Journal of Computations & Modelling最新文献

筛选
英文 中文
IoT Actuator Networks Based on Inverse Directed Diffusion 基于逆定向扩散的物联网执行器网络
Journal of Computations & Modelling Pub Date : 2022-10-04 DOI: 10.47260/jcomod/1232
Shun Murata, Noriko Matsumoto, N. Yoshida
{"title":"IoT Actuator Networks Based on Inverse Directed Diffusion","authors":"Shun Murata, Noriko Matsumoto, N. Yoshida","doi":"10.47260/jcomod/1232","DOIUrl":"https://doi.org/10.47260/jcomod/1232","url":null,"abstract":"Abstract\u0000An IoT system comprises servers or a cloud at the center,30000 possibly surrounded by edge cloudlets and fog computing devices, a group of sensors on one side, and a group of actuators on the other side if the purpose of the system is not only data analysis but also automated control.\u0000Actuators are connected to the central servers or a cloud via an actuator network. Due to progress in smart robotics and related technologies, actuator networks are now getting large, wide, and complex, and should be decentralized and self-organizing as well as sensor networks are. However, as far as we know, there have been no noticeable\u0000researches on actuator networks yet.\u0000In this paper, we propose a new routing protocol for actuator networks based on an inverse of Directed Diffusion, which is one of the most well-known protocols for sensor networks. Our protocol aims at realizing efficient dissemination and delivery of signals, commands, and data for control, and exhibits good results in simulation-based experiments regarding network traffic reduction.\u0000\u0000Keywords: Internet of Things, Actuator networks, Directed Diffusion.","PeriodicalId":102386,"journal":{"name":"Journal of Computations & Modelling","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130543442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trust Management in Growing Decentralized Networks 日益分散的网络中的信任管理
Journal of Computations & Modelling Pub Date : 2022-09-17 DOI: 10.47260/jcomod/1231
Noriko Matsumoto, Masaya Hiraide, N. Yoshida
{"title":"Trust Management in Growing Decentralized Networks","authors":"Noriko Matsumoto, Masaya Hiraide, N. Yoshida","doi":"10.47260/jcomod/1231","DOIUrl":"https://doi.org/10.47260/jcomod/1231","url":null,"abstract":"Abstract\u0000\u0000In a volunteer-based self-organizing network, such as a peer-to-peer network and a wireless ad-hoc network, trustworthiness of each participant node is crucial to assure information security and resilience of the whole network. We call this kind of network a “decentralized” network.\u0000In a decentralized network, mutual evaluation of trust among nodes\u0000are considered useful to manage trustworthiness in many studies. As far as we know, all the preceding related studies discussed trust management upon stable mature networks. However, most decentralized networks in reality begin with initial states comprised of a small number of nodes, and grow gradually with new-comer nodes joining in.\u0000This paper proposes a new trust management method for a growing decentralized network. The network grows from the initial stage where we assume all the initial nodes are trustworthy enough. This paper exhibits that our method extending GossipTrust brings better performance and better quality of trust evaluation than the original\u0000GossipTrust.\u0000\u0000Keywords: Trust, Reputation, P2P networks, Ad-hoc networks, Network\u0000growth.","PeriodicalId":102386,"journal":{"name":"Journal of Computations & Modelling","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121373559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Phase Transition Model between Swarm Behavior and Territorial Behavior 群体行为与领地行为的相变模型
Journal of Computations & Modelling Pub Date : 2022-05-31 DOI: 10.47260/jcomod/1221
Tatsuki Sawada, Noriko Matsumoto, N. Yoshida
{"title":"Phase Transition Model between Swarm Behavior and Territorial Behavior","authors":"Tatsuki Sawada, Noriko Matsumoto, N. Yoshida","doi":"10.47260/jcomod/1221","DOIUrl":"https://doi.org/10.47260/jcomod/1221","url":null,"abstract":"Abstract\u0000\u0000Swarm behavior is collective behavior of creatures moving with their neighbors, such as a flock of birds or a school of fishes. From the system optimization standpoint of view, there have been a number of “bioinspired” models proposed to apply the swarm behavior to organize complex systems and/or to incorporate robustness and flexibility. Territorial behavior is another group form of homogeneous individuals in which each one lives in a separate region (territory) from each other. For system optimization. The most notable application is coverage control. There are some creatures which exhibit either swarm behavior and territorial behavior according to their circumstances and conditions. However, as far as we know, there is no attempt toward any model or algorithm to combine both the swarm behavior and territorial behavior to make systems adapt to the change of circumstances and conditions. This paper proposes a phase transition model to combine swarm behavior and territorial behavior. The model is expected to apply to network optimization in dynamic environments, especially transition between cloud computing and edge computing. Through simulation-based experiments, we verify the convergence behavior of the model.\u0000\u0000Keywords: Swarm behavior, Territorial behavior, Dynamic transition","PeriodicalId":102386,"journal":{"name":"Journal of Computations & Modelling","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124646368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Stability and Boundedness Analysis of Lotka-Volterra Prey-Predator Model with Prey Refuge and Predator Cannibalism 考虑猎物庇护和捕食者同类相食的Lotka-Volterra捕食-捕食模型的稳定性和有界性分析
Journal of Computations & Modelling Pub Date : 2022-03-09 DOI: 10.47260/jcomod/1212
A. Olutimo, O. M. Akinmoladun, Omoko Omoko
{"title":"Stability and Boundedness Analysis of Lotka-Volterra Prey-Predator Model with Prey Refuge and Predator Cannibalism","authors":"A. Olutimo, O. M. Akinmoladun, Omoko Omoko","doi":"10.47260/jcomod/1212","DOIUrl":"https://doi.org/10.47260/jcomod/1212","url":null,"abstract":"Abstract\u0000\u0000In this paper, a prey-predator system incorporating prey refuge and predator cannibalism is studied. The stability and ultimate boundedness of the analyzed state parameters (y_1,y_2) defining the system are obtained using the Lyapunov’s second or direct method. We construct a suitable complete Lyapunov function for the nonlinear system and demonstrate its efficacy. The method is built upon applying various theoretical Lyapunov functions. By constructing a Lyapunov function which possesses a functional relationship to the the original model system, we give sufficient conditions which ensure the stability and ultimate boundedness of the state parameters describing the nonlinear prey-predator system. We give a numeric example to illustrate the result obtained. \u0000\u0000JEL classification numbers: 34C27, 34D23, 34C25.\u0000Keywords: Prey-predator system, Prey refuge, Predator cannibalism, Stability, Boundedness, Lyapunov’s method.","PeriodicalId":102386,"journal":{"name":"Journal of Computations & Modelling","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116478263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信