首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 22 毫秒
1.
This paper presents a geocast technique for underwater sensor networks. The model named as Routing and Multicast Tree based Geocasting (RMTG) (TRACE'10, Bhopal, India, 2010; ICWET'10, Mumbai, India, 2010) has been designed for underwater sensor networks. In our previous work (TRACE'10, Bhopal, India, 2010; ICWET'10, Mumbai, India, 2010) we proposed only a theoretical model for underwater geocasting. The RMTG technique uses greedy forwarding and previous hop handshaking to route the packets towards the geocast region and further disseminates the data within the geocast region by creating a multicast shortest path tree. We also presented various link broken scenarios along with their solutions. The proposed model does not use the flooding technique to deliver the packets inside the geocast region that is used in most of the geocasting techniques. In this paper, we present the simulated RMTG model. The simulation results show that the proposed model provides an efficient distribution of data in the geocast region in terms of node mobility handling, packet delivery ratio and a better end‐to‐end latency. Most of the work on geocasting has been done for mobile and vehicular ad hoc networks; hence we present in this paper a novel simulated model for underwater environment. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   

2.
Solution‐processed small‐molecule bulk heterojunction (BHJ) ambipolar organic thin‐film transistors are fabricated based on a combination of [2‐phenylbenzo[d,d']thieno[3,2‐b;4,5‐b']dithiophene (P‐BTDT) : 2‐(4‐n‐octylphenyl)benzo[d,d ']thieno[3,2‐b;4,5‐b']dithiophene (OP‐BTDT)] and C60. Treating high electrical performance vacuum‐deposited P‐BTDT organic semiconductors with a newly developed solution‐processed organic semiconductor material, OP‐BTDT, in an optimized ratio yields a solution‐processed p‐channel organic semiconductor blend with carrier mobility as high as 0.65 cm2 V?1 s?1. An optimized blending of P‐BTDT:OP‐BTDT with the n‐channel semiconductor, C60, results in a BHJ ambipolar transistor with balanced carrier mobilities for holes and electrons of 0.03 and 0.02 cm2 V?1 s?1, respectively. Furthermore, a complementary‐like inverter composed of two ambipolar thin‐film transistors is demonstrated, which achieves a gain of 115.  相似文献   

3.
The natural frequencies (f) as a function of the length (L) of single, multi‐walled carbon nanotubes (CNTs) are measured using the electric‐field‐induced resonance method together with the “nanoknife” technique for cutting nanotubes to the desired length. The experimental fL data for short CNTs are found to be adequately described by the Timoshenko beam model, but not by the widely‐used Euler‐Bernouilli beam model. The failure of the Euler‐Bernouilli beam model is due to its neglect of the significant effect of shear deformation caused by the extremely‐anisotropic mechanical properties of CNTs. The axial Young's modulus and radial shear modulus of CNTs are obtained simultaneously through fitting the experimental fL data with the Timoshenko beam model.  相似文献   

4.
We present an integrated approach to pricing and scheduling for services that are differentiated in terms of throughput, delay and loss specifications. The key building block to the model are quality value curves that specify a user's value of higher quality levels. From the analysis emerges a pricing rule that charges based on rate and quality grade, and a dynamic scheduling rule, called the Gcµ rule. The analysis also derives the economically optimal probabilistic quality of service (QoS) guarantee parameters. We compare our model to the deterministic approach of QoS guarantees using burstiness constraints and fair scheduling rules. The scheduling that arises from such a deterministic approach is the well‐known Generalized Processor Sharing (GPS). A comparative analysis inspires the fair Gcµ‐PS rule as the scheduling rule that combines the unique strengths of GPS and Gcµ. This Gcµ‐PS rule is proposed as a tailored scheduling solution for both the expedited forwarding class and the four assured forwarding classes in the IETF's differentiated services. Copyright © 2002 John Wiley & Sons, Ltd.  相似文献   

