With the purpose of making calculation more efficient in practical hydraulic simulations, an improved algorithm was proposed and was applied in the practical water distribution field. This methodology was developed by...With the purpose of making calculation more efficient in practical hydraulic simulations, an improved algorithm was proposed and was applied in the practical water distribution field. This methodology was developed by expanding the traditional loop-equation theory through utilization of the advantages of the graph theory in efficiency. The utilization of the spanning tree technique from graph theory makes the proposed algorithm efficient in calculation and simple to use for computer coding. The algorithms for topological generation and practical implementations are presented in detail in this paper. Through the application to a practical urban system, the consumption of the CPU time and computation memory were decreased while the accuracy was greatly enhanced compared with the present existing methods.展开更多
In view of the flaws of component-based software (CBS) reliability modeling and analysis, the low recognition degree of debugging process, too many assumptions and difficulties in obtaining the solution, a CBS relia...In view of the flaws of component-based software (CBS) reliability modeling and analysis, the low recognition degree of debugging process, too many assumptions and difficulties in obtaining the solution, a CBS reliability simulation process is presented incorporating the imperfect debugging and the limitation of debugging resources. Considering the effect of imperfect debugging on fault detec- tion and correction process, a CBS integration testing model is sketched by multi-queue muhichannel and finite server queuing model (MMFSQM). Compared with the analytical method based on pa- rameters and other nonparametric approaches, the simulation approach can relax more of the usual reliability modeling assumptions and effectively expound integration testing process of CBS. Then, CBS reliability process simulation procedure is developed accordingly. The proposed simulation ap- proach is validated to be sound and effective by simulation experiment studies and analysis.展开更多
A mimicry honeypot framework based on game theory is presented in our work, which can calculate the equilibrium strategy of the deceptive game using non-cooperative incomplete dynamic game theory, and make decisions f...A mimicry honeypot framework based on game theory is presented in our work, which can calculate the equilibrium strategy of the deceptive game using non-cooperative incomplete dynamic game theory, and make decisions for the mimicry framework to deploy the simple service, the honeypot and the fake honeypot. A mimicry prototype is implemented using NS2 platform, and simulation experiments are launched to validate the decision-making result and the deceptive performance of the mimicry honeypot. The empirical study shows that the mimicry honeypot framework based on game theory can be able to influence the equilibrium strategy results by dynamically changing the deployment vector of the mimicry system. It validates that the mimicry honeypot framework has better flexibility, activeness and fraudulence than the traditional honeypot.展开更多
In game theoretic context, it is assumed that the decision maker has the extraordinary skills of reasoning and calculation. This assumption is called "perfect rationality". A player with perfect rationality can solv...In game theoretic context, it is assumed that the decision maker has the extraordinary skills of reasoning and calculation. This assumption is called "perfect rationality". A player with perfect rationality can solve complex problems without making mistakes. However, recently, many studies have restricted this rationality or the structure of game. These restrictions are called "bounded rationality." The authors also focus on bounded rationality, but with learning dynamics and complex networks. A complex network covers a wide area. Currently, a wide range of studies have not only investigated network formation and the characteristics of a formed network, but also analyzed situations where a network is already provided. In addition, in an analysis using game theory, a prisoners' dilemma type game was used to investigate how a change in the network structure would affect the players' relationships Therefore, our model employs decision makers with learning dynamics and describes the interaction of decision makers as a network. The purpose of this study is to examine the behavior of the decision maker with learning dynamics and the formation of networks by the interaction of decision makers through an agent-based simulation.展开更多
Data transmission in multimedia WSNs are required high bandwidth and reliable transfer because of large amount of data size. However, some applications of WSNs are required high quality. In this context, main factor i...Data transmission in multimedia WSNs are required high bandwidth and reliable transfer because of large amount of data size. However, some applications of WSNs are required high quality. In this context, main factor in quality of services (QoS) metrics in WSNs becomes longevity of the network and high quality. In sensor nodes, choosing relevant transceiver and microcontroller components plays important role in assembling sensor devices, in which data controls should be designed so that packet loss is minimized. Available QoS metrics based on queuing/buffer management in wired and other wireless networks don’t applicable in WSNs because of its unique characteristics. In this paper the simplest model of QoS model-bufferless system were proposed. In the proposed model, measurement of the probability of blocking of the arrival packets was suggested by using queuing theory in order to increase QoS. Given probability of blocking (PB) illustrates clear picture how system specification should be chosen so that blocking state would be minimized.展开更多
