首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
There has been much talk over the past two decades about commercialization of the mobile ad hoc network (MANET) technology. Potential ad hoc network applications with some commercial appeal are now finally emerging, “drafted” by the enormously successful wireless LAN technology. Closely coupled to commercial applications and critically dependent on commercial ad hoc networks will be the “pervasive computing” applications. Since military and civilian emergency MANETs have been around for over three decades, and since the Government has continuously supported MANET research for as many years, it may seem natural to assume that all the research has already been done and that commercial MANETs can be deployed by simply leveraging the military and civilian research results. Unfortunately, there is a catch. Commercial MANETs (and therefore pervasive computing applications) will evolve in a way totally different from their military counterparts. Most importantly, they will start small, and will initially be tethered to the Internet. They will be extremely cost-aware. They will also need to cater to a variety of different applications. This is in sharp contrast with the large scale, autonomous, special purpose and cost insensitive military networks. In this paper we review a typical “battlefield” MANET application and contrast it to two emerging commercial MANET scenarios—the urban vehicle grid and the Campus network. We compare characteristics and design goals and make the case for new research to help kick off commercial MANETs. In particular we argue that P2P technology will be critical in the early evolution of commercial MANETs and identify research directions for P2P MANETs.  相似文献   

2.
“Fuzzy Functions” are proposed to be determined by the least squares estimation (LSE) technique for the development of fuzzy system models. These functions, “Fuzzy Functions with LSE” are proposed as alternate representation and reasoning schemas to the fuzzy rule base approaches. These “Fuzzy Functions” can be more easily obtained and implemented by those who are not familiar with an in-depth knowledge of fuzzy theory. Working knowledge of a fuzzy clustering algorithm such as FCM or its variations would be sufficient to obtain membership values of input vectors. The membership values together with scalar input variables are then used by the LSE technique to determine “Fuzzy Functions” for each cluster identified by FCM. These functions are different from “Fuzzy Rule Base” approaches as well as “Fuzzy Regression” approaches. Various transformations of the membership values are included as new variables in addition to original selected scalar input variables; and at times, a logistic transformation of non-scalar original selected input variables may also be included as a new variable. A comparison of “Fuzzy Functions-LSE” with Ordinary Least Squares Estimation (OLSE)” approach show that “Fuzzy Function-LSE” provide better results in the order of 10% or better with respect to RMSE measure for both training and test cases of data sets.  相似文献   

3.
The speed and convenience of the Internet has facilitated dynamic development in electronic commerce in recent years. E-commerce technologies and applications are widely studied by expert researchers. Mobile agent is considered to have high potential in e-commerce; it has been attracting wide attention in recent years. Mobile agent has high autonomy and mobility; it can move unbridled in different runtime environments carrying out assigned tasks while automatically detecting its current environment and responding accordingly. The above qualities make mobile agent very suitable for use in e-commerce. The Internet is an open environment, but transfer of confidential data should be conducted only over a secure environment. So, to transfer information over the Internet, a secure Internet environment is absolutely essential. Therefore, the security of present Internet environment must be improved. During its execution, a mobile agent needs to roam around on the Internet between different servers, and it may come in contact with other mobile agents or hosts; it may also need to interact with them. So, a mobile agent might come to harm when it meets a malicious host, and the confidentiality of data could also be compromised. To tackle the above problems, this paper proposes a security scheme for mobile agents. It is designed to ensure the safety of mobile agents on the Internet, and it also has access control and key management to ensure security and data confidentiality. Volker and Mehrdad [R. Volker, J.S. Mehrdad, Access Control and Key Management for Mobile Agents, “Computer Graphics”, Vol. 22, No. 4, August 1998, pp. 457–461] have already proposed an access control and key management scheme for mobile agents, but it needs large amount of space. So, this paper proposes a new scheme that uses the concepts of Chinese Remainder Theorem [F.H. Kuo, V.R.L. Shen, T.S. Chen, F. Lai, A Cryptographic Key Assignment Scheme for Dynamic Access Control in a User Hierarchy, “IEE Proceeding on Computers & Digital Techniques”, Vol. 146, No. 5, Sept. 1999, pp. 235–240., T.S. Chen, Y.F. Chung, Hierarchical Access Control Based on Chinese Remainder Theorem and Symmetric Algorithm, ”Computers & Security”, Vol. 21, No. 6, 2002, pp. 565–570., U.P. Lei, S.C. Wang, A Study of the Security of Mambo et al.'s Proxy Signature Scheme Based on the Discrete Logarithm Problem, June 2004], hierarchical structure and Superkey [S.G. Akl, P.D. Taylor, Cryptographic Solution to a Problem of Access Control in a Hierarchy, “ACM Transactions on Computer Systems”, Vol. 1, No. 3, August 1983, pp. 239–248]. A security and performance analysis of the proposed scheme shows that the scheme effectively protects mobile agents.  相似文献   

