Over the last decade,mobile Adhoc networks have expanded dramati-cally in popularity,and their impact on the communication sector on a variety of levels is enormous.Its uses have expanded in lockstep with its growth.D...Over the last decade,mobile Adhoc networks have expanded dramati-cally in popularity,and their impact on the communication sector on a variety of levels is enormous.Its uses have expanded in lockstep with its growth.Due to its instability in usage and the fact that numerous nodes communicate data concur-rently,adequate channel and forwarder selection is essential.In this proposed design for a Cognitive Radio Cognitive Network(CRCN),we gain the confidence of each forwarding node by contacting one-hop and second level nodes,obtaining reports from them,and selecting the forwarder appropriately with the use of an optimization technique.At that point,we concentrate our efforts on their channel,selection,and lastly,the transmission of data packets via the designated forwarder.The simulation work is validated in this section using the MATLAB program.Additionally,steps show how the node acts as a confident forwarder and shares the channel in a compatible method to communicate,allowing for more packet bits to be transmitted by conveniently picking the channel between them.We cal-culate the confidence of the node at the start of the network by combining the reliability report for thefirst hop and the reliability report for the secondary hop.We then refer to the same node as the confident node in order to operate as a forwarder.As a result,we witness an increase in the leftover energy in the output.The percentage of data packets delivered has also increased.展开更多
Using a relaying system to provide spatial diversity and improve the system performance is a tendency in the wireless cooperative communications. Amplify-and-forward (AF) mode with a low complexity is easy to be imp...Using a relaying system to provide spatial diversity and improve the system performance is a tendency in the wireless cooperative communications. Amplify-and-forward (AF) mode with a low complexity is easy to be implemented. Under the consideration of cooperative communication systems, the scenario includes one information source, M relay stations and N destinations. This work proposes a relay selection algorithm in the Raleigh fading channel. Based on the exhaustive search method, easily to realize, the optimal selection scheme can be found with a highly complicated calculation. In order to reduce the computational complexity, an approximate optimal solution with a greedy algorithm applied for the relay station selection is proposed. With different situations of the communication systems, the performance evaluation obtained by both the proposed algorithm and the exhaustive search algorithm are given for comparison. It shows the proposed algorithm could provide a solution approach to the optimal one.展开更多
We introduce a new approach for optimal portfolio choice under model ambiguity by incorporating predictable forward preferences in the framework of Angoshtari et al.[2].The investor reassesses and revises the model am...We introduce a new approach for optimal portfolio choice under model ambiguity by incorporating predictable forward preferences in the framework of Angoshtari et al.[2].The investor reassesses and revises the model ambiguity set incrementally in time while,also,updating his risk preferences forward in time.This dynamic alignment of preferences and ambiguity updating results in time-consistent policies and provides a richer,more accurate learning setting.For each investment period,the investor solves a worst-case portfolio optimization over possible market models,which are represented via a Wasserstein neighborhood centered at a binomial distribution.Duality methods from Gao and Kleywegt[10];Blanchet and Murthy[8]are used to solve the optimization problem over a suitable set of measures,yielding an explicit optimal portfolio in the linear case.We analyze the case of linear and quadratic utilities,and provide numerical results.展开更多
