无通信前提下,直流微电网中储能单元常用的控制策略难以实现储能荷电状态(state of charge,SOC)均衡、最大化新能源利用率和母线电压支撑三方面的平衡控制,提出一种基于荷电状态的直流微电网中多储能单元分级运行控制方法。首先,考虑微...无通信前提下,直流微电网中储能单元常用的控制策略难以实现储能荷电状态(state of charge,SOC)均衡、最大化新能源利用率和母线电压支撑三方面的平衡控制,提出一种基于荷电状态的直流微电网中多储能单元分级运行控制方法。首先,考虑微电网多运行状态下对储能单元的不同需求,将储能单元状态划分为5种工作模式,且各模式的电压区间是根据SOC动态调节的。利用直流母线电压信号作为工作模式判据,各储能单元根据SOC大小投入充放电,实现分级运行。随后,功率调节控制根据储能单元各模式的电压区间自动调整下垂曲线,使投入运行的储能单元间根据SOC合理分配功率。最后,搭建了Matlab/Simulink仿真模型,仿真结果表明所提控制策略在无通信条件下可实现各储能单元SOC均衡,并且能够实现与其他源储单元协调运行,以最大化新能源利用率,避免了工作模式切换过程中母线电压大幅波动,证明了所提控制策略的可行性和有效性。展开更多
The main objective of multiuser orthogonal frequency division multiple access(MU-OFDM) is to maximize the total system capacity in wireless communication systems. Thus, the problem in MU-OFDM system is the adaptive al...The main objective of multiuser orthogonal frequency division multiple access(MU-OFDM) is to maximize the total system capacity in wireless communication systems. Thus, the problem in MU-OFDM system is the adaptive allocation of the resources(subcarriers, bits and power) to different users subject to several restrictions to maximize the total system capacity. In this work, a proposed subcarrier allocation algorithm was presented to assign the subcarriers with highest channel gain to the users. After the subcarrier allocation, subcarrier gain-based power allocation(SGPA) was employed for power and bit loading. The simulation results show that the proposed subcarrier-power allocation scheme can achieve high total system capacity and good fairness in allocating the resources to the users with slightly high computational complexity compared to the existing subcarrier allocation algorithms.展开更多
An important problem in wireless communication networks (WCNs) is that they have a minimum number of resources, which leads to high-security threats. An approach to find and detect the attacks is the intrusion detecti...An important problem in wireless communication networks (WCNs) is that they have a minimum number of resources, which leads to high-security threats. An approach to find and detect the attacks is the intrusion detection system (IDS). In this paper, the fuzzy lion Bayes system (FLBS) is proposed for intrusion detection mechanism. Initially, the data set is grouped into a number of clusters by the fuzzy clustering algorithm. Here, the Naive Bayes classifier is integrated with the lion optimization algorithm and the new lion naive Bayes (LNB) is created for optimally generating the probability measures. Then, the LNB model is applied to each data group, and the aggregated data is generated. After generating the aggregated data, the LNB model is applied to the aggregated data, and the abnormal nodes are identified based on the posterior probability function. The performance of the proposed FLBS system is evaluated using the KDD Cup 99 data and the comparative analysis is performed by the existing methods for the evaluation metrics accuracy and false acceptance rate (FAR). From the experimental results, it can be shown that the proposed system has the maximum performance, which shows the effectiveness of the proposed system in the intrusion detection.展开更多
Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, ...Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, it is necessary to verify data integrity to properly respond to an adversary's ill-intentioned data modification. In sensor network environment, the data integrity verification method verifies the final data only, requesting multiple communications. An energy-efficient private information retrieval(PIR)-based data integrity verification method is proposed. Because the proposed method verifies the integrity of data between parent and child nodes, it is more efficient than the existing method which verifies data integrity after receiving data from the entire network or in a cluster. Since the number of messages for verification is reduced, in addition, energy could be used more efficiently. Lastly, the excellence of the proposed method is verified through performance evaluation.展开更多
Heterogeneous wireless access technologies will coexist in next generation wireless networks.These technologies form integrated networks,and these networks support multiple services with high quality level.Various acc...Heterogeneous wireless access technologies will coexist in next generation wireless networks.These technologies form integrated networks,and these networks support multiple services with high quality level.Various access technologies allow users to select the best available access network to meet the requirements of each type of communication service.Being always best connected anytime and anywhere is a major concern in a heterogeneous wireless networks environment.Always best connected enables network selection mechanisms to keep mobile users always connected to the best network.We present an overview of the network selection and prediction problems and challenges.In addition,we discuss a comprehensive classification of related theoretic approaches,and also study the integration between these methods,finding the best solution of network selection and prediction problems.The optimal solution can fulfill the requirements of the next generation wireless networks.展开更多
