Legacy IP address-based access control has met many challenges, because the network nodes cannot be identified accurately based on their variable IP addresses. “Locator/Identifier Split” has made it possible to buil...Legacy IP address-based access control has met many challenges, because the network nodes cannot be identified accurately based on their variable IP addresses. “Locator/Identifier Split” has made it possible to build a network access control mechanism based on the permanent identifier. With the support of “Locator/Identifier Split” routing and addressing concept, the Identifier-based Access Control (IBAC) makes net-work access control more accurate and efficient, and fits for mobile nodes’ access control quite well. Moreover, Self-verifying Identifier makes it possible for the receiver to verify the packet sender’s identity without the third part authentication, which greatly reduces the probability of “Identifier Spoofing”.展开更多
The locator/ID separation paradigm has been widely discussed to resolve the serious scalability issue that today's Internet is facing. Many researches have been carried on with this issue to alleviate the routing ...The locator/ID separation paradigm has been widely discussed to resolve the serious scalability issue that today's Internet is facing. Many researches have been carried on with this issue to alleviate the routing burden of the Default Free Zone (DFZ), improve the traffic engineering capabilities and support efficient mobility and multi-homing. However, in the locator/ID split networks, a third party is needed to store the identifier-to-locator pairs. How to map identifiers onto locators in a scalable and secure way is a really critical challenge. In this paper, we propose SS-MAP, a scalable and secure locator/ID mapping scheme for future Internet. First, SS-MAP uses a near-optimal DHT to map identifiers onto locators, which is able to achieve the maximal performance of the system with reasonable maintenance overhead relatively. Second, SS-MAP uses a decentralized admission control system to protect the DHT-based identifier-to-locator mapping from Sybil attacks, where a malicious mapping server creates numerous fake identities (called Sybil identifiers) to control a large fraction of the mapping system. This is the first work to discuss the Sybil attack problem in identifier-to-locator mapping mechanisms with the best knowledge of the authors. We evaluate the performance of the proposed approach in terms of scalability and security. The analysis and simulation results show that the scheme is scalable for large size networks and can resistant to Sybil attacks.展开更多
In the traditional Intemet Protocol (IP) architecture, there is an overload of IP sermntic problems. Existing solutions focused mainly on the infrastructure for the fixed network, and there is a lack of support for ...In the traditional Intemet Protocol (IP) architecture, there is an overload of IP sermntic problems. Existing solutions focused mainly on the infrastructure for the fixed network, and there is a lack of support for Mobile Ad Hoc Networks (MANETs). To improve scalability, a routing protocol for MANETs is presented based on a locator named Tree-structure Locator Distance Vector (TLDV). The hard core of this routing method is the identifier/locator split by the Distributed Hash Table (DHT) method, which provides a scalable routing service. The node locator indicates its relative location in the network and should be updated whenever topology changes, kocator space ks organized as a tree-structure, and the basic routing operation of the TLDV protocol is presented. TLDV protocol is compared to some classical routing protocols for MANETs on the NS2 platform Results show that TLDV has better scalability. Key words:展开更多
Accurate topology information is crucial to management and application in an active low-voltage distribution network(LVDN).Existing topology identification(TI)methods mostly lack a systematic framework to obtain preci...Accurate topology information is crucial to management and application in an active low-voltage distribution network(LVDN).Existing topology identification(TI)methods mostly lack a systematic framework to obtain precise hierarchical relations and consumers’segment locations.Their performances are usually deteriorated by introduction of incomplete and tampered smart meter data.To address the problem of TI with penetration of PV prosumers,non-consumption users,and electricity thieves,a data-driven algorithm is proposed via measurements of nodal voltage magnitude and active power,without any prior network information.Inspired by engineering applications of graph theory knowledge,we cast connection problems of LVDN into the solution of adjacency matrices.Up-down and parallel relations of branches are first identified using active power,based on feature extraction of frequency domain filtering and correlation.Correlation factor analysis is subsequently adopted to assign multiple consumers to specific subnetworks,and then consumers’segments are precisely located by combining regression analysis and association strategy.The proposed algorithm is successfully examined on in a complex LVDN,and results show higher robustness under different scenarios.展开更多
