from a more detailed and microscopic viewpoint,vessel routes as hazard sources were delineated on the basis of automated identification system(AIS)big data.The outliers and errors of AIS big data were removed using the density-based spatial clustering of applications with noise algorithm,and a marine traffic density map was evaluated by combining all of the gridded routes.Vulnerability of marine environment was identified on the basis of the sensitive resource map constructed by the Korea Coast Guard in a similar manner to the National Oceanic and Atmospheric Administration environmental sensitivity index approach.In this study,aquaculture sites,water intake facilities of power plants,and beach/resort areas were selected as representative indicators for each category.The vulnerability values of neighboring cells decreased according to the Euclidean distance from the resource cells.Two resulting maps were aggregated to construct a final sensitive resource and traffic density(SRTD)risk analysis map of the Busan–Ulsan sea areas.We confirmed the effectiveness of SRTD risk analysis by comparing it with the actual marine spill accident records.Results show that all of the marine spill accidents in 2018 occurred within 2 km of high-risk cells(level 6 and above).Thus,if accident management and monitoring capabilities are concentrated on high-risk cells,which account for only 6.45%of the total study area,then it is expected that it will be possible to cope with most marine spill accidents effectively.展开更多
Energy-efficient data gathering in multi-hop wireless sensor networks was studied,considering that different node produces different amounts of data in realistic environments.A novel dominating set based clustering pr...Energy-efficient data gathering in multi-hop wireless sensor networks was studied,considering that different node produces different amounts of data in realistic environments.A novel dominating set based clustering protocol (DSCP) was proposed to solve the data gathering problem in this scenario.In DSCP,a node evaluates the potential lifetime of the network (from its local point of view) assuming that it acts as the cluster head,and claims to be a tentative cluster head if it maximizes the potential lifetime.When evaluating the potential lifetime of the network,a node considers not only its remaining energy,but also other factors including its traffic load,the number of its neighbors,and the traffic loads of its neighbors.A tentative cluster head becomes a final cluster head with a probability inversely proportional to the number of tentative cluster heads that cover its neighbors.The protocol can terminate in O(n/lg n) steps,and its total message complexity is O(n2/lg n).Simulation results show that DSCP can effectively prolong the lifetime of the network in multi-hop networks with unbalanced traffic load.Compared with EECT,the network lifetime is prolonged by 56.6% in average.展开更多
文摘A significant obstacle in intelligent transportation systems(ITS)is the capacity to predict traffic flow.Recent advancements in deep neural networks have enabled the development of models to represent traffic flow accurately.However,accurately predicting traffic flow at the individual road level is extremely difficult due to the complex interplay of spatial and temporal factors.This paper proposes a technique for predicting short-term traffic flow data using an architecture that utilizes convolutional bidirectional long short-term memory(Conv-BiLSTM)with attention mechanisms.Prior studies neglected to include data pertaining to factors such as holidays,weather conditions,and vehicle types,which are interconnected and significantly impact the accuracy of forecast outcomes.In addition,this research incorporates recurring monthly periodic pattern data that significantly enhances the accuracy of forecast outcomes.The experimental findings demonstrate a performance improvement of 21.68%when incorporating the vehicle type feature.
基金This research is funded by 2023 Henan Province Science and Technology Research Projects:Key Technology of Rapid Urban Flood Forecasting Based onWater Level Feature Analysis and Spatio-Temporal Deep Learning(No.232102320015)Henan Provincial Higher Education Key Research Project Program(Project No.23B520024)a Multi-Sensor-Based Indoor Environmental Parameters Monitoring and Control System.
