期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
An Adaptive User Service Deployment Strategy for Mobile Edge Computing 被引量:1
1
作者 Gang Li Jingbo Miao +4 位作者 Zihou Wang yanni han Hongyan Tan Yanwei Liu Kun Zhai 《China Communications》 SCIE CSCD 2022年第10期238-249,共12页
Mobile edge computing(MEC) is a cloud server running at the edge of a mobile network, which can effectively reduce network communication delay. However, due to the numerous edge servers and devices in the MEC, there m... Mobile edge computing(MEC) is a cloud server running at the edge of a mobile network, which can effectively reduce network communication delay. However, due to the numerous edge servers and devices in the MEC, there may be multiple servers and devices that can provide services to the same user simultaneously. This paper proposes a userside adaptive user service deployment algorithm ASD(Adaptive Service Deployment) based on reinforcement learning algorithms. Without relying on complex system information, it can master only a few tasks and users. In the case of attributes, perform effective service deployment decisions, analyze and redefine the key parameters of existing algorithms, and dynamically adjust strategies according to task types and available node types to optimize user experience delay. Experiments show that the ASD algorithm can implement user-side decision-making for service deployment. While effectively improving parameter settings in the traditional Multi-Armed Bandit algorithm,it can reduce user-perceived delay and enhance service quality compared with other strategies. 展开更多
关键词 edge computing adaptive algorithm reinforcement learning computing unloading service deployment
在线阅读 下载PDF
Motif-based Classification in Journal Citation Networks 被引量:1
2
作者 Wenchen Wu yanni han Deyi Li 《Journal of Software Engineering and Applications》 2008年第1期53-59,共7页
Journals and their citation relations are abstracted into journal citation networks, basing on CSTPC journal database from year 2003 to 2006. The network shows some typical characteristics from complex networks. This ... Journals and their citation relations are abstracted into journal citation networks, basing on CSTPC journal database from year 2003 to 2006. The network shows some typical characteristics from complex networks. This paper presents the idea of using motifs, subgraphs with higher occurrence in real network than in random ones, to discover two different citation patterns in journal communities. And a further investigation is addressed on both motif granularity and node centrality to figure out some reasons on the differences between two kinds of communities in journal citation network. 展开更多
关键词 MOTIF CLASSIFICATION JOURNAL CITATION NETWORKS
暂未订购
Highly efficient removal of perfluorooctanoic acid from aqueous solution by H2O2-enhanced electrocoagulation-electroflotation technique 被引量:2
3
作者 Bo Yang yanni han +3 位作者 Yunpan Deng Yingying Li Qiongfang Zhuo Jinhua Wu 《Emerging Contaminants》 2016年第1期49-55,共7页
Electrocoagulation(EC)technique was used to investigate the removal performance of aqueous perfluorooctanoic acid(PFOA)with relatively high concentration as simulating the wastewater from organic fluorine industry.A c... Electrocoagulation(EC)technique was used to investigate the removal performance of aqueous perfluorooctanoic acid(PFOA)with relatively high concentration as simulating the wastewater from organic fluorine industry.A comparison was done with the similar amount of coagulant between EC and chemical coagulation process.PFOA removal obtained was higher with EC process,especially for Fe anode.Several factors were studied to optimize the EC process.At the optimal operating parameters including 37.5 mA/cm^2 of current density,initial pH 3.77,and 180 rpm of mixing speed,93%of PFOA could be removed with 100 mg/L of initial concentration after 90-min electrolysis.Furthermore,the remove efficiency could be obviously improved by H2O2 intermittent addition,which removed more than 99%of PFOA within 40-min EC.It could be attributed to that H2O2 facilitated the oxidative transformation from ferrous to ferric ion.In addition,the adsorptive removal of aqueous PFOA on Fe flocs during EC was also verified by fourier transform infrared spectra. 展开更多
关键词 ELECTROCOAGULATION PFOA removal Fe electrode H2O2 addition
原文传递
Topology-aware virtual network embedding based on closeness centrality 被引量:5
4
作者 Zihou WANG yanni han +3 位作者 Tao LIN Yuemei XU Song CI Hui TANG 《Frontiers of Computer Science》 SCIE EI CSCD 2013年第3期446-457,共12页
Network virtualization aims to provide a way to overcome ossification of the Internet. However, making efficient use of substrate resources requires effective techniques for embedding virtual networks: mapping virtua... Network virtualization aims to provide a way to overcome ossification of the Internet. However, making efficient use of substrate resources requires effective techniques for embedding virtual networks: mapping virtual nodes and virtual edges onto substrate networks. Previous research has presented several heuristic algorithms, which fail to consider that the attributes of the substrate topology and virtual net- works affect the embedding process. In this paper, for the first time, we introduce complex network centrality analysis into the virtual network embedding, and propose virtual network embedding algorithms based on closeness centrality. Due to considering of the attributes of nodes and edges in the topology, our studies are more reasonable than existing work. In addition, with the guidance of topology quantitative evalua- tion, the proposed network embedding approach largely improves the network utilization efficiency and decreases the embedding complexity. We also investigate our algorithms on real network topologies (e.g., AT&T, DFN) and random network topologies. Experimental results demonstrate the usability and capability of the proposed approach. 展开更多
