期刊文献+
共找到1,718篇文章
< 1 2 86 >
每页显示 20 50 100
Behavioral modeling of RF power amplifiers with time-delay feed-forward neural networks
1
作者 翟建锋 周健义 +2 位作者 赵嘉宁 张雷 洪伟 《Journal of Southeast University(English Edition)》 EI CAS 2008年第1期6-9,共4页
A novel behavioral model using three-layer time-delay feed-forward neural networks (TDFFNN)is adopted to model radio frequency (RF)power amplifiers exhibiting memory nonlinearities. In order to extract the paramet... A novel behavioral model using three-layer time-delay feed-forward neural networks (TDFFNN)is adopted to model radio frequency (RF)power amplifiers exhibiting memory nonlinearities. In order to extract the parameters, the back- propagation algorithm is applied to train the proposed neural networks. The proposed model is verified by the typical odd- order-only memory polynomial model in simulation, and the performance is compared with different numbers of taped delay lines(TDLs) and perceptrons of the hidden layer. For validating the TDFFNN model by experiments, a digital test bench is set up to collect input and output data of power amplifiers at a 60 × 10^6 sample/s sampling rate. The 3.75 MHz 16-QAM signal generated in the vector signal generator(VSG) is chosen as the input signal, when measuring the dynamic AM/AM and AM/PM characteristics of power amplifiers. By comparisons and analyses, the presented model provides a good performance in convergence, accuracy and efficiency, which is approved by simulation results and experimental results in the time domain and frequency domain. 展开更多
关键词 behavioral model power amplifier time-delay feed- forward neural network(TDFFNN)
在线阅读 下载PDF
International Freight Forwarding Services Network in the Yangtze River Delta, 2005–2015: Patterns and Mechanisms 被引量:5
2
作者 LIANG Shuangbo CAO Youhui +3 位作者 WU Wei GAO Jinlong LIU Weichen ZHANG Weiyang 《Chinese Geographical Science》 SCIE CSCD 2019年第1期112-126,共15页
This study examined the spatio-temporal trajectories of the international freight forwarding service(IFFS) in the Yangtze River Delta(YRD) and explored the driving mechanisms of the service. Based on a bipartite netwo... This study examined the spatio-temporal trajectories of the international freight forwarding service(IFFS) in the Yangtze River Delta(YRD) and explored the driving mechanisms of the service. Based on a bipartite network projection from an IFFS firm-city data source, we mapped three IFFS networks in the YRD in 2005, 2010, and 2015. A range of statistical indicators were used to explore changes in the spatial patterns of the three networks. The underlying influence of marketization, globalization, decentralization, and integration was then explored. It was found that the connections between Shanghai and other nodal cities formed the backbones of these networks. The effects of a city's administrative level and provincial administrative borders were generally obvious. We found several specific spatial patterns associated with IFFS. For example, the four non-administrative centers of Ningbo, Suzhou, Lianyungang, and Nantong were the most connected cities and played the role of gateway cities. Furthermore, remarkable regional equalities were found regarding a city's IFFS network provision, with notable examples in the weakly connected areas of northern Jiangsu and southwestern Zhejiang. Finally, an analysis of the driving mechanisms demonstrated that IFFS network changes were highly sensitive to the influences of marketization and globalization, while regional integration played a lesser role in driving changes in IFFS networks. 展开更多
关键词 international FREIGHT forwardING service network pattern mechanism headquarters-branch method YANGTZE River DELTA
在线阅读 下载PDF
ESMD-Flow: An Intelligent Flow Forwarding Scheme with Endogenous Security Based on Mimic Defense in Space-Air-Ground Integrated Network 被引量:3
3
作者 Ziyong Li Yuxiang Hu +2 位作者 Di Zhu JiangxingWu Yunjie Gu 《China Communications》 SCIE CSCD 2022年第1期40-51,共12页
The Space-Air-Ground Integrated Network(SAGIN) realizes the integration of space, air,and ground networks, obtaining the global communication coverage.Software-Defined Networking(SDN) architecture in SAGIN has become ... The Space-Air-Ground Integrated Network(SAGIN) realizes the integration of space, air,and ground networks, obtaining the global communication coverage.Software-Defined Networking(SDN) architecture in SAGIN has become a promising solution to guarantee the Quality of Service(QoS).However, the current routing algorithms mainly focus on the QoS of the service, rarely considering the security requirement of flow. To realize the secure transmission of flows in SAGIN, we propose an intelligent flow forwarding scheme with endogenous security based on Mimic Defense(ESMD-Flow). In this scheme, SDN controller will evaluate the reliability of nodes and links, isolate malicious nodes based on the reliability evaluation value, and adapt multipath routing strategy to ensure that flows are always forwarded along the most reliable multiple paths. In addition, in order to meet the security requirement of flows, we introduce the programming data plane to design a multiprotocol forwarding strategy for realizing the multiprotocol dynamic forwarding of flows. ESMD-Flow can reduce the network attack surface and improve the secure transmission capability of flows by implementing multipath routing and multi-protocol hybrid forwarding mechanism. The extensive simulations demonstrate that ESMD-Flow can significantly improve the average path reliability for routing and increase the difficulty of network eavesdropping while improving the network throughput and reducing the average packet delay. 展开更多
