期刊文献+
共找到18,843篇文章
< 1 2 250 >
每页显示 20 50 100
Correlation dimension based nonlinear analysis of network traffics with different application protocols 被引量:1
1
作者 王俊松 袁静 +1 位作者 李强 袁睿翕 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第5期174-178,共5页
This paper uses a correlation dimension based nonlinear analysis approach to analyse the dynamics of network traffics with three different application protocols-HTTP, FTP and SMTP. First, the phase space is reconstruc... This paper uses a correlation dimension based nonlinear analysis approach to analyse the dynamics of network traffics with three different application protocols-HTTP, FTP and SMTP. First, the phase space is reconstructed and the embedding parameters are obtained by the mutual information method. Secondly, the correlation dimensions of three different traffics are calculated and the results of analysis have demonstrated that the dynamics of the three different application protocol traffics is different from each other in nature, i.e. HTTP and FTP traffics are chaotic, furthermore, the former is more complex than the later; on the other hand, SMTP traffic is stochastic. It is shown that correlation dimension approach is an efficient method to understand and to characterize the nonlinear dynamics of HTTP, FTP and SMTP protocol network traffics. This analysis provided insight into and a more accurate understanding of nonlinear dynamics of internet traffics which have a complex mixture of chaotic and stochastic components. 展开更多
关键词 application protocol network traffic correlation dimension CHAOS
原文传递
Application Research of Wireless Sensor Networks and the Internet of Things 被引量:1
2
作者 Changjian Lv Rui Wang Man Zhao 《Journal of Electronic Research and Application》 2025年第4期283-289,共7页
In the context of the rapid iteration of information technology,the Internet of Things(IoT)has established itself as a pivotal hub connecting the digital world and the physical world.Wireless Sensor Networks(WSNs),dee... In the context of the rapid iteration of information technology,the Internet of Things(IoT)has established itself as a pivotal hub connecting the digital world and the physical world.Wireless Sensor Networks(WSNs),deeply embedded in the perception layer architecture of the IoT,play a crucial role as“tactile nerve endings.”A vast number of micro sensor nodes are widely distributed in monitoring areas according to preset deployment strategies,continuously and accurately perceiving and collecting real-time data on environmental parameters such as temperature,humidity,light intensity,air pressure,and pollutant concentration.These data are transmitted to the IoT cloud platform through stable and reliable communication links,forming a massive and detailed basic data resource pool.By using cutting-edge big data processing algorithms,machine learning models,and artificial intelligence analysis tools,in-depth mining and intelligent analysis of these multi-source heterogeneous data are conducted to generate high-value-added decision-making bases.This precisely empowers multiple fields,including agriculture,medical and health care,smart home,environmental science,and industrial manufacturing,driving intelligent transformation and catalyzing society to move towards a new stage of high-quality development.This paper comprehensively analyzes the technical cores of the IoT and WSNs,systematically sorts out the advanced key technologies of WSNs and the evolution of their strategic significance in the IoT system,deeply explores the innovative application scenarios and practical effects of the two in specific vertical fields,and looks forward to the technological evolution trends.It provides a detailed and highly practical guiding reference for researchers,technical engineers,and industrial decision-makers. 展开更多
关键词 Wireless Sensor networks Internet of Things Key technologies application fields
在线阅读 下载PDF
Data Concurrent Transmission MAC Protocol for Application Oriented Underwater Acoustic Sensor Networks 被引量:1
3
作者 Xiaoxiao Zhuo Hong Yang +3 位作者 Meiyan Liu Yan Wei Guanding Yu Fengzhong Qu 《China Communications》 SCIE CSCD 2022年第10期220-237,共18页
