Traffic jam in large signalized road network presents a complex nature.In order to reveal the jam characteristics,two indexes,SVS(speed of virtual signal) and VOS(velocity of spillover),were proposed respectively.SVS ...Traffic jam in large signalized road network presents a complex nature.In order to reveal the jam characteristics,two indexes,SVS(speed of virtual signal) and VOS(velocity of spillover),were proposed respectively.SVS described the propagation of queue within a link while VOS reflected the spillover velocity of vehicle queue.Based on the two indexes,network jam simulation was carried out on a regular signalized road network.The simulation results show that:1) The propagation of traffic congestion on a signalized road network can be classified into two stages:virtual split driven stage and flow rate driven stage.The former stage is characterized by decreasing virtual split while the latter only depends on flow rate; 2) The jam propagation rate and direction are dependent on traffic demand distribution and other network parameters.The direction with higher demand gets more chance to be jammed.Our findings can serve as the basis of the prevention of the formation and propagation of network traffic jam.展开更多
To integrate the satellite communications with the LTE/5G services, the concept of Hybrid Satellite Terrestrial Relay Networks(HSTRNs) has been proposed. In this paper, we investigate the secure transmission in a HSTR...To integrate the satellite communications with the LTE/5G services, the concept of Hybrid Satellite Terrestrial Relay Networks(HSTRNs) has been proposed. In this paper, we investigate the secure transmission in a HSTRN where the eavesdropper can wiretap the transmitted messages from both the satellite and the intermediate relays. To effectively protect the message from wiretapping in these two phases, we consider cooperative jamming by the relays, where the jamming signals are optimized to maximize the secrecy rate under the total power constraint of relays. In the first phase, the Maximal Ratio Transmission(MRT) scheme is used to maximize the secrecy rate, while in the second phase, by interpolating between the sub-optimal MRT scheme and the null-space projection scheme, the optimal scheme can be obtained via an efficient one-dimensional searching method. Simulation results show that when the number of cooperative relays is small, the performance of the optimal scheme significantly outperforms that of MRT and null-space projection scheme. When the number of relays increases, the performance of the null-space projection approaches that of the optimal one.展开更多
The manner and conditions of running the decision-making system with self-defense electronic jamming are given. After proposing the scenario of applying discrete dynamic Bayesian network to the decision making with se...The manner and conditions of running the decision-making system with self-defense electronic jamming are given. After proposing the scenario of applying discrete dynamic Bayesian network to the decision making with self-defense electronic jamming, a decision-making model with self-defense electronic jamming based on the discrete dynamic Bayesian network is established. Then jamming decision inferences by the aid of the algorithm of discrete dynamic Bayesian network are carried on. The simulating result shows that this method is able to synthesize different targets which are not predominant. In this way, various features at the same time, as well as the same feature appearing at different time complement mutually; in addition, the accuracy and reliability of electronic jamming decision making are enhanced significantly.展开更多
This paper studies the force network properties of marginally and deeply jammed packings of frictionless soft particlesfrom the perspective of complex network theory. We generate zero-temperature granular packings at ...This paper studies the force network properties of marginally and deeply jammed packings of frictionless soft particlesfrom the perspective of complex network theory. We generate zero-temperature granular packings at different pressures by minimizing the inter-particle potential energy. The force networks are constructed as nodes representing particles and links representing normal forces between the particles. Deeply jammed solids show remarkably different behavior from marginally jammed solids in their degree distribution, strength distribution, degree correlation, and clustering coefficient. Bimodal and multi-modal distributions emerge when the system enters the deep jamming region. The results also show that small and large particles can show different correlation behavior in this simple system.展开更多
