In the target tracking, the nodes aggregate their observations of the directions of arrival of the target. The network then uses an extended Kalman filter (EKF) to combine the measurements from multiple snapshots to...In the target tracking, the nodes aggregate their observations of the directions of arrival of the target. The network then uses an extended Kalman filter (EKF) to combine the measurements from multiple snapshots to track the target. In order to rapidly select the best subset of nodes to localize the target with the minimum mean square position error and low power consumption, this paper proposes a simple algorithm, which uses the location information of the target and the network. The lower botmd of localization error is utilized according to the distances between the target and the selected active nodes. Furthermore, the direction likelihoods of the active nodes is predicted by way of the node/target bearing distributing relationships.展开更多
In recent years,position information has become a key feature to drive location and context aware services in mobile communication.Researchers from all over the world have proposed many solu-tions for indoor positioni...In recent years,position information has become a key feature to drive location and context aware services in mobile communication.Researchers from all over the world have proposed many solu-tions for indoor positioning over the past several years.However,due to weak signals,multipath or non-line-of-sight signal propagation,accurately and efficiently localizing targets in harsh indoor environments re-mains a challenging problem.To improve the perfor-mance in harsh environment with insufficient anchors,cooperative localization has emerged.In this paper,a novel cooperative localization algorithm,named area optimization and node selection based sum-product al-gorithm over a wireless network(AN-SPAWN),is de-scribed and analyzed.To alleviate the high compu-tational complexity and build optimized cooperative cluster,a node selection method is designed for the cooperative localization algorithm.Numerical experi-ment results indicate that our proposed algorithm has a higher accuracy and is less impacted by NLOS errors than other conventional cooperative localization algo-rithms in the harsh indoor environments.展开更多
This research presents a reputation-based blockchain consensus mechanism called Proof of Intelligent Reputation(PoIR)as an alternative to traditional Proof of Work(PoW).PoIR addresses the limitations of existing reput...This research presents a reputation-based blockchain consensus mechanism called Proof of Intelligent Reputation(PoIR)as an alternative to traditional Proof of Work(PoW).PoIR addresses the limitations of existing reputationbased consensus mechanisms by proposing a more decentralized and fair node selection process.The proposed PoIR consensus combines Bidirectional Long Short-Term Memory(BiLSTM)with the Network Entity Reputation Database(NERD)to generate reputation scores for network entities and select authoritative nodes.NERD records network entity profiles based on various sources,i.e.,Warden,Blacklists,DShield,AlienVault Open Threat Exchange(OTX),and MISP(Malware Information Sharing Platform).It summarizes these profile records into a reputation score value.The PoIR consensus mechanism utilizes these reputation scores to select authoritative nodes.The evaluation demonstrates that PoIR exhibits higher centralization resistance than PoS and PoW.Authoritative nodes were selected fairly during the 1000-block proposal round,ensuring a more decentralized blockchain ecosystem.In contrast,malicious nodes successfully monopolized 58%and 32%of transaction processes in PoS and PoW,respectively,but failed to do so in PoIR.The findings also indicate that PoIR offers efficient transaction times of 12 s,outperforms reputation-based consensus such as PoW,and is comparable to reputation-based consensus such as PoS.Furthermore,the model evaluation shows that BiLSTM outperforms other Recurrent Neural Network models,i.e.,BiGRU(Bidirectional Gated Recurrent Unit),UniLSTM(Unidirectional Long Short-Term Memory),and UniGRU(Unidirectional Gated Recurrent Unit)with 0.022 Root Mean Squared Error(RMSE).This study concludes that the PoIR consensus mechanism is more resistant to centralization than PoS and PoW.Integrating BiLSTM and NERD enhances the fairness and efficiency of blockchain applications.展开更多