文摘The Internet of Things(IoT)has revolutionized how we interact with and gather data from our surrounding environment.IoT devices with various sensors and actuators generate vast amounts of data that can be harnessed to derive valuable insights.The rapid proliferation of Internet of Things(IoT)devices has ushered in an era of unprecedented data generation and connectivity.These IoT devices,equipped with many sensors and actuators,continuously produce vast volumes of data.However,the conventional approach of transmitting all this data to centralized cloud infrastructures for processing and analysis poses significant challenges.However,transmitting all this data to a centralized cloud infrastructure for processing and analysis can be inefficient and impractical due to bandwidth limitations,network latency,and scalability issues.This paper proposed a Self-Learning Internet Traffic Fuzzy Classifier(SLItFC)for traffic data analysis.The proposed techniques effectively utilize clustering and classification procedures to improve classification accuracy in analyzing network traffic data.SLItFC addresses the intricate task of efficiently managing and analyzing IoT data traffic at the edge.It employs a sophisticated combination of fuzzy clustering and self-learning techniques,allowing it to adapt and improve its classification accuracy over time.This adaptability is a crucial feature,given the dynamic nature of IoT environments where data patterns and traffic characteristics can evolve rapidly.With the implementation of the fuzzy classifier,the accuracy of the clustering process is improvised with the reduction of the computational time.SLItFC can reduce computational time while maintaining high classification accuracy.This efficiency is paramount in edge computing,where resource constraints demand streamlined data processing.Additionally,SLItFC’s performance advantages make it a compelling choice for organizations seeking to harness the potential of IoT data for real-time insights and decision-making.With the Self-Learning process,the SLItFC model monitors the network traffic data acquired from the IoT Devices.The Sugeno fuzzy model is implemented within the edge computing environment for improved classification accuracy.Simulation analysis stated that the proposed SLItFC achieves 94.5%classification accuracy with reduced classification time.
基金supported by the National Natural Science Foundation of China (Grants Nos.61931004,62072250)the Talent Launch Fund of Nanjing University of Information Science and Technology (2020r061).
文摘Encrypted traffic classification has become a hot issue in network security research.The class imbalance problem of traffic samples often causes the deterioration of Machine Learning based classifier performance.Although the Generative Adversarial Network(GAN)method can generate new samples by learning the feature distribution of the original samples,it is confronted with the problems of unstable training andmode collapse.To this end,a novel data augmenting approach called Graph CWGAN-GP is proposed in this paper.The traffic data is first converted into grayscale images as the input for the proposed model.Then,the minority class data is augmented with our proposed model,which is built by introducing conditional constraints and a new distance metric in typical GAN.Finally,the classical deep learning model is adopted as a classifier to classify datasets augmented by the Condition GAN(CGAN),Wasserstein GAN-Gradient Penalty(WGAN-GP)and Graph CWGAN-GP,respectively.Compared with the state-of-the-art GAN methods,the Graph CWGAN-GP cannot only control the modes of the data to be generated,but also overcome the problem of unstable training and generate more realistic and diverse samples.The experimental results show that the classification precision,recall and F1-Score of theminority class in the balanced dataset augmented in this paper have improved by more than 2.37%,3.39% and 4.57%,respectively.
基金Supported by Universitas Muhammadiyah Yogyakarta,Indonesia and Asia University,Taiwan.
文摘Predicting traffic flow is a crucial component of an intelligent transportation system.Precisely monitoring and predicting traffic flow remains a challenging endeavor.However,existingmethods for predicting traffic flow do not incorporate various external factors or consider the spatiotemporal correlation between spatially adjacent nodes,resulting in the loss of essential information and lower forecast performance.On the other hand,the availability of spatiotemporal data is limited.This research offers alternative spatiotemporal data with three specific features as input,vehicle type(5 types),holidays(3 types),and weather(10 conditions).In this study,the proposed model combines the advantages of the capability of convolutional(CNN)layers to extract valuable information and learn the internal representation of time-series data that can be interpreted as an image,as well as the efficiency of long short-term memory(LSTM)layers for identifying short-term and long-term dependencies.Our approach may utilize the heterogeneous spatiotemporal correlation features of the traffic flowdataset to deliver better performance traffic flow prediction than existing deep learning models.The research findings show that adding spatiotemporal feature data increases the forecast’s performance;weather by 25.85%,vehicle type by 23.70%,and holiday by 14.02%.
基金supported by The Fundamental Research Funds for the Central Universities(No:2022RC023).