With the increasing demand for marine exploration, underwater acoustic sensor networks (UASNs) are prone to have the characteristics of large-scale, long term monitoring, and high data traffic load. Underwater media a... With the increasing demand for marine exploration, underwater acoustic sensor networks (UASNs) are prone to have the characteristics of large-scale, long term monitoring, and high data traffic load. Underwater media access control (MAC) protocols, which allow multiple users to share the common medium fairly and efficiently, are essential for the performance of UASNs. However, the design of MAC protocols is confronted with the challenges of spatial unfairness, data eruption, and low energy efficiency. In this paper, we propose a novel data concurrent transmission (DCT) MAC protocol, which is able to exploit long propagation delay and conduct concurrent transmission. Specifically, we present the theoretical performance analysis of the proposed MAC protocol in detail and give an analytical solution of the success concurrent transmission probability between nodes. In addition, simulation results are provided to demonstrate that our proposed protocol is appropriate for UASNs and can significantly improve the performance in terms of network throughput and energy consumption. Finally, we give some typical future applications of UASNs and discuss the demands on MAC protocol design. 展开更多
关键词 underwater acoustic sensor networks MAC protocols data concurrent transmission
在线阅读 下载PDF
Efficacy and safety of acupoint application for gastrointestinal function in treating post-stroke depression:Protocol for a randomized controlled trial
4
作者 Xuan Zhang Shuhui Li +2 位作者 Juntao Wang Chung Tai Lau Jacky C.P.Chan 《Journal of Traditional Chinese Medical Sciences》 2025年第4期552-558,共7页
Objective:To evaluate the efficacy and safety of acupoint application for post-stroke depression(PSD)by regulating gastrointestinal function.A secondary objective is to explore the potential mechanism underlying this ... Objective:To evaluate the efficacy and safety of acupoint application for post-stroke depression(PSD)by regulating gastrointestinal function.A secondary objective is to explore the potential mechanism underlying this approach from the perspective of gut microbiota.Methods:This multicenter,randomized,double-blind(patients and assessors),placebo-controlled trial will enroll 80 patients with PSD,and include a 1-week run-in period,a 4-week treatment phase,and a 12-week follow-up.Eligible participants will randomly be assigned in a 1:1 ratio to either the acupoint application or placebo(non-acupoint)groups.Treatments will be administered thrice weekly for 4 weeks.The primary outcome is change in the Hamilton Rating Scale for Depression(HAMD)score.Secondary outcomes include the Beck Depression Inventory(BDI),36-Item Short-Form Health Survey(SF-36),Barthel Index of Activities of Daily Living,Social Adaptation Self-Evaluation Scale(SASS),and gut microbiota profiling.All outcomes will be assessed at baseline(prior to treatment),during treatment(weeks 2 and 4),and during follow-up(weeks 8,12,and 16).The Treatment Emergent Symptom Scale(TESS)will be used for evaluation throughout the 4-week treatment phase.Discussion:The results of this study will provide important evidence supporting a novel treatment strategy for PSD that targets gastrointestinal regulation,potentially informing future clinical practice. 展开更多
关键词 Acupoint application Gut microbiota Post-stroke depression protocol Randomized controlled trial
暂未订购
Flex-QUIC:AI for QUIC Transport Protocol with High-Efficiency in Future Wireless Networks
5
作者 Jiang Tao Liu Yang +2 位作者 Zhang Yu Peng Miaoran Wang Haoyu 《China Communications》 2025年第12期1-14,共14页
This paper proposes Flex-QUIC,an AIempowered quick UDP Internet connections(QUIC)enhancement framework that addresses the challenge of degraded transmission efficiency caused by the static parameterization of acknowle... This paper proposes Flex-QUIC,an AIempowered quick UDP Internet connections(QUIC)enhancement framework that addresses the challenge of degraded transmission efficiency caused by the static parameterization of acknowledgment(ACK)mechanisms,loss detection,and forward error correction(FEC)in dynamic wireless networks.Unlike the standard QUIC protocol,Flex-QUIC systematically integrates machine learning across three critical modules to achieve high-efficiency operation.First,a contextual multi-armed bandit-based ACK adaptation mechanism optimizes the ACK ratio to reduce wireless channel contention.Second,the adaptive loss detection module utilizes a long short-term memory(LSTM)model to predict the reordering displacement for optimizing the packet reordering tolerance.Third,the FEC transmission scheme jointly adjusts the redundancy level based on the LSTM-predicted loss rate and congestion window state.Extensive evaluations across Wi-Fi,5G,and satellite network scenarios demonstrate that Flex-QUIC significantly improves throughput and latency reduction compared to the standard QUIC and other enhanced QUIC variants,highlighting its adaptability to diverse and dynamic network conditions.Finally,we further discuss open issues in deploying AI-native transport protocols. 展开更多
