Research Article A Game-Based Secure Localization Algorithm for Mobile Wireless Sensor Networks
|
|
- Todd Haynes
- 5 years ago
- Views:
Transcription
1 Internatonal Dstrbuted Sensor Networks Volume 205, Artcle ID 64207, 8 pages Research Artcle A Game-Based Secure Localzaton Algorthm for Moble Wreless Sensor Networks Tanyue Bao,,2 Jangwen Wan, Kefu Y, and Qang Zhang School of Instrumentaton Scence and Optoelectroncs Engneerng, Bejng Unversty of Aeronautcs and Astronautcs (Behang Unversty), Bejng 009, Chna 2 Northeast Petroleum Unversty, Daqng 6338, Chna Correspondence should be addressed to Jangwen Wan; jwwan@buaaeducn Receved 25 March 205; Revsed 23 June 205; Accepted 3 August 205 Academc Edtor: Feng Hong Copyrght 205 Tanyue Bao et al Ths s an open access artcle dstrbuted under the Creatve Commons Attrbuton Lcense, whch permts unrestrcted use, dstrbuton, and reproducton n any medum, provded the orgnal work s properly cted The ssue of node localzaton s a fundamental problem n wreless sensor networks Recently, the localzaton problem for moble sensor networks n hostle envronment has receved sgnfcant attenton Due to the moblty of the sensor nodes, t s more challengng to acheve node localzaton n attacked sensor networks than n statc ones To address these challenges, the paper presents a novel game-based secure localzaton algorthm The nodes strategy level can be ndcated through the results of trust evaluaton and then by means of constructng reasonable strategy space and payoff functon usng game theory; all knds of nodes wthn the network can acheve the optmal payoffs The performance of our algorthm s evaluated by extensve smulaton experments The smulaton results show that the localzaton error of our proposed algorthm s lower than those of the exstng ones n attacked envronment Introducton Wth the development of mcrocomputer technology, moble wreless sensor networks (MWSNs) are wdely used n many felds, such as underwater sensor, border detecton, and anmal trackng [, 2 Locaton awareness s very mportant because many applcatons of MWSNs depend on the nformaton of locatons of sensor nodes Localzaton s to obtan the nodes poston [3, 4 In most exstng sensor networks, nodes are statc However, n some modern applcatons, localzatons become a dffculty, when nodes are movng and beng attacked [5 A moble node s unable to receve locaton nformaton rapdly and accurately when t s attacked [6 The false coordnates or dstance estmaton wll cause a major localzaton error for normal sensor nodes In ths case, some methods should be explored to elmnate or reduce the adverse nfluence caused by malcous beacon nodes and ensure safe localzaton n moble WSNs In ths paper, we propose a game-based securty localzaton (GSL) algorthm for solvng the moble node selflocalzaton problem wth the exstence of malcous node Frstly, node n multple hop transmsson decdes the behavor grade accordng to the tme and space nformaton Secondly, accordng to the behavor grade, the complete multrsk level strategy space s constructed and s updated over tme Fnally, node selects a behavor grade to obtan optmal benefts Smulaton experment results show that the algorthm can effectvely restran node s malcous behavors and boost the cooperaton ablty of the network The localzaton error wth GSL s lower than those wthout GSL n moble and attacked envronment The remander of ths paper s organzed as follows Secton 2 ntroduces related works on secure localzaton algorthms Secton 3 presents the network model, attack model, and game model Secton 4 provdes the detal of GSL algorthm Secton 5 presents the smulaton results and Secton 6 concludes the paper 2 Related Works The research n securty localzaton algorthm for wreless sensor networks s manly dvded nto two methods The frst method s based on sensor nodes It can prevent nodes
2 2 Internatonal Dstrbuted Sensor Networks from beng affected by the attack through the establshment of protecton mechansms (Verfable Multlateraton, SeR- Loc, etc), or removng malcous nodes from the network usng the effectve detecton and flterng methods (DRBTS, ARMMSE, and a votng-based algorthm, etc) The second method s based on securty equpment It can mprove the defense capablty of the network by addng securty equpment n the physcal layer Lazosetal[7presentarobustpostonngsystemcalled ROPE whch utlzes a locaton verfcaton technque to dentfy the locaton clams of the sensor nodes before data collecton Yang et al [8 analyze the outler data detecton problem and desgn a stray montorng algorthm based on general cycle blateraton, whch reduced to data from the group to mprove localzaton accuracy Yuetal[9proposeaBRS-basedrobustsecurelocalzaton (BRSL) algorthm, amng at reducng the mpact of the malcous attackers n the network The BRSL method ncludes two phases: the setup trust evaluaton framework and the localzaton stage We and Guan [0 ntroduce a novel scheme called a lghtweght postonng verfcaton algorthm (LPVA); t does not rely on dedcated hardware equpment under the condton of network attack resstance and can be used n the low-cost network Xao et al [ propose a robust network localzaton algorthm call RobustLoc, based on a robust patch mergng operaton that can reject outlers for both multlateraton and patch mergng The above studes manly elmnate the fake beacon nformaton (ROPE, RobustLoc, etc) or detect malcous nodes (LPVA, BRSL, etc) or ncrease equpment to mprove localzaton accuracy but seldom deal wth acton nformaton of sensor nodes, when nodes are moble Our proposal utlzed an mproved game theory and the sensor nodes pluralstc behavor n the network to