Deep Reinforcement Learning(DRL)is a class of Machine Learning(ML)that combines Deep Learning with Reinforcement Learning and provides a framework by which a system can learn from its previous actions in an environmen...Deep Reinforcement Learning(DRL)is a class of Machine Learning(ML)that combines Deep Learning with Reinforcement Learning and provides a framework by which a system can learn from its previous actions in an environment to select its efforts in the future efficiently.DRL has been used in many application fields,including games,robots,networks,etc.for creating autonomous systems that improve themselves with experience.It is well acknowledged that DRL is well suited to solve optimization problems in distributed systems in general and network routing especially.Therefore,a novel query routing approach called Deep Reinforcement Learning based Route Selection(DRLRS)is proposed for unstructured P2P networks based on a Deep Q-Learning algorithm.The main objective of this approach is to achieve better retrieval effectiveness with reduced searching cost by less number of connected peers,exchangedmessages,and reduced time.The simulation results shows a significantly improve searching a resource with compression to k-Random Walker and Directed BFS.Here,retrieval effectiveness,search cost in terms of connected peers,and average overhead are 1.28,106,149,respectively.展开更多
This paper describes a routing algorithm for risk scanning agents using ant colony algorithm in P2P(peerto peer) network. Every peer in the P2P network is capable of updating its routing table in a real-time way, wh...This paper describes a routing algorithm for risk scanning agents using ant colony algorithm in P2P(peerto peer) network. Every peer in the P2P network is capable of updating its routing table in a real-time way, which enables agents to dynamically and automatically select, according to current traffic condition of the network, the global optimal traversal path. An adjusting mechanism is given to adjust the routing table when peers join or leave. By means of exchanging pheromone intensity of part of paths, the algorithm provides agents with more choices as to which one to move and avoids prematurely reaching local optimal path. And parameters of the algorithm are determined by lots of simulation testing. And we also compare with other routing algorithms in unstructured P2P network in the end.展开更多
In order to reduce the maintenance cost of structured Peer-to-Peer (P2P),Clone Node Protocol (CNP) based on user behavior is proposed.CNP considers the regularity of user behavior and uses the method of clone node.A B...In order to reduce the maintenance cost of structured Peer-to-Peer (P2P),Clone Node Protocol (CNP) based on user behavior is proposed.CNP considers the regularity of user behavior and uses the method of clone node.A Bidirectional Clone Node Chord model (BCNChord) based on CNP protocol is designed and realized.In BCNChord,Anticlockwise Searching Algorithm,Difference Push Synchronize Algorithm and Optimal Maintenance Algorithm are put forward to increase the performances.In experiments,according to the frequency of nodes,the maintenance cost of BCNChord can be 3.5%~32.5% lower than that of Chord.In the network of 212 nodes,the logic path hop is steady at 6,which is much more prior to 12 of Chord and 10 of CNChord.Theoretical analysis and experimental results show that BCNChord can effectively reduce the maintenance cost of its structure and simultaneously improve the query efficiency up to (1/4)O(logN).BCNChord is more suitable for highly dynamic environment and higher real-time system.展开更多
Decentralized and unstructured peer-to-peer applications such as Gnutella are attractive because they require no centralized directories and no precise control over network topology or data placement. Search algorithm...Decentralized and unstructured peer-to-peer applications such as Gnutella are attractive because they require no centralized directories and no precise control over network topology or data placement. Search algorithm is the major component of the distributed system and its efficiency also does influence the systems performance. However the flooding-based query algorithm used in Gnutella produces huge traffic and does not scale well. Gnutella-like P2P topology has power-law characteristic, so a search algorithm was proposed based on high degree nodes of power-law network, High Degree Nodes-Based Search (HDNBS). Extensive simulation results show that this algorithm performs on power-law networks very well, achieves almost 100% success rates, produces O(logN) messages per query and can locate target file within O(lagN) hops.展开更多