Jammers can awfully interfere with the wireless communications. The transmission and reception of wireless communication is blocked by the jammer. The intruder will place the jammer in a well topological network area ...Jammers can awfully interfere with the wireless communications. The transmission and reception of wireless communication is blocked by the jammer. The intruder will place the jammer in a well topological network area and they can easily track the information. It will help them to block the signal transmission and reception. Now, the intention is to track the position of the jammer where it is fixed. The existing methods rely on the indirect measurements and the boundary node to find the jammer’s position which degrades the accuracy of the localization. To improve the efficiency, this paper proposed an efficient method namely Coincered Node Based Localization of jammers to find the position of the jammer with high level of accuracy. The proposed system uses the direct measurements, which is the jammer signal strength. The effectiveness can also be increased by using the coincered node that will stumble across the true position of the jammer. The proposed work is compared with existing methods. Then the proposed mechanism proves better to find the jammer location. The simulation results estimate that the accuracy of the localization achieves better performance than the existing schemes.展开更多
In wireless sensor networks (WSNs), as the shared nature of the wireless medium, jam- ming attacks can be easily launched and result in a great damage to the network. How to deal with jamming attacks has become a gr...In wireless sensor networks (WSNs), as the shared nature of the wireless medium, jam- ming attacks can be easily launched and result in a great damage to the network. How to deal with jamming attacks has become a great concern recently. Finding the location of a jammer is important to take security actions against the jammer, and thus to restore the network communication. After a comprehensive study on the jammer localization problem, a lightweight easy-operated algorithm called triple circles localization (TCL) is proposed. The evaluation results have demonstrated that, compared with other approaches, TCL achieves the best jammer localization accuracy under variable conditions.展开更多
提出一种基于几何覆盖理论的Jamming攻击定位(GCL,geometry-covering based localization)算法。GCL算法利用计算几何中的凸壳理论,特别是最小包容圆方法,对Jamming攻击者进行定位。理论证明了该算法的正确性和较低的时间复杂度(O(nlogn...提出一种基于几何覆盖理论的Jamming攻击定位(GCL,geometry-covering based localization)算法。GCL算法利用计算几何中的凸壳理论,特别是最小包容圆方法,对Jamming攻击者进行定位。理论证明了该算法的正确性和较低的时间复杂度(O(nlogn));模拟实验表明,该算法在攻击者攻击范围、网络节点密度以及攻击者位置等度量值变化的情况下,比已有算法具有更好的定位准确度。展开更多
By minimizing the enthalpy of packings of frictionless particles, we obtain jammed solids at desired pressures and hence investigate the jamming transition with and without shear. Typical scaling relations of the jamm...By minimizing the enthalpy of packings of frictionless particles, we obtain jammed solids at desired pressures and hence investigate the jamming transition with and without shear. Typical scaling relations of the jamming transition are recovered in both cases. In contrast to systems without shear, shear-driven jamming transition occurs at a higher packing fraction and the jammed solids are more rigid with an anisotropic force network. Furthermore, by introducing the macrofriction coefficient, we propose an explanation of the packing fraction gap between sheared and non-sheared systems at fixed pressure.展开更多
In order to make the effective ECCM to the deceptive jamming, especially the angle deceptive jamming, this paper establishes a signal-processing model for anti-deceptive jamming firstly, in which two feature-extractin...In order to make the effective ECCM to the deceptive jamming, especially the angle deceptive jamming, this paper establishes a signal-processing model for anti-deceptive jamming firstly, in which two feature-extracting algorithms, i.e. the statistical algorithm and the neural network (NN) algorithm are presented, then uses the RBF NN as the classitier in the processing model. Finally the two algorithms are validated and compared through some simulations.展开更多