establsh a trust-preferental strategy, whch make the beacons cooperate effectvely 3 Network Model 3 Network Envronment In an envronment under attack, a moble wreless sensor network conssts of anchor nodes, unknown nodes, and malcous nodes; nodes wth known coordnates are called anchor nodes, nodes whose coordnates are unknown are called unknown nodes, and nodes whch are captured and possbly attack are called malcous nodes All nodes are randomly dstrbuted n the twodmensonal space of the network and on the move As shown n Fgure, the communcaton radus of each node n the network s represented by r and the maxmum movng speed s represented by V max Each node has a unque ID, and the coordnates of unknown nodes are estmated by obtanng the coordnate nformaton of adjacent anchor nodes 32 Attack Model In the sequental Monte-Carlo localzaton algorthm, coordnates of unknown nodes are calculated b3 b2 b2 b3 d3 b d2 d N d4 d5 b4 d7 a d6 2r b5 b6 d8 Attack channel b7 d9 a2 d2 b8 d0 d 2r b0 Fgure : Attack model wth long attack dstance d3 b d2 d4 d b4 N d7 d5 a d6 b5 2r b6 b7 Attack channel d8 d9 a2 d2 b0 d0 2r b8 d Fgure 2: Attack model wth short attack dstance through sample set [2 The unknown node wll select locatonsofanchornodeswthnsnglehopandtwohops as members of the sample set, and therefore the accuracy of locaton nformaton of anchor nodes wthn ths scope determnes the accuracy of postonng [3 The attack models used n ths paper are shown n Fgures and 2 The unknown node N can montor the nformaton of anchor nodes (b b6) Meanwhle, t may be attacked by the malcous node a The malcous node a obtans the nformaton of anchor nodes (b7 b0) provded by a2 (from the regon of a2) through the attack channel and transmts ths nformaton to the unknown nodes Nodes to be postoned wll mstakenly take such beacon nodes as reference nformaton wthn ts two-hop range, causng localzaton errors of unknown nodes We assume that the attack channel between malcous nodes s ndependent of dstance Potental cases of attacks are shown n Fgure where the dstance between malcous nodes s long, and estmaton of coordnates of unknown nodes based on coordnates transmtted by malcous nodes wll cause large errors In Fgure 2, the dstance between malcous nodes s relatvely short, and the two-node scopes of malcous nodes have an area of ntersecton n whch the node b6 s located In a multhop network, we use T to represent the tme of each hop For the unknown node N,thedstancebetween t and d d6 s one hop and the communcaton tme s T b9 b9
3 Internatonal Dstrbuted Sensor Networks 3 To obtan data, d7 channel has to cover three hops, so ts communcaton tme s 3T 33 Game Model 33 Game Partcpants In the process of moble postonng, every unknown node wll obtan the nformaton of beacon nodes wthn one hop or two hops [4 For attacks whch may exst n data transmsson lnks, all nodes nvolved n the transmsson of nformaton are game partcpants Therefore, partcpants n the game model nclude nformaton sender T, nformaton recpent R, andn nformaton forwarders E Throughout nformaton transmsson, the data sent by the sendng node may travel through n forwardng nodes to reach the recevng node, so the number of partcpants of the game s n Strategy Space In ths paper, we defne the strategy space accordng to the dfferent behavors of nodes Node behavors nclude cooperatve, uncooperatve, and attack behavor Accordng to the dfferent attack effect, the attack behavor s dvded nto n level, and the attack level s determned by the attack effect For example, the nfluence of the attack n Fgure s much greater than that n Fgure 2, so the attack level n Fgure s hgher than n Fgure 2 We dvde node actons nto multple levels accordng to ther effects We call the behavors taken by nodes, whch are shown n Table, strategy space In the strategy space set of nodes G = {C,U,A, A 2,,A n }, {C, U} represent cooperatve behavors and uncooperatve behavors, respectvely Cooperatve behavors refer to the cooperatve response of nodes, such as recevng or forwardng after lstenng to sgnals Uncooperatve behavors refer to the fact that the nodes do not deal wth the nformaton whch needs recevng or forwardng; that s, no response wll be carred out where the set {A,A 2,,A n } represents a collecton of dfferent levels of attacks Attack level depends on the degree of nfluence of reference coordnates on the postonng accuracy In the postonng process, for example, dfferent attacks have dfferent effects on the accuracy of postonng The longer the dstance between false coordnates and actual coordnates (Fgure ) s, the stronger the attack s destructve power wll be, the bgger the postonng error wll be, and the hgher the attack level wll be The false coordnate nformaton (Fgure 2) wth short dstance can help localzaton when anchor nodes are sparse, so ts attack level s low 333 Game Payoff In the game process of transmsson of postonng nformaton, the payoff of a partcpant after choosng a strategy at the moment of t can be u k(t),where k(t) G For the attack nodes and each nformaton sender, every gamer who partcpates n the nformaton transmsson wll choose a behavor mode n the strategy space G, resultng n payoff The payoff of gamers comes manly from the gan obtaned by behavors m k(t) and ther own loss c k(t), and therefore the payoff functon s u k(t) = m k(t) c k(t), k(t) G The nformaton recpent wll obtan Symbol dentfcaton C U A A 2 A n Table : Strategy space of nodes Behavor mode Cooperatve Uncooperatve Level attack Level 2 attack Level n attack themaxmumpayofffromthecorrectnformatonprovded orforwardedbythesendngnodeorforwardngnodeon