This paper presents a novel algorithm for the gateway placement problem in Backbone Wireless Mesh Networks (BWMNs). Different from existing algorithms, the new algorithm incrementally identifies gateways and assigns m...This paper presents a novel algorithm for the gateway placement problem in Backbone Wireless Mesh Networks (BWMNs). Different from existing algorithms, the new algorithm incrementally identifies gateways and assigns mesh routers to identified gateways. The new algorithm can guarantee to find a feasible gateway placement satisfying Quality-of-Service (QoS) constraints, including delay constraint, relay load constraint and gateway capacity constraint. Experimental results show that its performance is as good as that of the best of existing algorithms for the gateway placement problem. But, the new algorithm can be used for BWMNs that do not form one connected component, and it is easy to implement and use.展开更多
Purpose:With the availability and utilization of Inter-Country Input-Output(ICIO)tables,it is possible to construct quantitative indices to assess its impact on the Global Value Chain(GVC).For the sake of visualizatio...Purpose:With the availability and utilization of Inter-Country Input-Output(ICIO)tables,it is possible to construct quantitative indices to assess its impact on the Global Value Chain(GVC).For the sake of visualization,ICIO networks with tremendous low-weight edges are too dense to show the substantial structure.These redundant edges,inevitably make the network data full of noise and eventually exert negative effects on Social Network Analysis(SNA).In this case,we need a method to filter such edges and obtain a sparser network with only the meaningful connections.Design/methodology/approach:In this paper,we propose two parameterless pruning algorithms from the global and local perspectives respectively,then the performance of them is examined using the ICIO table from different databases.Findings:The Searching Paths(SP)method extracts the strongest association paths from the global perspective,while Filtering Edges(FE)method captures the key links according to the local weight ratio.The results show that the FE method can basically include the SP method and become the best solution for the ICIO networks.Research limitations:There are still two limitations in this research.One is that the computational complexity may increase rapidly while processing the large-scale networks,so the proposed method should be further improved.The other is that much more empirical networks should be introduced to testify the scientificity and practicability of our methodology.Practical implications:The network pruning methods we proposed will promote the analysis of the ICIO network,in terms of community detection,link prediction,and spatial econometrics,etc.Also,they can be applied to many other complex networks with similar characteristics.Originality/value:This paper improves the existing research from two aspects,namely,considering the heterogeneity of weights and avoiding the interference of parameters.Therefore,it provides a new idea for the research of network backbone extraction.展开更多
The virtual backbone is an approach for solving routing problems in wireless ad hoc and sensor networks. A connected dominating set (CDS) was proposed as a virtual backbone to improve the performance of wireless netwo...The virtual backbone is an approach for solving routing problems in wireless ad hoc and sensor networks. A connected dominating set (CDS) was proposed as a virtual backbone to improve the performance of wireless networks. The quality of a virtual backbone is measured not only by approximation factor, which is the ratio of its size to that of minimum CDS, but also time complexity and message complexity. In this paper, a distributed algorithm is presented to construct a minimum CDS for ad hoc and sensor networks. By destroying triangular loops in the virtual backbone, the proposed algorithm can effectively construct a CDS with smaller size. Moreover, our algorithm, which is fully localized, has a constant approximation ratio, linear message and time complexity, and low implementation complexity. The simulation results and theoretical analysis show that our algorithm has better efficiency and performance than conventional approaches.展开更多
Configuration errors are proved to be the main reasons for network interruption and anomalies.Many researchers have paid their attention to configuration analysis and provisioning,but few works focus on understanding ...Configuration errors are proved to be the main reasons for network interruption and anomalies.Many researchers have paid their attention to configuration analysis and provisioning,but few works focus on understanding the configuration evolution.In this paper,we uncover the configuration evolution of an operational IP backbone based on the weekly reports gathered from January 2006 to January 2013.We find that rate limiting and launching routes for new customers are configured most frequently.In addition,we conduct an analysis of network failures and find that link failures are the main causes for network failures.We suggest that we should configure redundant links for the links which are easy to break down.At last,according to the analysis results,we illustrate how to provide semi-automated configuration for rate limiting and adding customers.展开更多