4.
A crucial step in the modeling of a system is to determine the values of the parameters to use in the model. In this paper we assume that we have a set of measurements collected from an operational system, and that an appropriate model of the system (e.g., based on queueing theory) has been developed. Not infrequently proper values for certain parameters of this model may be difficult to estimate from available data (because the corresponding parameters have unclear physical meaning or because they cannot be directly obtained from available measurements, etc.). Hence, we need a technique to determine the missing parameter values, i.e., to calibrate the model.As an alternative to unscalable “brute force” technique, we propose to view model calibration as a non-linear optimization problem with constraints. The resulting method is conceptually simple and easy to implement. Our contribution is twofold. First, we propose improved definitions of the “objective function” to quantify the “distance” between performance indices produced by the model and the values obtained from measurements. Second, we develop a customized derivative-free optimization (DFO) technique whose original feature is the ability to allow temporary constraint violations. This technique allows us to solve this optimization problem accurately, thereby providing the “right” parameter values. We illustrate our method using two simple real-life case studies.  相似文献   

5.
A mobile ad hoc network (MANET) is a collection of mobile hosts that form a temporary network on the fly without using any fixed infrastructure. Recently, the explosive growth in the use of real-time applications on mobile devices has resulted in new challenges to the design of protocols for MANETs. Chief among these challenges to enable real-time applications for MANETs is incorporating support for quality of service (QoS), such as bandwidth constraints. However, MANETs having a high ratio of topology change make routing especially unstable; making stability is an important challenge, especially for routing having a quality of service provision. In this paper, we propose a reliable multi-path QoS routing (RMQR) protocol with a slot assignment scheme. In this scheme, we examine the QoS routing problem associated with searching for a reliable multi-path (or uni-path) QoS route from a source node to a destination node in a MANET. This route must also satisfy certain bandwidth requirements. We determine the route expiration time between two connected mobile nodes using global positioning system (GPS). Then, two parameters, the route expiration time and the number of hops, are used to select a routing path with low latency and high stability. Simulation results show that the proposed RMQR protocol have some outstanding properties when compared with Lin's [Lin C-R. On-demand QoS routing in multihop mobile networks. In: Proceedings of the twentieth annual joint conference of the IEEE computer and communications societies (INFOCOM), vol. 3(22–26), 2001, p. 1735–44], Liao's [Liao W-H, Tseng Y-C, Wang S-L, Sheu J-P. A multi-path QoS routing protocol in a wireless mobile Ad Hoc network. Telecommunication Systems 2002;19(3–4):329–47], and Chen's [Chen Y-S, Tseng Y-C, Sheu J-P, Kuo P-H. An on-demand, link-state, multi-path QoS routing in a wireless mobile Ad-Hoc network. Computer Communications 204;27(1):27–40] protocols.  相似文献   

