期刊文献+
共找到16,002篇文章
< 1 2 250 >
每页显示 20 50 100
Threshold-Based Software-Defined Networking(SDN)Solution for Healthcare Systems against Intrusion Attacks
1
作者 Laila M.Halman Mohammed J.F.Alenazi 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1469-1483,共15页
The healthcare sector holds valuable and sensitive data.The amount of this data and the need to handle,exchange,and protect it,has been increasing at a fast pace.Due to their nature,software-defined networks(SDNs)are ... The healthcare sector holds valuable and sensitive data.The amount of this data and the need to handle,exchange,and protect it,has been increasing at a fast pace.Due to their nature,software-defined networks(SDNs)are widely used in healthcare systems,as they ensure effective resource utilization,safety,great network management,and monitoring.In this sector,due to the value of thedata,SDNs faceamajor challengeposed byawide range of attacks,such as distributed denial of service(DDoS)and probe attacks.These attacks reduce network performance,causing the degradation of different key performance indicators(KPIs)or,in the worst cases,a network failure which can threaten human lives.This can be significant,especially with the current expansion of portable healthcare that supports mobile and wireless devices for what is called mobile health,or m-health.In this study,we examine the effectiveness of using SDNs for defense against DDoS,as well as their effects on different network KPIs under various scenarios.We propose a threshold-based DDoS classifier(TBDC)technique to classify DDoS attacks in healthcare SDNs,aiming to block traffic considered a hazard in the form of a DDoS attack.We then evaluate the accuracy and performance of the proposed TBDC approach.Our technique shows outstanding performance,increasing the mean throughput by 190.3%,reducing the mean delay by 95%,and reducing packet loss by 99.7%relative to normal,with DDoS attack traffic. 展开更多
关键词 Network resilience network management attack prediction software defined networking(SDN) distributed denial of service(DDoS) healthcare
下载PDF
The Caching and Pricing Strategy for Information-Centric Networking with Advertisers’Participation
2
作者 Zheng Quan Yan Wenliang +4 位作者 Wu Rong Tan Xiaobin Yang Jian Yuan Liu Xu Zhenghuan 《China Communications》 SCIE CSCD 2024年第3期283-295,共13页
As users’access to the network has evolved into the acquisition of mass contents instead of IP addresses,the IP network architecture based on end-to-end communication cannot meet users’needs.Therefore,the Informatio... As users’access to the network has evolved into the acquisition of mass contents instead of IP addresses,the IP network architecture based on end-to-end communication cannot meet users’needs.Therefore,the Information-Centric Networking(ICN)came into being.From a technical point of view,ICN is a promising future network architecture.Researching and customizing a reasonable pricing mechanism plays a positive role in promoting the deployment of ICN.The current research on ICN pricing mechanism is focused on paid content.Therefore,we study an ICN pricing model for free content,which uses game theory based on Nash equilibrium to analysis.In this work,advertisers are considered,and an advertiser model is established to describe the economic interaction between advertisers and ICN entities.This solution can formulate the best pricing strategy for all ICN entities and maximize the benefits of each entity.Our extensive analysis and numerical results show that the proposed pricing framework is significantly better than existing solutions when it comes to free content. 展开更多
关键词 ADVERTISERS CACHE free content Information-Centric networking pricing strategy
下载PDF
Insights into microbiota community dynamics and flavor development mechanism during golden pomfret(Trachinotus ovatus)fermentation based on single-molecule real-time sequencing and molecular networking analysis
3
作者 Yueqi Wang Qian Chen +5 位作者 Huan Xiang Dongxiao Sun-Waterhouse Shengjun Chen Yongqiang Zhao Laihao Li Yanyan Wu 《Food Science and Human Wellness》 SCIE CSCD 2024年第1期101-114,共14页