关键词 space-air-ground integrated network(SAGIN) endogenous security multipath routing multi-protocol forwarding
在线阅读 下载PDF
Near-infrared Spectral Detection of the Content of Soybean Fat Acids Based on Genetic Multilayer Feed forward Neural Network 被引量:1
4
作者 CHAIYu-hua PANWei NINGHai-long 《Journal of Northeast Agricultural University(English Edition)》 CAS 2005年第1期74-78,共5页
In the paper, a method of building mathematic model employing genetic multilayer feed forward neural network is presented, and the quantitative relationship of chemical measured values and near-infrared spectral data ... In the paper, a method of building mathematic model employing genetic multilayer feed forward neural network is presented, and the quantitative relationship of chemical measured values and near-infrared spectral data is established. In the paper, quantitative mathematic model related chemical assayed values and near-infrared spectral data is established by means of genetic multilayer feed forward neural network, acquired near-infrared spectral data are taken as input of network with the content of five kinds of fat acids tested from chemical method as output, weight values of multilayer feed forward neural network are trained by genetic algorithms and detection model of neural network of soybean is built. A kind of multilayer feed forward neural network trained by genetic algorithms is designed in the paper. Through experiments, all the related coefficients of five fat acids can approach 0.9 which satisfies the preliminary test of soybean breeding. 展开更多
关键词 near infrared multilayer feed forward neural network genetic algorithms SOYBEAN fat acid
在线阅读 下载PDF
Combined Signal Processing Based Techniques and Feed Forward Neural Networks for Pathological Voice Detection and Classification 被引量:1
5
作者 T.Jayasree S.Emerald Shia 《Sound & Vibration》 EI 2021年第2期141-161,共21页
This paper presents the pathological voice detection and classification techniques using signal processing based methodologies and Feed Forward Neural Networks(FFNN).The important pathological voices such as Autism Sp... This paper presents the pathological voice detection and classification techniques using signal processing based methodologies and Feed Forward Neural Networks(FFNN).The important pathological voices such as Autism Spectrum Disorder(ASD)and Down Syndrome(DS)are considered for analysis.These pathological voices are known to manifest in different ways in the speech of children and adults.Therefore,it is possible to discriminate ASD and DS children from normal ones using the acoustic features extracted from the speech of these subjects.The important attributes hidden in the pathological voices are extracted by applying different signal processing techniques.In this work,three group of feature vectors such as perturbation measures,noise parameters and spectral-cepstral modeling are derived from the signals.The detection and classification is done by means of Feed For-ward Neural Network(FFNN)classifier trained with Scaled Conjugate Gradient(SCG)algorithm.The performance of the network is evaluated by finding various performance metrics and the the experimental results clearly demonstrate that the proposed method gives better performance compared with other methods discussed in the literature. 展开更多
关键词 Autism spectrum disorder down syndrome feed forward neural network perturbation measures noise parameters cepstral features
在线阅读 下载PDF
A Direction-Based Data Forwarding Algorithm for Opportunistic Networks
6
作者 Jie Yu Yue Ling +2 位作者 Si-Ying Li Hui-Qi Fang Lin-Feng Liu 《Journal of Electronic Science and Technology》 CAS CSCD 2016年第2期152-159,共8页
In this paper, the forwarding objective and mobility law of nodes in opportunistic networks are first investigated to establish a mathematical model for further analysis, then a gradually accelerated data forwarding a... In this paper, the forwarding objective and mobility law of nodes in opportunistic networks are first investigated to establish a mathematical model for further analysis, then a gradually accelerated data forwarding algorithm is proposed. In this algorithm, according to the distance between data carriers (nodes) and the destination, some intermediate nodes are selected to relay the data. Especially, the forwarded copies can be increased when the delay reaches a threshold, to guarantee the required delivery ratio. The simulation results show that the proposed algorithm can effectively reduce the storage occupancies of nodes and forwarding delay, and guarantee the delivery ratio simultaneously. 展开更多
关键词 ACCELERATED delivery ratio forwarding opportunistic networks storageoccupancies.
