This paper introduces a parking management system based on a wireless sensor network developed by our group. The system consists of a large amount of parking space monitoring nodes, a few parking guiding nodes, a sink...This paper introduces a parking management system based on a wireless sensor network developed by our group. The system consists of a large amount of parking space monitoring nodes, a few parking guiding nodes, a sink node and a management station. All the nodes exchange information with each other through wireless communication. The prototype of the parking management system has been implemented and the preliminary test results show that the performance of the system can satisfy the requirements of the application.展开更多
Recent advancements in wireless communication and microchip techniques have accelerated the development of wireless sensor networks (WSN). Key management in WSN is a critical and challenging problem because of the inn...Recent advancements in wireless communication and microchip techniques have accelerated the development of wireless sensor networks (WSN). Key management in WSN is a critical and challenging problem because of the inner characteristics of sensor networks: deployed in hostile environments, limited resource and ad hoc nature. This paper investigates the constraints and special requirements of key management in sensor network environment, and some basic evaluation metrics are introduced. The key pre-distribution scheme is thought as the most suitable solution for key management problem in wireless sensor networks. It can be classified into four classes: pure probabilistic key pre-distribution, polynomial-based, Blom's matrix-based, and deterministic key pre-distribution schemes. In each class of methods, the related research papers are discussed based on the basic evaluation metrics. Finally, the possible research directions in key management are discussed.展开更多
The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key managemen...The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key management scheme is responsible for secure distributing group keys among valid nodes of the group. Based on the key-insulated encryption (KIE), we propose a group key management scheme (KIE-GKMS), which integrates the pair-wise key pre-distribution for WSN. The KIE-GKMS scheme updates group keys dynamically when adding or removing nodes. Moreover, the security analysis proves that the KIE-GKMS scheme not only obtains the semantic security, but also provides the forward and backward security. Finally, the theoretical analysis shows that the KIE-GKMS scheme has constant performance on both communication and storage costs in sensor nodes.展开更多
Abstract: Two-tier heterogeneous networks (HetNets), where the current cellular networks, i.e., macrocells, are overlapped with a large number of randomly distributed femtocells, can potentially bring significant b...Abstract: Two-tier heterogeneous networks (HetNets), where the current cellular networks, i.e., macrocells, are overlapped with a large number of randomly distributed femtocells, can potentially bring significant benefits to spectral utilization and system capacity. The interference management and access control for open and closed femtocells in two-tier HetNets were focused. The contributions consist of two parts. Firstly, in order to reduce the uplink interference caused by MUEs (macrocell user equipments) at closed femtocells, an incentive mechanism to implement interference mitigation was proposed. It encourages femtoeells that work with closed-subscriber-group (CSG) to allow the interfering MUEs access in but only via uplink, which can reduce the interference significantly and also benefit the marco-tier. The interference issue was then studied in open-subscriber-group (OSG) femtocells from the perspective of handover and mobility prediction. Inbound handover provides an alternative solution for open femtocells when interference turns up, while this accompanies with PCI (physical cell identity) confusion during inbound handover. To reduce the PCI confusion, a dynamic PCI allocation scheme was proposed, by which the high handin femtocells have the dedicated PCI while the others share the reuse PCIs. A Markov chain based mobility prediction algorithm was designed to decide whether the femtoeell status is with high handover requests. Numerical analysis reveals that the UL interference is managed well for the CSG femtocell and the PCI confusion issue is mitigated greatly in OSG femtocell compared to the conventional approaches.展开更多
