Dynamic Resource Discovery based on Preference and Movement Pattern Similarity for Large-Scale Social Internet-of-Things
|
|
- Elisabeth Fisher
- 5 years ago
- Views:
Transcription
1 > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1 Dynac Resource Dscovery based on Preference and Moveent Pattern Slarty for Large-Scale Socal Internet-of-Thngs Zhyuan L, Rulong Chen, Lu Lu, Meber, IEEE and Geyong Mn, Meber, IEEE Abstract Gven the wde range deloyent of dsconnected delay-tolerant socal Internet-of-Thngs (SIoT), effcent resource dscovery reans a fundaental challenge for large-scale SIoT. The exstng search echanss over the SIoT do not consder reference slarty and are desgned n Cartesan coordnates wthout suffcent consderaton of real-world network deloyent envronents. In ths aer, we roose a novel resource dscovery echans n a 3-densonal Cartesan coordnate syste wth the a of enhancng the search effcency over the SIoT. Our schee s based on both of reference and oveent attern slarty to acheve hgher search effcency and to reduce the syste overheads of SIoT. Sulaton exerents have been conducted to evaluate ths new schee n a large-scale SIoT envronent. The sulaton results show that our roosed schee outerfors the state-of-the-art resource dscovery schees n ters of search effcency and average delay. Index Ters socal Internet of thngs, resource dscovery, cosne slarty, reference, oveent attern. I. INTRODUCTION HE ntegraton of socal networkng concets nto the TInternet-of-Thngs (IoT) has led to a burgeonng toc of research, so called Socal Internet of Thngs (SIoT) aradg, accordng to whch the sart obects are caable of establshng socal relatonshs n an autonoous way wth resect to ther owners. The benefts are those of rovng scalablty n resource/servce dscovery when the SIoT s ade of a large nuber of heterogeneous nodes, slarly to what haens wth socal networks aong huans [1]. SIoT s turnng out to be a successful aradg for eer-to-eer councatons, beng Manuscrt receved Arl 15, Ths work was suorted n art by the Natonal Natural Scence Foundaton of Chna under Grant No , the Proect Funded by Chna Postdoctoral Scence Foundaton No. 2015M570469, the Natural Scence Foundaton of Jangsu Provnce under Grant No.BK and the Senor Professonal Scentfc Research Foundaton of Jangsu Unversty under Grant No.12JDG049. Z.Y. L and R.L. Chen are wth the Deartent of Internet of Thngs, School of Couter Scence and Telecouncatons Engneerng, Jangsu Unversty, Zhenang, Chna (e-al: lzhyuan@us.edu.cn). L. Lu s wth the Deartent of Coutng and Matheatcs, Unversty of Derby, Derby, UK and the Deartent of Internet of Thngs, School of Couter Scence and Telecouncatons Engneerng, Jangsu Unversty, Zhenang, Chna (e-al: l.lu@derby.ac.uk). G. Mn s wth the Deartent of Matheatcs and Couter Scence, Unversty of Exeter, Exeter, UK (e-al: g.n@exeter.ac.uk). drven by the followng roertes: Sart obects belongng to the sae county due to ther owners often have coon nterests. Sart obects carred by ther owners wth coon nterests usually exhbt slarty n ther oveents and behavor atterns. Sart obects carred by ther owners wth coon nterests tend to eet each other frequently. However, leveragng the above entoned socal roertes for desgnng an effcent resource dscovery echans over SIoT s an acute ssue n the context of resource sharng n SIoT. The exstng resource dscovery echanss n SIoT can be classfed nto three categores: socal connectvty-based ethods, oveent attern-based ethods and reference slarty-based ethods. The socal connectvty-based ethods [2-9] utlze the long-ter socal tes exstng between the nodes for buldng countes, n such a way that those havng frequent encounters n the ast wll belong to the sae county. Once the countes are bult, resource sharng s acheved aong the nodes wthn the countes by socal-connectvty. The oveent attern-based ethods [10-13] utlze the traectores of the oble users to buld the countes, n such a way that nodes exhbtng slar oveent and behavour atterns wll belong to the sae county. Both the above two strateges are beneftted wth low transsson delay but also have slar dsadvantages, such as anageent overhead and low search effcency snce both the two aroaches do not consder reference slarty. The reference slarty-based ethods [14-15] can show better search effcency, whch utlzes the nterests and shared resources of the oble users to for the countes wth nodes havng slar references. However, the dsadvantages of those aroaches can be attrbuted to ts toology satch and hgher traffc cost, snce reference slarty-based ethods do not consder the nforaton regardng the geograhcal locaton of the oble nodes. In order to overcoe the drawbacks of the resource dscovery echanss entoned above, ths aer rooses a novel Resource Dscovery echans based on the Preference and Moveent attern slarty (RDPM). Frstly, we extract the references of the nodes fro ther rofle table and resources, and also oveent attern fro ther traectores usng the AGNES clusterng ethod [16]. Then the cosne slarty of the references and oveent attern of the nodes
2 > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 2 s generated for the urose of buldng sub-county n a 3-densonal Cartesan coordnate syste n order to rove the effcency of resource dscovery. Next, vrtual global countes are fored by utlzng the slarty found aong sub-countes, ultately to rove the searchng erforance for the resources. Fnally, we desgn a resource dscovery algorth that can dynacally adust the search radus n order to balance the erforance and councaton overhead. The reander of the aer s structured as follows: Secton II ntroduces the related works. Secton III resents the network odel. Our roosed resource dscovery algorth based on reference and oveent attern slarty s elaborated n Secton IV. The exerental evaluaton and erforance results are resented n Secton V. Fnally, Secton VI concludes ths aer. II. RELATED WORK In ths secton, the exstng resource dscovery echanss are analyzed by classfyng the nto three categores socal connectvty-based ethods, oveent attern-based ethods and reference slarty-based ethods. A. Socal connectvty-based ethods L and Wu [4] roosed a Moble county-based Pub/Sub schee (MOPS) to roote the content-based servce by utlzng the long-ter neghborng relatonsh between the nodes. In ths aroach, the node county s bult n a dstrbutve fashon based on the encounter frequences of the nodes. A contact duraton aware fraework was roosed [5] to odel the content dssenaton rocess for MSNs n order to reduce the content dssenaton delay. ICast [6] adots the behavor-aware echans whch regularly extracts weak tes,.e. nodes havng rare encounters, to ensure rearkable erforance results n content delvery. By analyzng the tght-couled relatonsh between huan and oortunstc connecton of sart thngs (e.g., oble hones, vehcles), [7] roosed oortunstc Internet of Thngs. It enables nforaton sharng and dssenaton wthn/aong oortunstc countes that are fored wth the oveent and oortunstc contact nature of huan. [8] roosed a county detecton schee based on frend relatonsh to solve the roble n ntegrated IoT and Socal Network (SN) archtecture. Zheng and Wang [9] roosed a grah-based socal aware algorth n whch cellular lnks and D2D lnks are establshed accordng to socal tes and socal contrbutons of users for effcent ult-fle dssenaton. However, such ethods are subected to lower effcences n ther resource dscovery echanss snce they do not consder reference slarty. B. Moveent attern-based ethods Huan traectores often show a hgher degree of teoral and satal regularty, wth each ndvdual beng characterzed by a te ndeendent characterstc length scale and also a sgnfcant robablty of returnng to a few hghly frequented locatons [10], whch tends oble users to exhbt slar oveent and behavor atterns. Such oveent atterns of a grou of nodes can be extracted by recordng the node oveents. A oveent attern-aware otal routng for socal delay tolerant networks was roosed n the works of [11], where both a local search schee and a tabu-search schee are utlzed n fndng the otal set. The tabu-search based routng shows the ablty to gude the evaluaton of relay node sets nto otcal node sets. [12] analyzed frstly the socal relaton between oble-aware nodes, and then ned the actvty