期刊文献+
共找到94篇文章
< 1 2 5 >
每页显示 20 50 100
Application and Prospects of SDN Technology in Modern Network Management
1
作者 Aoyu Li Yingjie Yang 《Journal of Electronic Research and Application》 2025年第5期7-11,共5页
With the rapid development of information technology,the scale of the network is expanding,and the complexity is increasing day by day.The traditional network management is facing great challenges.The emergence of sof... With the rapid development of information technology,the scale of the network is expanding,and the complexity is increasing day by day.The traditional network management is facing great challenges.The emergence of software-defined network(SDN)technology has brought revolutionary changes to modern network management.This paper aims to discuss the application and prospects of SDN technology in modern network management.Firstly,the basic principle and architecture of SDN are introduced,including the separation of control plane and data plane,centralized control and open programmable interface.Then,it analyzes the advantages of SDN technology in network management,such as simplifying network configuration,improving network flexibility,optimizing network resource utilization,and realizing fast fault recovery.The application examples of SDN in data center networks and WAN optimization management are analyzed.This paper also discusses the development status and trend of SDN in enterprise networks,including the integration of technologies such as cloud computing,big data,and artificial intelligence,the construction of an intelligent and automated network management platform,the improvement of network management efficiency and quality,and the openness and interoperability of network equipment.Finally,the advantages and challenges of SDN technology are summarized,and its future development direction is provided. 展开更多
关键词 Software-defined network network management Data centers Wide area network Cloud computing
在线阅读 下载PDF
NetST:Network Encrypted Traffic Classification Based on Swin Transformer
2
作者 Jianwei Zhang Hongying Zhao +2 位作者 Yuan Feng Zengyu Cai Liang Zhu 《Computers, Materials & Continua》 2025年第9期5279-5298,共20页
Network traffic classification is a crucial research area aimed at improving quality of service,simplifying network management,and enhancing network security.To address the growing complexity of cryptography,researche... Network traffic classification is a crucial research area aimed at improving quality of service,simplifying network management,and enhancing network security.To address the growing complexity of cryptography,researchers have proposed various machine learning and deep learning approaches to tackle this challenge.However,existing mainstream methods face several general issues.On one hand,the widely used Transformer architecture exhibits high computational complexity,which negatively impacts its efficiency.On the other hand,traditional methods are often unreliable in traffic representation,frequently losing important byte information while retaining unnecessary biases.To address these problems,this paper introduces the Swin Transformer architecture into the domain of network traffic classification and proposes the NetST(Network Swin Transformer)model.This model improves the Swin Transformer to better accommodate the characteristics of network traffic,effectively addressing efficiency issues.Furthermore,this paper presents a traffic representation scheme designed to extract meaningful information from large volumes of traffic while minimizing bias.We integrate four datasets relevant to network traffic classification for our experiments,and the results demonstrate that NetST achieves a high accuracy rate while maintaining low memory usage. 展开更多
关键词 Traffic classification encrypted network traffic Swin Transformer network management deep learning
在线阅读 下载PDF
Real-Time 7-Core SDM Transmission System Using Commercial 400 Gbit/s OTN Transceivers and Network Management System
3
作者 CUI Jian GU Ninglun +2 位作者 CHANG Cheng SHI Hu YAN Baoluo 《ZTE Communications》 2025年第3期81-88,共8页
Space-division multiplexing(SDM)utilizing uncoupled multi-core fibers(MCF)is considered a promising candidate for nextgeneration high-speed optical transmission systems due to its huge capacity and low inter-core cros... Space-division multiplexing(SDM)utilizing uncoupled multi-core fibers(MCF)is considered a promising candidate for nextgeneration high-speed optical transmission systems due to its huge capacity and low inter-core crosstalk.In this paper,we demonstrate a realtime high-speed SDM transmission system over a field-deployed 7-core MCF cable using commercial 400 Gbit/s backbone optical transport network(OTN)transceivers and a network management system.The transceivers employ a high noise-tolerant quadrature phase shift keying(QPSK)modulation format with a 130 Gbaud rate,enabled by optoelectronic multi-chip module(OE-MCM)packaging.The network management system can effectively manage and monitor the performance of the 7-core SDM OTN system and promptly report failure events through alarms.Our field trial demonstrates the compatibility of uncoupled MCF with high-speed OTN transmission equipment and network management systems,supporting its future deployment in next-generation high-speed terrestrial cable transmission networks. 展开更多