Unmanned aerial vehicle(UAV)was introduced as a novel traffic device to collect road traffic information and its cruise route planning problem was considered.Firstly,a multi-objective optimization model was proposed a...Unmanned aerial vehicle(UAV)was introduced as a novel traffic device to collect road traffic information and its cruise route planning problem was considered.Firstly,a multi-objective optimization model was proposed aiming at minimizing the total cruise distance and the number of UAVs used,which used UAV maximum cruise distance,the number of UAVs available and time window of each monitored target as constraints.Then,a novel multi-objective evolutionary algorithm was proposed.Next,a case study with three time window scenarios was implemented.The results show that both the total cruise distance and the number of UAVs used continue to increase with the time window constraint becoming narrower.Compared with the initial optimal solutions,the optimal total cruise distance and the number of UAVs used fall by an average of 30.93% and 31.74%,respectively.Finally,some concerns using UAV to collect road traffic information were discussed.展开更多
Network coding is proved to have advantages in both wireline and wireless networks. Especially, appropriate network coding schemes are programmed for underlined networks. Considering the feature of strong node mobilit...Network coding is proved to have advantages in both wireline and wireless networks. Especially, appropriate network coding schemes are programmed for underlined networks. Considering the feature of strong node mobility in aviation communication networks, a hop-by-hop network coding algorithm based on ad hoc networks was proposed. Compared with COPE-like network coding algorithms, the proposed algorithm does not require overhearing from other nodes, which meets confidentiality requirements of aviation communication networks. Meanwhile, it does save resource consumption and promise less processing delay. To analyze the performance of the network coding algorithm in scalable networks with different traffic models, a typical network was built in a network simulator, through which receiving accuracy rate and receiving delay were both examined.The simulation results indicate that, by virtue of network coding, the proposed algorithm works well and improves performance significantly. More specifically, it has better performance in enhancing receiving accuracy rate and reducing receiving delay, as compared with any of the traditional networks without coding. It was applied to both symmetric and asymmetric traffic flows and, in particular, it achieves much better performance when the network scale becomes larger. Therefore, this algorithm has great potentials in large-scale multi-hop aviation communication networks.展开更多
文摘无通信前提下,直流微电网中储能单元常用的控制策略难以实现储能荷电状态(state of charge,SOC)均衡、最大化新能源利用率和母线电压支撑三方面的平衡控制,提出一种基于荷电状态的直流微电网中多储能单元分级运行控制方法。首先,考虑微电网多运行状态下对储能单元的不同需求,将储能单元状态划分为5种工作模式,且各模式的电压区间是根据SOC动态调节的。利用直流母线电压信号作为工作模式判据,各储能单元根据SOC大小投入充放电,实现分级运行。随后,功率调节控制根据储能单元各模式的电压区间自动调整下垂曲线,使投入运行的储能单元间根据SOC合理分配功率。最后,搭建了Matlab/Simulink仿真模型,仿真结果表明所提控制策略在无通信条件下可实现各储能单元SOC均衡,并且能够实现与其他源储单元协调运行,以最大化新能源利用率,避免了工作模式切换过程中母线电压大幅波动,证明了所提控制策略的可行性和有效性。
文摘The main objective of multiuser orthogonal frequency division multiple access(MU-OFDM) is to maximize the total system capacity in wireless communication systems. Thus, the problem in MU-OFDM system is the adaptive allocation of the resources(subcarriers, bits and power) to different users subject to several restrictions to maximize the total system capacity. In this work, a proposed subcarrier allocation algorithm was presented to assign the subcarriers with highest channel gain to the users. After the subcarrier allocation, subcarrier gain-based power allocation(SGPA) was employed for power and bit loading. The simulation results show that the proposed subcarrier-power allocation scheme can achieve high total system capacity and good fairness in allocating the resources to the users with slightly high computational complexity compared to the existing subcarrier allocation algorithms.
