SIWN Abstracts Index
An Extended Dual Concern Model for Partner Selection in Multi-Agent Systems
Fenghui Ren, Minjie Zhang and Jun Yan
Systemics and Informatics World Network, Vol. 11, August 2010, pp. 1-9
Abstract: Traditional negotiation approaches pay intensive attention to decision making models in order to reach optimal agreements, while placing insufficient efforts on the problem of partner selection. In open and dynamic environments, when the number of potential partners is huge, it may be expensive or even impractical to perform complicated negotiations with all of potential partners. Therefore, the partner selection mechanism is required to filter unsatisfied partners in advance in order to improve the efficiency. In this paper, an extended dual concern model for partners selection in negotiation is proposed. By employing three proposed critical factors GainRatio, ContributionRatio and ReliantDegree, agents can select partners by considering both themselves and their potential partners. The proposed approach has three merits (1) Both agents’ own benefits and the potential partners’ benefits are considered and balanced during the partner selection process; (2) By employing the extended dual concern model, agents can modify their attitudes to each potential partner easily; and (3) the partners selection criteria is generated according to agents’ personalities, thus the results will accord with agents’ expectation very well.
Keywords: multi-agent system, negotiation, partner selection.
An Improved Hybrid Alarm Correlation Analysis Scheme for SDH Networks
In-Soo Lee, Do-Hyeun Kim, You-Ze Cho, Sung-Hyup Lee and Yang-Moon Yoon
Systemics and Informatics World Network, Vol. 11, August 2010, pp. 10-20
Abstract: While numerous fault alarms occur in SDH (Synchronous Digital Hierarchy) transmission networks, only a small number are actually directly related to the original fault, allowing the distinctive classification of original alarms and derived alarms. Accordingly, this paper presents a new alarm correlation analysis scheme for extracting original fault alarms. The proposed scheme combines a rule-based correlation analysis and codebook based on the pattern of common alarm generation features. In addition, to minimize the extraction complexity further, a correlation grouping method is applied using a family composition mechanism for alarms in end-to-end circuits. Finally, a prototype of the proposed hybrid alarm correlation scheme is developed for an SDH transmission network.
Keywords: rule-based correlation, codebook based correlation, alarm correlation analysis, SDH Networks.
Posterior Cramer-Rao Bound for Collaborative Multi-Sensor Tracking in Wireless Sensor Networks
Xinrong Li and Jue Yang
Systemics and Informatics World Network, Vol. 11, August 2010, pp. 21-31
Abstract: Sensing data without knowing sensors’ location is meaningless. Thus, sensor localization is an important research issue in wireless sensor networks. In many applications, sensor devices can be mobile so that sensors’ location needs to be estimated continuously, which necessitates design of suitable tracking algorithms for sensor networks. In sensor networks, individual nodes have severely limited resources. Thus, collaboration of a large number of resource-constrained, unreliable sensor nodes is extremely important to achieving substantial sensing and processing capability in the aggregate and to providing collectively reliable network behavior in mission-critical applications. In this paper, we propose a collaborative multi-sensor tracking paradigm in sensor networks and demonstrate that sensors’ mobility, together with collaboration among sensor nodes, can be exploited to significantly improve sensor localization performance. In this paper, we focus on performance lower bound analysis of the proposed method. The benefits of the proposed collaborative multi-sensor tracking methodology as compared with the existing localization and tracking methods are studied through numerical results of the posterior Cramer-Rao bound.
Keywords: Bayesian estimation, collaborative signal processing, multi-sensor tracking, posterior Cramer-Rao bound (PCRB), wireless sensor networks.
Link Maintenance and Compensation for Cognitive UWB Radio Systems
Jin Tian and Guangguo Bi
Systemics and Informatics World Network, Vol. 11, August 2010, pp. 32-40
Abstract: The paper puts forward a new model of link maintenance and compensation for cognitive UWB (ultra-wideband) radio systems. In this model, the link maintenance is combined with change of modulation method. Performance analysis conducted for this model shows that Cognitive UWB supports sub-carriers selection model of band with 528 MHz wide, and primary users appearance affects goodput through channel processes. The retransmission of last data and the change of modulation method enhance the robustness against primary users interference, and compensate to data corruption due to primary users interference.