关键词 multi-core fiber real-time transmission optical transport network field trial network management system
在线阅读 下载PDF
Study on the Impact of Network Information Management on the Compliance of Maintenance Hemodialysis Patients
4
作者 Chunyan Liu Xuebao Liu 《Journal of Clinical and Nursing Research》 2025年第9期137-143,共7页
This study focuses on the management of maintenance hemodialysis(MHD)patients,with a specific emphasis on the practical application effect of the network information management model including its impact on patients’... This study focuses on the management of maintenance hemodialysis(MHD)patients,with a specific emphasis on the practical application effect of the network information management model including its impact on patients’compliance.A network information management model for MHD patients was constructed around three management schemes:“software reminders+follow-up guidance”,“dietary records+self-management reminders”,and“dialysis plan+precise weight management”.These schemes were respectively used to optimize anemia management,control the risk of hyperphosphatemia,and improve toxin clearance efficiency.A controlled experiment was conducted,with an experimental group and a control group set up for comparative practice.The results showed that the network information management model can effectively improve patients’anemia,help alleviate mineral metabolism disorders and the accumulation of small-molecule toxins,and exert a positive impact on patients’treatment compliance. 展开更多
关键词 network information management Maintenance hemodialysis PATIENTS COMPLIANCE IMPACT
暂未订购
Exploring the Nuclear Power DCS Network Security Management Method and Its Application
5
作者 Yu Chen Yongjie Fu Yajie Wen 《Journal of Electronic Research and Application》 2025年第3期97-103,共7页
Given the grave local and international network security landscape,a national strategic level analysis indicates that the modernization and advancement within the Industry 4.0 era are closely correlated with overall c... Given the grave local and international network security landscape,a national strategic level analysis indicates that the modernization and advancement within the Industry 4.0 era are closely correlated with overall competitive strength.Consequently,China proposed a strategy for the integration of industrialization and informatization,optimizing and adjusting its industrial structure to swiftly achieve transformation and upgrading in the Industry 4.0 era,thereby enhancing the sophistication of intelligent industrial control systems.The distributed control system in a nuclear power plant functions as an industrial control system,overseeing the operational status of the physical process.Its ability to ensure safe and reliable operation is directly linked to nuclear safety and the cybersecurity of the facility.The management of network security in distributed control systems(DCS)is crucial for achieving this objective.Due to the varying network settings and parameters of the DCS implemented in each nuclear power plant,the network security status of the system sometimes diverges from expectations.During system operation,it will undoubtedly encounter network security issues.Consequently,nuclear power plants utilize the technical criteria outlined in GB/T 22239 to formulate a network security management program aimed at enhancing the operational security of DCS within these facilities.This study utilizes existing network security regulations and standards as a reference to analyze the network security control standards based on the nuclear power plant’s control system.It delineates the fundamental requirements for network security management,facilitating integration with the entire life cycle of the research,development,and application of the nuclear power plant’s distributed control system,thereby establishing a network security management methodology that satisfies the control requirements of the nuclear power plant.Initially,it presents DCS and network security management,outlines current domestic and international network security legislation and standards,and specifies the standards pertinent to the administration of DCS in nuclear power plants.Secondly,the design of network security management for DCS is executed in conjunction with the specific context of nuclear power plants.This encompasses the deployment of network security apparatus,validation of the network security management strategy,and optimization adjustments.Consequently,recommendations beneficial to the network security management of nuclear power plants are compiled,aimed at establishing a management system and incorporating the concept of full life cycle management,which is predicated on system requirements,system design,and both software and hardware considerations.Conversely,it presents the notion of comprehensive life cycle management and suggests network security management strategies encompassing system requirements,system architecture,detailed hardware and software design and implementation,procurement,internal system integration,system validation and acceptance testing,system installation,operational maintenance,system modifications,and decommissioning.We will consistently enhance the performance and functionality of DCS in nuclear power plants,establish a safe and secure operational environment,and thereby facilitate the implementation of DCS in nuclear facilities while ensuring robust network security in the future. 展开更多