thecontrary,rejectonorattackwllreducethepayoffatthe moment of t, the payoff functon of normal nodes can be expressed as u C (t) u U (t) 0 u A (t) u An (t), whle the payoff functon of attack nodes can be expressed as u An (t) u A (t) 0 u U (t) u C (t) 334 Trust Level In the attack models mentoned above, the attacks are characterzed by changng tme reference and tamperng wth the spatal reference Changes of tme reference reflect on the ncrease of the number of hops from thebeaconnodetotherecevngnodeinformatonofeach anchor node obtaned by unknown nodes has tme weghts whch can be used to determne attack payoff The bgger the tme weght s, the greater the attack payoff wll be, and so the hgher the nfluence of attacks on the accuracy of coordnates of unknown nodes wll be In Fgure, the malcous coordnate data of the beacon node b7 reaches the unknown node N through 3 hops, of whch the tme nformaton s 3T (T s the tme nterval of each segment) Obvously, the longer the tme s, the greater the nfluence of attacks on postonng wll be Tamperng of spatal reference data reflects on the fact that coordnate nformaton s changed by the malcous node In Fgure, the malcous node a changes ts coordnates to the coordnates of b7 b0, and the dstance between these coordnates and the node to be postoned s much larger than two hops of the unknown node N, serously affectng the postonng accuracy of the unknown node Dempster Shafer (abbrevated D-S) evdence theory s adopted n ths paper to calculate the trust values [5 based on the data nformaton of tme and space Trust levels are defned by trust values We use three varables, a, b, c,to quantfy the degree of a node behavor a represents the measurement of a note that s not attacked, b represents the measurement of a note that has been attacked, and c represents the measurement of a note whose behavor s unknown The measurement of node behavor can be dvded nto the followng stuatons: () Measurement analyss of behavor of tme parameter Assumng that β t = (t Δt)/Δt: a =a +, b =b,
4 4 Internatonal Dstrbuted Sensor Networks c =c ; βt N N +2 M< N N +2 A N a =a, b =b +β t, N 2 N M< N +2 N +2 A 2 N c =c ; βt > () 0 M< N +2 A n (2) Measurement analyss of behavor of spatal parameter To represent the Eucldean dstance between any two beacon nodes, we use d j = (x x j ) 2 +(y y j ) 2 a,j =a,j +, b,j =b,j, c,j =c,j ; N N+ M< N +2 N +2 N+ N +2 M< Fgure 3: Acton-trust based mappng rule U C N+ a,j =a,j, b,j =b,j, 0 d j 2r (2) an empty set and {A, B}, {A, C}, {B, C}, {A, B, C} are consdered to be mpossble events n ths paper, we get m(0) = m(a, B) = m(a, C) = m(b, C) = m(a, B, C) = 0 c,j =c,j +[ d j 2r ; r d j >2r (3) Quanttatve classfcaton of trust levels If there s nformaton of n anchor nodes around the unknown node, we can determne the quantzed values of each node based on the measurement of tme and space wth the followng formula: m (A) = m (B) = m (C) = a a a a +b b +b c +b +c +c +c, where a =a +a, b =b +b,andc =c +c,where A, B, andc represent three exclusve trust states of nodes, namely, trust, dstrust, and uncertanty (4) In our scheme, a dstngushed framework Θ=[A, B, C s set up frstly The power set of Θ s 2 Θ = {0, {A}, {B}, {C}, {A, B}, {A, C}, {B, C}, {A, B, C}}Then the basc probablty assgnment (BPA) functon s constructed, that s, m : 2 Θ [0, For0 s (3) 335 Level Mappng By the above methods, the tme and space parameters of moble postonng can be converted nto trust levels, and a parameter M can be determned n the trust levels of each node, where M = MAX{m(A), m(b), m(c)} Thegamespaceofbehavorsofa node s {A,A 2,,A n,u,c},consstngofn+2elements We construct the followng rules (Fgure 3) to map the trust valuetogamebehavoronebyonethebggerthetrustvalue s, the hgher level the mapped behavor wll be The trust levels of nodes can be used to dentfy the elements of the behavor space by establshng the mappng relatonshp 4 Game Calculaton wth Strategy Evoluton 4 Strategc Game Every node has a trust vector T = (T A,T A2,,T U,T V ) T,sowedefnethebehavorgamespace of each node as j {A,A 2,,A n,u,c}inthemappng relatonshp, every element of the trust vector M s the probablty of the behavor space; hence 0 T j,and j= T j = We assume that n the process of postonng the behavor of the nformaton sender s dentfed as and the behavor of partcpatng node s dentfed as j, where, j {A,A 2,,A n,u,c} We defne the trust assgnment relatonshp matrx as T,j ; then the element of ths matrx model s the trust level of a node when t faces the sender wth the behavor
5 Internatonal Dstrbuted Sensor Networks 5 dentfcaton of j and the mode selecton dentfcaton of : [T,j () () N N N N =θ [ [ N N + ( θ) N N N N [ N+ N+ [ N N N N N N N+ N+ N N N N N N N+ N+ N+ The matrx T,j defnes the trust level dentfcatons of a node based on dfferent behavors of the nformaton sender whenthenodesrecevngthenformaton(θ = 0)and forwardng the nformaton (θ =) For example, when the recevng node or forwardng node receves the behavor of the nformaton sender A, the hgher the level of the selected attack s, the lower ts trust value wll be For a node, the purpose of adoptng strategc game durng postonng s to choose a behavor wth hgher trust (4) degree through behavor dentfcaton, thus achevng the best postonng results Accordng to ths rule, the expected behavor of each node whch partcpates n the game s T : U (N+) T U (N+) =θ [ [ C () T C () C () + ( θ) [ [ C () T (5) 42 Update Mechansm At the ntal phase, the node has a hgher wllngness to collaborate, and ts ntal trust vector s defned as T(0) = (0,0,,0,) T Atthetmepontoft, the level dentfcaton of nstantaneous trust K,j can be obtaned