rules of nodes and the county roerty and guded to select the oble-aware nodes n target regons, so as to rove the dscovery effcency of nodes n obectve regons, and ncrease the success rato of servce dscovery. An effcent roactve servce dscovery rotocol was roosed [13], whch can leverage both the socal behavor and the eole oblty. Sulaton results show that the rotocol acheves ncreased effcency n dscoverng servces. Such oveent attern-based ethods can enoy lower resource dscovery delay and transsson delay than the socal connectvty-based ethods. However, they do not fully utlze the reference of users, and hence the success rate of the resource dscovery s stll low. C. Preference slarty-based ethods An adatve content sharng rotocol to facltate the leentaton of MSNs over eer-to-eer networks was roosed [14] for reference drven councaton. The roosed rotocol takes nto account the nforaton about user s nterests, reference based content storng and forwardng, and host oblty n a dsconnected delay tolerant MANET, whch can rove the erforance of content dssenaton. A P2P content-based fle sharng syste, naely SPOON, was roosed [15] for dsconnected MANETs. The syste uses an nterest extracton algorth to derve a node s nterests fro ts fles for content-based fle searchng. For effcent fle searchng, SPOON grous coon-nterest nodes that frequently eet each other, as countes. It exlots the node oblty for the urose of categorzng the nodes nto two tyes, n such a way that the nodes wth ore frequent encounters wth the county ebers are categorzed as stable nodes and the nodes frequently vstng other countes are categorzed as hghly oble nodes. Stable nodes are generally assgned as county coordnates for ntra-county searchng and the hghly oble nodes are assgned as county abassadors for nter-county searchng. In general, the success rate of resource dscovery of the reference slarty-based ethods s better than two other ethods. However, t ncurs toology satch, whch leads to hgher councaton overhead snce they lack ultdensonal context-aware nforaton n ther resource sharng echanss. III. NETWORK MODEL The archtecture of the roosed RDPM odel can be classfed nto three layers as shown n Fg. 1. Each node reresents a counterart of a hyscal sart devce at the hyscal layer. Frstly, the hyscal area s dvded nto square unts of equal area. In each square unt, the nodes belongng to the sae sub-county have slar references and show consstent oveent atterns. Then, slar sub-countes are erged nto a global vrtual county. For nstance,
3 > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 3 hundreds of football fans are watchng a World Cu soccer tournaent n an oen-ar stadu. In the stadu, they sontaneously for a football sub-county. Meanwhle, fans outsde the stadu for another football sub-county by watchng TV n ubs or at hoe. But all of the together for the football global vrtual county. The sub-countes together for the global vrtual county and also have ther corresondng local characterstcs. For exale, n the sub-county network layer, node 2 has two neghbors, as node 1 and node 3, resectvely. Furtherore, consderng the global county network layer, node 1 and node 3 are the neghbors of node 2. Ths strategy greatly reduces the traffc overheads ncurred by the toology satch and roves the effcency of resource dscovery. Then, Forula (2) s used to calculate the slarty aong the resource u and the resource v. s( u, v) w w u v wu wv 1 1. where s the total nuber of coon keywords, wu and w v reresent the weghts of the th coon keyword n the two resources, resectvely. In a slar way, a global slarty atrx could be obtaned by coarng the slartes of all the resources. The eleent of the slarty atrx s s ( u,v ), and then they are sorted n a descendng order to generate a resource slarty lst. Forula (3) s used to choose the to r hgher slarty resources. r s( u,v) 1 arg n,0 1, 0 k s( u,v) 1 r r k Fg. 1. Three-layer network structure of RDPM. IV. THE DESIGN OF RDPM A. Preference Extracton Users wth coon references tend to on the sae county, and ther shared resources or servces are often slar. Hence, we extract the nterests and references of the nodes usng ther rofle lsts and shared resources or servces. 1) Resource or servce Reresentaton The roertes of the resources or servces are ult-densonal, and the assocaton roertes of the nodes are generally weak. The dfferences n the assocaton roertes can only be attrbuted to the occurrence frequency of the keywords. For resource R, ts reference vector s defned as R ( k, w);( k, w );...;( k, w ) n n where k refers to the th keyword and w s the weght of the th keyword. They are sorted by weghts n descendng order. 2) Preference Reresentaton The shared resources are requred to be clustered n order to be reresentatve rather than a sngle entty. For exale, the coon resource vectors are extracted fro R u and R v, utlzng the coon keywords and corresondng weghts. where k s the length of the resource slarty lst and ρ s a user-secfc araeter to deterne to r resources wth hgher slarty to reresent the nterests of a oble user. The araeter could be set accordng to the secfc user s requreent. Generally seakng, the hgher ρ, the hgher r. When ρ = 1, all the resources wll be selected (r=k). Whle ρ = 0, none of the resources wll be selected (r=0). Next, the reference vector should be re-calculated for the to r hgher slarty resources to reresent the nterests of a oble user, as shown below w w / r. k r 1 k R R ( k, w ), 0. n k k where wr denotes the weght of the keyword k n the resource R, and R reresents the reference vector of the node n. n B. Moveent Pattern Analyss and Extracton 1) Current locaton The current locaton nforaton of nodes can be obtaned va the Global Poston Syste (GPS). The current locaton of a node s reresented by the vector lx (, y, z, t ), where ( x, y, z ) s three-denson coordnates of the node and t reresents the testa that the node stays at the oston ( x, y, z ). 2) Stay regon The stay regon A s a hyscal sace where a user stayed over a te threshold t 0. Suose that l( x, y, z, t ) s the
4 > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 4 node s oston at te t, and l ( x, y, z, t ) s the node s oston at te t, then the soourn te of a user s T, and the value T s equal to ( t t ). When T s larger than the threshold value t and the dstance between the oston l and the oston l s saller than a threshold value r, we conclude that the oble users are n the sae stay regon. The shae of the regon A s a shere whose radus s r and the center s ( x, y, z ). 3) Moveent attern reresentaton In order to analyze and extract the oveent atterns of a node, the oton traectores of the nodes are requred ncludng the locaton, the start te and the end te. Forula (6) s used to reresent the oton traectory of a node. As shown n Fg. 2, the oton traectory of node and node s the sae fro te t a to te t b. Ths shows the slarty of oveent attern. V (, ) T ( A1( x1, y1, z1, lst( tstart, tend), 1),...., A ( x, y, z, lst( t, t ), )) n n n n start end n where t start reresents the start te when a node oves nto the regon A, and tend reresents the end te when the corresondng node oves out of the regon A. The lst s an array storng ultle te records. The weght value n shere A s calculated usng (7). 1 0 ( lst ( ). tend lst ( ). tstart )) t. where s the length of a lst, and t total reresents the total te. C. County Constructon 1) Sub-county constructon The references are cobned wth the oveent attern of the oble users n order to buld a sub-county. 1 Preference slarty Forula (8) s used to calculate the reference slarty between node and node. S total wk wk k wk wk k1 k1 S. (8) where s the total nuber of coon keywords of the reference vector S, and wk and w k reresent the weghts of the k th coon keyword of the reference vector and S. 2 Moveent attern slarty S Fg. 2. Overla soourn regon at the sae erod. Equaton (9) s used to calculate the oveent attern slarty S between node and node. S n n V n n (, ) 4n r. where V (, ) s the overla sace between the volue of the soourn regon A of the node and the volue of the soourn regon A of node at the sae te erod, both the weght values of the soourn regons resectvely. 3 Constructon rocedure Algorth 1. Constructon of the sub-county and A and are A, Inut: reference and oveent attern vectors of a node N and ts neghbors Outut: sub-county eber lst Begn for each N nb of N do N. brocaststo N nb t N nb.couters S. t f S nb. > T s nb N nb.add N To CoLst N nb.sendonessageto N