Background:Urban green infrastructure(GI)networks play a significant role in ensuring regional ecological security;however,they are highly vulnerable to the influence of urban development,and the optimization of GI ne...Background:Urban green infrastructure(GI)networks play a significant role in ensuring regional ecological security;however,they are highly vulnerable to the influence of urban development,and the optimization of GI networks with better connectivity and resilience under different development scenarios has become a practical problem that urgently needs to be solved.Taking Harbin,a megacity in Northeast China,as the case study,we set five simulation scenarios by adjusting the economic growth rate and extracted the GI network in multiple scenarios by integrating the minimal cumulative resistance model and the gravity model.The low‑degree‑first(LDF)strategy of complex network theory was introduced to optimize the GI network,and the optimization effect was verified by robustness analysis.Results:The results showed that in the 5%economic growth scenario,the GI network structure was more complex,and the connectivity of the network was better,while in the other scenarios,the network structure gradually degraded with economic growth.After optimization by the LDF strategy,the average degree of the GI network in multiple scenarios increased from 2.368,2.651,2.189,1.972,and 1.847 to 2.783,3.125,2.643,2.414,and 2.322,respectively,and the GI network structure connectivity and resilience were significantly enhanced in all scenarios.Conclusions:Economic growth did not necessarily lead to degradation of the GI network;there was still room for economic development in the study area,but it was limited under existing GI conditions,and the LDF strategy was an effective method to optimize the GI network.The research results provide a new perspective for the study of GI network protection with urban economic growth and serve as a methodological reference for urban GI network optimization.展开更多
In cognitive radio networks, the spectrum utilization can be improved by cognitive users opportunistically using the idle channels licensed to the primary users. However, the new arrived cognitive users may not be abl...In cognitive radio networks, the spectrum utilization can be improved by cognitive users opportunistically using the idle channels licensed to the primary users. However, the new arrived cognitive users may not be able to use the channel immediately since the channel usage state is random. This will impose additional time delay for the cognitive users. Excessive waiting delay can make cognitive users miss the spectrum access chances. In this paper, a discrete-time Markov queuing model from a macro point of view is provided. Through the matrix-geometric solution theory, the average sojourn time for cognitive users in the steady state before accessing the spectrum is obtained. Given the tolerant delay of cognitive users, the macro-based throughput is derived and an access control mechanism is proposed. The numerical results show the effects of service completion probability on average sojourn time and throughput. It is confirmed that the throughput can be obviously improved by using the proposed access control mechanism. Finally, the performance evaluations based on users are compared to that based on data packets.展开更多
Deregulation policy has caused some changes in the concepts of power systems reliability assessment and enhancement. In the present research, generation reliability is considered, and a method for its assessment is pr...Deregulation policy has caused some changes in the concepts of power systems reliability assessment and enhancement. In the present research, generation reliability is considered, and a method for its assessment is proposed using Game Theory (GT) and Neural Networks (NN). Also, due to the stochastic behavior of power markets and generators’ forced outages, Monte Carlo Simulation (MCS) is used for reliability evaluation. Generation reliability focuses merely on the interaction between generation complex and load. Therefore, in the research, based on the behavior of players in the market and using GT, two outcomes are considered: cooperation and non-cooperation. The proposed method is assessed on IEEE-Reliability Test System with satisfactory results. Loss of Load Expectation (LOLE) is used as the reliability index and the results show generation reliability in cooperation market is better than non-cooperation outcome.展开更多
In order to solve three kinds of fuzzy programm model, fuzzy chance-constrained programming mode ng models, i.e. fuzzy expected value and fuzzy dependent-chance programming model, a simultaneous perturbation stochast...In order to solve three kinds of fuzzy programm model, fuzzy chance-constrained programming mode ng models, i.e. fuzzy expected value and fuzzy dependent-chance programming model, a simultaneous perturbation stochastic approximation algorithm is proposed by integrating neural network with fuzzy simulation. At first, fuzzy simulation is used to generate a set of input-output data. Then a neural network is trained according to the set. Finally, the trained neural network is embedded in simultaneous perturbation stochastic approximation algorithm. Simultaneous perturbation stochastic approximation algorithm is used to search the optimal solution. Two numerical examples are presented to illustrate the effectiveness of the proposed algorithm.展开更多