在线阅读 下载PDF
A Kind of Second-Order Learning Algorithm Based on Generalized Cost Criteria in Multi-Layer Feed-Forward Neural Networks
7
作者 张长江 付梦印 金梅 《Journal of Beijing Institute of Technology》 EI CAS 2003年第2期119-124,共6页
A kind of second order algorithm--recursive approximate Newton algorithm was given by Karayiannis. The algorithm was simplified when it was formulated. Especially, the simplification to matrix Hessian was very reluct... A kind of second order algorithm--recursive approximate Newton algorithm was given by Karayiannis. The algorithm was simplified when it was formulated. Especially, the simplification to matrix Hessian was very reluctant, which led to the loss of valuable information and affected performance of the algorithm to certain extent. For multi layer feed forward neural networks, the second order back propagation recursive algorithm based generalized cost criteria was proposed. It is proved that it is equivalent to Newton recursive algorithm and has a second order convergent rate. The performance and application prospect are analyzed. Lots of simulation experiments indicate that the calculation of the new algorithm is almost equivalent to the recursive least square multiple algorithm. The algorithm and selection of networks parameters are significant and the performance is more excellent than BP algorithm and the second order learning algorithm that was given by Karayiannis. 展开更多
关键词 multi layer feed forward neural networks BP algorithm Newton recursive algorithm
在线阅读 下载PDF
Adaptive Jointing Superposition and Denoising-and-Forward Physical Layer Network Coding 被引量:1
8
作者 欧阳玉花 贾向东 +1 位作者 傅海阳 杨龙祥 《China Communications》 SCIE CSCD 2011年第3期43-51,共9页
The existing physical-layer network coding(PNC) can be grouped into three generic schemes,which are XOR-based PNC,superposition-based PNC,and denoising-and-forward(DNFbased) PNC.Generally speaking,DNF-based PNC has be... The existing physical-layer network coding(PNC) can be grouped into three generic schemes,which are XOR-based PNC,superposition-based PNC,and denoising-and-forward(DNFbased) PNC.Generally speaking,DNF-based PNC has better performance of rate pair region compared with the other two schemes when the transmission is symmetric.When the transmission is asymmetric,its performance is degraded severely.However,superposition-based PNC does not have that limitation even if its rate pair region performance is inferior to that of DNF-based PNC and XOR-based PNC.In this paper,we focus on the combined use of the two PNC schemes,superposition-based PNC and DNFbased PNC,and present a novel PNC scheme called joint superposition and DNF physical-layer network coding(JSDNF-based PNC) as well as the information theory analysis of the achievable rate pair region.At the same time,in the proposed scheme,an adaptive power allocation factor is introduced.By changing the power factor,the system can adapt its rate pair region flexibly.The numerical results show that the proposed scheme achieves the largest rate pair region when the rate difference of two source signals is very large.At the same time,the support on asymmetric transmission is also an important profit of the scheme. 展开更多
关键词 cooperative communications physicallayer network coding(PNC) denoising-and-forward PNC superposition PNC
在线阅读 下载PDF
Trajectory-Based Data Forwarding Schemes for Vehicular Networks
9
作者 Jaehoon (Paul) Jeong Tian He David H.C.Du 《ZTE Communications》 2014年第1期17-25,共9页
This paper explains trajectory-based data forwarding schemes for multihop data delivery in vehicular networks where the trajectory is the GPS navigation path for driving in a road network. Nowadays, GPS-based navigati... This paper explains trajectory-based data forwarding schemes for multihop data delivery in vehicular networks where the trajectory is the GPS navigation path for driving in a road network. Nowadays, GPS-based navigation is popular with drivers either for efficient driv- ing in unfamiliar road networks or for a better route, even in familiar road networks with heavy traffic. In this paper, we describe how to take advantage of vehicle trajectories in order to design data-forwarding schemes for information exchange in vehicular networks. The design of data-forwarding schemes takes into account not only the macro-scoped mobility of vehicular traffic statistics in road net- works, but also the micro-scoped mobility of individual vehicle trajectories. This paper addresses the importance of vehicle trajectory in the design of multihop vehicle-to-infrastructure, infrastructure-to-vehicle, and vehicle-to-vehicle data forwarding schemes. First, we explain the modeling of packet delivery delay and vehicle travel delay in both a road segment and an end-to-end path in a road net- work. Second, we describe a state-of-the-art data forwarding scheme using vehicular traffic statistics for the estimation of the end-to- end delivery delay as a forwarding metric. Last, we describe two data forwarding schemes based on both vehicle trajectory and vehicu- lar traffic statistics in a privacy-preserving manner. 展开更多