文摘Effective identification of traffic accident-prone points can reduce accident risks and eliminate safety hazards.This paper first systematically compares the research in Chinese and foreign literature,and proposes three types of identification indicators,namely absolute,relative and comprehensive,according to different reference standards.According to the evaluation indicators and modelling methods,the current status of research and problems in identification theory and methods are systematically summarised in terms of mathematical statistics,cluster analysis,machine learning and conflict technology.The study shows that the foreign literature focuses on the innovation of data and indicators and changes from accident point safety management to road network safety management,while the research in Chinese literature focuses on the integration of multiple identification methods and theoretical innovation.Driven by big data,the identification of traffic accident-prone points has been further developed at the meso-micro scale.Morphological image processing methods are widely used,combined with GIS platforms,to accurately mine the spatial attributes and correlations of accidents.Also,considering the spatial and temporal distribution of accidents,the identification results are also transformed from regions to specific road sections and points to achieve more accurate identification.
基金Sponsored by the National Key R&D Program of China(Grant No.2020YFB1600500)the National Natural Science Foundation of China(GrantN o.52272319)。
文摘Determining trip purpose is an important link to explore travel rules. In this paper,we takea utomobile users in urban areas as the research object,combine unsupervised learning and supervised learningm ethods to analyze their travel characteristics,and focus on the classification and prediction of automobileu sers’trip purposes. However,previous studies on trip purposes mainly focused on questionnaires and GPSd ata,which cannot well reflect the characteristics of automobile travel. In order to avoid the multi-dayb ehavior variability and unobservable heterogeneity of individual characteristics ignored in traditional traffic questionnaires,traffic monitoring data from the Northern District of Qingdao are used,and the K-meansc lustering method is applied to estimate the trip purposes of automobile users. Then,Adaptive Boosting(AdaBoost)and Random Forest(RF)methods are used to classify and predict trip purposes. Finally,ther esult shows:(1)the purpose of automobile users can be mainly divided into four clusters,which includeC ommuting trips,Flexible life demand travel in daytime,Evening entertainment and leisure shopping,andT axi-based trips for the first three types of purposes,respectively;(2)the Random Forest method performss ignificantly better than AdaBoost in trip purpose prediction for higher accuracy;(3)the average predictiona ccuracy of Random Forest under hyper-parameters optimization reaches96.25%,which proves the feasibilitya nd rationality of the above clustering results.
基金funded by the Deanship of Scientific Research at King Khalid University,Kingdom of Saudi Arabia for large group Research Project under grant number:RGP2/249/44.
文摘Connected and autonomous vehicles are seeing their dawn at this moment.They provide numerous benefits to vehicle owners,manufacturers,vehicle service providers,insurance companies,etc.These vehicles generate a large amount of data,which makes privacy and security a major challenge to their success.The complicated machine-led mechanics of connected and autonomous vehicles increase the risks of privacy invasion and cyber security violations for their users by making them more susceptible to data exploitation and vulnerable to cyber-attacks than any of their predecessors.This could have a negative impact on how well-liked CAVs are with the general public,give them a poor name at this early stage of their development,put obstacles in the way of their adoption and expanded use,and complicate the economic models for their future operations.On the other hand,congestion is still a bottleneck for traffic management and planning.This research paper presents a blockchain-based framework that protects the privacy of vehicle owners and provides data security by storing vehicular data on the blockchain,which will be used further for congestion detection and mitigation.Numerous devices placed along the road are used to communicate with passing cars and collect their data.The collected data will be compiled periodically to find the average travel time of vehicles and traffic density on a particular road segment.Furthermore,this data will be stored in the memory pool,where other devices will also store their data.After a predetermined amount of time,the memory pool will be mined,and data will be uploaded to the blockchain in the form of blocks that will be used to store traffic statistics.The information is then used in two different ways.First,the blockchain’s final block will provide real-time traffic data,triggering an intelligent traffic signal system to reduce congestion.Secondly,the data stored on the blockchain will provide historical,statistical data that can facilitate the analysis of traffic conditions according to past behavior.