5 > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 5 f accetedessage s onessage N.addN nb To CoLst Return subcolst End Forula (10) s used to calculate the total slarty between node and node. t S S S, 1. t If S s greater than a redefned thresholdt s, node ons the sub-county of node. In the ntal rocess of sub-countes constructon, node wll broadcast the Hello essage to ts neghbors, and the neghbor nodes use Forula (10) to coute ther total slarty wth node. The neghborng node s added to the sub county when the total slarty value S t s larger than the redefned threshold value. To reduce the overhead, each node saves the to k neghbors. The seudo code for the constructon of the sub-county s shown n Algorth 1. Regardng T s n Algorth 1, T s s drectly related to the sze of each sub-county. T s should be set accordng to the slarty between county ebers and the sze of each sub-county. Generally seakng, the hgher T s, the saller the sub-county. When T s =0, there should be only one sub-county where ts sze s equal to the global county. When T s =1, each sub-county wll be the node tself. After the successful constructon of the sub-county, the anageent node calculates the central locaton vector of the county whch s shown below n n n ( x x, y y, z z ). k k k n k1 n k1 n k1 where n s the nuber of ebers n the sub-county. 2) Node role assgnent and sub-county erger In each sub-county, there are three tyes of nodes, ncludng adnstrators, abassadors and ordnary nodes. An Adnstrator lays the anagng role n a sub-county, and antans the ndexes of all resources belongng to the sub-county. Hence a stable and relable node s chosen as the adnstrator n a sub-county. The adnstrator has two ortant tasks: One s to hel ordnary nodes to search resources wthn or out of the sub-county, and the other s to erodcally collect the nforaton of the ordnary users n the sub-county and to extract the nterest vector usng the AGNES clusterng ethod. The rary resonsblty of an abassador s to brdge the sub-countes n order to for the global vrtual county. To ths end, the abassador regularly oves n and out of the sub-countes. Then, we gve a rocedure of sub-county erger. Ste 1: County reference vectors extracton Adnstrator erodcally collects the reference vectors nforaton of the nodes n the sub-county, and calculates the s(, ) value usng Forula (2), where and reresent any two nodes n the sae sub-county, resectvely. Then the sae clusterng ethod wth the reference extracton s leveraged to get the reference vector of sub-county R. Analogously, we can get the reference vector of global county by calculatng the slarty between the sub-county reference vectors. Ste 2: Sub-county erger The oblty of the abassadors s utlzed to carry the reference vectors of the sub-countes n order to erge slar sub-countes. When an abassador oves nto another sub-county, t frstly calculates the slarty of the nterest vector between the two sub-countes. If ths slarty s larger than the threshold value, the two sub-countes are then erged to for a bgger vrtual county. Ideally, all the slar sub-countes wth coon nterests wll be assocated together to construct a global county. It s noted that the reference vector for the global county s also need to be calculated. D. Message Routng Message routng and data forwardng on the two densonal lane wll reduce the effcency of resource dscovery and transsson. As a result, a greedy algorth s used to rove the effcency of resource dscovery n the three densonal Cartesan coordnate syste. Fg. 3 s a dagra of essage routng. The source node S lans to construct a ath SD to the target node D. After a node B suddenly oves out of the councaton range of node S, ths node needs to calculate ts angle wth nodes EFand, G. As shown n Fg.3, 1 s the angle between SD and SE, 2 s the angle between SD and SF, 3 s the angle between SD and SG. Now, node S chooses node E as the next ho snce 1 beng the nu forwardng angle. After that, node C s also chosen as the next ho. To ensure quck essage forwardng, the su value 1 k 0 should be nu, where, s the th forwardng node. c k
6 > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 6 Y S F 2 1 E 3 Fg. 3. Dagra of essage routng. E. Resource Dscovery Process Algorth 2. Search wthn the sub-countes Inut: the request vector of a node Outut: resource holder lst Begn f S QC, < T Q then N.sendQueryTo N Ad else N.rank N nb By S, Z QNb 4 B N C G D X 1) Searchng wthn the sub-county The requester calculates the slarty between the query vector and ts sub-county nterest vector. If ths slarty s lower than the threshold value, the query essage s sent out of the local sub-county. Otherwse, the query essage s sent to the to k neghbors wth hgher slarty. The neghbor contnues to forward ths query essage to ts neghbors f t lacks the requested resource. TTL (te-to-lve) s used to control the search deth and avod excessve overhead. The TTL value decreases one when the essage s forwarded every te. The resource dscovery wll eventually sto when the TTL value becoes zero. Algorth 2 shows the seudo code of the resource dscovery rocess wthn a sub-county. 2) Searchng wthn the global countes The Fg.4 llustrates an exale of searchng wthn the global countes. If the requested resource s not found wthn a sub-county 1-1, the query essage wll be forwarded to ts slar neghborng sub-countes 1-2, 1-3, and 1-4 by the abassador node 1, the abassador node 2 and the abassador node 3 resectvely. And the search wthn the sub-county s recalled agan. The search wthn the global county stos when ether the TTL value of the query essage becoes zero or the requested resources s dscovered. for each N nb of N do N.sendQueryTo N nb wth essage routng Count++ f(n nb ==resource holder) then Fg. 4. Searchng wthn the global countes The searchng rocess wthn the global countes s descrbed n Algorth 3. Algorth 3. Searchng wthn the global countes Return N nb else f (Query.hos<MaxHo) then N.sendQueryTo N next Query.hos++ f Count>k then break f(searchresults == null) then N.sendQueryTo N Ad End Inut: the request vector of Outut: resource holder lst Begn N N Ad. rankc sub ByCentralLocaton for each C sub of N Ad do N Ad. sendqueryto C sub wth essage routng Count++ Searchng wthn sub-countes() f Count>k then break
7 > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 7 f(searchresults == null) then N.sendQueryTo N Ad End 3) Global searchng over socal Internet of Thngs Fg. 5 llustrates an exale of global searchng over the socal IoT. End V. PERFORMANCE EVALUATION A. Sulaton Envronent and Paraeters Settng The oortunstc network envronent (ONE) [17] has been used as the sulaton latfor n order to evaluate the erforances of our schee. As shown n Fg. 6, the oble socal actvtes of the users over the SIoT are based on the caus envronent of Jangsu Unversty n Chna. Fg. 5. Global searchng over the socal Internet of Thngs. If the search wthn a global county s not successful, the global search over the socal IoT s trggered. The slarty between the query vector and other vrtual countes ncludng vrtual county 2, vrtual county 3 and vrtual county 4 are calculated, resectvely. And then, the query essage s quckly forwarded to the vrtual county wth hgher slarty through the essage routng. Now, searchng wthn the sub-countes of the corresondng global county s trggered agan. The global searchng rocess over socal Internet of Thngs s descrbed n Algorth 4. Algorth 4. Global searchng over socal Internet of Thngs Inut: the request vector of Outut: resource holder lst Begn P N Ad. rankc vruby S, QC N for each C vru of N Ad do N Ad. sendqueryto C vru wth essage routng Count++ Searchng wthn the global countes() f Count>k then break; Fg. 6. The geograhc a. 100 oble users have been classfed nto four nterest grous and one oveent grou, such that each grou corses 20 users. The four nterest grous nclude the checal nterest grou, the electrcal nterest grou, the scentfc research nsttute s nterest grou and the ebedded syste nterest grou, accordngly. The oveent grou conssts of rando walk users along the roads, as shown n Fg. 6. The resonsblty of the rando walk users s to hel the eber nodes n the nterest grous to carry and forward the essage and data. The corresondng araeter confguraton nforaton s shown n Table 1. TABLE I. SIMULATION PARAMETERS Paraeters Descrton Default values MoveentModel.world Sze( 2 ) Sulaton scenaro area Scenaro.endTe(hour) Sulaton te 12 Scenaro.nrofHosts Nuber of nodes 100 Scenaro.nrofHostGrous Nuber of grous 5 BtInterface.tye BtInterface.transt Seed(Kbs/s) BtInterface.transt Range() Grou.oveentModel Councaton tye nterface Bandwdth 250 Transsson range 10~20 Moveent odel of nodes wthn a grou Moblty Seed(/s) Walkng seed of nodes 0.5~1.5 SleBroadcast Interface ShortestPathMa BasedMoveent Message.Sze(k) Sze of essage 500~1024