Media streaming delivery in wireless ad hoc networks is challenging due to the stringent resource restrictions,po-tential high loss rate and the decentralized architecture. To support long and high-quality streams,one...Media streaming delivery in wireless ad hoc networks is challenging due to the stringent resource restrictions,po-tential high loss rate and the decentralized architecture. To support long and high-quality streams,one viable approach is that a media stream is partitioned into segments,and then the segments are replicated in a network and served in a peer-to-peer(P2P) fashion. However,the searching strategy for segments is one key problem with the approach. This paper proposes a hybrid ants-like search algorithm(HASA) for P2P media streaming distribution in ad hoc networks. It takes the advantages of random walks and ants-like algorithms for searching in unstructured P2P networks,such as low transmitting latency,less jitter times,and low unnecessary traffic. We quantify the performance of our scheme in terms of response time,jitter times,and network messages for media streaming distribution. Simulation results showed that it can effectively improve the search efficiency for P2P media streaming distribution in ad hoc networks.展开更多
The trustworthiness and security of routing in the existing Peer-to-Peer (P2P) networks can not be ensured because of the diversity of the strategies of P2P nodes. This paper firstly uses game theory to establish game...The trustworthiness and security of routing in the existing Peer-to-Peer (P2P) networks can not be ensured because of the diversity of the strategies of P2P nodes. This paper firstly uses game theory to establish game model of the strategies and profits of various types of routing nodes. Then,two incentive mechanisms for the corresponding stages of P2P trustworthy routing are proposed,namely trust associated mechanism and trust compensated mechanism. Simulation results show that the incentive mechanisms proposed in this paper will encourage cooperation actions of good nodes and restrain malicious actions of bad nodes,which ensure the trustworthiness of routing consequently.展开更多
We present an effective routing solution for the backbone of hierarchical MANETs. </span></span><span><span><span style="font-family:""><span style="font-family:Ver...We present an effective routing solution for the backbone of hierarchical MANETs. </span></span><span><span><span style="font-family:""><span style="font-family:Verdana;">Our solution leverages the storage and retrieval mechanisms of a Distributed Hash Table (DHT) common to many (structured) P2P overlays. Th</span><span style="font-family:Verdana;">e DHT provides routing information in a decentralized fash</span><span style="font-family:Verdana;">ion, while supporting different forms of node and network mobility. We split a flat network into clusters, each having a gateway who participates in a DHT overlay. These g</span><span style="font-family:Verdana;">ateways interconnect the clusters in a backbone network. Two routing </span><span style="font-family:Verdana;">approaches for the backbone are explore</span><span style="font-family:Verdana;">d: floodi</span><span style="font-family:Verdana;">ng and a new solution exploit</span><span style="font-family:Verdana;">ing the storage and retrieval capabilities of a P2P overlay based on a DHT.</span><span style="font-family:Verdana;"> We </span><span style="font-family:Verdana;">implement both approaches in a net</span><span style="font-family:Verdana;">work simulator and thoroughly evaluate th</span><span style="font-family:Verdana;">e performance of the proposed scheme using a range of stati</span><span style="font-family:Verdana;">c and mobile scenarios. We also compare our solution against flooding. The simulation results show that our solution, even in the presence of mobility, achieved well abo</span><span style="font-family:Verdana;">ve 90% success rates and maintained very low and constant round tr</span><span style="font-family:Verdana;">ip times, unlike the flooding approach. In fact, the performance of the proposed </span><span style="font-family:Verdana;">inter-cluster routing solution, in many cases, is comparable to the perfo</span><span style="font-family:Verdana;">rma</span><span style="font-family:Verdana;">nce of the intra-cluster routing case. The advantage of our proposed ap</span><span style="font-family:Verdana;">proach compared to flooding increases as the number of clusters increases, demonstrating the superior scalability of our proposed approach.展开更多
The rise of automation with Machine-Type Communication(MTC)holds great potential in developing Industrial Internet of Things(IIoT)-based applications such as smart cities,Intelligent Transportation Systems(ITS),supply...The rise of automation with Machine-Type Communication(MTC)holds great potential in developing Industrial Internet of Things(IIoT)-based applications such as smart cities,Intelligent Transportation Systems(ITS),supply chains,and smart industries without any human intervention.However,MTC has to cope with significant security challenges due to heterogeneous data,public network connectivity,and inadequate security mechanism.To overcome the aforementioned issues,we have proposed a blockchain and garlic-routing-based secure data exchange framework,i.e.,GRADE,which alleviates the security constraints and maintains the stable connection