提出一种在机会网络中基于周期性间歇连通的数据传输策略PICD(periodic intermittently connected-based data delivery in opportunistic networks).通过有效利用节点间的周期间歇连通性改善数据传输性能.节点传输概率的计算则充分考...提出一种在机会网络中基于周期性间歇连通的数据传输策略PICD(periodic intermittently connected-based data delivery in opportunistic networks).通过有效利用节点间的周期间歇连通性改善数据传输性能.节点传输概率的计算则充分考虑了其与汇聚点间存在的间歇多跳路径,并将其与消息容忍的传输延迟相结合.首先,采用随机动态规划的方法建立与延迟相关的传输概率模型;然后,通过基于多跳的函数空间迭代法求出一个周期内的与延迟相关的传输概率分布矩阵;节点面向不同消息延迟的传输概率则基于分布矩阵计算获得,以此作为选择下一跳的依据.与延迟相关的概率转发机制提高了消息在容忍的延迟内被成功递交的可能.仿真实验结果表明,与现有的几种数据传输算法相比,在节点具有循环运动特征的环境下,PICD具有较高的数据传输成功率和较低的递交延迟.展开更多
生产过程中紧急订单的到来会影响现有调度方案,甚至造成订单延期交货。以订单延迟交付时间最小为目标,构建带有插单问题的调度模型,使用改进果蝇优化算法(improved fruit fly optimization algorithm,IFOA)寻求带有插单问题的调度最优...生产过程中紧急订单的到来会影响现有调度方案,甚至造成订单延期交货。以订单延迟交付时间最小为目标,构建带有插单问题的调度模型,使用改进果蝇优化算法(improved fruit fly optimization algorithm,IFOA)寻求带有插单问题的调度最优解。考虑三个特征参数建立三维优先级列表来确定订单的优先级从而指导初始中心果蝇的产生,并采用NEH启发式算法和交换策略来寻求周围新个体果蝇,采用基于工序的单层整数编码方式进行编码。使用算例进行测试,插入的紧急订单能够被合理安排,且在求解质量方面IFOA优于顺延插单算法,求解速度方面IFOA优于退单插单算法。展开更多
Nowadays, the major part and most standard networks usually used in several applications are Wireless Sensor Networks (WSNs). It consists of different nodes which communicate each other for data transmission. There is...Nowadays, the major part and most standard networks usually used in several applications are Wireless Sensor Networks (WSNs). It consists of different nodes which communicate each other for data transmission. There is no access point to control the nodes in the network. This makes the network to undergo severe attacks from both passive and active devices. Due to this attack, the network undergoes downgrade performance. To overcome these attacks, security based routing protocol is proposed with the security based wormhole detection scheme. This scheme comprises of two phases. In this approach, the detection of wormhole attacks is deployed for having correct balance between safe route and stability. Also, to ensure packets integrity cryptographic scheme is used as well as authenticity while travelling from source to destination nodes. By extensive simulation, the proposed scheme achieves enhanced performance of packet delivery ratio, end to end delay, throughput and overhead than the existing schemes.展开更多
Ad hoc mobile cloud computing networks are affected by various issues,like delay,energy consumption,flexibility,infrastructure,network lifetime,security,stability,data transition,and link accomplishment.Given the issu...Ad hoc mobile cloud computing networks are affected by various issues,like delay,energy consumption,flexibility,infrastructure,network lifetime,security,stability,data transition,and link accomplishment.Given the issues above,route failure is prevalent in ad hoc mobile cloud computing networks,which increases energy consumption and delay and reduces stability.These issues may affect several interconnected nodes in an ad hoc mobile cloud computing network.To address these weaknesses,which raise many concerns about privacy and security,this study formulated clustering-based storage and search optimization approaches using cross-layer analysis.The proposed approaches were formed by cross-layer analysis based on intrusion detection methods.First,the clustering process based on storage and search optimization was formulated for clustering and route maintenance in ad hoc mobile cloud computing networks.Moreover,delay,energy consumption,network lifetime,and link accomplishment are highly addressed by the proposed algorithm.The hidden Markov model is used to maintain the data transition and distributions in the network.Every data communication network,like ad hoc mobile cloud computing,faces security and confidentiality issues.However,the main security issues in this article are addressed using the storage and search optimization approach.Hence,the new algorithm developed helps detect intruders through intelligent cross layer analysis with theMarkov model.The proposed model was simulated in Network Simulator 3,and the outcomes were compared with those of prevailing methods for evaluating parameters,like accuracy,end-to-end delay,energy consumption,network lifetime,packet delivery ratio,and throughput.展开更多
文摘提出一种在机会网络中基于周期性间歇连通的数据传输策略PICD(periodic intermittently connected-based data delivery in opportunistic networks).通过有效利用节点间的周期间歇连通性改善数据传输性能.节点传输概率的计算则充分考虑了其与汇聚点间存在的间歇多跳路径,并将其与消息容忍的传输延迟相结合.首先,采用随机动态规划的方法建立与延迟相关的传输概率模型;然后,通过基于多跳的函数空间迭代法求出一个周期内的与延迟相关的传输概率分布矩阵;节点面向不同消息延迟的传输概率则基于分布矩阵计算获得,以此作为选择下一跳的依据.与延迟相关的概率转发机制提高了消息在容忍的延迟内被成功递交的可能.仿真实验结果表明,与现有的几种数据传输算法相比,在节点具有循环运动特征的环境下,PICD具有较高的数据传输成功率和较低的递交延迟.
