584 research outputs found

    Distributed Topology Control based on Swarm Intelligence In Unmanned Aerial Vehicles Networks

    Get PDF
    Unmanned aerial vehicles (UAVs) have shown enormous potential in both public and civil domains. Although multi-UAV systems can collaboratively accomplish missions efficiently, UAV network(UAVNET) design faces many challenging issues, such as high mobility, dynamic topology, power constraints, and varying quality of communication links. Topology control plays a key role for providing high network connectivity while conserving power in UAVNETs. In this paper, we propose a distributed topology control algorithm based on discrete particle swarm optimization with articulation points(AP-DPSO). To reduce signaling overhead and facilitate distributed control, we first identify a set of articulation points (APs) to partition the network into multiple segments. The local topology control problem for individual segments is formulated as a degree-constrained minimum spanning tree problem. Each node collects local topology information and adjusts its transmit power to minimize power consumption. We conduct simulation experiments to evaluate the performance of the proposed AP-DPSO algorithm. Numerical results show that AP-DPSO outperforms some known algorithms including LMST and LSP, in terms of network connectivity, average link length and network robustness for a dynamic UAVNET

    Synchronization between Different Networks with Time-Varying Delay and Its Application in Bilayer Coupled Public Traffic Network

    Get PDF
    In order to study the dynamic characteristics of urban public traffic network, this paper establishes the conventional bus traffic network and the urban rail traffic network based on the space R modeling method. Then regarding these two networks as the subnetwork, the paper presents a new bilayer coupled public traffic network through the transfer relationship between subway and bus, and this model well reflects the connection between the passengers and bus operating vehicles. Based on the synchronization theory of coupling network with time-varying delay and taking “Lorenz system” as the network node, the paper studies the synchronization of bilayer coupled public traffic network. Finally, numerical results are given to show the impact of public traffic dispatching, delayed departure, the number of public bus stops between bus lines, and the number of transfer stations between two traffic modes on the bilayer coupled public traffic network balance through Matlab simulation

    Energy Efficient Sleep Strategy for Decoupled Uplink/Downlink Access in HetNets

    Get PDF
    In dense and heterogeneous networks, the decoupled uplink/downlink (UL/DL) access (DUDA) design has drawn great attentions for improving system performance. Energy efficiency (EE) becomes a major concern for densely deployed heterogeneous cellular networks (HetNets). In this paper, we theoretically analyze the energy efficient sleep strategy for DUDA HetNets. Through using stochastic geometry theory, we first examine the applicability of conventional sleep strategy to DUDA networks and design a new DUDA sleep strategy. We then formulate the energy consumption minimization problem and EE optimization problem, and derive the optimal BS sleep probability. Numerical results reveal that conventional sleep strategy may provide inaccurate guidance for sleep design in DUDA networks, which may lead to excessive sleeps and decrease system EE. Meanwhile our DUDA sleep strategy can effectively reduce network energy consumption. We also find that the dense deployment of small cells may generally increase network EE, but this improvement saturates as the BS density further increases

    User Behavior Aware Cell Association in Heterogeneous Cellular Networks

    Get PDF
    In heterogeneous cellular networks (HetNets), cell association of User Equipment (UE) affects UE transmit rate and network throughput. Conventional cell association rules are usually based on UE received Signal-to-Interference-and-Noise-Ratio (SINR) without taking into account user behaviors, which can indeed be exploited for improving network performance. In this paper, we investigate UE cell association in HetNets based on individual user behavior characteristics with aim to maximize long- term expected system throughput. We model the problem as a stochastic optimization model Restless Multi-Armed Bandit (RMAB). As it is a PSPACE-hard problem, we develop a primal-dual heuristic index algorithm and the solution specifies the rule that determines which arms in the RMAB model to be selected at each decision time. According to the solution of RMAB, we propose a new cell association strategy called Index Enabled Association (IDEA). We also conduct simulation experiments to compare IDEA with conventional max-SINR cell association strategy and an existing game-based RAT selection scheme. Numerical results demonstrate the advantages of IDEA in typical scenarios

    Based On Body Communication Wireless Medical Monitoring System Construction

    Get PDF
    Abstractthe concept of the body communication is put forward, the rapid development of portable medical equipment, medical monitoring systems are improving. Through analyzing the characteristics of body communication and the restrictions of medical equipment, we proposed the idea of medical monitoring system of wireless, and elaborated the system's principle of work. The construction of this system to further promote the development of medical monitoring system and provide security for the healthy development of body society

    A general real-time control approach of intrusion response for industrial automation systems

    Get PDF
    Intrusion response is a critical part of security protection. Compared with IT systems, industrial automation systems (IASs) have greater timeliness and availability demands. Real-time security policy enforcement of intrusion response is a challenge facing intrusion response for IASs. Inappropriate enforcement of the security policy can influence normal operation of the control system, and the loss caused by this security policy may even exceed that caused by cyberattacks. However, existing research about intrusion response focuses on security policy decisions and ignores security policy execution. This paper proposes a general, real-time control approach based on table-driven scheduling of intrusion response in IASs to address the problem of security policy execution. Security policy consists of a security service group, with each type of security service supported by a realization task set. Realization tasks from several task sets can be combined to form a response task set. In the proposed approach, first, a response task set is generated by a nondominated sorting genetic algorithm (GA) II with joint consideration of security performance and cost. Then, the system is reconfigured through an integrated scheduling scheme where system tasks and response tasks are mapped and scheduled together based on a GA. Furthermore, results from both numerical simulations and a real-application simulation show that the proposed method can implement the security policy in time with little effect on the system

    User Access Control and Bandwidth Allocation for Slice-Based 5G-and-Beyond Radio Access Networks

    Get PDF
    In this paper, we investigate the resource management for radio access network slicing from user access control and wireless bandwidth allocation perspectives. First, to guarantee users' QoS, we propose two admission control (AC) policies to select admissible users from the perspective of optimizing the QoS and the number of serving users respectively. Then, to optimize the bandwidth utilization for the selected admissible users, we investigate the slice association and bandwidth allocation (SABA) problem and propose network centric and UE centric SABA policies respectively. Numerical results show that in typical scenarios, our proposed AC and SABA policies can significantly outperform traditional policies in terms of wireless bandwidth utilization and number of admissible users

    Main factors influencing the gut microbiota of Datong yaks in mixed group

    Get PDF
    The Datong yak (Bos grunniens) is the first artificial breed of yaks in the world and has played an important role in the improvement of domestic yak quality on the Qinghai-Tibet Plateau. The Datong yak breeding farm in the Qinghai province of China is the main place for the breeding and feeding of Datong yaks. It hosts domestic Datong yaks and wild male yaks, mainly in mixed groups. Different managements have different effects on livestock. The gut microbiota is closely related to the health and immunity of Datong yaks, and mixed grouping can affect the composition and diversity of the gut microbiota of Datong yaks. To reveal the effects of mixed grouping on the gut microbiota of Datong yaks and wild yaks and identify the main dominant factors, we compared the gut microbial diversities of domestic males and females and wild males based on 16S rRNA V3–V4 regions using fresh fecal samples. The data showed significant differences in the gut microbial diversity of these three groups, and the α-diversity was the highest in wild males. Different factors influence the gut microbiota, and the main influencing factors were different in different groups, including sex differences, host genetics, and physical interactions. We also compared ecological assembly processes in the three groups. The results showed that mixed grouping contributed to the improvement of gut microbial diversity in domestic females. Our study provides effective and feasible suggestions for the feeding and management of the Datong yaks
    • …
    corecore