8 > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 8 Message. Interval(s) Message nterval 1~2 Message.TTL(n) T s T Q The te to lve value for the forwarded essage The threshold value for choosng the to r hgher slarty resources The threshold value for constructon of the sub-county The threshold value for resource query wthn the sub-countes The weght wth reference slarty araeter. The weght wth oveent attern slarty araeter. Our roosed schee RDPM s coared wth the two related ethods - geograhc locaton-based schee (LOC) [12] and the reference slarty-based schee (SPOON) [15] n ters of the success rate of resource dscovery and the average delay. The success rate of resource dscovery s couted as the rato of the nuber of successful queres to the total nuber of the queres. The average delay s the average te used for successful queres. B. Success Rate of Resource Dscovery (b) Intercounty search effcency. (a) Intracounty search effcency. (c) Global search effcency. Fg. 7. Search effcency. We evaluate the search effcency of the three schees based on the ntra-county search, the nter-county search and the global search. Fg. 7(a) dects the ntra-county search effcency coarsons, Fg. 7(b) shows the nter-county search effcency coarsons, and Fg. 7(c) shows the global search effcency coarsons. The LOC schee leverages the slartes of the oveent atterns aong oble users for the urose of constructng countes to search the desred resources. However, ths schee does not exlot the content slarty of the resources, whch akes t less effcent than both the RDPM schee and the SPOON schee. The SPOON schee selects the oble users wth hgher reference slarty over the overlay socal networks n order to construct a county but t does not consder the hyscal councaton dstance between the users. Thus, the success rate of resource dscovery of the SPOON schee s sgnfcantly lower than that of the RDPM schee. The RDPM schee cobnes the advantages of the SPOON wth LOC schee, and hence, t can aarently rove the effcency of resource dscovery.
9 > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 9 C. Average Delay Fg. 8. Average delay. Fg. 8 shows the coarson of the three schees n ters of the average delay. Sulaton results show that the average delay of the SPOON s larger aong the three. Ths s because the query essage s forwarded to the node wth the hghest reference slarty n the SPOON schee. However, f the otal forwardng node s out of the councaton range of the requestng node, the transsson of the query essage wll ncur addtonal watng te n oortunstc wreless ad-hoc networks, whch results n hgher average delay. The resource dscovery of the LOC schee can only suort forwardng n roxate SIoT. Hence, the average delay of the LOC schee s lower than that of the SPOON schee. Nevertheless, the LOC schee does not utlze the reference slarty of the oble users. And thus, the resource dscovery of the LOC schee ncurs longer delay te than our roosed schee. Our schee leverages the reference slarty of the oble users to construct nterest countes n roxate SIoT. As shown n Fg. 8, the average delay of the RDPM schee s lower than the other two schees. VI. CONCLUSION AND FUTURE WORK Ths aer rooses a resource dscovery algorth based on reference and oveent attern slarty n dsconnected and delay-tolerant socal Internet of Thngs. Our roosed schee s based on reference and oveent attern slarty as well as ncororates the 3-denson geograhcal locaton awareness to acheve the hgher search effcency and reduce the syste overheads for socal Internet of Thngs. Our algorth has been sulated and evaluated n an oortunstc socal Internet of Thngs envronent. Sulaton results show that our roosed schee outerfors the state-of-the-art resource dscovery schees n ters of the search effcency and the average delay. To further rove the effcency of our resource dscovery algorth and to reduce the wat te of the nodes n oble socal Internet of Thngs, we lan to utlze the characterstc of day-to-day huan socal behavor to desgn an effectve behavor redcton odel to solve the technologcal roble as our future work. ACKNOWLEDGEMENT Ths work was artally suorted by the Natonal Natural Scence Foundaton of Chna under Grant No , the Natural Scence Foundaton of Jangsu Provnce under Grant No.BK and the Senor Professonal Scentfc Research Foundaton of Jangsu Unversty under Grant No.12JDG049. REFERENCES [1] L. Atzora, A. Ierab, G. Morabtoc, M. Ntt, The socal Internet of thngs (SIoT) when socal networks eet the nternet of thngs: concet, archtecture and network, Couter Networks, vol. 56, no.16, , Nov [2] S.M. Allen, M.J. Chorley, G.B. Colobo, E. Jaho, M. Karalooulos, I. Stavrakaks, et al, Exlotng user slarty and socal lnks for cro-blog forwardng n oble oortunstc networks, Pervasve and Moble Coutng, vol. 11, Arl 2014, , Arl [3] S.H. Chen, G.J. Wang, and W.J. Ja June. Cluster-grou based trusted coung for oble socal networks usng lct socal behavoral grah. Future Generaton Couter Systes. [Onlne]. Avalable:htt:// [4] F. L and J. Wu, MOPS: Provdng content-based servce n dsruton-tolerant networks, Proc. the 29th IEEE Int. Conf. on Dstrbuted Coutng Syste(ICDC 09), IEEE Press, Jun. 2009, [5] Y. L, Q. L, D.P. Jn, S. L, H. Pan and L.G. Zeng, Contact duraton aware evaluaton for content dssenaton delay n oble socal network, Wreless Councatons & Moble Coutng, vol. 15, no.3, , Feb [6] E. Pagan, L. Valero and GP. Ross Weak socal tes rove content delvery n behavor-aware oortunstc networks, Ad Hoc Networks, vol. 25, no.pb, , Feb [7] B. Guo, Z. Yu, X. Zhou, and D.Zhang, Oortunstc IoT: Exlorng the socal sde of the nternet of thngs, Proc. the 16th IEEE Int. Conf. on Couter Suorted Cooeratve Work n Desgn (CSCWD 12), IEEE Press, May 2012, [8] S. Msra, R. Barthwal, M. S. Obadat, County detecton n an ntegrated Internet of thngs and socal network archtecture, Proc. the 54th IEEE Global Councatons Conf. (GLOBECOM 12), IEEE Press, Dec 2012, [9] Z.J. Zheng, T.Y. Wang, L.Y. Song, Z. Han and J.J. Wu, Socal-aware ult-fle dssnaton n devce-to-devce overlay networks, Proc. of the 33rd IEEE Int. Conf. on INFOCOM, Couter Councatons Workshos, IEEE Press, Ar. 2014, [10] J. An, X. Gu, W. Zhang, J. Jang, Nodes Socal Relatons Cognton for Moblty-Aware n the Internet of Thngs, Proc. of the 4th IEEE Int. Conf. Internet Thngs Cyber, Phys. Soc. Cout., Thngs/CPSCo, IEEE Press, Oct. 2011, [11] M. C. Gonzales, C. A. Hdalog and A. L. Barabas, Understandng ndvdual huan oblty atterns, Nature, vol. 453, , Jun [12] L. You, J.B. L, C.J. We and L.J. Hu, MPAR: A oveent attern-aware otal routng for socal delay tolerant networks, Ad Hoc Networks, vol.24, no. PA, Jan. 2015, [13] M. Grola, P. Barsocch and S. Chessa, A socal-based servce dscovery rotocol for oble Ad Hoc networks Proc. 12th Annual Int. Conf. on Ad Hoc Networkng Worksho (MED-HOC-NET, 2013), [14] B. Quresh, G.Y. Mn and D. Kouvatsos, An adatve content sharng rotocol for P2P oble socal networks, Proc. of the 24th IEEE Int. Conf. on Advanced Inforaton Networkng and Alcatons Workshos, Ar 2010, [15] K. Chen, H.Y. Shen and H.B. Zhang, Leveragng socal networks for P2P content-based fle sharng n dsconnected MANETs, IEEE Transactons on Moble Coutng, vol. 13, , Feb [16] L. Kaufan and P.Rousseeuw, Fndng grous n data: an ntroducton to cluster analyss, John Wley and Sons, [17] K. Ar, O. Jrg and K. Teeu, The one sulator for DTN rotocol evaluaton, Proc. of the 2nd Int. Conf. on Sulaton Tools and Technques(ICST 09), Mar 2009.