Under the background of the rapid development of ground mobile communication,the advantages of high coverage,survivability,and flexibility of satellite communication provide air support to the construction of space in...Under the background of the rapid development of ground mobile communication,the advantages of high coverage,survivability,and flexibility of satellite communication provide air support to the construction of space information network.According to the requirements of the future space information communication,a software-defined Space-Air-Ground Integrated network architecture was proposed.It consisted of layered structure satellite backbone network,deep space communication network,the stratosphere communication network and the ground network.The Space-Air-Ground Integrated network was supported by the satellite backbone network.It provided data relay for the missions such as deep space exploration and controlled the deep-space spacecraft when needed.In addition,it safeguarded the anti-destructibility of stratospheric communication and assisted the stratosphere to supplement ground network communication.In this paper,algorithm requirements of the congestion control and routing of satellite backbone protocols for heterogeneous users’services were proposed.The algorithm requirements of distinguishing different service objects for the deep space communication and stratospheric communication network protocols were described.Considering the realistic demand for the dynamic coverage of the satellite backbone network and node cost,the multi-layer satellite backbone network architecture was constructed.On this basis,the proposed Software-defined Space-Air-Ground Integrated network architecture could be built as a large,scalable and efficient communication network that could be integrated into space,air,and ground.展开更多
With the development of satellite communications,the number of satellite nodes is constantly increasing,which undoubtedly increases the difficulty of maintaining network security.Combining software defined network(SDN...With the development of satellite communications,the number of satellite nodes is constantly increasing,which undoubtedly increases the difficulty of maintaining network security.Combining software defined network(SDN) with traditional space-based networks provides a new class of ideas for solving this problem.However,because of the highly centralized network management of the SDN controller,once the SDN controller is destroyed by network attacks,the network it manages will be paralyzed due to loss of control.One of the main security threats to SDN controllers is Distributed Denial of Service(DDoS) attacks,so how to detect DDoS attacks scientifically has become a hot topic among SDN security management.This paper proposes a DDoS attack detection method for space-based networks based on SDN architecture.This attack detection method combines the optimized Long Short-Term Memory(LSTM) deep learning model and Support Vector Machine(SVM),which can not only make classification judgments on the time series,but also achieve the purpose of detecting and judging through the flow characteristics of a period of time.In addition,it can reduce the detection time as well as the system burden.展开更多
Aiming at the problem that the current traffic safety helmet detection model can't balance the accuracy of detection with the size of the model and the poor generalization of the model,a method based on improving ...Aiming at the problem that the current traffic safety helmet detection model can't balance the accuracy of detection with the size of the model and the poor generalization of the model,a method based on improving you only look once version 5(YOLOv5) is proposed.By incorporating the lightweight Ghost Net module into the YOLOv5 backbone network,we effectively reduce the model size.The addition of the receptive fields block(RFB) module enhances feature extraction and improves the feature acquisition capability of the lightweight model.Subsequently,the high-performance lightweight convolution,GSConv,is integrated into the neck structure for further model size compression.Moreover,the baseline model's loss function is substituted with efficient insertion over union(EIoU),accelerating network convergence and enhancing detection precision.Experimental results corroborate the effectiveness of this improved algorithm in real-world traffic scenarios.展开更多
