Spectrum leasing has made more efficient utilization for the limited spectrum resource. While increasing the spectrum utilization, spectrum leasing also brings in some problem. Spectrum switch in the leasing process n...
详细信息
ISBN:
(纸本)9781424408146;1424408156
Spectrum leasing has made more efficient utilization for the limited spectrum resource. While increasing the spectrum utilization, spectrum leasing also brings in some problem. Spectrum switch in the leasing process not only introduces in additional system overhead, but also decreases the secondary user's Qos. In this paper, we model the wireless system as a M/G/1 queue with preemptive priority, propose a new channel parameter to analyze the switch performance. Algorithms are suggested to reduce system overhead and to improve secondary user's Qos based on the new parameter.
The security of Web services has become one of the important research topics about the application of Web services. In this paper, we propose an agent-based policy aware framework for Web services security. In this fr...
详细信息
The security of Web services has become one of the important research topics about the application of Web services. In this paper, we propose an agent-based policy aware framework for Web services security. In this framework, a policy language called ReiT which is a declarative language based on the rules and ontologies is introduced. The non-structural knowledge is represented by rules and the structural temporal knowledge is represented by ontology. Moreover, we propose a mixed reasoning mechanism to evaluate the ReiT policy. The access control policy including the context of the user and Web services is evaluated by the reasoner. In addition, we present a policy aware BOID agent to authorize the access control of the Web services. And we implement the policy aware BOID agent by extending the JADE platform.
How to resolve access control on Web services has become one of the important research tasks about the application of Web services. In this paper, we propose a policy based adaptive Web services security framework. In...
详细信息
How to resolve access control on Web services has become one of the important research tasks about the application of Web services. In this paper, we propose a policy based adaptive Web services security framework. In this framework, the ReiT policy is a declarative language based on the rules and ontologies. The non-structural knowledge is represented by rules and the structural temporal knowledge is represented by ontology. Moreover, we propose a mixer reasoning mechanism to evaluate the ReiT policy. The access control policy including the context of the user and Web services is evaluated by the reasoner. According to the evaluated result agent authorizes the access control of the Web services.
The Increasing adoption of the techniques of mobile wireless ad hoc network in the field of civilian applications arouses many urgent problems. As we known nodes to consist a MANET may belong to different users, thus ...
详细信息
The Increasing adoption of the techniques of mobile wireless ad hoc network in the field of civilian applications arouses many urgent problems. As we known nodes to consist a MANET may belong to different users, thus each node aims to pursue the best quality of service for its owner, i.e., they are self-interested nodes trying to achieve the maximum utility. Researchers have shown that selfish nodes in a MANET can greatly decrease the performance of the network, even to the point where no messages can be sent at all. By the similarities between MANET and multi-agent system (MAS), to research some problems in MANET from the view of MAS is an impressive idea. In this paper nodes in MANET are modeled as intelligent agents using an agent programming language named Conceptual Agent Notation (CAN). We don't use CAN directly but extend its semantics with a set of core operations which capture the essence of ad hoc network, thus provide some solid theoretic underpinning for researching MANET from the view of MAS.
In the wireless network of finite spectrum resource, some communication users probably do not allocate the spectrum so that their communication should be delayed. Thus it is necessary to arrange the communication time...
详细信息
In the wireless network of finite spectrum resource, some communication users probably do not allocate the spectrum so that their communication should be delayed. Thus it is necessary to arrange the communication time of the systems when we allocate the communication spectrum. We propose a games learning-bargaining algorithm to pre-allocate the communication resources in the frequency-time space. Through this distributed games learning, each user obtains its communication schedule, and the result of allocation is further improved by the bargaining process. The result of this algorithm makes the bandwidth utilization achieve a quite high level and arranges the global communication time as short as possible. Comparing with the centralized algorithm of NP-hard, this distributed algorithm has low time complexity. The experiments verify the convergence of the algorithm and present the superiorities of our results to other allocation algorithms.
Inspired by biological immune principles, a novel Immune Genetic Programming based on Register-Stack structure (rs-IGP) is proposed in this paper. In rs-IGP, an antigen represents a problem to be solved, and an antibo...
详细信息
Inspired by biological immune principles, a novel Immune Genetic Programming based on Register-Stack structure (rs-IGP) is proposed in this paper. In rs-IGP, an antigen represents a problem to be solved, and an antibody represents a candidate solution. A flexible and efficient antibody representation based on register-stack structure is designed for rs-IGP. Three populations are adopted in rs-IGP, i.e. the common population, the elitist population and the self set. The immune genetic operators are also developed, including clone operator, recombination operator, mutation operator, hypermutation operator, crossover operator and negative selection operator. The experimental results demonstrate that rs-IGP has better performance.
The empirical mode decomposition (EMD) developed by Huang etc. of NASA is an advanced method for signal analysis. But there is an involved end issue in the course of getting two envelops of the data using spline inter...
详细信息
The empirical mode decomposition (EMD) developed by Huang etc. of NASA is an advanced method for signal analysis. But there is an involved end issue in the course of getting two envelops of the data using spline interpolation. A self-adaptive method to dealing with the end issue is proposed. Generally, it extends the externa sequence near the ends of the data by the most suited sequence in the inner data. For the chosen inner sequence has the most similarity of tendency with the ends, the data extension is reasonable. After the extension, the spline does not swing at both ends of the data. The result of experiment proved that the method can be used to solve the end issue effectively.
Many applications in wireless sensor networks like video surveillance have the requirement of timely data delivery. Real-time routing is needed in these applications. Because of the limitation of node energy, energy e...
详细信息
Many applications in wireless sensor networks like video surveillance have the requirement of timely data delivery. Real-time routing is needed in these applications. Because of the limitation of node energy, energy efficiency is also an important concern in routing protocol design in order to increase the network lifetime. In this paper, we propose a global-energy-balancing routing scheme (GEBR) for real-time traffic based on directed diffusion (DD), which balances node energy utilization to increase the network lifetime. GEBR can find an optimal path in sensor networks for data transfer considering global energy balance and limited delivery delay. Simulation results show that GEBR significantly outperforms DD in uniform energy utilization. GEBR achieves better global energy balance and longer network lifetime. The time for real-time service of the sensor networks using GEBR is prolonged by about 4.37% and the network lifetime is prolonged by 44.6%.
With the growing prevalence of wireless sensor networks comes a new need for location-based access control mechanisms. Thus we need a method to perform location verification to enforce location-based access to informa...
详细信息
With the growing prevalence of wireless sensor networks comes a new need for location-based access control mechanisms. Thus we need a method to perform location verification to enforce location-based access to information resources. In this work, a statistic location verification algorithm in randomly deployed sensor networks is proposed. The nodes in the networks are classified to three roles. The claimer broadcasts the position message. The witnesses rebroadcast it and report the distance and lowest hop information to the verifier. The verifier makes use of hypothesis tests to make a decision. At last the simulation results confirm the validation of the algorithm.
Routing protocol security is the key element in the research of secure wireless sensor networks. Due to its special characteristic, designing security routing protocol is a challenge in these networks. A secure routin...
详细信息
Routing protocol security is the key element in the research of secure wireless sensor networks. Due to its special characteristic, designing security routing protocol is a challenge in these networks. A secure routing protocol with malicious nodes detecting and diagnosing mechanism is used to reduce the malicious nodes' threat to the WSNs.
暂无评论