in MTC.First,the Long-Short-Term Memory(LSTM)-based Nadam optimizer efficiently predicts the class label,i.e.,malicious and non-malicious,and forwards the non-malicious data requests of MTC to the Garlic Routing(GR)network.The GR network assigns a unique ElGamal encrypted session tag to each machine partaking in MTC.Then,an Advanced Encryption Standard(AES)is applied to encrypt the MTC data requests.Further,the InterPlanetary File System(IPFS)-based blockchain is employed to store the machine's session tags,which increases the scalability of the proposed GRADE framework.Additionally,the proposed framework has utilized the indispensable benefits of the 6G network to enhance the network performance of MTC.Lastly,the proposed GRADE framework is evaluated against different performance metrics such as scalability,packet loss,accuracy,and compromised rate of the MTC data request.The results show that the GRADE framework outperforms the baseline methods in terms of accuracy,i.e.,98.9%,compromised rate,i.e.,18.5%,scalability,i.e.,47.2%,and packet loss ratio,i.e.,24.3%.展开更多
Energy-storage systems and their production have attracted significant interest for practical applications.Batteries are the foundation of sustainable energy sources for electric vehicles(EVs),portable electronic devi...Energy-storage systems and their production have attracted significant interest for practical applications.Batteries are the foundation of sustainable energy sources for electric vehicles(EVs),portable electronic devices(PEDs),etc.In recent decades,Lithium-ion batteries(LIBs) have been extensively utilized in largescale energy storage devices owing to their long cycle life and high energy density.However,the high cost and limited availability of Li are the two main obstacles for LIBs.In this regard,sodium-ion batteries(SIBs) are attractive alternatives to LIBs for large-scale energy storage systems because of the abundance and low cost of sodium materials.Cathode is one of the most important components in the battery,which limits cost and performance of a battery.Among the classified cathode structures,layered structure materials have attracted attention because of their high ionic conductivity,fast diffusion rate,and high specific capacity.Here,we present a comprehensive review of the classification of layered structures and the preparation of layered materials.Furthermore,the review article discusses extensively about the issues of the layered materials,namely(1) electrochemical degradation,(2) irreversible structural changes,and(3) structural instability,and also it provides strategies to overcome the issues such as elemental phase composition,a small amount of elemental doping,structural design,and surface alteration for emerging SIBs.In addition,the article discusses about the recent research development on layered unary,binary,ternary,quaternary,quinary,and senary-based O3-and P2-type cathode materials for high-energy SIBs.This review article provides useful information for the development of high-energy layered sodium transition metal oxide P2 and O3-cathode materials for practical SIBs.展开更多
The widespread interest in layered P2-type Mn-based cathode materials for sodium-ion batteries(SIBs)stems from their cost-effectiveness and abundant resources.However,the inferior cycle stability and mediocre rate per...The widespread interest in layered P2-type Mn-based cathode materials for sodium-ion batteries(SIBs)stems from their cost-effectiveness and abundant resources.However,the inferior cycle stability and mediocre rate performance impede their further development in practical applications.Herein,we devised a wet chemical precipitation method to deposit an amorphous aluminum phosphate(AlPO_(4),denoted as AP)protective layer onto the surface of P2-type Na_(0.55)Ni_(0.1)Co_(0.7)Mn_(0.8)O_(2)(NCM@AP).The resulting NCM@5AP electrode,with a 5 wt%coating,exhibits extended cycle life(capacity retention of78.4%after 200 cycles at 100 mA g^(-1))and superior rate performance(98 mA h g^(-1)at 500 mA g^(-1))compared to pristine NCM.Moreover,our investigation provides comprehensive insights into the phase stability and active Na^(+)ion kinetics in the NCM@5AP composite electrode,shedding light on the underlying mechanisms responsible for the enhanced performance observed in the coated electrode.展开更多