Keywords: cognitive radio, link compensation, link maintenance, UWB.
mobiWSC: A Mobile Agent Based Broker for Web Service Composition
Zhuzhong Qian, Sanglu Lu and Li Xie
Systemics and Informatics World Network, Vol. 11, August 2010, pp. 41-50
Abstract: Currently composite web services have been applied in various environments. However, the execution of a composite service supported by prevailing WSC engines needs a central peer to coordinate the available services and all the data transfers are through the center. This kind of centralized approach is not suitable in a pervasive environment, because of bandwidth and relatively unstable connection. This paper presents a mobile agent based broker mobiWSC to achieve WSC tasks which is a decentralized approach without a physical central peer, so that it can effectively reduce the data transmission. And for the autonomy of agent, it can achieve composite services in unreliable environments. This paper focuses on the architecture, lifecycle and communication mechanism of mobile agents that achieve composite service effectively.
Keywords: web service composition, orchestration, mobile agent.
Improved Tradeoff-Based Models of the Internet
Anthony Spatharis, Ilias Foudalis, Minas Gjoka, Panagiota Krouska, Christos Amanatidis, Christos Papadimitriou and Martha Sideri
Systemics and Informatics World Network, Vol. 11, August 2010, pp. 51-59
Abstract: This paper introduces and evaluates several new models of the Internet graph, inspired by the model proposed by Fabrikant, Koutsoupias, and Papadimitriou (FKP), in which connections are chosen based on a tradeoff between a geometric objective and a topology objective. For each new node, the proposed models add at least two edges which optimize in addition to the original tradeoff, secondary criteria such as path independence, and then proceed to add, with some small probability, a new edge from the receiving node. In another version of the model, new edges can be added only to certain nodes, which are designated as fertile, an attribute that changes dynamically. These models are evaluated by comparing them to the real Internet AS graph (or network, interchangeably) with respect to a suite of many test parameters (such as power law exponent and local clustering rank) proposed in the literature.
Keywords: Internet topology, multi-objective optimization, power-law, scale-free graphs, network modeling and simulation, complex networks.
Programming Self-Adaptive Multi-Agent Systems
Xinjun Mao, Menggao Dong, Yi Guo and Huaimin Wang
Systemics and Informatics World Network, Vol. 11, August 2010, pp. 60-68
Abstract: This paper presents an adaptive mechanism and programming language to construct adaptive multi-agent systems. Our approach is based on organization metaphor and the self-adaptation of agent is captured as the changes of roles that agent plays in MAS organization by executing four atomic adaptation operations: “join”, “quit”, “activate” and “deactivate”. A programming language called SADL is proposed to describe the adaptive strategies, which enables to isolate the functional behaviors from adaptation behaviors of agents in order to separate concerns and simplify the development and maintenance of adaptive software. The technical details to develop adaptive MAS are introduced and a case is studied to illustrate our approach.
Keywords: self-adaptation, multi-agent system, programming language.
Local Registry-Based Approach for Binding Optimization of Web Services
Jaber Kouki, Walid Chainbi and Khaled Ghedira
Systemics and Informatics World Network, Vol. 11, August 2010, pp. 69-76
Abstract: As Web services have become a promising solution to reduce the cost of business activities, the number of Web services increased substantially and so the number of providers and their own business registries. As a result, accessing disparate registries and invocating Web services consume time and efforts. Then the repeated access to the same read-only Web service with the same request data may often produce the same response from the provider’s registry which can be considered a useless work. To deal with the drawbacks of the current Web service architectures in regard to the time wasted in accessing Web services we propose a local registry-based approach to speed up the access process when looking for a frequently invoked Web service.
Keywords: proprietary business registry, UDDI, Web service.
Self-Organizing Functions and Their Coordination in Self-Organizing Communication Networks
Haitao Tang and Seppo Hämäläinen
Systemics and Informatics World Network, Vol. 11, August 2010, pp. 77-86
Abstract: This paper investigates the automatic functions of self-organizing networks. It identifies the potential conflicts between the different instances of these functions. It also analyzes the different alternatives to solve the conflicts and, proposes to solve them with a scalable and future-proof approach where a separate coordination function is designed to tackle those potential conflicts. The experiments are made on the proposed approach where three self-organizing functions and a human operator are involved. The initial results show the proposed approach meets all the requirements on self-organizing networks and, it solves the potential conflicts that could appear if not coordinated properly.
Keywords: conflict, coordination, self-organizing network, network automation, network management.