In this work,we consider the performance analysis of state dependent priority traffic and scheduling in device to device(D2D)heterogeneous networks.There are two priority transmission types of data in wireless communi...In this work,we consider the performance analysis of state dependent priority traffic and scheduling in device to device(D2D)heterogeneous networks.There are two priority transmission types of data in wireless communication,such as video or telephone,which always meet the requirements of high priority(HP)data transmission first.If there is a large amount of low priority(LP)data,there will be a large amount of LP data that cannot be sent.This situation will cause excessive delay of LP data and packet dropping probability.In order to solve this problem,the data transmission process of high priority queue and low priority queue is studied.Considering the priority jump strategy to the priority queuing model,the queuing process with two priority data is modeled as a two-dimensionalMarkov chain.A state dependent priority jump queuing strategy is proposed,which can improve the discarding performance of low priority data.The quasi birth and death process method(QBD)and fixed point iterationmethod are used to solve the causality,and the steady-state probability distribution is further obtained.Then,performance parameters such as average queue length,average throughput,average delay and packet dropping probability for both high and low priority data can be expressed.The simulation results verify the correctness of the theoretical derivation.Meanwhile,the proposed priority jump queuing strategy can significantly improve the drop performance of low-priority data.展开更多
In this paper, we investigate the connectivity of vehicular ad hoc networks in free-flow traffic situation with channel randonmess. In order to illustrate the realistic environment, we consider that vehicles are distr...In this paper, we investigate the connectivity of vehicular ad hoc networks in free-flow traffic situation with channel randonmess. In order to illustrate the realistic environment, we consider that vehicles are distributed in free-flow highway according to a Poisson point process, and signal propagation between connected vehicles is subjected to log-normal shadowing effects. We obtain the distribution of the space headway between successive vehicles and the distribution of signal coverage, which allows us to use the equivalent M/G/z~ queue theory to model the connectivity of VANETs in the form of average broadcast percolation distance and average number of connected nodes. Then, extensive simulation studies are conducted to evaluate the obtained results. The analytical model presented here is able to describe the impact of various system parameters, including traffic parameters and signal propagation parameters on the con- nectivity. We use our analytical results, along with the common signal propagation data, to understand impact of channel randomness on the connectivity of VANETs.展开更多
This paper proposes a trust ant colony routing algorithm by introducing a node trust evaluation model based on the D-S evidence theory into the ant colony routing protocol to improve the security of wireless sensor ne...This paper proposes a trust ant colony routing algorithm by introducing a node trust evaluation model based on the D-S evidence theory into the ant colony routing protocol to improve the security of wireless sensor networks. To reduce the influence of conflict evidences caused by malicious nods, the consistent intensity is introduced to preprocess conflict evidences before using the D-S combination rule to improve the reliability of the D-S based trust evaluation. The nodes with high trust values will be selected as the routing nodes to insure the routing security, and the trust values are used as heuristic functions of the ant colony routing algorithm. The simulation tests are conducted by using the network simulator NS2 to observe the outcomes of performance metrics of packets loss rate and average end-to-end delay etc. to indirectly evaluate the security issue under the attack of inside malicious nodes. The simulation results show that the proposed trust routing algorithm can efficiently resist malicious attacks in terms of keeping performances of the average end-to-end delay, the throughtput and the routing packet overhead under attacking from malicious nodes.展开更多
Wavelet has been used as a powerful tool in the signal processing and function approximation recently. This paper presents the application of wavelets for solving two key problems in 3-D audio simulation. First, we em...Wavelet has been used as a powerful tool in the signal processing and function approximation recently. This paper presents the application of wavelets for solving two key problems in 3-D audio simulation. First, we employ discrete wavelet transform (DWT) combined with vector quantization (VQ) to compress audio data in order to reduce tremendous redundant data storage and transmission times. Secondly, we use wavelets as the activation functions in neural networks called feed-forward wavelet networks to approach auditory localization information cues (head-related transfer functions (HRTFs) are used here). The experimental results demonstrate that the application of wavelets is more efficient and useful in 3-D audio simulation.展开更多
文摘With the purpose of making calculation more efficient in practical hydraulic simulations, an improved algorithm was proposed and was applied in the practical water distribution field. This methodology was developed by expanding the traditional loop-equation theory through utilization of the advantages of the graph theory in efficiency. The utilization of the spanning tree technique from graph theory makes the proposed algorithm efficient in calculation and simple to use for computer coding. The algorithms for topological generation and practical implementations are presented in detail in this paper. Through the application to a practical urban system, the consumption of the CPU time and computation memory were decreased while the accuracy was greatly enhanced compared with the present existing methods.
