• Title/Summary/Keyword: network optimization

Search Result 2,239, Processing Time 0.024 seconds

Interference-free Clustering Protocol for Large-Scale and Dense Wireless Sensor Networks

  • Chen, Zhihong;Lin, Hai;Wang, Lusheng;Zhao, Bo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1238-1259
    • /
    • 2019
  • Saving energy is a big challenge for Wireless Sensor Networks (WSNs), which becomes even more critical in large-scale WSNs. Most energy waste is communication related, such as collision, overhearing and idle listening, so the schedule-based access which can avoid these wastes is preferred for WSNs. On the other hand, clustering technique is considered as the most promising solution for topology management in WSNs. Hence, providing interference-free clustering is vital for WSNs, especially for large-scale WSNs. However, schedule management in cluster-based networks is never a trivial work, since it requires inter-cluster cooperation. In this paper, we propose a clustering method, called Interference-Free Clustering Protocol (IFCP), to partition a WSN into interference-free clusters, making timeslot management much easier to achieve. Moreover, we model the clustering problem as a multi-objective optimization issue and use non-dominated sorting genetic algorithm II to solve it. Our proposal is finally compared with two adaptive clustering methods, HEED-CSMA and HEED-BMA, demonstrating that it achieves the good performance in terms of delay, packet delivery ratio, and energy consumption.

Zero-Knowledge Realization of Software-Defined Gateway in Fog Computing

  • Lin, Te-Yuan;Fuh, Chiou-Shann
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5654-5668
    • /
    • 2018
  • Driven by security and real-time demands of Internet of Things (IoT), the timing of fog computing and edge computing have gradually come into place. Gateways bear more nearby computing, storage, analysis and as an intelligent broker of the whole computing lifecycle in between local devices and the remote cloud. In fog computing, the edge broker requires X-aware capabilities that combines software programmability, stream processing, hardware optimization and various connectivity to deal with such as security, data abstraction, network latency, service classification and workload allocation strategy. The prosperous of Field Programmable Gate Array (FPGA) pushes the possibility of gateway capabilities further landed. In this paper, we propose a software-defined gateway (SDG) scheme for fog computing paradigm termed as Fog Computing Zero-Knowledge Gateway that strengthens data protection and resilience merits designed for industrial internet of things or highly privacy concerned hybrid cloud scenarios. It is a proxy for fog nodes and able to integrate with existing commodity gateways. The contribution is that it converts Privacy-Enhancing Technologies rules into provable statements without knowing original sensitive data and guarantees privacy rules applied to the sensitive data before being propagated while preventing potential leakage threats. Some logical functions can be offloaded to any programmable micro-controller embedded to achieve higher computing efficiency.

LSTM Android Malicious Behavior Analysis Based on Feature Weighting

  • Yang, Qing;Wang, Xiaoliang;Zheng, Jing;Ge, Wenqi;Bai, Ming;Jiang, Frank
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.6
    • /
    • pp.2188-2203
    • /
    • 2021
  • With the rapid development of mobile Internet, smart phones have been widely popularized, among which Android platform dominates. Due to it is open source, malware on the Android platform is rampant. In order to improve the efficiency of malware detection, this paper proposes deep learning Android malicious detection system based on behavior features. First of all, the detection system adopts the static analysis method to extract different types of behavior features from Android applications, and extract sensitive behavior features through Term frequency-inverse Document Frequency algorithm for each extracted behavior feature to construct detection features through unified abstract expression. Secondly, Long Short-Term Memory neural network model is established to select and learn from the extracted attributes and the learned attributes are used to detect Android malicious applications, Analysis and further optimization of the application behavior parameters, so as to build a deep learning Android malicious detection method based on feature analysis. We use different types of features to evaluate our method and compare it with various machine learning-based methods. Study shows that it outperforms most existing machine learning based approaches and detects 95.31% of the malware.

