With rapid development of hardware, wirelesssensornetworks (WSN) have been applied in a wide range of fields. However, energy cost constrains putting WSN into use. To reduce energy cost, extending life time, WSN in ...
详细信息
With rapid development of hardware, wirelesssensornetworks (WSN) have been applied in a wide range of fields. However, energy cost constrains putting WSN into use. To reduce energy cost, extending life time, WSN in low-duty-cycle (LDC) draws researchers' attention. In general, work time of a node only occupies 0.1%-10% in a cycle. This model certainly reduces the energy for idle listening. On the other hand, it makes the probability of congestion very high due to a node that can only receive packets when waking up. This paper proposes a new LDCWSN model to solve the congestion from duty schedule. With the model, we show a strategy for WSN fault averting, diagnosing and recovery based on congestion in nodes. We include some attributes of LDC WSN in our strategy, i.e. probability of congestion, scheduler, and link quality. By improving the selection of nodes on every level, we get a low rate for network's fault appearance, low E2E delay and long lifetime. The simulation's result shows that our strategy has a better performance in packet loss, energy cost and time delay than proposed WSN fault management.
This paper considers the problem of transmitting correlated information from multiple sources to multiple receivers, where every receiver seeks to recover all of the original sources. In order to improve the efficienc...
详细信息
This paper presents a new method of gaze tracking based on iris detection for images of human eyes captured by ordinary PC camera. In the basis of traditional iris detection, this paper improves the circle detection b...
详细信息
For the current opportunistic networks routing algorithms, their message arrival rate is not high and the delivery delay is large. This paper proposes a domain-epidemic spray and forward routing algorithm. The algorit...
详细信息
Visualization is critical in power systems engineering since the gigantic amount of data generated by power systems is difficult,and at times impossible,to be analyzed numerically. Therefore,the need for powerful visu...
详细信息
Visualization is critical in power systems engineering since the gigantic amount of data generated by power systems is difficult,and at times impossible,to be analyzed numerically. Therefore,the need for powerful visualization software has been increasingly acute due to the growth in size of power system models. To improve PPV’s performance in order to accompany larger systems,this paper focuses on the development of PPV (Perfect Power Visualization),a 2-D power system visualization software program that processes and conver ts numerical data to graphic symbols based on their types,positions and states. The goal of PPV is to let operators visualize and interact with large-scale power systems in a consumer lever personal computer in real time. Also,it was optimized again with smarter data management systems,refinement of overall structure,and a newer platform that enables GPU acceleration,all of which further increased the performance of PPV by a factor of ten times that of its initial capabilities.
How to effectively reduce the energy consumption of large-scale data centers is a key issue in cloud computing. This paper presents a novel low-power task scheduling algorithm (L3SA) for large-scale cloud data cente...
详细信息
How to effectively reduce the energy consumption of large-scale data centers is a key issue in cloud computing. This paper presents a novel low-power task scheduling algorithm (L3SA) for large-scale cloud data centers. The winner tree is introduced to make the data nodes as the leaf nodes of the tree and the final winner on the purpose of reducing energy consumption is selected. The complexity of large-scale cloud data centers is fully consider, and the task comparson coefficient is defined to make task scheduling strategy more reasonable. Experiments and performance analysis show that the proposed algorithm can effectively improve the node utilization, and reduce the overall power consumption of the cloud data center.
To reach necessary end-to-end connectivity between the Internet and wirelesssensornetworks (WSNs), the Internet Engineering Task Force (IETF) IPv6 over low power wireless personal area network (6LowPAN) workin...
详细信息
To reach necessary end-to-end connectivity between the Internet and wirelesssensornetworks (WSNs), the Internet Engineering Task Force (IETF) IPv6 over low power wireless personal area network (6LowPAN) working group has been established and introduced an adaptation layer for integration of IEEE 802.15.4 physical layer/media access control (PHY/MAC) layers and the upper layers of any Intemet protocol (IP)-based networks, such as the Internet. The energy efficiency is one of the most important performance measures in WSNs because most sensor nodes are only battery powered so we should reduce the energy consumption to the lowest to extend the life of nodes. Therefore the determination of MAC frame length should be carefully considered since that the radio frequency (RF) module consumes most the energy of a sensor node meanwhile the MAC protocol is the direct controller of RF module. In this paper, we provide a star-shaped 6LowPAN non-beacon mode with unslotted carrier sense multiple access with collision avoidance (CSMA/CA) mechanism to access to the channel and model the stochastic behavior of a target end node as the M/G/1 queuing system. Analytical expressions for some parameters such as channel busy probability, packet loss probability and energy efficiency are obtained in this paper and our analytical results can clearly show the impact of MAC frame length on the energy efficiency of a target node in both ideal and lossy channel.
Distributed search and routing algorithms based on the DHT(distributed hash table) protocol have attracted considerable attention in structured P2P(peer-to-peer) research as a result of favorable properties such as di...
详细信息
Distributed search and routing algorithms based on the DHT(distributed hash table) protocol have attracted considerable attention in structured P2P(peer-to-peer) research as a result of favorable properties such as distribution,self-organization,and high *** with a traditional C/S(client/server) network,the probability of peers initiating malicious behavior increases dramatically because of their self-governing and dynamic characteristics,which also make it harder to satisfy the peers’ security required by *** this paper,we propose a new secure DHT protocol based on a multidimensional mapping *** mechanism maps peers to a multidimensional space by dividing the identifiers into ***,a series of secure methods and routing algorithms are provided to achieve secure DHT in smaller *** with state-ofthe-art approaches,the theoretical analysis and experimental results show that the multidimensional mapping mechanism can effectively improve the average success rate of a resource search by inhibiting malicious behavior.
Radio Frequency IDentification(RFID) is a novel technology of automated *** use of RFID,however,raises great concerns due to the serious security *** this paper,we at first propose a Secure Transaction Frame(STF) and ...
详细信息
ISBN:
(纸本)9781479932801
Radio Frequency IDentification(RFID) is a novel technology of automated *** use of RFID,however,raises great concerns due to the serious security *** this paper,we at first propose a Secure Transaction Frame(STF) and a flow of object transaction based on networked RFID ***,it is worth mentioning that the authentication technology in Secure Transaction Frame(STF) is able to verify the ownership of electric tags in order to deal with common attacks in the networked RFID ***,this paper presents an encryption scheme to protect the information stored in electric tags from being illegally *** collecting relevant statistics and analyzing cases based on networked RFID systems,this paper also researches the mass requests for the information stored in the electric tags by the reader and eventually,gives a cache mechanism to solve that problem.
The routing efficiency in Delay Tolerant networks (DTN) with social characteristics degrades owing to intermittent connection and high latency. Additionally, congestion is another issue because of the limited resource...
详细信息
The routing efficiency in Delay Tolerant networks (DTN) with social characteristics degrades owing to intermittent connection and high latency. Additionally, congestion is another issue because of the limited resources of nodes. To solve these problems, an improved Socially Aware Congestion Control algorithm (SACC) is proposed. In this algorithm, the social features and the congestion level of the node are utilized to construct a Social Congestion Metric (SCM). In the forwarding process, messages are forwarded to the nodes with higher SCM. When the congestion occurs, the node calculates the social links of itself with every message's destination node, and then drops the message with minimum social link rather than random dropping. Simulation results show that in the acceptable range of delay tolerance, the proposed algorithm improves the delivery probability, decreases the dropping probability and reduces the overhead.
暂无评论