J. Networks最新文献

筛选
英文 中文
A Modeling Approach for Resource Management in Resource-Constrained Nodes 资源约束节点中资源管理的建模方法
J. Networks Pub Date : 2015-02-28 DOI: 10.4304/jnw.10.01.39-50
Torsten M. Runge, B. Wolfinger, Stephan Heckmüller, Alireza Abdollahpouri
{"title":"A Modeling Approach for Resource Management in Resource-Constrained Nodes","authors":"Torsten M. Runge, B. Wolfinger, Stephan Heckmüller, Alireza Abdollahpouri","doi":"10.4304/jnw.10.01.39-50","DOIUrl":"https://doi.org/10.4304/jnw.10.01.39-50","url":null,"abstract":"The rapid growth of link bandwidths on one hand, and the emergence of resource-constrained nodes (e.g. software routers) on the other hand, will cause network nodes to be the bottleneck in the future. Parallel processing using multi-core processors can increase the packet processing of resource-constrained nodes and alleviate the problem. However, intra-node resource contention can have a strong negative impact on the corresponding network node and, therefore, also on the overall performance of the network. Commonly used network simulators (e.g. ns-3) only offer a rather simplistic node model and do not take into account intra-node resource contention. We propose a unified and extensible approach to model intra-node resource management in resource-constrained nodes. Our model gives ability to identify and predict performance bottlenecks in networks. We have implemented our model as an extension to the network simulator ns-3. The simulation results using different case studies, show that our approach significantly outperforms the original ns-3 in terms of realistic modeling.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"38 1","pages":"39-50"},"PeriodicalIF":0.0,"publicationDate":"2015-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88213575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Techniques for Allocation of Sensors in Shared Wireless Sensor Networks 共享无线传感器网络中传感器的分配技术
J. Networks Pub Date : 2015-02-28 DOI: 10.4304/jnw.10.01.15-28
N. K. Kapoor, S. Majumdar, B. Nandy
{"title":"Techniques for Allocation of Sensors in Shared Wireless Sensor Networks","authors":"N. K. Kapoor, S. Majumdar, B. Nandy","doi":"10.4304/jnw.10.01.15-28","DOIUrl":"https://doi.org/10.4304/jnw.10.01.15-28","url":null,"abstract":"Wireless sensor networks (WSNs) hosting multiple applications are gaining popularity over wireless sensor networks dedicated to a single application. The applications hosted by the WSN may have different characteristics. This research investigates the importance of using information about the characteristics of the applications and the state of the network while allocating the sensor nodes to requests for applications. A number of static and dynamic allocation algorithms are investigated. Results of simulation experiments demonstrate that the lifetime of a WSN can be effectively increased by using information about the applications and the state of the WSN. Insights into the relationship between system performance and various system and workload characteristics gained from the simulation experiments are presented.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"18 1","pages":"15-28"},"PeriodicalIF":0.0,"publicationDate":"2015-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79796592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
The value distribution of fm + a(f(k))n and normal families of meromorphic functions fm + a(f(k))n的值分布与亚纯函数的正规族
J. Networks Pub Date : 2014-04-09 DOI: 10.4304/jnw.9.9.2371-2375
Qi Yang, Yuebo Cao
{"title":"The value distribution of fm + a(f(k))n and normal families of meromorphic functions","authors":"Qi Yang, Yuebo Cao","doi":"10.4304/jnw.9.9.2371-2375","DOIUrl":"https://doi.org/10.4304/jnw.9.9.2371-2375","url":null,"abstract":"In this paper, we obtain a normal criterion of meromorphic functions concerning shared values. Let Dbe a domain in C and F be a family of meromorphic functions in D. Let k, n,m ∈ N+, n ≥ mk+m+1, and a, btwo finite complex numbers with a 6= 0. Suppose that every f ∈ F has all its zeros of multiplicity at least k + 1 . If fm + a(f(k))n and gm + a(g(k))nshare the value b IM for every pair of functions (f, g) of F, then F is a normal family in D.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"15 1","pages":"2371-2375"},"PeriodicalIF":0.0,"publicationDate":"2014-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82320915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Collaboration-based Distributed TDMA Scheduling Algorithm for Data Collection in Wireless Sensor Networks 基于协作的分布式TDMA无线传感器网络数据采集调度算法
J. Networks Pub Date : 2014-04-09 DOI: 10.4304/jnw.9.9.2319-2327
Bo Zeng, Yabo Dong