关键词 network security DCS Nuclear power plant network security management
在线阅读 下载PDF
Security Monitoring and Management for the Network Services in the Orchestration of SDN-NFV Environment Using Machine Learning Techniques 被引量:2
6
作者 Nasser Alshammari Shumaila Shahzadi +7 位作者 Saad Awadh Alanazi Shahid Naseem Muhammad Anwar Madallah Alruwaili Muhammad Rizwan Abid Omar Alruwaili Ahmed Alsayat Fahad Ahmad 《Computer Systems Science & Engineering》 2024年第2期363-394,共32页
Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified ne... Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified network lifecycle,and policies management.Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration(NFV MANO),and malicious attacks in different scenarios disrupt the NFV Orchestrator(NFVO)and Virtualized Infrastructure Manager(VIM)lifecycle management related to network services or individual Virtualized Network Function(VNF).This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and handle security functions in order to enhance the quality of experience for end users.An anomaly detector investigates these identified risks and provides secure network services.It enables virtual network security functions and identifies anomalies in Kubernetes(a cloud-based platform).For training and testing purpose of the proposed approach,an intrusion-containing dataset is used that hold multiple malicious activities like a Smurf,Neptune,Teardrop,Pod,Land,IPsweep,etc.,categorized as Probing(Prob),Denial of Service(DoS),User to Root(U2R),and Remote to User(R2L)attacks.An anomaly detector is anticipated with the capabilities of a Machine Learning(ML)technique,making use of supervised learning techniques like Logistic Regression(LR),Support Vector Machine(SVM),Random Forest(RF),Naïve Bayes(NB),and Extreme Gradient Boosting(XGBoost).The proposed framework has been evaluated by deploying the identified ML algorithm on a Jupyter notebook in Kubeflow to simulate Kubernetes for validation purposes.RF classifier has shown better outcomes(99.90%accuracy)than other classifiers in detecting anomalies/intrusions in the containerized environment. 展开更多
关键词 Software defined network network function virtualization network function virtualization management and orchestration virtual infrastructure manager virtual network function Kubernetes Kubectl artificial intelligence machine learning
在线阅读 下载PDF
Threshold-Based Software-Defined Networking(SDN)Solution for Healthcare Systems against Intrusion Attacks
7
作者 Laila M.Halman Mohammed J.F.Alenazi 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1469-1483,共15页
The healthcare sector holds valuable and sensitive data.The amount of this data and the need to handle,exchange,and protect it,has been increasing at a fast pace.Due to their nature,software-defined networks(SDNs)are ... The healthcare sector holds valuable and sensitive data.The amount of this data and the need to handle,exchange,and protect it,has been increasing at a fast pace.Due to their nature,software-defined networks(SDNs)are widely used in healthcare systems,as they ensure effective resource utilization,safety,great network management,and monitoring.In this sector,due to the value of thedata,SDNs faceamajor challengeposed byawide range of attacks,such as distributed denial of service(DDoS)and probe attacks.These attacks reduce network performance,causing the degradation of different key performance indicators(KPIs)or,in the worst cases,a network failure which can threaten human lives.This can be significant,especially with the current expansion of portable healthcare that supports mobile and wireless devices for what is called mobile health,or m-health.In this study,we examine the effectiveness of using SDNs for defense against DDoS,as well as their effects on different network KPIs under various scenarios.We propose a threshold-based DDoS classifier(TBDC)technique to classify DDoS attacks in healthcare SDNs,aiming to block traffic considered a hazard in the form of a DDoS attack.We then evaluate the accuracy and performance of the proposed TBDC approach.Our technique shows outstanding performance,increasing the mean throughput by 190.3%,reducing the mean delay by 95%,and reducing packet loss by 99.7%relative to normal,with DDoS attack traffic. 展开更多
关键词 network resilience network management attack prediction software defined networking(SDN) distributed denial of service(DDoS) healthcare
