• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Wenbin, Sun Qibo, and Yang Fangchun. Environment-Aware Quantitative Assessment Model for Service Availability in MANET[J]. Journal of Computer Research and Development, 2012, 49(3): 558-564.
Citation: Wang Wenbin, Sun Qibo, and Yang Fangchun. Environment-Aware Quantitative Assessment Model for Service Availability in MANET[J]. Journal of Computer Research and Development, 2012, 49(3): 558-564.

Environment-Aware Quantitative Assessment Model for Service Availability in MANET

More Information
  • Published Date: March 14, 2012
  • In mobile ad hoc networks (MANETs), mobile nodes share resources and collaborate to do work by using Web service technologies, and the service is defined as any hardware or software entity that resides on a mobile device or platform. However, the complex environment, dynamic network links and heterogeneous terminals make the service availability constantly vary and be difficult to assess in quantitative model. In this paper, after analyzing the running environment of services and the environmental factors that impact the service availability, an environment-aware quantitative assessment model for service availability (EQAM-SA) is proposed, which is touched off by the service requesting. In EQAM-SA, the running parameters of services are obtained and the quantitative evaluation indicators are then computed in real time as soon as a service request is received. The weights of these indicators are different and are used to assess services availability in different application scenarios, so Delphi approach is used to determine the weights. Then, the analytic hierarchy process (AHP) approach and multi-attribute evaluation with a weighted sum model are adopted to evaluate the service availability. Finally, the feasibility and effectiveness are validated by numbers of simulations.
  • Related Articles

    [1]Chen Huimin, Jin Sichen, Lin Wei, Zhu Zeyu, Tong Lingbo, Liu Yipeng, Ye Yining, Jiang Weihan, Liu Zhiyuan, Sun Maosong, Jin Jianbin. Quantitative Analysis on the Communication of COVID-19 Related Social Media Rumors[J]. Journal of Computer Research and Development, 2021, 58(7): 1366-1384. DOI: 10.7544/issn1000-1239.2021.20200818
    [2]Lei Kenan, Zhang Yuqing, Wu Chensi, Ma Hua. A System for Scoring the Exploitability of Vulnerability Based Types[J]. Journal of Computer Research and Development, 2017, 54(10): 2296-2309. DOI: 10.7544/issn1000-1239.2017.20170457
    [3]Wu Linping, Wei Yong, Xu Xiaowei, Liu Xu. Impact of System Noise by Quantitative Analysis[J]. Journal of Computer Research and Development, 2015, 52(5): 1146-1152. DOI: 10.7544/issn1000-1239.2015.20131921
    [4]Li Bin, Xie Feng, Chen Zhong. A Business Oriented Risk Assessment Model[J]. Journal of Computer Research and Development, 2011, 48(9): 1634-642.
    [5]Mu Chengpo, Huang Houkuan, Tian Shengfeng. Hierarchical Online Risk Assessment for Intrusion Scenarios[J]. Journal of Computer Research and Development, 2010, 47(10): 1724-1732.
    [6]Tong Yuanman, Wang Zhiying, Dai Kui, and Lu Hongyi. Quantitative Evaluation of the Cryptographic Block’s Resistibility to Power Analysis Attack at Different Design Level[J]. Journal of Computer Research and Development, 2009, 46(6): 940-947.
    [7]Zheng Fang, Zheng Xiao, Li Hongliang, and Chen Zuoning. Research on UserOriented Availability Modeling in Parallel Computer Systems[J]. Journal of Computer Research and Development, 2008, 45(5): 886-894.
    [8]Qiao Baiyou, Wang Guoren, and Ding Linlin. TBSN: A Taxonomy Hierarchy Based P2P Network[J]. Journal of Computer Research and Development, 2008, 45(5): 803-809.
    [9]Zhao Huawei and Li Daxing. A Security Protocols' Analytic Approach of Reconciling Two Views[J]. Journal of Computer Research and Development, 2006, 43(7): 1260-1266.
    [10]Liang Zuopeng, Hu Kongfa, Dong Yisheng, Chen Ling. An Improved Dimension Hierarchy Aggregate Cube Storage Structure for Data Warehouses[J]. Journal of Computer Research and Development, 2005, 42(8): 1362-1368.

Catalog

    Article views (779) PDF downloads (483) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return