Research Article A Game-Based Secure Localization Algorithm for Mobile Wireless Sensor Networks

Size: px
Start display at page:

Download "Research Article A Game-Based Secure Localization Algorithm for Mobile Wireless Sensor Networks"

Transcription

1 Internatonal Dstrbuted Sensor Networks Volume 205, Artcle ID 64207, 8 pages Research Artcle A Game-Based Secure Localzaton Algorthm for Moble Wreless Sensor Networks Tanyue Bao,,2 Jangwen Wan, Kefu Y, and Qang Zhang School of Instrumentaton Scence and Optoelectroncs Engneerng, Bejng Unversty of Aeronautcs and Astronautcs (Behang Unversty), Bejng 009, Chna 2 Northeast Petroleum Unversty, Daqng 6338, Chna Correspondence should be addressed to Jangwen Wan; jwwan@buaaeducn Receved 25 March 205; Revsed 23 June 205; Accepted 3 August 205 Academc Edtor: Feng Hong Copyrght 205 Tanyue Bao et al Ths s an open access artcle dstrbuted under the Creatve Commons Attrbuton Lcense, whch permts unrestrcted use, dstrbuton, and reproducton n any medum, provded the orgnal work s properly cted The ssue of node localzaton s a fundamental problem n wreless sensor networks Recently, the localzaton problem for moble sensor networks n hostle envronment has receved sgnfcant attenton Due to the moblty of the sensor nodes, t s more challengng to acheve node localzaton n attacked sensor networks than n statc ones To address these challenges, the paper presents a novel game-based secure localzaton algorthm The nodes strategy level can be ndcated through the results of trust evaluaton and then by means of constructng reasonable strategy space and payoff functon usng game theory; all knds of nodes wthn the network can acheve the optmal payoffs The performance of our algorthm s evaluated by extensve smulaton experments The smulaton results show that the localzaton error of our proposed algorthm s lower than those of the exstng ones n attacked envronment Introducton Wth the development of mcrocomputer technology, moble wreless sensor networks (MWSNs) are wdely used n many felds, such as underwater sensor, border detecton, and anmal trackng [, 2 Locaton awareness s very mportant because many applcatons of MWSNs depend on the nformaton of locatons of sensor nodes Localzaton s to obtan the nodes poston [3, 4 In most exstng sensor networks, nodes are statc However, n some modern applcatons, localzatons become a dffculty, when nodes are movng and beng attacked [5 A moble node s unable to receve locaton nformaton rapdly and accurately when t s attacked [6 The false coordnates or dstance estmaton wll cause a major localzaton error for normal sensor nodes In ths case, some methods should be explored to elmnate or reduce the adverse nfluence caused by malcous beacon nodes and ensure safe localzaton n moble WSNs In ths paper, we propose a game-based securty localzaton (GSL) algorthm for solvng the moble node selflocalzaton problem wth the exstence of malcous node Frstly, node n multple hop transmsson decdes the behavor grade accordng to the tme and space nformaton Secondly, accordng to the behavor grade, the complete multrsk level strategy space s constructed and s updated over tme Fnally, node selects a behavor grade to obtan optmal benefts Smulaton experment results show that the algorthm can effectvely restran node s malcous behavors and boost the cooperaton ablty of the network The localzaton error wth GSL s lower than those wthout GSL n moble and attacked envronment The remander of ths paper s organzed as follows Secton 2 ntroduces related works on secure localzaton algorthms Secton 3 presents the network model, attack model, and game model Secton 4 provdes the detal of GSL algorthm Secton 5 presents the smulaton results and Secton 6 concludes the paper 2 Related Works The research n securty localzaton algorthm for wreless sensor networks s manly dvded nto two methods The frst method s based on sensor nodes It can prevent nodes

2 2 Internatonal Dstrbuted Sensor Networks from beng affected by the attack through the establshment of protecton mechansms (Verfable Multlateraton, SeR- Loc, etc), or removng malcous nodes from the network usng the effectve detecton and flterng methods (DRBTS, ARMMSE, and a votng-based algorthm, etc) The second method s based on securty equpment It can mprove the defense capablty of the network by addng securty equpment n the physcal layer Lazosetal[7presentarobustpostonngsystemcalled ROPE whch utlzes a locaton verfcaton technque to dentfy the locaton clams of the sensor nodes before data collecton Yang et al [8 analyze the outler data detecton problem and desgn a stray montorng algorthm based on general cycle blateraton, whch reduced to data from the group to mprove localzaton accuracy Yuetal[9proposeaBRS-basedrobustsecurelocalzaton (BRSL) algorthm, amng at reducng the mpact of the malcous attackers n the network The BRSL method ncludes two phases: the setup trust evaluaton framework and the localzaton stage We and Guan [0 ntroduce a novel scheme called a lghtweght postonng verfcaton algorthm (LPVA); t does not rely on dedcated hardware equpment under the condton of network attack resstance and can be used n the low-cost network Xao et al [ propose a robust network localzaton algorthm call RobustLoc, based on a robust patch mergng operaton that can reject outlers for both multlateraton and patch mergng The above studes manly elmnate the fake beacon nformaton (ROPE, RobustLoc, etc) or detect malcous nodes (LPVA, BRSL, etc) or ncrease equpment to mprove localzaton accuracy but seldom deal wth acton nformaton of sensor nodes, when nodes are moble Our proposal utlzed an mproved game theory and the sensor nodes pluralstc behavor n the network to establsh a trust-preferental strategy, whch make the beacons cooperate effectvely 3 Network Model 3 Network Envronment In an envronment under attack, a moble wreless sensor network conssts of anchor nodes, unknown nodes, and malcous nodes; nodes wth known coordnates are called anchor nodes, nodes whose coordnates are unknown are called unknown nodes, and nodes whch are captured and possbly attack are called malcous nodes All nodes are randomly dstrbuted n the twodmensonal space of the network and on the move As shown n Fgure, the communcaton radus of each node n the network s represented by r and the maxmum movng speed s represented by V max Each node has a unque ID, and the coordnates of unknown nodes are estmated by obtanng the coordnate nformaton of adjacent anchor nodes 32 Attack Model In the sequental Monte-Carlo localzaton algorthm, coordnates of unknown nodes are calculated b3 b2 b2 b3 d3 b d2 d N d4 d5 b4 d7 a d6 2r b5 b6 d8 Attack channel b7 d9 a2 d2 b8 d0 d 2r b0 Fgure : Attack model wth long attack dstance d3 b d2 d4 d b4 N d7 d5 a d6 b5 2r b6 b7 Attack channel d8 d9 a2 d2 b0 d0 2r b8 d Fgure 2: Attack model wth short attack dstance through sample set [2 The unknown node wll select locatonsofanchornodeswthnsnglehopandtwohops as members of the sample set, and therefore the accuracy of locaton nformaton of anchor nodes wthn ths scope determnes the accuracy of postonng [3 The attack models used n ths paper are shown n Fgures and 2 The unknown node N can montor the nformaton of anchor nodes (b b6) Meanwhle, t may be attacked by the malcous node a The malcous node a obtans the nformaton of anchor nodes (b7 b0) provded by a2 (from the regon of a2) through the attack channel and transmts ths nformaton to the unknown nodes Nodes to be postoned wll mstakenly take such beacon nodes as reference nformaton wthn ts two-hop range, causng localzaton errors of unknown nodes We assume that the attack channel between malcous nodes s ndependent of dstance Potental cases of attacks are shown n Fgure where the dstance between malcous nodes s long, and estmaton of coordnates of unknown nodes based on coordnates transmtted by malcous nodes wll cause large errors In Fgure 2, the dstance between malcous nodes s relatvely short, and the two-node scopes of malcous nodes have an area of ntersecton n whch the node b6 s located In a multhop network, we use T to represent the tme of each hop For the unknown node N,thedstancebetween t and d d6 s one hop and the communcaton tme s T b9 b9