在线阅读 下载PDF
Design and Implementation of an Open Network Security Management Platform 被引量:2
8
作者 曹元大 王勇 《Journal of Beijing Institute of Technology》 EI CAS 2002年第3期316-320,共5页
In order to manage all kinds of network security devices and software systems efficiently, and make them collaborate with each other, the model for an open network security management platform is presented. The feasib... In order to manage all kinds of network security devices and software systems efficiently, and make them collaborate with each other, the model for an open network security management platform is presented. The feasibility and key implementing technology of the model are expatiated. A prototype system is implemented to validate it. 展开更多
关键词 network security management open platform XML RPC SNMP
在线阅读 下载PDF
Modeling of Intelligent Integrated Network Management System Using Object Oriented Approach *
9
作者 费翔 罗军舟 +1 位作者 顾冠群 吴介一 《Journal of Southeast University(English Edition)》 EI CAS 1998年第1期3-7,共5页
The concept of intelligent integrated network management (IINM) is briefly introduced. In order to analyze, design and implement IINM successfully, object oriented approach is testified to be an effective and efficien... The concept of intelligent integrated network management (IINM) is briefly introduced. In order to analyze, design and implement IINM successfully, object oriented approach is testified to be an effective and efficient way. In this paper, object oriented technique is applied to the structural model of IINM system, The Domain object class and the MU object class are used to represent the manager and the managed resources. Especially, NM IA is introduced which is a special object class with intelligent behaviors to manage the resources efficiently. 展开更多
关键词 object oriented approach computer communication network network management
在线阅读 下载PDF
Research and Implementation of Network Intelligent Management Based on CSCW
10
作者 沈俊 罗军舟 顾冠群 《Journal of Southeast University(English Edition)》 EI CAS 1999年第1期44-48,共5页
This paper analyzes progresses and difficulties of subjects on computer network’s management and artificial intelligence, proposes AGIMA, a new model of network intelligent management, which is based on computer supp... This paper analyzes progresses and difficulties of subjects on computer network’s management and artificial intelligence, proposes AGIMA, a new model of network intelligent management, which is based on computer supported cooperative work (CSCW) and combining new technologies such as WWW, Java. AGIMA transfers from information distribution centered mode in traditional network management to computing distribution centered mode, providing intelligence capacity for network management by a whole intelligent agent group. The implementation of AGIMA takes much consideration of openess, scalability, proactive adaptability and friendliness of human computer interface. Authors present properties of intelligent agent in details, and conclude that network intelligence should be cooperation between human and computer. 展开更多
关键词 network management artificial intelligence CSCW WWW multi agent system
在线阅读 下载PDF
A Clustering OLSR with Low Control Overhead
11
作者 Chen Junyu Li Li +2 位作者 Ding Lianghui Yang Feng Qian Liang 《China Communications》 2025年第6期193-206,共14页
Heavy routing overhead in Mobile Ad hoc Network(MANET)is a main bottleneck limiting the network performance.In this paper,we propose a novel Clustering OLSR(C-OLSR)approach,which utilizes two schemes,i.e.,clustering a... Heavy routing overhead in Mobile Ad hoc Network(MANET)is a main bottleneck limiting the network performance.In this paper,we propose a novel Clustering OLSR(C-OLSR)approach,which utilizes two schemes,i.e.,clustering and optimized Topology Control(TC)message transfer to reduce the control overhead of OLSR while guaranteeing its realtime requirement.To reduce the control overhead,in C-LOSR,flooding of TC messages is only limited in the cluster.All TC messages are integrated into a Cluster Topology Control(CTC)message by the cluster header and broadcast over the network.To satisfy the real-time requirement,any topology change will trigger CTC messages over the network.Extensive simulations have been done to evaluate the performance of the proposed C-OLSR.Results show that C-OLSR can achieve lower control overhead than OLSR by 44.32%in static networks and by 23.21%in dynamic networks. 展开更多
关键词 CLUSTERING MANET network management OLSR OVERHEAD
在线阅读 下载PDF
Local Search-Based Anytime Algorithms for Continuous Distributed Constraint Optimization Problems
12
作者 Xin Liao Khoi Hoang Xin Luo 《IEEE/CAA Journal of Automatica Sinica》 2025年第1期288-290,共3页