accordng to the trust matrx [T,j () (),therelaynode dentty θ, the behavor dentty of the nformaton transmsson node j, and the behavor dentty of the partcpatng node The update equaton of the trust vector can be expressed as T (t+) = A (δ,j T (t) +( δ,j )K,j ), (6) where δ,j s the tme factor δ,j = (δ A,δ A2,,δ U,δ V ), descrbng the degree of couplng between the transent effect andthetrustvectoroftheprevousmomentthegreater the δ s, the more dependent the trust vector wll be on the value of the prevous moment n the system, whereas the nstantaneous trust has a relatvely small mpact on t, and vce versa A s the trust transmsson matrx, whose role s to overcome the msjudgment of the trust vctor caused by montorng errors or transmsson mstakes The specfc form s below: p N p N p N p N p N p p N p N N A () () = p p p p p, (7) p N+ p N+ p p N+ N+ [ p p p [ where p N represents the probablty of the trust level beng correctly dentfed 43 The Condtons of Game Equlbrum In the process of moble localzaton, the steady-state convergence condton of the above mentoned game model s solved by means of evolutonary game deas and prncples for maxmzng payoffaccordng to the evolutonary game theory, when the system s n ntal operaton, each member node n that partcpates n localzaton selects the approprate acton partcpaton way n accordance wth the expectaton acton
6 6 Internatonal Dstrbuted Sensor Networks Table 2: Default parameter settngs Model parameter Default settng The number of node N 5000 The rato of beacon node ρ 02 Communcaton radum r 50 m Maxmum movng speed V max 0 m/s Probablty of dentfyng trust level p N 075 Tme factor δ,j =(δ A,δ A2,,δ U,δ V ) (05, 05,, 05, 05) space T and the trust decson-makng framework At the tme pont of t+, the probablty of the node n selectng the acton a n (t + ) = {A,A 2,,A n,u,c}s obtaned by the followng formula: Pr [a n (t) =P n, (t) Pr [a n (t+) = = j= Pr [a n (t) =jp n,j (t), (8) where P n, (t) s the nstantaneous payoff the partcpatng node n obtans by selectng the acton of whch the acton space s dentfed as,at the tmepont oft The suffcent condton for the evolutonary convergence s proven n the lterature, and ultmately the acqured game convergence condton s P θ Pθ <0, p > 5 Performance Evaluaton θ=0, (9) 5 Smulaton Settng In ths secton, we desgned a moble network smulaton experment to verfy the effects of the trust game-based moble localzaton method on cooperaton andlocalzatonperformanceofthemoblesensornetwork node and conducted the smulaton n Matlab The default settng s wth 5,000 nodes deployed and movng wthn the 0000 m 0000 m area at random The movng speed s n the range of [0, V max (where V max s the maxmum movng speed) The default parameters are as n Table 2 52 Smulaton Results ()Thesmulatonhasanalyzedtheeffectofthegame algorthm on node cooperaton In the case of dfferent ratos of malcous nodes (20%, 40%, and 60%, resp), the stuatons of nodes partcpatng n cooperaton va game are shown n Fgure 4 The Fgure shows that, wth the ncrease of the game number, the rato of nodes whch select cooperaton also ncreases Fnally, the rato value of nodes whch select cooperaton tends to be stablzed In the ntal state, the ratos of malcous nodes are 20%, 40%, and 60%; after the game s stable, the ratos of cooperatve membershavebeenrasedfrom458%,36%,and 96% to 839%, 786%, and 724% Smulaton results Cooperatve populaton % malcous rato 40% malcous rato 60% malcous rato Game ndex Fgure 4: The overall effect of cooperatve performance under varous orgnal malcous ratos show that the algorthm can effectvely mprove cooperaton of nodes, ensure transmsson of localzaton data, and mantan the proper work of the network even under the stuaton of malcous attack (2) In the case of dfferent ratos of malcous nodes (20%, 40%, and 60%, resp), the moble game-based secure localzaton (GSL) algorthm and the moble localzaton algorthm wthout usng the game are compared, as shown n the fgure Fgures 5 and 6 show the stuatons of localzaton accuracy under the 20%, 40%, and malcous nodes coverage condtons It can be clearly seen from the fgure that by usng the game approach the localzaton accuracy has been mproved sgnfcantly, and the rate of mprovement reaches about 20% 50% Meanwhle, for network envronment wth a hgher rato of malcous nodes (60%) (Fgure 7), the localzaton results can converge to acheve localzaton n harsh envronments by applyng ths algorthm Smulaton results show that the game-based localzaton algorthm can effectvely nhbt aggressve behavors of malcous nodes and mprove the localzaton accuracy of moble nodes (3) We compare the followng three methods n the smulatons: the GSL algorthm (the game theory s used); the DBSL algorthm (the mproved D-S fuson method s used [5); the BRS-based robust secure localzaton (BRSL) algorthm [9 Fgure 8 shows the comparson results of localzaton error under dfferent malcous rato The proporton of attackers ranges from 5% to 60% As the number of attackers