Popular fermented golden pomfret(Trachinotus ovatus)is prepared via spontaneous fermentation;however,the mechanisms underlying the regulation of its flavor development remain unclear.This study shows the roles of the ... Popular fermented golden pomfret(Trachinotus ovatus)is prepared via spontaneous fermentation;however,the mechanisms underlying the regulation of its flavor development remain unclear.This study shows the roles of the complex microbiota and the dynamic changes in microbial community and flavor compounds during fish fermentation.Single-molecule real-time sequencing and molecular networking analysis revealed the correlations among different microbial genera and the relationships between microbial taxa and volatile compounds.Mechanisms underlying flavor development were also elucidated via KEGG based functional annotations.Clostridium,Shewanella,and Staphylococcus were the dominant microbial genera.Forty-nine volatile compounds were detected in the fermented fish samples,with thirteen identified as characteristic volatile compounds(ROAV>1).Volatile profiles resulted from the interactions among the microorganisms and derived enzymes,with the main metabolic pathways being amino acid biosynthesis/metabolism,carbon metabolism,and glycolysis/gluconeogenesis.This study demonstrated the approaches for distinguishing key microbiota associated with volatile compounds and monitoring the industrial production of high-quality fermented fish products. 展开更多
关键词 Fermented golden pomfret Microbiota community Volatile compound Co-occurrence network Metabolic pathway
下载PDF
Configuration Synthesis and Lightweight Networking of Deployable Mechanism Based on a Novel Pyramid Module
4
作者 Jinwei Guo Jianliang He +2 位作者 Guoxing Zhang Yongsheng Zhao Yundou Xu 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2023年第4期294-310,共17页
Deployable mechanism with preferable deployable performance,strong expansibility,and lightweight has attracted much attention because of their potential in aerospace.A basic deployable pyramid unit with good deployabi... Deployable mechanism with preferable deployable performance,strong expansibility,and lightweight has attracted much attention because of their potential in aerospace.A basic deployable pyramid unit with good deployability and expandability is proposed to construct a sizeable deployable mechanism.Firstly,the basic unit folding principle and expansion method is proposed.The configuration synthesis method of adding constraint chains of spatial closed-loop mechanism is used to synthesize the basic unit.Then,the degree of freedom of the basic unit is analyzed using the screw theory and the link dismantling method.Next,the three-dimensional models of the pyramid unit,expansion unit,and array unit are established,and the folding motion simulation analysis is carried out.Based on the number of components,weight reduction rate,and deployable rate,the performance characteristics of the three types of mechanisms are described in detail.Finally,prototypes of the pyramid unit,combination unit,and expansion unit are developed to verify further the correctness of the configuration synthesis based on the pyramid.The proposed deployable mechanism provides aference for the design and application of antennas with a large aperture,high deployable rate,and lightweight.It has a good application prospect in the aerospace field. 展开更多
关键词 Pyramid unit Deployable mechanism Configuration synthesis Structural design Lightweight networking
下载PDF
A Machine Learning-Based Attack Detection and Prevention System in Vehicular Named Data Networking
5
作者 Arif Hussain Magsi Ali Ghulam +3 位作者 Saifullah Memon Khalid Javeed Musaed Alhussein Imad Rida 《Computers, Materials & Continua》 SCIE EI 2023年第11期1445-1465,共21页
Named Data Networking(NDN)is gaining a significant attention in Vehicular Ad-hoc Networks(VANET)due to its in-network content caching,name-based routing,and mobility-supporting characteristics.Nevertheless,existing ND... Named Data Networking(NDN)is gaining a significant attention in Vehicular Ad-hoc Networks(VANET)due to its in-network content caching,name-based routing,and mobility-supporting characteristics.Nevertheless,existing NDN faces three significant challenges,including security,privacy,and routing.In particular,security attacks,such as Content Poisoning Attacks(CPA),can jeopardize legitimate vehicles with malicious content.For instance,attacker host vehicles can serve consumers with invalid information,which has dire consequences,including road accidents.In such a situation,trust in the content-providing vehicles brings a new challenge.On the other hand,ensuring privacy and preventing unauthorized access in vehicular(VNDN)is another challenge.Moreover,NDN’s pull-based content retrieval mechanism is inefficient for delivering emergency messages in VNDN.In this connection,our contribution is threefold.Unlike existing rule-based reputation evaluation,we propose a Machine Learning(ML)-based reputation evaluation mechanism that identifies CPA attackers and legitimate nodes.Based on ML evaluation results,vehicles accept or discard served content.Secondly,we exploit a decentralized blockchain system to ensure vehicles’privacy by maintaining their information in a secure digital ledger.Finally,we improve the default routing mechanism of VNDN from pull to a push-based content dissemination using Publish-Subscribe(Pub-Sub)approach.We implemented and evaluated our ML-based classification model on a publicly accessible BurST-Asutralian dataset for Misbehavior Detection(BurST-ADMA).We used five(05)hybrid ML classifiers,including Logistic Regression,Decision Tree,K-Nearest Neighbors,Random Forest,and Gaussian Naive Bayes.The qualitative results indicate that Random Forest has achieved the highest average accuracy rate of 100%.Our proposed research offers the most accurate solution to detect CPA in VNDN for safe,secure,and reliable vehicle communication. 展开更多
