204 research outputs found

    Wireless Power Transfer and Data Collection in Wireless Sensor Networks

    Full text link
    In a rechargeable wireless sensor network, the data packets are generated by sensor nodes at a specific data rate, and transmitted to a base station. Moreover, the base station transfers power to the nodes by using Wireless Power Transfer (WPT) to extend their battery life. However, inadequately scheduling WPT and data collection causes some of the nodes to drain their battery and have their data buffer overflow, while the other nodes waste their harvested energy, which is more than they need to transmit their packets. In this paper, we investigate a novel optimal scheduling strategy, called EHMDP, aiming to minimize data packet loss from a network of sensor nodes in terms of the nodes' energy consumption and data queue state information. The scheduling problem is first formulated by a centralized MDP model, assuming that the complete states of each node are well known by the base station. This presents the upper bound of the data that can be collected in a rechargeable wireless sensor network. Next, we relax the assumption of the availability of full state information so that the data transmission and WPT can be semi-decentralized. The simulation results show that, in terms of network throughput and packet loss rate, the proposed algorithm significantly improves the network performance.Comment: 30 pages, 8 figures, accepted to IEEE Transactions on Vehicular Technolog

    Mehanizam pretraživanja preporučitelja za sustave sigurnih preporučitelja u Internetu stvari

    Get PDF
    Intelligent things are widely connected in Internet of Things (IoT) to enable ubiquitous service access. This may cause heavy service redundant. The trust-aware recommender system (TARS) is therefore proposed for IoT to help users finding reliable services. One fundamental requirement of TARS is to efficiently find as many recommenders as possible for the active users. To achieve this, existing approaches of TARS choose to search the entire trust network, which have very high computational cost. Though the trust network is the scale-free network, we show via experiments that TARS cannot find satisfactory number of recommenders by directly applying the classical searching mechanism. In this paper, we propose an efficient searching mechanism, named S_Searching: based on the scale-freeness of trust networks, choosing the global highest-degree nodes to construct a Skeleton, and searching the recommenders via this Skeleton. Benefiting from the superior outdegrees of the nodes in the Skeleton, S_Searching can find the recommenders very efficiently. Experimental results show that S_Searching can find almost the same number of recommenders as that of conducting full search, which is much more than that of applying the classical searching mechanism in the scale-free network, while the computational complexity and cost is much less.Inteligentni objekti su naširoko povezani u Internet stvari kako bi se omogućio sveprisutni pristup uslugama. To može imati za posljedicu veliku redundanciju usluga. Stoga je za pronalaženje pouzdane usluge u radu predložen vjerodostojan sustav preporučitelja (VSP). Temeljni zahtjev VSP-a je učinkovito pretraživanje maksimalnog mogućeg broja preporu čtelja za aktivnog korisnika. Kako bi se to postiglo, postojeći pristupi VSP-a u potpunosti pretražuju sigurnu mrežu što ima za posljedicu velike računske zahtjeve. Iako je sigurna mreža mreža bez skale, eksperimentima je pokazano kako VSP ne može naći zadovoljavajući broj preporučitelja direktnom primjenom klasičnog algoritma pretraživanja. U ovom radu je predložen učinkovit algoritam pretraživanja, nazvan S_Searching: temeljen na sigurnim mrežama bez skale koji koristi čvorove globalno najvećeg stupnja za izgradnju Skeleton-a i pretražuje preporučitelja pomoću Skeleton-a. Iskorištavanjem nadre.enih izlaznih stupnjeva čvorova Skeleton-a S_Searching može s visokom učinkovitošću pronaći preporučitelje. Eksperimentalni rezultati pokazuju kako S_Searching može naći gotovo jednak broj preporučitelja koji bi se pronašli potpunom pretragom, što je mnogo više od onoga što se postiže primjenom klasičnog algoritma pretrage na mreži bez skale, uz znatno smanjenje računske kompleksnosti i zahtjeva

