Jinsong Wang's research while affiliated with Tianjin University of Science and Technology and other places

Publications (42)

Article
Full-text available
With the fast development of the industrial Internet, its interconnectivity poses new challenges for the cooperation of industrial entities. Cooperation among these entities is built on trust, and trust is based on high-quality industrial products at reasonable prices. A traceability system can play an essential role in objectively reflecting the p...
Article
Full-text available
In this paper, we propose a wave time-varying neural network (WTNN) to solve the time-varying shortest path problem (TSPP). The complexity of the TSPP is NP-hard, so it is difficult to solve this problem using traditional algorithms, such as the Dijkstra algorithm. In contrast, the proposed WTNN can arrive at the global optimal solution of three TS...
Article
Full-text available
As an extension of cloud computing, the edge computing has become an important pattern to deal with novel service scenarios of the Internet of Everything (IoE), especially for the rapidly increasing different kinds of service requests from edge equipment. It is still a great challenge to satisfy the demands of delay-sensitive applications, so as to...
Article
By decoupling virtualized network functions from the dedicated network equipment on which they run, Network Function Virtualization (NFV) has brought a flexible and economical way to support the complex communication demands of different applications. Virtualized Network Functions (VNFs) can be dispatched and deployed as instances of plain software...
Article
In this study, we propose a time-varying neural network (TVNN) for solving the time-varying minimum spanning tree problem with constraints (CTMST), which is a variant of the time-varying network minimum spanning tree problem (TNMSTP), a well-known NP-hard problem. Unlike traditional algorithms that use heuristic search, the proposed TVNN is based o...
Article
Full-text available
As an extension of cloud computing, the edge computing has become an important pattern to deal with novel service scenarios of Internet of Everything (IoE) under 5G, especially for the delay sensitive computing tasks generated from edge equipment. The edge computing provides the key support to meet the characteristics of delay sensitivity by deploy...
Preprint
Full-text available
The reliability of information transmission has a significant influence on network performance, so it has attracted extensive attention from researchers. Many error control mechanisms have been designed and proposed in order to improve the reliability of transmission. However, during transmission in wireless networks, high bit error rate and burst...
Preprint
Full-text available
The reliability of information transmission has a significant influence on network performance, so it has attracted extensive attention from researchers. Many error control mechanisms have been designed and proposed in order to improve the reliability of transmission. However, during transmission in wireless networks, high bit error rate and burst...
Article
Full-text available
This paper proposes a dynamic neural network (DNN) to solve the time-varying shortest path problem with hop-constraint (HC-TSPP). The purpose of HC-TSPP is to find a path with the shortest transmission time and the restricted number of arcs. The proposed DNN is a novel neural network based on dynamic neurons. All neurons on DNN are computing in par...
Article
Full-text available
Classic support vector machine classifiers find separating hyperplanes by considering patterns of data sets, such as so-called support vectors without any character, i.e., without any global information concerning the relationship between one point and other points. In this study, we propose a density-based maximum margin machine classifier based o...
Chapter
The performance of fuzzy min-max classification neural network (FMM) is affected by the input sequence of training set patterns. This paper proposes a ranking-based fuzzy min-max Classification Neural Network (RFMM) to overcome this shortcoming. RFMM improves FMM through the following three aspects. First, RFMM ranks the input order of the training...
Article
This paper presents a hybrid fuzzy integrated convolutional neural network (HFICNN) to deal with the similarity feature recognition problem in abnormal netflow detection, which is that different labels with the same netflow eigenvalues are not well disposed by traditional machine learning and deep learning methods. The HFICNN model can convert the...
Chapter
In this paper, polynomial fuzzy neural network classifiers (PFNNCs) is proposed by means of density fuzzy c-means and L2-norm regularization. The overall design of PFNNCs was realized by means of fuzzy rules that come in form of three parts, namely premise part, consequence part and aggregation part. The premise part was developed by density fuzzy...
Article
Due to the urgent requirement to achieve secure communication between service providers (SPs) and smart meters (SMs), including reliable mutual authentication and privacy credentials, key management is critical in smart grids. Recently, a number of key management schemes have been proposed. However, schemes based on trusted third parties (TTPs) bec...
Chapter
It is generally accepted that the clustering-based differential evolution (CDE) algorithm exhibits better performance in comparison with the standard differential evolution. However, such clustering method mechanism that is only based on input data may lead to some limitations such as premature convergence. In this study, we propose a divisive mult...
Article
In the era of e-commerce, purchase behavior prediction is one of the most important issues to promote both online companies' sales and the consumers' experience. The previous researches usually use the feature engineering and ensemble machine learning algorithms for the prediction. The performance really depends on designed features and the scalabi...