One of the key challenges in ad-hoc networks is the resource discovery problem.How efciently&quickly the queried resource/object can be resolved in such a highly dynamic self-evolving network is the underlying que...One of the key challenges in ad-hoc networks is the resource discovery problem.How efciently&quickly the queried resource/object can be resolved in such a highly dynamic self-evolving network is the underlying question?Broadcasting is a basic technique in the Mobile Ad-hoc Networks(MANETs),and it refers to sending a packet from one node to every other node within the transmission range.Flooding is a type of broadcast where the received packet is retransmitted once by every node.The naive ooding technique oods the network with query messages,while the random walk scheme operates by contacting subsets of each node’s neighbors at every step,thereby restricting the search space.Many earlier works have mainly focused on the simulation-based analysis of ooding technique,and its variants,in a wired network scenario.Although,there have been some empirical studies in peer-to-peer(P2P)networks,the analytical results are still lacking,especially in the context of mobile P2P networks.In this article,we mathematically model different widely used existing search techniques,and compare with the proposed improved random walk method,a simple lightweight approach suitable for the non-DHT architecture.We provide analytical expressions to measure the performance of the different ooding-based search techniques,and our proposed technique.We analytically derive 3 relevant key performance measures,i.e.,the avg.number of steps needed to nd a resource,the probability of locating a resource,and the avg.number of messages generated during the entire search process.展开更多
A P2P approaches to extend the ability of Video on Demand systems to serve more users. In the proposed system users share with each other the media data obtained and the media server is no longer the only source to ge...A P2P approaches to extend the ability of Video on Demand systems to serve more users. In the proposed system users share with each other the media data obtained and the media server is no longer the only source to get data from, thereby, the load on the media server could be greatly alleviated and the overall system capacity increases and more users could be served. The P2P streaming system introduces efficient searching;data transfer dynamically monitoring and initial buffering to maintain a high quality of playback. Its provider selection policy helps to reduce the load of the underlying network by avoiding remote data transfer.展开更多
Towards the problems of existing detection methods,a novel real-time detection method(DMFIF) based on fractal and information fusion is proposed.It focuses on the intrinsic macroscopic characteristics of network,which...Towards the problems of existing detection methods,a novel real-time detection method(DMFIF) based on fractal and information fusion is proposed.It focuses on the intrinsic macroscopic characteristics of network,which reflect not the "unique" abnormalities of P2P botnets but the "common" abnormalities of them.It regards network traffic as the signal,and synthetically considers the macroscopic characteristics of network under different time scales with the fractal theory,including the self-similarity and the local singularity,which don't vary with the topology structures,the protocols and the attack types of P2P botnet.At first detect traffic abnormalities of the above characteristics with the nonparametric CUSUM algorithm,and achieve the final result by fusing the above detection results with the Dempster-Shafer evidence theory.Moreover,the side effect on detecting P2P botnet which web applications generated is considered.The experiments show that DMFIF can detect P2P botnet with a higher degree of precision.展开更多
Air-stable layered structured cathodes with high voltage and good cycling stability are highly desired for the practical application of Na-ion batteries.Herein,we report a P2-Na_(2/3)Ni_(2/3)Te_(1/3)O_(2) cathode that...Air-stable layered structured cathodes with high voltage and good cycling stability are highly desired for the practical application of Na-ion batteries.Herein,we report a P2-Na_(2/3)Ni_(2/3)Te_(1/3)O_(2) cathode that is stable in ambient air with an average operating voltage of~3.8 V,demonstrating excellent cycling stability with a capacity retention of more than 92.7%after 500 cycles at 20 mA g^(-1) and good rate capability with 91.9%capacity utilization at 500 mA g^(-1) with respect to capacity at 5 mA g^(-1) between 2.0 and 4.0 V.When the upper cutoff voltage is increased to 4.4 V,P2-Na_(2/3)Ni_(2/3)Te_(1/3)O_(2) delivers a reversible capacity of 71.9 mAh g^(-1) and retains 91.8%of the capacity after 100 cycles at 20 mA g^(-1).The charge compensation during charge/discharge is mainly due to the redox couple of Ni^(2+)/Ni^(3+)in the host with a small amount of contribution from oxygen.The stable structure of the material without phase transformation and with small volume change during charge-discharge allows it to give excellent cycle performance especially when the upper cutoff voltage is not higher than 4.2 V.展开更多
通过在U-tree中添加时间戳和速度矢量等时空因素,提出一种基于U-tree的高效率当前及未来不确定位置信息检索的索引结构TPU-tree,可以支持多维空间中不确定移动对象的索引,并提出了一种改进的基于p-bound的MP_BBRQ(modifiedp-bound based...通过在U-tree中添加时间戳和速度矢量等时空因素,提出一种基于U-tree的高效率当前及未来不确定位置信息检索的索引结构TPU-tree,可以支持多维空间中不确定移动对象的索引,并提出了一种改进的基于p-bound的MP_BBRQ(modifiedp-bound based range query)域查询处理算法,能够引入搜索区域进行预裁剪以减少查询精炼阶段所需代价偏高的积分计算.实验仿真表明,采用MP_BBRQ算法的TPU-tree概率查询性能极大地优于传统的TPR-tree索引,且更新性能与传统索引大致相当,具有良好的实用价值.展开更多
基金Authors would like to thank the Deanship of Scientific Research at Shaqra University for supporting this work under Project No.g01/n04.