The security problems of wireless sensor networks (WSN) have attracted people’s wide attention. In this paper, after we have summarized the existing security problems and solutions in WSN, we find that the insider at...The security problems of wireless sensor networks (WSN) have attracted people’s wide attention. In this paper, after we have summarized the existing security problems and solutions in WSN, we find that the insider attack to WSN is hard to solve. Insider attack is different from outsider attack, because it can’t be solved by the traditional encryption and message authentication. Therefore, a reliable secure routing protocol should be proposed in order to defense the insider attack. In this paper, we focus on insider selective forwarding attack. The existing detection mechanisms, such as watchdog, multipath retreat, neighbor-based monitoring and so on, have both advantages and disadvantages. According to their characteristics, we proposed a secure routing protocol based on monitor node and trust mechanism. The reputation value is made up with packet forwarding rate and node’s residual energy. So this detection and routing mechanism is universal because it can take account of both the safety and lifetime of network. Finally, we use OPNET simulation to verify the performance of our algorithm.展开更多
We propose the threshold updating method for terminating variable selection and two variable selection methods. In the threshold updating method, we update the threshold value when the approximation error smaller than...We propose the threshold updating method for terminating variable selection and two variable selection methods. In the threshold updating method, we update the threshold value when the approximation error smaller than the current threshold value is obtained. The first variable selection method is the combination of forward selection by block addi-tion and backward selection by block deletion. In this method, starting from the empty set of the input variables, we add several input variables at a time until the approximation error is below the threshold value. Then we search deletable variables by block deletion. The second method is the combination of the first method and variable selection by Linear Programming Support Vector Regressors (LPSVRs). By training an LPSVR with linear kernels, we evaluate the weights of the decision function and delete the input variables whose associated absolute weights are zero. Then we carry out block addition and block deletion. By computer experiments using benchmark data sets, we show that the proposed methods can perform faster variable selection than the method only using block deletion, and that by the threshold updating method, the approximation error is lower than that by the fixed threshold method. We also compare our method with an imbedded method, which determines the optimal variables during training, and show that our method gives comparable or better variable selection performance.展开更多
Sensor networks are vulnerable to many attacks because the sensor networks operate in open environments. It is easy to incur one or more attacks such as a selective forwarding attack, a false report injection attack. ...Sensor networks are vulnerable to many attacks because the sensor networks operate in open environments. It is easy to incur one or more attacks such as a selective forwarding attack, a false report injection attack. It is hard to defend the sensor network from the multiple attacks through existing security methods. Thus, we suggest an energy-efficient security method in order to detect the multiple attacks. This paper presents a security method to detect the false report injection attack and the selective forwarding attack in the sensor network using a new message type. The message type is a filtering message. The filtering message prevents from generating and forwarding false alert messages. We evaluated performance of our proposed method through a simulation in comparison with an application of SEF (statistical enroute filtering scheme) and CHEMAS (Check point-based Multi-hop Acknowledgement Scheme). The simulation results represent that the proposed method is 10% more energy-efficient than the application when the number of false reports is great while retaining the detection performance.展开更多
The performances of selection cooperation are investigated over asymmetric fading channels where the source-relay and the relay-destination channels experience Nakagami-m and Rayleigh fading,respectively.Decode-and-fo...The performances of selection cooperation are investigated over asymmetric fading channels where the source-relay and the relay-destination channels experience Nakagami-m and Rayleigh fading,respectively.Decode-and-forward(DF)protocol is adopted and the Nth best relay is selected from M available relays.Probability density function(PDF)for the instantaneous signal-to-noise ratio(SNR)at the destination is derived first.Then,it is used to derive the exact expressions for outage probability and average symbol error rate(SER).The results hold for arbitrary M or N.Finally,simulations are carried out to verify the correctness of our theoretical analysis and results show that M and N almost have the same effect on the performance of outage probability and SER.展开更多