3 Internatonal Dstrbuted Sensor Networks 3 To obtan data, d7 channel has to cover three hops, so ts communcaton tme s 3T 33 Game Model 33 Game Partcpants In the process of moble postonng, every unknown node wll obtan the nformaton of beacon nodes wthn one hop or two hops [4 For attacks whch may exst n data transmsson lnks, all nodes nvolved n the transmsson of nformaton are game partcpants Therefore, partcpants n the game model nclude nformaton sender T, nformaton recpent R, andn nformaton forwarders E Throughout nformaton transmsson, the data sent by the sendng node may travel through n forwardng nodes to reach the recevng node, so the number of partcpants of the game s n Strategy Space In ths paper, we defne the strategy space accordng to the dfferent behavors of nodes Node behavors nclude cooperatve, uncooperatve, and attack behavor Accordng to the dfferent attack effect, the attack behavor s dvded nto n level, and the attack level s determned by the attack effect For example, the nfluence of the attack n Fgure s much greater than that n Fgure 2, so the attack level n Fgure s hgher than n Fgure 2 We dvde node actons nto multple levels accordng to ther effects We call the behavors taken by nodes, whch are shown n Table, strategy space In the strategy space set of nodes G = {C,U,A, A 2,,A n }, {C, U} represent cooperatve behavors and uncooperatve behavors, respectvely Cooperatve behavors refer to the cooperatve response of nodes, such as recevng or forwardng after lstenng to sgnals Uncooperatve behavors refer to the fact that the nodes do not deal wth the nformaton whch needs recevng or forwardng; that s, no response wll be carred out where the set {A,A 2,,A n } represents a collecton of dfferent levels of attacks Attack level depends on the degree of nfluence of reference coordnates on the postonng accuracy In the postonng process, for example, dfferent attacks have dfferent effects on the accuracy of postonng The longer the dstance between false coordnates and actual coordnates (Fgure ) s, the stronger the attack s destructve power wll be, the bgger the postonng error wll be, and the hgher the attack level wll be The false coordnate nformaton (Fgure 2) wth short dstance can help localzaton when anchor nodes are sparse, so ts attack level s low 333 Game Payoff In the game process of transmsson of postonng nformaton, the payoff of a partcpant after choosng a strategy at the moment of t can be u k(t),where k(t) G For the attack nodes and each nformaton sender, every gamer who partcpates n the nformaton transmsson wll choose a behavor mode n the strategy space G, resultng n payoff The payoff of gamers comes manly from the gan obtaned by behavors m k(t) and ther own loss c k(t), and therefore the payoff functon s u k(t) = m k(t) c k(t), k(t) G The nformaton recpent wll obtan Symbol dentfcaton C U A A 2 A n Table : Strategy space of nodes Behavor mode Cooperatve Uncooperatve Level attack Level 2 attack Level n attack themaxmumpayofffromthecorrectnformatonprovded orforwardedbythesendngnodeorforwardngnodeon thecontrary,rejectonorattackwllreducethepayoffatthe moment of t, the payoff functon of normal nodes can be expressed as u C (t) u U (t) 0 u A (t) u An (t), whle the payoff functon of attack nodes can be expressed as u An (t) u A (t) 0 u U (t) u C (t) 334 Trust Level In the attack models mentoned above, the attacks are characterzed by changng tme reference and tamperng wth the spatal reference Changes of tme reference reflect on the ncrease of the number of hops from thebeaconnodetotherecevngnodeinformatonofeach anchor node obtaned by unknown nodes has tme weghts whch can be used to determne attack payoff The bgger the tme weght s, the greater the attack payoff wll be, and so the hgher the nfluence of attacks on the accuracy of coordnates of unknown nodes wll be In Fgure, the malcous coordnate data of the beacon node b7 reaches the unknown node N through 3 hops, of whch the tme nformaton s 3T (T s the tme nterval of each segment) Obvously, the longer the tme s, the greater the nfluence of attacks on postonng wll be Tamperng of spatal reference data reflects on the fact that coordnate nformaton s changed by the malcous node In Fgure, the malcous node a changes ts coordnates to the coordnates of b7 b0, and the dstance between these coordnates and the node to be postoned s much larger than two hops of the unknown node N, serously affectng the postonng accuracy of the unknown node Dempster Shafer (abbrevated D-S) evdence theory s adopted n ths paper to calculate the trust values [5 based on the data nformaton of tme and space Trust levels are defned by trust values We use three varables, a, b, c,to quantfy the degree of a node behavor a represents the measurement of a note that s not attacked, b represents the measurement of a note that has been attacked, and c represents the measurement of a note whose behavor s unknown The measurement of node behavor can be dvded nto the followng stuatons: () Measurement analyss of behavor of tme parameter Assumng that β t = (t Δt)/Δt: a =a +, b =b,