文摘Deep Reinforcement Learning(DRL)is a class of Machine Learning(ML)that combines Deep Learning with Reinforcement Learning and provides a framework by which a system can learn from its previous actions in an environment to select its efforts in the future efficiently.DRL has been used in many application fields,including games,robots,networks,etc.for creating autonomous systems that improve themselves with experience.It is well acknowledged that DRL is well suited to solve optimization problems in distributed systems in general and network routing especially.Therefore,a novel query routing approach called Deep Reinforcement Learning based Route Selection(DRLRS)is proposed for unstructured P2P networks based on a Deep Q-Learning algorithm.The main objective of this approach is to achieve better retrieval effectiveness with reduced searching cost by less number of connected peers,exchangedmessages,and reduced time.The simulation results shows a significantly improve searching a resource with compression to k-Random Walker and Directed BFS.Here,retrieval effectiveness,search cost in terms of connected peers,and average overhead are 1.28,106,149,respectively.
基金Supported by the National Natural Science Foun-dation of China (60403027) Natural Science Foundation of HubeiProvince (2005ABA258) the Opening Foundation of State KeyLaboratory of Software Engineering (SKLSE05-07)
文摘This paper describes a routing algorithm for risk scanning agents using ant colony algorithm in P2P(peerto peer) network. Every peer in the P2P network is capable of updating its routing table in a real-time way, which enables agents to dynamically and automatically select, according to current traffic condition of the network, the global optimal traversal path. An adjusting mechanism is given to adjust the routing table when peers join or leave. By means of exchanging pheromone intensity of part of paths, the algorithm provides agents with more choices as to which one to move and avoids prematurely reaching local optimal path. And parameters of the algorithm are determined by lots of simulation testing. And we also compare with other routing algorithms in unstructured P2P network in the end.
基金supported by the National Natural Science Foundation of China under Grant No.61100205Science and Technology Project of Beijing Municipal Education Commission under Grant No.KM201110016006Doctor Start-up Foundation of BUCEA under Grant No.101002508
文摘In order to reduce the maintenance cost of structured Peer-to-Peer (P2P),Clone Node Protocol (CNP) based on user behavior is proposed.CNP considers the regularity of user behavior and uses the method of clone node.A Bidirectional Clone Node Chord model (BCNChord) based on CNP protocol is designed and realized.In BCNChord,Anticlockwise Searching Algorithm,Difference Push Synchronize Algorithm and Optimal Maintenance Algorithm are put forward to increase the performances.In experiments,according to the frequency of nodes,the maintenance cost of BCNChord can be 3.5%~32.5% lower than that of Chord.In the network of 212 nodes,the logic path hop is steady at 6,which is much more prior to 12 of Chord and 10 of CNChord.Theoretical analysis and experimental results show that BCNChord can effectively reduce the maintenance cost of its structure and simultaneously improve the query efficiency up to (1/4)O(logN).BCNChord is more suitable for highly dynamic environment and higher real-time system.
文摘Decentralized and unstructured peer-to-peer applications such as Gnutella are attractive because they require no centralized directories and no precise control over network topology or data placement. Search algorithm is the major component of the distributed system and its efficiency also does influence the systems performance. However the flooding-based query algorithm used in Gnutella produces huge traffic and does not scale well. Gnutella-like P2P topology has power-law characteristic, so a search algorithm was proposed based on high degree nodes of power-law network, High Degree Nodes-Based Search (HDNBS). Extensive simulation results show that this algorithm performs on power-law networks very well, achieves almost 100% success rates, produces O(logN) messages per query and can locate target file within O(lagN) hops.