10 > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 10 Zhyuan L s an assocate rofessor n the School of Couter Scence and Telecouncaton Engneerng at Jangsu Unversty. He receved hs Ph.D. degree n nforaton and councaton engneerng fro Nanng Unversty of Posts and Telecouncatons, Nanng, n Deceber He s a ebersh of Chna Couter Federaton and ACM. Hs research nterests nclude socal Internet of Thngs, oble eer-to-eer coutng, vehcle networks, and oble cloud coutng. Rulong Chen s a graduate research student n the School of Couter Scence and Telecouncaton Engneerng at Jangsu Unversty. He s a student ebersh of Chna Couter Federaton and ACM. Hs research nterests nclude oble socal networks and resource sharng. Lu Lu s the Professor of Dstrbuted Coutng at the School of Coutng and Matheatcs n the Unversty of Derby and adunct rofessor n the School of Couter Scence and Councaton Engneerng at Jangsu Unversty. Prof. Lu receved hs Ph.D. degree fro Unversty of Surrey (funded by DIF DTC) and M.S. n Data Councaton Systes fro Brunel Unversty. He s the Fellow of Brtsh Couter Socety and Meber of IEEE. Dr. Lu s research nterests are n areas of cloud coutng, servce-orented coutng, eer-to-eer coutng, vrtual coutng and syste of systes engneerng. Geyong Mn s the Professor and Drector of Hgh Perforance Coutng and Networkng (HPCN) Research Grou at the Unversty of Exeter, UK. He receved the PhD degree n Coutng Scence fro the Unversty of Glasgow, UK, n 2003, and the B.Sc. degree n Couter Scence fro Huazhong Unversty of Scence and Technology, Chna, n He oned the Unversty of Bradford as a Lecturer n 2002, becae a Senor Lecturer n 2005 and a Reader n 2007, and was rooted to a Professor n Couter Scence n Hs an research nterests nclude Next-Generaton Internet, Analytcal Modellng, Cloud Coutng, and Bg Data.
Introduction. Leslie Lamports Time, Clocks & the Ordering of Events in a Distributed System. Overview. Introduction Concepts: Time
Lesle Laports e, locks & the Orderng of Events n a Dstrbuted Syste Joseph Sprng Departent of oputer Scence Dstrbuted Systes and Securty Overvew Introducton he artal Orderng Logcal locks Orderng the Events
More informationIEEE Distributed Coordination Function(DCF): Analysis and Enhancement *
IEEE 802. Dstrbuted Coordnaton Functon(DCF): Analyss and Enhanceent * Hatao Wu, Shduan Cheng, Yong Peng, Keng Long, Jan Ma 2 Natonal Key Lab of Swtchng Technology and Telecouncaton Networks, P.O.Box 206,
More informationTHE CONDENSED FUZZY K-NEAREST NEIGHBOR RULE BASED ON SAMPLE FUZZY ENTROPY
Proceedngs of the 20 Internatonal Conference on Machne Learnng and Cybernetcs, Guln, 0-3 July, 20 THE CONDENSED FUZZY K-NEAREST NEIGHBOR RULE BASED ON SAMPLE FUZZY ENTROPY JUN-HAI ZHAI, NA LI, MENG-YAO
More informationThe ray density estimation of a CT system by a supervised learning algorithm
Te ray densty estaton of a CT syste by a suervsed learnng algort Nae : Jongduk Baek Student ID : 5459 Toc y toc s to fnd te ray densty of a new CT syste by usng te learnng algort Background Snce te develoent
More informationEvaluation of an Enhanced Scheme for High-level Nested Network Mobility
IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.
More informationOn-line Scheduling Algorithm with Precedence Constraint in Embeded Real-time System
00 rd Internatonal Conference on Coputer and Electrcal Engneerng (ICCEE 00 IPCSIT vol (0 (0 IACSIT Press, Sngapore DOI: 077/IPCSIT0VNo80 On-lne Schedulng Algorth wth Precedence Constrant n Ebeded Real-te
More informationAccess Delay Analysis of IEEE DCF in the Presence of Hidden Stations
Access Delay Analyss of IEEE 82. DCF n the Presence of Hdden tatons Fu-Y Hung and Ivan Marsc CAIP Center, ECE Deartent, Rutgers Unversty Pscataway, NJ 8854-888 {fuyhung, arsc}@ca.rutgers.edu Abstract In
More informationAn Energy-Aware QoS Routing Protocol for Wireless Sensor Networks
An Energy-Aware QoS Routng Protocol for Wreless Sensor Networks Abstract Recent advances n wreless sensor networks have led to any new routng rotocols secfcally desgned for sensor networks. Alost all of
More informationGenerating Fuzzy Term Sets for Software Project Attributes using and Real Coded Genetic Algorithms
Generatng Fuzzy Ter Sets for Software Proect Attrbutes usng Fuzzy C-Means C and Real Coded Genetc Algorths Al Idr, Ph.D., ENSIAS, Rabat Alan Abran, Ph.D., ETS, Montreal Azeddne Zah, FST, Fes Internatonal
More informationAlgorithm for Computer Aided Design Curve Shape Form Generation of Knitting Patterns
Algorth for Couter Aded Desgn Curve Shae For Generaton of Knttng Patterns Elena Zahareva-Stoyanova Techncal Unversty of Gabrovo 4 H. Drat str. 500 Gabrovo, ulgara, hone +59 59 Abstract - The knttng ndustry
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationUser Behavior Recognition based on Clustering for the Smart Home
3rd WSEAS Internatonal Conference on REMOTE SENSING, Vence, Italy, Noveber 2-23, 2007 52 User Behavor Recognton based on Clusterng for the Sart Hoe WOOYONG CHUNG, JAEHUN LEE, SUKHYUN YUN, SOOHAN KIM* AND
More informationHandover Delay Estimation Method for IMS-Based Systems with Heterogeneous Access Networks
Councatons 07; (): -7 http://www.scencepublshnggroup.co/j/co do: 0.8/j.co.0700. ISSN: 8-9 (Prnt); ISSN: 8-9 (Onlne) Handover Delay Estaton Method for IMS-Based Systes wth Heterogeneous Access Networks
More informationVirtual Machine Migration based on Trust Measurement of Computer Node
Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on
More informationMerging Results by Using Predicted Retrieval Effectiveness
Mergng Results by Usng Predcted Retreval Effectveness Introducton Wen-Cheng Ln and Hsn-Hs Chen Departent of Coputer Scence and Inforaton Engneerng Natonal Tawan Unversty Tape, TAIWAN densln@nlg.cse.ntu.edu.tw;
More informationEnergy-aware Delay-Constrained Routing in Wireless Sensor Networks
Energy-aware Delay-Constraned Routng n Wreless Sensor Networks Keal Akkaya and Mohaed Youns Departent of Coputer Scence and Electrcal Engneerng Unversty of Maryland Baltore County, Baltore, MD 21250 {keal1,
More information2016 International Conference on Sustainable Energy, Environment and Information Engineering (SEEIE 2016) ISBN:
06 Internatonal Conference on Sustanable Energy, Envronent and Inforaton Engneerng (SEEIE 06) ISBN: 978--60595-337-3 A Study on IEEE 80. MAC Layer Msbehavor under Dfferent Back-off Algorths Trong Mnh HOANG,,
More informationAdaptive Energy and Location Aware Routing in Wireless Sensor Network
Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}
More informationDelay Analysis of Different Backoff Algorithms in IEEE
Delay Analyss of Dfferent Backoff Algorths n IEEE 82. Ivan N. Vukovc otorola Inc., 44 W. Sure Dr., Arlngton Heghts, IL, 64 USA, Ivan.Vukovc@otorola.co, (847) 632-5963, fax (847) 435-997 Abstract - In ths
More informationVideo Proxy System for a Large-scale VOD System (DINA)
Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,
More informationOptimization Methods: Integer Programming Integer Linear Programming 1. Module 7 Lecture Notes 1. Integer Linear Programming
Optzaton Methods: Integer Prograng Integer Lnear Prograng Module Lecture Notes Integer Lnear Prograng Introducton In all the prevous lectures n lnear prograng dscussed so far, the desgn varables consdered
More informationSums of exponential functions and their new fundamental properties
Sus of exonental functons and ther new fundaental roertes Yur K. Shestoaloff Abstract hs aer dscovers and roves the fundaental roertes of sus of exonental functon n the for of а heore that s stated as
More informationLoad Balancing Algorithm for Web Server Based on Weighted Minimal Connections
Journal of Web ystes and Applcatons (2017) Vol. 1, Nuuber 1 Clausus centfc Press, Canada Load Balancng Algorth for Web erver Based on Weghted Mnal Connectons Pan Zhu1, a, Jangxng Zhang 2,b College of Inforaton
More informationRouting Time-Constrained Traffic in Wireless Sensor Networks
Routng Te-Constraned Traffc n Wreless Sensor Networks Keal Akkaya and Mohaed Youns Departent of Coputer Scence and Electrcal Engneerng Unversty of Maryland, Baltore County Baltore, MD 2250 keal youns@cs.ubc.edu
More informationWightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK
Wghtman Moblty Quck Reference Gude THIS SPACE INTENTIONALLY LEFT BLANK WIGHTMAN MOBILITY BASICS How to Set Up Your Vocemal 1. On your phone s dal screen, press and hold 1 to access your vocemal. If your
More informationScheduling Workflow Applications on the Heterogeneous Cloud Resources
Indan Journal of Scence and Technology, Vol 8(2, DOI: 0.7485/jst/205/v82/57984, June 205 ISSN (rnt : 0974-6846 ISSN (Onlne : 0974-5645 Schedulng Workflow Applcatons on the Heterogeneous Cloud Resources
More informationSolutions to Programming Assignment Five Interpolation and Numerical Differentiation
College of Engneerng and Coputer Scence Mechancal Engneerng Departent Mechancal Engneerng 309 Nuercal Analyss of Engneerng Systes Sprng 04 Nuber: 537 Instructor: Larry Caretto Solutons to Prograng Assgnent
More informationEfficient Distributed File System (EDFS)
Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate
More informationResearch on action recognition method under mobile phone visual sensor Wang Wenbin 1, Chen Ketang 2, Chen Liangliang 3
Internatonal Conference on Autoaton, Mechancal Control and Coputatonal Engneerng (AMCCE 05) Research on acton recognton ethod under oble phone vsual sensor Wang Wenbn, Chen Ketang, Chen Langlang 3 Qongzhou
More informationA Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes
A Low-Oerhead Routng Protocol for Ad Hoc Networks wth selfsh nodes Dongbn Wang 1, Xaofeng Wang 2, Xangzhan Yu 3, Kacheng Q 1, Zhbn Xa 1 1 School of Software Engneerng, Bejng Unersty of Posts and Telecommuncatons,100876,
More informationSynchronous Distributed Wireless Network Emulator for High-Speed Mobility: Implementation and Evaluation
Synchronous Dstrbuted Wreless Network Emulator for Hgh-Speed Moblty: Implementaton and Evaluaton Mnoru Kozum, Tomoch Ebata Yokohama Research Laboratory, Htach, Ltd., 292 Yoshda-cho, Totsuka-ku, Yokohama,
More information126 Int. J. Ad Hoc and Ubiquitous Computing, Vol. 1, No. 3, Djamel Djenouri*
126 Int. J. Ad Hoc and Ubqutous Coputng, Vol. 1, No. 3, 2006 New power-aware routng protocol for oble ad hoc networks Djael Djenour* Basc Software Laboratory, CERIST Center of Research, Algers, Algera
More informationRegion Segmentation Readings: Chapter 10: 10.1 Additional Materials Provided
Regon Segmentaton Readngs: hater 10: 10.1 Addtonal Materals Provded K-means lusterng tet EM lusterng aer Grah Parttonng tet Mean-Shft lusterng aer 1 Image Segmentaton Image segmentaton s the oeraton of
More informationA FUZZY-LOGIC APPROACH FOR DEVELOPING VARIABLES CONTROL CHARTS AND PROCESS CAPABILITY INDICES UNDER LINGUISTIC MEASUREMENTS
A FUZZY-LOGIC APPROACH FOR DEVELOPING VARIABLES CONTROL CHARTS AND PROCESS CAPABILITY INDICES UNDER LINGUISTIC MEASUREMENTS Abbas Al-Refae, Areen Obadat 1, Ra H. Fouad 1, and Bassel Hanayneh 1 Deartent
More informationMOBILITY-BASED MULTICAST ROUTING ALGORITHM FOR WIRELESS MOBILE AD-HOC NETWORKS: A LEARNING AUTOMATA APPROACH
بسم االله الرحمن الرحيم (الهي همه چيز را به تو مي سپارم ياريم كن) MOBILITY-BASED MULTICAST ROUTING ALGORITHM FOR WIRELESS MOBILE AD-HOC NETWORKS: A LEARNING AUTOMATA APPROACH JAVAD AKBARI TORKESTANI Deartment
More informationEquation Based Rate Control and Multiple Connections for Adaptive Video Streaming in Cellular Networks
Equaton Based Rate Control and Multple Connectons for Adaptve Vdeo Streang n Cellular Networks A. Mardanan Dehkord and V. Tabataba Vakl Abstract Rate control s an portant ssue for vdeo streang n cellular
More informationFEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur
FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents
More informationVirtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory
Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process
More informationA study of Adaptive Replication Technique in routing time-constrained messages (VoIP) in MANET
A study of Adaptve Replcaton Technque n routng te-constraned essages (VoIP) n MANET SWATI SAXENA Research Scholar AIM & ACT Banasthal Vdyapth Banasthal, (Ra.) Dr. MADHAVI SINHA Asst. Prof. (HOD) Dept.