Article
System scenarios that derived from system design specification play an important role in the reliability engineering of componentbased software systems. Several scenario-based approaches have been proposed to predict the reliability of a system at the design time, most of them adopt flat construction of scenarios, which doesn't conform to software...
Conference Paper
In this paper, a novel 3-erasure code having advantages of both horizontal and vertical codes is described. Because of its parity construction liking the Greek Numeral XI, so we call it Eleven code. It is an MDS code expanded from H-code (an MDS code to optimal partial stripe writes in RAID-6) thus it has optimal storage property. To prove the accu...
Article
This paper concerns the time-dependent shortest path problem, which is difficult to come up global optimal solution by means of classical shortest path approaches such as Dijkstra, and pulse-coupled neural network (PCNN). In this study, we propose a time-delay neural network (TDNN) framework that comes with the globally optimal solution when solvin...
Article
The uncertainty of travel times on a time-dependent network is conventionally considered as randomness or fuzziness. However, sometimes, randomness or fuzziness cannot describe the uncertainty of the travel times on the time-dependent network. In this paper, we introduce a random fuzzy time-dependent network (RFTDN), in which travel times of a time...
Article
In this study, we propose a granular classifier (GC) with the aid of a context-based similarity clustering (CSC) method and applied it for network intrusion detection. The proposed CSC supporting the design of information granules is exploited here to determine the so-called contexts. Unlike the conventional similar clustering method, here the CSC...
Article
In this study, we propose a granular classifier (GC) with the aid of a context-based similarity clustering (CSC) method and applied it for network intrusion detection. The proposed CSC supporting the design of information granules is exploited here to determine the so-called contexts. Unlike the conventional similar clustering method, here the CSC...
Article
Dynamic Spectrum Access (DSA) network grows rapidly in recent years. It is proposed to solve the problem of reasonable utilization of wireless spectrum resources. DSA is a new spectrum sharing paradigm which takes advantage of spectrum holes to ease the spectrum shortage problem and improve the spectrum utilization. However, due to the frequent spe...
Article
With the rise of component-based software development, its reliability has attracted much attention from both academic and industry communities. Component-based software development focuses on architecture design, and thus it is important for reliability analysis to emphasize software architecture. Existing approaches to architecture-based software...
Conference Paper
Dynamic Spectrum Access (DSA) is supposed to be the key technology to improve wireless communication. And at the other hand, Transport Control Protocol (TCP) will be used in DSA networks, considering it's the de-facto standard in wired communication and also has been widely deployed in wireless networks. However, TCP may suffer significant decrease...
Article
Many applications would require fast data transfer in Wireless Local Area Networks (WLANs) nowadays. A representative example is the EAST (Experimental Advanced Superconducting Tokamak) project where physics researchers need to transport massive experiment data using the TCP (Transmission Control Protocol). However, the high contention level and th...
Conference Paper
In this paper, we study binary pattern erasure codes, i.e., binary codes that are resiliant to erasures from a family P of possible erasures. We give an algorithmic proof of the existence of a binary linear code with codewords of length n that is resiliant to erasures from P when P satisfies the properties: every pattern p ϵ P has size m and every...
Article
Full-text available
We first propose a Parallel Space Search Algorithm (PSSA) and then introduce a design of Polynomial Fuzzy Radial Basis Function Neural Networks (PFRBFNN) based on Nonsymmetric Fuzzy Clustering Method (NSFCM) and PSSA. The PSSA is a parallel optimization algorithm realized by using Hierarchical Fair Competition strategy. NSFCM is essentially an impr...
Conference Paper
Network traffic anomaly detection is one of the most important components of IT management. Analyzing the components of the network work traffic, we can judge the operating status of the network and make the right decision to make sure the stable status of the network. The method based on flow data displays the current status of the network and we...
Article
In this paper, we investigate the role of update or imitation rules in the spatial snowdrift game on regular lattices. Three different update rules, including unconditional imitation (UI), replicator dynamics (RD) and the Moran process, are utilized to update the strategies of focal players during the game process in the spatial snowdrift on the la...
Chapter
According to the SQL injection attack process with the characteristic of connection, a detecting method was presented based on connective signatures filter, suitable for the traditional signatures matching algorithm. Using multiple member signatures which described by regular expression to filter the packets of hosts from Intranet. The experiment p...
Conference Paper
Large-scale network security issue has been troubled by the biggest problems network managers, this paper, data flow detection and deep packet inspection technology, proposed a compound detection system and security events to be realized, given a new solutions to large-scale network security solution.
