Graph analysis can be done at scale by using Spark GraphX which loading data into memory and running graph analysis in parallel.In this way,we should take data out of graph databases and put it into memory.Considering...Graph analysis can be done at scale by using Spark GraphX which loading data into memory and running graph analysis in parallel.In this way,we should take data out of graph databases and put it into memory.Considering the limitation of memory size,the premise of accelerating graph analytical process reduces the graph data to a suitable size without too much loss of similarity to the original graph.This paper presents our method of data cleaning on the software graph.We use SEQUITUR data compression algorithm to find out hot code path and store it as a whole paths directed acyclic graph.Hot code path is inherent regularity of a program.About 10 to 200 hot code path account for 40%-99%of a program’s execution cost.These hot paths are acyclic contribute more than 0.1%-1.0%of some execution metric.We expand hot code path to a suitable size which is good for runtime and keeps similarity to the original graph.展开更多
Airborne networks(ANs) are special types of ad hoc networks that can be used to enhance situational awareness, flight coordination and flight efficiency in civil and military aviation.Compared to ground networks, AN...Airborne networks(ANs) are special types of ad hoc networks that can be used to enhance situational awareness, flight coordination and flight efficiency in civil and military aviation.Compared to ground networks, ANs have some unique attributes including high node mobility, frequent topology changes, mechanical and aerodynamic constrains, strict safety requirements and harsh communication environment.Thus, the performance of conventional transmission control protocol(TCP) will be dramatically degraded in ANs.Aircraft commonly have two or more heterogeneous network interfaces which offer an opportunity to form multiple communication paths between any two nodes in ANs.To satisfy the communication requirements in ANs, we propose aeronautical multipath transport protocol(Aero MTP) for ANs, which effectively utilizes the available bandwidth and diversity provided by heterogeneous wireless paths.Aero MTP uses fountain codes as forward error correction(FEC) codes to recover from data loss and deploys a TCP-friendly rate-based congestion control mechanism for each path.Moreover, we design a packet allocation algorithm based on optimization to minimize the delivery time of blocks.The performance of Aero MTP is evaluated through OMNe T++ simulations under a variety of test scenarios.Simulations demonstrate that Aero MTP is of great potential to be applied to ANs.展开更多
By researching into the attack to present block cipher, we find an essential reason leading to the assailable encryption strength, set up a new block cipher idea and put forward a block cipher encryption concept path ...By researching into the attack to present block cipher, we find an essential reason leading to the assailable encryption strength, set up a new block cipher idea and put forward a block cipher encryption concept path encryption. We present permutation code encryption which is based on path encryption. Now permutation code encryption is a patent of Chinese invention. In Permutation Code Encryption, we use a pseudo-random sequence of the keys to control the paths. The simulation result shows that for n-bit block the encryption strength is novel higher than 2^n and the algorithm can finish the encryption of one block in 7.5 ns, which is unrelated with the block length.展开更多
Owing to the long propagation delay and high error rate of acoustic channels, it is very challenging to provide reliable data transfer for underwater sensor networks. Moreover, network coding is proved to be an effect...Owing to the long propagation delay and high error rate of acoustic channels, it is very challenging to provide reliable data transfer for underwater sensor networks. Moreover, network coding is proved to be an effective coding technique for throughput and robustness of networks. In this paper, we propose a Reliable Braided Multipath Routing with Network Coding for underwater sensor networks (RBMR-NC). Disjoint multi-path algorithm is used to build independent actual paths, as called main paths. Some braided paths on each main path are built according to the braided multi-path algorithm, which are called logic paths. When a data packet is transmitted by these nodes, the nodes can employ network coding to encode packets coming from the same group in order to further reduce relativity among these packets, and enhance the probability of successful decoding at the sink node. Braided multi-path can make the main paths to be multiplexed to reduce the probability of long paths. This paper mainly employs successful delivery rate to evaluate RBMR-NC model with theoretical analysis and simulation methods. The results indicate that the proposed RBMR-NC protocol is valuable to enhance network reliability and to reduce system redundancy.展开更多