基金Supported by the National High Technology Research and Development Program of China(No.2008AA01A201)the National Nature Science Foundation of China(No.60503015,90818016)
文摘In view of the flaws of component-based software (CBS) reliability modeling and analysis, the low recognition degree of debugging process, too many assumptions and difficulties in obtaining the solution, a CBS reliability simulation process is presented incorporating the imperfect debugging and the limitation of debugging resources. Considering the effect of imperfect debugging on fault detec- tion and correction process, a CBS integration testing model is sketched by multi-queue muhichannel and finite server queuing model (MMFSQM). Compared with the analytical method based on pa- rameters and other nonparametric approaches, the simulation approach can relax more of the usual reliability modeling assumptions and effectively expound integration testing process of CBS. Then, CBS reliability process simulation procedure is developed accordingly. The proposed simulation ap- proach is validated to be sound and effective by simulation experiment studies and analysis.
基金Supported by the National Natural Science Foundation of China(61309024)the Funding of Shanghai Key Laboratory of Financial Information Technology
文摘A mimicry honeypot framework based on game theory is presented in our work, which can calculate the equilibrium strategy of the deceptive game using non-cooperative incomplete dynamic game theory, and make decisions for the mimicry framework to deploy the simple service, the honeypot and the fake honeypot. A mimicry prototype is implemented using NS2 platform, and simulation experiments are launched to validate the decision-making result and the deceptive performance of the mimicry honeypot. The empirical study shows that the mimicry honeypot framework based on game theory can be able to influence the equilibrium strategy results by dynamically changing the deployment vector of the mimicry system. It validates that the mimicry honeypot framework has better flexibility, activeness and fraudulence than the traditional honeypot.
文摘In game theoretic context, it is assumed that the decision maker has the extraordinary skills of reasoning and calculation. This assumption is called "perfect rationality". A player with perfect rationality can solve complex problems without making mistakes. However, recently, many studies have restricted this rationality or the structure of game. These restrictions are called "bounded rationality." The authors also focus on bounded rationality, but with learning dynamics and complex networks. A complex network covers a wide area. Currently, a wide range of studies have not only investigated network formation and the characteristics of a formed network, but also analyzed situations where a network is already provided. In addition, in an analysis using game theory, a prisoners' dilemma type game was used to investigate how a change in the network structure would affect the players' relationships Therefore, our model employs decision makers with learning dynamics and describes the interaction of decision makers as a network. The purpose of this study is to examine the behavior of the decision maker with learning dynamics and the formation of networks by the interaction of decision makers through an agent-based simulation.
文摘Data transmission in multimedia WSNs are required high bandwidth and reliable transfer because of large amount of data size. However, some applications of WSNs are required high quality. In this context, main factor in quality of services (QoS) metrics in WSNs becomes longevity of the network and high quality. In sensor nodes, choosing relevant transceiver and microcontroller components plays important role in assembling sensor devices, in which data controls should be designed so that packet loss is minimized. Available QoS metrics based on queuing/buffer management in wired and other wireless networks don’t applicable in WSNs because of its unique characteristics. In this paper the simplest model of QoS model-bufferless system were proposed. In the proposed model, measurement of the probability of blocking of the arrival packets was suggested by using queuing theory in order to increase QoS. Given probability of blocking (PB) illustrates clear picture how system specification should be chosen so that blocking state would be minimized.