基金Sponsored by Beijing Natural Science Foundation General Project(8212009)Construction of Philosophy and Social Sciences Base in Beijing-Research on Beijing Urban Renewal and Comprehensive Management of Old Community En-vironment2023 Education Reform Project of North China University of Technology(108051360023XN264-25).
文摘The slow traffic system is an important component of urban transportation,and the prerequisite and necessary condition for Beijing to continue promoting“green priority”are establishing a good urban slow traffic system.Shijingshan District of Beijing City is taken as a research object.By analyzing and processing population distribution data,POI data,and shared bicycle data,the shortcomings and deficiencies of the current slow traffic system in Shijingshan District are explored,and corresponding solutions are proposed,in order to provide new ideas and methods for future urban planning from the perspective of data.
文摘Traffic count is the fundamental data source for transportation planning, management, design, and effectiveness evaluation. Recording traffic flow and counting from the recorded videos are increasingly used due to convenience, high accuracy, and cost-effectiveness. Manual counting from pre-recorded video footage can be prone to inconsistencies and errors, leading to inaccurate counts. Besides, there are no standard guidelines for collecting video data and conducting manual counts from the recorded videos. This paper aims to comprehensively assess the accuracy of manual counts from pre-recorded videos and introduces guidelines for efficiently collecting video data and conducting manual counts by trained individuals. The accuracy assessment of the manual counts was conducted based on repeated counts, and the guidelines were provided from the experience of conducting a traffic survey on forty strip mall access points in Baton Rouge, Louisiana, USA. The percentage of total error, classification error, and interval error were found to be 1.05 percent, 1.08 percent, and 1.29 percent, respectively. Besides, the percent root mean square errors (RMSE) were found to be 1.13 percent, 1.21 percent, and 1.48 percent, respectively. Guidelines were provided for selecting survey sites, instruments and timeframe, fieldwork, and manual counts for an efficient traffic data collection survey.
文摘Emerging connected vehicle (CV) data sets have recently become commercially available, enabling analysts to develop a variety of powerful performance measures without deploying any field infrastructure. This paper presents several tools using CV data to evaluate traffic progression quality along a signalized corridor. These include both performance measures for high-level analysis as well as visualizations to examine details of the coordinated operation. With the use of CV data, it is possible to assess not only the movement of traffic on the corridor but also to consider its origin-destination (O-D) path through the corridor. Results for the real-world operation of an eight-intersection signalized arterial are presented. A series of high-level performance measures are used to evaluate overall performance by time of day, with differing results by metric. Next, the details of the operation are examined with the use of two visualization tools: a cyclic time-space diagram (TSD) and an empirical platoon progression diagram (PPD). Comparing flow visualizations developed with different included O-D paths reveals several features, such as the presence of secondary and tertiary platoons on certain sections that cannot be seen when only end-to-end journeys are included. In addition, speed heat maps are generated, providing both speed performance along the corridor and locations and the extent of the queue. The proposed visualization tools portray the corridor’s performance holistically instead of combining individual signal performance metrics. The techniques exhibited in this study are compelling for identifying locations where engineering solutions such as access management or timing plan change are required. The recent progress in infrastructure-free sensing technology has significantly increased the scope of CV data-based traffic management systems, enhancing the significance of this study. The study demonstrates the utility of CV trajectory data for obtaining high-level details of the corridor performance as well as drilling down into the minute specifics.
基金This work was supported by National Natural Science Foundation of China(U2133208,U20A20161).
文摘The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the application of the ATC(automatic train control)network,this paper focuses on the zero trust and zero trust access strategy and the tamper-proof method of information-sharing network data.Through the improvement of ATC’s zero trust physical layer authentication and network data distributed feature differentiation calculation,this paper reconstructs the personal privacy scope authentication structure and designs a tamper-proof method of ATC’s information sharing on the Internet.From the single management authority to the unified management of data units,the systematic algorithm improvement of shared network data tamper prevention method is realized,and RDTP(Reliable Data Transfer Protocol)is selected in the network data of information sharing resources to realize the effectiveness of tamper prevention of air traffic control data during transmission.The results show that this method can reasonably avoid the tampering of information sharing on the Internet,maintain the security factors of air traffic control information sharing on the Internet,and the Central Processing Unit(CPU)utilization rate is only 4.64%,which effectively increases the performance of air traffic control data comprehensive security protection system.