By minimizing a thermodynamic-like potential, we unbiasedly sample the potential energy landscape of soft and frictionless spheres under a constant shear stress. We obtain zero-temperature jammed states under desired ...By minimizing a thermodynamic-like potential, we unbiasedly sample the potential energy landscape of soft and frictionless spheres under a constant shear stress. We obtain zero-temperature jammed states under desired shear stresses and investigate their mechanical properties as a function of the shear stress. As a comparison, we also obtain the jammed states from the quasistatic-shear sampling in which the shear stress is not well-controlled. Although the yield stresses determined by both samplings show the same power-law scaling with the compression from the jamming transition point J at zero temperature and shear stress, for finite size systems the quasistatic-shear sampling leads to a lower yield stress and a higher critical volume fraction at point J. The shear modulus of the jammed solids decreases with increasing shear stress. However, the shear modulus does not decay to zero at yielding. This discontinuous change of the shear modulus implies the discontinuous nature of the unjamming transition under nonzero shear stress, which is further verified by the observation of a discontinuous jump in the pressure from the jammed solids to the shear flows. The pressure jump decreases upon decompression and approaches zero at the critical-like point J, in analogy with the well-known phase transitions under an external field. The analysis of the force networks in the jammed solids reveals that the force distribution is more sensitive to the increase of the shear stress near point J. The force network anisotropy increases with increasing shear stress. The weak particle contacts near the average force and under large shear stresses it exhibit an asymmetric angle distribution.展开更多
Traffic congestion is associated with increased environmental pollutions, as well as reduced socio-economic productivity due to significant delays in travel times. The consequences are worse in least developed countri...Traffic congestion is associated with increased environmental pollutions, as well as reduced socio-economic productivity due to significant delays in travel times. The consequences are worse in least developed countries where motorized road transport networks are often inefficiently managed in addition to being largely underdeveloped. Recent research on traffic congestion has mostly focused on infrastructural aspects of road networks, with little or no emphasis at all on motorists’ on-the-road behavior (MB). The current study thus aimed to bridge this knowledge gap by characterizing traffic jam incidents (TJI) observed over a period of 80 days in Uganda’s Capital City, Kampala. MB as well as road network infrastructural factors such as road blockage (RB), were captured for each of the observed TJI. A total of 483 peak-time TJI were recorded, and exploratory data analysis (EDA) subsequently performed on the TJI dataset. EDA involved Hierarchical clustering analysis (HCA) and K-means clustering of the TJI dataset, as well as a detailed descriptive statistical analysis of both the entire dataset and the emerging TJI clusters. A highlight finding of this study is that 48.2% of the observed TJIs were as a result of on-the-road motorist behavior. Furthermore, the intervention of traffic police officers in a bid to regulate traffic flow was equally responsible for 25.9% of the TJIs observed in this study. Overall, these results indicate that whereas road infrastructural improvement is warranted in order to improve traffic flow, introducing interventions to address inappropriate on-the-road motorists’ behavior could alone improve traffic flow in Kampala, by over 48%. Additionally, in-order to effectively regulate traffic flow in Kampala and other least developed cities with similar traffic congestion management practices, motorists’ on-the-road behavior ought to be factored into any data-driven mechanisms deployed to regulate traffic flow and thus potentially significantly curbing traffic congestion.展开更多
基金Project(2012CB725402)supported by the State Key Development Program for Basic Research of ChinaProject(2012MS21175)supported by the National Science Foundation for Post-doctoral Scientists of ChinaProject(Bsh1202056)supported by the Excellent Postdoctoral Science Foundation of Zhejiang Province,China
文摘Traffic jam in large signalized road network presents a complex nature.In order to reveal the jam characteristics,two indexes,SVS(speed of virtual signal) and VOS(velocity of spillover),were proposed respectively.SVS described the propagation of queue within a link while VOS reflected the spillover velocity of vehicle queue.Based on the two indexes,network jam simulation was carried out on a regular signalized road network.The simulation results show that:1) The propagation of traffic congestion on a signalized road network can be classified into two stages:virtual split driven stage and flow rate driven stage.The former stage is characterized by decreasing virtual split while the latter only depends on flow rate; 2) The jam propagation rate and direction are dependent on traffic demand distribution and other network parameters.The direction with higher demand gets more chance to be jammed.Our findings can serve as the basis of the prevention of the formation and propagation of network traffic jam.