关键词 network virtualization virtual network embedding complex networks closeness centrality
原文传递
A cost-effective scheme supporting adaptive service migration in cloud data center 被引量:1
5
作者 Bing YU yanni han +2 位作者 hanning YUAN Xu ZHOU Zhen XU 《Frontiers of Computer Science》 SCIE EI CSCD 2015年第6期875-886,共12页
Cloud computing as an emerging technology promises to provide reliable and available services on de- mand. However, offering services for mobile requirements without dynamic and adaptive migration may hurt the perform... Cloud computing as an emerging technology promises to provide reliable and available services on de- mand. However, offering services for mobile requirements without dynamic and adaptive migration may hurt the performance of deployed services. In this paper, we propose MAMOC, a cost-effective approach for selecting the server and migrating services to attain enhanced QoS more econom- ically. The goal of MAMOC is to minimize the total operating cost while guaranteeing the constraints of resource de- mands, storage capacity, access latency and economies, including selling price and reputation grade. First, we devise an objective optimal model with multi-constraints, describing the relationship among operating cost and the above con- straints. Second, a normalized method is adopted to calculate the operating cost for each candidate VM. Then we give a de- tailed presentation on the online algorithm MAMOC, which determines the optimal server. To evaluate the performance of our proposal, we conducted extensive simulations on three typical network topologies and a realistic data center net- work. Results show that MAMOC is scalable and robust with the larger scales of requests and VMs in cloud environment. Moreover, MAMOC decreases the competitive ratio by identifying the optimal migration paths, while ensuring the constraints of SLA as satisfying as possible. 展开更多
关键词 cloud computing software-defined networking data center service migration QoS
原文传递
A flexible approach for cyber threat hunting based on kernel audit records
6
作者 Fengyu Yang yanni han +2 位作者 Ying Ding Qian Tan Zhen Xu 《Cybersecurity》 EI CSCD 2022年第3期74-89,共16页
Hunting the advanced threats hidden in the enterprise networks has always been a complex and difficult task.Due to the variety of attacking means,it is difficult for traditional security systems to detect threats.Most... Hunting the advanced threats hidden in the enterprise networks has always been a complex and difficult task.Due to the variety of attacking means,it is difficult for traditional security systems to detect threats.Most existing methods analyze log records,but the amount of log records generated every day is very large.How to find the information related to the attack events quickly and effectively from massive data streams is an important problem.Considering that the knowledge graph can be used for automatic relation calculation and complex relation analysis,and can get relatively fast feedback,our work proposes to construct the knowledge graph based on kernel audit records,which fully considers the global correlation among entities observed in audit logs.We design the construction and application process of knowledge graph,which can be applied to actual threat hunting activities.Then we explore different ways to use the constructed knowledge graph for hunting actual threats in detail.Finally,we implement a LAN-wide hunting system which is convenient and flexible for security analysts.Evaluations based on the adversarial engagement designed by DARPA prove that our platform can effectively hunt sophisticated threats,quickly restore the attack path or assess the impact of attack. 展开更多
关键词 Advanced persistent threat Cyber threat hunting Kernel audit log Knowledge graph
原文传递
VAECGAN:a generating framework for long-term prediction in multivariate time series
7
作者 Xiang Yin yanni han +1 位作者 Zhen Xu Jie Liu 《Cybersecurity》 EI CSCD 2021年第1期337-348,共12页
Long-term prediction is still a difficult problem in data mining.People usually use various kinds of methods of Recurrent Neural Network to predict.However,with the increase of the prediction step,the accuracy of pred... Long-term prediction is still a difficult problem in data mining.People usually use various kinds of methods of Recurrent Neural Network to predict.However,with the increase of the prediction step,the accuracy of prediction decreases rapidly.In order to improve the accuracy of long-term prediction,we propose a framework Variational Auto-Encoder Conditional Generative Adversarial Network(VAECGAN).Our model is divided into three parts.The first part is the encoder net,which can encode the exogenous sequence into latent space vectors and fully save the information carried by the exogenous sequence.The second part is the generator net which is responsible for generating prediction data.In the third part,the discriminator net is used to classify and feedback,adjust data generation and improve prediction accuracy.Finally,extensive empirical studies tested with five real-world datasets(NASDAQ,SML,Energy,EEG,KDDCUP)demonstrate the effectiveness and robustness of our proposed approach. 展开更多
关键词 Long-term prediction Multivariate time series Attention mechanism Generating framework
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部