This article analyzes the shift factors of the descending node local time for sun-synchronous satellites and proposes a shift control method to keep the local time shift within an allowance range. It is found that the...This article analyzes the shift factors of the descending node local time for sun-synchronous satellites and proposes a shift control method to keep the local time shift within an allowance range. It is found that the satellite orbit design and the orbit injection deviation are the causes for the initial shift velocity, whereas the atmospheric drag and the sun gravitational perturbation produce the shift acceleration. To deal with these shift factors, a shift control method is put forward, through such methods as orbit variation design, orbit altitude, and inclination keeping control. The simulation experiment and practical application have proved the effectiveness of this control method.展开更多
New precisely cooperative attacks, such as the coordi- nated cross plane session termination (CXPST) attack, need thou- sands upon thousands machines to attack diverse selected links simultaneously with the given ra...New precisely cooperative attacks, such as the coordi- nated cross plane session termination (CXPST) attack, need thou- sands upon thousands machines to attack diverse selected links simultaneously with the given rate. However, almost all command and control(C&C) mechanisms only provide publishing one com- mand to the whole once, so-called one-to-all C&C model, and are not productive to support CXPST-alike attacks. In this paper, we present one-to-any C&C model on coordination among the unco- operative controlled nodes. As an instance of one-to-any C&C model, directional command publishing (DCP) mechanism lever- aging on Kademlia is provided with a range-mapping key creating algorithm for commands to compute the publishing range and a statistically stochastic node querying scheme to obtain the com- mands immediately. With theoretical analysis and simulation, it is indicated that one-to-any C&C model fits for precisely coordi- nated operation on uncooperative controlled nodes with least complexity, better accuracy and efficiency. Furthermore, DCP mechanism can support one-to-all command publishing at the same time. As an example of future C&C model, studying on one-to-any C&C model may help to promote the development of more efficient countermeasures.展开更多
Design of control strategies for gene regulatory networks is a challenging and important topic in systems biology. In this paper, the problem of finding both a minimum set of control nodes (control inputs) and a contr...Design of control strategies for gene regulatory networks is a challenging and important topic in systems biology. In this paper, the problem of finding both a minimum set of control nodes (control inputs) and a controller is studied. A control node corresponds to a gene that expression can be controlled. Here, a Boolean network is used as a model of gene regulatory networks, and control specifications on attractors, which represent cell types or states of cells, are imposed. It is important to design a gene regulatory network that has desired attractors and has no undesired attractors. Using a matrix-based representation of BNs, this problem can be rewritten as an integer linear programming problem. Finally, the proposed method is demonstrated by a numerical example on a WNT5A network, which is related to melanoma.展开更多
Since wireless links in Ad hoc networks are more fragile than those in traditional wireless networks due to route flapping,multi-node cooperation plays an important role in ensuring the quality of service( QoS). Based...Since wireless links in Ad hoc networks are more fragile than those in traditional wireless networks due to route flapping,multi-node cooperation plays an important role in ensuring the quality of service( QoS). Based on the authors' previous work,this paper proposes a receiver-controlled multi-node cooperation routing protocol,known as AODV-RCC. In this protocol,nodes form a cooperation group based on signal power. In a cooperation group,signal power between a partner and a transmitter,as well as signal power between the partner and the receiver,must be larger than the signal power between the transmitter and the receiver. Otherwise,the transmission will not benefit from cooperation. To avoid collision or congestion,each cooperation group only contains one partner. This partner offers both data and ACK cooperative retransmission. Its retransmission time should be shorter than the internal retry time of the transmitter's MAC layer,because it is better for the partner to retransmit firstly,as it offers a more reliable cooperative link. In AODV-RCC,it is the receiver that chooses the partner,because the link between the partner and the receiver is the most important. According to our simulation results,AODV-RCC shortens the end-to-end delay and increases the packet delivery ratio.展开更多
针对IEEE802.11e Medium Access Control层的QoS机制高负载时存在远端节点冲突和低优先级业务资源被耗尽的问题,提出在牺牲较小带宽的基础上增加一条忙音信道,取代CTS帧在数据信道上的广播,减少远端节点的冲突.仿真结果表明,该方案具有...针对IEEE802.11e Medium Access Control层的QoS机制高负载时存在远端节点冲突和低优先级业务资源被耗尽的问题,提出在牺牲较小带宽的基础上增加一条忙音信道,取代CTS帧在数据信道上的广播,减少远端节点的冲突.仿真结果表明,该方案具有较小的冲突概率,有效地减少了远端节点冲突.同时提出一个解决公平性问题的新思路:在避退时间发送忙音抢占信道,以期提高低优先级业务的接入概率.展开更多