基金Project supported by the National Natural Science Foundation of China (No. 60302004)the Natural Science Foundation of HubeiProvince, China (No. 2005ABA264)
文摘Media streaming delivery in wireless ad hoc networks is challenging due to the stringent resource restrictions,po-tential high loss rate and the decentralized architecture. To support long and high-quality streams,one viable approach is that a media stream is partitioned into segments,and then the segments are replicated in a network and served in a peer-to-peer(P2P) fashion. However,the searching strategy for segments is one key problem with the approach. This paper proposes a hybrid ants-like search algorithm(HASA) for P2P media streaming distribution in ad hoc networks. It takes the advantages of random walks and ants-like algorithms for searching in unstructured P2P networks,such as low transmitting latency,less jitter times,and low unnecessary traffic. We quantify the performance of our scheme in terms of response time,jitter times,and network messages for media streaming distribution. Simulation results showed that it can effectively improve the search efficiency for P2P media streaming distribution in ad hoc networks.
基金Supported by the Hi-Tech R&D Program (863) of China (2006AA01Z232)the Research Innovation Program for Graduate Student in Jiangsu Province (CX07B-11OZ)
文摘The trustworthiness and security of routing in the existing Peer-to-Peer (P2P) networks can not be ensured because of the diversity of the strategies of P2P nodes. This paper firstly uses game theory to establish game model of the strategies and profits of various types of routing nodes. Then,two incentive mechanisms for the corresponding stages of P2P trustworthy routing are proposed,namely trust associated mechanism and trust compensated mechanism. Simulation results show that the incentive mechanisms proposed in this paper will encourage cooperation actions of good nodes and restrain malicious actions of bad nodes,which ensure the trustworthiness of routing consequently.
文摘We present an effective routing solution for the backbone of hierarchical MANETs. </span></span><span><span><span style="font-family:""><span style="font-family:Verdana;">Our solution leverages the storage and retrieval mechanisms of a Distributed Hash Table (DHT) common to many (structured) P2P overlays. Th</span><span style="font-family:Verdana;">e DHT provides routing information in a decentralized fash</span><span style="font-family:Verdana;">ion, while supporting different forms of node and network mobility. We split a flat network into clusters, each having a gateway who participates in a DHT overlay. These g</span><span style="font-family:Verdana;">ateways interconnect the clusters in a backbone network. Two routing </span><span style="font-family:Verdana;">approaches for the backbone are explore</span><span style="font-family:Verdana;">d: floodi</span><span style="font-family:Verdana;">ng and a new solution exploit</span><span style="font-family:Verdana;">ing the storage and retrieval capabilities of a P2P overlay based on a DHT.</span><span style="font-family:Verdana;"> We </span><span style="font-family:Verdana;">implement both approaches in a net</span><span style="font-family:Verdana;">work simulator and thoroughly evaluate th</span><span style="font-family:Verdana;">e performance of the proposed scheme using a range of stati</span><span style="font-family:Verdana;">c and mobile scenarios. We also compare our solution against flooding. The simulation results show that our solution, even in the presence of mobility, achieved well abo</span><span style="font-family:Verdana;">ve 90% success rates and maintained very low and constant round tr</span><span style="font-family:Verdana;">ip times, unlike the flooding approach. In fact, the performance of the proposed </span><span style="font-family:Verdana;">inter-cluster routing solution, in many cases, is comparable to the perfo</span><span style="font-family:Verdana;">rma</span><span style="font-family:Verdana;">nce of the intra-cluster routing case. The advantage of our proposed ap</span><span style="font-family:Verdana;">proach compared to flooding increases as the number of clusters increases, demonstrating the superior scalability of our proposed approach.
文摘The rise of automation with Machine-Type Communication(MTC)holds great potential in developing Industrial Internet of Things(IIoT)-based applications such as smart cities,Intelligent Transportation Systems(ITS),supply chains,and smart industries without any human intervention.However,MTC has to cope with significant security challenges due to heterogeneous data,public network connectivity,and inadequate security mechanism.To overcome the aforementioned issues,we have proposed a blockchain and garlic-routing-based secure data exchange framework,i.e.,GRADE,which alleviates the security constraints and maintains the stable connection in MTC.First,the Long-Short-Term Memory(LSTM)-based Nadam optimizer efficiently predicts the class label,i.e.,malicious and non-malicious,and forwards the non-malicious data requests of MTC to the Garlic Routing(GR)network.The GR network assigns a unique ElGamal encrypted session tag to each machine partaking in MTC.Then,an Advanced Encryption Standard(AES)is applied to encrypt the MTC data requests.Further,the InterPlanetary File System(IPFS)-based blockchain is employed to store the machine's session tags,which increases the scalability of the proposed GRADE framework.Additionally,the proposed framework has utilized the indispensable benefits of the 6G network to enhance the network performance of MTC.Lastly,the proposed GRADE framework is evaluated against different performance metrics such as scalability,packet loss,accuracy,and compromised rate of the MTC data request.The results show that the GRADE framework outperforms the baseline methods in terms of accuracy,i.e.,98.9%,compromised rate,i.e.,18.5%,scalability,i.e.,47.2%,and packet loss ratio,i.e.,24.3%.
