Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Faculty of Engineering and Information Sciences - Papers: Part A

2013

Networks

Articles 1 - 15 of 15

Full-Text Articles in Social and Behavioral Sciences

A Model Of The Effects Of Authority On Consensus Formation In Adaptive Networks: Impact On Network Topology And Robustness, Brenton J. Prettejohn, Matthew J. Berryman, Mark D. Mcdonnell Jan 2013

A Model Of The Effects Of Authority On Consensus Formation In Adaptive Networks: Impact On Network Topology And Robustness, Brenton J. Prettejohn, Matthew J. Berryman, Mark D. Mcdonnell

Faculty of Engineering and Information Sciences - Papers: Part A

Opinions of individuals in real social networks are arguably strongly influenced by external determinants, such as the opinions of those perceived to have the highest levels of authority. In order to model this, we have extended an existing model of consensus formation in an adaptive network by the introduction of a parameter representing each agent's level of 'authority' based on their opinion relative to the overall opinion distribution. We found that introducing this model, along with a randomly varying opinion convergence factor, significantly impacts the final state of converged opinions and the number of interactions required to reach that state. …


A Multiagent Approach For Decentralized Voltage Regulation In Power Distribution Networks Within Dgs, Fenghui Ren, Minjie Zhang, Danny Sutanto Jan 2013

A Multiagent Approach For Decentralized Voltage Regulation In Power Distribution Networks Within Dgs, Fenghui Ren, Minjie Zhang, Danny Sutanto

Faculty of Engineering and Information Sciences - Papers: Part A

Voltage regulation (VR) is a procedure to keep voltages in a distribution network (DN) within normal limits. Conven- tionally, a voltage regulator can read voltage levels from pre- dened measures, and regulate the voltages. However, due to lacking of a distributed generator's (DG) information, the unexpected electricity from a DG will mislead readings on voltages levels, so as to disturb the VR in a DN. Adjust- ing a DG's reactive power output is an alternative way for VR. However, because of limited penetration levels, DGs need to collaborate with other devices in order to provide an eective voltage regulation. Therefore, …


A Sax-Based Advanced Computational Tool For Assessment Of Clustered Rooftop Solar Pv Impacts On Lv And Mv Networks In Smart Grid, M J. E Alam, K M. Muttaqi, D Sutanto Jan 2013

A Sax-Based Advanced Computational Tool For Assessment Of Clustered Rooftop Solar Pv Impacts On Lv And Mv Networks In Smart Grid, M J. E Alam, K M. Muttaqi, D Sutanto

Faculty of Engineering and Information Sciences - Papers: Part A

Future distribution networks with increasing level of solar PV penetration will be managed using smart grid technologies capable of producing appropriate and timely response during normal and abnormal operational events. Distribution feeder loads vary throughout the day according to the trend of consumption of the customers. Solar PV outputs fluctuate in proportion to irradiance level of sun. Simultaneous occurrence of both of these variations would result in various operating conditions that may lead to unexpected events, and would require a large amount of network data to be processed and analyzed for decision making. It is envisaged that such data will …


Security Analysis Of A Single Sign-On Mechanism For Distributed Computer Networks, Guilin Wang, Jiangshan Yu, Qi Xie Jan 2013

Security Analysis Of A Single Sign-On Mechanism For Distributed Computer Networks, Guilin Wang, Jiangshan Yu, Qi Xie

Faculty of Engineering and Information Sciences - Papers: Part A

Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential to be authenticated by multiple service providers in a distributed computer network. Recently, Chang and Lee proposed a new SSO scheme and claimed its security by providing well-organized security arguments. In this paper, however, we demonstrative that their scheme is actually insecure as it fails to meet credential privacy and soundness of authentication. Specifically, we present two impersonation attacks. The first attack allows a malicious service provider, who has successfully communicated with a legal user twice, to recover the user's credential and then …


A Three-Phase Power Flow Approach For Integrated 3-Wire Mv And 4-Wire Multigrounded Lv Networks With Rooftop Solar Pv, Md J E Alam, K M. Muttaqi, Darmawan Sutanto Jan 2013

A Three-Phase Power Flow Approach For Integrated 3-Wire Mv And 4-Wire Multigrounded Lv Networks With Rooftop Solar Pv, Md J E Alam, K M. Muttaqi, Darmawan Sutanto

Faculty of Engineering and Information Sciences - Papers: Part A

With increasing level of rooftop solar photovoltaic (PV) penetration into low voltage (LV) distribution networks, analysis with realistic network models is necessary for adequate capturing of network behavior. Traditional three-phase 3-wire power flow approach lacks the capability of exact analysis of 4-wire multigrounded LV networks due to the approximation of merging the neutral wire admittance into the phase wire admittances. Such an approximation may not be desirable when neutral wire and grounding effects need to be assessed, especially in the presence of single-phase solar power injection that may cause a significant level of network unbalance. This paper proposes a three-phase …