Socially Aware Device-to-multi-device User Grouping for Popular Content Distribution

  • Liu, Jianlong;Zhou, Wen'an;Lin, Lixia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.11
    • /
    • pp.4372-4394
    • /
    • 2020
  • The distribution of popular videos incurs a large amount of traffic at the base stations (BS) of networks. Device-to-multi-device (D2MD) communication has emerged an efficient radio access technology for offloading BS traffic in recent years. However, traditional studies have focused on synchronous user requests whereas asynchronous user requests are more common. Hence, offloading BS traffic in case of asynchronous user requests while considering their time-varying characteristics and the quality of experience (QoE) of video request users (VRUs) is a pressing problem. This paper uses social stability (SS) and video loading duration (VLD)-tolerant property to group VRUs and seed users (SUs) to offload BS traffic. We define the average amount of data transmission (AADT) to measure the network's capacity for offloading BS traffic. Based on this, we formulate a time-varying bipartite graph matching optimization problem. We decouple the problem into two subproblems which can be solved separately in terms of time and space. Then, we propose the socially aware D2MD user selection (SA-D2MD-S) algorithm based on finite horizon optimal stopping theory, and propose the SA-D2MD user matching (SA-D2MD-M) algorithm to solve the two subproblems. The results of simulations show that our algorithms outperform prevalent algorithms.

An Assessment of ICT Infrastructure, Deployment and Applications in the Science and Technology (S&T) Research Institutions in Ghana

  • Kwafoa, Paulina Nana Yaa;Entsua-Mensah, Clement
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.11 no.1
    • /
    • pp.29-48
    • /
    • 2021
  • The paper discusses the ICT infrastructure as far as the availability of (computers, local or wide area networks, Internet connectivity and its reliability, size of the bandwidth and its optimization, etc.) in the S&T research institution. It also examined the profile of the research scientists and looked at the type of ICT infrastructure that is available for their use as well as the reliability of the Internet connectivity within these research institutions. It looked at the broadband capacities of the research institutions and the ICT capabilities in respect of the technical and managerial support back-up that are available to the research institutions. The study used the survey research method with a questionnaire as well as personal observation to gather the data. From the data gathered, it was realized that the internet connectivity and the size of the bandwidth that the R&D institutions subscribed to differed significantly. Again, the extent to which the research scientists were able to access the internet in their respective institutions depended on the quality of the local network in place. Generally, the investments in ICT were made for different management objectives, and these were meant to facilitate the generation of new knowledge as well as make measurable improvements in R&D activities.

Deep neural networks trained by the adaptive momentum-based technique for stability simulation of organic solar cells

  • Xu, Peng;Qin, Xiao;Zhu, Honglei
    • Structural Engineering and Mechanics
    • /
    • v.83 no.2
    • /
    • pp.259-272
    • /
    • 2022
  • The branch of electronics that uses an organic solar cell or conductive organic polymers in order to yield electricity from sunlight is called photovoltaic. Regarding this crucial issue, an artificial intelligence-based predictor is presented to investigate the vibrational behavior of the organic solar cell. In addition, the generalized differential quadrature method (GDQM) is utilized to extract the results. The validation examination is done to confirm the credibility of the results. Then, the deep neural network with fully connected layers (DNN-FCL) is trained by means of Adam optimization on the dataset whose members are the vibration response of the design-points. By determining the optimum values for the biases along with weights of DNN-FCL, one can predict the vibrational characteristics of any organic solar cell by knowing the properties defined as the inputs of the mentioned DNN. To assess the ability of the proposed artificial intelligence-based model in prediction of the vibrational response of the organic solar cell, the authors monitored the mean squared error in different steps of the training the DNN-FCL and they observed that the convergency of the results is excellent.

Analysis of Energy Consumption Efficiency for a Hybrid Electric Vehicle According to the Application of LPG Fuel in WLTC Mode (WLTC 모드에서의 LPG 연료 적용에 따른 하이브리드 자동차 에너지소비효율 분석)

  • Jun Woo, Jeong;Seungchul, Woo;Seokjoo, Kwon;Se-Doo, Oh;Youngho, Seo;Kihyung, Lee
    • Journal of ILASS-Korea
    • /
    • v.27 no.4
    • /
    • pp.195-202
    • /
    • 2022
  • Recently, the global automobile market is rapidly changing from internal combustion engine vehicles to eco-friendly vehicles including electric vehicles. Among eco-friendly vehicles, LPG vehicles are low in fine dust and are suggested as a realistic way to replace diesel vehicles. In addition, it is more economical than gasoline in its class, showing a cost-saving effect. In Korea, the business of converting gasoline into LPG is active. Research is being conducted to apply this to hybrid vehicles. In this study, the difference in energy consumption efficiency was analyzed when LPG fuel was applied by selecting a 2-liter GDI hybrid electric vehicle. The operation of the hybrid system according to various driving characteristics was confirmed by selecting the WLTC mode. As a result, it was confirmed that the BSFC was about 5% lower than that of gasoline fuel when using LPG fuel. This is due to the active operation of the motor while driving. Optimization is required as battery consumption increases from an energy perspective.