关键词 VANET DSRC vehicular networks data forwarding vehicle trajectory
在线阅读 下载PDF
Impact of Heterogeneity on Forwarding Schemes in Opportunistic Networks
10
作者 CHENG Gang ZHANG Yong +2 位作者 SONG Mei GUO Da Amanda Matthews 《China Communications》 SCIE CSCD 2015年第4期130-139,共10页
In the paper, we concentrate on the infl uence of heterogeneity on the performance of forwarding algorithms under opportunistic networks. Therefore, we first describe two different heterogeneous network models, and ca... In the paper, we concentrate on the infl uence of heterogeneity on the performance of forwarding algorithms under opportunistic networks. Therefore, we first describe two different heterogeneous network models, and capture the heterogeneity which concern mobile nodes' contact dynamics under the individual models and the spatial models. Then we investigate inter-contact time is not fully follow exponential distribution and compare the performance of the delivery delay between direct forwarding protocol and three-hop forwarding protocol under three network models. We illustrate the performance of message delivery delay under the spray and wait protocol and prophet protocol from simulation results. Our simulation results show that the heterogeneity should be considered for the performance of forwarding protocols. 展开更多
关键词 opportunistic networks heterogeneous models forwarding performance inter-contact time
在线阅读 下载PDF
Feed-Forward Artificial Neural Network Model for Air Pollutant Index Prediction in the Southern Region of Peninsular Malaysia 被引量:1
11
作者 Azman Azid Hafizan Juahir +2 位作者 Mohd Talib Latif Sharifuddin Mohd Zain Mohamad Romizan Osman 《Journal of Environmental Protection》 2013年第12期1-10,共10页
This paper describes the application of principal component analysis (PCA) and artificial neural network (ANN) to predict the air pollutant index (API) within the seven selected Malaysian air monitoring stations in th... This paper describes the application of principal component analysis (PCA) and artificial neural network (ANN) to predict the air pollutant index (API) within the seven selected Malaysian air monitoring stations in the southern region of Peninsular Malaysia based on seven years database (2005-2011). Feed-forward ANN was used as a prediction method. The feed-forward ANN analysis demonstrated that the rotated principal component scores (RPCs) were the best input parameters to predict API. From the 4 RPCs, only 10 (CO, O3, PM10, NO2, CH4, NmHC, THC, wind direction, humidity and ambient temp) out of 12 prediction variables were the most significant parameters to predict API. The results proved that the ANN method can be applied successfully as tools for decision making and problem solving for better atmospheric management. 展开更多
关键词 Air POLLUTANT Index (API) Principal COMPONENT Analysis (PCA) Artificial Neural network (ANN) Rotated Principal COMPONENT SCORES (RPCs) FEED-forward ANN
暂未订购
Relay Selection and Power Allocation in Amplify-and-Forward Cognitive Radio Networks:A Special Spectrum Sharing Scheme
12
作者 赵大骞 裴二荣 张治中 《Journal of Shanghai Jiaotong university(Science)》 EI 2015年第4期403-407,共5页
In this paper, we present a special spectrum sharing scheme that is a joint optimization of relay selection and power allocation at the secondary transmitter, where the primary user is incapable of supporting its targ... In this paper, we present a special spectrum sharing scheme that is a joint optimization of relay selection and power allocation at the secondary transmitter, where the primary user is incapable of supporting its target signal-to-noise ratio(SNR). Specifically, the selected secondary transmitter assists the primary user with achieving its target SNR via two-phase cooperative amplify-and-forward relaying. By searching for the candidate secondary transmitters which have already satisfied the primary user's target SNR, we can select the optimal secondary transmitter. This optimal secondary transmitter not only satisfies the primary user's target SNR,but also maximizes the throughput of the secondary user. We study this joint optimization problem such that the secondary user's throughput is maximized under the constraint that satisfies the primary user's target SNR.Numerical results show that our scheme can maximize the throughput of the secondary user, and can obtain the win-win solution for the primary and secondary systems. 展开更多