More informationAdvanced LEACH: A Static Clustering-based Heteroneous Routing Protocol for WSNs
Advanced LEACH: A Statc Clusterng-based Heteroneous Routng Protocol for WSNs A. Iqbal 1, M. Akbar 1, N. Javad 1, S. H. Bouk 1, M. Ilah 1, R. D. Khan 2 1 COMSATS Insttute of Informaton Technology, Islamabad,
More informationAn Efficient Fault-Tolerant Multi-Bus Data Scheduling Algorithm Based on Replication and Deallocation
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volue 16, No Sofa 016 Prnt ISSN: 1311-970; Onlne ISSN: 1314-4081 DOI: 10.1515/cat-016-001 An Effcent Fault-Tolerant Mult-Bus Data
More informationConcurrent Apriori Data Mining Algorithms
Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng
More informationUsing Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol
2012 Thrd Internatonal Conference on Networkng and Computng Usng Partcle Swarm Optmzaton for Enhancng the Herarchcal Cell Relay Routng Protocol Hung-Y Ch Department of Electrcal Engneerng Natonal Sun Yat-Sen
More informationVRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
More informationTracing Anonymous Mobile Attackers in Wireless Network
Internatonal Journal of Dgtal Content Technology and ts Applcatons Volue 4, uber 4, July 2010 Tracng Anonyous Moble Attacers n Wreless etwor Mng Hour Yang *1, Shuhpyng Sheh *2 *1 Departent of Inforaton
More informationRecognition of Identifiers from Shipping Container Images Using Fuzzy Binarization and Enhanced Fuzzy Neural Network
Recognton of Identfers from Shng Contaner Images Usng uzzy Bnarzaton and Enhanced uzzy Neural Networ Kwang-Bae Km Det. of Comuter Engneerng, Slla Unversty, Korea gbm@slla.ac.r Abstract. In ths aer, we
More informationA system based on a modified version of the FCM algorithm for profiling Web users from access log
A syste based on a odfed verson of the FCM algorth for proflng Web users fro access log Paolo Corsn, Laura De Dosso, Beatrce Lazzern, Francesco Marcellon Dpartento d Ingegnera dell Inforazone va Dotsalv,
More informationVoid Vertex Genetic Algorithm for Production-Distribution Supply Chain with GTSP Model
ISSN 746-7659 England UK Journal of Inforaton and Coutng Scence Vol. No. 5 26. 259-265 Vod Vertex Genetc Algorth for Producton-Dstrbuton Suly Chan wth GTSP Model X Zhao 2 Jan-lang Ln Han Huang 3 Zh-feng
More information6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour
6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the
More informationLoad Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More informationCellular Traffic Offloading through Opportunistic Communications Based on Human Mobility
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 9, NO. 3, Mar. 2015 872 Copyrght c 2015 KSII Cellular Traffc Offloadng through Opportunstc Communcatons Based on Human Moblty Zhgang L 1, Yan
More information1 Calculation and Analysis of Buffer
Sep. 5 Journal of Electronc Scence and Technology of Chna Vol.3 No.3 ` Calculaton and Analyss of Destnaton Buffer for ulteda Servce n ole Ad Hoc Network ZHOU Zhong, AO Yu-ng, JIANG Zh-qong. School of Councaton
More informationDistributed Grid based Robust Clustering Protocol for Mobile Sensor Networks
414 The Internatonal Arab Journal of Informaton Technology, Vol. 8, No. 4, October 011 Dstrbuted Grd based Robust Clusterng Protocol for Moble Sensor Networks Shahzad Al and Sajjad Madan Department of
More informationSimulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationDesign of Structure Optimization with APDL
Desgn of Structure Optmzaton wth APDL Yanyun School of Cvl Engneerng and Archtecture, East Chna Jaotong Unversty Nanchang 330013 Chna Abstract In ths paper, the desgn process of structure optmzaton wth
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationAn Adaptive Sleep Strategy for Energy Conservation in Wireless Sensor Networks
An Adaptve Sleep Strategy for Energy Conservaton n Wreless Sensor Networks Guseppe Anastas, Marco Cont, Maro D Francesco Abstract - In recent years, wreless sensor network deployents for real lfe applcatons
More informationThe Codesign Challenge
ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.
More informationAN ALGORITHM FOR ODD GRACEFULNESS OF THE TENSOR PRODUCT OF TWO LINE GRAPHS
Internatonal ournal on applcatons of graph theory n wreless ad hoc networks and sensor networks (GRAPH-HOC) Vol.3, No., March 0 AN ALGORITHM FOR ODD GRACEFULNESS OF THE TENSOR PRODUCT OF TWO LINE GRAPHS
More informationColor Image Segmentation Based on Adaptive Local Thresholds
Color Iage Segentaton Based on Adaptve Local Thresholds ETY NAVON, OFE MILLE *, AMI AVEBUCH School of Coputer Scence Tel-Avv Unversty, Tel-Avv, 69978, Israel E-Mal * : llero@post.tau.ac.l Fax nuber: 97-3-916084
More informationA Clustering-Based Fast and Stable Routing Protocol for Vehicular Ad Hoc Networks
Journal of Physcs: Conference Seres PAPR OPN ACCSS A Clusterng-ased Fast and Stable Routng Protocol for Vehcular Ad Hoc Networks To cte ths artcle: P F Zhao et al 2018 J. Phys.: Conf. Ser. 1060 012050
More informationThe Hybrid Mobile Wireless Sensor Networks for Data Gathering
The Hybrd Moble Wreless Sensor Networks for Data Gatherng Bao Ren Bejng Unv. of Posts & Telecommuncatons, Bejng 876, Chna +86--62287 renb@bupt.edu.cn Jan Ma Noka Research Center, Bejng 3, Chna +86--65392828-2883
More informationA Scheduling Algorithm of Periodic Messages for Hard Real-time Communications on a Switched Ethernet
IJCSNS Internatonal Journal of Comuter Scence and Networ Securty VOL.6 No.5B May 26 A Schedulng Algorthm of Perodc Messages for Hard eal-tme Communcatons on a Swtched Ethernet Hee Chan Lee and Myung Kyun
More informationPositive Semi-definite Programming Localization in Wireless Sensor Networks
Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer
More informationE-DEEC- Enhanced Distributed Energy Efficient Clustering Scheme for heterogeneous WSN
21 1st Internatonal Conference on Parallel, Dstrbuted and Grd Comutng (PDGC - 21) E-DEEC- Enhanced Dstrbuted Energy Effcent Clusterng Scheme for heterogeneous WSN Parul San Deartment of Comuter Scence
More informationThe Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique
//00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy
More informationA KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE
A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs
More informationFINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK
FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK L-qng Qu, Yong-quan Lang 2, Jng-Chen 3, 2 College of Informaton Scence and Technology, Shandong Unversty of Scence and Technology,
More informationA New Transaction Processing Model Based on Optimistic Concurrency Control
A New Transacton Processng Model Based on Optmstc Concurrency Control Wang Pedong,Duan Xpng,Jr. Abstract-- In ths paper, to support moblty and dsconnecton of moble clents effectvely n moble computng envronment,
More informationRAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:
Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:
More informationBioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.
