首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
W. Fan  K.H. Yeung 《Physica A》2011,390(2):189-197
Online social network services have attracted more and more users in recent years. So the security of social networks becomes a critical problem. In this paper, we propose a virus propagation model based on the application network of Facebook, which is the most popular among these social network service providers. We also study the virus propagation with an email virus model and compare the behaviors of a virus spreading on Facebook with the original email network. It is found that Facebook provides the same chance for a virus spreading while it gives a platform for application developers. And a virus will spread faster in the Facebook network if users of Facebook spend more time on it.  相似文献   

2.
The excellent reverse breakdown characteristics of Schottky barrier varactor(SBV) are crucially required for the application of high power and high efficiency multipliers. The SBV with a novel Schottky structure named metal–brim is fabricated and systemically evaluated. Compared with normal structure, the reverse breakdown voltage of the new type SBV improves from -7.31V to -8.75V. The simulation of the Schottky metal–brim SBV is also proposed. Three factors,namely distribution of leakage current, the electric field, and the area of space charge region are mostly concerned to explain the physical mechanism. Schottky metal–brim structure is a promising approach to improve the reverse breakdown voltage and reduce leakage current by eliminating the accumulation of charge at Schottky electrode edge.  相似文献   

3.
In this paper, we introduce a novel approach for power allocation in cellular networks. In our model, we use sigmoidal-like utility functions to represent different users’ modulation schemes. Each utility function is a representation of the probability of successfully transmitted packets per unit of power consumed by a user, when using a certain modulation scheme. We consider power allocation with utility proportional fairness policy, where the fairness among users is in utility percentage i.e. percentage of successfully transmitted packets of the corresponding modulation scheme. We formulate our power allocation optimization problem as a product of utilities of all users and prove that it is convex and therefore the optimal solution is tractable. We present a distributed algorithm to allocate base station powers optimally with priority given to users running lower modulation schemes while ensuring non-zero power allocation to users running higher modulation schemes. Our algorithm prevents fluctuation in the power allocation process and is capable of traffic and modulation dependent pricing policy. This can be used to flatten traffic and decrease the service price for users. We also compare our results with a benchmark algorithm and show that our algorithm performs better in allocating powers fairly to all users without dropping any user in order to maximize performance.  相似文献   

4.
高速空间激光通信系统在空天信息网中的应用   总被引:4,自引:0,他引:4       下载免费PDF全文
胡鹤飞  刘元安 《应用光学》2011,32(6):1270-1274
 针对高速空间激光通信系统应用时面临的主要问题:节点高速运动的跟踪瞄准和与组网载荷协同工作,提出将高速空间激光通信系统作为节点主要通信载荷的双通信载荷结构,并设计了高速空间激光通信系统与组网载荷协同工作机制和协议模型,依据协议模型进行了原理样机开发与试验。试验结果表明,提出的协同工作机制与协议模型能很好地适用于高速空间激光系统,支持超高速率数据传输,最高MAC层协议数据速率可达1.772 Gb/s,平均处理时延20 μs。  相似文献   

5.
In this paper, strategies to enhance the performance, in terms of available data-rate per user, energy efficiency, and spectral efficiency, of current digital subscriber lines (DSL) are proposed. In particular, a system wherein a group of copper wires is jointly processed at both ends of the communication link is considered. For such a scenario, a resource allocation scheme aimed at energy efficiency maximization is proposed, and, moreover, time–frequency packed modulation schemes are investigated for increased spectral efficiency. Results show that a joint processing of even a limited number of wires at both ends of the communication links brings remarkable performance improvements with respect to the case of individual point-to-point DSL connections; moreover, the considered solution does represent a viable means to increase, in the short term, the data-rate of the wired access network, without an intensive (and expensive) deployment of optical links.  相似文献   

6.
We consider the problem of interference management and resource allocation in a cognitive radio network (CRNs) where the licensed spectrum holders (primary users) share their spare capacity with the non-licensed spectrum holders (secondary users). Under such shared spectrum usage the transmissions of the secondary users should have a minimal impact on the quality of service (QoS) and the operating conditions of the primary users. Therefore, it is important to distinguish the two types of users, and formulate the problem of resource allocation considering hard restrictions on the user-perceived QoS (such as packet end-to-end delay and loss) and physical-layer channel characteristics (such as noise and interference) of the primary users. To achieve this goal, we propose to assign the bandwidth and transmission power to minimize the total buffer occupancy in the system subject to capacity constraints, queue stability constraints, and interference requirements of the primary users. We apply this approach for resource allocation in a CRN built upon a Third Generation Partnership Project (3GPP) long-term evolution (LTE) standard platform. Performance of the algorithm is evaluated using simulations in OPNET environment. The algorithm shows consistent performance improvement when compared with other relevant resource allocation techniques.  相似文献   