关键词 RELAY selection power allocation AMPLIFY-AND-forward SPECTRUM SHARING cognitive radio network
原文传递
Feed-Forward Neural Network Based Petroleum Wells Equipment Failure Prediction
13
作者 Agil Yolchuyev 《Engineering(科研)》 CAS 2023年第3期163-175,共13页
In the oil industry, the productivity of oil wells depends on the performance of the sub-surface equipment system. These systems often have problems stemming from sand, corrosion, internal pressure variation, or other... In the oil industry, the productivity of oil wells depends on the performance of the sub-surface equipment system. These systems often have problems stemming from sand, corrosion, internal pressure variation, or other factors. In order to ensure high equipment performance and avoid high-cost losses, it is essential to identify the source of possible failures in the early stage. However, this requires additional maintenance fees and human power. Moreover, the losses caused by these problems may lead to interruptions in the whole production process. In order to minimize maintenance costs, in this paper, we introduce a model for predicting equipment failure based on processing the historical data collected from multiple sensors. The state of the system is predicted by a Feed-Forward Neural Network (FFNN) with an SGD and Backpropagation algorithm is applied in the training process. Our model’s primary goal is to identify potential malfunctions at an early stage to ensure the production process’ continued high performance. We also evaluated the effectiveness of our model against other solutions currently available in the industry. The results of our study show that the FFNN can attain an accuracy score of 97% on the given dataset, which exceeds the performance of the models provided. 展开更多
关键词 PDM IOT Internet of Things Machine Learning SENSORS Feed-forward Neural networks FFNN
在线阅读 下载PDF
Design of Dual-Wavelength Bifocal Metalens Based on Generative Adversarial Network Model
14
作者 LIU Gangcheng WANG Junkai +4 位作者 LIN Sen WU Binhe WANG Chunrui ZHOU Jian SUN Hao 《Journal of Donghua University(English Edition)》 2025年第2期168-176,共9页
Multifocal metalenses are of great concern in optical communications,optical imaging and micro-optics systems,but their design is extremely challenging.In recent years,deep learning methods have provided novel solutio... Multifocal metalenses are of great concern in optical communications,optical imaging and micro-optics systems,but their design is extremely challenging.In recent years,deep learning methods have provided novel solutions to the design of optical planar devices.Here,an approach is proposed to explore the use of generative adversarial networks(GANs)to realize the design of metalenses with different focusing positions at dual wavelengths.This approach includes a forward network and an inverse network,where the former predicts the optical response of meta-atoms and the latter generates structures that meet specific requirements.Compared to the traditional search method,the inverse network demonstrates higher precision and efficiency in designing a dual-wavelength bifocal metalens.The results will provide insights and methodologies for the design of tunable wavelength metalenses,while also highlighting the potential of deep learning in optical device design. 展开更多
关键词 generative adversarial network(GAN) metalens forward network inverse design
在线阅读 下载PDF
Fast 2D forward modeling of electromagnetic propagation well logs using finite element method and data-driven deep learning
15
作者 A.M.Petrov A.R.Leonenko +1 位作者 K.N.Danilovskiy O.V.Nechaev 《Artificial Intelligence in Geosciences》 2025年第1期85-96,共12页