In wireless networks, cooperative relaying could improve throughput by exploiting diversity. In order to reduce the amount of feedback for the channel gain, a semi-distributed scheme based on the relay feasible condit...In wireless networks, cooperative relaying could improve throughput by exploiting diversity. In order to reduce the amount of feedback for the channel gain, a semi-distributed scheme based on the relay feasible condition is proposed. Each relay node can measure its backward and forward channel gains. If both the channel gains are larger than a pre-defined threshold, this relay node is feasible. The final decision on the best relay selection is still given by the base station. Besides, the switch-and-examine relay selection scheme, which selects the first feasible relay node, is also investigated. Simulation results are presented to illustrate the advantage of two proposed schemes.展开更多
With the low cost and low hardware complex considerations,cooperative systems are a tendency in the future communications.This work considers the secure cooperative communications systems.For a practical situation in ...With the low cost and low hardware complex considerations,cooperative systems are a tendency in the future communications.This work considers the secure cooperative communications systems.For a practical situation in the system,the scenario includes multiple source stations,multiple relay stations,multiple destination stations,and eavesdroppers.To analyze the optimal relay selection in the system,we begin with the performance analysis for a single source station and a single destination station.By applying two cooperative models,the amplify-andforward(AF) mode and decode-and-forward(DF)mode,the secrecy capacity is derived.Then,we apply the derived results to the considered environment to find the optimal relay assignment.By the way,the relay selection can be obtained by the exhaustive search algorithm.However,there are a lot of steps needed if the number of source stations is large.Hence,applying the characters of the cooperative modes in the relay selection,the pre-selection step is proposed with a mathematical derivation.It could be used for the practical situation without a long-time calculation.展开更多
Based on the existing incremental selection algorithm for Decode-and-Forward (DF) Multiple Input Multiple Output (MIMO) systems, a faster one which combines the incremental selection with the decremental exclussion is...Based on the existing incremental selection algorithm for Decode-and-Forward (DF) Multiple Input Multiple Output (MIMO) systems, a faster one which combines the incremental selection with the decremental exclussion is proposed. Firstly, the algorithm selects one antenna which makes the increment of the capacity greatest in every step. Then, excludes the antennas whose contribution to the capacity is less than μ% of that of the best antenna. Simulations show that the proposed algorithm achieves comparable performance to the existing one and has obviously decreased complexity under the appropriate threshold μ% .展开更多
The performance analysis of Nth worst relay selection for the full-duplex (FD) mode over Nakagami-m fading channels is studied. We assume the relay employs the amplify-and-forward (AF) protocol. The closed-form expres...The performance analysis of Nth worst relay selection for the full-duplex (FD) mode over Nakagami-m fading channels is studied. We assume the relay employs the amplify-and-forward (AF) protocol. The closed-form expres-sions for the outage performance in terms of the received signal-to-noise ratio cumulative distribution function are derived. In the high signal-to-noise ratio regime, asymptotic outage probability is also investigated. Based on these expressions, the effect of several important network parameters, i.e., the number of relays and the order of selected relay, as well as the quality of the relay links, source-relay links, relay-destination links, are analytically characterized. Finally, numerical results are provided to verify and illustrate our mathematical analysis.展开更多