Cohesion and Complex Systems Structure
Horacio Paggi, Fernando Alonso Amo and José Crespo
Systemics and Informatics World Network, Vol. 11, August 2010, pp. 87-95
Abstract: In the self-organizing complex dynamical systems that form holarchies, the decisions (or reactions) of their components (constituents) sometimes are crucial because they may involve the proper existence of the system. Additionally, in the real world, these components are immersed in highly complex environments of which have an incomplete or inadequate knowledge and they can’t be completely consistent about their preferences and their beliefs, can show a bounded rationality, etc. All these circumstances affect the way in which the components not only behave, but also emerge and disappear. In this work the necessary and sufficient conditions previously given for the holons formation are reviewed in the light of these facts using for the uncertainty/randomness handling the fuzzy probabilities theory (thus modeling the decision making process through the fuzzy decision making under risk theory), and, from these conditions, the concept of holon cohesion is derived and introduced as a generalization of the reliability of a system.
Keywords: emergence conditions, fuzzy probabilities, holon, holon cohesion, informon, self-organization
Yong Mei Ding, Dong Guo Shao and Gu Li Na
Systemics and Informatics World Network, Vol. 11, August 2010, pp. 96-100
Abstract: In order to achieve sustainable development and a secure society, institutions and methodologies for resources allocation should be reformed. Based on information economics and game theory, an optimal allocation of resources via market mechanism is established in this paper. Furthermore, the mechanism meets the maximum benefit of the whole society.
Keywords: optimal allocation of resources; market mechanism; direct mechanism
IoT: System Model, Architecture and Technologies
Ya-Lai Zhao, Jie Ma, Rong Chai, Qian-Bin Chen and Qing Jiang
Systemics and Informatics World Network, Vol. 11, August 2010, pp. 101-110
Abstract: In recent years, Internet of Things with ubiquitous coverage area and low transmission power is quickly emerging into the wireless communication market. While some simple IoT applications have been realized worldwide, there are still many open issues. The architecture is undetermined and some core technologies of the system are still under discussion. In this paper, IoT is classified as RFID-based and Ad-hoc based system. The system model and workflow of both classes are described. Based on the system model, three-layer architecture of IoT is introduced and the functions and core technologies of each layer are addressed.
Keywords: IoT, system architecture, RFID, application layer, network layer, sensor layer.
Simulation and Analysis of the Shielding Effectiveness of the PoE Hub with Redundancy
Wei Fu, Ya-Chao Zhang, Pei He, Chao Gan and Jun Zhang
Systemics and Informatics World Network, Vol. 11, August 2010, pp. 111-117
Abstract: This paper will demonstrate the design and optimization of the PoE (Power over Ethernet) Hub with redundancy, and by analyzing and simulating the EMC (Electro Magnetic Compatibility) performance of Hub by the simulation tools at the beginning of the design, we can get the conclusion that: in the course of designing the electronic products, there are two viable solutions to avoid electromagnetic interference, that is to consider the EMC in the early design of the products, and make use of relevant simulation tools to simulate and then improve the design according to the simulation results, or to solve EMI (Electro Magnetic Interference) problems at a high price after the design is completed.
Keywords: redundancy, PoE-Hub, shielding effectiveness.
Dynamic Services T-Criteria Based on Context Resources in the Internet of Things
Jianhua Liu and Weiqin Tong
Systemics and Informatics World Network, Vol. 11, August 2010, pp. 118-126
Abstract: Radio Frequency Identification (RFID) and pervasive computing have rapidly emerged and affirmed respectively as the paradigm for the Internet of Things. however, One of the critical issues in mobile service access is the usage of limited resources of mobile devices. As a matter of fact, RFID systems and mobile devices must be cost-effective. This imposes strict requirements on the resource consumption of their applications. The participation of services in a composite service is based on several selection criteria such as the execution time of a service and the battery energy of the resources on which a service will be performed. This paper presents a middleware for IoT applications with T-Criteria. It consists of a set of basic services that aim to enhance IoT environments with mechanisms for: (i) integrating mobile devices to read tag data; (ii) providing RFID context resources awareness; and, (iii) handling mobile users’ sessions.
Keywords: HIO context, Internet of Things, resource constraint, T-Criteria, RFID middleware.