关键词 Named data networking vehicular networks REPUTATION CACHING MACHINE-LEARNING
下载PDF
Chemical diversity of scleractinian corals revealed by untargeted metabolomics and molecular networking
6
作者 Jiying Pei Yuxia Zhou +4 位作者 Shiguo Chen Kefu Yu Zhenjun Qin Ruijie Zhang Yitong Wang 《Acta Oceanologica Sinica》 SCIE CAS CSCD 2023年第11期127-135,共9页
The chemical diversity of scleractinian corals is closely related to their physiological,ecological,and evolutionary status,and can be influenced by both genetic background and environmental variables.To investigate i... The chemical diversity of scleractinian corals is closely related to their physiological,ecological,and evolutionary status,and can be influenced by both genetic background and environmental variables.To investigate intraspecific variation in the metabolites of these corals,the metabolomes of four species(Pocillopora meandrina,Seriatopora hystrix,Acropora formosa,and Fungia fungites)from the South China Sea were analyzed using untargeted mass spectrometry-based metabolomics.The results showed that a variety of metabolites,including amino acids,peptides,lipids,and other small molecules,were differentially distributed among the four species,leading to their significant separation in principal component analysis and hierarchical clustering plots.The higher content of storage lipids in branching corals(P.meandrina,S.hystrix,and A.formosa)compared to the solitary coral(F.fungites)may be due to the high densities of zooxanthellae in their tissues.The high content of aromatic amino acids in P.meandrina may help the coral protect against ultraviolet damage and promote growth in shallow seawater,while nitrogen-rich compounds may enable S.hystrix to survive in various challenging environments.The metabolites enriched in F.fungites,including amino acids,dipeptides,phospholipids,and other small molecules,may be related to the composition of the coral's mucus and its life-history,such as its ability to move freely and live solitarily.Studying the chemical diversity of scleractinian corals not only provides insight into their environmental adaptation,but also holds potential for the chemotaxonomy of corals and the discovery of novel bioactive natural products. 展开更多
关键词 scleractinian coral chemical diversity metabolomics molecular networking environmental adaptation
下载PDF
Recent Trends of In-Vehicle Time Sensitive Networking Technologies, Applications and Challenges
7
作者 Yanli Xu Jian Shang Hao Tang 《China Communications》 SCIE CSCD 2023年第11期30-55,共26页
With the vigorous development of automobile industry,in-vehicle network is also constantly upgraded to meet data transmission requirements of emerging applications.The main transmission requirements are low latency an... With the vigorous development of automobile industry,in-vehicle network is also constantly upgraded to meet data transmission requirements of emerging applications.The main transmission requirements are low latency and certainty especially for autonomous driving.Time sensitive networking(TSN)based on Ethernet gives a possible solution to these requirements.Previous surveys usually investigated TSN from a general perspective,which referred to TSN of various application fields.In this paper,we focus on the application of TSN to the in-vehicle networks.For in-vehicle networks,we discuss all related TSN standards specified by IEEE 802.1 work group up to now.We further overview and analyze recent literature on various aspects of TSN for automotive applications,including synchronization,resource reservation,scheduling,certainty,software and hardware.Application scenarios of TSN for in-vehicle networks are analyzed one by one.Since TSN of in-vehicle network is still at a very initial stage,this paper also gives insights on open issues,future research directions and possible solutions. 展开更多
关键词 automobile industry deterministic transmission in-vehicle network low latency time sensitive networking(TSN)
下载PDF
Push-Based Content Dissemination and Machine Learning-Oriented Illusion Attack Detection in Vehicular Named Data Networking
8
作者 Arif Hussain Magsi Ghulam Muhammad +2 位作者 Sajida Karim Saifullah Memon Zulfiqar Ali 《Computers, Materials & Continua》 SCIE EI 2023年第9期3131-3150,共20页