4 4 Internatonal Dstrbuted Sensor Networks c =c ; βt N N +2 M< N N +2 A N a =a, b =b +β t, N 2 N M< N +2 N +2 A 2 N c =c ; βt > () 0 M< N +2 A n (2) Measurement analyss of behavor of spatal parameter To represent the Eucldean dstance between any two beacon nodes, we use d j = (x x j ) 2 +(y y j ) 2 a,j =a,j +, b,j =b,j, c,j =c,j ; N N+ M< N +2 N +2 N+ N +2 M< Fgure 3: Acton-trust based mappng rule U C N+ a,j =a,j, b,j =b,j, 0 d j 2r (2) an empty set and {A, B}, {A, C}, {B, C}, {A, B, C} are consdered to be mpossble events n ths paper, we get m(0) = m(a, B) = m(a, C) = m(b, C) = m(a, B, C) = 0 c,j =c,j +[ d j 2r ; r d j >2r (3) Quanttatve classfcaton of trust levels If there s nformaton of n anchor nodes around the unknown node, we can determne the quantzed values of each node based on the measurement of tme and space wth the followng formula: m (A) = m (B) = m (C) = a a a a +b b +b c +b +c +c +c, where a =a +a, b =b +b,andc =c +c,where A, B, andc represent three exclusve trust states of nodes, namely, trust, dstrust, and uncertanty (4) In our scheme, a dstngushed framework Θ=[A, B, C s set up frstly The power set of Θ s 2 Θ = {0, {A}, {B}, {C}, {A, B}, {A, C}, {B, C}, {A, B, C}}Then the basc probablty assgnment (BPA) functon s constructed, that s, m : 2 Θ [0, For0 s (3) 335 Level Mappng By the above methods, the tme and space parameters of moble postonng can be converted nto trust levels, and a parameter M can be determned n the trust levels of each node, where M = MAX{m(A), m(b), m(c)} Thegamespaceofbehavorsofa node s {A,A 2,,A n,u,c},consstngofn+2elements We construct the followng rules (Fgure 3) to map the trust valuetogamebehavoronebyonethebggerthetrustvalue s, the hgher level the mapped behavor wll be The trust levels of nodes can be used to dentfy the elements of the behavor space by establshng the mappng relatonshp 4 Game Calculaton wth Strategy Evoluton 4 Strategc Game Every node has a trust vector T = (T A,T A2,,T U,T V ) T,sowedefnethebehavorgamespace of each node as j {A,A 2,,A n,u,c}inthemappng relatonshp, every element of the trust vector M s the probablty of the behavor space; hence 0 T j,and j= T j = We assume that n the process of postonng the behavor of the nformaton sender s dentfed as and the behavor of partcpatng node s dentfed as j, where, j {A,A 2,,A n,u,c} We defne the trust assgnment relatonshp matrx as T,j ; then the element of ths matrx model s the trust level of a node when t faces the sender wth the behavor

5 Internatonal Dstrbuted Sensor Networks 5 dentfcaton of j and the mode selecton dentfcaton of : [T,j () () N N N N =θ [ [ N N + ( θ) N N N N [ N+ N+ [ N N N N N N N+ N+ N N N N N N N+ N+ N+ The matrx T,j defnes the trust level dentfcatons of a node based on dfferent behavors of the nformaton sender whenthenodesrecevngthenformaton(θ = 0)and forwardng the nformaton (θ =) For example, when the recevng node or forwardng node receves the behavor of the nformaton sender A, the hgher the level of the selected attack s, the lower ts trust value wll be For a node, the purpose of adoptng strategc game durng postonng s to choose a behavor wth hgher trust (4) degree through behavor dentfcaton, thus achevng the best postonng results Accordng to ths rule, the expected behavor of each node whch partcpates n the game s T : U (N+) T U (N+) =θ [ [ C () T C () C () + ( θ) [ [ C () T (5) 42 Update Mechansm At the ntal phase, the node has a hgher wllngness to collaborate, and ts ntal trust vector s defned as T(0) = (0,0,,0,) T Atthetmepontoft, the level dentfcaton of nstantaneous trust K,j can be obtaned accordng to the trust matrx [T,j () (),therelaynode dentty θ, the behavor dentty of the nformaton transmsson node j, and the behavor dentty of the partcpatng node The update equaton of the trust vector can be expressed as T (t+) = A (δ,j T (t) +( δ,j )K,j ), (6) where δ,j s the tme factor δ,j = (δ A,δ A2,,δ U,δ V ), descrbng the degree of couplng between the transent effect andthetrustvectoroftheprevousmomentthegreater the δ s, the more dependent the trust vector wll be on the value of the prevous moment n the system, whereas the nstantaneous trust has a relatvely small mpact on t, and vce versa A s the trust transmsson matrx, whose role s to overcome the msjudgment of the trust vctor caused by montorng errors or transmsson mstakes The specfc form s below: p N p N p N p N p N p p N p N N A () () = p p p p p, (7) p N+ p N+ p p N+ N+ [ p p p [ where p N represents the probablty of the trust level beng correctly dentfed 43 The Condtons of Game Equlbrum In the process of moble localzaton, the steady-state convergence condton of the above mentoned game model s solved by means of evolutonary game deas and prncples for maxmzng payoffaccordng to the evolutonary game theory, when the system s n ntal operaton, each member node n that partcpates n localzaton selects the approprate acton partcpaton way n accordance wth the expectaton acton