7 Internatonal Dstrbuted Sensor Networks 7 Estmate error (r) % MR locaton convergence Estmate error (r) % MR locaton convergence % MR wthout GSL 60% MR wth GSL Tme Fgure 7: The effect of localzaton under orgnal malcous rato 60% % MR wthout GSL 20% MR wth GSL Tme Fgure 5: The effect of localzaton under orgnal malcous rato 20% Estmate error (r) 4 40% MR locaton convergence % MR wthout GSL 40% MR wth GSL Tme Fgure 6: The effect of localzaton under orgnal malcous rato 40% ncreases, the localzaton error ncreases as well GSL can obtan more accurate results compared wth DBSL and BRSL In partcular when malcous rato s hgh, GSL has better nhbton effect on attacker s number 6 Conclusons Ths paper presents a moble network node localzaton algorthm based on game strateges Features are extracted under the stuaton of the moble sensor network beng attacked and the mappng relaton between the attack level andthetrustlevelsestablshedatthesametme,trustand Estmate error (r) The comparson results of localzaton error GSL DBSL BRSL The rato of malcous nodes (%) Fgure 8: The comparson results of localzaton errors under dfferent malcous rato cooperaton model and the payoff space of the strategy game are bult, effectvely suppressng the behavor of malcous nodes n network Fnally, the game update mechansm and equlbrum condtons are provded to ensure the stablty and convergence of the algorthm Smulaton results show that the proposed moble node localzaton algorthm based on game strateges takes full advantage of the dynamc characterstcs of the algorthm and motvates cooperatve behavor of member nodes; ths algorthm can acheve nodes localzaton and mprove localzaton accuracy n harsh envronments, especally n the stuaton wth a hgher rato of ntal malcous nodes Conflct of Interests The authors declare that there s no conflct of nterests regardng the publcaton of ths paper
8 8 Internatonal Dstrbuted Sensor Networks Acknowledgments The authors are grateful to the anonymous revewers for ther ndustrous work and nsghtful comments Ths work s supported by Natural Scence Foundaton of Chna under Grant no [5 N Yu, L Zhang, and Y Ren, A novel D-S based secure localzaton algorthm for wreless sensor networks, Securty and Communcaton Networks,vol7,no,pp ,204 References [ H Chenj and R Stoleru, Toward accurate moble sensor network localzaton n nosy envronments, IEEE Transactons on Moble Computng,vol2,no6,pp094 06,203 [2 Z Wang, Y Wang, M Ma, and J Wu, Effcent localzaton for moble sensor networks based on constrant rules optmzed Monte Carlo method, Computer Networks, vol 57, no 4, pp , 203 [3 KWKLu,W-KMa,HCSo,andFKChan, Sem-defnte programmng algorthms for sensor network node localzaton wth uncertantes n anchor postons and/or propagaton speed, IEEE Transactons on Sgnal Processng,vol57,no2,pp , 2009 [4GJHan,HHXu,TQDuong,JJang,andTHara, Localzaton algorthms of wreless sensor networks: a survey, Telecommuncaton Systems,vol52,no4,pp ,203 [5 Z L and H Shen, Game-theoretc analyss of cooperaton ncentve strateges n moble ad hoc networks, IEEE Transactons on Moble Computng,vol,no8,pp ,202 [6 H-Y Sh, W-L Wang, N-M Kwok, and S-Y Chen, Game theoryforwrelesssensornetworks:asurvey, Sensors, vol2, no7,pp ,202 [7 L Lazos, R Poovendran, and S Capkun, ROPE: robust poston estmaton n wreless sensor networks, n Proceedngs of the 4th Internatonal Symposum on Informaton Processng n Sensor Networks (IPSN 05), pp , Unversty of Calforna, Los Angeles, Los Angeles, Calf, USA, August 2005 [8 ZYang,LJan,CWu,andYLu, Beyondtranglenequalty: sftng nosy and outler dstance measurements for localzaton, ACM Transactons on Sensor Networks,vol9,no2,artcle 26, 203 [9NYu,LRZhang,andYJRen, BRS-basedrobustsecure localzaton algorthm for wreless sensor networks, Internatonal Dstrbuted Sensor Networks, vol203,artcle ID07024,9pages,203 [0 Y We and Y Guan, Lghtweght locaton verfcaton algorthms for wreless sensor networks, IEEE Transactons on Parallel and Dstrbuted Systems, vol 24, no 5, pp , 203 [ L Xao, Y Chen, W S Ln, and K J R Lu, Indrect recprocty securty game for large-scale wreless networks, IEEE Transactons on Informaton Forenscs and Securty,vol7, no 4, pp , 202 [2 R Feng, X Xu, X Zhou, and J Wan, A trust evaluaton algorthm for wreless sensor networks based on node behavors and D-S evdence theory, Sensors, vol, no 2, pp , 20 [3 AAttar,HTang,AVVaslakos,FRYu,andVCMLeung, A survey of securty challenges n cogntve rado networks: solutons and future research drectons, Proceedngs of the IEEE,vol00,no2,pp ,202 [4 Q Xao, K Bu, Z Wang, and B Xao, Robust localzaton aganst outlers n wreless sensor networks, ACM Transactons on Sensor Networks,vol9,no2,artcle24,203
9 Internatonal Rotatng Machnery Engneerng The Scentfc World Journal Internatonal Dstrbuted Sensor Networks Sensors Control Scence and Engneerng Advances n Cvl Engneerng Submt your manuscrpts at Electrcal and Computer Engneerng Robotcs VLSI Desgn Advances n OptoElectroncs Internatonal Navgaton and Observaton Chemcal Engneerng Actve and Passve Electronc Components Antennas and Propagaton Aerospace Engneerng Internatonal Internatonal Internatonal Modellng & Smulaton n Engneerng Shock and Vbraton Advances n Acoustcs and Vbraton
Positive Semi-definite Programming Localization in Wireless Sensor Networks
Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationWireless Sensor Network Localization Research
Sensors & Transducers 014 by IFSA Publshng, S L http://wwwsensorsportalcom Wreless Sensor Network Localzaton Research Lang Xn School of Informaton Scence and Engneerng, Hunan Internatonal Economcs Unversty,
More informationSecurity Vulnerabilities of an Enhanced Remote User Authentication Scheme
Contemporary Engneerng Scences, Vol. 7, 2014, no. 26, 1475-1482 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.49186 Securty Vulnerabltes of an Enhanced Remote User Authentcaton Scheme Hae-Soon
More informationSLAM Summer School 2006 Practical 2: SLAM using Monocular Vision
SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,
More informationA mathematical programming approach to the analysis, design and scheduling of offshore oilfields
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and
More informationBioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.