Vehicular Ad hoc Networks (VANETs) which is a special form of Mobile Ad hoc Networks (MANETs) has promising application prospects in the future. Due to the rapid changing of topology structure, how to find a route whi...Vehicular Ad hoc Networks (VANETs) which is a special form of Mobile Ad hoc Networks (MANETs) has promising application prospects in the future. Due to the rapid changing of topology structure, how to find a route which can guarantee Quality of Service (QoS) is an important issue in VANETs. This paper presents an improved Greedy Perimeter Stateless Routing (GPSR) protocol based on our proposed next-hop node selection mechanism. Firstly, we define the link reliability in two cases which take the movement direction angle between two vehicles into consideration. Then we propose a next-hop node selection mechanism based on a weighted function which consists of link reliability between the sender node and next-hop candidate node, distance between next-hop candidate node and the destination, movement direction angle of next-hop candidate node. At last, an improved GPSR protocol is proposed based on the next-hop node selection mechanism. Simulation results are presented to evaluate the performance of the improved GPSR protocol, which shows that the performance including packet delivery ratio and average end-to-end delay of the proposed protocol is better in some situations.展开更多
The security problems of wireless sensor networks (WSN) have attracted people’s wide attention. In this paper, after we have summarized the existing security problems and solutions in WSN, we find that the insider at...The security problems of wireless sensor networks (WSN) have attracted people’s wide attention. In this paper, after we have summarized the existing security problems and solutions in WSN, we find that the insider attack to WSN is hard to solve. Insider attack is different from outsider attack, because it can’t be solved by the traditional encryption and message authentication. Therefore, a reliable secure routing protocol should be proposed in order to defense the insider attack. In this paper, we focus on insider selective forwarding attack. The existing detection mechanisms, such as watchdog, multipath retreat, neighbor-based monitoring and so on, have both advantages and disadvantages. According to their characteristics, we proposed a secure routing protocol based on monitor node and trust mechanism. The reputation value is made up with packet forwarding rate and node’s residual energy. So this detection and routing mechanism is universal because it can take account of both the safety and lifetime of network. Finally, we use OPNET simulation to verify the performance of our algorithm.展开更多
Purpose: Brain functional networks (BFNs) has become important approach for diagnosis of some neurological or psychological disorders. Before estimating BFN, obtaining blood oxygen level dependent (BOLD) representativ...Purpose: Brain functional networks (BFNs) has become important approach for diagnosis of some neurological or psychological disorders. Before estimating BFN, obtaining blood oxygen level dependent (BOLD) representative signals from brain regions of interest (ROIs) is important. In the past decades, the common method is generally to take a ROI as a node, averaging all the voxel time series inside it to extract a representative signal. However, one node does not represent the entire information of this ROI, and averaging method often leads to signal cancellation and information loss. Inspired by this, we propose a novel model extraction method based on an assumption that a ROI can be represented by multiple nodes. Methods: In this paper, we first extract multiple nodes (the number is user-defined) from the ROI based on two traditional methods, including principal component analysis (PCA), and K-means (Clustering according to the spatial position of voxels). Then, canonical correlation analysis (CCA) was issued to construct BFNs by maximizing the correlation between the representative signals corresponding to the nodes in any two ROIs. Finally, to further verify the effectiveness of the proposed method, the estimated BFNs are applied to identify subjects with autism spectrum disorder (ASD) and mild cognitive impairment (MCI) from health controls (HCs). Results: Experimental results on two benchmark databases demonstrate that the proposed method outperforms the baseline method in the sense of classification performance. Conclusions: We propose a novel method for obtaining nodes of ROId based on the hypothesis that a ROI can be represented by multiple nodes, that is, to extract the node signals of ROIs with K-means or PCA. Then, CCA is used to construct BFNs.展开更多