Networked manufacturing is a primary management mod e of virtual enterprise. It takes advantage of advanced network technology to pass information and devise and assemble necessary components so as to reach a certa in...Networked manufacturing is a primary management mod e of virtual enterprise. It takes advantage of advanced network technology to pass information and devise and assemble necessary components so as to reach a certa in specific purpose. The characteristics of it are dynamic, international and pr ompt. In contrast with traditional manufacturing, networked manufacturing utilizes external predominant resources, and breaks through tangible limits of enterpris e, so it can optimize the combination of social resources and improve the enterp rise′capability of adapting to the constantly changing market. Networked manufacturing produces some problems while bringing enterprise infin ite commercial chance. Compared with traditional manufacturing, stealing intelle ctual achievements and encroaching the related property rights not only becomes easier and quicker, but also leaves no traces when enterprises transfer informat ion through network. It′s well known that competition among corporations in the future is the on e of intellectual property in the final analysis. Therefore, recently, the statu s of intellectual property protection is promoted grandly. In the following parts, several proposals on protecting intellectual property ar e put forward in detail. We can protect the intellectual property by the ways of strengthening the consci ousness of protection. We can protect the intellectual property by perfecting the law. We will know which behaviors on the network are legitimate and which one are illegitimate. As a result, it can decrease and resolve the conflicts partially. Besides, the article puts forward that the conflicts can be resolved through a m edi-institution, an authoritative governmental organization. Moreover, we should strengthen the education on ethics. At last, the paper presents that we can protect our intellectual property throug h international cooperation.展开更多
Wireless mesh network (WMN) is a new multi-hop network for broadband accessing to intemet. However, there exists a server unfairness problem based on different hop distances in WMN. To solve this problem, the unfair...Wireless mesh network (WMN) is a new multi-hop network for broadband accessing to intemet. However, there exists a server unfairness problem based on different hop distances in WMN. To solve this problem, the unfairness issue was analyzed in test-bed experiment and NS2 simulation. A dynamic queue management scheme E-QMMN was proposed, which allocates the queue buffer according to the hop distance of every flow. The experimental results show that the proposed scheme can not only increase the hop distance fairness of the legacy scheme at most 50%, but also reduce the average round trip time at least 29% in congested WMN environments.展开更多
The trend of economic globalisation and advances in i nformation technology has led to the emergence of dispersed manufacturing system s as a form of the virtual organisation. New manufacturing strategy pays more at t...The trend of economic globalisation and advances in i nformation technology has led to the emergence of dispersed manufacturing system s as a form of the virtual organisation. New manufacturing strategy pays more at tention to the management of the total value chain and therefore puts emphasis o n outsourcing. In fact, outsourcing is an efficient way of utilizing available r esources and has become one key aspect of the manufacturing strategy. Improved d ecision and organization on outsourcing will result in cost production and short er lead-times. However, most concepts and practice of traditional outsourcing do not adapt to t he changing environment and meet increasing performance requirements. On the oth er hand, virtual organisations might display instability between pure outsourcin g and establishing alliance. Balance and trade-off between independent agents a nd creating alliance are thus required. Therefore, the purpose of this paper is to develop a model to support decision-making, management and control on outsou rcing in a dispersed network manufacturing system and to discuss several key iss ues that are relevant to the relationship between the agents of the network. Dev elopment of the model will deploy Applied System Theory and will be built on fou ndations of earlier research on industrial management such the theories of Outso urcing, Order Entry Points, Design of Organisations and Logistic Control. The is sues that will be addressed in this paper are: · The selection of suppliers and co-makers; · Communication between suppliers and clients; · The mechanisms for profit-sharing between agents; · The product data management to integrate the knowledge of the different agent s into product design. Industrial companies will benefit from this research by the practical methods an d implementation extending their business models beyond concepts for outsourcing and alliances. Additionally, the exploration will lead to proactive contributio n of manufacturing during engineering, which would improve management and contro l of dispersed manufacturing systems.展开更多
Integrated Satellite Information Network (ISIN) includes those nodes in space and those on ground. It is the way to realize the fusion of satellite communication and traditional network technology. A satellite network...Integrated Satellite Information Network (ISIN) includes those nodes in space and those on ground. It is the way to realize the fusion of satellite communication and traditional network technology. A satellite network management system based on Multiplex Network Management Protocol (MNMP) has accomplished traditional management, such as configuration, performance and fault management. An architecture of Service Level Management (SLM) in ISIN is proposed, and a service topology management and Service Level Agreement (SLA) are deeply researched. At last, service security and fault management are briefly discussed, and a simulation system is accomplished.展开更多