5.
In heterogeneous wireless networks, signal‐to‐interference‐plus‐noise ratio (SINR) suffers degradation due to strong interference received by users from offloaded macro base station (mBS). Similarly, cell‐edge users experience low SINR due to their distant locations. Moreover, small base stations (sBSs) located in the vicinity of mBS experience reduced coverage due to the high transmit power of mBS. To overcome these limitations, we use Stienen's model as a base station deployment strategy to improve network performance gain. More specifically, we use reverse frequency allocation (RFA) as an interference management scheme together with Stienen's model to significantly improve SINR, enhance edge user coverage, and avoid sBS deployment near the mBS. In the proposed set‐up, the available coverage region is divided into two noncontiguous regions, ie, center region and outer region. Furthermore, mBSs are uniformly distributed throughout the coverage region using independent Poisson point processes, while sBSs are deployed only in outer region using Poisson hole process (PHP). Closed‐form expressions for coverage probabilities are characterized for the proposed model. Numerical results show that the proposed scheme yields improved SINR with enhanced edge user coverage and requires fewer number of sBSs.  相似文献   

6.
In 2009, Lee and Chang proposed an electronic t‐out‐of‐n lottery protocol over the Internet based on the Chinese remainder theorem and blind signature. However, a security flaw exists in Lee–Chang's protocol that the lottery agent and the malicious purchaser can collude to control the winning result, which is unfair for the honest participants. On the basis of a verifiable random number generated by using the Lagrange interpolation formula over a finite field, an improved t‐out‐of‐n e‐lottery protocol is proposed, which guarantees that each participant can generate the winning result equally. The improved protocol achieves public verifiability and fairness without a trusted third party and a delaying function, which makes it more robust and more efficient. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   

7.
One of the unexplored research areas in Software Defined Networks (SDN) is load balancing of control messages (e.g. packet_in) among distributed controllers in Wide Area Networks. In SDN, on every unsuccessful match in the flow table for the incoming traffic flows, the switch sends packet_in to the controller for further action against the traffic flow. The packet_in messages are one of the major contributors of the control request (load) received by the controller. When it exceeds a certain threshold limit, the response time for the control request increases nonlinearly due to the over CPU utilization and congestion. When the controller gets overloaded, typically the OpenFlow‐enabled Devices (OFDevices) are migrated from the current controller to another under loaded controller domain. This migration might cause large degradation of end users' QoS metrics. To resolve this issue, we introduce basic demand and supply curve based DSSDN, a new load balancing method that utilizes the load factors of Software Defined Wide Area Networks controllers. This method selects the OFDevice which causes maximum load on the controller and traversing minimum users traffic through it. The Karush‐Kuhn‐Tucker conditions are employed during the optimal controller selection by the OFDevices to improve the response time effectively. During implementation, virtual threads running on the controller representing the OFDevices are used to take the optimal decision instead of actual OFDevices. The experimental results show that during migration, the DSSDN stabilizes the load hikes, improves QoS, and increase the end users' utility without much disruptions in the network state.  相似文献   

8.
Ultra‐high‐frequency radio‐frequency identification (UHF RFID) is widely applied in different industries. The Frame Slotted ALOHA in EPC C1G2 suffers severe collisions that limit the efficiency of tag recognition. An efficient full‐duplex anti‐collision scheme is proposed to reduce the rate of collision by coordinating the transmitting process of CDMA UWB uplink and UHF downlink. The relevant mathematical models are built to analyze the performance of the proposed scheme. Through simulation, some important findings are gained. The maximum number of identified tags in one slot is g/e (g is the number of PN codes and e is Euler's constant) when the number of tags is equal to mg (m is the number of slots). Unlike the Frame Slotted ALOHA, even if the frame size is small and the number of tags is large, there aren't too many collisions if the number of PN codes is large enough. Our approach with 7‐bit Gold codes, 15‐bit Gold codes, or 31‐bit Gold codes operates 1.4 times, 1.7 times, or 3 times faster than the CDMA Slotted ALOHA, respectively, and 14.5 times, 16.2 times, or 18.5 times faster than the EPC C1 G2 system, respectively. More than 2,000 tags can be processed within 300 ms in our approach.  相似文献   