Dear Editor,The distributed constraint optimization problems(DCOPs) [1]-[3]provide an efficient model for solving the cooperative problems of multi-agent systems, which has been successfully applied to model the real-... Dear Editor,The distributed constraint optimization problems(DCOPs) [1]-[3]provide an efficient model for solving the cooperative problems of multi-agent systems, which has been successfully applied to model the real-world problems like the distributed scheduling [4], sensor network management [5], [6], multi-robot coordination [7], and smart grid [8]. However, DCOPs were not well suited to solve the problems with continuous variables and constraint cost in functional form, such as the target tracking sensor orientation [9], the air and ground cooperative surveillance [10], and the sensor network coverage [11]. 展开更多
关键词 target tracking sensor continuous variables smart grid sensor network management constraint cost distributed scheduling target tracking functional form
在线阅读 下载PDF
A Clustering-tree Topology Control Based on the Energy Forecast for Heterogeneous Wireless Sensor Networks 被引量:7
13
作者 Zhen Hong Rui Wang Xile Li 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI 2016年第1期68-77,共10页
How to design an energy-efficient algorithm to maximize the network lifetime in complicated scenarios is a critical problem for heterogeneous wireless sensor networks (HWSN). In this paper, a clustering-tree topology ... How to design an energy-efficient algorithm to maximize the network lifetime in complicated scenarios is a critical problem for heterogeneous wireless sensor networks (HWSN). In this paper, a clustering-tree topology control algorithm based on the energy forecast (CTEF) is proposed for saving energy and ensuring network load balancing, while considering the link quality, packet loss rate, etc. In CTEF, the average energy of the network is accurately predicted per round (the lifetime of the network is denoted by rounds) in terms of the difference between the ideal and actual average residual energy using central limit theorem and normal distribution mechanism, simultaneously. On this basis, cluster heads are selected by cost function (including the energy, link quality and packet loss rate) and their distance. The non-cluster heads are determined to join the cluster through the energy, distance and link quality. Furthermore, several non-cluster heads in each cluster are chosen as the relay nodes for transmitting data through multi-hop communication to decrease the load of each cluster-head and prolong the lifetime of the network. The simulation results show the efficiency of CTEF. Compared with low-energy adaptive clustering hierarchy (LEACH), energy dissipation forecast and clustering management (EDFCM) and efficient and dynamic clustering scheme (EDCS) protocols, CTEF has longer network lifetime and receives more data packets at base station. © 2014 Chinese Association of Automation. 展开更多
关键词 ALGORITHMS Clustering algorithms Cost functions Energy dissipation Energy efficiency Forecasting Information management Low power electronics network management Normal distribution Packet loss Quality control Telecommunication networks TOPOLOGY Trees (mathematics)
在线阅读 下载PDF
Cognitive Network Management in Internet of Things 被引量:5
14
作者 覃毅芳 沈强 +4 位作者 林涛 赵志军 唐晖 慈松 冯志勇 《China Communications》 SCIE CSCD 2011年第1期1-7,共7页
The wide variety of smart embedded computing devices and their increasing number of applications in our daily life have created new op- portunities to acquire knowledge from the physical world anytime and anywhere, wh... The wide variety of smart embedded computing devices and their increasing number of applications in our daily life have created new op- portunities to acquire knowledge from the physical world anytime and anywhere, which is envisioned as the"Internet of Things" (IoT). Since a huge number of heterogeneous resources are brought in- to IoT, one of the main challenges is how to effi- ciently manage the increasing complexity of IoT in a scalable, flexNle, and autonomic way. Further- more, the emerging IoT applications will require collaborations among loosely coupled devices, which may reside in various locations of the Inter- net. In this paper, we propose a new IoT network management architecture based on cognitive net- work management technology and Service-Orien- ted Architecture to provide effective and efficient network management of loT. 展开更多
关键词 cognitive network management Serv- ice-Oriented Architecture (SOA) Internet of Things policy-based network management
在线阅读 下载PDF
Light-Weight Simple Network Management Protocol in Wireless Sensor Networks 被引量:2
15
作者 高德云 朱婉婷 方然 《China Communications》 SCIE CSCD 2011年第8期121-129,共9页
A Light-Weight Simple Network Management Protocol (LW-SNMP) for the wireless sensor network is proposed, which is a kind of hierarchical network management system including a sink manager, cluster proxies, and node ag... A Light-Weight Simple Network Management Protocol (LW-SNMP) for the wireless sensor network is proposed, which is a kind of hierarchical network management system including a sink manager, cluster proxies, and node agents. Considering the resource limitations on the sensor nodes, we design new management messages, new data types and new management information base completely. The management messages between the cluster proxy and node agents are delivered as normal data packets. The experiment results show that LW-SNMP can meet the management demands in the resource-limited wireless sensor networks and has a good performance in stability, effectiveness of memory, extensibility than the traditional Simple Network Management Protocol (SNMP). 展开更多