关键词 contextual multi-armed bandit long shortterm memory QUIC transport protocol wireless networks
在线阅读 下载PDF
Dynamic channel estimation-aware routing protocol in mobile cognitive radio networks for smart IIoT applications
6
作者 Qusay M.Salih Md Arafatur Rahman +4 位作者 A.Taufiq Asyhari Muhammad Kamran Naeem Mohammad Patwary Ryan Alturki Mohammed Abdulaziz Ikram 《Digital Communications and Networks》 SCIE CSCD 2023年第2期367-382,共16页
Cognitive Radio Networks(CRNs)have become a successful platform in recent years for a diverse range of future systems,in particularly,industrial internet of things(IIoT)applications.In order to provide an efficient co... Cognitive Radio Networks(CRNs)have become a successful platform in recent years for a diverse range of future systems,in particularly,industrial internet of things(IIoT)applications.In order to provide an efficient connection among IIoT devices,CRNs enhance spectrum utilization by using licensed spectrum.However,the routing protocol in these networks is considered one of the main problems due to node mobility and time-variant channel selection.Specifically,the channel selection for routing protocol is indispensable in CRNs to provide an adequate adaptation to the Primary User(PU)activity and create a robust routing path.This study aims to construct a robust routing path by minimizing PU interference and routing delay to maximize throughput within the IIoT domain.Thus,a generic routing framework from a cross-layer perspective is investigated that intends to share the information resources by exploiting a recently proposed method,namely,Channel Availability Probability.Moreover,a novel cross-layer-oriented routing protocol is proposed by using a time-variant channel estimation technique.This protocol combines lower layer(Physical layer and Data Link layer)sensing that is derived from the channel estimation model.Also,it periodically updates and stores the routing table for optimal route decision-making.Moreover,in order to achieve higher throughput and lower delay,a new routing metric is presented.To evaluate the performance of the proposed protocol,network simulations have been conducted and also compared to the widely used routing protocols,as a benchmark.The simulation results of different routing scenarios demonstrate that our proposed solution outperforms the existing protocols in terms of the standard network performance metrics involving packet delivery ratio(with an improved margin of around 5–20%approximately)under varying numbers of PUs and cognitive users in Mobile Cognitive Radio Networks(MCRNs).Moreover,the cross-layer routing protocol successfully achieves high routing performance in finding a robust route,selecting the high channel stability,and reducing the probability of PU interference for continued communication. 展开更多
关键词 Channel selection Cross-layer design Mobile cognitive radio networks Routing protocol IIoT applications
在线阅读 下载PDF
Wireless Application Protocol for Potential Threats to Mobile Agent Network Security
7
作者 M. Indra Sena Reddy K. Subba Reddy +1 位作者 P. J. Bhatt Rajeev Chetwani 《Journal of Electronic Science and Technology》 CAS 2012年第3期215-219,共5页
The wireless application protocol (WAP) protocol is now the leading standard for information services on wireless terminals like digital mobile phones. By the use of WAP, wireless devices, like mobile phones, are po... The wireless application protocol (WAP) protocol is now the leading standard for information services on wireless terminals like digital mobile phones. By the use of WAP, wireless devices, like mobile phones, are possibly infected with virus and worms. Though up to now there is no such attack, as the usage of script languages increases, there is a chance of malicious code injection. This paper discusses the threats with current WAP protocol, and how changes in the protocol and the increase in its usage will enable entry of real viruses. Future threat scenarios are presented along with suggestions to avoid these problems. 展开更多
关键词 Mobile agent SECURITY threats wireless application protocol.