Gauss radial basis functions(GRBF)are frequently employed in data fitting and machine learning.Their linear independence property can theoretically guarantee the avoidance of data redundancy.In this paper,one of the m...Gauss radial basis functions(GRBF)are frequently employed in data fitting and machine learning.Their linear independence property can theoretically guarantee the avoidance of data redundancy.In this paper,one of the main contributions is proving this property using linear algebra instead of profound knowledge.This makes it easy to read and understand this fundamental fact.The proof of linear independence of a set of Gauss functions relies on the constructing method for one-dimensional space and on the deducing method for higher dimensions.Additionally,under the condition of preserving the same moments between the original function and interpolating function,both the interpolating existence and uniqueness are proven for GRBF in one-dimensional space.The final work demonstrates the application of the GRBF method to locate lunar olivine.By combining preprocessed data using GRBF with the removing envelope curve method,a program is created to find the position of lunar olivine based on spectrum data,and the numerical experiment shows that it is an effective scheme.展开更多
With the widespread deployment of assembly robots in smart manufacturing,efficiently offloading tasks and allocating resources in highly dynamic industrial environments has become a critical challenge for Mobile Edge ...With the widespread deployment of assembly robots in smart manufacturing,efficiently offloading tasks and allocating resources in highly dynamic industrial environments has become a critical challenge for Mobile Edge Computing(MEC).To address this challenge,this paper constructs a cloud-edge-end collaborative MEC system that enables assembly robots to offload complex workflow tasks via multiple paths(horizontal,vertical,and hybrid collaboration).Tomitigate uncertainties arising frommobility,the location predictionmodule is employed.This enables proactive channel-quality estimation,providing forward-looking insights for offloading decisions.Furthermore,we propose a fairness-aware joint optimization framework.Utilizing an improved Multi-Agent Deep Reinforcement Learning(MADRL)algorithm whose reward function incorporates total system cost,positional reliability,and timeout penalties,the framework aims to balance resource distribution among assembly robots while maximizing system utility.Simulation results demonstrate that the proposed framework outperforms traditional offloading strategies.By integrating predictive mobility management with fairness-aware optimization,the framework offers a robust solution for dynamic industrial MEC environments.展开更多
The diversion effect caused by the linked structure in a metro tunnel with cross-passage complicates the impact of longitudinal fire source location on the smoke backflow layering behavior that has not been clarified,...The diversion effect caused by the linked structure in a metro tunnel with cross-passage complicates the impact of longitudinal fire source location on the smoke backflow layering behavior that has not been clarified,despite the fact that the scenario exists in practice.A series of laboratory-scale experiments were conducted in this study to investigate the smoke back-layering length in a model tunnel with cross-passage.The heat release rate,the velocity of longitudinal air flow,and the location of the fire source were all varied.It was found that the behavior of smoke backflow for the fire source located at the upstream of bifurcation point resembles a single-hole tunnel fire.As the fire source’s position shifts downstream from the bifurcation point,the length of smoke back-layering progressively increases.A competitive interaction exists between airflow diversion and smoke diversion during smoke backflow,significantly affecting the smoke back-layering length in the main tunnel.The dimensionless smoke back-layering length model was formulated in a tunnel featuring a cross-passage,taking into account the positions of longitudinal fire sources.The dimensionless smoke back-layering length exhibits a positive correlation with the 17/18 power of total heat release rate Q and a negative correlation with the 5/2 power of longitudinal ventilation velocity V.展开更多
With the popularization of smart devices,Location-Based Services(LBS)greatly facilitates users’life,but at the same time brings the risk of users’location privacy leakage.Existing location privacy protection methods...With the popularization of smart devices,Location-Based Services(LBS)greatly facilitates users’life,but at the same time brings the risk of users’location privacy leakage.Existing location privacy protection methods are deficient,failing to reasonably allocate the privacy budget for non-outlier location points and ignoring the critical location information that may be contained in the outlier points,leading to decreased data availability and privacy exposure problems.To address these problems,this paper proposes a Mix Location Privacy Preservation Method Based on Differential Privacy with Clustering(MLDP).The method first utilizes the DBSCAN clustering algorithm to classify location points into non-outliers and outliers.For non-outliers,the scoring function is designed by combining geographic information and semantic