6.
An investigation of a fault diagnostic technique for internal combustion engines using discrete wavelet transform (DWT) and neural network is presented in this paper. Generally, sound emission signal serves as a promising alternative to the condition monitoring and fault diagnosis in rotating machinery when the vibration signal is not available. Most of the conventional fault diagnosis techniques using sound emission and vibration signals are based on analyzing the signal amplitude in the time or frequency domain. Meanwhile, the continuous wavelet transform (CWT) technique was developed for obtaining both time-domain and frequency-domain information. Unfortunately, the CWT technique is often operated over a longer computing time. In the present study, a DWT technique which is combined with a feature selection of energy spectrum and fault classification using neural network for analyzing fault signal is proposed for improving the shortcomings without losing its original property. The features of the sound emission signal at different resolution levels are extracted by multi-resolution analysis and Parseval’s theorem [Gaing, Z. L. (2004). Wavelet-based neural network for power disturbance recognition and classification. IEEE Transactions on Power Delivery 19, 1560–1568]. The algorithm is obtained from previous work by Daubechies [Daubechies, I. (1988). Orthonormal bases of compactly supported wavelets. Communication on Pure and Applied Mathematics 41, 909–996.], the“db4”, “db8” and “db20” wavelet functions are adopted to perform the proposed DWT technique. Then, these features are used for fault recognition using a neural network. The experimental results indicated that the proposed system using the sound emission signal is effective and can be used for fault diagnosis of various engine operating conditions.  相似文献   

7.
In this paper, we propose a new encoding technique that combines the different physicochemical properties of amino acids together with Needleman–Wunsch algorithm. The algorithm was tested in the recognition of T-cell epitopes. A series of SVM classifiers, where each SVM is trained using a different physicochemical property, combined with the “max rule” enables us to obtain an improvement over the state-of-the-art approaches.  相似文献   

8.
This paper presents a new procedure to compute many or all of the eigenvalues and eigenvectors of symmetric Toeplitz matrices. The key to this algorithm is the use of the “Shift–and–Invert” technique applied with iterative methods, which allows the computation of the eigenvalues close to a given real number (the “shift”). Given an interval containing all the desired eigenvalues, this large interval can be divided in small intervals. Then, the “Shift–and–Invert” version of an iterative method (Lanczos method, in this paper) can be applied to each subinterval. Since the extraction of the eigenvalues of each subinterval is independent from the other subintervals, this method is highly suitable for implementation in parallel computers. This technique has been adapted to symmetric Toeplitz problems, using the symmetry exploiting Lanczos process proposed by Voss [H. Voss, A symmetry exploiting Lanczos method for symmetric Toeplitz matrices, Numerical Algorithms 25 (2000) 377–385] and using fast solvers for the Toeplitz linear systems that must be solved in each Lanczos iteration. The method compares favourably with ScaLAPACK routines, specially when not all the spectrum must be computed.  相似文献   

9.
Efficient constrained local model fitting for non-rigid face alignment   总被引:1,自引:1,他引:0  
Active appearance models (AAMs) have demonstrated great utility when being employed for non-rigid face alignment/tracking. The “simultaneous” algorithm for fitting an AAM achieves good non-rigid face registration performance, but has poor real time performance (2–3 fps). The “project-out” algorithm for fitting an AAM achieves faster than real time performance (>200 fps) but suffers from poor generic alignment performance. In this paper we introduce an extension to a discriminative method for non-rigid face registration/tracking referred to as a constrained local model (CLM). Our proposed method is able to achieve superior performance to the “simultaneous” AAM algorithm along with real time fitting speeds (35 fps). We improve upon the canonical CLM formulation, to gain this performance, in a number of ways by employing: (i) linear SVMs as patch-experts, (ii) a simplified optimization criteria, and (iii) a composite rather than additive warp update step. Most notably, our simplified optimization criteria for fitting the CLM divides the problem of finding a single complex registration/warp displacement into that of finding N simple warp displacements. From these N simple warp displacements, a single complex warp displacement is estimated using a weighted least-squares constraint. Another major advantage of this simplified optimization lends from its ability to be parallelized, a step which we also theoretically explore in this paper. We refer to our approach for fitting the CLM as the “exhaustive local search” (ELS) algorithm. Experiments were conducted on the CMU MultiPIE database.  相似文献   