在线阅读 下载PDF
An IEEE 802.15.4 Based Adaptive Communication Protocol in Wireless Sensor Network: Application to Monitoring the Elderly at Home
8
作者 Juan Lu Adrien Van Den Bossche Eric Campo 《Wireless Sensor Network》 2014年第9期192-204,共13页
Monitoring behaviour of the elderly and the disabled living alone has become a major public health problem in our modern societies. Among the various scientific aspects involved in the home monitoring field, we are in... Monitoring behaviour of the elderly and the disabled living alone has become a major public health problem in our modern societies. Among the various scientific aspects involved in the home monitoring field, we are interested in the study and the proposal of a solution allowing distributed sensor nodes to communicate with each other in an optimal way adapted to the specific application constraints. More precisely, we want to build a wireless network that consists of several short range sensor nodes exchanging data between them according to a communication protocol at MAC (Medium Access Control) level. This protocol must be able to optimize energy consumption, transmission time and loss of information. To achieve this objective, we have analyzed the advantages and the limitations of WSN (Wireless Sensor Network) technologies and communication protocols currently used in relation to the requirements of our application. Then we proposed a deterministic, adaptive and energy saving medium access method based on the IEEE 802.15.4 physical layer and a mesh topology. It ensures the message delivery time with strongly limited collision risk due to the spatial reuse of medium in the two-hop neighbourhood. This proposal was characterized by modelling and simulation using OPNET network simulator. Finally we implemented the proposed mechanisms on hardware devices and deployed a sensors network in real situation to verify the accuracy of the model and evaluate the proposal according to different test configurations. 展开更多
关键词 Wireless Sensor network Medium Access Control Quality of Service Energy SAVING Mesh Topology IEEE 802.15.4 Indoor MONITORING application
暂未订购
SLEACH: Secure Low-Energy Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks 被引量:12
9
作者 WANGXiao-yun YANGLi-zhen CHENKe-fei 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期127-131,共5页
LEACH (Low-Encrgy Adaptive Clustering Hi-erarchy) protocol is a basic clustering-based routing protocol of sensor networks. In this paper, we present the design of SLEACH, asecure extension for the LEACH protocol. We ... LEACH (Low-Encrgy Adaptive Clustering Hi-erarchy) protocol is a basic clustering-based routing protocol of sensor networks. In this paper, we present the design of SLEACH, asecure extension for the LEACH protocol. We divide SLEACH into four phases and fit inexpensivecryplp-graphic operations to each part of the protocol functionality to create an efficient,practical protocol. Then we give security analyses of SLEACH. Our security analyses show that ourschemeis robust against any external attacker or compromised nodes in the sensor network. 展开更多
关键词 wireless sensoi network routing protocol SECURITY
在线阅读 下载PDF
AeroMTP:A fountain code-based multipath transport protocol for airborne networks 被引量:4
10
作者 Li Jie Gong Erling +2 位作者 Sun Zhiqiang Liu Wei Xie Hongwei 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2015年第4期1147-1162,共16页
Airborne networks(ANs) are special types of ad hoc networks that can be used to enhance situational awareness, flight coordination and flight efficiency in civil and military aviation.Compared to ground networks, AN... Airborne networks(ANs) are special types of ad hoc networks that can be used to enhance situational awareness, flight coordination and flight efficiency in civil and military aviation.Compared to ground networks, ANs have some unique attributes including high node mobility, frequent topology changes, mechanical and aerodynamic constrains, strict safety requirements and harsh communication environment.Thus, the performance of conventional transmission control protocol(TCP) will be dramatically degraded in ANs.Aircraft commonly have two or more heterogeneous network interfaces which offer an opportunity to form multiple communication paths between any two nodes in ANs.To satisfy the communication requirements in ANs, we propose aeronautical multipath transport protocol(Aero MTP) for ANs, which effectively utilizes the available bandwidth and diversity provided by heterogeneous wireless paths.Aero MTP uses fountain codes as forward error correction(FEC) codes to recover from data loss and deploys a TCP-friendly rate-based congestion control mechanism for each path.Moreover, we design a packet allocation algorithm based on optimization to minimize the delivery time of blocks.The performance of Aero MTP is evaluated through OMNe T++ simulations under a variety of test scenarios.Simulations demonstrate that Aero MTP is of great potential to be applied to ANs. 展开更多