7.
 建立了激光触发SF6气体间隙开关的0维数值模型,数值计算结果与国内外实验进行了比较,计算的延迟时间与实验结果符合较好。在充气压力一定时,延迟时间随激光能量、工作电压比的增加而减小,并且延迟时间-工作电压比的曲线斜率也是随激光能量和工作电压比的增加而减小的。当激光能量一定时,延迟时间随充气压力的减小和电压的增加而减小, 并且不同充气压力的延迟时间随电压变化的曲线斜率是随电压的增加而减小的。但是,等电压压力比值情况下,延迟时间是随充气压力的增加而减小的。  相似文献   

8.
Motivated by current communication networks in which users can choose different transmission channels to operate and also by the recent growth of renewable energy sources, we study the average Age of Information of a status update system that is formed by two parallel homogeneous servers and such that there is an energy source that feeds the system following a random process. An update, after getting service, is delivered to the monitor if there is energy in a battery. However, if the battery is empty, the status update is lost. We allow preemption of updates in service and we assume Poisson generation times of status updates and exponential service times. We show that the average Age of Information can be characterized by solving a system with eight linear equations. Then, we show that, when the arrival rate to both servers is large, the average Age of Information is one divided by the sum of the service rates of the servers. We also perform a numerical analysis to compare the performance of our model with that of a single server with energy harvesting and to study in detail the aforementioned convergence result.  相似文献   

9.
The through silicon via (TSV) technology has proven to be the critical enabler to realize a three-dimensional (3D) gigscale system with higher performance but shorter interconnect length. However, the received digital signal after trans- mission through a TSV channel, composed of redistribution layers (RDLs), TSVs, and bumps, is degraded at a high data-rate due to the non-idealities of the channel. We propose the Chebyshev multisection transformers to reduce the signal reflec- tion of TSV channel when operating frequency goes up to 20 GHz, by which signal reflection coefficient ($11) and signal transmission coefficient ($21) are improved remarkably by 150% and 73.3%, respectively. Both the time delay and power dissipation are also reduced by 4% and 13.3%, respectively. The resistance-inductance-conductance-capacitance (RLGC) elements of the TSV channel are iterated from scattering (S)-parameters, and the proposed method of weakening the signal reflection is verified using high frequency simulator structure (HFSS) simulation software by Ansoft.  相似文献   

10.
Vehicular edge computing is a new computing paradigm. By introducing edge computing into the Internet of Vehicles (IoV), service providers are able to serve users with low-latency services, as edge computing deploys resources (e.g., computation, storage, and bandwidth) at the side close to the IoV users. When mobile nodes are moving and generating structured tasks, they can connect with the roadside units (RSUs) and then choose a proper time and several suitable Mobile Edge Computing (MEC) servers to offload the tasks. However, how to offload tasks in sequence efficiently is challenging. In response to this problem, in this paper, we propose a time-optimized, multi-task-offloading model adopting the principles of Optimal Stopping Theory (OST) with the objective of maximizing the probability of offloading to the optimal servers. When the server utilization is close to uniformly distributed, we propose another OST-based model with the objective of minimizing the total offloading delay. The proposed models are experimentally compared and evaluated with related OST models using simulated data sets and real data sets, and sensitivity analysis is performed. The results show that the proposed offloading models can be efficiently implemented in the mobile nodes and significantly reduce the total expected processing time of the tasks.  相似文献   

