140 research outputs found

    Experimental Study of Various Techniques to Protect Ice-Rich Cut Slopes

    Get PDF
    INE/AUTC 15.08 and INE/AUTC 13.07 (2013) Construction Repor

    Stabilization of Erodible Slopes with Geofibers and Nontraditional Liquid Additives

    Get PDF
    INE/AUTC 13.1

    Energy Efficient Ant Colony Algorithms for Data Aggregation in Wireless Sensor Networks

    Get PDF
    In this paper, a family of ant colony algorithms called DAACA for data aggregation has been presented which contains three phases: the initialization, packet transmission and operations on pheromones. After initialization, each node estimates the remaining energy and the amount of pheromones to compute the probabilities used for dynamically selecting the next hop. After certain rounds of transmissions, the pheromones adjustment is performed periodically, which combines the advantages of both global and local pheromones adjustment for evaporating or depositing pheromones. Four different pheromones adjustment strategies are designed to achieve the global optimal network lifetime, namely Basic-DAACA, ES-DAACA, MM-DAACA and ACS-DAACA. Compared with some other data aggregation algorithms, DAACA shows higher superiority on average degree of nodes, energy efficiency, prolonging the network lifetime, computation complexity and success ratio of one hop transmission. At last we analyze the characteristic of DAACA in the aspects of robustness, fault tolerance and scalability.Comment: To appear in Journal of Computer and System Science

    Cloud-structural health monitoring based on smartphone

    Get PDF
    Smartphone, integrated with CPU, sensors, network, and storage capability, is developed rapidly in recent years. A cloud-structural health monitoring method based on smartphone was proposed, and a structural health monitoring system Orion-CC, which integrates functions of data acquisition, data analysis and data upload, was developed on smartphone to perform structural health monitoring without any other professional devices. And the feasibility of Orion-CC was proved by the cable force test. A cloud-SHM data sharing website was built to make the data synchronization between smartphone and website, and realize data uploading and sharing, which can improve the efficiency of monitoring and big data integration, make the possibility for big data collection and quick structural safety evaluation

    Research on Trust Propagation Models in Reputation Management Systems

    Get PDF
    Feedback based reputation systems continue to gain popularity in eCommerce and social media systems today and reputation management in large social networks needs to manage cold start and sparseness in terms of feedback. Trust propagation has been widely recognized as an effective mechanism to handle these problems. In this paper we study the characterization of trust propagation models in the context of attack resilience. We characterize trust propagation models along three dimensions: (i) uniform propagation and conditional propagation, (ii) jump strategies for breaking unwanted cliques, and (iii) decay factors for differentiating recent trust history from remote past history. We formally and experimentally show that feedback similarity is a critical measure for countering colluding attacks in reputation systems. Without feedback similarity guided control, trust propagations are vulnerable to different types of colluding attacks

    A Novel Reputation Management Mechanism with Forgiveness in P2P File Sharing Networks

    Get PDF
    AbstractIn peer-to-peer (P2P) file sharing networks, it is common practice to manage each peer using reputation systems. A reputation system systematically tracks the reputation of each peer and punishes peers for malicious behaviors (like uploading bad file, or virus, etc). However, current reputation systems could hurt the normal peers, since they might occasionally make mistakes. Therefore, in this paper, we introduce forgiveness mechanism into the EigenTrust reputation system to reduce such malicious treatments and give them opportunities to gain reputation back. Particularly, we take four motivations (the severity of current offence, the frequency of offences, the compensation and the reciprocity of the offender) into consideration to measure forgiveness. The simulation work shows that the forgiveness model can repair the direct trust breakdown caused by unintentional mistakes and lead to less invalid downloads, which improves the performance of P2P file sharing systems

    Circumferences and minimum degrees in 3-connected claw-free graphs

    Get PDF
    AbstractIn this paper, we prove that every 3-connected claw-free graph G on n vertices contains a cycle of length at least min{n,6δ−15}, thereby generalizing several known results

    Convenient displacement monitoring technique using smartphone

    Get PDF
    In this paper, a displacement monitoring APP called D-Viewer is proposed and developed. By means of common laser device and projection plate, structural displacement can be monitored dynamically, using the APP. Firstly, the laser spot centroid recognition method was studied. Second, the displacement monitoring APP was developed. Finally, in order to verify the feasibility of the method, a series of static and dynamic experiments using smartphone were conducted. Results show that this method can be used as a convenient, fast, low-cost structural displacement monitoring method

    Computing Optimal Mixed Strategies for Terrorist Plot Detection Games with the Consideration of Information Leakage

    Full text link
    The terrorist’s coordinated attack is becoming an increasing threat to western countries. By monitoring potential terrorists, security agencies are able to detect and destroy terrorist plots at their planning stage. Therefore, an optimal monitoring strategy for the domestic security agency becomes necessary. However, previous study about monitoring strategy generation fails to consider the information leakage, due to hackers and insider threat. Such leakage events may lead to failure of watching potential terrorists and destroying the plot, and cause a huge risk to public security. This paper makes two major contributions. Firstly, we develop a new Stackelberg game model for the security agency to generate optimal monitoring strategy with the consideration of information leakage. Secondly, we provide a double-oracle framework DO-TPDIL for calculation effectively. The experimental result shows that our approach can obtain robust strategies against information leakage with high feasibility and efficiency
    • …
    corecore