针对水下传感器网络中节点能耗不均衡和能量有限的问题,提出一种能耗均衡与节能的自适应水下路由协议ECBES(energy consumption balanced and energy saving adaptive underwater routing protocol)。构建双区非均匀分层拓扑。基于能耗...针对水下传感器网络中节点能耗不均衡和能量有限的问题,提出一种能耗均衡与节能的自适应水下路由协议ECBES(energy consumption balanced and energy saving adaptive underwater routing protocol)。构建双区非均匀分层拓扑。基于能耗均衡因子,利用拓扑和节点剩余能量计算节点转发优先级,实现自适应转发节点选择,均衡网络能耗。与此同时,通过候选转发区域各分区域中节点参与转发数据包的比例确定次优候选转发区域,将次优候选转发区域作为初始策略,利用策略迭代思想确定最优候选转发区域,保证投递率的同时减少不同网络规模中重复数据包的转发,降低网络的整体能耗。仿真结果表明,ECBES相比VBF、ES-VBF和ALRP,在不同节点数量下,节点死亡率均最低,在保证数据包投递率的同时,能耗最少。展开更多
为了准确识别颈动脉斑块的重要生物标志物,在改进生物标志物所包含信息量的度量方法的基础上,通过向前逐步回归建立了基于变换AUC(Transformed area under curve)的颈动脉斑块稳定性预测模型。首先,在ROC(Receiver operating characteri...为了准确识别颈动脉斑块的重要生物标志物,在改进生物标志物所包含信息量的度量方法的基础上,通过向前逐步回归建立了基于变换AUC(Transformed area under curve)的颈动脉斑块稳定性预测模型。首先,在ROC(Receiver operating characteristic)空间提出变换AUC,并给出该指标在双正态分布模型和自由分布模型下的估计方法;然后,使用R统计软件,对比分析变换AUC与AUC等常用评估指标对非传统生物标志物的评估性能;最后,基于浙江医院提供的影像数据,利用变换AUC度量生物标志物的信息量,使用向前逐步回归筛选模型的方法建立高精度的颈动脉斑块稳定性预测模型。研究结果表明,该颈动脉斑块稳定性预测模型的AUC值达到0.9以上,能够准确识别斑块的稳定性,为临床医师对患者进行个性化诊疗提供更精准的参考依据。展开更多
文摘Over the last decade,mobile Adhoc networks have expanded dramati-cally in popularity,and their impact on the communication sector on a variety of levels is enormous.Its uses have expanded in lockstep with its growth.Due to its instability in usage and the fact that numerous nodes communicate data concur-rently,adequate channel and forwarder selection is essential.In this proposed design for a Cognitive Radio Cognitive Network(CRCN),we gain the confidence of each forwarding node by contacting one-hop and second level nodes,obtaining reports from them,and selecting the forwarder appropriately with the use of an optimization technique.At that point,we concentrate our efforts on their channel,selection,and lastly,the transmission of data packets via the designated forwarder.The simulation work is validated in this section using the MATLAB program.Additionally,steps show how the node acts as a confident forwarder and shares the channel in a compatible method to communicate,allowing for more packet bits to be transmitted by conveniently picking the channel between them.We cal-culate the confidence of the node at the start of the network by combining the reliability report for thefirst hop and the reliability report for the secondary hop.We then refer to the same node as the confident node in order to operate as a forwarder.As a result,we witness an increase in the leftover energy in the output.The percentage of data packets delivered has also increased.
基金supported by National Science Council under Grant No.101-2221-E-029-020-MY3
文摘Using a relaying system to provide spatial diversity and improve the system performance is a tendency in the wireless cooperative communications. Amplify-and-forward (AF) mode with a low complexity is easy to be implemented. Under the consideration of cooperative communication systems, the scenario includes one information source, M relay stations and N destinations. This work proposes a relay selection algorithm in the Raleigh fading channel. Based on the exhaustive search method, easily to realize, the optimal selection scheme can be found with a highly complicated calculation. In order to reduce the computational complexity, an approximate optimal solution with a greedy algorithm applied for the relay station selection is proposed. With different situations of the communication systems, the performance evaluation obtained by both the proposed algorithm and the exhaustive search algorithm are given for comparison. It shows the proposed algorithm could provide a solution approach to the optimal one.
文摘We introduce a new approach for optimal portfolio choice under model ambiguity by incorporating predictable forward preferences in the framework of Angoshtari et al.[2].The investor reassesses and revises the model ambiguity set incrementally in time while,also,updating his risk preferences forward in time.This dynamic alignment of preferences and ambiguity updating results in time-consistent policies and provides a richer,more accurate learning setting.For each investment period,the investor solves a worst-case portfolio optimization over possible market models,which are represented via a Wasserstein neighborhood centered at a binomial distribution.Duality methods from Gao and Kleywegt[10];Blanchet and Murthy[8]are used to solve the optimization problem over a suitable set of measures,yielding an explicit optimal portfolio in the linear case.We analyze the case of linear and quadratic utilities,and provide numerical results.