10.
In order to remove the cell size limitation and to make cellular manufacturing systems more flexible, a manufacturing cell has been equipped with a mobile robot which moves from machine to machine, much like its human counterpart would do. To further acquire a portion of the attributes (intelligence and adaptability of the human worker) lost in robotizing the traditional manned manufacturing cell, a “limited” knowledge-based cell control algorithm is developed. This algorithm maintains standard pull control logic as its underlying basis while utilizing heuristically, knowledge of the ongoing processes and their current status. In this paper, an analysis of this ‘new’ predictive pull-based controller is presented. The simulation results from the predictive pull-based controller are evaluated and compared with the standard pull control logic, first come first serve and shortest distance. A test-bed of an unmanned manufacturing cell with a self-propelled mobile robot was used for experimental verification. Simulation and experimental results show that the degree of improvements gained in the cell performance over the standard pull control method is dependent on the robot’s mobility velocity and how much part inspection/part rejection is performed within the cell. In conclusion, the predictive pull-based algorithm is relatively simple variation of pull control which has the ability of enhancing the “near optimal” pull cell control performance.  相似文献   

11.
Network flow control under capacity constraints: A case study   总被引:1,自引:0,他引:1  
In this paper, we demonstrate how tools from nonlinear system theory can play an important role in tackling “hard nonlinearities” and “unknown disturbances” in network flow control problems. Specifically, a nonlinear control law is presented for a communication network buffer management model under physical constraints. Explicit conditions are identified under which the problem of asymptotic regulation of a class of networks against unknown inter-node traffic is solvable, in the presence of control input and state saturation. The conditions include a Lipschitz-type condition and a “PE” condition. Under these conditions, we achieve either asymptotic or practical regulation for a single-node system. We also propose a decentralized, discontinuous control law to achieve (global) asymptotic regulation of large-scale networks. Our main result on controlling large-scale networks is based on an interesting extension of the well-known Young's inequality for the case with saturation nonlinearities. We present computer simulations to illustrate the effectiveness of the proposed flow control schemes.  相似文献   

12.
A novel optimization approach for minimum cost design of trusses   总被引:1,自引:0,他引:1  
This paper describes new optimization strategies that offer significant improvements in performance over existing methods for bridge-truss design. In this study, a real-world cost function that consists of costs on the weight of the truss and the number of products in the design is considered. We propose a new sizing approach that involves two algorithms applied in sequence – (1) a novel approach to generate a “good” initial solution and (2) a local search that attempts to generate the optimal solution by starting with the final solution from the previous algorithm. A clustering technique, which identifies members that are likely to have the same product type, is used with cost functions that consider a cost on the number of products. The proposed approach gives solutions that are much lower in cost compared to those generated in a comprehensive study of the same problem using genetic algorithms (GA). Also, the number of evaluations needed to arrive at the optimal solution is an order of magnitude lower than that needed in GAs. Since existing optimization techniques use cost functions like those of minimum-weight truss problems to illustrate their performance, the proposed approach is also applied to the same examples in order to compare its relative performance. The proposed approach is shown to generate solutions of not only better quality but also much more efficiently. To highlight the use of this sizing approach in a broader optimization framework, a simple geometry optimization algorithm that uses the sizing approach is presented. This algorithm is also shown to provide solutions better than the existing results in literature.  相似文献   