基金supported by the Fundamental Research Funds for the Central Universities,Northeast Forestry University(2572018CP06,2572017CA12)。
文摘Background:Urban green infrastructure(GI)networks play a significant role in ensuring regional ecological security;however,they are highly vulnerable to the influence of urban development,and the optimization of GI networks with better connectivity and resilience under different development scenarios has become a practical problem that urgently needs to be solved.Taking Harbin,a megacity in Northeast China,as the case study,we set five simulation scenarios by adjusting the economic growth rate and extracted the GI network in multiple scenarios by integrating the minimal cumulative resistance model and the gravity model.The low‑degree‑first(LDF)strategy of complex network theory was introduced to optimize the GI network,and the optimization effect was verified by robustness analysis.Results:The results showed that in the 5%economic growth scenario,the GI network structure was more complex,and the connectivity of the network was better,while in the other scenarios,the network structure gradually degraded with economic growth.After optimization by the LDF strategy,the average degree of the GI network in multiple scenarios increased from 2.368,2.651,2.189,1.972,and 1.847 to 2.783,3.125,2.643,2.414,and 2.322,respectively,and the GI network structure connectivity and resilience were significantly enhanced in all scenarios.Conclusions:Economic growth did not necessarily lead to degradation of the GI network;there was still room for economic development in the study area,but it was limited under existing GI conditions,and the LDF strategy was an effective method to optimize the GI network.The research results provide a new perspective for the study of GI network protection with urban economic growth and serve as a methodological reference for urban GI network optimization.
文摘In cognitive radio networks, the spectrum utilization can be improved by cognitive users opportunistically using the idle channels licensed to the primary users. However, the new arrived cognitive users may not be able to use the channel immediately since the channel usage state is random. This will impose additional time delay for the cognitive users. Excessive waiting delay can make cognitive users miss the spectrum access chances. In this paper, a discrete-time Markov queuing model from a macro point of view is provided. Through the matrix-geometric solution theory, the average sojourn time for cognitive users in the steady state before accessing the spectrum is obtained. Given the tolerant delay of cognitive users, the macro-based throughput is derived and an access control mechanism is proposed. The numerical results show the effects of service completion probability on average sojourn time and throughput. It is confirmed that the throughput can be obviously improved by using the proposed access control mechanism. Finally, the performance evaluations based on users are compared to that based on data packets.
文摘Deregulation policy has caused some changes in the concepts of power systems reliability assessment and enhancement. In the present research, generation reliability is considered, and a method for its assessment is proposed using Game Theory (GT) and Neural Networks (NN). Also, due to the stochastic behavior of power markets and generators’ forced outages, Monte Carlo Simulation (MCS) is used for reliability evaluation. Generation reliability focuses merely on the interaction between generation complex and load. Therefore, in the research, based on the behavior of players in the market and using GT, two outcomes are considered: cooperation and non-cooperation. The proposed method is assessed on IEEE-Reliability Test System with satisfactory results. Loss of Load Expectation (LOLE) is used as the reliability index and the results show generation reliability in cooperation market is better than non-cooperation outcome.
基金National Natural Science Foundation of China (No.70471049)China Postdoctoral Science Foundation (No. 20060400704)
文摘In order to solve three kinds of fuzzy programm model, fuzzy chance-constrained programming mode ng models, i.e. fuzzy expected value and fuzzy dependent-chance programming model, a simultaneous perturbation stochastic approximation algorithm is proposed by integrating neural network with fuzzy simulation. At first, fuzzy simulation is used to generate a set of input-output data. Then a neural network is trained according to the set. Finally, the trained neural network is embedded in simultaneous perturbation stochastic approximation algorithm. Simultaneous perturbation stochastic approximation algorithm is used to search the optimal solution. Two numerical examples are presented to illustrate the effectiveness of the proposed algorithm.