[Type text] [Type text] [Type text] ISSN : 0974-74 Volume 0 Issue BoTechnology 04 An Indan Journal FULL PAPER BTAIJ 0() 04 [684-689] Revew on Chna s sports ndustry fnancng market based on market -orented
More informationSteps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices
Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between
More informationMachine Learning: Algorithms and Applications
14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of
More informationPriority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks
Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,
More informationSignificance of Eigenvector Centrality for Routing in a Delay Tolerant Network
Journal of Computatons & Modellng, vol.1, no.1, 2011, 91-100 ISSN: 1792-7625 (prnt), 1792-8850 (onlne) Internatonal Scentfc Press, 2011 Sgnfcance of Egenvector Centralty for Routng n a Delay Tolerant Network
More informationEducational Semantic Networks and their Applications
BUIU Unverstăţ Petrol Gaze dn Ploeşt Vol. X o. /008 77-85 Sera atematcă - Informatcă - Fzcă ducatonal Semantc etwors and ther Alcatons Gabrela ose vu Ionţă Unverstatea Petrol-Gaze dn Ploeşt Bd. Bucureşt
More informationProfessional competences training path for an e-commerce major, based on the ISM method
World Transactons on Engneerng and Technology Educaton Vol.14, No.4, 2016 2016 WIETE Professonal competences tranng path for an e-commerce maor, based on the ISM method Ru Wang, Pn Peng, L-gang Lu & Lng
More informationMaking Name-Based Content Routing More Efficient than Link-State Routing
Makng Name-Based Content Routng More Effcent than Lnk-State Routng Ehsan Hemmat and J.J. Garca-Luna-Aceves, Comuter Engneerng Deartment, UC Santa Cruz, Santa Cruz, CA 95064 PARC, Palo Alto, CA 94304 {
More informationTraffic Classification Method Based On Data Stream Fingerprint
5th nternatonal Conference on Advanced Materals and Comuter Scence (CAMCS 6) Traffc Classfcaton Method Based On Data Stream Fngerrnt Kefe Cheng, a, Guohu We,b and Xangjun Ma3,c College of Comuter Scence
More informationPattern Classification of Back-Propagation Algorithm Using Exclusive Connecting Network
World Acade of Scence, Engneerng and Technolog 36 7 Pattern Classfcaton of Bac-Propagaton Algorth Usng Eclusve Connectng Networ Insung Jung, and G-Na Wang Abstract The obectve of ths paper s to a desgn
More informationRelational Analysis based Concurrent Multipath Transfer over Heterogeneous Vehicular Networks
www.ijcsi.org 1 Relatonal Analyss based Concurrent Multpath Transfer over Heterogeneous Vehcular Networks Yuanlong Cao 1, Changqao Xu 1,2, Janfeng Guan 1, Ja Zhao 3, We Quan 1, Mngchuan Zhang 1 and Hongke
More informationModelling Spatial Substructure in Wildlife Populations using an Approximation to the Shortest Path Voronoi Diagram
18 th World IMACS / MODSIM Congress, Carns, Australa 13-17 July 2009 http://ssanz.org.au/ods09 Modellng Spatal Substructure n Wldlfe Populatons usng an Approxaton to the Shortest Path Vorono Dagra Stewart,
More informationA Resources Virtualization Approach Supporting Uniform Access to Heterogeneous Grid Resources 1
A Resources Vrtualzaton Approach Supportng Unform Access to Heterogeneous Grd Resources 1 Cunhao Fang 1, Yaoxue Zhang 2, Song Cao 3 1 Tsnghua Natonal Labatory of Inforamaton Scence and Technology 2 Department
More informationEfficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks
1 Chen-Mn Wu, 2 Hu-Ka Su, 3 Wang-Has Yang *1,Correspondng Author Nanhua Unversty, cmwu@mal.nhu.edu.tw 2 Natonal Formosa Unversty, hksu@nfu.edu.tw 3 Hsupng Insttute of Technology, yangwh@mal.ht.edu.tw do:10.4156/jact.vol3.
More informationMobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks
Moblty Based Routng Protocol wth MAC Collson Improvement n Vehcular Ad Hoc Networks Zhhao Dng, Pny Ren, Qnghe Du Shaanx Smart Networks and Ubqutous Access Rearch Center School of Electronc and Informaton
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationHermite Splines in Lie Groups as Products of Geodesics
Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the
More informationSecurity Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments
Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub
More informationAN INDEXING METHOD FOR SUPPORTING SPATIAL QUERIES IN STRUCTURED PEER-TO-PEER SYSTEMS
AN INDEXING METHOD FOR SUPPORTING SPATIAL QUERIES IN STRUCTURED PEER-TO-PEER SYSTEMS Lngku Meng a, Wenun Xe a, *, Dan Lu a, b a School of Remote Sensng and Informaton Engneerng, Wuhan Unversty, Wuhan 4379,
More informationLearn more at
Proceedngs of OMAE 6: 5 th Internatonal Conference on Offshore Mechancs and Arctc Engneerng June 4-9, 6, Haburg, Gerany OMAE6-9366 OPTIMIZATION OF SENSOR PLACEMENT TO CAPTURE RISER VIV RESPONSE Shreenaath
More informationResource and Virtual Function Status Monitoring in Network Function Virtualization Environment
Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087
More informationMeasuring Cohesion of Packages in Ada95
Measurng Coheson of Packages n Ada95 Baowen Xu Zhenqang Chen Departent of Coputer Scence & Departent of Coputer Scence & Engneerng, Southeast Unversty Engneerng, Southeast Unversty Nanjng, Chna, 20096
More informationMulti-Constraint Multi-Processor Resource Allocation
Mult-Constrant Mult-Processor Resource Allocaton Ar R. B. Behrouzan 1, Dp Goswa 1, Twan Basten 1,2, Marc Gelen 1, Had Alzadeh Ara 1 1 Endhoven Unversty of Technology, Endhoven, The Netherlands 2 TNO Ebedded
More informationA Traffic Aware Routing Protocol for Congestion Avoidance in Content-Centric Network
, pp.69-80 http://dx.do.org/10.14257/jmue.2014.9.9.08 A Traffc Aware Routng Protocol for Congeston Avodance n Content-Centrc Network Jung-Jae Km 1, Mn-Woo Ryu 2*, S-Ho Cha 3 and Kuk-Hyun Cho 1 1 Dept.
More informationuser journey: a series of steps (typically 4-12) which represent a scenario in which a user might interact with the thing you are designing.
Topc Dscovery user journey: a seres of steps (typcally 4-12) whch represent a scenaro n whch a user mght nteract wth the thng you are desgnng. Two (2) man uses: 1. demonstratng the way users currently
More informationGeneralized Spatial Kernel based Fuzzy C-Means Clustering Algorithm for Image Segmentation
Internatonal Journal of Scence and Research (IJSR, Inda Onlne ISSN: 39-7064 Generalzed Spatal Kernel based Fuzzy -Means lusterng Algorth for Iage Segentaton Pallav Thakur, helpa Lnga Departent of Inforaton
More informationDiscovering User Access Pattern Based on Probabilistic Latent Factor Model
Dscoverng User Access Pattern Based on Probablstc Latent Factor Model Guandong Xu, Yanchun Zhang, Jangang Ma School of Comuter Scence and Mathematcs Vctora Unversty PO Box 14428, VIC 8001, Australa {xu,yzhang,ma}@csm.vu.edu.au
More informationWireless Temperature Monitoring Overview
Wreless Temperature Montorng Overvew Wreless Temperature Montorng and Alerts. Your Dashboard gves you advanced montorng, alerts (SMS or Emals), graphng and PDF reports from anywhere n the world. Product
More informationProper Choice of Data Used for the Estimation of Datum Transformation Parameters
Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and
More information