9.
Andrea Kupfer Schneider, of Milwaukee, and Christopher Honeyman, of Madison, Wis., preview their comprehensive new anthology on reaching agreement, “The Negotiator's Fieldbook,” which will be published this month by the American Bar Association's Section of Dispute Resolution.  相似文献   

10.
For decades, hydrogen (H2) gas has been recognized as an excellent antioxidant molecule that holds promise in treating many diseases like Alzheimer's, stroke, cancer, and so on. For the first time, active hydrogen is demonstrated to be highly efficient in antibacterial, antibiofilm, and wound‐healing applications, in particular when used in combination with the photothermal effect. As a proof of concept, a biocompatible hydrogen‐releasing PdH nanohydride, displaying on‐demand controlled active hydrogen release property under near‐infrared laser irradiation, is fabricated by incorporating H2 into Pd nanocubes. The obtained PdH nanohydride combines both merits of bioactive hydrogen and photothermal effect of Pd, exhibiting excellent in vitro and in vivo antibacterial activities due to its synergistic hydrogen‐photothermal therapeutic effect. Interestingly, combinational hydrogen‐photothermal treatment is also proved to be an excellent therapeutic methodology in healing rats' wound with serious bacterial infection. Moreover, an in‐depth antibacterial mechanism study reveals that two potential pathways are involved in the synergistic hydrogen‐photothermal antibacterial effect. One is to upregulate bacterial metabolism relevant genes like dmpI, narJ, and nark, which subsequently encode more expression of oxidative metabolic enzymes to generate substantial reactive oxygen species to induce DNA damage and another is to cause severe bacterial membrane damage to release intracellular compounds like DNA.  相似文献   

11.
Traffic‐aware routing protocols have recently received considerable attention. This has been motivated by the role that it could play in extending the network's lifetime (or operational time) as it target the reservation of node's power and better utilisation of channel bandwidth, which could lead to performance improvement in terms of important performance metrics including throughput and end‐to‐end delay. Traffic‐aware techniques can be classified into two categories, namely end‐to‐end and on‐the‐spot, based on the way of establishing and maintaining routes between any source and destination. Although there has been much work on both categories, there has been no comparative performance study of the two approaches. To the best of our knowledge, this is the first work that carries out such a performance comparison. To this end, we have adapted our traffic‐aware technique namely load density to suggest a new ‘on‐the‐spot’ traffic‐aware technique. The main reason for doing this adaptation is to ensure that the comparison between the two approaches is fair and realistic. The study will reveal the main performance characteristics of the two approaches under various traffic and network conditions. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   

12.
This paper examines Vaudenay's privacy model, which is one of the first and most complete privacy models that featured the notion of different privacy classes. We enhance this model by introducing two new generic adversary classes, k‐strong and k‐forward adversaries where the adversary is allowed to corrupt a tag at most k times. Moreover, we introduce an extended privacy definition that also covers all privacy classes of Vaudenay's model. In order to achieve highest privacy level, we study low cost primitives such as physically unclonable functions (PUFs). The common assumption of PUFs is that their physical structure is destroyed once tampered. This is an ideal assumption because the tamper resistance depends on the ability of the attacker and the quality of the PUF circuits. In this paper, we have weakened this assumption by introducing a new definition k‐resistant PUFs. k‐PUFs are tamper resistant against at most k attacks; that is, their physical structure remains still functional and correct until at most kth physical attack. Furthermore, we prove that strong privacy can be achieved without public‐key cryptography using k PUF‐based authentication. We finally prove that our extended proposal achieves both reader authentication and k‐strong privacy. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