6 6 Internatonal Dstrbuted Sensor Networks Table 2: Default parameter settngs Model parameter Default settng The number of node N 5000 The rato of beacon node ρ 02 Communcaton radum r 50 m Maxmum movng speed V max 0 m/s Probablty of dentfyng trust level p N 075 Tme factor δ,j =(δ A,δ A2,,δ U,δ V ) (05, 05,, 05, 05) space T and the trust decson-makng framework At the tme pont of t+, the probablty of the node n selectng the acton a n (t + ) = {A,A 2,,A n,u,c}s obtaned by the followng formula: Pr [a n (t) =P n, (t) Pr [a n (t+) = = j= Pr [a n (t) =jp n,j (t), (8) where P n, (t) s the nstantaneous payoff the partcpatng node n obtans by selectng the acton of whch the acton space s dentfed as,at the tmepont oft The suffcent condton for the evolutonary convergence s proven n the lterature, and ultmately the acqured game convergence condton s P θ Pθ <0, p > 5 Performance Evaluaton θ=0, (9) 5 Smulaton Settng In ths secton, we desgned a moble network smulaton experment to verfy the effects of the trust game-based moble localzaton method on cooperaton andlocalzatonperformanceofthemoblesensornetwork node and conducted the smulaton n Matlab The default settng s wth 5,000 nodes deployed and movng wthn the 0000 m 0000 m area at random The movng speed s n the range of [0, V max (where V max s the maxmum movng speed) The default parameters are as n Table 2 52 Smulaton Results ()Thesmulatonhasanalyzedtheeffectofthegame algorthm on node cooperaton In the case of dfferent ratos of malcous nodes (20%, 40%, and 60%, resp), the stuatons of nodes partcpatng n cooperaton va game are shown n Fgure 4 The Fgure shows that, wth the ncrease of the game number, the rato of nodes whch select cooperaton also ncreases Fnally, the rato value of nodes whch select cooperaton tends to be stablzed In the ntal state, the ratos of malcous nodes are 20%, 40%, and 60%; after the game s stable, the ratos of cooperatve membershavebeenrasedfrom458%,36%,and 96% to 839%, 786%, and 724% Smulaton results Cooperatve populaton % malcous rato 40% malcous rato 60% malcous rato Game ndex Fgure 4: The overall effect of cooperatve performance under varous orgnal malcous ratos show that the algorthm can effectvely mprove cooperaton of nodes, ensure transmsson of localzaton data, and mantan the proper work of the network even under the stuaton of malcous attack (2) In the case of dfferent ratos of malcous nodes (20%, 40%, and 60%, resp), the moble game-based secure localzaton (GSL) algorthm and the moble localzaton algorthm wthout usng the game are compared, as shown n the fgure Fgures 5 and 6 show the stuatons of localzaton accuracy under the 20%, 40%, and malcous nodes coverage condtons It can be clearly seen from the fgure that by usng the game approach the localzaton accuracy has been mproved sgnfcantly, and the rate of mprovement reaches about 20% 50% Meanwhle, for network envronment wth a hgher rato of malcous nodes (60%) (Fgure 7), the localzaton results can converge to acheve localzaton n harsh envronments by applyng ths algorthm Smulaton results show that the game-based localzaton algorthm can effectvely nhbt aggressve behavors of malcous nodes and mprove the localzaton accuracy of moble nodes (3) We compare the followng three methods n the smulatons: the GSL algorthm (the game theory s used); the DBSL algorthm (the mproved D-S fuson method s used [5); the BRS-based robust secure localzaton (BRSL) algorthm [9 Fgure 8 shows the comparson results of localzaton error under dfferent malcous rato The proporton of attackers ranges from 5% to 60% As the number of attackers

7 Internatonal Dstrbuted Sensor Networks 7 Estmate error (r) % MR locaton convergence Estmate error (r) % MR locaton convergence % MR wthout GSL 60% MR wth GSL Tme Fgure 7: The effect of localzaton under orgnal malcous rato 60% % MR wthout GSL 20% MR wth GSL Tme Fgure 5: The effect of localzaton under orgnal malcous rato 20% Estmate error (r) 4 40% MR locaton convergence % MR wthout GSL 40% MR wth GSL Tme Fgure 6: The effect of localzaton under orgnal malcous rato 40% ncreases, the localzaton error ncreases as well GSL can obtan more accurate results compared wth DBSL and BRSL In partcular when malcous rato s hgh, GSL has better nhbton effect on attacker s number 6 Conclusons Ths paper presents a moble network node localzaton algorthm based on game strateges Features are extracted under the stuaton of the moble sensor network beng attacked and the mappng relaton between the attack level andthetrustlevelsestablshedatthesametme,trustand Estmate error (r) The comparson results of localzaton error GSL DBSL BRSL The rato of malcous nodes (%) Fgure 8: The comparson results of localzaton errors under dfferent malcous rato cooperaton model and the payoff space of the strategy game are bult, effectvely suppressng the behavor of malcous nodes n network Fnally, the game update mechansm and equlbrum condtons are provded to ensure the stablty and convergence of the algorthm Smulaton results show that the proposed moble node localzaton algorthm based on game strateges takes full advantage of the dynamc characterstcs of the algorthm and motvates cooperatve behavor of member nodes; ths algorthm can acheve nodes localzaton and mprove localzaton accuracy n harsh envronments, especally n the stuaton wth a hgher rato of ntal malcous nodes Conflct of Interests The authors declare that there s no conflct of nterests regardng the publcaton of ths paper