Distributed Complex Event Processing for RFID Data Streams
Xiangwei Sun, Rong Chen and Hong Yang
Systemics and Informatics World Network, Vol. 11, August 2010, pp. 127-136
Abstract: RFID data are temporal, redundant, streaming, correlated, and have to be processed just-in-time. Nowadays, RFID data streams pose many new challenges for data processing and management. Complex Event Processing technology is a promising technique rooted in active databases that transforms raw RFID data into meaningful logical events. This paper works on the detection of composite events of various types that can be distributed throughout the system. To do so, we propose a generic distributed framework of composite event detection, and each event detector has implemented tree-based detection algorithms that cope with event patterns in a declarative language motivated by Wang et al.. Based on a rich time model and support for non-spontaneous events, it provides a decomposable language for defining composite evens over RFID data streams. We also discuss the issues associated with automatic distribution of composite event expressions. Finally, tests of our proposed event system show reduced bandwidth consumption and good performance of event detection.
Keywords: RFID data management, complex event processing, composite events, distributed systems.
Federated Reference Model Architecture: An Autonomic Approach for Service Management
Martín Serrano, Sven van der Meer, Viliam Holub, John Murphy and John Strassner
Systemics and Informatics World Network, Vol. 11, August 2010, pp. 137-150
Abstract: In Autonomic Computing complexity and scalability have been topics for intensive research activity towards accessorize service compatibility and transparent heterogeneous infrastructure interaction. In Autonomic Computing free exchange of information between enterprise applications and networking systems is critical to support multiple personalized services, accessorize diversity on end-user applications and enable heterogeneous infrastructures to optimize communication network performance. In these autonomic complex scenarios, where information exchange supporting service and network management is necessary, the federation emerges as mechanism to coordinate the exchange of information between independent applications with the same common objective but with different policies and regulations. In this paper a federated architecture approach highlighting flexibility of Autonomic Computing systems to support information interoperability and enabling federated management services is introduced. Federation acts as the orchestration mechanism coordinating and harmonizing differences in data and information between service operation, management of heterogeneous networks, and application management communication systems. As part of the proposed architecture approach the Federated Reference Model is used to accessorize service and network management operations in communication services. Semantic techniques are used to represent networking information governing technology and/or network protocols offering a wide diversity of management services as a result of federated service operations.
Keywords: AC/OC architectures and systems, autonomic elements, middleware, service management, federation, semantic modeling and management, knowledge engineering, networking data and ontologies, future communications and internet.
An Agent-Based Dynamic Integration and Adaptive Evolving Model in Software Development
Qingshan Li, Weihua Sun, Lili Guo, Haishun Yun and He Liu
Systemics and Informatics World Network, Vol. 11, August 2010, pp. 151-161
Abstract: With the development of Internetware technology, evolution of software systems is supposed to adapt to an open, dynamic environment and changing requirements. To provide a dynamic integration and adaptive evolving of information system, the agent technology is introduced in this paper and thus a framework model of agent-based system integration is proposed. With the mechanism of agent dynamic discovery, all the agents can be discovered and started dynamically. In addition, the improved contract net protocol is also proposed to support dynamic integration in the dynamically changing environments, through which the agents negotiate to find contractors by tendering and bidding. Moreover, dynamic switch of system integration logic is implemented based on the technology of script control integration. In conclusion, an adaptive evolution with the changing integration requirements during system operation is generated in this paper. Furthermore, its functionality and performance are evaluated and demonstrated through a group of systematic experiments.
Keywords: agent, dynamic integration, multi-agent system, software evolution, software development.
The Emergent Properties of Internet: A Survey
Hong Tang, Rongnan Liao and Lu Wang
Systemics and Informatics World Network, Vol. 11, August 2010, pp. 162-168
Abstract: Internet is a global network, which is composed of interconnecting computers distributed all over the world. For many years, people try to understand its properties which emerge during its operation and evolution because it is very important for network planning, management and security. Furthermore, it is also a key point to develop the new network protocols and applications. Therefore, the emergent property of Internet behaviors is becoming a hot researching topic. In this paper, we abstract the Internet as a three-layer network model and summarize the emergent properties in each layer. The analyzing results show there are similar emergent properties in different layers.
Keywords: Internet, user network layer, application network layer, transport network layer, emergent property.