Recent advancements in the Vehicular Ad-hoc Network(VANET)have tremendously addressed road-related challenges.Specifically,Named Data Networking(NDN)in VANET has emerged as a vital technology due to its outstanding fe... Recent advancements in the Vehicular Ad-hoc Network(VANET)have tremendously addressed road-related challenges.Specifically,Named Data Networking(NDN)in VANET has emerged as a vital technology due to its outstanding features.However,the NDN communication framework fails to address two important issues.The current NDN employs a pull-based content retrieval network,which is inefficient in disseminating crucial content in Vehicular Named Data Networking(VNDN).Additionally,VNDN is vulnerable to illusion attackers due to the administrative-less network of autonomous vehicles.Although various solutions have been proposed for detecting vehicles’behavior,they inadequately addressed the challenges specific to VNDN.To deal with these two issues,we propose a novel push-based crucial content dissemination scheme that extends the scope of VNDN from pullbased content retrieval to a push-based content forwarding mechanism.In addition,we exploitMachine Learning(ML)techniques within VNDN to detect the behavior of vehicles and classify them as attackers or legitimate.We trained and tested our system on the publicly accessible dataset Vehicular Reference Misbehavior(VeReMi).We employed fiveML classification algorithms and constructed the bestmodel for illusion attack detection.Our results indicate that RandomForest(RF)achieved excellent accuracy in detecting all illusion attack types in VeReMi,with an accuracy rate of 100%for type 1 and type 2,96%for type 4 and type 16,and 95%for type 8.Thus,RF can effectively evaluate the behavior of vehicles and identify attacker vehicles with high accuracy.The ultimate goal of our research is to improve content exchange and secureVNDNfromattackers.Thus,ourML-based attack detection and preventionmechanismensures trustworthy content dissemination and prevents attacker vehicles from sharing misleading information in VNDN. 展开更多
关键词 Named data networking vehicular networks pull-push illusion attack machine learning
下载PDF
Emerging Trends in Social Networking Systems and Generation Gap with Neutrosophic Crisp Soft Mapping
9
作者 Muhammad Riaz Masooma Raza Hashmi +3 位作者 Faruk Karaaslan Aslıhan Sezgin Mohammed M.Ali Al Shamiri Mohammed M.Khalaf 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第8期1759-1783,共25页
This paper aims to introduce the novel concept of neutrosophic crisp soft set(NCSS),including various types of neutrosophic crisp soft sets(NCSSs)and their fundamental operations.We define NCS-mapping and its inverse ... This paper aims to introduce the novel concept of neutrosophic crisp soft set(NCSS),including various types of neutrosophic crisp soft sets(NCSSs)and their fundamental operations.We define NCS-mapping and its inverse NCS-mapping between two NCS-classes.We develop a robust mathematical modeling with the help of NCS-mapping to analyze the emerging trends in social networking systems(SNSs)for our various generations.We investigate the advantages,disadvantages,and natural aspects of SNSs for five generations.With the changing of the generations,it is analyzed that emerging trends and the benefits of SNSs are increasing day by day.The suggested modeling with NCS-mapping is applicable in solving various decision-making problems. 展开更多
关键词 Neutrosophic crisp soft set operations of NCSSs NCS-mapping inverse NCS-mapping social networking systems DECISION-MAKING
下载PDF
Wave Azimuth Cutoff Compensation Method and the Multisatellite Networking Mode of SAR
10
作者 WAN Yong CUI Kun +4 位作者 QU Ruozhao DAI Yongshou LI Ligang QU Xiaojun ZHANG Xiaoyu 《Journal of Ocean University of China》 SCIE CAS CSCD 2023年第3期683-696,共14页
Synthetic aperture radars(SARs)encounter the azimuth cutoff problem when observing sea waves.Consequently,SARs can only capture the waves with wavelengths larger than the cutoff wavelength and lose the information of ... Synthetic aperture radars(SARs)encounter the azimuth cutoff problem when observing sea waves.Consequently,SARs can only capture the waves with wavelengths larger than the cutoff wavelength and lose the information of waves with smaller wavelengths.To increase the accuracy of SAR wave observations,this paper investigates an azimuth cutoff compensation method based on the simulated multiview SAR wave synchronization data obtained by the collaborative observation via networked satellites.Based on the simulated data and the equivalent multiview measured data from Sentinel-1 virtual networking,the method is verified and the cutoff wavelengths decrease by 16.40%and 14.00%.The biases of the