This paper addresses the problem of the input design of large-scale complex networks.Two types of network components,redundant inaccessible strongly connected component(RISCC)and intermittent inaccessible strongly con...This paper addresses the problem of the input design of large-scale complex networks.Two types of network components,redundant inaccessible strongly connected component(RISCC)and intermittent inaccessible strongly connected component(IISCC)are defined,and a subnetwork called a driver network is developed.Based on these,an efficient method is proposed to find the minimum number of controlled nodes to achieve structural complete controllability of a network,in the case that each input can act on multiple state nodes.The range of the number of input nodes to achieve minimal control,and the configuration method(the connection between the input nodes and the controlled nodes)are presented.All possible input solutions can be obtained by this method.Moreover,we give an example and some experiments on real-world networks to illustrate the effectiveness of the method.展开更多
A healthy woman volunteered to participate as "healthy control" in a study.An increased level of procalcitonin(PCT) was detected and remained elevated on follow-up measurements.As calcitonin levels were elev...A healthy woman volunteered to participate as "healthy control" in a study.An increased level of procalcitonin(PCT) was detected and remained elevated on follow-up measurements.As calcitonin levels were elevated as well,thyroid ultrasound was performed which revealed nodes in both thyroid lobes,one of them showing metabolic activity in positron emission tomography-computed tomography scan.To exclude a malignant thyroid cancer despite the negative findings in a fine needle aspiration the patient underwent thyroidectomy and a medullary thyroid carcinoma(MTC) was detected in the right lobe.MTC is a rare endocrine tumor with a poor prognosis once having spread,therefore early detection remains a priority for the outcome.Screening parameter is serum calcitonin,in absence of infection the pro-hormone PCT can be used as a screening parameter as well with high sensitivity.展开更多
As part of the ongoing information revolution,smart power grid technology has become a key focus area for research into power systems.Intelligent electrical appliances are now an important component of power systems,p...As part of the ongoing information revolution,smart power grid technology has become a key focus area for research into power systems.Intelligent electrical appliances are now an important component of power systems,providing a smart power grid with increased control,stability,and safety.Based on the secure communication requirements of cloud energy storage systems,this paper presents the design and development of a node controller for a cloud energy storage network.The function division and system deployment processes were carried out to ensure the security of the communication network used for the cloud energy storage system.Safety protection measures were proposed according to the demands of the communication network,allowing the system to run safely and stably.Finally,the effectiveness of the system was verified through a client-side distributed energy storage demonstration project in Suzhou,China.The system was observed to operate safely and stably,demonstrating good peak-clipping and valley filling effects,and improving the system load characteristics.展开更多
A wireless sensor network consists of hundreds or thousands of small nodes which could either have a static or dynamic position. These nodes are deployed through normal or random distribution to report events of a par...A wireless sensor network consists of hundreds or thousands of small nodes which could either have a static or dynamic position. These nodes are deployed through normal or random distribution to report events of a particular area to the base station through sink nodes. Having limited onboard energy of sensor nodes, conservation of energy in wireless sensor network is necessary. For this purpose, a new algorithm is proposed titled Energy-Efficient-Direction-Based-Topology-Control-Algorithm (EEDBTC). In proposed algorithm<span>,</span><span><span> direction is the main concern whenever an event occurs the node will send data in the direction of base station so that less energy is consumed. The </span><span>results of the same were compared with customary dense wireless sensor</span><span> network, color based WSNs and it was observed that this algorithm is much better than previous topology control algorithms used.</span></span>展开更多
基金supported by the China Postdotoral Science Foundation(20060401004)
文摘This article analyzes the shift factors of the descending node local time for sun-synchronous satellites and proposes a shift control method to keep the local time shift within an allowance range. It is found that the satellite orbit design and the orbit injection deviation are the causes for the initial shift velocity, whereas the atmospheric drag and the sun gravitational perturbation produce the shift acceleration. To deal with these shift factors, a shift control method is put forward, through such methods as orbit variation design, orbit altitude, and inclination keeping control. The simulation experiment and practical application have proved the effectiveness of this control method.