[Type text] [Type text] [Type text] ISSN : 0974-74 Volume 0 Issue BoTechnology 04 An Indan Journal FULL PAPER BTAIJ 0() 04 [684-689] Revew on Chna s sports ndustry fnancng market based on market -orented
More informationAnalysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD
Analyss on the Workspace of Sx-degrees-of-freedom Industral Robot Based on AutoCAD Jn-quan L 1, Ru Zhang 1,a, Fang Cu 1, Q Guan 1 and Yang Zhang 1 1 School of Automaton, Bejng Unversty of Posts and Telecommuncatons,
More informationNUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS
ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana
More informationImprovement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration
Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,
More informationAn Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc.
[Type text] [Type text] [Type text] ISSN : 97-735 Volume Issue 9 BoTechnology An Indan Journal FULL PAPER BTAIJ, (9), [333-3] Matlab mult-dmensonal model-based - 3 Chnese football assocaton super league
More informationEvaluation of an Enhanced Scheme for High-level Nested Network Mobility
IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.
More informationA New Approach For the Ranking of Fuzzy Sets With Different Heights
New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays
More informationResearch and Application of Fingerprint Recognition Based on MATLAB
Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department
More informationThe Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole
Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng
More informationEmpirical Distributions of Parameter Estimates. in Binary Logistic Regression Using Bootstrap
Int. Journal of Math. Analyss, Vol. 8, 4, no. 5, 7-7 HIKARI Ltd, www.m-hkar.com http://dx.do.org/.988/jma.4.494 Emprcal Dstrbutons of Parameter Estmates n Bnary Logstc Regresson Usng Bootstrap Anwar Ftranto*
More informationLoad Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More informationQuality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation
Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on
More informationAn Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed
More informationA New Transaction Processing Model Based on Optimistic Concurrency Control
A New Transacton Processng Model Based on Optmstc Concurrency Control Wang Pedong,Duan Xpng,Jr. Abstract-- In ths paper, to support moblty and dsconnecton of moble clents effectvely n moble computng envronment,
More informationThe Shortest Path of Touring Lines given in the Plane
Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He
More informationProblem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationA Fast Visual Tracking Algorithm Based on Circle Pixels Matching
A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationFast Computation of Shortest Path for Visiting Segments in the Plane
Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang
More informationA KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE
A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs
More informationLoad-Balanced Anycast Routing
Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance
More informationLearning-Based Top-N Selection Query Evaluation over Relational Databases
Learnng-Based Top-N Selecton Query Evaluaton over Relatonal Databases Lang Zhu *, Wey Meng ** * School of Mathematcs and Computer Scence, Hebe Unversty, Baodng, Hebe 071002, Chna, zhu@mal.hbu.edu.cn **
More informationFINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK
FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK L-qng Qu, Yong-quan Lang 2, Jng-Chen 3, 2 College of Informaton Scence and Technology, Shandong Unversty of Scence and Technology,
More informationVirtual Machine Migration based on Trust Measurement of Computer Node
Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on
More informationClassifier Selection Based on Data Complexity Measures *
Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.
More informationUser Authentication Based On Behavioral Mouse Dynamics Biometrics
User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA
More informationA Model Based on Multi-agent for Dynamic Bandwidth Allocation in Networks Guang LU, Jian-Wen QI
216 Jont Internatonal Conference on Artfcal Intellgence and Computer Engneerng (AICE 216) and Internatonal Conference on etwork and Communcaton Securty (CS 216) ISB: 978-1-6595-362-5 A Model Based on Mult-agent
More informationNetwork Coding as a Dynamical System
Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.
More informationSolving two-person zero-sum game by Matlab
Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by
More informationX- Chart Using ANOM Approach
ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are
More informationRAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:
Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:
More informationFinite Element Analysis of Rubber Sealing Ring Resilience Behavior Qu Jia 1,a, Chen Geng 1,b and Yang Yuwei 2,c
Advanced Materals Research Onlne: 03-06-3 ISSN: 66-8985, Vol. 705, pp 40-44 do:0.408/www.scentfc.net/amr.705.40 03 Trans Tech Publcatons, Swtzerland Fnte Element Analyss of Rubber Sealng Rng Reslence Behavor
More informationResource and Virtual Function Status Monitoring in Network Function Virtualization Environment
Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087
More informationSimulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationLearning the Kernel Parameters in Kernel Minimum Distance Classifier
Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department
More informationThe Research of Support Vector Machine in Agricultural Data Classification
The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou
More informationOverview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION
Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup
More informationResearch Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion
e Scentfc World Journal, Artcle ID 656251, 7 pages http://dx.do.org/1.1155/214/656251 Research Artcle Hgh Capacty Reversble Watermarkng for Audo by Hstogram Shftng and Predcted Error Expanson Fe Wang,
More informationDistributed Middlebox Placement Based on Potential Game