文摘The security problems of wireless sensor networks (WSN) have attracted people’s wide attention. In this paper, after we have summarized the existing security problems and solutions in WSN, we find that the insider attack to WSN is hard to solve. Insider attack is different from outsider attack, because it can’t be solved by the traditional encryption and message authentication. Therefore, a reliable secure routing protocol should be proposed in order to defense the insider attack. In this paper, we focus on insider selective forwarding attack. The existing detection mechanisms, such as watchdog, multipath retreat, neighbor-based monitoring and so on, have both advantages and disadvantages. According to their characteristics, we proposed a secure routing protocol based on monitor node and trust mechanism. The reputation value is made up with packet forwarding rate and node’s residual energy. So this detection and routing mechanism is universal because it can take account of both the safety and lifetime of network. Finally, we use OPNET simulation to verify the performance of our algorithm.
文摘We propose the threshold updating method for terminating variable selection and two variable selection methods. In the threshold updating method, we update the threshold value when the approximation error smaller than the current threshold value is obtained. The first variable selection method is the combination of forward selection by block addi-tion and backward selection by block deletion. In this method, starting from the empty set of the input variables, we add several input variables at a time until the approximation error is below the threshold value. Then we search deletable variables by block deletion. The second method is the combination of the first method and variable selection by Linear Programming Support Vector Regressors (LPSVRs). By training an LPSVR with linear kernels, we evaluate the weights of the decision function and delete the input variables whose associated absolute weights are zero. Then we carry out block addition and block deletion. By computer experiments using benchmark data sets, we show that the proposed methods can perform faster variable selection than the method only using block deletion, and that by the threshold updating method, the approximation error is lower than that by the fixed threshold method. We also compare our method with an imbedded method, which determines the optimal variables during training, and show that our method gives comparable or better variable selection performance.
文摘Sensor networks are vulnerable to many attacks because the sensor networks operate in open environments. It is easy to incur one or more attacks such as a selective forwarding attack, a false report injection attack. It is hard to defend the sensor network from the multiple attacks through existing security methods. Thus, we suggest an energy-efficient security method in order to detect the multiple attacks. This paper presents a security method to detect the false report injection attack and the selective forwarding attack in the sensor network using a new message type. The message type is a filtering message. The filtering message prevents from generating and forwarding false alert messages. We evaluated performance of our proposed method through a simulation in comparison with an application of SEF (statistical enroute filtering scheme) and CHEMAS (Check point-based Multi-hop Acknowledgement Scheme). The simulation results represent that the proposed method is 10% more energy-efficient than the application when the number of false reports is great while retaining the detection performance.
基金Supported by the National Natural Science Foundation of China(No.6087024)the Cultivation Fund of the Key Scientific and Technical Innovation Project(No.708059)+2 种基金Open Found of State Key Laboratory of Integrated Services Networks(No.ISN12-10)Open Research Fund of National Mobile Communications Research Laboratory(No.2012D10)the Natural Science Foundation of Shandong Province(No.ZR2011FM027)
文摘The performances of selection cooperation are investigated over asymmetric fading channels where the source-relay and the relay-destination channels experience Nakagami-m and Rayleigh fading,respectively.Decode-and-forward(DF)protocol is adopted and the Nth best relay is selected from M available relays.Probability density function(PDF)for the instantaneous signal-to-noise ratio(SNR)at the destination is derived first.Then,it is used to derive the exact expressions for outage probability and average symbol error rate(SER).The results hold for arbitrary M or N.Finally,simulations are carried out to verify the correctness of our theoretical analysis and results show that M and N almost have the same effect on the performance of outage probability and SER.
文摘In wireless networks, cooperative relaying could improve throughput by exploiting diversity. In order to reduce the amount of feedback for the channel gain, a semi-distributed scheme based on the relay feasible condition is proposed. Each relay node can measure its backward and forward channel gains. If both the channel gains are larger than a pre-defined threshold, this relay node is feasible. The final decision on the best relay selection is still given by the base station. Besides, the switch-and-examine relay selection scheme, which selects the first feasible relay node, is also investigated. Simulation results are presented to illustrate the advantage of two proposed schemes.