关键词 Ad hoc networks Airborne networks Fountain code Multi-paths network protocols
原文传递
A Dynamic Protocol Stack Structure for Diversified QoS Requirements in Ad Hoc Network 被引量:3
11
作者 DONG Fang Li Ou +1 位作者 RAN Xiaomin JIN Feicai 《China Communications》 SCIE CSCD 2016年第S1期43-53,共11页
A dynamic protocol stack(DPS) for ad hoc networks, together with a protocol stack construction scheme that is modeled as a multiconstrained knapsack problem is proposed. Compared to the traditional static protocol sta... A dynamic protocol stack(DPS) for ad hoc networks, together with a protocol stack construction scheme that is modeled as a multiconstrained knapsack problem is proposed. Compared to the traditional static protocol stack, DPS operates in a dynamic and adaptive manner and is scalable to network condition changes. In addition, a protocol construction algorithm is proposed to dynamically construct of the protocol stack each network node. Simulation results show that, the processing and forwarding performance of our scheme is close to 1 Gb/s, and the performance of our algorithm is close to that of the classical algorithms with much lower complexity. 展开更多
关键词 ad HOC network QoS GUARANTEE DYNAMIC protocol STACK protocol construction algorithm
在线阅读 下载PDF
Application reliability for communication networks and its analysis method 被引量:6
12
作者 Ning Huang Yang Chen +2 位作者 Dong Hou Liudong Xing Rui Kang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2011年第6期1030-1036,共7页
The network reliability is difficult to be evaluated because of the complex relationship among the network components.It can be quite different for different users running different applications on the same network.Th... The network reliability is difficult to be evaluated because of the complex relationship among the network components.It can be quite different for different users running different applications on the same network.This paper proposes a new concept and a model of application reliability.Different from the existing models that ignores the effects of applications,the proposed application reliability model considers the effects of different applications on the network performance and different types of network faults and makes the analysis of network components relationship possible.This paper also provides a method to evaluate the application reliability when the data flow satisfies Markov properties.Finally,a case study is presented to illustrate the proposed network reliability model and the analysis method. 展开更多
关键词 application reliability performance reliability service reliability network Markov model.
在线阅读 下载PDF
Quantum key distribution series network protocol with M-classical Bobs 被引量:4
13
作者 张现周 公伟贵 +2 位作者 谭勇刚 任振忠 郭笑天 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第6期2143-2148,共6页
Secure key distribution among classical parties is impossible both between two parties and in a network. In this paper, we present a quantum key distribution (QKD) protocol to distribute secure key bits among one qu... Secure key distribution among classical parties is impossible both between two parties and in a network. In this paper, we present a quantum key distribution (QKD) protocol to distribute secure key bits among one quantum party and numerous classical parties who have no quantum capacity. We prove that our protocol is completely robust, i.e., any eavesdropping attack should be detected with nonzero probability. Our calculations show that our protocol may be secure against Eve's symmetrically individual attack. 展开更多
关键词 quantum key distribution symmetrical attack network protocol
原文传递
Network Protocol Recognition Based on Convolutional Neural Network 被引量:5
14
作者 Wenbo Feng Zheng Hong +3 位作者 Lifa Wu Menglin Fu Yihao Li Peihong Lin 《China Communications》 SCIE CSCD 2020年第4期125-139,共15页
