Current Issue : January-March Volume : 2023 Issue Number : 1 Articles : 5 Articles
Biological nanonetworks have been envisaged to be the most appropriate alternatives to classical electromagnetic nanonetworks for applications in biological environments. Due to the diffusional method of the message exchange process, transfer data rates are not proportional to their electromagnetic counterparts. In addition, the molecular channel has memory affecting the reception of a message, as the molecules from previously transmitted messages remain in the channel, affecting the number of information molecules that are required from a node to perceive a transmitted message. As a result, the ability of a node to receive a message is directly connected to the transmission rate from the transmitter. In this work, a learning automaton approach has been followed as a way to provide the receiver nodes with an algorithm that could firstly enhance their reception capability and secondly boost the performance of the transfer data rate between the biological communication parties. To this end, a complete set of simulation scenarios has been devised, simulating different distances between nodes and various input signal distributions. Most of the operational parameters, such as the speed of convergence for different numbers of ascension and descension steps and the number of information molecules per message, have been tested pertaining to the performance characteristics of the biological nanonetwork. The applied analysis revealed that the proposed protocol manages to adapt to the communication channel changes, such as the number of remaining information molecules, and can be successfully employed at nanoscale dimensions as a tool for pursuing an increased transfer data rate, even with time-variant channel characteristics....
Data storage and computation on cloud servers can handle many gigabytes of data, but their network traffic will also be heavy. Researchers have developed several models for predicting network traffic in order to reduce the communication pressure on cloud servers. However, the existing models are not accurate enough to be applied to the cloud server. To deal with this problem, a network traffic prediction model (NTPM) with the K-means optimization algorithm is presented in this paper, which clusters network traffic data from cloud servers by the K-means optimization algorithm, and then SVM is used to train the model. Our study shows that compared with a recent NTPM that predicted network traffic accurately, the proposed model provides better network traffic prediction and is better suited to cloud servers....
This paper focuses on the problem of protocol identification in the industrial internet and proposes an unknown protocol identification method. We first establish an industrial internet protocol detection model to classify known protocols, unknown protocols, and interference signals and then store the unknown protocols for manual analysis. Based on the Eps-neighborhood idea, we further develop an Eps-neighborhood hit algorithm and propose an identification method to identify unknown protocols, where the supervised learning classification of unknown protocol detection is realized. Finally, extensive experimental results are provided to illustrate our theoretical findings. It indicates that the proposed method has an average screening accuracy of 94.675% and 95.159% for unknown protocols encoded in binary and ASCII, respectively, while the average screening accuracy of known protocols in binary and ASCII encoding is 94.242% and 94.075%....
The complexity of software system has been increasing with software evolution, which affects the stability of software structure. Most of the existing measurement methods focus on the analysis of the macro-characteristics of the network topology, but lacked a certain depth and expansion to explore the nature of the complexity of the software structure, for this purpose, the complex network control theory was applied to the study of software network controllability. Firstly, the Source-Driver (SD) model was established based on the system control theory, the driver node sets were obtained by the minimum input theorem in the control process of software network topology; Then the relationship between the degree and center degree, the relationship between the in-degree and the out-degree of the software network topology were further analyzed owing to the non-uniqueness of the driver node sets; Finally, the values of the four indicators in the software system were compared. Experimental results show that the driver node sets in the software networks are mainly composed of nodes with low degree values, but it does not mean that the nodes whose in-degree values and out-degree values are also low; The action on control nodes and driver nodes are not random, the controllability of the driver nodes is closely related to the in-degree, when selecting the driver node sets, the network topology characteristics should be considered comprehensively, and the nodes with high degree and center degree are the first choice. The results have important guiding significance for the control, maintenance and redesign of software architecture....
In the Internet of things, many data transfer protocols are used for various tasks. In this article, we consider the application layer protocols that are the main ones for transmitting messages in the IoT. The main problems are unpredictability, lack of stability of data transmission delays, and non-determinism, which are also important for real-time systems. The purpose of this study is to determine the most appropriate middleware and data transfer protocol for systems with high data transfer requirements, including real-time systems. Therefore, MQTT, RTPS, JMS, and AMQP protocols were analyzed in order to find out what tasks these protocols should be used for and whether they can be used in robotic and autonomous systems where high data transmission requirements are imposed. To evaluate the protocols, the standards were analyzed to determine the pros and cons, and the software implementations of each of them were selected. To assess the characteristics of data transmission, we have developed our own test scenarios that simulate complex situations. The behavior of software solutions is analyzed and a comparative analysis is made based on the obtained data. Together, the theoretical analysis of protocols and the study of software solutions allow us to conclude on the applicability of a particular protocol in real-time systems. As a result of the study, we can conclude that RTPS is the best solution for real-time systems with different traffic and MQTTperforms well when transmitting short messages. But none of the protocols under consideration guarantees the determinism of data transmission, so it is better to use specialized link-layer protocols to obtain guarantees....
Loading....