基金supported in part by the National Natural Science Foundation of China under Grant No.61871032in part by Chinese Ministry of Education-China Mobile Communication Corporation Research Fund under Grant MCM20170101in part by the Open Research Fund of Key Laboratory of Cognitive Radio and Information Processing,Ministry of Education (Guilin University of Electronic Technology) under Grant CRKL190204
文摘To integrate the satellite communications with the LTE/5G services, the concept of Hybrid Satellite Terrestrial Relay Networks(HSTRNs) has been proposed. In this paper, we investigate the secure transmission in a HSTRN where the eavesdropper can wiretap the transmitted messages from both the satellite and the intermediate relays. To effectively protect the message from wiretapping in these two phases, we consider cooperative jamming by the relays, where the jamming signals are optimized to maximize the secrecy rate under the total power constraint of relays. In the first phase, the Maximal Ratio Transmission(MRT) scheme is used to maximize the secrecy rate, while in the second phase, by interpolating between the sub-optimal MRT scheme and the null-space projection scheme, the optimal scheme can be obtained via an efficient one-dimensional searching method. Simulation results show that when the number of cooperative relays is small, the performance of the optimal scheme significantly outperforms that of MRT and null-space projection scheme. When the number of relays increases, the performance of the null-space projection approaches that of the optimal one.
基金the National Natural Science Fundation of China (10377014).
文摘The manner and conditions of running the decision-making system with self-defense electronic jamming are given. After proposing the scenario of applying discrete dynamic Bayesian network to the decision making with self-defense electronic jamming, a decision-making model with self-defense electronic jamming based on the discrete dynamic Bayesian network is established. Then jamming decision inferences by the aid of the algorithm of discrete dynamic Bayesian network are carried on. The simulating result shows that this method is able to synthesize different targets which are not predominant. In this way, various features at the same time, as well as the same feature appearing at different time complement mutually; in addition, the accuracy and reliability of electronic jamming decision making are enhanced significantly.
基金supported by the National Natural Science Foundation of China (Grant No. 11034010)
文摘This paper studies the force network properties of marginally and deeply jammed packings of frictionless soft particlesfrom the perspective of complex network theory. We generate zero-temperature granular packings at different pressures by minimizing the inter-particle potential energy. The force networks are constructed as nodes representing particles and links representing normal forces between the particles. Deeply jammed solids show remarkably different behavior from marginally jammed solids in their degree distribution, strength distribution, degree correlation, and clustering coefficient. Bimodal and multi-modal distributions emerge when the system enters the deep jamming region. The results also show that small and large particles can show different correlation behavior in this simple system.
文摘Jammers can awfully interfere with the wireless communications. The transmission and reception of wireless communication is blocked by the jammer. The intruder will place the jammer in a well topological network area and they can easily track the information. It will help them to block the signal transmission and reception. Now, the intention is to track the position of the jammer where it is fixed. The existing methods rely on the indirect measurements and the boundary node to find the jammer’s position which degrades the accuracy of the localization. To improve the efficiency, this paper proposed an efficient method namely Coincered Node Based Localization of jammers to find the position of the jammer with high level of accuracy. The proposed system uses the direct measurements, which is the jammer signal strength. The effectiveness can also be increased by using the coincered node that will stumble across the true position of the jammer. The proposed work is compared with existing methods. Then the proposed mechanism proves better to find the jammer location. The simulation results estimate that the accuracy of the localization achieves better performance than the existing schemes.
文摘In wireless sensor networks (WSNs), as the shared nature of the wireless medium, jam- ming attacks can be easily launched and result in a great damage to the network. How to deal with jamming attacks has become a great concern recently. Finding the location of a jammer is important to take security actions against the jammer, and thus to restore the network communication. After a comprehensive study on the jammer localization problem, a lightweight easy-operated algorithm called triple circles localization (TCL) is proposed. The evaluation results have demonstrated that, compared with other approaches, TCL achieves the best jammer localization accuracy under variable conditions.
文摘提出一种基于几何覆盖理论的Jamming攻击定位(GCL,geometry-covering based localization)算法。GCL算法利用计算几何中的凸壳理论,特别是最小包容圆方法,对Jamming攻击者进行定位。理论证明了该算法的正确性和较低的时间复杂度(O(nlogn));模拟实验表明,该算法在攻击者攻击范围、网络节点密度以及攻击者位置等度量值变化的情况下,比已有算法具有更好的定位准确度。
基金supported by the National Natural Science Foundation of China(Grant Nos.11702289,11734014,and 11574278)the Anhui Provincial Natural Science Foundation(Grant No.1708085QA07)
文摘By minimizing the enthalpy of packings of frictionless particles, we obtain jammed solids at desired pressures and hence investigate the jamming transition with and without shear. Typical scaling relations of the jamming transition are recovered in both cases. In contrast to systems without shear, shear-driven jamming transition occurs at a higher packing fraction and the jammed solids are more rigid with an anisotropic force network. Furthermore, by introducing the macrofriction coefficient, we propose an explanation of the packing fraction gap between sheared and non-sheared systems at fixed pressure.