Objective:To explore core acupoints and acupoint selection principles in acupuncture and moxibustion for obesity,from syndrome differentiation prescriptions of the acupuncture-moxibustion therapy in 808 obesity prescr...Objective:To explore core acupoints and acupoint selection principles in acupuncture and moxibustion for obesity,from syndrome differentiation prescriptions of the acupuncture-moxibustion therapy in 808 obesity prescriptions,by using node centrality and cluster analysis methods in complex network.Methods:Firstly,an acupoint network model is established,and acupoint nodes are assessed and calculated in multiple aspects by introducing the node centrality analysis idea of complex network,to excavate core acupoint nodes.Secondly,a cluster analysis is carried out on acupoint network by the cluster algorithm Q-PSO for complex network,to investigate the acupoint combination principles.Results:Zusanli(足三里ST36),Tianshu(天枢ST25),Fenglong(丰隆ST40),Zhongwan(中脘CV12)and Qihai(气海CV6),etc.,were included into the core acupoint Sanyinjiao(三阴交SP6)community.Zhigou(支沟TE6),Neiting(内庭ST44),Shangjuxu(上巨虚ST37),and Pishu(脾俞BL20)etc.,were included into the core acupoint Yinlingquan(阴陵泉SP9)community.Baihuanshu(白环俞BL30)and Zhiyang(至阳GV9)were included into the core acupoint Dachangshu(大肠俞BL25)community.Biguan(髀关ST31)was a single core community.Among all the acupoint nodes,SP6,ST25,SP9,ST36,CV6,Quchi(曲池L111),and Guanyuan(关元CV4)were of high degree centrality and eigenvector centrality,directly reflecting their importance in acupoint selection prescriptions.Conclusion:The Q-PSO algorithm is characterized with high precision and high efficiency,etc.The core acupoints and their combination principles explored by this algorithm are in accordance with clinical experiences.展开更多
In this editorial,we proceed to comment on the article by Chua et al,addressing the management of metastatic lateral pelvic lymph nodes(mLLN)in stage II/III rectal cancer patients below the peritoneal reflection.The t...In this editorial,we proceed to comment on the article by Chua et al,addressing the management of metastatic lateral pelvic lymph nodes(mLLN)in stage II/III rectal cancer patients below the peritoneal reflection.The treatment of this nodal area sparks significant controversy due to the strategic differences followed by Eastern and Western physicians,albeit with a higher degree of convergence in recent years.The dissection of lateral pelvic lymph nodes without neoadjuvant therapy is a standard practice in Eastern countries.In contrast,in the West,preference leans towards opting for neoadjuvant therapy with chemoradiotherapy or radiotherapy,that would cover the treatment of this area without the need to add the dissection of these nodes to the total mesorectal excision.In the presence of high-risk nodal characteristics for mLLN related to radiological imaging and lack of response to neoadjuvant therapy,the risk of lateral local recurrence increases,suggesting the appropriate selection of strategies to reduce the risk of recurrence in each patient profile.Despite the heterogeneous and retrospective nature of studies addressing this area,an international consensus is necessary to approach this clinical scenario uniformly.展开更多
基金National Natural Science Foundation of China(60532030)National Basic Research Program of China(973-61361)National Science Fund for Distinguished Young Scholars(60625102)
文摘In the target tracking, the nodes aggregate their observations of the directions of arrival of the target. The network then uses an extended Kalman filter (EKF) to combine the measurements from multiple snapshots to track the target. In order to rapidly select the best subset of nodes to localize the target with the minimum mean square position error and low power consumption, this paper proposes a simple algorithm, which uses the location information of the target and the network. The lower botmd of localization error is utilized according to the distances between the target and the selected active nodes. Furthermore, the direction likelihoods of the active nodes is predicted by way of the node/target bearing distributing relationships.
基金the Nation-alKey Research&Development Program of China un-der Grant No.2020YFC1511702 and Open Fund of IPOC(BUPT)No.IPOC2021ZT20.
文摘In recent years,position information has become a key feature to drive location and context aware services in mobile communication.Researchers from all over the world have proposed many solu-tions for indoor positioning over the past several years.However,due to weak signals,multipath or non-line-of-sight signal propagation,accurately and efficiently localizing targets in harsh indoor environments re-mains a challenging problem.To improve the perfor-mance in harsh environment with insufficient anchors,cooperative localization has emerged.In this paper,a novel cooperative localization algorithm,named area optimization and node selection based sum-product al-gorithm over a wireless network(AN-SPAWN),is de-scribed and analyzed.To alleviate the high compu-tational complexity and build optimized cooperative cluster,a node selection method is designed for the cooperative localization algorithm.Numerical experi-ment results indicate that our proposed algorithm has a higher accuracy and is less impacted by NLOS errors than other conventional cooperative localization algo-rithms in the harsh indoor environments.