基金2020 MajorNatural Science Research Project of Jiangsu Province Colleges and Universities:Research on Forensic Modeling and Analysis of the Internet of Things(20KJA520004)2020 Open Project of National and Local Joint Engineering Laboratory of Radio Frequency Integration andMicro-assembly Technology:Research on the Security Performance of Radio Frequency Energy Collection Cooperative Communication Network(KFJJ20200201)+1 种基金2021 Jiangsu Police Officer Academy Scientific Research Project:Research on D2D Cache Network Resource Optimization Based on Edge Computing Technology(2021SJYZK01)High-level Introduction of Talent Scientific Research Start-up Fund of Jiangsu Police Institute(JSPI19GKZL407).
文摘In this work,we consider the performance analysis of state dependent priority traffic and scheduling in device to device(D2D)heterogeneous networks.There are two priority transmission types of data in wireless communication,such as video or telephone,which always meet the requirements of high priority(HP)data transmission first.If there is a large amount of low priority(LP)data,there will be a large amount of LP data that cannot be sent.This situation will cause excessive delay of LP data and packet dropping probability.In order to solve this problem,the data transmission process of high priority queue and low priority queue is studied.Considering the priority jump strategy to the priority queuing model,the queuing process with two priority data is modeled as a two-dimensionalMarkov chain.A state dependent priority jump queuing strategy is proposed,which can improve the discarding performance of low priority data.The quasi birth and death process method(QBD)and fixed point iterationmethod are used to solve the causality,and the steady-state probability distribution is further obtained.Then,performance parameters such as average queue length,average throughput,average delay and packet dropping probability for both high and low priority data can be expressed.The simulation results verify the correctness of the theoretical derivation.Meanwhile,the proposed priority jump queuing strategy can significantly improve the drop performance of low-priority data.
基金Supported by the National Natural Science Foundation of China (No. 60873192,61070182)
文摘In this paper, we investigate the connectivity of vehicular ad hoc networks in free-flow traffic situation with channel randonmess. In order to illustrate the realistic environment, we consider that vehicles are distributed in free-flow highway according to a Poisson point process, and signal propagation between connected vehicles is subjected to log-normal shadowing effects. We obtain the distribution of the space headway between successive vehicles and the distribution of signal coverage, which allows us to use the equivalent M/G/z~ queue theory to model the connectivity of VANETs in the form of average broadcast percolation distance and average number of connected nodes. Then, extensive simulation studies are conducted to evaluate the obtained results. The analytical model presented here is able to describe the impact of various system parameters, including traffic parameters and signal propagation parameters on the con- nectivity. We use our analytical results, along with the common signal propagation data, to understand impact of channel randomness on the connectivity of VANETs.
基金supported by the National Natural Science Foundation of China(NSFC)under Grant No.61373126the Natural Science Foundation of Jiangsu Province of China under Grant No.BK20131107the Fundamental Research Funds for the Central Universities under Grant No.JUSRP51510
文摘This paper proposes a trust ant colony routing algorithm by introducing a node trust evaluation model based on the D-S evidence theory into the ant colony routing protocol to improve the security of wireless sensor networks. To reduce the influence of conflict evidences caused by malicious nods, the consistent intensity is introduced to preprocess conflict evidences before using the D-S combination rule to improve the reliability of the D-S based trust evaluation. The nodes with high trust values will be selected as the routing nodes to insure the routing security, and the trust values are used as heuristic functions of the ant colony routing algorithm. The simulation tests are conducted by using the network simulator NS2 to observe the outcomes of performance metrics of packets loss rate and average end-to-end delay etc. to indirectly evaluate the security issue under the attack of inside malicious nodes. The simulation results show that the proposed trust routing algorithm can efficiently resist malicious attacks in terms of keeping performances of the average end-to-end delay, the throughtput and the routing packet overhead under attacking from malicious nodes.
文摘Wavelet has been used as a powerful tool in the signal processing and function approximation recently. This paper presents the application of wavelets for solving two key problems in 3-D audio simulation. First, we employ discrete wavelet transform (DWT) combined with vector quantization (VQ) to compress audio data in order to reduce tremendous redundant data storage and transmission times. Secondly, we use wavelets as the activation functions in neural networks called feed-forward wavelet networks to approach auditory localization information cues (head-related transfer functions (HRTFs) are used here). The experimental results demonstrate that the application of wavelets is more efficient and useful in 3-D audio simulation.