information,and the privacy budget is allocated according to the heat intensity of the hotspot area;for outliers,the scoring function is constructed to allocate the privacy budget based on their correlation with the hotspot area.By comprehensively considering the geographic information,semantic information,and correlation with hotspot areas of the location points,a reasonable privacy budget is assigned to each location point,andfinallynoise is added throughthe Laplacemechanismto realizeprivacyprotection.Experimental results on tworeal trajectory datasets,Geolife and T-Drive,show that the MLDP approach significantly improves data availability while effectively protecting location privacy.Compared with the comparison methods,the maximum available data ratio of MLDP is 1.Moreover,compared with the RandomNoise method,its execution time is 0.056–0.061 s longer,and the logRE is 0.12951–0.62194 lower;compared with KemeansDP,QTK-DP,DPK-F,IDP-SC,and DPK-Means-up methods,it saves 0.114–0.296 s in execution time,and the logRE is 0.01112–0.38283 lower.展开更多
Traveling wave(TW)fault location technology has been widely used in transmission systems due to its high accuracy and simplicity.Recently,there has been growing interest in applying this technology to medium voltage(M...Traveling wave(TW)fault location technology has been widely used in transmission systems due to its high accuracy and simplicity.Recently,there has been growing interest in applying this technology to medium voltage(MV)distribution lines.However,current practices in its deployment,signal measurement,and threshold setting are usually from the application experiences in transmission lines,despite significant differences in fault-induced wave characteristics between transmission and distribution systems.To address these issues,this paper investigates the feasibility and applicability of TW fault technology in MV overhead distribution lines through characteristic analysis of fault-induced TWs.The propagation characteristics of aerial mode and zero mode TWs on overhead distribution lines are studied.Furthermore,it evaluates the influence of critical distri-bution network components including distribution transformers,multi-branch configurations,and busbar structures on wave propagation characteristics.Deployment strategies for traveling wave fault location(TWFL)devices is proposed to address the unique challenges of distribution networks,while the fault location method is also improved.Field test results demonstrate the effectiveness of the proposed methodology,showing improved fault detection accuracy and system reliability in distri-bution network applications.This research provides practical implementation suggestions for TWFL technology in distribution networks.展开更多
Brown spot(BS)of rice,caused by Bipolaris oryzae,is a serious concern that not only causes quantitative losses but also affects grain quality.To manage this disease,the use of resistant genetic sources and QTLs is an ...Brown spot(BS)of rice,caused by Bipolaris oryzae,is a serious concern that not only causes quantitative losses but also affects grain quality.To manage this disease,the use of resistant genetic sources and QTLs is an eco-friendly and economical option.In the current study,F_(3) progenies derived from a cross of susceptible parent PMS-18-B(PAU 10845-1-1-1-1)×resistant parent RP Path 77(RP patho-17)were used to identify potential QTLs linked to BS resistance and to associate this resistance with a temporal spike in defense-related enzymes.展开更多
Proper fixture design is crucial to obtain the better product quality according to the design specification during the workpiece fabrication. Locator layout planning is one of the most important tasks in the fixture ...Proper fixture design is crucial to obtain the better product quality according to the design specification during the workpiece fabrication. Locator layout planning is one of the most important tasks in the fixture design process. However, the design of a fixture relies heavily on the designerts expertise and experience up to now. Therefore, a new approach to loeator layout determination for workpieces with arbitrary complex surfaces is pro- posed for the first time. Firstly, based on the fuzzy judgment method, the proper locating reference and locator - numbers are determined with consideration of surface type, surface area and position tolerance. Secondly, the lo- cator positions are optimized by genetic algorithm(GA). Finally, a typical example shows that the approach is su- perior to the experiential method and can improve positioning accuracy effectively.展开更多
文摘Legacy IP address-based access control has met many challenges, because the network nodes cannot be identified accurately based on their variable IP addresses. “Locator/Identifier Split” has made it possible to build a network access control mechanism based on the permanent identifier. With the support of “Locator/Identifier Split” routing and addressing concept, the Identifier-based Access Control (IBAC) makes net-work access control more accurate and efficient, and fits for mobile nodes’ access control quite well. Moreover, Self-verifying Identifier makes it possible for the receiver to verify the packet sender’s identity without the third part authentication, which greatly reduces the probability of “Identifier Spoofing”.