Joint Sensing Time and Power Allocation in Cognitive Networks with Amplify-and-Forward Cooperation
Chengshi Zhao, Bin Shen, Taiping Cui, Kyungsup Kwak and Dapeng Wu
Systemics and Informatics World Network, Vol. 11, August 2010, pp. 169-177
Abstract: Cognitive radio (CR) is observed as a novel approach to cope with the spectrum scarcity, in which either a network or a wireless node changes its transmission or reception parameters to communicate efficiently avoiding interference with licensed or unlicensed users. Cooperative communications has been used to achieve diversity gain through partners to create multiple independent fading channels. In this paper, the jointly optimal allocation of sensing time and power for a two-user amplify-and-forward (AF) cognitive network is developed by maximizing the averaged aggregate throughput of the secondary network. In particular, by assuming two different cooperation cases (one is that two nodes are with the same cooperation ratio and another is that two nodes are with the different cooperation ratios), the proposed joint optimization problem is discussed in these two cases sequentially; considering that the sensing duration lies within a strict interval, the sensing time and the power are proved to be tractable by sequential optimization. The simulation results demonstrate that the sequential optimization is able to seize the globe optimal value perfectly.
Keywords: cognitive radio (CR), spectrum sensing, power allocation, amplify-andforward (AF) relaying, cooperative communications, optimization.
The Effect of Reliability on Various MANETs Routing Algorithms
Tariq Abu Hilal, Hasan Abu Hilal and Hussein Al-Bahadili
Systemics and Informatics World Network, Vol. 11, August 2010, pp. 178-183
Abstract: In this paper, we investigate the node reliability and evaluate the effect of Mobile Ad-Hoc networks routing protocols, a degree of reliability is given to every node, based on the Retransmission rate (RET), and Reachability (RCH). The obtained results clearly demonstrates an enhancement in the RET and RCH of the system for the pure and LAR 1 algorithms.
Keywords: DSR, MPR, location aided routing, flooding, MANETs, MANsim.
A Small Dual-Band Monopole Antenna for WLAN Applications
Xiao-Yu Wan, Hong-Sha Ding and Zi-Fu Fan
Systemics and Informatics World Network, Vol. 11, August 2010, pp. 184-190
Abstract: A small wireless local area network (WLAN) dual-band monopole antenna is presented. The antenna is fed with a 50Ω microstrip line and printed on a PTFE substrate (14mm﹡33mm) with height h=0.8mm and relative permittivity εr=2.5. The measured -10 dB return loss (VSWR ≤2) bandwidth for the 2.4-GHz band is 0.19GHz (2.34–2.53GHz) and it covers the bandwidth required for 2.4 GHz WLAN bands. The 5.2/5.80-GHz band has a bandwidth of 1.39GHz (4.66–6.05 GHz) covering 5.2/5.8 GHz WLAN bands. The antenna exhibits omni-directional radiation coverage with a moderate gain in the entire operation bands. Experimental result is compared with the simulated result, and good agreement between them is observed.
Keywords: dual-band, WLAN, microstrip feed, antenna.
Design and Implementation of Handover Process in LTE System
Caixiang Wang, Tangdi Zhang and Xiaowen Li
Systemics and Informatics World Network, Vol. 11, August 2010, pp. 191-198
Abstract: In this paper the process of handover in LTE system is designed, which based on the latest Technical Specification issued by 3GPP. The structure of air interface protocol stack in LTE radio access network and steps of protocol development are introduced. The handover process in RRC sub-layer is the focus point of this work. In the final part, a scheme is proposed according to the standard for implementing the handover process of the specific protocol in LTE system.
Keywords: LTE system, handover process, protocol stack, RRC sub-layer.
Analysis of Pareto Distribution on Delay Performance in Networks
Systemics and Informatics World Network, Vol. 11, August 2010, pp. 199-212
Abstract: Significant research on the impact of Self Similar traffic on network performance has been conducted in the past. Recently the impact of such traffic patterns has also been studied with respect to Wireless LANs. This paper studies the behavior of a truncated Pareto distribution on the delay performance of networks. In particular, the impact of varying the coefficient of variation of arrival and service times using a Pareto distribution is studied. The analysis is first carried out for a single server queue and then extended to a Wireless LAN with single and multihop scenarios. Simulations are carried out using the QualNet simulator. Simulation results are also compared with theoretical results for the single node case. The results give some useful insights into the behavior of delays in networks with Pareto traffic distribution.
Keywords: coefficients of variation analysis, wireless LAN, self similar traffic, performance analysis, Pareto distribution, QualNet, network simulation.
Copyright © 2010 Systemics and Informatics World Network