为使水果采摘机器人在复杂情况下如树叶遮挡、果实目标尺度变化大等情况能准确地检测出水果,提出一种YOLO(you only look once)改进模型与NMS(non-maximum suppression)改进算法的目标检测方法。首先,对传统YOLO深度卷积神经网络架构进...为使水果采摘机器人在复杂情况下如树叶遮挡、果实目标尺度变化大等情况能准确地检测出水果,提出一种YOLO(you only look once)改进模型与NMS(non-maximum suppression)改进算法的目标检测方法。首先,对传统YOLO深度卷积神经网络架构进行改进,设计一种更细化的SPP5(spatial pyramid pooling)特征融合网络模块,强化特征图多重感受野信息的融合,并基于此模块提出一种YOLOv4-SPP2-5模型,在标准YOLOv4网络中跨层添加并改进SPP层,重新分布池化核大小,增强感受野范围,从而降低目标误检率;其次,提出一种Greedy-Confluence的NMS改进算法,通过对高度接近的检测框直接抑制和对重叠检测框综合考虑距离交并比DIOU(distance-intersection over union)和加权接近度WP(weighted proximity)的方法,均衡NMS的计算消耗并减少检测框的错误抑制,从而提高遮挡、重叠物体的检测精度;最后,分别对改进方法进行性能测试,验证方法的可行性,随后制作水果检测数据集并进行格式转换和标签标注,然后采用数据增强技术对训练数据进行扩充,并使用K-means++聚类方法获取先验锚定框,在计算机上进行了水果检测实验。结果表明,基于改进YOLO网络及改进NMS的水果检测方法在准确率方面有显著的提高,平均精度均值(mean average precision,MAP)在YOLOv4上达到了96.65%,较原网络提升1.70%,并且实时性也得到了保证,在测试设备上达到了39.26帧/s。展开更多
目前,IT系统管理环境发生了很大变化,管理对象种类日益复杂,管理规范多样化,造成系统管理复杂低效。为了解决这些问题,将Web服务管理标准用在分布式系统管理领域。首先分析了WS-Management(Web Service for Management)管理行业规范,然...目前,IT系统管理环境发生了很大变化,管理对象种类日益复杂,管理规范多样化,造成系统管理复杂低效。为了解决这些问题,将Web服务管理标准用在分布式系统管理领域。首先分析了WS-Management(Web Service for Management)管理行业规范,然后提出了一种基于WS-Management规范的分布式系统管理模型。该模型管理接口标准化,并容易扩展,适用于多种异构的系统管理环境。并详细介绍和实现了该模型。最后基于目前研究状况和实验结果提出了未来的研究方向。展开更多
Based on the Intranet technique,the design and implementation of rural area electricity Management Information System(RAEMIS)is researched.And then,a new RAEMIS with opening dynamic multimedia hypertext architecture i...Based on the Intranet technique,the design and implementation of rural area electricity Management Information System(RAEMIS)is researched.And then,a new RAEMIS with opening dynamic multimedia hypertext architecture is proposed.The advantages of new system include uniform user interface friendly,quick and accurate database accessing,and easy maintenance.展开更多
An efficient communication key management scheme to mobile ad-hoc networks (MANET) based on the ideas of threshold cryptography is proposed,local-TTP and location-based virtual network infrastructure. The protocol is ...An efficient communication key management scheme to mobile ad-hoc networks (MANET) based on the ideas of threshold cryptography is proposed,local-TTP and location-based virtual network infrastructure. The protocol is built upon a combinatorial formulation of the group key management issue. Primary features of the scheme include independently computation group keys by using a hash function and the mapping of nodes for group keys. Also,the proposed scheme scales well and supports dynamic setup and management of arbitrary structures of secure group communication in MANET.展开更多
基金Supported by National Natural Science Foundation of P. R. China (60373049) National Basic Research Program of P.R.China (2006CB 3030000)
文摘This paper introduces a parking management system based on a wireless sensor network developed by our group. The system consists of a large amount of parking space monitoring nodes, a few parking guiding nodes, a sink node and a management station. All the nodes exchange information with each other through wireless communication. The prototype of the parking management system has been implemented and the preliminary test results show that the performance of the system can satisfy the requirements of the application.
文摘Recent advancements in wireless communication and microchip techniques have accelerated the development of wireless sensor networks (WSN). Key management in WSN is a critical and challenging problem because of the inner characteristics of sensor networks: deployed in hostile environments, limited resource and ad hoc nature. This paper investigates the constraints and special requirements of key management in sensor network environment, and some basic evaluation metrics are introduced. The key pre-distribution scheme is thought as the most suitable solution for key management problem in wireless sensor networks. It can be classified into four classes: pure probabilistic key pre-distribution, polynomial-based, Blom's matrix-based, and deterministic key pre-distribution schemes. In each class of methods, the related research papers are discussed based on the basic evaluation metrics. Finally, the possible research directions in key management are discussed.
基金Project(61100201) supported by National Natural Science Foundation of ChinaProject(12ZZ019) supported by Technology Innovation Research Program,Shang Municipal Education Commission,China+1 种基金Project(LYM11053) supported by the Foundation for Distinguished Young Talents in Higher Education of Guangdong Province,ChinaProject(NCET-12-0358) supported by New Century Excellent Talentsin University,Ministry of Education,China
文摘The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key management scheme is responsible for secure distributing group keys among valid nodes of the group. Based on the key-insulated encryption (KIE), we propose a group key management scheme (KIE-GKMS), which integrates the pair-wise key pre-distribution for WSN. The KIE-GKMS scheme updates group keys dynamically when adding or removing nodes. Moreover, the security analysis proves that the KIE-GKMS scheme not only obtains the semantic security, but also provides the forward and backward security. Finally, the theoretical analysis shows that the KIE-GKMS scheme has constant performance on both communication and storage costs in sensor nodes.