文摘With the continuous expansion of the data center network scale, changing network requirements, and increasing pressure on network bandwidth, the traditional network architecture can no longer meet people’s needs. The development of software defined networks has brought new opportunities and challenges to future networks. The data and control separation characteristics of SDN improve the performance of the entire network. Researchers have integrated SDN architecture into data centers to improve network resource utilization and performance. This paper first introduces the basic concepts of SDN and data center networks. Then it discusses SDN-based load balancing mechanisms for data centers from different perspectives. Finally, it summarizes and looks forward to the study on SDN-based load balancing mechanisms and its development trend.
基金supported by National Natural Science Foundation of China(61472042)Corporation Science and Technology Program of Global Energy Interconnection Group Ltd.(GEIGC-D-[2018]024)
文摘With the rapid development of technologies such as big data and cloud computing,data communication and data computing in the form of exponential growth have led to a large amount of energy consumption in data centers.Globally,data centers will become the world’s largest users of energy consumption,with the ratio rising from 3%in 2017 to 4.5%in 2025.Due to its unique climate and energy-saving advantages,the high-latitude area in the Pan-Arctic region has gradually become a hotspot for data center site selection in recent years.In order to predict and analyze the future energy consumption and carbon emissions of global data centers,this paper presents a new method based on global data center traffic and power usage effectiveness(PUE)for energy consumption prediction.Firstly,global data center traffic growth is predicted based on the Cisco’s research.Secondly,the dynamic global average PUE and the high latitude PUE based on Romonet simulation model are obtained,and then global data center energy consumption with two different scenarios,the decentralized scenario and the centralized scenario,is analyzed quantitatively via the polynomial fitting method.The simulation results show that,in 2030,the global data center energy consumption and carbon emissions are reduced by about 301 billion kWh and 720 million tons CO2 in the centralized scenario compared with that of the decentralized scenario,which confirms that the establishment of data centers in the Pan-Arctic region in the future can effectively relief the climate change and energy problems.This study provides support for global energy consumption prediction,and guidance for the layout of future global data centers from the perspective of energy consumption.Moreover,it provides support of the feasibility of the integration of energy and information networks under the Global Energy Interconnection conception.
文摘The application and development of a wide-area measurement system(WAMS)has enabled many applications and led to several requirements based on dynamic measurement data.Such data are transmitted as big data information flow.To ensure effective transmission of wide-frequency electrical information by the communication protocol of a WAMS,this study performs real-time traffic monitoring and analysis of the data network of a power information system,and establishes corresponding network optimization strategies to solve existing transmission problems.This study utilizes the traffic analysis results obtained using the current real-time dynamic monitoring system to design an optimization strategy,covering the optimization in three progressive levels:the underlying communication protocol,source data,and transmission process.Optimization of the system structure and scheduling optimization of data information are validated to be feasible and practical via tests.