11.
杨小龙  谭学治  关凯 《物理学报》2015,64(10):108403-108403
针对认知无线电网络中认知用户广义传输时间的优化问题, 提出了一种基于抢占式续传优先权M/G/m排队理论的频谱切换模型. 在该排队模型中, 为了最小化认知用户广义传输时间, 采用混合排队-并列式服务的排队方式. 在此基础上, 深入分析多个认知用户、多个授权信道、多次频谱切换条件下认知用户信道使用情况, 从而推导出广义传输时间表达式. 最后探讨了该模型下自适应频谱切换策略. 仿真结果表明, 相比于已有的频谱切换模型, 该模型不仅能够更加完整地描述认知用户频谱切换行为, 而且使得认知用户传输时延更小, 广义传输时间更短. 此外, 认知无线电网络允许的认知用户服务强度增加, 能够容纳的认知用户数量增多. 因此, 该模型提升了认知用户频谱切换的性能, 更好地实现了认知用户与授权用户的频谱共享.  相似文献   

12.
邱琪 《光子学报》1998,27(6):549-552
本文详细描述了基于光信元(photoniccel)进行交换的光交换系统模型,讨论了光信元的帧结构方法,并完成了2×2LiNbO3光开关交换单元实验,其技术性能指标为:工作速率155Mb/s;消光比优于20dB;插入损耗小于5dB。  相似文献   

13.
In response to the rapid growth of credit-investigation data, data redundancy among credit-investigation agencies, privacy leakages of credit-investigation data subjects, and data security risks have been reported. This study proposes a privacy-protection scheme for a credit-investigation system based on blockchain technology, which realizes the secure sharing of credit-investigation data among multiple entities such as credit-investigation users, credit-investigation agencies, and cloud service providers. This scheme is based on blockchain technology to solve the problem of islanding of credit-investigation data and is based on zero-knowledge-proof technology, which works by submitting a proof to the smart contract to achieve anonymous identity authentication, ensuring that the identity privacy of credit-investigation users is not disclosed; this scheme is also based on searchable-symmetric-encryption technology to realize the retrieval of the ciphertext of the credit-investigation data. A security analysis showed that this scheme guarantees the confidentiality, the availability, the tamper-proofability, and the ciphertext searchability of credit-investigation data, as well as the fairness and anonymity of identity authentication in the credit-investigation data query. An efficiency analysis showed that, compared with similar identity-authentication schemes, the proof key of this scheme is smaller, and the verification time is shorter. Compared with similar ciphertext-retrieval schemes, the time for this scheme to generate indexes and trapdoors and return search results is significantly shorter.  相似文献   

14.
We model the Internet as a network of interconnected Autonomous Systems which self-organize under an absolute lack of centralized control. Our aim is to capture how the Internet evolves by reproducing the assembly that has led to its actual structure and, to this end, we propose a growing weighted network model driven by competition for resources and adaptation to maintain functionality in a demand and supply balance. On the demand side, we consider the environment, a pool of users which need to transfer information and ask for service. On the supply side, ASs compete to gain users, but to be able to provide service efficiently, they must adapt their bandwidth as a function of their size. Hence, the Internet is not modeled as an isolated system but the environment, in the form of a pool of users, is also a fundamental part which must be taken into account. ASs compete for users and big and small come up, so that not all ASs are identical. New connections between ASs are made or old ones are reinforced according to the adaptation needs. Thus, the evolution of the Internet can not be fully understood if just described as a technological isolated system. A socio-economic perspective must also be considered.  相似文献   

15.
We present a dynamical model for rewiring and attachment in bipartite networks. Edges are placed between nodes that belong to catalogs that can either be fixed in size or growing in size. The model is motivated by an empirical study of data from the video rental service Netflix, which invites its users to give ratings to the videos available in its catalog. We find that the distribution of the number of ratings given by users and that of the number of ratings received by videos both follow a power law with an exponential cutoff. We also examine the activity patterns of Netflix users and find bursts of intense video-rating activity followed by long periods of inactivity. We derive ordinary differential equations to model the acquisition of edges by the nodes over time and obtain the corresponding time-dependent degree distributions. We then compare our results with the Netflix data and find good agreement. We conclude with a discussion of how catalog models can be used to study systems in which agents are forced to choose, rate, or prioritize their interactions from a large set of options.  相似文献   

16.
In this paper, we propose an optimization framework to determine the distribution of power and bits/channel use to secondary users in a competitive cognitive radio networks. The objectives of the optimization framework are to minimize total transmission power, maximize total bits/channel use and also to maintain quality of service. An upper bound on probability of bit error and lower bound on bits/channel use requirement of secondary users are considered as quality of service. The optimization problem is also constrained by total power budget across channels for a user. Simulating the framework in a centralized manner shows that more transmit power is required to allocate in a channel with higher noise power. However, allocation of bits/channel use is directly proportional to signal to interference plus noise power ratio. The proposed framework is more capable of supporting high bits/channel use requirement than existing resource allocation framework. We also develop the game theoretic user based distributed approach of the proposed framework. We see that user based distributed solution also follows centralized solution.  相似文献   