Int. J. Communcatons, Network and System Scences, 2017, 10, 264-273 http://www.scrp.org/ournal/cns ISSN Onlne: 1913-3723 ISSN Prnt: 1913-3715 Dstrbuted Mddlebox Placement Based on Potental Game Yongwen
More informationAn Improved Image Segmentation Algorithm Based on the Otsu Method
3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,
More informationResearch on Categorization of Animation Effect Based on Data Mining
MATEC Web of Conferences 22, 0102 0 ( 2015) DOI: 10.1051/ matecconf/ 2015220102 0 C Owned by the authors, publshed by EDP Scences, 2015 Research on Categorzaton of Anmaton Effect Based on Data Mnng Na
More informationMULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION
MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and
More informationEfficient Content Distribution in Wireless P2P Networks
Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,
More informationAn Entropy-Based Approach to Integrated Information Needs Assessment
Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology
More informationMobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks
MobleGrd: Capacty-aware Topology Control n Moble Ad Hoc Networks Jle Lu, Baochun L Department of Electrcal and Computer Engneerng Unversty of Toronto {jenne,bl}@eecg.toronto.edu Abstract Snce wreless moble
More informationAn Image Fusion Approach Based on Segmentation Region
Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua
More informationRegional Load Balancing Circuitous Bandwidth Allocation Method Based on Dynamic Auction Mechanism
ATEC Web of Conferences 76, (8) IFID 8 https://do.org/./matecconf/876 Regonal Load Balancng Crcutous Bandwdth Allocaton ethod Based on Dynamc Aucton echansm Wang Chao, Zhang Dalong, Ran Xaomn atonal Dgtal
More informationAdaptive Energy and Location Aware Routing in Wireless Sensor Network
Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}
More informationResearch Article Information Transmission Probability and Cache Management Method in Opportunistic Networks
Wreless Communcatons and Moble Computng Volume 2018, Artcle ID 1571974, 9 pages https://do.org/10.1155/2018/1571974 Research Artcle Informaton Transmsson Probablty and Cache Management Method n Opportunstc
More informationDesign of Structure Optimization with APDL
Desgn of Structure Optmzaton wth APDL Yanyun School of Cvl Engneerng and Archtecture, East Chna Jaotong Unversty Nanchang 330013 Chna Abstract In ths paper, the desgn process of structure optmzaton wth
More informationA Fast Content-Based Multimedia Retrieval Technique Using Compressed Data
A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,
More informationCompiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz
Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster
More informationClassifying Acoustic Transient Signals Using Artificial Intelligence
Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)
More informationAn Influence of the Noise on the Imaging Algorithm in the Electrical Impedance Tomography *
Open Journal of Bophyscs, 3, 3, 7- http://dx.do.org/.436/ojbphy.3.347 Publshed Onlne October 3 (http://www.scrp.org/journal/ojbphy) An Influence of the Nose on the Imagng Algorthm n the Electrcal Impedance
More informationNetwork Intrusion Detection Based on PSO-SVM
TELKOMNIKA Indonesan Journal of Electrcal Engneerng Vol.1, No., February 014, pp. 150 ~ 1508 DOI: http://dx.do.org/10.11591/telkomnka.v1.386 150 Network Intruson Detecton Based on PSO-SVM Changsheng Xang*
More informationAvailable online at Available online at Advanced in Control Engineering and Information Science
Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced
More informationA Distributed Dynamic Bandwidth Allocation Algorithm in EPON
www.ccsenet.org/mas Modern Appled Scence Vol. 4, o. 7; July 2010 A Dstrbuted Dynamc Bandwdth Allocaton Algorthm n EPO Feng Cao, Demng Lu, Mnmng Zhang, Kang Yang & Ynbo Qan School of Optoelectronc Scence
More informationMeta-heuristics for Multidimensional Knapsack Problems
2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,
More informationConstructing Minimum Connected Dominating Set: Algorithmic approach
Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected
More informationTHE PATH PLANNING ALGORITHM AND SIMULATION FOR MOBILE ROBOT
Journal of Theoretcal and Appled Informaton Technology 30 th Aprl 013. Vol. 50 No.3 005-013 JATIT & LLS. All rghts reserved. ISSN: 199-8645 www.jatt.org E-ISSN: 1817-3195 THE PATH PLANNING ALGORITHM AND
More informationScheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research
Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research
More informationStudy of Data Stream Clustering Based on Bio-inspired Model
, pp.412-418 http://dx.do.org/10.14257/astl.2014.53.86 Study of Data Stream lusterng Based on Bo-nspred Model Yngme L, Mn L, Jngbo Shao, Gaoyang Wang ollege of omputer Scence and Informaton Engneerng,
More informationPerformance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks
Communcatons and Network, 2016, 8, 45-55 Publshed Onlne February 2016 n ScRes. http://www.scrp.org/journal/cn http://dx.do.org/10.4236/cn.2016.81006 Performance Comparson of a QoS Aware Routng Protocol
More informationEVALUATION OF THE PERFORMANCES OF ARTIFICIAL BEE COLONY AND INVASIVE WEED OPTIMIZATION ALGORITHMS ON THE MODIFIED BENCHMARK FUNCTIONS
Academc Research Internatonal ISS-L: 3-9553, ISS: 3-9944 Vol., o. 3, May 0 EVALUATIO OF THE PERFORMACES OF ARTIFICIAL BEE COLOY AD IVASIVE WEED OPTIMIZATIO ALGORITHMS O THE MODIFIED BECHMARK FUCTIOS Dlay
More informationProfessional competences training path for an e-commerce major, based on the ISM method
World Transactons on Engneerng and Technology Educaton Vol.14, No.4, 2016 2016 WIETE Professonal competences tranng path for an e-commerce maor, based on the ISM method Ru Wang, Pn Peng, L-gang Lu & Lng
More informationDetermining the Optimal Bandwidth Based on Multi-criterion Fusion
Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn
More informationReliability Analysis of Aircraft Condition Monitoring Network Using an Enhanced BDD Algorithm
Chnese Journal of Aeronautcs 25 (2012) 925-930 Contents lsts avalable at ScenceDrect Chnese Journal of Aeronautcs journal homepage: www.elsever.com/locate/cja Relablty Analyss of Arcraft Condton Montorng
More informationA high precision collaborative vision measurement of gear chamfering profile