inversion significant wave height with true values decrease by 0.04 m and 0.14 m,and the biases of the mean wave period decrease by 0.17 s and 0.22 s,respectively.These results demonstrate the effectiveness of the azimuth cutoff compensation method.Based on the azimuth cutoff compensation method,the multisatellite SAR networking mode for wave observations are discussed.The highest compensation effect is obtained when the combination of azimuth angle is(95°,115°,135°),the orbital intersection angle is(50°,50°),and three or four satellites are used.The study of the multisatellite networking mode in this paper can provide valuable references for the compensation of azimuth cutoff and the observation of waves by a multisatellite network. 展开更多
关键词 synthetic aperture radar(SAR) compensation effect cutoff wavelength multisatellite networking mode
下载PDF
Performance Evaluation of Topologies for Multi-Domain Software-Defined Networking
11
作者 Jiangyuan Yao Weiping Yang +5 位作者 Shuhua Weng Minrui Wang Zheng Jiang Deshun Li Yahui Li Xingcan Cao 《Computer Systems Science & Engineering》 SCIE EI 2023年第10期741-755,共15页
Software-defined networking(SDN)is widely used in multiple types of data center networks,and these distributed data center networks can be integrated into a multi-domain SDN by utilizing multiple controllers.However,t... Software-defined networking(SDN)is widely used in multiple types of data center networks,and these distributed data center networks can be integrated into a multi-domain SDN by utilizing multiple controllers.However,the network topology of each control domain of SDN will affect the performance of the multidomain network,so performance evaluation is required before the deployment of the multi-domain SDN.Besides,there is a high cost to build real multi-domain SDN networks with different topologies,so it is necessary to use simulation testing methods to evaluate the topological performance of the multi-domain SDN network.As there is a lack of existing methods to construct a multi-domain SDN simulation network for the tool to evaluate the topological performance automatically,this paper proposes an automated multi-domain SDN topology performance evaluation framework,which supports multiple types of SDN network topologies in cooperating to construct a multi-domain SDN network.The framework integrates existing single-domain SDN simulation tools with network performance testing tools to realize automated performance evaluation of multidomain SDN network topologies.We designed and implemented a Mininet-based simulation tool that can connect multiple controllers and run user-specified topologies in multiple SDN control domains to build and test multi-domain SDN networks faster.Then,we used the tool to perform performance tests on various data center network topologies in single-domain and multi-domain SDN simulation environments.Test results show that Space Shuffle has the most stable performance in a single-domain environment,and Fat-tree has the best performance in a multi-domain environment.Also,this tool has the characteristics of simplicity and stability,which can meet the needs of multi-domain SDN topology performance evaluation. 展开更多
关键词 Software-defined networking emulation network multi-domain SDN data center network topology
下载PDF
Secure vehicular data communication in Named Data Networking
12
作者 Xiaonan Wang Xilan Chen Xingwei Wang 《Digital Communications and Networks》 SCIE CSCD 2023年第1期203-210,共8页
Vehicular data misuse may lead to traffic accidents and even loss of life,so it is crucial to achieve secure vehicular data communications.This paper focuses on secure vehicular data communications in the Named Data N... Vehicular data misuse may lead to traffic accidents and even loss of life,so it is crucial to achieve secure vehicular data communications.This paper focuses on secure vehicular data communications in the Named Data Networking(NDN).In NDN,names,provider IDs and data are transmitted in plaintext,which exposes vehicular data to security threats and leads to considerable data communication costs and failure rates.This paper proposes a Secure vehicular Data Communication(SDC)approach in NDN to supress data communication costs and failure rates.SCD constructs a vehicular backbone to reduce the number of authenticated nodes involved in reverse paths.Only the ciphtertext of the name and data is included in the signed Interest and Data and transmitted along the backbone,so the secure data communications are achieved.SCD is evaluated,and the data results demonstrate that SCD achieves the above objectives. 展开更多
关键词 Named data networking Reverse path Secure data communication
下载PDF
Effect of Online Social Networking on Emotional Status and Its Interaction with Offline Reality during the Early Stage of the COVID-19 Pandemic in China
