Performance predictions from wireless networking laboratory experiments seem to dismatch what is really deployed. To generate realistic traffic is one of the major factors hampering researcherspsila ability to make re...
详细信息
Performance predictions from wireless networking laboratory experiments seem to dismatch what is really deployed. To generate realistic traffic is one of the major factors hampering researcherspsila ability to make reliable forecasts. This paper reports on the results of a multiscale analysis of traffic traces captured at an infrastructure 802.11g wireless network. The analyzed traffic is characterized by a non self-similar process for small time scales and strong self-similarity for larger time scales. For smaller time scales, the packet arrival times are independent explaining the weak correlation of the data. For larger timescales the arrival of TCP connections can be considered independent. Additionally, we propose a model which allows generating traffic similar to the measured traffic. The model contains only multiscale index allowing influencing all observed changes in LD and variance-time plots. Comparing the output of the model with the real traffic traces we find that the model matches reality accurately.
With mining traffic patterns, we evaluate the performance impact on wireless mesh networks. Genuine traffic traces are collected from the wireless mesh networks testbed, which tends to exhibit long-range dependent beh...
详细信息
With mining traffic patterns, we evaluate the performance impact on wireless mesh networks. Genuine traffic traces are collected from the wireless mesh networks testbed, which tends to exhibit long-range dependent behavior under several Hurst index estimators. We analyze traffic traces and use clustering techniques to characterize patterns of individual users' behavior. After extracting traffic data from the raw data logs, we identify session clusters by employing the AutoClass tool and the K-means algorithm. Modeling and simulation were performed using the NS-2 tool. Based on the identified session clusters, we introduce source model based on wavelet. Simulation results indicate that traffic traces, compared to traditional traffic models, predict longer queues and, thus, require larger buffers in the network dimensioning.
Based on the hybrid control theory of aseismatic structure and the neural-fuzzy control theory, fuzzy motion differential equations are established for hybrid control system of the passive tuned mass damper (PTMD) in ...
详细信息
Based on the hybrid control theory of aseismatic structure and the neural-fuzzy control theory, fuzzy motion differential equations are established for hybrid control system of the passive tuned mass damper (PTMD) in combination with viscoelastic damper based on model of recurrent neural network with bias (RNNWBU), and their solutions are acquired. Two phase design method and its designing step and flow chart of design are put forward for the hybrid control system. A MATLAB program is developed to conduct elastoplastic time history analysis of the hybrid control system. It is indicated that the analysis result fits very well with the test result. Therefore the two-phases design method has come true of the hybrid control system of the passive tuned mass damper in combination with viscoelastic damper based on model of recurrent neural network with bias. This paper has made further development on the aseismatic design method of hybrid control of seismic reduction structure and played an important role in promoting the development of the theory of structural control, and therefore has a widely developing prospect.
The intelligent optimization algorithm PBIL is applied to *** to the concrete problem that the objective function is to minimize the cost and meet the time *** the probability statistics for the road traffic status di...
详细信息
The intelligent optimization algorithm PBIL is applied to *** to the concrete problem that the objective function is to minimize the cost and meet the time *** the probability statistics for the road traffic status distributed in working hours is considered to decide the *** probability matrix of PBIL algorithm is modified with the quick velocity update strategy of particle swarm optimization *** modified PBIL algorithm is tested in a beijing Stone Logistics *** good adaptability,validity and stability performance are fully shown by the results.
With regard to the fundamental problem of the MANET routing protocols, this paper according to the campus mobile node behaviour, aims to establish a campus wireless mobile model based on AOC system. Through NS-2 simul...
With regard to the fundamental problem of the MANET routing protocols, this paper according to the campus mobile node behaviour, aims to establish a campus wireless mobile model based on AOC system. Through NS-2 simulation platform extensive simulate result and analysis of different mobile fashion which effect on the MANET routing protocol performance: in the aspect of Packet Delivery Ratio,DSR and AODV both surpass 95%, were not greatly affected by the changes of node mobile rate; DSDV and DSR closed to the Path Optimality.
Microseismic is applied broadly but intra-pulse features of microseismic are not studied enough still. For exploring the chaos features of microseismic, the largest Lyapunov exponents and correlation dimension of puls...
详细信息
Microseismic is applied broadly but intra-pulse features of microseismic are not studied enough still. For exploring the chaos features of microseismic, the largest Lyapunov exponents and correlation dimension of pulse segment of four microseismic records are calculated. All the largest Lyapunov exponents of pulse segment of four microseismic records are greater than zero, and all their non-zero attractor of correlation dimension exists. The results show that microseismic is of chaos.
Intrusion detection has become the important component of the network security. Many intelligent intrusion detection models are proposed, but the performance and efficiency are not satisfied to real computer network s...
详细信息
Intrusion detection has become the important component of the network security. Many intelligent intrusion detection models are proposed, but the performance and efficiency are not satisfied to real computer network system. This paper extends these works by applying a new high efficient technique, named twin support vector machines (TWSVM), to intrusion detection. Using the KDD'99 data set collected at MITpsilas Lincoln Labs evaluates the performance and efficiency of the proposed intrusion detection models. The experimental results indicate that the proposed models based on TWSVM is more efficient and has higher detection rate than conventional SVM based model and other models.
For wireless ad hoc networks ***''s mobility pattern and traffic pattern are two key elements.A new simulation model is presented based on the virtual reality collision detection algorithm in obstacle environm...
详细信息
For wireless ad hoc networks ***''s mobility pattern and traffic pattern are two key elements.A new simulation model is presented based on the virtual reality collision detection algorithm in obstacle environment,and the model uses the path planning method to avoid obstacles and to compute the node''s moving *** also affect node''s signal *** these factors,this study implements the mobility model for wireless ad hoc *** results show that the model has a significant impact on the performance of protocols.
It is generally accepted that knowledge based systems would be smarter if they can deal with uncertainty. Some research has been done to extend Description Logics(DLs) towards the management of uncertainty, most of wh...
详细信息
In this paper we evaluate the performance impact of traffic patterns on wireless mesh networks. Modeling and simulation of the wireless mesh networks were performed using the NS-2 tool. Trace-driven simulations with g...
详细信息
In this paper we evaluate the performance impact of traffic patterns on wireless mesh networks. Modeling and simulation of the wireless mesh networks were performed using the NS-2 tool. Trace-driven simulations with genuine traffic trace collected from the wireless mesh networks are used to evaluate the performance. This trace tends to exhibit long-range dependent behavior. Simulation results indicate that genuine traffic traces, compared to traditional traffic models such as the Poisson model, produce longer queues and, thus, require larger buffers in the deployed networks' elements.
暂无评论