Article
TCP is the most commonly used transport control protocol. However, its throughput and fairness performance degrades in WLANs due to the unfairness in 802.11 MAC protocol. Since more and more scientists at the EAST facility in China are relying on such set up to download and analyze their experimental data, their research productivity is severely ha...
Article
We present a new epidemic Susceptible-Infected-Susceptible (SIS) model to investigate the spreading behavior on networks with dynamical topology and community structure. Individuals in themodel are mobile agentswho are allowed to perform the inter-community (i.e., long-range) motion with the probability p. The mean-field theory is utilized to deriv...

Citations

... As discussed in Section IV's Existence and Minimization areas, SBTs will play a key role in digital inheritance planning. While SBTs can be created for all entities that are a part of the executor's will, ZKPs may also be used in conjunction with SBTs to ensure that no one can manipulate the system [65]. In addition, as SBTs will become another foundational piece in the digital inheritance framework, protocols and networks outside of those previously mentioned may consider SBTs to provide privacy and security to their users as they build out their digital inheritance plans. ...
... They leverage the concept of virtual layered graph to consider NFV processing latency and use shortest path algorithms to solve the problem. Chao et al. [38] proposed a mechanism to dynamically deploy network functions. Their approach is based on ant colony optimization and relies on cooperation between multiple forwarding equipment on the packet transmission path to jointly use already placed network functions and further optimize packet delays. ...
... Several studies proved the superiority of FMNN and other machine learning methods. For further details, the reader is referred to the papers of Simpson [26], Gabrys and Bargiela [28], Mohammed and Lim [29], Wang et al. [30] and Boroumandzadeh and Parvinnia [31]. ...
... Via deploying computation and storage resources at the edge of access network, Mobile Edge Computing (MEC) enables tasks to be performed at the edge server and hence it is treated as a promising way to provide low-latency computing service [3]. But considering the deployment cost, the computation resources of MEC servers are usually limited, thus collaborative edge computing which can exploit the resources of distributed MEC servers becomes an efficient solution to improve the system processing capacity [4][5][6][7][8]. In collaborative edge computing, the computation offloading problem, including the task offloading problem to determine which server is selected to perform the task as well as the resource scheduling problem to determine how many communication and computation resources are allocated to the task, should be investigated. ...
... ere are many contents involved. e analysis is conducted from the perspective of the evaluation object, including the conventional cat face recognition, human body recognition, English feature recognition, and so on [1]. In the conventional methods of English feature recognition, it is generally through visual capture angle analysis and deep learning to realize the recognition and cognition of English features [2]. ...
... Remote data authentication using blockchain, signatures and authentication secret codes are presented in this article. The secure data communication using grid system based on mutual authentication is discussed in paper [13]. Privacy is ensured using key management in smart meter. ...
... Nevertheless, several studies reveal how consumer behavior prediction using data mining techniques was successful in developing association rule mining models to predict customer behavior managing to export new sets of rules value (Orogun and Bukola,2019). Compared to similar consumer behavior prediction attempts there is one which demonstrates an alternative use tree-based feature transformation and machine learning algorithms, instead of using ensemble algorithms, a simple algorithm is used to predict purchase behavior based on transformed features (Hou et al., 2018). Another approach in predicting consumers' behavior this time using random forest data mining technique proved to be effective since it has managed to succeed high accurate results (Valecha et al., 2018). ...
... Many studies have been carried out based on these behavior models to predict the reliability at early design stages [7,[13][14][15][16][17][18]. However, the current models need to pay more attention to scenario combination mechanism and model scalability for larger systems [8][9][10]19]. The scalability problem of the model is related to system behavior modeling. ...
... To avoid the phenomenon of software-system aging, Huang et al. [17] proposed a software regeneration technique which used periodic clearing of an internal state or operating environment to avoid sudden failure caused by aging, but the regeneration frequency is not easy to grasp. Some scholars proposed prediction and analysis of system resource consumption based on the information of system operation parameters, but it was difficult to capture the hidden laws of aging performance parameters [18,19]. To enhance the reliability of industrial software, slow down the speed of software aging, and better service manufacturing, Jeff et al. [20] proposed strengthening the system software simulation testing by establishing a high-fidelity-test running environment. ...
... In a dense node network, when the number of vehicles increases, channel congestion will increase, resulting in reduced communication performance [17]. Literature [18] analyzes the correlation between vehicle density and network congestion. Simulation results show that in high vehicle density, there will be more serious congestion, lower throughput, and higher packet loss rate. ...