Based on the two path metrics being equal at a merged node in the trellis employed to describe a Viterbi detector for the detection of data encoded with a rate 6:8 balanced binary code in page-oriented optical memorie...Based on the two path metrics being equal at a merged node in the trellis employed to describe a Viterbi detector for the detection of data encoded with a rate 6:8 balanced binary code in page-oriented optical memories, the combined Viterbi detector scheme is proposed to improve raw biterror rate performance by mitigating the occurrence of a twobit reversing error event in an estimated codeword for the balanced code. The effectiveness of the detection scheme is verified for different data quantizations using Monte Carlo simulations. Key words holographic data storage - balanced code - modulation code - Viterbi algorithm - path metric CLC number TN 911. 21 Foundation item: Supported by National 973 Research Program of China (G1999033006)Biography: Chen Duan-rong (1960-), male, Lecturer, Ph. D candidate, research direction: coding and signal processing for the recording channel of holographic data storage.展开更多
针对串行抵消列表(Successive Cancellation List,SCL)译码框架下基于搜索集的路径分裂选择策略的缺陷,提出两种改进策略:基于可靠性函数的路径分裂策略和依靠辅助路径度量值(Auxiliary Path Metric,APM)的剪枝策略。在此基础上,提出一...针对串行抵消列表(Successive Cancellation List,SCL)译码框架下基于搜索集的路径分裂选择策略的缺陷,提出两种改进策略:基于可靠性函数的路径分裂策略和依靠辅助路径度量值(Auxiliary Path Metric,APM)的剪枝策略。在此基础上,提出一种新的译码算法——基于可靠性函数的路径分裂选择策略辅助串行抵消列表(Path Splitting Selecting Strategy Based on Reliability Function under the Successive Cancellation List,PSS-RF-SCL)译码算法。该算法在译码阶段,每个信息比特在进行路径分裂前,会计算所有路径的路径度量(Path Metric,PM)值。利用这些PM值,进一步计算该比特的可靠性函数值。算法将可靠性函数值低于其平均值(即阈值α)的信息比特视为需要进行路径分裂的比特,从而减少了多余的路径分裂次数。此外,算法计算每条路径的APM值,并将APM值高于正确译码路径的APM平均值(即阈值β)的路径视为不可靠路径,对不可靠路径进行剪枝,有效控制了译码列表总数。仿真结果表明,相较于传统的基于搜索集的路径分裂策略辅助的SCL译码算法,所提出的PSS-RF-SCL译码算法在保持相同译码性能的前提条件下,显著降低了译码复杂度。展开更多
提出了基于多路径网络编码的信息分割传输策略ITNC(information slicing and transmitting with multi-path network coding),并基于ITNC提出了一种无需密钥基础设施的匿名通信机制AC-ITNC(anonymous communication mechanism based on ...提出了基于多路径网络编码的信息分割传输策略ITNC(information slicing and transmitting with multi-path network coding),并基于ITNC提出了一种无需密钥基础设施的匿名通信机制AC-ITNC(anonymous communication mechanism based on ITNC).该机制将建路信息分割后编码传送,每个编码节点都对转发信息进行再次随机编码,编码系数与编码信息沿不同编码路径分离传输,从而可以在不需要密钥机制的情况下进行匿名建路.理论分析与仿真结果表明,AC-ITNC与单纯依靠源节点信息分割而中间节点不编码的匿名建路机制相比,显著提高了匿名系统的抗合谋攻击能力.展开更多
基金This research work is supported by Hunan Provincial Education Science 13th Five-Year Plan(Grant No.XJK016BXX001)Social Science Foundation of Hunan Province(Grant No.17YBA049)+2 种基金Hunan Provincial Natural Science Foundation of China(Grant No.2017JJ2016)The work is also supported by Open foundation for University Innovation Platform from Hunan Province,China(Grand No.16K013)the 2011 Collaborative Innovation Center of Big Data for Financial and Economical Asset Development and Utility in Universities of Hunan Province.National Students Platform for Innovation and Entrepreneurship Training(Grand No.201811532010).
文摘Graph analysis can be done at scale by using Spark GraphX which loading data into memory and running graph analysis in parallel.In this way,we should take data out of graph databases and put it into memory.Considering the limitation of memory size,the premise of accelerating graph analytical process reduces the graph data to a suitable size without too much loss of similarity to the original graph.This paper presents our method of data cleaning on the software graph.We use SEQUITUR data compression algorithm to find out hot code path and store it as a whole paths directed acyclic graph.Hot code path is inherent regularity of a program.About 10 to 200 hot code path account for 40%-99%of a program’s execution cost.These hot paths are acyclic contribute more than 0.1%-1.0%of some execution metric.We expand hot code path to a suitable size which is good for runtime and keeps similarity to the original graph.
文摘Airborne networks(ANs) are special types of ad hoc networks that can be used to enhance situational awareness, flight coordination and flight efficiency in civil and military aviation.Compared to ground networks, ANs have some unique attributes including high node mobility, frequent topology changes, mechanical and aerodynamic constrains, strict safety requirements and harsh communication environment.Thus, the performance of conventional transmission control protocol(TCP) will be dramatically degraded in ANs.Aircraft commonly have two or more heterogeneous network interfaces which offer an opportunity to form multiple communication paths between any two nodes in ANs.To satisfy the communication requirements in ANs, we propose aeronautical multipath transport protocol(Aero MTP) for ANs, which effectively utilizes the available bandwidth and diversity provided by heterogeneous wireless paths.Aero MTP uses fountain codes as forward error correction(FEC) codes to recover from data loss and deploys a TCP-friendly rate-based congestion control mechanism for each path.Moreover, we design a packet allocation algorithm based on optimization to minimize the delivery time of blocks.The performance of Aero MTP is evaluated through OMNe T++ simulations under a variety of test scenarios.Simulations demonstrate that Aero MTP is of great potential to be applied to ANs.