Efficiency And Equity Of Speed Limits In Transportation Networks, Shuaian Wang Jan 2013

Efficiency And Equity Of Speed Limits In Transportation Networks, Shuaian Wang

Faculty of Engineering and Information Sciences - Papers: Part A

This paper examines the impact of speed limits on network efficiency, in terms of total travel time of all road users, and equity among road users from different origin-destination (OD) pairs, in terms of the change of travel time after imposing a speed limit scheme. We find that after imposing a speed limit scheme, the total travel time of all road users may decrease or increase; road users of some OD pairs may experience longer travel time, while other OD pairs may have shorter travel time. In view of the importance of speed limits on network efficiency and equity, we …


Approximation Algorithm For Data Broadcasting In Duty Cycled Multi-Hop Wireless Networks, Dianbo Zhao, Kwan-Wu Chin Jan 2013

Approximation Algorithm For Data Broadcasting In Duty Cycled Multi-Hop Wireless Networks, Dianbo Zhao, Kwan-Wu Chin

Faculty of Engineering and Information Sciences - Papers: Part A

Broadcast is a fundamental operation in wireless networks. To this end, many past studies have studied the NP-hard, broadcast problem for always-on multi-hop networks. However, in wireless sensor networks, nodes are powered by batteries, meaning, they have finite energy. Consequently, nodes are required to have a low duty cycle, whereby they switch between active and sleep state periodically. This means that a transmission from a node may not reach all of its neighbors simultaneously. Consequently, any developed broadcast protocols must consider collisions and the wake-up times of neighboring nodes. Henceforth, this paper studies the minimum latency broadcast scheduling problem in …


Cost-Sensitive Cascade Graph Neural Networks, Nguyen Van Tuc, Ah Chung Tsoi, Markus Hagenbuchner Jan 2013

Cost-Sensitive Cascade Graph Neural Networks, Nguyen Van Tuc, Ah Chung Tsoi, Markus Hagenbuchner

Faculty of Engineering and Information Sciences - Papers: Part A

This paper introduces a novel cost sensitive weighted samples approach to a cascade of Graph Neural Networks for learning from imbalanced data in the graph structured input domain. This is shown to be very effective in addressing the effects of imbalanced data distribution on learning systems. The proposed idea is based on a weighting mechanism which forces the network to encode misclassified graphs (or nodes) more strongly. We evaluate the approach through an application to the well known Web spam detection problem, and demonstrate that the general-ization performance is improved as a result. Indeed the results obtained reported in this …


Security Analysis Of A Distributed Reprogramming Protocol For Wireless Sensor Networks, Yong Yu, Jianbing Ni, Ying Sun Jan 2013

Security Analysis Of A Distributed Reprogramming Protocol For Wireless Sensor Networks, Yong Yu, Jianbing Ni, Ying Sun

Faculty of Engineering and Information Sciences - Papers: Part A

Reprogramming for wireless sensor networks is essential to upload new code or to alter the functionality of existing code. To overcome the weakness of the centralized approach of the traditional solutions, He et al. proposed the notion of distributed reprogramming where multiple authorized network users are able to reprogram sensor nodes without involving the base station. They also gave a novel distributed reprogramming protocol called SDRP by using identity-based signature, and provided a comprehensive security analysis for their protocol. In this letter, unfortunately, we demonstrate that SDRP is insecure as the protocol fails to satisfy the property of authenticity and …


Facile Synthesis Of Hierarchical Networks Composed Of Highly Interconnected V2o5 Nanosheets Assembled On Carbon Nanotubes And Their Superior Lithium Storage Properties, Ruixiang Yu, Chaofeng Zhang, Qing Meng, Zhixin Chen, Hua-Kun Liu, Zaiping Guo Jan 2013

Facile Synthesis Of Hierarchical Networks Composed Of Highly Interconnected V2o5 Nanosheets Assembled On Carbon Nanotubes And Their Superior Lithium Storage Properties, Ruixiang Yu, Chaofeng Zhang, Qing Meng, Zhixin Chen, Hua-Kun Liu, Zaiping Guo

Faculty of Engineering and Information Sciences - Papers: Part A

Hierarchical networks with highly interconnected V2O5 nanosheets (NSs) anchored on skeletons of carbon nanotubes (CNTs) are prepared by a facile hydrothermal treatment and a following calcination for the first time. Benefiting from these unique structural features, the as-prepared CNT@V2O5 material shows dramatically excellent electrochemical performance with remarkable long cyclability (137-116 mA h g-1 after 400 cycles) at various high rates (20 C to 30 C) and very good rate capability for highly reversible lithium storage. The excellent electrochemical performance suggests its promising use as a cathode material for future lithium-ion batteries.