8 8 Internatonal Dstrbuted Sensor Networks Acknowledgments The authors are grateful to the anonymous revewers for ther ndustrous work and nsghtful comments Ths work s supported by Natural Scence Foundaton of Chna under Grant no [5 N Yu, L Zhang, and Y Ren, A novel D-S based secure localzaton algorthm for wreless sensor networks, Securty and Communcaton Networks,vol7,no,pp ,204 References [ H Chenj and R Stoleru, Toward accurate moble sensor network localzaton n nosy envronments, IEEE Transactons on Moble Computng,vol2,no6,pp094 06,203 [2 Z Wang, Y Wang, M Ma, and J Wu, Effcent localzaton for moble sensor networks based on constrant rules optmzed Monte Carlo method, Computer Networks, vol 57, no 4, pp , 203 [3 KWKLu,W-KMa,HCSo,andFKChan, Sem-defnte programmng algorthms for sensor network node localzaton wth uncertantes n anchor postons and/or propagaton speed, IEEE Transactons on Sgnal Processng,vol57,no2,pp , 2009 [4GJHan,HHXu,TQDuong,JJang,andTHara, Localzaton algorthms of wreless sensor networks: a survey, Telecommuncaton Systems,vol52,no4,pp ,203 [5 Z L and H Shen, Game-theoretc analyss of cooperaton ncentve strateges n moble ad hoc networks, IEEE Transactons on Moble Computng,vol,no8,pp ,202 [6 H-Y Sh, W-L Wang, N-M Kwok, and S-Y Chen, Game theoryforwrelesssensornetworks:asurvey, Sensors, vol2, no7,pp ,202 [7 L Lazos, R Poovendran, and S Capkun, ROPE: robust poston estmaton n wreless sensor networks, n Proceedngs of the 4th Internatonal Symposum on Informaton Processng n Sensor Networks (IPSN 05), pp , Unversty of Calforna, Los Angeles, Los Angeles, Calf, USA, August 2005 [8 ZYang,LJan,CWu,andYLu, Beyondtranglenequalty: sftng nosy and outler dstance measurements for localzaton, ACM Transactons on Sensor Networks,vol9,no2,artcle 26, 203 [9NYu,LRZhang,andYJRen, BRS-basedrobustsecure localzaton algorthm for wreless sensor networks, Internatonal Dstrbuted Sensor Networks, vol203,artcle ID07024,9pages,203 [0 Y We and Y Guan, Lghtweght locaton verfcaton algorthms for wreless sensor networks, IEEE Transactons on Parallel and Dstrbuted Systems, vol 24, no 5, pp , 203 [ L Xao, Y Chen, W S Ln, and K J R Lu, Indrect recprocty securty game for large-scale wreless networks, IEEE Transactons on Informaton Forenscs and Securty,vol7, no 4, pp , 202 [2 R Feng, X Xu, X Zhou, and J Wan, A trust evaluaton algorthm for wreless sensor networks based on node behavors and D-S evdence theory, Sensors, vol, no 2, pp , 20 [3 AAttar,HTang,AVVaslakos,FRYu,andVCMLeung, A survey of securty challenges n cogntve rado networks: solutons and future research drectons, Proceedngs of the IEEE,vol00,no2,pp ,202 [4 Q Xao, K Bu, Z Wang, and B Xao, Robust localzaton aganst outlers n wreless sensor networks, ACM Transactons on Sensor Networks,vol9,no2,artcle24,203

9 Internatonal Rotatng Machnery Engneerng The Scentfc World Journal Internatonal Dstrbuted Sensor Networks Sensors Control Scence and Engneerng Advances n Cvl Engneerng Submt your manuscrpts at Electrcal and Computer Engneerng Robotcs VLSI Desgn Advances n OptoElectroncs Internatonal Navgaton and Observaton Chemcal Engneerng Actve and Passve Electronc Components Antennas and Propagaton Aerospace Engneerng Internatonal Internatonal Internatonal Modellng & Smulaton n Engneerng Shock and Vbraton Advances n Acoustcs and Vbraton

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Wireless Sensor Network Localization Research

Wireless Sensor Network Localization Research Sensors & Transducers 014 by IFSA Publshng, S L http://wwwsensorsportalcom Wreless Sensor Network Localzaton Research Lang Xn School of Informaton Scence and Engneerng, Hunan Internatonal Economcs Unversty,

More information

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme Contemporary Engneerng Scences, Vol. 7, 2014, no. 26, 1475-1482 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.49186 Securty Vulnerabltes of an Enhanced Remote User Authentcaton Scheme Hae-Soon

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 0974-74 Volume 0 Issue BoTechnology 04 An Indan Journal FULL PAPER BTAIJ 0() 04 [684-689] Revew on Chna s sports ndustry fnancng market based on market -orented

More information

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD Analyss on the Workspace of Sx-degrees-of-freedom Industral Robot Based on AutoCAD Jn-quan L 1, Ru Zhang 1,a, Fang Cu 1, Q Guan 1 and Yang Zhang 1 1 School of Automaton, Bejng Unversty of Posts and Telecommuncatons,

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc.