基金Supported by the National Natural Science Foundation of China(61402526,61502528)
文摘New precisely cooperative attacks, such as the coordi- nated cross plane session termination (CXPST) attack, need thou- sands upon thousands machines to attack diverse selected links simultaneously with the given rate. However, almost all command and control(C&C) mechanisms only provide publishing one com- mand to the whole once, so-called one-to-all C&C model, and are not productive to support CXPST-alike attacks. In this paper, we present one-to-any C&C model on coordination among the unco- operative controlled nodes. As an instance of one-to-any C&C model, directional command publishing (DCP) mechanism lever- aging on Kademlia is provided with a range-mapping key creating algorithm for commands to compute the publishing range and a statistically stochastic node querying scheme to obtain the com- mands immediately. With theoretical analysis and simulation, it is indicated that one-to-any C&C model fits for precisely coordi- nated operation on uncooperative controlled nodes with least complexity, better accuracy and efficiency. Furthermore, DCP mechanism can support one-to-all command publishing at the same time. As an example of future C&C model, studying on one-to-any C&C model may help to promote the development of more efficient countermeasures.
文摘Design of control strategies for gene regulatory networks is a challenging and important topic in systems biology. In this paper, the problem of finding both a minimum set of control nodes (control inputs) and a controller is studied. A control node corresponds to a gene that expression can be controlled. Here, a Boolean network is used as a model of gene regulatory networks, and control specifications on attractors, which represent cell types or states of cells, are imposed. It is important to design a gene regulatory network that has desired attractors and has no undesired attractors. Using a matrix-based representation of BNs, this problem can be rewritten as an integer linear programming problem. Finally, the proposed method is demonstrated by a numerical example on a WNT5A network, which is related to melanoma.
基金Sponsored by the Natural Scientific Research Innovation Foundation in Harbin Institute of Technology(Grant No.HIT.NSRIF.2013029)the National Science and Technology Major Project(Grant No.2012ZX03004003)+1 种基金the National Basic Research Development Program of China(973 Program)(Grant No.2013CB329003)the National Natural Science Foundation of China(Grant No.61201148 and No.61101123)
文摘Since wireless links in Ad hoc networks are more fragile than those in traditional wireless networks due to route flapping,multi-node cooperation plays an important role in ensuring the quality of service( QoS). Based on the authors' previous work,this paper proposes a receiver-controlled multi-node cooperation routing protocol,known as AODV-RCC. In this protocol,nodes form a cooperation group based on signal power. In a cooperation group,signal power between a partner and a transmitter,as well as signal power between the partner and the receiver,must be larger than the signal power between the transmitter and the receiver. Otherwise,the transmission will not benefit from cooperation. To avoid collision or congestion,each cooperation group only contains one partner. This partner offers both data and ACK cooperative retransmission. Its retransmission time should be shorter than the internal retry time of the transmitter's MAC layer,because it is better for the partner to retransmit firstly,as it offers a more reliable cooperative link. In AODV-RCC,it is the receiver that chooses the partner,because the link between the partner and the receiver is the most important. According to our simulation results,AODV-RCC shortens the end-to-end delay and increases the packet delivery ratio.