13.
Due to the continuous mobility of hosts, an ad hoc network suffers from frequent disconnections. This phenomenon is undesirable when mobile hosts are accessing data from each other, and thus, data accessibility is lower than that in conventional fixed networks. Because one cannot control network disconnections, an alternative solution to this problem is to replicate data objects onto mobile hosts so that when disconnections occur, mobile hosts can still access data. In this paper, a mathematical model for data object replication in ad hoc networks is formulated. The derived model is general, flexible and adaptable to cater for various applications in ad hoc networks. We prove that this problem in general is NP-complete and propose a game theoretical technique in which players (mobile hosts) continuously compete in a non-cooperative environment to improve data accessibility by replicating data objects. The technique incorporates the access frequency from mobile hosts to each data object, the status of the network connectivity, and communication costs. In the proposed scheme, players (mobile hosts) compete through bids in a non-cooperative environment to replicate data objects that are beneficial to themselves and the system as a whole. To cater for the possibility of cartel type behavior of the players, the scheme uses the Vickrey payment protocol that leaves the players with no option than to bid in such a fashion that is beneficial to the system as a whole. The paper also identifies some useful properties of the proposed scheme and the necessary conditions of optimality. The proposed technique is extensively evaluated against some well-known ad hoc network replica allocation methods, such as: (a) randomized, (b) extended static access frequency, (c) extended dynamic access frequency and neighborhood, and (d) extended dynamic connectivity grouping. The experimental results reveal that the proposed approach outperforms the four techniques in solution quality and projects a competitive execution time.  相似文献   

14.
Some computationally hard problems, e.g., deduction in logical knowledge bases– are such that part of an instance is known well before the rest of it, and remains the same for several subsequent instances of the problem. In these cases, it is useful to preprocess off-line this known part so as to simplify the remaining on-line problem. In this paper we investigate such a technique in the context of intractable, i.e., NP-hard, problems. Recent results in the literature show that not all NP-hard problems behave in the same way: for some of them preprocessing yields polynomial-time on-line simplified problems (we call them compilable), while for other ones their compilability implies some consequences that are considered unlikely. Our primary goal is to provide a sound methodology that can be used to either prove or disprove that a problem is compilable. To this end, we define new models of computation, complexity classes, and reductions. We find complete problems for such classes, “completeness” meaning they are “the less likely to be compilable.” We also investigate preprocessing that does not yield polynomial-time on-line algorithms, but generically “decreases” complexity. This leads us to define “hierarchies of compilability,” that are the analog of the polynomial hierarchy. A detailed comparison of our framework to the idea of “parameterized tractability” shows the differences between the two approaches.  相似文献   

15.
Toward an understanding of the behavioral intention to use mobile banking   总被引:19,自引:2,他引:19  
Although millions of dollars have been spent on building mobile banking systems, reports on mobile banking show that potential users may not be using the systems, despite their availability. Thus, research is needed to identify the factors determining users' acceptance of mobile banking. While there has been considerable research on the technology acceptance model (TAM) that predicts whether individuals will accept and voluntarily use information systems, limitations of the TAM include the omission of an important trust-based construct in the context of electronic/mobile commerce, and the assumption that there are no barriers preventing an individual from using an IS if he or she chooses to do so. Based on literature relating to the theory of planned behavior (TPB) and the TAM, this study extends the applicability of the TAM in a mobile banking context, by adding one trust-based construct (“perceived credibility”) and two resource-based constructs (“perceived self-efficacy” and “perceived financial cost”) to the model, while paying careful attention to the placing of these constructs in the TAM's existing nomological structure. Data collected from 180 users in Taiwan were tested against the extended TAM, using the structural equation modeling approach. The results strongly support the extended TAM in predicting users' intentions to adopt mobile banking. Several implications for IT/IS acceptance research and mobile banking management practices are discussed.  相似文献   

16.
Due to mobility of wireless hosts, routing in mobile ad-hoc networks (MANETs) is a challenging task. Multipath routing is employed to provide reliable communication, load balancing, and improving quality of service of MANETs. Multiple paths are selected to be node-disjoint or link-disjoint to improve transmission reliability. However, selecting an optimal disjoint multipath set is an NP-complete problem. Neural networks are powerful tools for a wide variety of combinatorial optimization problems. In this study, a transient chaotic neural network (TCNN) is presented as multipath routing algorithm in MANETs. Each node in the network can be equipped with a neural network, and all the network nodes can be trained and used to obtain optimal or sub-optimal high reliable disjoint paths. This algorithm can find both node-disjoint and link-disjoint paths with no extra overhead. The simulation results show that the proposed method can find the high reliable disjoint path set in MANETs. In this paper, the performance of the proposed algorithm is compared to the shortest path algorithm, disjoint path set selection protocol algorithm, and Hopfield neural network (HNN)-based model. Experimental results show that the disjoint path set reliability of the proposed algorithm is up to 4.5 times more than the shortest path reliability. Also, the proposed algorithm has better performance in both reliability and the number of paths and shows up to 56% improvement in path set reliability and up to 20% improvement in the number of paths in the path set. The proposed TCNN-based algorithm also selects more reliable paths as compared to HNN-based algorithm in less number of iterations.  相似文献   