IEEE 802.11 ax optimization design study in XR (eXtended Reality) training room

  • Chae, Yeon Keun;Chae, Myungsin
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.1
    • /
    • pp.253-264
    • /
    • 2022
  • In the era of the pandemic, the importance of a wireless LAN environment has become increasingly important, especially as the era of smart working and non-face-to-face education has become a universal and daily routine. Smartphones, tablets, laptops, PCs, smart watches, and wearable devices, collective referred to as wireless terminals, can be accessed anytime and anywhere through the internet, allowing for consistent and constant access to offices, factories, warehouses, shopping malls, railways, hotels, hospitals, schools, logistics centers, airports, exhibition halls, etc. This sort of access is currently being used in roads, parks, traditional markets, and ports. Since the release of the IEEE 802.11 Legacy Standard in 1997, Wi-Fi technology has been continuously supplemented and revised, and the standard has been continuously developed. In the era of smart working, the importance of efficient wireless deployment and scientific design has become more important. The importance of wireless in the smart factory, in the metaverse era, in the era of pursuing work and life that transcend time and space by using AR, VR, MR, and XR, it is more urgent to solve the shadow area of Wi-Fi. Through this study, we intend to verify the wireless failure problem of the xr training center and suggest improvement measures.

Smartphone-based structural crack detection using pruned fully convolutional networks and edge computing

  • Ye, X.W.;Li, Z.X.;Jin, T.
    • Smart Structures and Systems
    • /
    • v.29 no.1
    • /
    • pp.141-151
    • /
    • 2022
  • In recent years, the industry and research communities have focused on developing autonomous crack inspection approaches, which mainly include image acquisition and crack detection. In these approaches, mobile devices such as cameras, drones or smartphones are utilized as sensing platforms to acquire structural images, and the deep learning (DL)-based methods are being developed as important crack detection approaches. However, the process of image acquisition and collection is time-consuming, which delays the inspection. Also, the present mobile devices such as smartphones can be not only a sensing platform but also a computing platform that can be embedded with deep neural networks (DNNs) to conduct on-site crack detection. Due to the limited computing resources of mobile devices, the size of the DNNs should be reduced to improve the computational efficiency. In this study, an architecture called pruned crack recognition network (PCR-Net) was developed for the detection of structural cracks. A dataset containing 11000 images was established based on the raw images from bridge inspections. A pruning method was introduced to reduce the size of the base architecture for the optimization of the model size. Comparative studies were conducted with image processing techniques (IPTs) and other DNNs for the evaluation of the performance of the proposed PCR-Net. Furthermore, a modularly designed framework that integrated the PCR-Net was developed to realize a DL-based crack detection application for smartphones. Finally, on-site crack detection experiments were carried out to validate the performance of the developed system of smartphone-based detection of structural cracks.

Hierarchical Resource Management Framework and Multi-hop Task Scheduling Decision for Resource-Constrained VEC Networks

  • Hu, Xi;Zhao, Yicheng;Huang, Yang;Zhu, Chen;Yao, Jun;Fang, Nana
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.11
    • /
    • pp.3638-3657
    • /
    • 2022
  • In urban vehicular edge computing (VEC) environments, one edge server always serves many task requests in its coverage which results in the resource-constrained problem. To resolve the problem and improve system utilization, we first design a general hierarchical resource management framework based on typical VEC network structures. Following the framework, a specific interacting protocol is also designed for our decision algorithm. Secondly, a greedy bidding-based multi-hop task scheduling decision algorithm is proposed to realize effective task scheduling in resource-constrained VEC environments. In this algorithm, the goal of maximizing system utility is modeled as an optimization problem with the constraints of task deadlines and available computing resources. Then, an auction mechanism named greedy bidding is used to match task requests to edge servers in the case of multiple hops to maximize the system utility. Simulation results show that our proposal can maximize the number of tasks served in resource constrained VEC networks and improve the system utility.