基金supported in part by National Key Basic Research Program of China (973 program) under Grant No.2007CB307101,2007CB307106National Key Technology R&D Program under Grant No.2008BAH37B03+2 种基金Program of Introducing Talents of Discipline to Universities (111 Project) under Grant No. B08002National Natural Science Foundation of China under Grant No.60833002China Fundamental Research Funds for the Central Universities under Grant No.2009YJS016
文摘The locator/ID separation paradigm has been widely discussed to resolve the serious scalability issue that today's Internet is facing. Many researches have been carried on with this issue to alleviate the routing burden of the Default Free Zone (DFZ), improve the traffic engineering capabilities and support efficient mobility and multi-homing. However, in the locator/ID split networks, a third party is needed to store the identifier-to-locator pairs. How to map identifiers onto locators in a scalable and secure way is a really critical challenge. In this paper, we propose SS-MAP, a scalable and secure locator/ID mapping scheme for future Internet. First, SS-MAP uses a near-optimal DHT to map identifiers onto locators, which is able to achieve the maximal performance of the system with reasonable maintenance overhead relatively. Second, SS-MAP uses a decentralized admission control system to protect the DHT-based identifier-to-locator mapping from Sybil attacks, where a malicious mapping server creates numerous fake identities (called Sybil identifiers) to control a large fraction of the mapping system. This is the first work to discuss the Sybil attack problem in identifier-to-locator mapping mechanisms with the best knowledge of the authors. We evaluate the performance of the proposed approach in terms of scalability and security. The analysis and simulation results show that the scheme is scalable for large size networks and can resistant to Sybil attacks.
基金Acknowledgements This work was supported by the Hi-Tech Research and Development Program of China under Grant No.2007AA01Z407 the Co-Funding Project of Beijing Municipal education Commission under Grant No.JD100060630+3 种基金 National Foundation Research Project the National Natural Science Foundation Project under Grant No. 61170295 the Project of Aeronautical Science Foundation of China under Caant No.2011ZC51024 and the Fundamental Research Funds for the Central Universities.
文摘In the traditional Intemet Protocol (IP) architecture, there is an overload of IP sermntic problems. Existing solutions focused mainly on the infrastructure for the fixed network, and there is a lack of support for Mobile Ad Hoc Networks (MANETs). To improve scalability, a routing protocol for MANETs is presented based on a locator named Tree-structure Locator Distance Vector (TLDV). The hard core of this routing method is the identifier/locator split by the Distributed Hash Table (DHT) method, which provides a scalable routing service. The node locator indicates its relative location in the network and should be updated whenever topology changes, kocator space ks organized as a tree-structure, and the basic routing operation of the TLDV protocol is presented. TLDV protocol is compared to some classical routing protocols for MANETs on the NS2 platform Results show that TLDV has better scalability. Key words:
文摘Accurate topology information is crucial to management and application in an active low-voltage distribution network(LVDN).Existing topology identification(TI)methods mostly lack a systematic framework to obtain precise hierarchical relations and consumers’segment locations.Their performances are usually deteriorated by introduction of incomplete and tampered smart meter data.To address the problem of TI with penetration of PV prosumers,non-consumption users,and electricity thieves,a data-driven algorithm is proposed via measurements of nodal voltage magnitude and active power,without any prior network information.Inspired by engineering applications of graph theory knowledge,we cast connection problems of LVDN into the solution of adjacency matrices.Up-down and parallel relations of branches are first identified using active power,based on feature extraction of frequency domain filtering and correlation.Correlation factor analysis is subsequently adopted to assign multiple consumers to specific subnetworks,and then consumers’segments are precisely located by combining regression analysis and association strategy.The proposed algorithm is successfully examined on in a complex LVDN,and results show higher robustness under different scenarios.