基金funded by the Ministry of Education,Culture,Research,and Technology(Kemendikbudristek)of Indonesia under PDD Grant with Grant Number NKB1016/UN2.RST/HKP.05.00/2022.
文摘This research presents a reputation-based blockchain consensus mechanism called Proof of Intelligent Reputation(PoIR)as an alternative to traditional Proof of Work(PoW).PoIR addresses the limitations of existing reputationbased consensus mechanisms by proposing a more decentralized and fair node selection process.The proposed PoIR consensus combines Bidirectional Long Short-Term Memory(BiLSTM)with the Network Entity Reputation Database(NERD)to generate reputation scores for network entities and select authoritative nodes.NERD records network entity profiles based on various sources,i.e.,Warden,Blacklists,DShield,AlienVault Open Threat Exchange(OTX),and MISP(Malware Information Sharing Platform).It summarizes these profile records into a reputation score value.The PoIR consensus mechanism utilizes these reputation scores to select authoritative nodes.The evaluation demonstrates that PoIR exhibits higher centralization resistance than PoS and PoW.Authoritative nodes were selected fairly during the 1000-block proposal round,ensuring a more decentralized blockchain ecosystem.In contrast,malicious nodes successfully monopolized 58%and 32%of transaction processes in PoS and PoW,respectively,but failed to do so in PoIR.The findings also indicate that PoIR offers efficient transaction times of 12 s,outperforms reputation-based consensus such as PoW,and is comparable to reputation-based consensus such as PoS.Furthermore,the model evaluation shows that BiLSTM outperforms other Recurrent Neural Network models,i.e.,BiGRU(Bidirectional Gated Recurrent Unit),UniLSTM(Unidirectional Long Short-Term Memory),and UniGRU(Unidirectional Gated Recurrent Unit)with 0.022 Root Mean Squared Error(RMSE).This study concludes that the PoIR consensus mechanism is more resistant to centralization than PoS and PoW.Integrating BiLSTM and NERD enhances the fairness and efficiency of blockchain applications.
文摘Vehicular Ad hoc Networks (VANETs) which is a special form of Mobile Ad hoc Networks (MANETs) has promising application prospects in the future. Due to the rapid changing of topology structure, how to find a route which can guarantee Quality of Service (QoS) is an important issue in VANETs. This paper presents an improved Greedy Perimeter Stateless Routing (GPSR) protocol based on our proposed next-hop node selection mechanism. Firstly, we define the link reliability in two cases which take the movement direction angle between two vehicles into consideration. Then we propose a next-hop node selection mechanism based on a weighted function which consists of link reliability between the sender node and next-hop candidate node, distance between next-hop candidate node and the destination, movement direction angle of next-hop candidate node. At last, an improved GPSR protocol is proposed based on the next-hop node selection mechanism. Simulation results are presented to evaluate the performance of the improved GPSR protocol, which shows that the performance including packet delivery ratio and average end-to-end delay of the proposed protocol is better in some situations.
文摘The security problems of wireless sensor networks (WSN) have attracted people’s wide attention. In this paper, after we have summarized the existing security problems and solutions in WSN, we find that the insider attack to WSN is hard to solve. Insider attack is different from outsider attack, because it can’t be solved by the traditional encryption and message authentication. Therefore, a reliable secure routing protocol should be proposed in order to defense the insider attack. In this paper, we focus on insider selective forwarding attack. The existing detection mechanisms, such as watchdog, multipath retreat, neighbor-based monitoring and so on, have both advantages and disadvantages. According to their characteristics, we proposed a secure routing protocol based on monitor node and trust mechanism. The reputation value is made up with packet forwarding rate and node’s residual energy. So this detection and routing mechanism is universal because it can take account of both the safety and lifetime of network. Finally, we use OPNET simulation to verify the performance of our algorithm.