文摘In order to make the effective ECCM to the deceptive jamming, especially the angle deceptive jamming, this paper establishes a signal-processing model for anti-deceptive jamming firstly, in which two feature-extracting algorithms, i.e. the statistical algorithm and the neural network (NN) algorithm are presented, then uses the RBF NN as the classitier in the processing model. Finally the two algorithms are validated and compared through some simulations.
基金supported by the National Natural Science Foundation of China(Grant No.21325418)the National Basic Research Program of China(GrantNo.2012CB821500)+1 种基金the Chinese Academy of Sciences 100-Talent Program(Grant No.2030020004)the Fundamental Research Funds for the Central Universities,China(Grant No.2340000034)
文摘By minimizing a thermodynamic-like potential, we unbiasedly sample the potential energy landscape of soft and frictionless spheres under a constant shear stress. We obtain zero-temperature jammed states under desired shear stresses and investigate their mechanical properties as a function of the shear stress. As a comparison, we also obtain the jammed states from the quasistatic-shear sampling in which the shear stress is not well-controlled. Although the yield stresses determined by both samplings show the same power-law scaling with the compression from the jamming transition point J at zero temperature and shear stress, for finite size systems the quasistatic-shear sampling leads to a lower yield stress and a higher critical volume fraction at point J. The shear modulus of the jammed solids decreases with increasing shear stress. However, the shear modulus does not decay to zero at yielding. This discontinuous change of the shear modulus implies the discontinuous nature of the unjamming transition under nonzero shear stress, which is further verified by the observation of a discontinuous jump in the pressure from the jammed solids to the shear flows. The pressure jump decreases upon decompression and approaches zero at the critical-like point J, in analogy with the well-known phase transitions under an external field. The analysis of the force networks in the jammed solids reveals that the force distribution is more sensitive to the increase of the shear stress near point J. The force network anisotropy increases with increasing shear stress. The weak particle contacts near the average force and under large shear stresses it exhibit an asymmetric angle distribution.
文摘Traffic congestion is associated with increased environmental pollutions, as well as reduced socio-economic productivity due to significant delays in travel times. The consequences are worse in least developed countries where motorized road transport networks are often inefficiently managed in addition to being largely underdeveloped. Recent research on traffic congestion has mostly focused on infrastructural aspects of road networks, with little or no emphasis at all on motorists’ on-the-road behavior (MB). The current study thus aimed to bridge this knowledge gap by characterizing traffic jam incidents (TJI) observed over a period of 80 days in Uganda’s Capital City, Kampala. MB as well as road network infrastructural factors such as road blockage (RB), were captured for each of the observed TJI. A total of 483 peak-time TJI were recorded, and exploratory data analysis (EDA) subsequently performed on the TJI dataset. EDA involved Hierarchical clustering analysis (HCA) and K-means clustering of the TJI dataset, as well as a detailed descriptive statistical analysis of both the entire dataset and the emerging TJI clusters. A highlight finding of this study is that 48.2% of the observed TJIs were as a result of on-the-road motorist behavior. Furthermore, the intervention of traffic police officers in a bid to regulate traffic flow was equally responsible for 25.9% of the TJIs observed in this study. Overall, these results indicate that whereas road infrastructural improvement is warranted in order to improve traffic flow, introducing interventions to address inappropriate on-the-road motorists’ behavior could alone improve traffic flow in Kampala, by over 48%. Additionally, in-order to effectively regulate traffic flow in Kampala and other least developed cities with similar traffic congestion management practices, motorists’ on-the-road behavior ought to be factored into any data-driven mechanisms deployed to regulate traffic flow and thus potentially significantly curbing traffic congestion.