The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we present a distributed fault detection algorithm based on k-means clustering for WSN. The nodes within a cluster are divided into three sub-clustering according to their measurements' similarity. We conclude the sensor nodes' working state from the N recent states of sub-clustering, so as to detect, locate, and get rid of the fault nodes. Simulation results show that the k-means cluster...
In WSN, Clustering Routing Algorithm can effectively reduce network energy consumption and prolong network lifetime well. But existed Clustering Routing Algorithms are usually location-based, where data correlations are not considered. There is still data redundancy in the terminal. This paper proposes a data correlation-based virtual clustering approach. It integrates the advantages of clustering...
Coverage control is one of the most important technologies in Wireless Sensor Network (WSN). In the precondition of better coverage quality, how to format optimal coverage with least sensors is a significant problem to be solved. A new incomplete coverage control based on target tracking sensor network which called mobile-constrained optimal target tracking coverage algorithm (MCOTT) is presented...
Ontology evolution is the timely adaptation of ontologies to changing requirements, which is becoming more and more important as ontologies become widely used in different fields. This paper shows how to address the problem of evolving ontologies with less manual case-based reasoning using an automatic selection mechanism. An automatic ontology evolution strategy selection framework is presented that...
Traffic matrices are very essential for many network engineering tasks: for instance, load balancing, capacity planning, routing protocol configuration. However, measuring these traffic matrices directly is difficult and costly. Hence many methods have been proposed to estimate these traffic matrices based on link load measurements and other more easily available data. This paper presents an iterative...
Present operating management methods can not satisfy the emerging requirements along with the rapid development of the converged services. A novel management process defining approach for the converged services is presented, which aims at the management of the converged services. The approach proposes the convergence of eTOM and ITIL to build the management process framework, which is based on the...
Network traffic anomaly detection is an important component in network security and management domains which can help to improve availability and reliability of networks. This paper proposes a flow-based anomaly detection method with the help of entropy. Using IPFIX, flow records containing multiple traffic features are collected in each time window. With entropy, joint probability space for multiple...
With the development of high-speed networks, the challenge of effectively analyzing the massive data source for anomaly detection and diagnosis is yet to be resolved. This paper proposes a new flow-based anomaly detection method based on summary data structures and combinations of traffic features. Using IPFIX flow records as input, parallel sketches are established for chosen traffic features respectively...
Traffic matrices are essential for many traffic engineering tasks such as network management and capacity planning. However, it is difficult and cost to measure them accurately. The estimation of traffic matrix has usually been treated as a pure statistical inference problem. For example, infer the traffic matrix from the link load measurements and routing information. In practice, however, Internet...
This paper studies task allocation in cluster-based Wireless Sensor Network (WSN) using negotiation model. We study both the negotiation reasoning model and the negotiation protocol for task allocation to achieve energy efficiency while balancing nodes energy. Reasoning model determines the offer generate scheme and gives control over negotiation process. A time depending Boulware function is used...
Task allocation has been widely studied in high-performance computing environment. However, existing task allocation algorithms can not be directly applied to WSN because of the limited energy resources and computing capabilities of the Wireless Sensor Network (WSN). In this paper, we propose a new auction-based task allocation model for WSN and create an energy consumption based utility function...
Given the resource-constrained and distributed nature of Wireless Sensor Network (WSN), collaboration is very necessary for task execution. However traditional collaborative methods can not be applied to WSN directly. In this paper, we focus on coalition-based method of multi-nodes collaboration (CMMC) which is performed to achieve a maximum utility through collaboration while minimizing the communication...
In order to provide seamless communication service, cell overlap is necessary for radio access network. But too many cell overlaps lead the waste of network resource. To reduce the waste and hold the reasonable cell overlaps, a model named WAMRANEC (Wiggling Adjustment Model for Radio Access NEtwork Cell coverage) is shown. Firstly, three factors concerned coverage optimization are analyzed. Then...
Mobility Model for mobile users is an important part of simulation of the wireless mobile network's resource management and optimization. The Manhattan Mobility Model proposed by ETSI is highly versatile. However, its random direction selecting strategy lacks of objectives, which means the scene of hotspot attracting user mobility could not be simulated accurately. In order to simulate the user mobility...
Wireless Sensor Network (WSN) is fault-prone given the resource-constrained characteristic of sensors and harsh deployment environment. Failure of sensors may cause negative consequences on the considered applications. Therefore, WSN should be able to tolerate the failures of sensors and self-recover from fault to guarantee the service. However current studies mostly focus on fault diagnosis, and...
The communication environment of urban radio access network is complex and heterogeneous. In order to detect the coverage problem timely and reduce the cost by manual analysis, a self-detecting model for coverage problems in urban radio access network is proposed. Firstly, the coverage is estimated by cell-base-coverage estimation and terrain-base-coverage estimation. Then, the level for UE data collection...
Signaling interaction is necessary for the implementation of the Distributed Load Balancing (DLB) use case in LTE. The authors investigate typical DLB solutions' requirements for X2 application protocol (X2AP). This paper presents a general DLB procedure which contains three sub-procedures: “reporting”, “balancing”, and “adapting”. But X2AP can only support the “reporting” sub-procedure, ignoring...
Generally considered as a timely adaption of ontologies to the changing requirements, ontology evolution is becoming more and more crucial as ontologies being widely used in different fields, especially in the semantic web. In this paper, we intend to address the problem of multiple ontologies evolution. First we present an Automatic Ontology Evolution Strategy Selecting (AOESS) framework that could...
Home NodeB is a technology defined by 3GPP organization to realize a home area network. In the traditional structure of Home NodeB technology, one Home NodeB just has one single gateway to transmit each session, and hasn't taken the transmission quality into account. By improving the traditional structure of Home NodeB, this article proposes a new structure based on policy. This structure adds a new...
Self-configuration management of mobile ad-hoc networks (MANETs) depends upon the hierarchical architecture and topology change of the network. By analyzing role shift and behavior changes of nodes in the clustering-based MANETs, a self-configuration management model is proposed in this paper. In view of unpredictability of the node behavior, a cluster unit provides the auto-configuration mechanisms...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.