基金supported by a grant from the Subway Fine Dust Reduction Technology Development Project of the Ministry of Land Infrastructure and Transport,Republic of Korea(21QPPWB152306-03)the Basic Science Research Capacity Enhancement Project through a Korea Basic Science Institute(National Research Facilities and Equipment Center)grant funded by the Ministry of Education of the Republic of Korea(2019R1A6C1010016)。
文摘Energy-storage systems and their production have attracted significant interest for practical applications.Batteries are the foundation of sustainable energy sources for electric vehicles(EVs),portable electronic devices(PEDs),etc.In recent decades,Lithium-ion batteries(LIBs) have been extensively utilized in largescale energy storage devices owing to their long cycle life and high energy density.However,the high cost and limited availability of Li are the two main obstacles for LIBs.In this regard,sodium-ion batteries(SIBs) are attractive alternatives to LIBs for large-scale energy storage systems because of the abundance and low cost of sodium materials.Cathode is one of the most important components in the battery,which limits cost and performance of a battery.Among the classified cathode structures,layered structure materials have attracted attention because of their high ionic conductivity,fast diffusion rate,and high specific capacity.Here,we present a comprehensive review of the classification of layered structures and the preparation of layered materials.Furthermore,the review article discusses extensively about the issues of the layered materials,namely(1) electrochemical degradation,(2) irreversible structural changes,and(3) structural instability,and also it provides strategies to overcome the issues such as elemental phase composition,a small amount of elemental doping,structural design,and surface alteration for emerging SIBs.In addition,the article discusses about the recent research development on layered unary,binary,ternary,quaternary,quinary,and senary-based O3-and P2-type cathode materials for high-energy SIBs.This review article provides useful information for the development of high-energy layered sodium transition metal oxide P2 and O3-cathode materials for practical SIBs.
基金financially supported by the Australian Research Council(ARC) through the Future Fellowship(FT180100705)the financial support from China Scholarship Council+3 种基金the support from UTS-HUST Key Technology Partner Seed Fundthe support from Open Project of State Key Laboratory of Advanced Special Steel,the Shanghai Key Laboratory of Advanced Ferrometallurgy,Shanghai University(SKLASS 2021-04)the Science and Technology Commission of Shanghai Municipality(22010500400)“Joint International Laboratory on Environmental and Energy Frontier Materials”and“Innovation Research Team of High–Level Local Universities in Shanghai”in Shanghai University。
文摘The widespread interest in layered P2-type Mn-based cathode materials for sodium-ion batteries(SIBs)stems from their cost-effectiveness and abundant resources.However,the inferior cycle stability and mediocre rate performance impede their further development in practical applications.Herein,we devised a wet chemical precipitation method to deposit an amorphous aluminum phosphate(AlPO_(4),denoted as AP)protective layer onto the surface of P2-type Na_(0.55)Ni_(0.1)Co_(0.7)Mn_(0.8)O_(2)(NCM@AP).The resulting NCM@5AP electrode,with a 5 wt%coating,exhibits extended cycle life(capacity retention of78.4%after 200 cycles at 100 mA g^(-1))and superior rate performance(98 mA h g^(-1)at 500 mA g^(-1))compared to pristine NCM.Moreover,our investigation provides comprehensive insights into the phase stability and active Na^(+)ion kinetics in the NCM@5AP composite electrode,shedding light on the underlying mechanisms responsible for the enhanced performance observed in the coated electrode.