We propose a novel workflow for fast forward modeling of well logs in axially symmetric 2D models of the nearwellbore environment.The approach integrates the finite element method with deep residual neural networks to... We propose a novel workflow for fast forward modeling of well logs in axially symmetric 2D models of the nearwellbore environment.The approach integrates the finite element method with deep residual neural networks to achieve exceptional computational efficiency and accuracy.The workflow is demonstrated through the modeling of wireline electromagnetic propagation resistivity logs,where the measured responses exhibit a highly nonlinear relationship with formation properties.The motivation for this research is the need for advanced modeling al-gorithms that are fast enough for use in modern quantitative interpretation tools,where thousands of simulations may be required in iterative inversion processes.The proposed algorithm achieves a remarkable enhancement in performance,being up to 3000 times faster than the finite element method alone when utilizing a GPU.While still ensuring high accuracy,this makes it well-suited for practical applications when reliable payzone assessment is needed in complex environmental scenarios.Furthermore,the algorithm’s efficiency positions it as a promising tool for stochastic Bayesian inversion,facilitating reliable uncertainty quantification in subsurface property estimation. 展开更多
关键词 PETROPHYSICS Electromagnetic propagation logging forward modeling Finite element method Residual neural networks
在线阅读 下载PDF
Computing Power Network:A Survey 被引量:20
16
作者 Sun Yukun Lei Bo +4 位作者 Liu Junlin Huang Haonan Zhang Xing Peng Jing Wang Wenbo 《China Communications》 SCIE CSCD 2024年第9期109-145,共37页
With the rapid development of cloud computing,edge computing,and smart devices,computing power resources indicate a trend of ubiquitous deployment.The traditional network architecture cannot efficiently leverage these... With the rapid development of cloud computing,edge computing,and smart devices,computing power resources indicate a trend of ubiquitous deployment.The traditional network architecture cannot efficiently leverage these distributed computing power resources due to computing power island effect.To overcome these problems and improve network efficiency,a new network computing paradigm is proposed,i.e.,Computing Power Network(CPN).Computing power network can connect ubiquitous and heterogenous computing power resources through networking to realize computing power scheduling flexibly.In this survey,we make an exhaustive review on the state-of-the-art research efforts on computing power network.We first give an overview of computing power network,including definition,architecture,and advantages.Next,a comprehensive elaboration of issues on computing power modeling,information awareness and announcement,resource allocation,network forwarding,computing power transaction platform and resource orchestration platform is presented.The computing power network testbed is built and evaluated.The applications and use cases in computing power network are discussed.Then,the key enabling technologies for computing power network are introduced.Finally,open challenges and future research directions are presented as well. 展开更多
关键词 computing power modeling computing power network computing power scheduling information awareness network forwarding
在线阅读 下载PDF
Improvements on robust email protocols with perfect forward secrecy
17
作者 蒋睿 胡爱群 杨晓辉 《Journal of Southeast University(English Edition)》 EI CAS 2008年第2期139-142,共4页
According to the security shortages of two robust practical email protocols with perfect forward secrecy, attacks on the two protocols are analyzed and corresponding improvements on the two protocols are proposed. Fir... According to the security shortages of two robust practical email protocols with perfect forward secrecy, attacks on the two protocols are analyzed and corresponding improvements on the two protocols are proposed. First, by analyzing the two email protocols, the corresponding man-in-the-middle attacks are proposed, where the adversary forges the messages in the receiving phase to cheat the two communication participants and makes them share the wrong session keys with him. Consequently, the man-in-the-middle attacks can make the two protocols fail to provide perfect forward secrecy. Secondly, by adding corresponding signatures in the receiving phases of the two protocols, two corresponding improvements on the protocols are proposed to overcome the man-in-the-middle attacks on the two protocols and make them provide perfect forward secrecy. Moreover, the two improved protocols can retain all the merits of the former protocols. 展开更多