基金Project supported by the Program of Humanities and Social Science of the Education Ministry of China(Grant No.20YJA630008)the Natural Science Foundation of Zhejiang Province,China(Grant No.LY20G010004)the K C Wong Magna Fund in Ningbo University,China。
文摘Accurate prediction of road traffic flow is a significant part in the intelligent transportation systems.Accurate prediction can alleviate traffic congestion,and reduce environmental pollution.For the management department,it can make effective use of road resources.For individuals,it can help people plan their own travel paths,avoid congestion,and save time.Owing to complex factors on the road,such as damage to the detector and disturbances from environment,the measured traffic volume can contain noise.Reducing the influence of noise on traffic flow prediction is a piece of very important work.Therefore,in this paper we propose a combination algorithm of denoising and BILSTM to effectively improve the performance of traffic flow prediction.At the same time,three denoising algorithms are compared to find the best combination mode.In this paper,the wavelet(WL) denoising scheme,the empirical mode decomposition(EMD) denoising scheme,and the ensemble empirical mode decomposition(EEMD) denoising scheme are all introduced to suppress outliers in traffic flow data.In addition,we combine the denoising schemes with bidirectional long short-term memory(BILSTM)network to predict the traffic flow.The data in this paper are cited from performance measurement system(PeMS).We choose three kinds of road data(mainline,off ramp,on ramp) to predict traffic flow.The results for mainline show that data denoising can improve prediction accuracy.Moreover,prediction accuracy of BILSTM+EEMD scheme is the highest in the three methods(BILSTM+WL,BILSTM+EMD,BILSTM+EEMD).The results for off ramp and on ramp show the same performance as the results for mainline.It is indicated that this model is suitable for different road sections and long-term prediction.
基金This work was supported by Institute for Information&communications Technology Planning&Evaluation(IITP)grant funded by the Korea government(MSIT)(No.2020-0-00959,Fast Intelligence Analysis HW/SW Engine Exploiting IoT Platform for Boosting On-device AI in 5G Environment).
文摘To provide Artificial Intelligence(AI)services such as object detection,Internet of Things(IoT)sensor devices should be able to send a large amount of data such as images and videos.However,this inevitably causes IoT networks to be severely overloaded.In this paper,therefore,we propose a novel oneM2M-compliant Artificial Intelligence of Things(AIoT)system for reducing overall data traffic and offering object detection.It consists of some IoT sensor devices with random sampling functions controlled by a compressed sensing(CS)rate,an IoT edge gateway with CS recovery and domain transform functions related to compressed sensing,and a YOLOv5 deep learning function for object detection,and an IoT server.By analyzing the effects of compressed sensing on data traffic reduction in terms of data rate per IoT sensor device,we showed that the proposed AIoT system can reduce the overall data traffic by changing compressed sensing rates of random sampling functions in IoT sensor devices.In addition,we analyzed the effects of the compressed sensing on YOLOv5 object detection in terms of performance metrics such as recall,precision,mAP50,and mAP,and found that recall slightly decreases but precision remains almost constant even though the compressed sensing rate decreases and that mAP50 and mAP are gradually degraded according to the decreased compressed sensing rate.Consequently,if proper compressed sensing rates are chosen,the proposed AIoT system will reduce the overall data traffic without significant performance degradation of YOLOv5.
基金This work was supported by the National Key Basic Re- search Program of China under Grant No. 2011 CB302702 the National Natural Science Foundation of China under Grants No. 61132001, No. 61120106008, No. 61070187, No. 60970133, No. 61003225 the Beijing Nova Program.
文摘Greening Internet is an important issue now, which studies the way to reduce the increas- ing energy expenditure. Our work focuses on the network infrastructure and considers its energy awareness in traffic routing. We formulate the model by traffic engineering to achieve link rate a- daption, and also predict traffic matrices to pre- serve network stability. However, we realize that there is a tradeoff between network performance and energy efficiency, which is an obvious issue as Internet grows larger and larger. An essential cause is the huge traffic, and thus we try to fred its so- lution from a novel architecture called Named Data Networking (NDN) which tent in edge routers and can flexibly cache con- decrease the backbone traffic. We combine our methods with NDN, and finally improve both the network performance and the energy efficiency. Our work shows that it is effective, necessary and feasible to consider green- ing idea in the design of future Internet.