17.
Vishav Jyoti 《Optik》2011,122(10):851-857
In this paper, two-dimensional (2D) wavelength/time codes are designed and implemented. The 2D codes are constructed by a technique based on folding of Golomb rulers. The performance evaluation of OCDMA system based on wavelength/time code has been analyzed by measuring the values of bit error rates and eye diagrams for different number of active users. It is shown that eye opening decreases and BER increases with increase in number of active users. It is also shown that BER further increases with increase in number of active users when number of decoders increases on receiver side. Hence, it is concluded that multiple access interference (MAI) is the dominant source of BER and there is graceful degradation in system performance when number of simultaneously active users increases. The received optical power is also measured at different transmission distance. It has been observed that received optical power decreases with increase in length of fiber due to attenuation.  相似文献   

18.
People in the Internet era have to cope with the information overload, striving to find what they are interested in, and usually face this situation by following a limited number of sources or friends that best match their interests. A recent line of research, namely adaptive social recommendation, has therefore emerged to optimize the information propagation in social networks and provide users with personalized recommendations. Validation of these methods by agent-based simulations often assumes that the tastes of users can be represented by binary vectors, with entries denoting users’ preferences. In this work we introduce a more realistic assumption that users’ tastes are modeled by multiple vectors. We show that within this framework the social recommendation process has a poor outcome. Accordingly, we design novel measures of users’ taste similarity that can substantially improve the precision of the recommender system. Finally, we discuss the issue of enhancing the recommendations’ diversity while preserving their accuracy.  相似文献   

19.
In this paper, three channel assignment models are proposed for channel resource allocation in femtocells. The models proposed are based on the Markov chain process. According to the access mechanisms in femtocells, the Third-Generation Partnership Project (3GPP) has described two kinds of users in the femtocell application; open users and the closed subscriber group (CSG). In hybrid access mechanism for femtocells, both CSG users and open users are usually referred as subscribers and non-subscribers respectively. So, in this work, for all the proposed models, the CSG and open users are categorized into two groups; the subscriber group (SG) and the non-subscriber group (NSG) respectively. The proposed models provide priority based channel resource allocation strategies between the SG and NSG. Furthermore, the focus of this research is to provide variable channel resource sharing among the SG and NSG to keep the wastage of channel resources minimum for better quality of service (QoS). The analysis is conducted in terms of channel resource blocking management for all the models and to validate the analysis, simulations are performed at the end of this paper. Further, channel resource blocking prediction, based on the blocking probability results for SG and NSG users, is also provided at the end. The prediction is done through risk analysis using the @ Risk tool. The simulations are provided in two parts; 1) the probability curves for SG and NSG against the total number of channels and 2) the risk analysis results for blocked channels prediction using the @ Risk tool.  相似文献   

20.
Objective: The purpose of the study was to clarify the causal effect of toe-grasping exercises on the improvement of static or dynamic balance ability in home-based rehabilitation users. Method: Our study included 34 subjects who met the criteria and were evaluable out of 98 rehabilitation service users at home nursing stations. This study was a randomized controlled trial. The intervention group performed towel gathering exercises in addition to the regular home-based rehabilitation program. The primary outcome was one-leg standing time, and the secondary outcomes were two-step test and toe grip strength. Results: Seventeen subjects were assigned to the intervention group and seventeen to the control group by block randomization. Data from 15 and 12 subjects in the intervention group and control group, respectively, who were able to complete the initial evaluation and the evaluation after 3 months, were analyzed. We compared the amount of change after 3 months of evaluation in the intervention group with the change in the control group. The results showed that the left/right mean value of oneleg standing time in the intervention group was significantly greater than that in the control group. In terms of the amount of change in the intervention period (T2-T1) within each assessment, there were significant improvements in both the toe-grip strength and the two-step values in the intervention group. Conclusion: We found that toe-grasping exercises could improve the balance ability of home-based rehabilitation users. This suggests the clinical significance of toe function in rehabilitation programs.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号