    Releasing network isolation problem in group-based industrial wireless sensor networks

    Get PDF
    In this paper, we propose a cross-layer optimization scheme named Adjusting the Transmission Radius (ATR), which is based on the Energy Consumed uniformly Connected K-Neighborhood (EC-CKN) sleep scheduling algorithm in wireless sensor networks (WSNs). In particular, we discovered two important problems, namely, the death acceleration problem and the network isolation problem, in EC-CKN-based WSNs. Furthermore, we solve these two problems in ATR, which creates sleeping opportunities for the nodes that cannot get a chance to sleep in the EC-CKN algorithm. Simulation and experimental results show that the network lifetime of ATR-Connected-K-Neighborhood-based WSNs increases by 19%, on average, and the maximum increment is 41%. In addition, four important insights were discovered through this research work and presented in this paper

    Big-Step Semantics

    Get PDF
    With the popularity of model-driven methodologies, and the abundance of modelling languages, a major question for a requirements engineer is: which language is suitable for modelling a system under study? We address this question from a semantic point-of-view for big-step modelling languages (BSMLs). BSMLs are a popular class of behavioural modelling languages in which a model can respond to an environmental input by executing multiple, possibly concurrent, transitions. We deconstruct the semantics of a large class of BSMLs into high-level, orthogonal semantic aspects and discuss the relative advantages and disadvantages of the semantic options for each of these aspects to allow a requirements engineer to compare and choose the right BSML. We accompany our presentation with many modelling examples that illustrate the differences between a set of relevant semantic options.

    On XACML\u27s adequacy to specify and to enforce HIPAA

    Get PDF
    In the medical sphere, personal and medical informa-tion is collected, stored, and transmitted for various pur-poses, such as, continuity of care, rapid formulationof diagnoses, and billing. Many of these operationsmust comply with federal regulations like the HealthInsurance Portability and Accountability Act (HIPAA).To this end, we need a specification language that canprecisely capture the requirements of HIPAA. We alsoneed an enforcement engine that can enforce the pri-vacy policies specified in the language. In the currentwork, we evaluate eXtensible Access Control MarkupLanguage (XACML) as a candidate specification lan-guage for HIPAA privacy rules. We evaluate XACMLbased on the set of features required to sufficiently ex-press HIPAA, proposed by a prior work. We also discusswhich of the features necessary for expressing HIPAAare missing in XACML. We then present high level de-signs of how to enhance XACM

    Bold but Cautious: Unlocking the Potential of Personalized Federated Learning through Cautiously Aggressive Collaboration

    Full text link
    Personalized federated learning (PFL) reduces the impact of non-independent and identically distributed (non-IID) data among clients by allowing each client to train a personalized model when collaborating with others. A key question in PFL is to decide which parameters of a client should be localized or shared with others. In current mainstream approaches, all layers that are sensitive to non-IID data (such as classifier layers) are generally personalized. The reasoning behind this approach is understandable, as localizing parameters that are easily influenced by non-IID data can prevent the potential negative effect of collaboration. However, we believe that this approach is too conservative for collaboration. For example, for a certain client, even if its parameters are easily influenced by non-IID data, it can still benefit by sharing these parameters with clients having similar data distribution. This observation emphasizes the importance of considering not only the sensitivity to non-IID data but also the similarity of data distribution when determining which parameters should be localized in PFL. This paper introduces a novel guideline for client collaboration in PFL. Unlike existing approaches that prohibit all collaboration of sensitive parameters, our guideline allows clients to share more parameters with others, leading to improved model performance. Additionally, we propose a new PFL method named FedCAC, which employs a quantitative metric to evaluate each parameter's sensitivity to non-IID data and carefully selects collaborators based on this evaluation. Experimental results demonstrate that FedCAC enables clients to share more parameters with others, resulting in superior performance compared to state-of-the-art methods, particularly in scenarios where clients have diverse distributions.Comment: Accepted by ICCV202
    corecore