关键词 WSNS network management lightweight simple network management protocol sink manager cluster proxy node agent
在线阅读 下载PDF
Application Research and Implementation of the CORBA-Based Web Distributed Network Management System 被引量:3
16
作者 WANGFeng SHIBing-xin 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第5期699-705,共7页
The distributed management has become an important tendency of development for the NMS (Network Management System) with the development of Internet. Based on the analysis of CORBA (Conmon Object Request Broker Archite... The distributed management has become an important tendency of development for the NMS (Network Management System) with the development of Internet. Based on the analysis of CORBA (Conmon Object Request Broker Architecture) technique, we mainly discuss about the applicability of the approach by which CORBA combined with Java has been applied to the system model and Web architecture: and address the applied frame and the interface definitions that are the, key technologies for implementing the Distributed Object Computing (DOC). In addition, we also conduct the research on its advantages and disadvantages and further expected improvements. Key words distributed Web network management - CORBA - Java CLC number TP 393.07 Foundation item: Supported by the QTNG (Integrated Network Management System) Project Foundation and QT-NMS (SDH NMS) Project Foundation of Wuhan Qingtian Information Industry Co., LTD of Hubei of China (SDH.001)Biography: WANG Feng (1979-), male Master candidate, research direction: administration of network and software engineering. 展开更多
关键词 distributed Web network management CORBA JAVA
在线阅读 下载PDF
Network traffic identification in packet sampling environment 被引量:2
17
作者 Shi Dong Yuanjun Xia 《Digital Communications and Networks》 SCIE CSCD 2023年第4期957-970,共14页
With the rapid growth of network bandwidth,traffic identification is currently an important challenge for network management and security.In recent years,packet sampling has been widely used in most network management... With the rapid growth of network bandwidth,traffic identification is currently an important challenge for network management and security.In recent years,packet sampling has been widely used in most network management systems.In this paper,in order to improve the accuracy of network traffic identification,sampled NetFlow data is applied to traffic identification,and the impact of packet sampling on the accuracy of the identification method is studied.This study includes feature selection,a metric correlation analysis for the application behavior,and a traffic identification algorithm.Theoretical analysis and experimental results show that the significance of behavior characteristics becomes lower in the packet sampling environment.Meanwhile,in this paper,the correlation analysis results in different trends according to different features.However,as long as the flow number meets the statistical requirement,the feature selection and the correlation degree will be independent of the sampling ratio.While in a high sampling ratio,where the effective information would be less,the identification accuracy is much lower than the unsampled packets.Finally,in order to improve the accuracy of the identification,we propose a Deep Belief Networks Application Identification(DBNAI)method,which can achieve better classification performance than other state-of-the-art methods. 展开更多
关键词 network measurement Application identification Packet sampling Application behavior CHARACTERISTIC Metric correlation network management
在线阅读 下载PDF
Network Management of Food Additives Quality Analysis and Inspection 被引量:3
18
作者 Hairui Zhang Guofu Zhang Li Zhang 《Journal of Chemistry and Chemical Engineering》 2015年第7期468-471,共4页
In this paper, on the basis of the implementation of the national chemical industry standard analytical test methods and analysis of test items, a food additive quality analysis and inspection of network management ap... In this paper, on the basis of the implementation of the national chemical industry standard analytical test methods and analysis of test items, a food additive quality analysis and inspection of network management applications are developed using the development technology of Visual Basic language and computer system operating environment, to achieve a network management software for users on food additives of quality analytical testing. The software sets up an information sharing network platform for enterprise and quality management departments, which is a major innovation in the food additive quality analysis on test management methods and tools. 展开更多
关键词 Food additives quality analysis Visual Basic language network management software development.