文摘Local arterials can be significantly impacted by diversions from adjacent work zones. These diversions often occur on unofficial detour routes due to guidance received on personal navigation devices. Often, these routes do not have sufficien<span style="font-family:Verdana;">t sensing or communication equipment to obtain infrastructure-based tra</span><span style="font-family:Verdana;">ffic signal performance measures, so other data sources are required to identify locations being significantly affected by diversions. This paper examines the network impact caused by the start of an 18-month closure of the I-65/70 interchange (North Split), which usually serves approximately 214,000 vehicles per day in Indianapolis, IN. In anticipation of some proportion of the public diverting from official detour routes to local streets, a connected vehicle monitoring program was established to provide daily performances measures for over 100 intersections in the area without the need for vehicle sensing equipment. This study reports on 13 of the most impacted signals on an alternative arterial to identify locations and time of day where operations are most degraded, so that decision makers have quantitative information to make informed adjustments to the system. Individual vehicle movements at the studied locations are analyzed to estimate changes in volume, split failures, downstream blockage, arrivals on green, and travel times. Over 130,000 trajectories were analyzed in an 11-week period. Weekly afternoon peak period volumes increased by approximately 455%, split failures increased 3%, downstream blockage increased 10%, arrivals on green decreased 16%, and travel time increase 74%. The analysis performed in this paper will serve as a framework for any agency that wants to assess traffic signal performance at hundreds of locations with little or no existing sensing or communication infrastructure to prioritize tactical retiming and/or longer-term infrastructure investments.</span>
基金This research was supported by a grant[KCG-01-2017-01]through the Disaster and Safety Management Institute funded by the Ministry of Public Safety and Securitythe National Research Foundation of Korea(NRF)grant[No.2018R1D1A1B07050208]funded by the Ministry of Science and ICT of Korea Government.
文摘This study developed a new methodology for analyzing the risk level of marine spill accidents from two perspectives,namely,marine traffic density and sensitive resources.Through a case study conducted in Busan,South Korea,detailed procedures of the methodology were proposed and its scalability was confirmed.To analyze the risk from a more detailed and microscopic viewpoint,vessel routes as hazard sources were delineated on the basis of automated identification system(AIS)big data.The outliers and errors of AIS big data were removed using the density-based spatial clustering of applications with noise algorithm,and a marine traffic density map was evaluated by combining all of the gridded routes.Vulnerability of marine environment was identified on the basis of the sensitive resource map constructed by the Korea Coast Guard in a similar manner to the National Oceanic and Atmospheric Administration environmental sensitivity index approach.In this study,aquaculture sites,water intake facilities of power plants,and beach/resort areas were selected as representative indicators for each category.The vulnerability values of neighboring cells decreased according to the Euclidean distance from the resource cells.Two resulting maps were aggregated to construct a final sensitive resource and traffic density(SRTD)risk analysis map of the Busan–Ulsan sea areas.We confirmed the effectiveness of SRTD risk analysis by comparing it with the actual marine spill accident records.Results show that all of the marine spill accidents in 2018 occurred within 2 km of high-risk cells(level 6 and above).Thus,if accident management and monitoring capabilities are concentrated on high-risk cells,which account for only 6.45%of the total study area,then it is expected that it will be possible to cope with most marine spill accidents effectively.
基金Projects(61173169,61103203)supported by the National Natural Science Foundation of ChinaProject(NCET-10-0798)supported by the Program for New Century Excellent Talents in University of ChinaProject supported by the Post-doctoral Program and the Freedom Explore Program of Central South University,China
文摘Energy-efficient data gathering in multi-hop wireless sensor networks was studied,considering that different node produces different amounts of data in realistic environments.A novel dominating set based clustering protocol (DSCP) was proposed to solve the data gathering problem in this scenario.In DSCP,a node evaluates the potential lifetime of the network (from its local point of view) assuming that it acts as the cluster head,and claims to be a tentative cluster head if it maximizes the potential lifetime.When evaluating the potential lifetime of the network,a node considers not only its remaining energy,but also other factors including its traffic load,the number of its neighbors,and the traffic loads of its neighbors.A tentative cluster head becomes a final cluster head with a probability inversely proportional to the number of tentative cluster heads that cover its neighbors.The protocol can terminate in O(n/lg n) steps,and its total message complexity is O(n2/lg n).Simulation results show that DSCP can effectively prolong the lifetime of the network in multi-hop networks with unbalanced traffic load.Compared with EECT,the network lifetime is prolonged by 56.6% in average.