文摘生产过程中紧急订单的到来会影响现有调度方案,甚至造成订单延期交货。以订单延迟交付时间最小为目标,构建带有插单问题的调度模型,使用改进果蝇优化算法(improved fruit fly optimization algorithm,IFOA)寻求带有插单问题的调度最优解。考虑三个特征参数建立三维优先级列表来确定订单的优先级从而指导初始中心果蝇的产生,并采用NEH启发式算法和交换策略来寻求周围新个体果蝇,采用基于工序的单层整数编码方式进行编码。使用算例进行测试,插入的紧急订单能够被合理安排,且在求解质量方面IFOA优于顺延插单算法,求解速度方面IFOA优于退单插单算法。
文摘Nowadays, the major part and most standard networks usually used in several applications are Wireless Sensor Networks (WSNs). It consists of different nodes which communicate each other for data transmission. There is no access point to control the nodes in the network. This makes the network to undergo severe attacks from both passive and active devices. Due to this attack, the network undergoes downgrade performance. To overcome these attacks, security based routing protocol is proposed with the security based wormhole detection scheme. This scheme comprises of two phases. In this approach, the detection of wormhole attacks is deployed for having correct balance between safe route and stability. Also, to ensure packets integrity cryptographic scheme is used as well as authenticity while travelling from source to destination nodes. By extensive simulation, the proposed scheme achieves enhanced performance of packet delivery ratio, end to end delay, throughput and overhead than the existing schemes.
基金This research was supported by Korea Institute for Advancement of Technology(KIAT)grant funded by the Korea Government(MOTIE)(P0012724,The Competency Development Program for Industry Specialist)and the Soonchunhyang University Research Fund.
文摘Ad hoc mobile cloud computing networks are affected by various issues,like delay,energy consumption,flexibility,infrastructure,network lifetime,security,stability,data transition,and link accomplishment.Given the issues above,route failure is prevalent in ad hoc mobile cloud computing networks,which increases energy consumption and delay and reduces stability.These issues may affect several interconnected nodes in an ad hoc mobile cloud computing network.To address these weaknesses,which raise many concerns about privacy and security,this study formulated clustering-based storage and search optimization approaches using cross-layer analysis.The proposed approaches were formed by cross-layer analysis based on intrusion detection methods.First,the clustering process based on storage and search optimization was formulated for clustering and route maintenance in ad hoc mobile cloud computing networks.Moreover,delay,energy consumption,network lifetime,and link accomplishment are highly addressed by the proposed algorithm.The hidden Markov model is used to maintain the data transition and distributions in the network.Every data communication network,like ad hoc mobile cloud computing,faces security and confidentiality issues.However,the main security issues in this article are addressed using the storage and search optimization approach.Hence,the new algorithm developed helps detect intruders through intelligent cross layer analysis with theMarkov model.The proposed model was simulated in Network Simulator 3,and the outcomes were compared with those of prevailing methods for evaluating parameters,like accuracy,end-to-end delay,energy consumption,network lifetime,packet delivery ratio,and throughput.