13
作者 Xiaolin Lu Xiaolei Miao 《International Journal of Mental Health Promotion》 2023年第9期1041-1052,共12页
Background:During the early stages of the COVID-19 pandemic in China,social interactions shifted to online spaces due to lockdowns and social distancing measures.As a result,the impact of online social networking on u... Background:During the early stages of the COVID-19 pandemic in China,social interactions shifted to online spaces due to lockdowns and social distancing measures.As a result,the impact of online social networking on users’emotional status has become stronger than ever.This study examines the association between online social networking and Internet users’emotional status and how offline reality affects this relationship.Methods:The study utilizes cross-sectional online survey data(n=3004)and Baidu Migration big data from the first 3 months of the pandemic.Two dimensions of online networking are measured:social support and information sources.Results:First,individuals’online social support(β=0.16,p<0.05)and information sources(β=0.08,p<0.01)are both positively associated to their emotional status during the epidemic.Second,these positive associations are moderated by social status and provincial pandemic control interventions.With regards to the moderation effect of social status,the constructive impact of information sources on emotional well-being is more pronounced among individuals from vulnerable groups compared to those who are not.With regard to the moderation effect of provincial interventions,online social support has the potential to alleviate the adverse repercussions of high rates of confirmed COVID-19 cases and strict lockdown measures while simultaneously augmenting the favorable effects of recovery.Conclusion:The various dimensions of social networking exert distinct effects on emotional status through diverse mechanisms,all of which must be taken into account when designing and adapting pandemic-control interventions. 展开更多
关键词 COVID-19 emotional status online social networking social support information sources
下载PDF
ProbD: Faulty Path Detection Based on Probability in Software-Defined Networking
14
作者 Jiangyuan Yao Jiawen Wang +4 位作者 Shuhua Weng Minrui Wang Deshun Li Yahui Li Xingcan Cao 《Intelligent Automation & Soft Computing》 SCIE 2023年第5期1783-1796,共14页
With the increasing number of switches in Software-Defined Network-ing(SDN),there are more and more faults rising in the data plane.However,due to the existence of link redundancy and multi-path forwarding mechanisms,t... With the increasing number of switches in Software-Defined Network-ing(SDN),there are more and more faults rising in the data plane.However,due to the existence of link redundancy and multi-path forwarding mechanisms,these problems cannot be detected in time.The current faulty path detection mechan-isms have problems such as the large scale of detection and low efficiency,which is difficult to meet the requirements of efficient faulty path detection in large-scale SDN.Concerning this issue,we propose an efficient network path fault testing model ProbD based on probability detection.This model achieves a high prob-ability of detecting arbitrary path fault in the form of small-scale random sam-pling.Under a certain path fault rate,ProbD obtains the curve of sample size and probability of detecting arbitrary path fault by randomly sampling network paths several times.After a small number of experiments,the ProbD model can cor-rectly estimate the path fault rate of the network and calculate the total number of paths that need to be detected according to the different probability of detecting arbitrary path fault and the path fault rate of the network.Thefinal experimental results show that,compared with the full path coverage test,the ProbD model based on probability detection can achieve efficient network testing with less overhead.Besides,the larger the network scale is,the more overhead will be saved. 展开更多
关键词 Probability detection faulty path detection software-defined networking
下载PDF
UltraStar:A Lightweight Simulator of Ultra-Dense LEO Satellite Constellation Networking for 6G 被引量:1
15
作者 Xiaoyu Liu Ting Ma +3 位作者 Zhixuan Tang Xiaohan Qin Haibo Zhou Xuemin(Sherman)Shen 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第3期632-645,共14页