Internatonal Conference on Advances n Mechancal Engneerng and Industral Informatcs (AMEII 05) A hgh precson collaboratve vson measurement of gear chamferng profle Conglng Zhou, a, Zengpu Xu, b, Chunmng
More informationIMPACT OF RADIO MAP SIMULATION ON POSITIONING IN INDOOR ENVIRONTMENT USING FINGER PRINTING ALGORITHMS
IMPACT OF RADIO MAP SIMULATION ON POSITIONING IN INDOOR ENVIRONTMENT USING FINGER PRINTING ALGORITHMS Jura Macha and Peter Brda Unversty of Zlna, Faculty of Electrcal Engneerng, Department of Telecommuncatons
More informationResearch of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm
, pp.197-202 http://dx.do.org/10.14257/dta.2016.9.5.20 Research of Dynamc Access to Cloud Database Based on Improved Pheromone Algorthm Yongqang L 1 and Jn Pan 2 1 (Software Technology Vocatonal College,
More informationDECA: distributed energy conservation algorithm for process reconstruction with bounded relative error in wireless sensor networks
da Rocha Henrques et al. EURASIP Journal on Wreless Communcatons and Networkng (2016) 2016:163 DOI 10.1186/s13638-016-0662-9 RESEARCH Open Access DECA: dstrbuted energy conservaton algorthm for process
More informationOPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET
OPTIMAL CONFIGURATION FOR NODE IN MIED CELLULAR AND MOBILE AD HOC NETWORK FOR INET Olusola Babalola D.E. Department of Electrcal and Computer Engneerng Morgan tate Unversty Dr. Rchard Dean Faculty Advsor
More informationEnergy efficient prediction clustering algorithm for multilevel heterogeneous wireless sensor networks
Abstract: nergy effcent predcton clusterng algorthm for multlevel heterogeneous wreless sensor networks Tang Lu a,b,c,* Jan Peng b,c Jn Yang d Chunl Wang e a College of Fundamental ducaton, Schuan Normal
More informationEfficient Distributed File System (EDFS)
Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate
More informationClustering Based Adaptive Power Control for Interference Mitigation in Two-Tier Femtocell Networks
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 8, NO. 4, Apr. 2014 1424 Copyrght c 2014 KSII Clusterng Based Adaptve Power Control for Interference Mtgaton n Two-Ter Femtocell Networks Hong
More informationUsing Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol
2012 Thrd Internatonal Conference on Networkng and Computng Usng Partcle Swarm Optmzaton for Enhancng the Herarchcal Cell Relay Routng Protocol Hung-Y Ch Department of Electrcal Engneerng Natonal Sun Yat-Sen
More informationApplication of Improved Fish Swarm Algorithm in Cloud Computing Resource Scheduling
, pp.40-45 http://dx.do.org/10.14257/astl.2017.143.08 Applcaton of Improved Fsh Swarm Algorthm n Cloud Computng Resource Schedulng Yu Lu, Fangtao Lu School of Informaton Engneerng, Chongqng Vocatonal Insttute
More informationTerm Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task
Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto
More informationTHE MAP MATCHING ALGORITHM OF GPS DATA WITH RELATIVELY LONG POLLING TIME INTERVALS
THE MA MATCHING ALGORITHM OF GS DATA WITH RELATIVELY LONG OLLING TIME INTERVALS Jae-seok YANG Graduate Student Graduate School of Engneerng Seoul Natonal Unversty San56-, Shllm-dong, Gwanak-gu, Seoul,
More informationSecurity Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments
Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub
More informationProper Choice of Data Used for the Estimation of Datum Transformation Parameters
Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationGA-Based Learning Algorithms to Identify Fuzzy Rules for Fuzzy Neural Networks
Seventh Internatonal Conference on Intellgent Systems Desgn and Applcatons GA-Based Learnng Algorthms to Identfy Fuzzy Rules for Fuzzy Neural Networks K Almejall, K Dahal, Member IEEE, and A Hossan, Member
More informationLoop Transformations for Parallelism & Locality. Review. Scalar Expansion. Scalar Expansion: Motivation
Loop Transformatons for Parallelsm & Localty Last week Data dependences and loops Loop transformatons Parallelzaton Loop nterchange Today Scalar expanson for removng false dependences Loop nterchange Loop
More informationRecommended Items Rating Prediction based on RBF Neural Network Optimized by PSO Algorithm
Recommended Items Ratng Predcton based on RBF Neural Network Optmzed by PSO Algorthm Chengfang Tan, Cayn Wang, Yuln L and Xx Q Abstract In order to mtgate the data sparsty and cold-start problems of recommendaton
More informationA Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks
A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract
More informationA MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS
Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung
More informationDomain-Constrained Semi-Supervised Mining of Tracking Models in Sensor Networks
Doman-Constraned Sem-Supervsed Mnng of Trackng Models n Sensor Networks Rong Pan 1, Junhu Zhao 2, Vncent Wenchen Zheng 1, Jeffrey Junfeng Pan 1, Dou Shen 1, Snno Jaln Pan 1 and Qang Yang 1 1 Hong Kong
More informationTRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things
DOI: 10.2298/CSIS110303056C TRM-IoT: A Trust Management Model Based on Fuzzy Reputaton for Internet of Thngs Dong Chen 1, Guran Chang 2, Dawe Sun 1, Jaa L 1, Je Ja 1, and Xngwe Wang 1 1 College of Informaton
More informationAudio Content Classification Method Research Based on Two-step Strategy
(IJACSA) Internatonal Journal of Advanced Computer Scence and Applcatons, Audo Content Classfcaton Method Research Based on Two-step Strategy Sume Lang Department of Computer Scence and Technology Chongqng
More informationA XML-Based Composition Event Approach as an Integration and Cooperation Middleware
A XML-Based Composton Event Approach as an Integraton and Cooperaton Mddleware Gang Xu, JanGang Ma, and Tao Huang Technology Center of Software Engneerng, Insttute of Software, Chnese Academy of Scences,
More informationDelay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks
Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network
More informationA Saturation Binary Neural Network for Crossbar Switching Problem
A Saturaton Bnary Neural Network for Crossbar Swtchng Problem Cu Zhang 1, L-Qng Zhao 2, and Rong-Long Wang 2 1 Department of Autocontrol, Laonng Insttute of Scence and Technology, Benx, Chna bxlkyzhangcu@163.com
More information