文摘Purpose: Brain functional networks (BFNs) has become important approach for diagnosis of some neurological or psychological disorders. Before estimating BFN, obtaining blood oxygen level dependent (BOLD) representative signals from brain regions of interest (ROIs) is important. In the past decades, the common method is generally to take a ROI as a node, averaging all the voxel time series inside it to extract a representative signal. However, one node does not represent the entire information of this ROI, and averaging method often leads to signal cancellation and information loss. Inspired by this, we propose a novel model extraction method based on an assumption that a ROI can be represented by multiple nodes. Methods: In this paper, we first extract multiple nodes (the number is user-defined) from the ROI based on two traditional methods, including principal component analysis (PCA), and K-means (Clustering according to the spatial position of voxels). Then, canonical correlation analysis (CCA) was issued to construct BFNs by maximizing the correlation between the representative signals corresponding to the nodes in any two ROIs. Finally, to further verify the effectiveness of the proposed method, the estimated BFNs are applied to identify subjects with autism spectrum disorder (ASD) and mild cognitive impairment (MCI) from health controls (HCs). Results: Experimental results on two benchmark databases demonstrate that the proposed method outperforms the baseline method in the sense of classification performance. Conclusions: We propose a novel method for obtaining nodes of ROId based on the hypothesis that a ROI can be represented by multiple nodes, that is, to extract the node signals of ROIs with K-means or PCA. Then, CCA is used to construct BFNs.
基金Supported by Hubei Health & Family Planning Commission Notice (No. [2017]20)Wuhan training project of the sixth batch of young and middle-aged medical talents, wuhan health & family planning commission (Wuhan Health & Family Planning Commission Notice No. [2018]116)Training project of the first batch of tanhualin famous doctors and students (Hubei TCM Hospital No. [2018]72)
文摘Objective:To explore core acupoints and acupoint selection principles in acupuncture and moxibustion for obesity,from syndrome differentiation prescriptions of the acupuncture-moxibustion therapy in 808 obesity prescriptions,by using node centrality and cluster analysis methods in complex network.Methods:Firstly,an acupoint network model is established,and acupoint nodes are assessed and calculated in multiple aspects by introducing the node centrality analysis idea of complex network,to excavate core acupoint nodes.Secondly,a cluster analysis is carried out on acupoint network by the cluster algorithm Q-PSO for complex network,to investigate the acupoint combination principles.Results:Zusanli(足三里ST36),Tianshu(天枢ST25),Fenglong(丰隆ST40),Zhongwan(中脘CV12)and Qihai(气海CV6),etc.,were included into the core acupoint Sanyinjiao(三阴交SP6)community.Zhigou(支沟TE6),Neiting(内庭ST44),Shangjuxu(上巨虚ST37),and Pishu(脾俞BL20)etc.,were included into the core acupoint Yinlingquan(阴陵泉SP9)community.Baihuanshu(白环俞BL30)and Zhiyang(至阳GV9)were included into the core acupoint Dachangshu(大肠俞BL25)community.Biguan(髀关ST31)was a single core community.Among all the acupoint nodes,SP6,ST25,SP9,ST36,CV6,Quchi(曲池L111),and Guanyuan(关元CV4)were of high degree centrality and eigenvector centrality,directly reflecting their importance in acupoint selection prescriptions.Conclusion:The Q-PSO algorithm is characterized with high precision and high efficiency,etc.The core acupoints and their combination principles explored by this algorithm are in accordance with clinical experiences.
文摘In this editorial,we proceed to comment on the article by Chua et al,addressing the management of metastatic lateral pelvic lymph nodes(mLLN)in stage II/III rectal cancer patients below the peritoneal reflection.The treatment of this nodal area sparks significant controversy due to the strategic differences followed by Eastern and Western physicians,albeit with a higher degree of convergence in recent years.The dissection of lateral pelvic lymph nodes without neoadjuvant therapy is a standard practice in Eastern countries.In contrast,in the West,preference leans towards opting for neoadjuvant therapy with chemoradiotherapy or radiotherapy,that would cover the treatment of this area without the need to add the dissection of these nodes to the total mesorectal excision.In the presence of high-risk nodal characteristics for mLLN related to radiological imaging and lack of response to neoadjuvant therapy,the risk of lateral local recurrence increases,suggesting the appropriate selection of strategies to reduce the risk of recurrence in each patient profile.Despite the heterogeneous and retrospective nature of studies addressing this area,an international consensus is necessary to approach this clinical scenario uniformly.