在线阅读 下载PDF
Machine learning-based zero-touch network and service management:a survey 被引量:2
19
作者 Jorge Gallego-Madrid Ramon Sanchez-Iborra +1 位作者 Pedro M.Ruiz Antonio F.Skarmeta 《Digital Communications and Networks》 SCIE CSCD 2022年第2期105-123,共19页
The exponential growth of mobile applications and services during the last years has challenged the existing network infrastructures.Consequently,the arrival of multiple management solutions to cope with this explosio... The exponential growth of mobile applications and services during the last years has challenged the existing network infrastructures.Consequently,the arrival of multiple management solutions to cope with this explosion along the end-to-end network chain has increased the complexity in the coordinated orchestration of different segments composing the whole infrastructure.The Zero-touch Network and Service Management(ZSM)concept has recently emerged to automatically orchestrate and manage network resources while assuring the Quality of Experience(QoE)demanded by users.Machine Learning(ML)is one of the key enabling technologies that many ZSM frameworks are adopting to bring intelligent decision making to the network management system.This paper presents a comprehensive survey of the state-of-the-art application of ML-based techniques to improve ZSM performance.To this end,the main related standardization activities and the aligned international projects and research efforts are deeply examined.From this dissection,the skyrocketing growth of the ZSM paradigm can be observed.Concretely,different standardization bodies have already designed reference architectures to set the foundations of novel automatic network management functions and resource orchestration.Aligned with these advances,diverse ML techniques are being currently exploited to build further ZSM developments in different aspects,including multi-tenancy management,traffic monitoring,and architecture coordination,among others.However,different challenges,such as the complexity,scalability,and security of ML mechanisms,are also identified,and future research guidelines are provided to accomplish a firm development of the ZSM ecosystem. 展开更多
关键词 Zero-touch network and service management(ZSM) Next generation networks(NGN) Artificial intelligence(AI) Machine learning(ML)
在线阅读 下载PDF
Home Network and Digital Rights Management Technology 被引量:2
20
作者 Yang Cheng 1Wang Yongbin 2Yang Yixian 3(1. Information Engineering School, Communication University of China, Beijing 100024, China 2. Computer and Software School, Communication University of China, Beijing 100024, China 3. Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China) 《ZTE Communications》 2006年第4期12-18,共7页
The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becom... The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becomes a crucial "bottleneck" in the home network development. The Digital Rights Management (DRM) technology provides total solution for usage, storage, transfer, and tracing the digital contents and rights. Its basic features are systematic and controllability. Considering the growth of the new media and services and the requirements of the Intellectual Property Rights (IPR) protection in a home network, it's necessary to solve consistency problems in usage, storage, and transfer of contents and rights. In addition, it is inevitable to conduct researches of key techniques such as end-to-end secure transmission, conditional access and play, and right description. 展开更多
关键词 HDCP Home network and Digital Rights Management Technology ZTE ISDB ATSC
在线阅读 下载PDF
上一页 1 2 5 下一页 到第
使用帮助 返回顶部