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 97-735 Volume Issue 9 BoTechnology An Indan Journal FULL PAPER BTAIJ, (9), [333-3] Matlab mult-dmensonal model-based - 3 Chnese football assocaton super league

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

Research and Application of Fingerprint Recognition Based on MATLAB

Research and Application of Fingerprint Recognition Based on MATLAB Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department

More information

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng

More information

Empirical Distributions of Parameter Estimates. in Binary Logistic Regression Using Bootstrap

Empirical Distributions of Parameter Estimates. in Binary Logistic Regression Using Bootstrap Int. Journal of Math. Analyss, Vol. 8, 4, no. 5, 7-7 HIKARI Ltd, www.m-hkar.com http://dx.do.org/.988/jma.4.494 Emprcal Dstrbutons of Parameter Estmates n Bnary Logstc Regresson Usng Bootstrap Anwar Ftranto*

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

A New Transaction Processing Model Based on Optimistic Concurrency Control

A New Transaction Processing Model Based on Optimistic Concurrency Control A New Transacton Processng Model Based on Optmstc Concurrency Control Wang Pedong,Duan Xpng,Jr. Abstract-- In ths paper, to support moblty and dsconnecton of moble clents effectvely n moble computng envronment,

More information

The Shortest Path of Touring Lines given in the Plane

The Shortest Path of Touring Lines given in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Fast Computation of Shortest Path for Visiting Segments in the Plane

Fast Computation of Shortest Path for Visiting Segments in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang

More information

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Learning-Based Top-N Selection Query Evaluation over Relational Databases

Learning-Based Top-N Selection Query Evaluation over Relational Databases Learnng-Based Top-N Selecton Query Evaluaton over Relatonal Databases Lang Zhu *, Wey Meng ** * School of Mathematcs and Computer Scence, Hebe Unversty, Baodng, Hebe 071002, Chna, zhu@mal.hbu.edu.cn **

More information

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK L-qng Qu, Yong-quan Lang 2, Jng-Chen 3, 2 College of Informaton Scence and Technology, Shandong Unversty of Scence and Technology,

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

A Model Based on Multi-agent for Dynamic Bandwidth Allocation in Networks Guang LU, Jian-Wen QI

A Model Based on Multi-agent for Dynamic Bandwidth Allocation in Networks Guang LU, Jian-Wen QI 216 Jont Internatonal Conference on Artfcal Intellgence and Computer Engneerng (AICE 216) and Internatonal Conference on etwork and Communcaton Securty (CS 216) ISB: 978-1-6595-362-5 A Model Based on Mult-agent

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

Finite Element Analysis of Rubber Sealing Ring Resilience Behavior Qu Jia 1,a, Chen Geng 1,b and Yang Yuwei 2,c

Finite Element Analysis of Rubber Sealing Ring Resilience Behavior Qu Jia 1,a, Chen Geng 1,b and Yang Yuwei 2,c Advanced Materals Research Onlne: 03-06-3 ISSN: 66-8985, Vol. 705, pp 40-44 do:0.408/www.scentfc.net/amr.705.40 03 Trans Tech Publcatons, Swtzerland Fnte Element Analyss of Rubber Sealng Rng Reslence Behavor

More information

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

The Research of Support Vector Machine in Agricultural Data Classification

The Research of Support Vector Machine in Agricultural Data Classification The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion

Research Article High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion e Scentfc World Journal, Artcle ID 656251, 7 pages http://dx.do.org/1.1155/214/656251 Research Artcle Hgh Capacty Reversble Watermarkng for Audo by Hstogram Shftng and Predcted Error Expanson Fe Wang,

More information

Distributed Middlebox Placement Based on Potential Game

Distributed Middlebox Placement Based on Potential Game Int. J. Communcatons, Network and System Scences, 2017, 10, 264-273 http://www.scrp.org/ournal/cns ISSN Onlne: 1913-3723 ISSN Prnt: 1913-3715 Dstrbuted Mddlebox Placement Based on Potental Game Yongwen

More information

An Improved Image Segmentation Algorithm Based on the Otsu Method

An Improved Image Segmentation Algorithm Based on the Otsu Method 3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,

More information

Research on Categorization of Animation Effect Based on Data Mining

Research on Categorization of Animation Effect Based on Data Mining MATEC Web of Conferences 22, 0102 0 ( 2015) DOI: 10.1051/ matecconf/ 2015220102 0 C Owned by the authors, publshed by EDP Scences, 2015 Research on Categorzaton of Anmaton Effect Based on Data Mnng Na

More information

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and

More information

Efficient Content Distribution in Wireless P2P Networks

Efficient Content Distribution in Wireless P2P Networks Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks MobleGrd: Capacty-aware Topology Control n Moble Ad Hoc Networks Jle Lu, Baochun L Department of Electrcal and Computer Engneerng Unversty of Toronto {jenne,bl}@eecg.toronto.edu Abstract Snce wreless moble

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

Regional Load Balancing Circuitous Bandwidth Allocation Method Based on Dynamic Auction Mechanism

Regional Load Balancing Circuitous Bandwidth Allocation Method Based on Dynamic Auction Mechanism ATEC Web of Conferences 76, (8) IFID 8 https://do.org/./matecconf/876 Regonal Load Balancng Crcutous Bandwdth Allocaton ethod Based on Dynamc Aucton echansm Wang Chao, Zhang Dalong, Ran Xaomn atonal Dgtal

More information

Adaptive Energy and Location Aware Routing in Wireless Sensor Network

Adaptive Energy and Location Aware Routing in Wireless Sensor Network Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}

More information

Research Article Information Transmission Probability and Cache Management Method in Opportunistic Networks

Research Article Information Transmission Probability and Cache Management Method in Opportunistic Networks Wreless Communcatons and Moble Computng Volume 2018, Artcle ID 1571974, 9 pages https://do.org/10.1155/2018/1571974 Research Artcle Informaton Transmsson Probablty and Cache Management Method n Opportunstc

More information

Design of Structure Optimization with APDL

Design of Structure Optimization with APDL Desgn of Structure Optmzaton wth APDL Yanyun School of Cvl Engneerng and Archtecture, East Chna Jaotong Unversty Nanchang 330013 Chna Abstract In ths paper, the desgn process of structure optmzaton wth

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Classifying Acoustic Transient Signals Using Artificial Intelligence