17.
Regular (tree) model checking (RMC) is a promising generic method for formal verification of infinite-state systems. It encodes configurations of systems as words or trees over a suitable alphabet, possibly infinite sets of configurations as finite word or tree automata, and operations of the systems being examined as finite word or tree transducers. The reachability set is then computed by a repeated application of the transducers on the automata representing the currently known set of reachable configurations. In order to facilitate termination of RMC, various acceleration schemas have been proposed. One of them is a combination of RMC with the abstract-check-refine paradigm yielding the so-called abstract regular model checking (ARMC). ARMC has originally been proposed for word automata and transducers only and thus for dealing with systems with linear (or easily linearisable) structure. In this paper, we propose a generalisation of ARMC to the case of dealing with trees which arise naturally in a lot of modelling and verification contexts. In particular, we first propose abstractions of tree automata based on collapsing their states having an equal language of trees up to some bounded height. Then, we propose an abstraction based on collapsing states having a non-empty intersection (and thus “satisfying”) the same bottom-up tree “predicate” languages. Finally, we show on several examples that the methods we propose give us very encouraging verification results.  相似文献   

18.
Software co-evolution can be characterised as a way to “adjust” any given software implementation to a change (“shift”) in the software requirements. In this paper, we propose a formal definition of evolution complexity to precisely quantify the cost of adjusting a particular implementation to a change (“shift”) in the requirements. As a validation, we show that this definition formalises intuition about the evolvability of design patterns.  相似文献   

19.
Online systems have come to be heavily used in education, particularly for online learning and collecting information not otherwise readily available. Most e-learning systems, including interactive learning systems, have been designed to “push” course materials to students but rarely to “collect” or “pull” ideas from them. The interactive mechanisms in proposed instructional design models, however, prevent many potential designers from improving course quality, even though some believe that the learning experience and the comments of students are important for enhancing course materials. As well, students could actually contribute to instructional design.This paper presents a course material enhancement process that elicits ideas from students by encouraging students to modify course materials. This process had been tested on different higher education programs, both graduate and undergraduate. It aims to understand which programs’ students have a higher willingness to participate in this work and if they can benefit from this process. To facilitate this research, an asynchronous interaction system, teacher digital assistant (TDA), was designed for teachers to receive responses, recommendations, and modified materials from students at any time. The major advantage of this process is that it could embed students’ thoughts into the course material to improve the curriculum, which can benefit future students.  相似文献   

20.
Shortest distance and reliability of probabilistic networks   总被引:1,自引:0,他引:1  
When the “length” of a link is not deterministic and is governed by a stochastic process, the “shortest” path between two points in the network is not necessarily always composed of the same links and depends on the state of the network. For example, in communication and transportation networks, the travel time on a link is not deterministic and the fastest path between two points is not fixed. This paper presents an algorithm to compute the expected shortest travel time between two nodes in the network when the travel time on each link has a given independent discrete probability distribution. The algorithm assumes the knowledge of all the paths between two nodes and methods to determine the paths are referenced.In reliability (i.e. the probability that two given points are connected by a path) computations, associated with each link is a probability of “failure” and a probability of “success”. Since “failure” implies infinite travel time, the algorithm simultaneously computes reliability. The paper also discusses the algorithm's capability to simultaneously compute some other performance measures which are useful in the analysis of emergency services operating on a network.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号