13.
Anonymous receiver encryption is an important cryptographic primitive. It allows a sender to use the public identities of multiple receivers to encrypt messages so that only the authorized receivers or a privileged set of users can decrypt the messages, and the identities of the receivers are not revealed. Recently, Zhang et al. proposed a novel anonymous multi‐receiver encryption scheme and claimed that their scheme could realize the receiver's identity privacy. Unfortunately, in this paper, we pointed out that the scheme by Zhang et al. did not achieve the anonymity of the receiver identity after analyzing the security of the scheme. At the same time, we give the corresponding attack. After analyzing the reason to produce such attacks, a novel anonymous multi‐receiver encryption scheme is given to achieve the anonymity of the receiver's identities. And we formally prove that the proposed scheme is semantically secure for confidentiality and receiver identities’ anonymity. The security of the scheme is based on decisional bilinear Diffie‐Hellman problem. Compared with the scheme by Zhang et al., Fan et al., Wang et al., and Chien et al., our scheme is shown to be better performance and robust security. To the best of our knowledge, our scheme is most efficient in terms of computational cost and communication overhead. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   

14.
In the current trend in telecommunications industry towards all‐internet‐protocol (IP) infrastructures, IP multimedia subsystem (IMS) plays a critical role by providing a coherent data and control‐plane solution for large‐scale live multimedia applications in a flexible and cost‐effective manner. On the other hand, such a large‐scale service platform would inevitably fail without effective support for the quality‐of‐service (QoS) requirements perceived by its users. Among the most important factors that influence user QoS are system performance and scalability. In this paper, a performance model for IMS systems is developed using the queueing Petri nets (QPNs) as the modeling formalism. The model's parameters are tuned based on the measurements carried out using a well‐known IMS implementation. The model is validated against the real system. During the model calibration, the Java garbage‐collector process used in the home subscriber‐server (HSS) implementation was found to be a main factor in the discrepancy between the model and the reality. In addition, the effects of other factors such as the network stack in the operating system are investigated. The validated model is employed to give insights into the scalability of every single instance of IMS implementation. The model is extended to study load balancing among multiple instances of HSS to remove the main bottleneck in the system. It provides a valuable platform for resource management of various components of the IMS ecosystem to support the intended level of QoS for the users.  相似文献   

15.
A low‐cost, non‐contact sensor that provides endpoint detectionfor each stage in a three‐stage CuInxGa1−xSe2 (CIGS( deposition is described. CIGS and precursoremissivity data providing the fundamental basis for the sensor's operation are presented. In situ operation of the sensor is outlined and sensor‐predicted film thickness, maximum Cu ratio during growth, as well as final Cu ratio are compared with those derived by other methods. Characteristics of the sensor relevant to automated and continuous processing are discussed. Copyright © 2005 John Wiley & Sons, Ltd.  相似文献   

16.
The current–voltage ( I–V ) characteristics of photovoltaic (PV) systems have always been a good indicator of the overall performance of a system. The aim of this paper is to give an overview and elucidate the use of the I–V characteristics of concentrator PV (CPV) modules and arrays as an important diagnostic tool to identify factors that lower a system's performance and the types of mismatch that exist between series‐connected single‐junction cells within a module. Possible causes for mismatch between cells include factors such as; misalignment of optical elements and cells, nonuniform cell material parameters, uneven cell illumination due to dew, dust or degradation of the secondary and main optical elements. The different types of mismatch typically found in CPV are categorized and their effects on the resultant module I–V curves are discussed and shown. The effect of bypass diodes on the module's I–V curves is also illustrated. This paper also reports on, and interprets I–V measurements that were recorded for a commercially available point‐focus concentrator module under various real outdoor conditions. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   