基金Project(2012AA01A301-01)supported by the National High-Tech Research and Development Plan of ChinaProjects(61301148,61272061)supported by the National Natural Science Foundation of China+3 种基金Projects(20120161120019,2013016111002)supported by the Research Fund for the Doctoral Program of Higher Education of ChinaProjects(14JJ7023,10JJ5069)supported by the Natural Science Foundation of Hunan Province,ChinaProject(ISN12-05)supported by State Key Laboratory of Integrated Services Networks Open Foundation,ChinaProject(531107040276)supported by the Fundamental Research Funds for the Central Universities,China
文摘Abstract: Two-tier heterogeneous networks (HetNets), where the current cellular networks, i.e., macrocells, are overlapped with a large number of randomly distributed femtocells, can potentially bring significant benefits to spectral utilization and system capacity. The interference management and access control for open and closed femtocells in two-tier HetNets were focused. The contributions consist of two parts. Firstly, in order to reduce the uplink interference caused by MUEs (macrocell user equipments) at closed femtocells, an incentive mechanism to implement interference mitigation was proposed. It encourages femtoeells that work with closed-subscriber-group (CSG) to allow the interfering MUEs access in but only via uplink, which can reduce the interference significantly and also benefit the marco-tier. The interference issue was then studied in open-subscriber-group (OSG) femtocells from the perspective of handover and mobility prediction. Inbound handover provides an alternative solution for open femtocells when interference turns up, while this accompanies with PCI (physical cell identity) confusion during inbound handover. To reduce the PCI confusion, a dynamic PCI allocation scheme was proposed, by which the high handin femtocells have the dedicated PCI while the others share the reuse PCIs. A Markov chain based mobility prediction algorithm was designed to decide whether the femtoeell status is with high handover requests. Numerical analysis reveals that the UL interference is managed well for the CSG femtocell and the PCI confusion issue is mitigated greatly in OSG femtocell compared to the conventional approaches.
文摘Networked manufacturing is a primary management mod e of virtual enterprise. It takes advantage of advanced network technology to pass information and devise and assemble necessary components so as to reach a certa in specific purpose. The characteristics of it are dynamic, international and pr ompt. In contrast with traditional manufacturing, networked manufacturing utilizes external predominant resources, and breaks through tangible limits of enterpris e, so it can optimize the combination of social resources and improve the enterp rise′capability of adapting to the constantly changing market. Networked manufacturing produces some problems while bringing enterprise infin ite commercial chance. Compared with traditional manufacturing, stealing intelle ctual achievements and encroaching the related property rights not only becomes easier and quicker, but also leaves no traces when enterprises transfer informat ion through network. It′s well known that competition among corporations in the future is the on e of intellectual property in the final analysis. Therefore, recently, the statu s of intellectual property protection is promoted grandly. In the following parts, several proposals on protecting intellectual property ar e put forward in detail. We can protect the intellectual property by the ways of strengthening the consci ousness of protection. We can protect the intellectual property by perfecting the law. We will know which behaviors on the network are legitimate and which one are illegitimate. As a result, it can decrease and resolve the conflicts partially. Besides, the article puts forward that the conflicts can be resolved through a m edi-institution, an authoritative governmental organization. Moreover, we should strengthen the education on ethics. At last, the paper presents that we can protect our intellectual property throug h international cooperation.
基金Projects(61163060,61103204,60963022) supported by the National Natural Science Foundation of ChinaProject(D018023) supported by the Natural Science Foundation of Guangxi Province,ChinaPostdoctoral Funding of Central South University,China
文摘Wireless mesh network (WMN) is a new multi-hop network for broadband accessing to intemet. However, there exists a server unfairness problem based on different hop distances in WMN. To solve this problem, the unfairness issue was analyzed in test-bed experiment and NS2 simulation. A dynamic queue management scheme E-QMMN was proposed, which allocates the queue buffer according to the hop distance of every flow. The experimental results show that the proposed scheme can not only increase the hop distance fairness of the legacy scheme at most 50%, but also reduce the average round trip time at least 29% in congested WMN environments.