{"title":"A Collaboration-based Distributed TDMA Scheduling Algorithm for Data Collection in Wireless Sensor Networks","authors":"Bo Zeng, Yabo Dong","doi":"10.4304/jnw.9.9.2319-2327","DOIUrl":"https://doi.org/10.4304/jnw.9.9.2319-2327","url":null,"abstract":"For data collection application in wireless sensor networks, it is a hard task to guarantee interference-aware slot assignment in distributed TDMA scheduling algorithm. This paper proposed a new scheduling algorithm based on the collaboration of nodes to resolve the slot collision when nodes try to assign slots to them. The time of network initialization is divided into rounds. The collaboration consisted of three phases: REQ, REPLY, and ACK is used to guarantee the interference-aware slot assignment during each round. The slot information is exchanged when node execute collaboration. We evaluate the performance of our algorithm by using NS2. The results indicate that our algorithm has better packet receive ratio and energy efficiency than existing algorithm.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"3 6 1","pages":"2319-2327"},"PeriodicalIF":0.0,"publicationDate":"2014-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88031735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Robust Data Gathering Technique for Large Scaled Wireless Sensor Networks 大型无线传感器网络的鲁棒数据采集技术
J. Networks Pub Date : 2014-04-09 DOI: 10.4304/jnw.9.9.2342-2352
Q. Mamun, Ashfaqur Rahman
{"title":"A Robust Data Gathering Technique for Large Scaled Wireless Sensor Networks","authors":"Q. Mamun, Ashfaqur Rahman","doi":"10.4304/jnw.9.9.2342-2352","DOIUrl":"https://doi.org/10.4304/jnw.9.9.2342-2352","url":null,"abstract":"In this paper we propose a data gathering scheme for large scaled wireless sensor networks using multiple mobile data collectors (MDCs) and the spatial division multiple access (SDMA) technique. We focus on minimizing the data gathering time by employing the SDMA technique, and minimizing the length of touring paths of MDCs by employing Voronoi diagrams. The proposed scheme facilitates all deployed sensors to experience uniform energy depletion by avoiding long-distance transmissions to the base station. This, in turns, helps to prolong the lifetime of the network, and the network remains connected for longer period of time and increases the robustness. Simulation results demonstrate that the proposed scheme greatly reduces the traversal distance of the data collectors compared to the grid based approximation algorithm, prolongs the network lifetime significantly compared to a network which has only a static data collector, or a network in which the mobile collectors only move along straight lines.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"78 1","pages":"2342-2352"},"PeriodicalIF":0.0,"publicationDate":"2014-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83238583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Community Partition Algorithm Integrating Mutual Information 一种集成互信息的改进社区划分算法
J. Networks Pub Date : 2014-04-09 DOI: 10.4304/jnw.9.9.2289-2298
Y. Li, Ying Sha, Jixi Shan, Bo Jiang, Jianjun Wu
{"title":"An Improved Community Partition Algorithm Integrating Mutual Information","authors":"Y. Li, Ying Sha, Jixi Shan, Bo Jiang, Jianjun Wu","doi":"10.4304/jnw.9.9.2289-2298","DOIUrl":"https://doi.org/10.4304/jnw.9.9.2289-2298","url":null,"abstract":"The research of community detection can help us analyze kinds of problems in social network, in which the research of community structure is very important. This paper proposes an improved algorithm: An Improved BGLL Integrating Mutual Information (BGLLi), which stabilizes modularity, meanwhile fuses the index of mutual information, so that we can find the optimal threshold of modularity and reduce the running time of community partition effectively. The dataset adopts the Twitter dataset and the public Arxiv dataset, and the related experimental results have verified the effectiveness of the algorithm","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"48 1","pages":"2289-2298"},"PeriodicalIF":0.0,"publicationDate":"2014-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78238925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Node-Based Resource Optimization Algorithm of Wireless Network 基于节点的无线网络资源优化算法
J. Networks Pub Date : 2014-04-09 DOI: 10.4304/jnw.9.9.2424-2432
R. Mu
{"title":"Node-Based Resource Optimization Algorithm of Wireless Network","authors":"R. Mu","doi":"10.4304/jnw.9.9.2424-2432","DOIUrl":"https://doi.org/10.4304/jnw.9.9.2424-2432","url":null,"abstract":"In order to improve the traditional wireless sensor network resources shortcomings of single, large power consumption, this paper puts forward the optimization algorithm of wireless sensor network resources. And analyzes the network design of wireless sensor network, optimize the algorithm in the rate and the node power consumption and energy saving method, finally do comparison by using two groups of different simulation experiment data. The experimental results show that in wireless sensor networks, compared to the traditional algorithm, the optimized design of resource algorithm has high running speed and more can save network nodes in the network node energy transfer and consumption capability and rate, and has convergence.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"109 1","pages":"2424-2432"},"PeriodicalIF":0.0,"publicationDate":"2014-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80646509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An RFID Data and Location Parameter Joint Estimation Based on an Improved MCMC Method 基于改进MCMC方法的RFID数据和位置参数联合估计