文摘An important problem in wireless communication networks (WCNs) is that they have a minimum number of resources, which leads to high-security threats. An approach to find and detect the attacks is the intrusion detection system (IDS). In this paper, the fuzzy lion Bayes system (FLBS) is proposed for intrusion detection mechanism. Initially, the data set is grouped into a number of clusters by the fuzzy clustering algorithm. Here, the Naive Bayes classifier is integrated with the lion optimization algorithm and the new lion naive Bayes (LNB) is created for optimally generating the probability measures. Then, the LNB model is applied to each data group, and the aggregated data is generated. After generating the aggregated data, the LNB model is applied to the aggregated data, and the abnormal nodes are identified based on the posterior probability function. The performance of the proposed FLBS system is evaluated using the KDD Cup 99 data and the comparative analysis is performed by the existing methods for the evaluation metrics accuracy and false acceptance rate (FAR). From the experimental results, it can be shown that the proposed system has the maximum performance, which shows the effectiveness of the proposed system in the intrusion detection.
基金supported by the Sharing and Diffusion of National R&D Outcome funded by the Korea Institute of Science and Technology Information
文摘Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, it is necessary to verify data integrity to properly respond to an adversary's ill-intentioned data modification. In sensor network environment, the data integrity verification method verifies the final data only, requesting multiple communications. An energy-efficient private information retrieval(PIR)-based data integrity verification method is proposed. Because the proposed method verifies the integrity of data between parent and child nodes, it is more efficient than the existing method which verifies data integrity after receiving data from the entire network or in a cluster. Since the number of messages for verification is reduced, in addition, energy could be used more efficiently. Lastly, the excellence of the proposed method is verified through performance evaluation.
基金funded by the University of Malaya, under Grant No.RG208-11AFR
文摘Heterogeneous wireless access technologies will coexist in next generation wireless networks.These technologies form integrated networks,and these networks support multiple services with high quality level.Various access technologies allow users to select the best available access network to meet the requirements of each type of communication service.Being always best connected anytime and anywhere is a major concern in a heterogeneous wireless networks environment.Always best connected enables network selection mechanisms to keep mobile users always connected to the best network.We present an overview of the network selection and prediction problems and challenges.In addition,we discuss a comprehensive classification of related theoretic approaches,and also study the integration between these methods,finding the best solution of network selection and prediction problems.The optimal solution can fulfill the requirements of the next generation wireless networks.
基金Project(2009AA11Z220)supported by the National High Technology Research and Development Program of China
文摘Unmanned aerial vehicle(UAV)was introduced as a novel traffic device to collect road traffic information and its cruise route planning problem was considered.Firstly,a multi-objective optimization model was proposed aiming at minimizing the total cruise distance and the number of UAVs used,which used UAV maximum cruise distance,the number of UAVs available and time window of each monitored target as constraints.Then,a novel multi-objective evolutionary algorithm was proposed.Next,a case study with three time window scenarios was implemented.The results show that both the total cruise distance and the number of UAVs used continue to increase with the time window constraint becoming narrower.Compared with the initial optimal solutions,the optimal total cruise distance and the number of UAVs used fall by an average of 30.93% and 31.74%,respectively.Finally,some concerns using UAV to collect road traffic information were discussed.
基金Project(61175110)supported by the National Natural Science Foundation of ChinaProject(2012CB316305)supported by National Basic Research Program of ChinaProject(2011ZX02101-004)supported by National S&T Major Projects of China
文摘Network coding is proved to have advantages in both wireline and wireless networks. Especially, appropriate network coding schemes are programmed for underlined networks. Considering the feature of strong node mobility in aviation communication networks, a hop-by-hop network coding algorithm based on ad hoc networks was proposed. Compared with COPE-like network coding algorithms, the proposed algorithm does not require overhearing from other nodes, which meets confidentiality requirements of aviation communication networks. Meanwhile, it does save resource consumption and promise less processing delay. To analyze the performance of the network coding algorithm in scalable networks with different traffic models, a typical network was built in a network simulator, through which receiving accuracy rate and receiving delay were both examined.The simulation results indicate that, by virtue of network coding, the proposed algorithm works well and improves performance significantly. More specifically, it has better performance in enhancing receiving accuracy rate and reducing receiving delay, as compared with any of the traditional networks without coding. It was applied to both symmetric and asymmetric traffic flows and, in particular, it achieves much better performance when the network scale becomes larger. Therefore, this algorithm has great potentials in large-scale multi-hop aviation communication networks.