文摘With the low cost and low hardware complex considerations,cooperative systems are a tendency in the future communications.This work considers the secure cooperative communications systems.For a practical situation in the system,the scenario includes multiple source stations,multiple relay stations,multiple destination stations,and eavesdroppers.To analyze the optimal relay selection in the system,we begin with the performance analysis for a single source station and a single destination station.By applying two cooperative models,the amplify-andforward(AF) mode and decode-and-forward(DF)mode,the secrecy capacity is derived.Then,we apply the derived results to the considered environment to find the optimal relay assignment.By the way,the relay selection can be obtained by the exhaustive search algorithm.However,there are a lot of steps needed if the number of source stations is large.Hence,applying the characters of the cooperative modes in the relay selection,the pre-selection step is proposed with a mathematical derivation.It could be used for the practical situation without a long-time calculation.
基金Supported by the National Natural Science Foundation of Jiangsu Province(No.08KJB510015)
文摘Based on the existing incremental selection algorithm for Decode-and-Forward (DF) Multiple Input Multiple Output (MIMO) systems, a faster one which combines the incremental selection with the decremental exclussion is proposed. Firstly, the algorithm selects one antenna which makes the increment of the capacity greatest in every step. Then, excludes the antennas whose contribution to the capacity is less than μ% of that of the best antenna. Simulations show that the proposed algorithm achieves comparable performance to the existing one and has obviously decreased complexity under the appropriate threshold μ% .
文摘The performance analysis of Nth worst relay selection for the full-duplex (FD) mode over Nakagami-m fading channels is studied. We assume the relay employs the amplify-and-forward (AF) protocol. The closed-form expres-sions for the outage performance in terms of the received signal-to-noise ratio cumulative distribution function are derived. In the high signal-to-noise ratio regime, asymptotic outage probability is also investigated. Based on these expressions, the effect of several important network parameters, i.e., the number of relays and the order of selected relay, as well as the quality of the relay links, source-relay links, relay-destination links, are analytically characterized. Finally, numerical results are provided to verify and illustrate our mathematical analysis.
文摘针对水下传感器网络中节点能耗不均衡和能量有限的问题,提出一种能耗均衡与节能的自适应水下路由协议ECBES(energy consumption balanced and energy saving adaptive underwater routing protocol)。构建双区非均匀分层拓扑。基于能耗均衡因子,利用拓扑和节点剩余能量计算节点转发优先级,实现自适应转发节点选择,均衡网络能耗。与此同时,通过候选转发区域各分区域中节点参与转发数据包的比例确定次优候选转发区域,将次优候选转发区域作为初始策略,利用策略迭代思想确定最优候选转发区域,保证投递率的同时减少不同网络规模中重复数据包的转发,降低网络的整体能耗。仿真结果表明,ECBES相比VBF、ES-VBF和ALRP,在不同节点数量下,节点死亡率均最低,在保证数据包投递率的同时,能耗最少。
文摘为了准确识别颈动脉斑块的重要生物标志物,在改进生物标志物所包含信息量的度量方法的基础上,通过向前逐步回归建立了基于变换AUC(Transformed area under curve)的颈动脉斑块稳定性预测模型。首先,在ROC(Receiver operating characteristic)空间提出变换AUC,并给出该指标在双正态分布模型和自由分布模型下的估计方法;然后,使用R统计软件,对比分析变换AUC与AUC等常用评估指标对非传统生物标志物的评估性能;最后,基于浙江医院提供的影像数据,利用变换AUC度量生物标志物的信息量,使用向前逐步回归筛选模型的方法建立高精度的颈动脉斑块稳定性预测模型。研究结果表明,该颈动脉斑块稳定性预测模型的AUC值达到0.9以上,能够准确识别斑块的稳定性,为临床医师对患者进行个性化诊疗提供更精准的参考依据。