• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Chen Li, Deng Kun, Jiang Tao, Yue Guangxue, Li Panpan, Yang Jun, Xu Xubao. Delay Tolerant Access Control Method Based on Spatio-Temporal Distribution of Access Requests[J]. Journal of Computer Research and Development, 2019, 56(5): 919-928. DOI: 10.7544/issn1000-1239.2019.20190016
Citation: Chen Li, Deng Kun, Jiang Tao, Yue Guangxue, Li Panpan, Yang Jun, Xu Xubao. Delay Tolerant Access Control Method Based on Spatio-Temporal Distribution of Access Requests[J]. Journal of Computer Research and Development, 2019, 56(5): 919-928. DOI: 10.7544/issn1000-1239.2019.20190016

Delay Tolerant Access Control Method Based on Spatio-Temporal Distribution of Access Requests

More Information
  • Published Date: April 30, 2019
  • In ocean observations, the infrastructure providing wireless communication is sparsely deployed and the wireless observation nodes move very fast. The limited or even scarce wireless network resources are difficult to meet the uploading requirements of large-scale data collection. It is extremely urgent to study and solve the effective upload access control method for massive observation nodes to compete for scarce communication resources. Based on the historical data of the observation access request, the neural network is used to perform time series analysis on them, and then gets their future revenues based on probability. To maximize total revenue, this paper studies the optimization method of uploading access scheduling problem that guarantees the delay tolerance of observation data based on time series analysis. Unfortunately, it is an NP-hard problem (see in theorem 1). Therefore, the approximation algorithm of enhanced access control (P-RSA) is proposed based on the dynamic programming idea. Firstly, the wireless access requests with spatio-temporal dynamic features is a quantified. Secondly, performance parameters are generalized to “revenue”. Finally, simulation experiments are performed that the total revenues of access requests are analysed under different AP’s load conditions until the deadline. P-RSA’s effectiveness is verified by detailed simulation experiments than the existing algorithms.

Catalog

    Article views (919) PDF downloads (311) Cited by()
    Turn off MathJax
    Article Contents

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return