Classifying Acoustic Transient Signals Using Artificial Intelligence Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)

More information

An Influence of the Noise on the Imaging Algorithm in the Electrical Impedance Tomography *

An Influence of the Noise on the Imaging Algorithm in the Electrical Impedance Tomography * Open Journal of Bophyscs, 3, 3, 7- http://dx.do.org/.436/ojbphy.3.347 Publshed Onlne October 3 (http://www.scrp.org/journal/ojbphy) An Influence of the Nose on the Imagng Algorthm n the Electrcal Impedance

More information

Network Intrusion Detection Based on PSO-SVM

Network Intrusion Detection Based on PSO-SVM TELKOMNIKA Indonesan Journal of Electrcal Engneerng Vol.1, No., February 014, pp. 150 ~ 1508 DOI: http://dx.do.org/10.11591/telkomnka.v1.386 150 Network Intruson Detecton Based on PSO-SVM Changsheng Xang*

More information

Available online at Available online at Advanced in Control Engineering and Information Science

Available online at   Available online at   Advanced in Control Engineering and Information Science Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced

More information

A Distributed Dynamic Bandwidth Allocation Algorithm in EPON

A Distributed Dynamic Bandwidth Allocation Algorithm in EPON www.ccsenet.org/mas Modern Appled Scence Vol. 4, o. 7; July 2010 A Dstrbuted Dynamc Bandwdth Allocaton Algorthm n EPO Feng Cao, Demng Lu, Mnmng Zhang, Kang Yang & Ynbo Qan School of Optoelectronc Scence

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

THE PATH PLANNING ALGORITHM AND SIMULATION FOR MOBILE ROBOT

THE PATH PLANNING ALGORITHM AND SIMULATION FOR MOBILE ROBOT Journal of Theoretcal and Appled Informaton Technology 30 th Aprl 013. Vol. 50 No.3 005-013 JATIT & LLS. All rghts reserved. ISSN: 199-8645 www.jatt.org E-ISSN: 1817-3195 THE PATH PLANNING ALGORITHM AND

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

Study of Data Stream Clustering Based on Bio-inspired Model

Study of Data Stream Clustering Based on Bio-inspired Model , pp.412-418 http://dx.do.org/10.14257/astl.2014.53.86 Study of Data Stream lusterng Based on Bo-nspred Model Yngme L, Mn L, Jngbo Shao, Gaoyang Wang ollege of omputer Scence and Informaton Engneerng,

More information

Performance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks

Performance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks Communcatons and Network, 2016, 8, 45-55 Publshed Onlne February 2016 n ScRes. http://www.scrp.org/journal/cn http://dx.do.org/10.4236/cn.2016.81006 Performance Comparson of a QoS Aware Routng Protocol

More information

EVALUATION OF THE PERFORMANCES OF ARTIFICIAL BEE COLONY AND INVASIVE WEED OPTIMIZATION ALGORITHMS ON THE MODIFIED BENCHMARK FUNCTIONS

EVALUATION OF THE PERFORMANCES OF ARTIFICIAL BEE COLONY AND INVASIVE WEED OPTIMIZATION ALGORITHMS ON THE MODIFIED BENCHMARK FUNCTIONS Academc Research Internatonal ISS-L: 3-9553, ISS: 3-9944 Vol., o. 3, May 0 EVALUATIO OF THE PERFORMACES OF ARTIFICIAL BEE COLOY AD IVASIVE WEED OPTIMIZATIO ALGORITHMS O THE MODIFIED BECHMARK FUCTIOS Dlay

More information

Professional competences training path for an e-commerce major, based on the ISM method

Professional competences training path for an e-commerce major, based on the ISM method World Transactons on Engneerng and Technology Educaton Vol.14, No.4, 2016 2016 WIETE Professonal competences tranng path for an e-commerce maor, based on the ISM method Ru Wang, Pn Peng, L-gang Lu & Lng

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

Reliability Analysis of Aircraft Condition Monitoring Network Using an Enhanced BDD Algorithm

Reliability Analysis of Aircraft Condition Monitoring Network Using an Enhanced BDD Algorithm Chnese Journal of Aeronautcs 25 (2012) 925-930 Contents lsts avalable at ScenceDrect Chnese Journal of Aeronautcs journal homepage: www.elsever.com/locate/cja Relablty Analyss of Arcraft Condton Montorng

More information

A high precision collaborative vision measurement of gear chamfering profile

A high precision collaborative vision measurement of gear chamfering profile Internatonal Conference on Advances n Mechancal Engneerng and Industral Informatcs (AMEII 05) A hgh precson collaboratve vson measurement of gear chamferng profle Conglng Zhou, a, Zengpu Xu, b, Chunmng

More information

IMPACT OF RADIO MAP SIMULATION ON POSITIONING IN INDOOR ENVIRONTMENT USING FINGER PRINTING ALGORITHMS

IMPACT OF RADIO MAP SIMULATION ON POSITIONING IN INDOOR ENVIRONTMENT USING FINGER PRINTING ALGORITHMS IMPACT OF RADIO MAP SIMULATION ON POSITIONING IN INDOOR ENVIRONTMENT USING FINGER PRINTING ALGORITHMS Jura Macha and Peter Brda Unversty of Zlna, Faculty of Electrcal Engneerng, Department of Telecommuncatons

More information

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm , pp.197-202 http://dx.do.org/10.14257/dta.2016.9.5.20 Research of Dynamc Access to Cloud Database Based on Improved Pheromone Algorthm Yongqang L 1 and Jn Pan 2 1 (Software Technology Vocatonal College,

More information

DECA: distributed energy conservation algorithm for process reconstruction with bounded relative error in wireless sensor networks

DECA: distributed energy conservation algorithm for process reconstruction with bounded relative error in wireless sensor networks da Rocha Henrques et al. EURASIP Journal on Wreless Communcatons and Networkng (2016) 2016:163 DOI 10.1186/s13638-016-0662-9 RESEARCH Open Access DECA: dstrbuted energy conservaton algorthm for process