The mega-constellation network has gained significant attention recently due to its great potential in providing ubiquitous and high-capacity connectivity in sixth-generation(6G)wireless communication systems.However,... The mega-constellation network has gained significant attention recently due to its great potential in providing ubiquitous and high-capacity connectivity in sixth-generation(6G)wireless communication systems.However,the high dynamics of network topology and large scale of mega-constellation pose new challenges to the constellation simulation and performance evaluation.In this paper,we introduce UltraStar,a lightweight network simulator,which aims to facilitate the complicated simulation for the emerging mega-constellation of unprecedented scale.Particularly,a systematic and extensible architecture is proposed,where the joint requirement for network simulation,quantitative evaluation,data statistics and visualization is fully considered.For characterizing the network,we make lightweight abstractions of physical entities and models,which contain basic representatives of networking nodes,structures and protocol stacks.Then,to consider the high dynamics of Walker constellations,we give a two-stage topology maintenance method for constellation initialization and orbit prediction.Further,based on the discrete event simulation(DES)theory,a new set of discrete events is specifically designed for basic network processes,so as to maintain network state changes over time.Finally,taking the first-generation Starlink of 11927 low earth orbit(LEO)satellites as an example,we use UltraStar to fully evaluate its network performance for different deployment stages,such as characteristics of constellation topology,performance of end-to-end service and effects of network-wide traffic interaction.The simulation results not only demonstrate its superior performance,but also verify the effectiveness of UltraStar. 展开更多
关键词 Discrete event simulation(DES) mega-constellation network dynamics performance evaluation simulation architecture design
下载PDF
Long-lasting,reinforced electrical networking in a high-loading Li_(2)S cathode for high-performance lithium–sulfur batteries 被引量:1
16
作者 Hun Kim Kyeong-Jun Min +4 位作者 Sangin Bang Jang-Yeon Hwang Jung Ho Kim Chong SYoon Yang-Kook Sun 《Carbon Energy》 SCIE CSCD 2023年第8期1-14,共14页
Realizing a lithium sulfide(Li_(2)S)cathode with both high energy density and a long lifespan requires an innovative cathode design that maximizes electrochemical performance and resists electrode deterioration.Herein... Realizing a lithium sulfide(Li_(2)S)cathode with both high energy density and a long lifespan requires an innovative cathode design that maximizes electrochemical performance and resists electrode deterioration.Herein,a high-loading Li_(2)S-based cathode with micrometric Li_(2)S particles composed of two-dimensional graphene(Gr)and one-dimensional carbon nanotubes(CNTs)in a compact geometry is developed,and the role of CNTs in stable cycling of high-capacity Li–S batteries is emphasized.In a dimensionally combined carbon matrix,CNTs embedded within the Gr sheets create robust and sustainable electron diffusion pathways while suppressing the passivation of the active carbon surface.As a unique point,during the first charging process,the proposed cathode is fully activated through the direct conversion of Li_(2)S into S_(8) without inducing lithium polysulfide formation.The direct conversion of Li_(2)S into S_(8) in the composite cathode is ubiquitously investigated using the combined study of in situ Raman spectroscopy,in situ optical microscopy,and cryogenic transmission electron microscopy.The composite cathode demonstrates unprecedented electrochemical properties even with a high Li_(2)S loading of 10 mg cm^(–2);in particular,the practical and safe Li–S full cell coupled with a graphite anode shows ultra-long-term cycling stability over 800 cycles. 展开更多
关键词 carbon nanotubes electrical network high energy high loading Li_(2)S cathode lithium-sulfur batteries
下载PDF
Malicious Activities Prediction Over Online Social Networking Using Ensemble Model
17
作者 S.Sadhasivam P.Valarmathie K.Dinakaran 《Intelligent Automation & Soft Computing》 SCIE 2023年第4期461-479,共19页
With the vast advancements in Information Technology,the emergence of Online Social Networking(OSN)has also hit its peak and captured the atten-tion of the young generation people.The clone intends to replicate the us... With the vast advancements in Information Technology,the emergence of Online Social Networking(OSN)has also hit its peak and captured the atten-tion of the young generation people.The clone intends to replicate the users and inject massive malicious activities that pose a crucial security threat to the original user.However,the attackers also target this height of OSN utilization,explicitly creating the clones of the user’s account.Various clone detection mechanisms are designed based on social-network activities.For instance,monitoring the occur-rence of clone edges is done to restrict the generation of clone activities.However,this assumption is unsuitable