How to correctly acquire the appropriate features is a primary problem in network protocol recognition field.Aiming to avoid the trouble of artificially extracting features in traditional methods and improve recogniti... How to correctly acquire the appropriate features is a primary problem in network protocol recognition field.Aiming to avoid the trouble of artificially extracting features in traditional methods and improve recognition accuracy,a network protocol recognition method based on Convolutional Neural Network(CNN)is proposed.The method utilizes deep learning technique,and it processes network flows automatically.Firstly,normalization is performed on the intercepted network flows and they are mapped into two-dimensional matrix which will be used as the input of CNN.Then,an improved classification model named Ptr CNN is built,which can automatically extract the appropriate features of network protocols.Finally,the classification model is trained to recognize the network protocols.The proposed approach is compared with several machine learning methods.Experimental results show that the tailored CNN can not only improve protocol recognition accuracy but also ensure the fast convergence of classification model and reduce the classification time. 展开更多
关键词 convolutional NEURAL network protocol RECOGNITION network FLOW CLASSIFICATION model
在线阅读 下载PDF
THEORY AND APPLICATION OF πBRIDGE HYDRAULIC RESISTANCE NETWORKS 被引量:3
15
作者 Yanping, Hu Jianhua, Wei +2 位作者 Yingfu, Guo Genmao, Wu Deshun, Liu 《中国有色金属学会会刊:英文版》 EI CSCD 1999年第1期204-208,共5页
1INTRODUCTIONTherearetwokindsofhydraulicnetworks,i.e.4armsbridgehydraulicresistancenetworkandhalfbridgehydra... 1INTRODUCTIONTherearetwokindsofhydraulicnetworks,i.e.4armsbridgehydraulicresistancenetworkandhalfbridgehydraulicresistancene... 展开更多
关键词 HYDRAULIC RESISTANCE network THEORY application
在线阅读 下载PDF
An Efcient Hop Count Routing Protocol for Wireless Ad Hoc Networks 被引量:3
16
作者 Xu Zhang Zhi-Hong Qian +1 位作者 Yu-Qi Guo Xue Wang 《International Journal of Automation and computing》 EI CSCD 2014年第1期93-99,共7页
An efcient hop count route fnding approach for mobile ad hoc network is presented in this paper.It is an adaptive routing protocol that has a tradeof between transmission power and hop count for wireless ad hoc networ... An efcient hop count route fnding approach for mobile ad hoc network is presented in this paper.It is an adaptive routing protocol that has a tradeof between transmission power and hop count for wireless ad hoc networks.During the route fnding process,the node can dynamically assign transmission power to nodes along the route.The node who has received route request message compares its power with the threshold power value,and then selects a reasonable route according to discriminating algorithms.This algorithm is an efective solution scheme to wireless ad hoc networks through reasonably selected path to reduce network consumption.Simulation results indicate that the proposed protocol can deliver better performances with respect to energy consumption and end-to-end delay. 展开更多
关键词 Wireless ad hoc networks routing protocol hop count THRESHOLD transmission power
原文传递
Reliable adaptive multicast protocol in wireless Ad hoc networks 被引量:3
17
作者 Sun Baolin Li Layuan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第1期187-192,共6页
In wireless ad hoe network environments, every link is wireless and every node is mobile. Those features make data lost easily as well as multicasting inefficient and unreliable. Moreover, Efficient and reliable multi... In wireless ad hoe network environments, every link is wireless and every node is mobile. Those features make data lost easily as well as multicasting inefficient and unreliable. Moreover, Efficient and reliable multicast in wireless ad hoe network is a difficult issue. It is a major challenge to transmission delays and packet losses due to link changes of a multicast tree at the provision of high delivery ratio for each packet transmission in wireless ad hoe network environment. In this paler, we propose and evaluate Reliable Adaptive Multicast Protocol (RAMP) based on a relay node concept. Relay nodes are placed along the multieast tree. Data recovery is done between relay nodes. RAMP supports a reliable multicasting suitable for mobile ad hoe network by reducing the number of packet retransmissions. We compare RAMP with SRM (Scalable Reliable Multicast). Simulation results show that the RAMP has high delivery ratio and low end-to-end delay for packet transmsission. 展开更多
关键词 muhicast multicast protocol reliable muhicast wireless ad hoc networks.