文摘One of the key challenges in ad-hoc networks is the resource discovery problem.How efciently&quickly the queried resource/object can be resolved in such a highly dynamic self-evolving network is the underlying question?Broadcasting is a basic technique in the Mobile Ad-hoc Networks(MANETs),and it refers to sending a packet from one node to every other node within the transmission range.Flooding is a type of broadcast where the received packet is retransmitted once by every node.The naive ooding technique oods the network with query messages,while the random walk scheme operates by contacting subsets of each node’s neighbors at every step,thereby restricting the search space.Many earlier works have mainly focused on the simulation-based analysis of ooding technique,and its variants,in a wired network scenario.Although,there have been some empirical studies in peer-to-peer(P2P)networks,the analytical results are still lacking,especially in the context of mobile P2P networks.In this article,we mathematically model different widely used existing search techniques,and compare with the proposed improved random walk method,a simple lightweight approach suitable for the non-DHT architecture.We provide analytical expressions to measure the performance of the different ooding-based search techniques,and our proposed technique.We analytically derive 3 relevant key performance measures,i.e.,the avg.number of steps needed to nd a resource,the probability of locating a resource,and the avg.number of messages generated during the entire search process.
文摘A P2P approaches to extend the ability of Video on Demand systems to serve more users. In the proposed system users share with each other the media data obtained and the media server is no longer the only source to get data from, thereby, the load on the media server could be greatly alleviated and the overall system capacity increases and more users could be served. The P2P streaming system introduces efficient searching;data transfer dynamically monitoring and initial buffering to maintain a high quality of playback. Its provider selection policy helps to reduce the load of the underlying network by avoiding remote data transfer.
基金supported by National High Technical Research and Development Program of China(863 Program)under Grant No.2011AA7031024GNational Natural Science Foundation of China under Grant No.90204014
文摘Towards the problems of existing detection methods,a novel real-time detection method(DMFIF) based on fractal and information fusion is proposed.It focuses on the intrinsic macroscopic characteristics of network,which reflect not the "unique" abnormalities of P2P botnets but the "common" abnormalities of them.It regards network traffic as the signal,and synthetically considers the macroscopic characteristics of network under different time scales with the fractal theory,including the self-similarity and the local singularity,which don't vary with the topology structures,the protocols and the attack types of P2P botnet.At first detect traffic abnormalities of the above characteristics with the nonparametric CUSUM algorithm,and achieve the final result by fusing the above detection results with the Dempster-Shafer evidence theory.Moreover,the side effect on detecting P2P botnet which web applications generated is considered.The experiments show that DMFIF can detect P2P botnet with a higher degree of precision.
基金supported by National Natural Science Foundation of China(Grant No.52100084)Shenzhen Natural Science Fund(the Stable Support Plan Program GXWD20201230155427003-20200824094017001).
文摘Air-stable layered structured cathodes with high voltage and good cycling stability are highly desired for the practical application of Na-ion batteries.Herein,we report a P2-Na_(2/3)Ni_(2/3)Te_(1/3)O_(2) cathode that is stable in ambient air with an average operating voltage of~3.8 V,demonstrating excellent cycling stability with a capacity retention of more than 92.7%after 500 cycles at 20 mA g^(-1) and good rate capability with 91.9%capacity utilization at 500 mA g^(-1) with respect to capacity at 5 mA g^(-1) between 2.0 and 4.0 V.When the upper cutoff voltage is increased to 4.4 V,P2-Na_(2/3)Ni_(2/3)Te_(1/3)O_(2) delivers a reversible capacity of 71.9 mAh g^(-1) and retains 91.8%of the capacity after 100 cycles at 20 mA g^(-1).The charge compensation during charge/discharge is mainly due to the redox couple of Ni^(2+)/Ni^(3+)in the host with a small amount of contribution from oxygen.The stable structure of the material without phase transformation and with small volume change during charge-discharge allows it to give excellent cycle performance especially when the upper cutoff voltage is not higher than 4.2 V.
文摘通过在U-tree中添加时间戳和速度矢量等时空因素,提出一种基于U-tree的高效率当前及未来不确定位置信息检索的索引结构TPU-tree,可以支持多维空间中不确定移动对象的索引,并提出了一种改进的基于p-bound的MP_BBRQ(modifiedp-bound based range query)域查询处理算法,能够引入搜索区域进行预裁剪以减少查询精炼阶段所需代价偏高的积分计算.实验仿真表明,采用MP_BBRQ算法的TPU-tree概率查询性能极大地优于传统的TPR-tree索引,且更新性能与传统索引大致相当,具有良好的实用价值.