文摘针对IEEE802.11e Medium Access Control层的QoS机制高负载时存在远端节点冲突和低优先级业务资源被耗尽的问题,提出在牺牲较小带宽的基础上增加一条忙音信道,取代CTS帧在数据信道上的广播,减少远端节点的冲突.仿真结果表明,该方案具有较小的冲突概率,有效地减少了远端节点冲突.同时提出一个解决公平性问题的新思路:在避退时间发送忙音抢占信道,以期提高低优先级业务的接入概率.
基金supported in part by the National Natural Science Foundation of China(U1808205,62173079)the Natural Science Foundation of Hebei Province of China(F2000501005)。
文摘This paper addresses the problem of the input design of large-scale complex networks.Two types of network components,redundant inaccessible strongly connected component(RISCC)and intermittent inaccessible strongly connected component(IISCC)are defined,and a subnetwork called a driver network is developed.Based on these,an efficient method is proposed to find the minimum number of controlled nodes to achieve structural complete controllability of a network,in the case that each input can act on multiple state nodes.The range of the number of input nodes to achieve minimal control,and the configuration method(the connection between the input nodes and the controlled nodes)are presented.All possible input solutions can be obtained by this method.Moreover,we give an example and some experiments on real-world networks to illustrate the effectiveness of the method.
文摘A healthy woman volunteered to participate as "healthy control" in a study.An increased level of procalcitonin(PCT) was detected and remained elevated on follow-up measurements.As calcitonin levels were elevated as well,thyroid ultrasound was performed which revealed nodes in both thyroid lobes,one of them showing metabolic activity in positron emission tomography-computed tomography scan.To exclude a malignant thyroid cancer despite the negative findings in a fine needle aspiration the patient underwent thyroidectomy and a medullary thyroid carcinoma(MTC) was detected in the right lobe.MTC is a rare endocrine tumor with a poor prognosis once having spread,therefore early detection remains a priority for the outcome.Screening parameter is serum calcitonin,in absence of infection the pro-hormone PCT can be used as a screening parameter as well with high sensitivity.
基金supported by the Technical Project of the State Grid Corporation of China(research and demonstration application of key technology of energy storage cloud for mobile energy storage application of electric vehicles 5419-201971217a-0-0-00)。
文摘As part of the ongoing information revolution,smart power grid technology has become a key focus area for research into power systems.Intelligent electrical appliances are now an important component of power systems,providing a smart power grid with increased control,stability,and safety.Based on the secure communication requirements of cloud energy storage systems,this paper presents the design and development of a node controller for a cloud energy storage network.The function division and system deployment processes were carried out to ensure the security of the communication network used for the cloud energy storage system.Safety protection measures were proposed according to the demands of the communication network,allowing the system to run safely and stably.Finally,the effectiveness of the system was verified through a client-side distributed energy storage demonstration project in Suzhou,China.The system was observed to operate safely and stably,demonstrating good peak-clipping and valley filling effects,and improving the system load characteristics.
文摘A wireless sensor network consists of hundreds or thousands of small nodes which could either have a static or dynamic position. These nodes are deployed through normal or random distribution to report events of a particular area to the base station through sink nodes. Having limited onboard energy of sensor nodes, conservation of energy in wireless sensor network is necessary. For this purpose, a new algorithm is proposed titled Energy-Efficient-Direction-Based-Topology-Control-Algorithm (EEDBTC). In proposed algorithm<span>,</span><span><span> direction is the main concern whenever an event occurs the node will send data in the direction of base station so that less energy is consumed. The </span><span>results of the same were compared with customary dense wireless sensor</span><span> network, color based WSNs and it was observed that this algorithm is much better than previous topology control algorithms used.</span></span>