基金Supported by the National Basic Research Program of China(2012CB025904)Zhengzhou Shengda University of Economics,Business and Management(SD-YB2025085)。
文摘Gauss radial basis functions(GRBF)are frequently employed in data fitting and machine learning.Their linear independence property can theoretically guarantee the avoidance of data redundancy.In this paper,one of the main contributions is proving this property using linear algebra instead of profound knowledge.This makes it easy to read and understand this fundamental fact.The proof of linear independence of a set of Gauss functions relies on the constructing method for one-dimensional space and on the deducing method for higher dimensions.Additionally,under the condition of preserving the same moments between the original function and interpolating function,both the interpolating existence and uniqueness are proven for GRBF in one-dimensional space.The final work demonstrates the application of the GRBF method to locate lunar olivine.By combining preprocessed data using GRBF with the removing envelope curve method,a program is created to find the position of lunar olivine based on spectrum data,and the numerical experiment shows that it is an effective scheme.
基金supported by the National Key R&D Program of China under Grant Nos.2024YFD2400200 and 2024YFD2400204supported in part by the Science and Technology Development Program for the Two Zones under Grant No.2023LQ02004.
文摘With the widespread deployment of assembly robots in smart manufacturing,efficiently offloading tasks and allocating resources in highly dynamic industrial environments has become a critical challenge for Mobile Edge Computing(MEC).To address this challenge,this paper constructs a cloud-edge-end collaborative MEC system that enables assembly robots to offload complex workflow tasks via multiple paths(horizontal,vertical,and hybrid collaboration).Tomitigate uncertainties arising frommobility,the location predictionmodule is employed.This enables proactive channel-quality estimation,providing forward-looking insights for offloading decisions.Furthermore,we propose a fairness-aware joint optimization framework.Utilizing an improved Multi-Agent Deep Reinforcement Learning(MADRL)algorithm whose reward function incorporates total system cost,positional reliability,and timeout penalties,the framework aims to balance resource distribution among assembly robots while maximizing system utility.Simulation results demonstrate that the proposed framework outperforms traditional offloading strategies.By integrating predictive mobility management with fairness-aware optimization,the framework offers a robust solution for dynamic industrial MEC environments.
基金funded by the National Natural Science Foundation of China(NSFC)under Grant No.52278415the National Key Research and Development Program of China under Grant No.2022YFC3801104+2 种基金Hebei Provincial Department of Education Project under Grant No.QN2025304the Innovation Fund Project of Hebei University of Engineering under Grant No.SJ2401002066the Sichuan Science and Technology Program under Grant No.2023YFS0407。
文摘The diversion effect caused by the linked structure in a metro tunnel with cross-passage complicates the impact of longitudinal fire source location on the smoke backflow layering behavior that has not been clarified,despite the fact that the scenario exists in practice.A series of laboratory-scale experiments were conducted in this study to investigate the smoke back-layering length in a model tunnel with cross-passage.The heat release rate,the velocity of longitudinal air flow,and the location of the fire source were all varied.It was found that the behavior of smoke backflow for the fire source located at the upstream of bifurcation point resembles a single-hole tunnel fire.As the fire source’s position shifts downstream from the bifurcation point,the length of smoke back-layering progressively increases.A competitive interaction exists between airflow diversion and smoke diversion during smoke backflow,significantly affecting the smoke back-layering length in the main tunnel.The dimensionless smoke back-layering length model was formulated in a tunnel featuring a cross-passage,taking into account the positions of longitudinal fire sources.The dimensionless smoke back-layering length exhibits a positive correlation with the 17/18 power of total heat release rate Q and a negative correlation with the 5/2 power of longitudinal ventilation velocity V.
基金supported in part by the National Natural Science Foundation of China(Grant No.61971291)the Basic Scientific Research Project of the Liaoning Provincial Department of Education(LJ212410144013)+2 种基金the Leading Talent of the‘Xing Liao Ying Cai Plan’(XLYC2202013)the Shenyang Natural Science Foundation(22-315-6-10)the Guangxuan Scholar of Shenyang Ligong University(SYLUGXXZ202205).