for a real-time environment and works optimally during the simulation process.This research concentrates on modeling and effi-cient clone prediction and avoidance methods to help the social network activists and the victims enhance the clone prediction accuracy.This model does not rely on assumptions.Here,an ensemble Adaptive Random Subspace is used for clas-sifying the clone victims with k-Nearest Neighbour(k-NN)as a base classifier.The weighted clone nodes are analysed using the weighted graph theory concept based on the classified results.When the weighted node’s threshold value is high-er,the trust establishment is terminated,and the clones are ranked and sorted in the higher place for termination.Thus,the victims are alert to the clone propaga-tion over the online social networking end,and the validation is done using the MATLAB 2020a simulation environment.The model shows a better trade-off than existing approaches like Random Forest(RF),Naïve Bayes(NB),and the standard graph model.Various performance metrics like True Positive Rate(TPR),False Alarm Rate(FAR),Recall,Precision,F-measure,and ROC and run time analysis are evaluated to show the significance of the model. 展开更多
关键词 Online social network decision tree weighted measure clone attack predictive measures
下载PDF
TCP-LTE/5G Cross-layer performance analysis tool for high mobility data networking and a case study on high-speed railway
18
作者 Ruihan Li Yueyang Pan +2 位作者 Xiangtian Ma Haotian Xu Chenren Xu 《High-Speed Railway》 2023年第2期141-146,共6页
Nowadays,high mobility scenarios have become increasingly common.The widespread adoption of High-speed Rail(HSR)in China exemplifies this trend,while more promising use cases,such as vehicle-to-everything,continue to ... Nowadays,high mobility scenarios have become increasingly common.The widespread adoption of High-speed Rail(HSR)in China exemplifies this trend,while more promising use cases,such as vehicle-to-everything,continue to emerge.However,the Internet access provided in high mobility environments stllstruggles to achieve seamless connectivity.The next generation of wireless cellular technology 5 G further poses more requirements on the endto-end evolution to fully utilize its ultra-high band-width,while existing network diagnostic tools focus on above-IP layers or below-IP layers only.We then propose HiMoDiag,which enables flexible online analysis of the network performance in a cross-layer manner,i.e.,from the top(application layer)to the bottom(physical layer).We believe HiMoDiag could greatly simplify the process of pinpointing the deficiencies of the Internet access delivery on HSR,lead to more timely optimization and ultimately help to improve the network performance. 展开更多
关键词 LTE 5G Cellular networks High mobility TCP Network diagnostics High-speed railway
下载PDF
A Survey of Applications Research on Content-Centric Networking 被引量:2
19
作者 Xiuquan Qiao Hongyi Wang +3 位作者 Wei Tan Athanasios V.Vasilakos Junliang Chen MBrian Blake 《China Communications》 SCIE CSCD 2019年第9期122-140,共19页
As a named data-based clean-slate future Internet architecture,Content-Centric Networking(CCN)uses entirely different protocols and communication patterns from the host-to-host IP network.In CCN,communication is wholl... As a named data-based clean-slate future Internet architecture,Content-Centric Networking(CCN)uses entirely different protocols and communication patterns from the host-to-host IP network.In CCN,communication is wholly driven by the data consumer.Consumers must send Interest packets with the content name and not by the host’s network address.Its nature of in-network caching,Interest packets aggregation and hop-byhop communication poses unique challenges to provision of Internet applications,where traditional IP network no long works well.This paper presents a comprehensive survey of state-of-the-art application research activities related to CCN architecture.Our main aims in this survey are(a)to identify the advantages and drawbacks of CCN architectures for application provisioning;(b)to discuss the challenges and opportunities regarding service provisioning in CCN architectures;and(c)to further encourage deeper thinking about design principles for future Internet architectures from the perspective of upper-layer applications. 展开更多
关键词 Content-centric networking(CCN) named-data networking (NDN) APPLICATIONS information-centric networking FUTURE Internet
下载PDF
基于USB Networking实现嵌入式linux系统GDB远程调试 被引量:1
20
作者 周念东 胡晨 《电子器件》 CAS 2004年第4期724-728,共5页
简要介绍了在以 Intel Xscale系列的微处理器 PXA2 5 5为平台的嵌入式 linux下 ,利用 pxa2 5 5片上的 USBclient控制器实现 USB Networking功能 ,并建立目标板环境的 SSH server和 GDB remote server,实现
关键词 嵌入式LINUX USB networking SSH GDB远程调试
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部