关键词 man-in-the-middle attack EMAIL network security perfect forward secrecy
在线阅读 下载PDF
Enhancing Interest Forwarding for Fast Recovery from Unanticipated Data Access Failure in NDN 被引量:1
18
作者 Xiaoyan Hu Xuhui Liu +2 位作者 Lixia Zhao Jian Gong Guang Cheng 《China Communications》 SCIE CSCD 2019年第7期120-130,共11页
We show that an aggregated Interest in Named Data Networking (NDN) may fail to retrieve desired data since the Interest previously sent upstream for the same content is judged as a duplicate one and then dropped by an... We show that an aggregated Interest in Named Data Networking (NDN) may fail to retrieve desired data since the Interest previously sent upstream for the same content is judged as a duplicate one and then dropped by an upstream node due to its multipath forwarding. Furthermore, we propose NDRUDAF, a NACK based mechanism that enhances the Interest forwarding and enables Detection and fast Recovery from such Unanticipated Data Access Failure. In the NDN enhanced with NDRUDAF, the router that aggregates the Interest detects such unanticipated data access failure based on a negative acknowledgement from the upstream node that judges the Interest as a duplicate one. Then the router retransmits the Interest as soon as possible on behalf of the requester whose Interest is aggregated to fast recover from the data access failure. We qualitatively and quantitatively analyze the performance of the NDN enhanced with our proposed NDRUDAF and compare it with that of the present NDN. Our experimental results validate that NDRUDAF improves the system performance in case of such unanticipated data access failure in terms of data access delay and network resource utilization efficiency at routers. 展开更多
关键词 named DATA networking INTEREST aggregation multipath forwardING DATA access FAILURE negative ACKNOWLEDGEMENT
在线阅读 下载PDF
STUDYING THE ABRASION BEHAVIOR OF RUBBERY MATERIALS WITH COMBINED DESIGN OF EXPERIMENT-ARTIFICIAL NEURAL NETWORK 被引量:1
19
作者 Mehdi Shiva Hossein Atashi Mahtab Hassanpourfard 《Chinese Journal of Polymer Science》 SCIE CAS CSCD 2012年第4期520-529,共10页
In this study, an application of artificial neural network (ANN) has been presented in modeling and studying the effect of compounding variables on abrasion behavior of rubber formulations. Three case studies were c... In this study, an application of artificial neural network (ANN) has been presented in modeling and studying the effect of compounding variables on abrasion behavior of rubber formulations. Three case studies were carried out in which the experiment data were collected according to classical response surface designs. Besides developing the ANN models, we developed response surface methodology (RSM) to confirm the ANN predictions. A simple relation was employed for determination of relative importance of each variable according to ANN models. It was shown through these case studies that ANN models delivered very good data fitting and their simulating curves could help the researchers to better understand the abrasion behavior. 展开更多
关键词 ABRASION Feed forward neural networks Rubber compounding Central composite design.
原文传递
Key-insulated encryption based group key management for wireless sensor network 被引量:2
20
作者 邱卫东 周耀伟 +2 位作者 朱博 郑燕飞 龚征 《Journal of Central South University》 SCIE EI CAS 2013年第5期1277-1284,共8页
The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key managemen... The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key management scheme is responsible for secure distributing group keys among valid nodes of the group. Based on the key-insulated encryption (KIE), we propose a group key management scheme (KIE-GKMS), which integrates the pair-wise key pre-distribution for WSN. The KIE-GKMS scheme updates group keys dynamically when adding or removing nodes. Moreover, the security analysis proves that the KIE-GKMS scheme not only obtains the semantic security, but also provides the forward and backward security. Finally, the theoretical analysis shows that the KIE-GKMS scheme has constant performance on both communication and storage costs in sensor nodes. 展开更多
关键词 wireless sensor network data encryption group key management forward security key-insulated encryption
在线阅读 下载PDF
上一页 1 2 86 下一页 到第
使用帮助 返回顶部