文摘With the popularization of smart devices,Location-Based Services(LBS)greatly facilitates users’life,but at the same time brings the risk of users’location privacy leakage.Existing location privacy protection methods are deficient,failing to reasonably allocate the privacy budget for non-outlier location points and ignoring the critical location information that may be contained in the outlier points,leading to decreased data availability and privacy exposure problems.To address these problems,this paper proposes a Mix Location Privacy Preservation Method Based on Differential Privacy with Clustering(MLDP).The method first utilizes the DBSCAN clustering algorithm to classify location points into non-outliers and outliers.For non-outliers,the scoring function is designed by combining geographic information and semantic information,and the privacy budget is allocated according to the heat intensity of the hotspot area;for outliers,the scoring function is constructed to allocate the privacy budget based on their correlation with the hotspot area.By comprehensively considering the geographic information,semantic information,and correlation with hotspot areas of the location points,a reasonable privacy budget is assigned to each location point,andfinallynoise is added throughthe Laplacemechanismto realizeprivacyprotection.Experimental results on tworeal trajectory datasets,Geolife and T-Drive,show that the MLDP approach significantly improves data availability while effectively protecting location privacy.Compared with the comparison methods,the maximum available data ratio of MLDP is 1.Moreover,compared with the RandomNoise method,its execution time is 0.056–0.061 s longer,and the logRE is 0.12951–0.62194 lower;compared with KemeansDP,QTK-DP,DPK-F,IDP-SC,and DPK-Means-up methods,it saves 0.114–0.296 s in execution time,and the logRE is 0.01112–0.38283 lower.
基金supported by the National Natural Sci-ence Foundation of China(No.52107109).
文摘Traveling wave(TW)fault location technology has been widely used in transmission systems due to its high accuracy and simplicity.Recently,there has been growing interest in applying this technology to medium voltage(MV)distribution lines.However,current practices in its deployment,signal measurement,and threshold setting are usually from the application experiences in transmission lines,despite significant differences in fault-induced wave characteristics between transmission and distribution systems.To address these issues,this paper investigates the feasibility and applicability of TW fault technology in MV overhead distribution lines through characteristic analysis of fault-induced TWs.The propagation characteristics of aerial mode and zero mode TWs on overhead distribution lines are studied.Furthermore,it evaluates the influence of critical distri-bution network components including distribution transformers,multi-branch configurations,and busbar structures on wave propagation characteristics.Deployment strategies for traveling wave fault location(TWFL)devices is proposed to address the unique challenges of distribution networks,while the fault location method is also improved.Field test results demonstrate the effectiveness of the proposed methodology,showing improved fault detection accuracy and system reliability in distri-bution network applications.This research provides practical implementation suggestions for TWFL technology in distribution networks.
基金supported by Punjab Agricultural University,Ludhiana,India,for providing the infrastructure and other facilities for conducting experiments.All other forms of support and financial assistance are duly acknowledged.
文摘Brown spot(BS)of rice,caused by Bipolaris oryzae,is a serious concern that not only causes quantitative losses but also affects grain quality.To manage this disease,the use of resistant genetic sources and QTLs is an eco-friendly and economical option.In the current study,F_(3) progenies derived from a cross of susceptible parent PMS-18-B(PAU 10845-1-1-1-1)×resistant parent RP Path 77(RP patho-17)were used to identify potential QTLs linked to BS resistance and to associate this resistance with a temporal spike in defense-related enzymes.
基金Supported by the Natural Science Foundation of Jiangxi Province(2009GZC0104)the Science and Technology Research Project of Jiangxi Provincial Department of Education(GJJ10521)~~
文摘Proper fixture design is crucial to obtain the better product quality according to the design specification during the workpiece fabrication. Locator layout planning is one of the most important tasks in the fixture design process. However, the design of a fixture relies heavily on the designerts expertise and experience up to now. Therefore, a new approach to loeator layout determination for workpieces with arbitrary complex surfaces is pro- posed for the first time. Firstly, based on the fuzzy judgment method, the proper locating reference and locator - numbers are determined with consideration of surface type, surface area and position tolerance. Secondly, the lo- cator positions are optimized by genetic algorithm(GA). Finally, a typical example shows that the approach is su- perior to the experiential method and can improve positioning accuracy effectively.