在线阅读 下载PDF
Prediction-based protocol for mobile target tracking in wireless sensor networks 被引量:3
18
作者 Liang Xue Zhixin Liu Xinping Guan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2011年第2期347-352,共6页
Remote tracking for mobile targets is one of the most important applications in wireless sensor networks (WSNs). A target tracking protoco–exponential distributed predictive tracking (EDPT) is proposed. To reduce... Remote tracking for mobile targets is one of the most important applications in wireless sensor networks (WSNs). A target tracking protoco–exponential distributed predictive tracking (EDPT) is proposed. To reduce energy waste and response time, an improved predictive algorithm–exponential smoothing predictive algorithm (ESPA) is presented. With the aid of an additive proportion and differential (PD) controller, ESPA decreases the system predictive delay effectively. As a recovery mechanism, an optimal searching radius (OSR) algorithm is applied to calculate the optimal radius of the recovery zone. The simulation results validate that the proposed EDPT protocol performes better in terms of track failed ratio, energy waste ratio and enlarged sensing nodes ratio, respectively. 展开更多
关键词 wireless sensor network target tracking protocol predictive algorithm recovery mechanism.
在线阅读 下载PDF
A Novel Deep Learning Method for Application Identification in Wireless Network 被引量:8
19
作者 Jie Ren Zulin Wang 《China Communications》 SCIE CSCD 2018年第10期73-83,共11页
In modern wireless communication network, the increased consumer demands for multi-type applications and high quality services have become a prominent trend, and put considerable pressure on the wireless network. In t... In modern wireless communication network, the increased consumer demands for multi-type applications and high quality services have become a prominent trend, and put considerable pressure on the wireless network. In that case, the Quality of Experience(Qo E) has received much attention and has become a key performance measurement for the application and service. In order to meet the users' expectations, the management of the resource is crucial in wireless network, especially the Qo E based resource allocation. One of the effective way for resource allocation management is accurate application identification. In this paper, we propose a novel deep learning based method for application identification. We first analyse the requirement of managing Qo E for wireless communication, and review the limitation of the traditional identification methods. After that, a deep learning based method is proposed for automatically extracting the features and identifying the type of application. The proposed method is evaluated by using the practical wireless traffic data, and the experiments verify the effectiveness of our method. 展开更多
关键词 quality of experience application identification protocol identification deeplearning feature extraction
在线阅读 下载PDF
A Survey of Applications Research on Content-Centric Networking 被引量:2
20
作者 Xiuquan Qiao Hongyi Wang +3 位作者 Wei Tan Athanasios V.Vasilakos Junliang Chen MBrian Blake 《China Communications》 SCIE CSCD 2019年第9期122-140,共19页
As a named data-based clean-slate future Internet architecture,Content-Centric Networking(CCN)uses entirely different protocols and communication patterns from the host-to-host IP network.In CCN,communication is wholl... As a named data-based clean-slate future Internet architecture,Content-Centric Networking(CCN)uses entirely different protocols and communication patterns from the host-to-host IP network.In CCN,communication is wholly driven by the data consumer.Consumers must send Interest packets with the content name and not by the host’s network address.Its nature of in-network caching,Interest packets aggregation and hop-byhop communication poses unique challenges to provision of Internet applications,where traditional IP network no long works well.This paper presents a comprehensive survey of state-of-the-art application research activities related to CCN architecture.Our main aims in this survey are(a)to identify the advantages and drawbacks of CCN architectures for application provisioning;(b)to discuss the challenges and opportunities regarding service provisioning in CCN architectures;and(c)to further encourage deeper thinking about design principles for future Internet architectures from the perspective of upper-layer applications. 展开更多
关键词 Content-centric networking(CCN) named-data networkING (NDN) applicationS information-centric networkING FUTURE Internet
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部