More information

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET OPTIMAL CONFIGURATION FOR NODE IN MIED CELLULAR AND MOBILE AD HOC NETWORK FOR INET Olusola Babalola D.E. Department of Electrcal and Computer Engneerng Morgan tate Unversty Dr. Rchard Dean Faculty Advsor

More information

Energy efficient prediction clustering algorithm for multilevel heterogeneous wireless sensor networks

Energy efficient prediction clustering algorithm for multilevel heterogeneous wireless sensor networks Abstract: nergy effcent predcton clusterng algorthm for multlevel heterogeneous wreless sensor networks Tang Lu a,b,c,* Jan Peng b,c Jn Yang d Chunl Wang e a College of Fundamental ducaton, Schuan Normal

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Clustering Based Adaptive Power Control for Interference Mitigation in Two-Tier Femtocell Networks

Clustering Based Adaptive Power Control for Interference Mitigation in Two-Tier Femtocell Networks KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 8, NO. 4, Apr. 2014 1424 Copyrght c 2014 KSII Clusterng Based Adaptve Power Control for Interference Mtgaton n Two-Ter Femtocell Networks Hong

More information

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol 2012 Thrd Internatonal Conference on Networkng and Computng Usng Partcle Swarm Optmzaton for Enhancng the Herarchcal Cell Relay Routng Protocol Hung-Y Ch Department of Electrcal Engneerng Natonal Sun Yat-Sen

More information

Application of Improved Fish Swarm Algorithm in Cloud Computing Resource Scheduling

Application of Improved Fish Swarm Algorithm in Cloud Computing Resource Scheduling , pp.40-45 http://dx.do.org/10.14257/astl.2017.143.08 Applcaton of Improved Fsh Swarm Algorthm n Cloud Computng Resource Schedulng Yu Lu, Fangtao Lu School of Informaton Engneerng, Chongqng Vocatonal Insttute

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

THE MAP MATCHING ALGORITHM OF GPS DATA WITH RELATIVELY LONG POLLING TIME INTERVALS

THE MAP MATCHING ALGORITHM OF GPS DATA WITH RELATIVELY LONG POLLING TIME INTERVALS THE MA MATCHING ALGORITHM OF GS DATA WITH RELATIVELY LONG OLLING TIME INTERVALS Jae-seok YANG Graduate Student Graduate School of Engneerng Seoul Natonal Unversty San56-, Shllm-dong, Gwanak-gu, Seoul,

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

GA-Based Learning Algorithms to Identify Fuzzy Rules for Fuzzy Neural Networks

GA-Based Learning Algorithms to Identify Fuzzy Rules for Fuzzy Neural Networks Seventh Internatonal Conference on Intellgent Systems Desgn and Applcatons GA-Based Learnng Algorthms to Identfy Fuzzy Rules for Fuzzy Neural Networks K Almejall, K Dahal, Member IEEE, and A Hossan, Member

More information

Loop Transformations for Parallelism & Locality. Review. Scalar Expansion. Scalar Expansion: Motivation

Loop Transformations for Parallelism & Locality. Review. Scalar Expansion. Scalar Expansion: Motivation Loop Transformatons for Parallelsm & Localty Last week Data dependences and loops Loop transformatons Parallelzaton Loop nterchange Today Scalar expanson for removng false dependences Loop nterchange Loop

More information

Recommended Items Rating Prediction based on RBF Neural Network Optimized by PSO Algorithm

Recommended Items Rating Prediction based on RBF Neural Network Optimized by PSO Algorithm Recommended Items Ratng Predcton based on RBF Neural Network Optmzed by PSO Algorthm Chengfang Tan, Cayn Wang, Yuln L and Xx Q Abstract In order to mtgate the data sparsty and cold-start problems of recommendaton

More information

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Domain-Constrained Semi-Supervised Mining of Tracking Models in Sensor Networks

Domain-Constrained Semi-Supervised Mining of Tracking Models in Sensor Networks Doman-Constraned Sem-Supervsed Mnng of Trackng Models n Sensor Networks Rong Pan 1, Junhu Zhao 2, Vncent Wenchen Zheng 1, Jeffrey Junfeng Pan 1, Dou Shen 1, Snno Jaln Pan 1 and Qang Yang 1 1 Hong Kong

More information

TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things

TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things DOI: 10.2298/CSIS110303056C TRM-IoT: A Trust Management Model Based on Fuzzy Reputaton for Internet of Thngs Dong Chen 1, Guran Chang 2, Dawe Sun 1, Jaa L 1, Je Ja 1, and Xngwe Wang 1 1 College of Informaton

More information

Audio Content Classification Method Research Based on Two-step Strategy

Audio Content Classification Method Research Based on Two-step Strategy (IJACSA) Internatonal Journal of Advanced Computer Scence and Applcatons, Audo Content Classfcaton Method Research Based on Two-step Strategy Sume Lang Department of Computer Scence and Technology Chongqng

More information

A XML-Based Composition Event Approach as an Integration and Cooperation Middleware

A XML-Based Composition Event Approach as an Integration and Cooperation Middleware A XML-Based Composton Event Approach as an Integraton and Cooperaton Mddleware Gang Xu, JanGang Ma, and Tao Huang Technology Center of Software Engneerng, Insttute of Software, Chnese Academy of Scences,

More information

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network

More information

A Saturation Binary Neural Network for Crossbar Switching Problem

A Saturation Binary Neural Network for Crossbar Switching Problem A Saturaton Bnary Neural Network for Crossbar Swtchng Problem Cu Zhang 1, L-Qng Zhao 2, and Rong-Long Wang 2 1 Department of Autocontrol, Laonng Insttute of Scence and Technology, Benx, Chna bxlkyzhangcu@163.com

More information