文摘By researching into the attack to present block cipher, we find an essential reason leading to the assailable encryption strength, set up a new block cipher idea and put forward a block cipher encryption concept path encryption. We present permutation code encryption which is based on path encryption. Now permutation code encryption is a patent of Chinese invention. In Permutation Code Encryption, we use a pseudo-random sequence of the keys to control the paths. The simulation result shows that for n-bit block the encryption strength is novel higher than 2^n and the algorithm can finish the encryption of one block in 7.5 ns, which is unrelated with the block length.
基金supported by the National Natural Science Foundation of China (Grant Nos.60472060 and 60473039)the National High Technology Research and Development Programof China (863 Program,Grant No.2006AA01Z119)the Innovation Fund of Chinese Academy of Space Technology (Grant No.CAST20090801)
文摘Owing to the long propagation delay and high error rate of acoustic channels, it is very challenging to provide reliable data transfer for underwater sensor networks. Moreover, network coding is proved to be an effective coding technique for throughput and robustness of networks. In this paper, we propose a Reliable Braided Multipath Routing with Network Coding for underwater sensor networks (RBMR-NC). Disjoint multi-path algorithm is used to build independent actual paths, as called main paths. Some braided paths on each main path are built according to the braided multi-path algorithm, which are called logic paths. When a data packet is transmitted by these nodes, the nodes can employ network coding to encode packets coming from the same group in order to further reduce relativity among these packets, and enhance the probability of successful decoding at the sink node. Braided multi-path can make the main paths to be multiplexed to reduce the probability of long paths. This paper mainly employs successful delivery rate to evaluate RBMR-NC model with theoretical analysis and simulation methods. The results indicate that the proposed RBMR-NC protocol is valuable to enhance network reliability and to reduce system redundancy.
基金SupportedbyNational973ResearchProgramofChi na (G1 9990 330 0 6)
文摘Based on the two path metrics being equal at a merged node in the trellis employed to describe a Viterbi detector for the detection of data encoded with a rate 6:8 balanced binary code in page-oriented optical memories, the combined Viterbi detector scheme is proposed to improve raw biterror rate performance by mitigating the occurrence of a twobit reversing error event in an estimated codeword for the balanced code. The effectiveness of the detection scheme is verified for different data quantizations using Monte Carlo simulations. Key words holographic data storage - balanced code - modulation code - Viterbi algorithm - path metric CLC number TN 911. 21 Foundation item: Supported by National 973 Research Program of China (G1999033006)Biography: Chen Duan-rong (1960-), male, Lecturer, Ph. D candidate, research direction: coding and signal processing for the recording channel of holographic data storage.
文摘针对串行抵消列表(Successive Cancellation List,SCL)译码框架下基于搜索集的路径分裂选择策略的缺陷,提出两种改进策略:基于可靠性函数的路径分裂策略和依靠辅助路径度量值(Auxiliary Path Metric,APM)的剪枝策略。在此基础上,提出一种新的译码算法——基于可靠性函数的路径分裂选择策略辅助串行抵消列表(Path Splitting Selecting Strategy Based on Reliability Function under the Successive Cancellation List,PSS-RF-SCL)译码算法。该算法在译码阶段,每个信息比特在进行路径分裂前,会计算所有路径的路径度量(Path Metric,PM)值。利用这些PM值,进一步计算该比特的可靠性函数值。算法将可靠性函数值低于其平均值(即阈值α)的信息比特视为需要进行路径分裂的比特,从而减少了多余的路径分裂次数。此外,算法计算每条路径的APM值,并将APM值高于正确译码路径的APM平均值(即阈值β)的路径视为不可靠路径,对不可靠路径进行剪枝,有效控制了译码列表总数。仿真结果表明,相较于传统的基于搜索集的路径分裂策略辅助的SCL译码算法,所提出的PSS-RF-SCL译码算法在保持相同译码性能的前提条件下,显著降低了译码复杂度。
文摘提出了基于多路径网络编码的信息分割传输策略ITNC(information slicing and transmitting with multi-path network coding),并基于ITNC提出了一种无需密钥基础设施的匿名通信机制AC-ITNC(anonymous communication mechanism based on ITNC).该机制将建路信息分割后编码传送,每个编码节点都对转发信息进行再次随机编码,编码系数与编码信息沿不同编码路径分离传输,从而可以在不需要密钥机制的情况下进行匿名建路.理论分析与仿真结果表明,AC-ITNC与单纯依靠源节点信息分割而中间节点不编码的匿名建路机制相比,显著提高了匿名系统的抗合谋攻击能力.