17.
We investigate the scattering behavior of nano‐textured ZnO–Air and ZnO–Silicon interfaces for the application in thin film silicon solar cells. Contrary to the common approach, the numerical solution of the Maxwell's equations, we introduce a ray tracing approach based on geometric optics and the measured interface topography. The validity of this model is discussed by means of scanning near‐field optical microscopy (SNOM) measurements and numerical solutions of the Maxwell's equations. We show, that the ray tracing model can qualitatively describe the formation of micro lenses, which are the dominant feature of the local scattering properties of the investigated interfaces. A quantitative analysis for the ZnO–Silicon interface at λ = 488 and 780 nm shows that the ray tracing model corresponds well to the numerical solution of the Maxwell's equations, especially within the first 1.5 µm distance from the interface. Direct correlations between the locally scattered intensity and the interface topographies are found. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   

18.
Shape‐memory polymers (SMPs) are self‐adjusting, smart materials in which shape changes can be accurately controlled at specific, tailored temperatures. In this study, the glass transition temperature (Tg) is adjusted between 28 and 55 °C through synthesis of copolymers of methyl acrylate (MA), methyl methacrylate (MMA), and isobornyl acrylate (IBoA). Acrylate compositions with both crosslinker densities and photoinitiator concentrations optimized at fractions of a mole percent demonstrate fully recoverable strains at 807% for a Tg of 28 °C, at 663% for a Tg of 37 °C, and at 553% for a Tg of 55 °C. A new compound, 4,4′‐di(acryloyloxy)benzil (referred to hereafter as Xini) in which both polymerizable and initiating functionalities are incorporated in the same molecule, was synthesized and polymerized into acrylate shape‐memory polymers, which were thermomechanically characterized yielding fully recoverable strains above 500%. The materials synthesized in this work were compared to an industry standard thermoplastic SMP, Mitsubishi's MM5510, which showed failure strains of similar magnitude, but without full shape recovery: residual strain after a single shape‐memory cycle caused large‐scale disfiguration. The materials in this study are intended to enable future applications where both recoverable high‐strain capacity and the ability to accurately and independently position Tg are required.  相似文献   

19.
Monitoring of in vivo drug release from nanotheranostics by noninvasive approaches remains very challenging. Herein, novel redox‐responsive polymeric magnetosomes (PolyMags) with tunable magnetic resonance imaging (MRI) properties are reported for in vivo drug release monitoring and effective dual‐modal cancer therapy. The encapsulation of doxorubicin (DOX) significantly decreases PolyMags' T2‐contrast enhancement and transverse relaxation rate R2, depending on the drug loading level. The T2 enhancement and R2 can be recovered once the drug is released upon PolyMags' disassembly. T2‐ and T2*‐MRI and diffusion‐weighted imaging (DWI) are utilized to quantitatively study the correlation between MRI signal changes and drug release, and discover the MR tuning mechanisms. The in vivo drug release pattern is visualized based on such tunable MRI capability via monitoring the changes in T2‐weighted images, T2 and T2* maps, and R2 and R2* values. Interestingly, the PolyMags possess excellent photothermal effect, which can be further enhanced upon DOX loading. The PolyMags are highly efficacious to treat breast tumors on xenograft model with tumor‐targeted photothermal‐ and chemotherapy, achieving a complete cure rate of 66.7%. The concept reported here is generally applicable to other micellar and liposomal systems for image‐guided drug delivery and release applications toward precision cancer therapy.  相似文献   

20.
This article demonstrates the tuning of the biological activity of a surface functionalized by a polyelectrolyte multilayer. The interaction of protein A with macrophages is used as the model system. The film consists of two polypeptides, poly(lysine) and poly(glutamic acid); each “build‐up” solution is a mixture of the respective D ‐ and L ‐enantiomers (d and l enantiomers). Cells are deposited on top of the film, and they produce tumor necrosis factor alpha (TNF‐α) as they come into contact with the protein. Depending upon the d/l‐enantiomer ratio of the polyelectrolyte solutions used for the film build‐up, and the embedding depth of the protein, the production of TNF‐α commences after a varying induction time and displays a transition from no‐production to full‐production, which takes place over a period of time that depends on the film's composition and embedding depth. Thus, it is shown that by changing these two parameters the timing of the protein's activity can be accurately tuned.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号