文摘The trend of economic globalisation and advances in i nformation technology has led to the emergence of dispersed manufacturing system s as a form of the virtual organisation. New manufacturing strategy pays more at tention to the management of the total value chain and therefore puts emphasis o n outsourcing. In fact, outsourcing is an efficient way of utilizing available r esources and has become one key aspect of the manufacturing strategy. Improved d ecision and organization on outsourcing will result in cost production and short er lead-times. However, most concepts and practice of traditional outsourcing do not adapt to t he changing environment and meet increasing performance requirements. On the oth er hand, virtual organisations might display instability between pure outsourcin g and establishing alliance. Balance and trade-off between independent agents a nd creating alliance are thus required. Therefore, the purpose of this paper is to develop a model to support decision-making, management and control on outsou rcing in a dispersed network manufacturing system and to discuss several key iss ues that are relevant to the relationship between the agents of the network. Dev elopment of the model will deploy Applied System Theory and will be built on fou ndations of earlier research on industrial management such the theories of Outso urcing, Order Entry Points, Design of Organisations and Logistic Control. The is sues that will be addressed in this paper are: · The selection of suppliers and co-makers; · Communication between suppliers and clients; · The mechanisms for profit-sharing between agents; · The product data management to integrate the knowledge of the different agent s into product design. Industrial companies will benefit from this research by the practical methods an d implementation extending their business models beyond concepts for outsourcing and alliances. Additionally, the exploration will lead to proactive contributio n of manufacturing during engineering, which would improve management and contro l of dispersed manufacturing systems.
基金Sponsored by National High-Tech Research and Development Plan(2003AA712032).
文摘Integrated Satellite Information Network (ISIN) includes those nodes in space and those on ground. It is the way to realize the fusion of satellite communication and traditional network technology. A satellite network management system based on Multiplex Network Management Protocol (MNMP) has accomplished traditional management, such as configuration, performance and fault management. An architecture of Service Level Management (SLM) in ISIN is proposed, and a service topology management and Service Level Agreement (SLA) are deeply researched. At last, service security and fault management are briefly discussed, and a simulation system is accomplished.
文摘为使水果采摘机器人在复杂情况下如树叶遮挡、果实目标尺度变化大等情况能准确地检测出水果,提出一种YOLO(you only look once)改进模型与NMS(non-maximum suppression)改进算法的目标检测方法。首先,对传统YOLO深度卷积神经网络架构进行改进,设计一种更细化的SPP5(spatial pyramid pooling)特征融合网络模块,强化特征图多重感受野信息的融合,并基于此模块提出一种YOLOv4-SPP2-5模型,在标准YOLOv4网络中跨层添加并改进SPP层,重新分布池化核大小,增强感受野范围,从而降低目标误检率;其次,提出一种Greedy-Confluence的NMS改进算法,通过对高度接近的检测框直接抑制和对重叠检测框综合考虑距离交并比DIOU(distance-intersection over union)和加权接近度WP(weighted proximity)的方法,均衡NMS的计算消耗并减少检测框的错误抑制,从而提高遮挡、重叠物体的检测精度;最后,分别对改进方法进行性能测试,验证方法的可行性,随后制作水果检测数据集并进行格式转换和标签标注,然后采用数据增强技术对训练数据进行扩充,并使用K-means++聚类方法获取先验锚定框,在计算机上进行了水果检测实验。结果表明,基于改进YOLO网络及改进NMS的水果检测方法在准确率方面有显著的提高,平均精度均值(mean average precision,MAP)在YOLOv4上达到了96.65%,较原网络提升1.70%,并且实时性也得到了保证,在测试设备上达到了39.26帧/s。
文摘目前,IT系统管理环境发生了很大变化,管理对象种类日益复杂,管理规范多样化,造成系统管理复杂低效。为了解决这些问题,将Web服务管理标准用在分布式系统管理领域。首先分析了WS-Management(Web Service for Management)管理行业规范,然后提出了一种基于WS-Management规范的分布式系统管理模型。该模型管理接口标准化,并容易扩展,适用于多种异构的系统管理环境。并详细介绍和实现了该模型。最后基于目前研究状况和实验结果提出了未来的研究方向。
文摘Based on the Intranet technique,the design and implementation of rural area electricity Management Information System(RAEMIS)is researched.And then,a new RAEMIS with opening dynamic multimedia hypertext architecture is proposed.The advantages of new system include uniform user interface friendly,quick and accurate database accessing,and easy maintenance.
文摘An efficient communication key management scheme to mobile ad-hoc networks (MANET) based on the ideas of threshold cryptography is proposed,local-TTP and location-based virtual network infrastructure. The protocol is built upon a combinatorial formulation of the group key management issue. Primary features of the scheme include independently computation group keys by using a hash function and the mapping of nodes for group keys. Also,the proposed scheme scales well and supports dynamic setup and management of arbitrary structures of secure group communication in MANET.