A Secure And Effective Anonymous User Authentication Scheme For Roaming Service In Global Mobility Networks, Fentong Wen, Willy Susilo, Guomin Yang Jan 2013

A Secure And Effective Anonymous User Authentication Scheme For Roaming Service In Global Mobility Networks, Fentong Wen, Willy Susilo, Guomin Yang

Faculty of Engineering and Information Sciences - Papers: Part A

In global mobility networks, anonymous user authentication is an essential task for enabling roaming service. In a recent paper, Jiang et al. proposed a smart card based anonymous user authentication scheme for roaming service in global mobility networks. This scheme can protect user privacy and is believed to have many abilities to resist a range of network attacks, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Jiang et al.'s scheme, and show that the scheme is in fact insecure against the stolen-verifier attack and replay attack. Then, we …


On Improving Capacity And Delay In Multi Tx/Rx Wireless Mesh Networks With Weighted Links, Hung-Yi Loo, Sieteng Soh, Kwan-Wu Chin Jan 2013

On Improving Capacity And Delay In Multi Tx/Rx Wireless Mesh Networks With Weighted Links, Hung-Yi Loo, Sieteng Soh, Kwan-Wu Chin

Faculty of Engineering and Information Sciences - Papers: Part A

This paper considers the problem of deriving a link schedule for Time Division Multiple Access (TDMA)-based concurrent transmit/receive Wireless Mesh Networks (WMNs) that results in low end-to-end delays as well as high network capacity. We first propose a MAX-CUT heuristic approach, called Algo-2, that maximizes link activations in each slot of a super-frame. Algo-2 is shown to produce better network capacity as compared to existing heuristic approaches and significantly improves the super-frame length of an existing MAX-CUT approach that enforces 2-phase transmit-receive restriction - a node that transmits (receives) in slot i ≥ 1 is to become a receiver (transmitter) …


Approximation Algorithms For Interference Aware Broadcast In Wireless Networks, Dianbo Zhao, Kwan-Wu Chin Jan 2013

Approximation Algorithms For Interference Aware Broadcast In Wireless Networks, Dianbo Zhao, Kwan-Wu Chin

Faculty of Engineering and Information Sciences - Papers: Part A

Broadcast is a fundamental operation in wireless networks and is well supported by the wireless channel. However, the interference resulting from a node's transmission pose a key challenge to the design of any broadcast algorithms/protocols. In particular, it is well known that a node's interference range is much larger than its transmission range and thus limits the number of transmitting and receiving nodes, which inevitably prolong broadcast. To this end, a number of past studies have designed broadcast algorithms that account for this interference range with the goal of deriving a broadcast schedule that minimizes latency. However, these works have …


Comparative Analysis Of Dynamic Line Rating Models And Feasibility To Minimise Energy Losses In Wind Rich Power Networks, Mathew Simms, Lasantha Meegahapola Jan 2013

Comparative Analysis Of Dynamic Line Rating Models And Feasibility To Minimise Energy Losses In Wind Rich Power Networks, Mathew Simms, Lasantha Meegahapola

Faculty of Engineering and Information Sciences - Papers: Part A

Wind power generation has indicated an exponential increase during last two decades and existing transmission network infrastructure is increasingly becoming inadequate to transmit remotely generated wind power to load centres in the network. The dynamic line rating (DLR) is one of the viable solutions to improve the transmission line ampacity during high wind penetration without investing on an additional transmission network. The main objective of this study is to identify the basic differences between two main line rating standards, since transmission network service providers (TNSPs) heavily depend on these two standards when developing their line rating models. Therefore, a parameter …


Large Networks Of Vertical Multi-Layer Graphenes With Morphology-Tunable Magnetoresistance, Zengji Yue, Igor Levchenko, Shailesh Kumar, Donghan Seo, Xiaolin Wang, S X. Dou, Kostya Ken Ostrikov Jan 2013

Large Networks Of Vertical Multi-Layer Graphenes With Morphology-Tunable Magnetoresistance, Zengji Yue, Igor Levchenko, Shailesh Kumar, Donghan Seo, Xiaolin Wang, S X. Dou, Kostya Ken Ostrikov

Faculty of Engineering and Information Sciences - Papers: Part A

We report on the comparative study of magnetotransport properties of large-area vertical few-layer graphene networks with different morphologies, measured in a strong (up to 10 T) magnetic field over a wide temperature range. The petal-like and tree-like graphene networks grown by a plasma enhanced CVD process on a thin (500 nm) silicon oxide layer supported by a silicon wafer demonstrate a significant difference in the resistance-magnetic field dependencies at temperatures ranging from 2 to 200 K. This behaviour is explained in terms of the effect of electron scattering at ultra-long reactive edges and ultra-dense boundaries of the graphene nanowalls. Our …