J. Networks Pub Date : 2014-04-09 DOI: 10.4304/jnw.9.9.2392-2401
Mingyi Duan, Yajun Yang, Wei Wang
{"title":"An RFID Data and Location Parameter Joint Estimation Based on an Improved MCMC Method","authors":"Mingyi Duan, Yajun Yang, Wei Wang","doi":"10.4304/jnw.9.9.2392-2401","DOIUrl":"https://doi.org/10.4304/jnw.9.9.2392-2401","url":null,"abstract":"The location parameter of the electronic tag is the necessary condition for RFID application systems to realize their operation functions. Based on RFID detection model within which the target of the symbol location will spill over to adjacent area when sampling, the posterior probability distribution of the parameters to be estimated is obtained from the conditional likelihood function and the prior distribution of unknown parameters by Bayesian theory. Metropolis-Hastings (M-H) sampling algorithm of Markov Chain Monte Carlo (MCMC) is used to jointly estimate the RFID data and tag symbol location parameter within the range of multiple readers, and in this paper, the M-H sampling is improved by considering the prior knowledge and constraints. At last, the experimental results, using large simulated data, demonstrate the accuracy and efficiency of the proposed algorithm","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"325 1","pages":"2392-2401"},"PeriodicalIF":0.0,"publicationDate":"2014-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77578683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Physical Layer Key Negotiation Mechanism to Secure Wireless Networks 保护无线网络安全的物理层密钥协商机制
J. Networks Pub Date : 2014-04-09 DOI: 10.4304/jnw.9.9.2299-2308
Jikang Xia, Lan Chen, Ying Li, Endong Tong
{"title":"A Physical Layer Key Negotiation Mechanism to Secure Wireless Networks","authors":"Jikang Xia, Lan Chen, Ying Li, Endong Tong","doi":"10.4304/jnw.9.9.2299-2308","DOIUrl":"https://doi.org/10.4304/jnw.9.9.2299-2308","url":null,"abstract":"The rapid technological developments in computing technology and the proliferation of wireless network nodes with light infrastructure, have emerged large quantities of security requirements of informational privacy in cyberspace. Due to the inherent nature of open medium, diversity and variability of network topology, wireless networks are greatly difficult to secure by traditional methods. A physical layer key negotiation mechanism to secure wireless networks is proposed to quickly exchange and establish conventional cryptographic keys by exploiting the wireless channel’s characteristics. The physical layer key negotiation mechanism and its supplementary exception handling caused by the variations in communication paths are both described step by step. The simulation results verify the consistency of the keys of legitimate users, robustness and feasibility of this mechanism. Furthermore this cross-layer security technology is an exemplary complement to existing wireless network protocols to improve their security and enhances the ability to resist replay attacks, brute-force attack and eavesdropping.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"40 1","pages":"2299-2308"},"PeriodicalIF":0.0,"publicationDate":"2014-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73810942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Opportunistic Relay and Energy Efficient Power Allocation Algorithm in Cooperative Wireless Sensor Networks 协同无线传感器网络中一种新的机会中继和能量高效分配算法
J. Networks Pub Date : 2014-04-09 DOI: 10.4304/jnw.9.9.2448-2455
Feng-Nien Wu
{"title":"A Novel Opportunistic Relay and Energy Efficient Power Allocation Algorithm in Cooperative Wireless Sensor Networks","authors":"Feng-Nien Wu","doi":"10.4304/jnw.9.9.2448-2455","DOIUrl":"https://doi.org/10.4304/jnw.9.9.2448-2455","url":null,"abstract":"A series of challenges exist in the process of sensor network research which can not be solved by one sensor node. Cooperative communication, based on the idea of spatial diversity, which makes different users or nodes in wireless network share their antennas or other network resources, is a promising technique toward improving performance of wireless sensor network significantly. This article adopts cooperation between nodes and opportunistic collaboration transmission strategy is proposed. Energy efficient power allocation algorithm in wireless sensor network is put forward to optimize performance of opportunistic cooperative transmission. Through the simulation, regardless of statistical feature of channel state of opportunistic node, opportunistic cooperation can effectively improve the performance of the system. Using energy efficient power allocation algorithm can effectively reduce energy consumption of the network and improve the network performance","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"5 1","pages":"2448-2455"},"PeriodicalIF":0.0,"publicationDate":"2014-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84979946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信