In wireless sensor network,virtual backbone is a cost effective broadcasting method.Connected dominating set formation is proposed to construct a virtual backbone.However,it is NP-Hard to find a minimum connected domi...In wireless sensor network,virtual backbone is a cost effective broadcasting method.Connected dominating set formation is proposed to construct a virtual backbone.However,it is NP-Hard to find a minimum connected dominating set in an arbitrary graph.In this paper,based on cross-entropy method,we present a novel backbone formulation algorithm(BFA-CE)in wireless sensor network.In BFA-CE,a maximal independent set is got at first and nodes in the independent set are required to get their action sets.Based on those action sets,a backbone is generated with the cross-entropy method.Simulation results show that our algorithm can effectively reduce the size of backbone network within a reasonable message overhead,and it has lower average node degree.This approach can be potentially used in designing efficient broadcasting strategy or working as a backup routing of wireless sensor network.展开更多
The modern telecommunication system is characterized by the rapid improvement of information and communication technologies, such as the improvement in the data rate, power consumption and Quality of Service (QoS). Ba...The modern telecommunication system is characterized by the rapid improvement of information and communication technologies, such as the improvement in the data rate, power consumption and Quality of Service (QoS). Based on this development, the next generation network (NGN) is shaped. The NGN is represented by a packet transport network demarcated functions and services. To provide transport functions in NGN, using Multi-Protocol Label Switching (MPLS) technology, there are two main problems, which are multipath routing and traffic distribution, which are what this paper works with. Accordingly, this paper proposes a solution to these two problems using optimization procedures to find the shortest path Dijkstra and Bellman-Ford, which is characterized by a high-speed-oriented selection of a single shortest path between the source and the destination, based on several selected criteria related to the optimal use of the network resources. Solving the information flow distribution problems in large number of nodes network applying salesman procedure or having NP-completeness, causes significant time delay, which means that the proposed solution is not suitable for real time applications. Accordingly, for real time applications, there is a need to move to other methods based on the use of several independent shortest paths.展开更多
Clustering or connected dominating set (CDS) both approaches can establish a virtual backbone (VB) in wireless sensor networks (WSNs) or wireless mesh networks (WMNs). Each cluster consisting of a cluster head (CH) an...Clustering or connected dominating set (CDS) both approaches can establish a virtual backbone (VB) in wireless sensor networks (WSNs) or wireless mesh networks (WMNs). Each cluster consisting of a cluster head (CH) and its neighboring nodes can form a dominating set. After some bridging nodes were selected, cluster heads (CHs) connected through these bridging nodes naturally formed a CDS. Although CDS provides obvious backbone architecture, however, the number of cluster heads and bridging nodes may be too large, this may cause the loss of advantages of virtual backbone. When we effectively reduce their numbers, more effectively WCDS (Weakly Connected Dominating Set) can be fining out. Some essential topics on constructing WCDS-based VB in WSN/WMN are discussed in this paper. From the point of view of three different protocol layers, including network (NWK) layer, MAC layer, and physical (PHY) layer, we explore their cross-layer research topics and design algorithms. For NWK layer, area-based WCDS algorithms and routing strategies including via VB and not via VB are discussed. For MAC layer, a WCDS-based energy-efficient MAC protocol is presented. For PHY layer, battery-aware alternative VB selections and sensor nodes with different transmission ranges are addressed.展开更多
Wireless Mesh Networks(WMNs) are envisioned to support the wired backbone with a wireless Backbone Networks(BNet) for providing internet connectivity to large-scale areas.With a wide range of internet-oriented applica...Wireless Mesh Networks(WMNs) are envisioned to support the wired backbone with a wireless Backbone Networks(BNet) for providing internet connectivity to large-scale areas.With a wide range of internet-oriented applications with different Quality of Service(QoS) requirement, the large-scale WMNs should have good scalability and large bandwidth.In this paper, a Load Aware Adaptive Backbone Synthesis(LAABS) algorithm is proposed to automatically balance the traffic flow in the WMNs.The BNet will dynamically split into smaller size or merge into bigger one according to statistic load information of Backbone Nodes(BNs).Simulation results show LAABS generates moderate BNet size and converges quickly, thus providing scalable and stable BNet to facilitate traffic flow.展开更多
Aiming at the problems of low detection accuracy and large model size of existing object detection algorithms applied to complex road scenes,an improved you only look once version 8(YOLOv8)object detection algorithm f...Aiming at the problems of low detection accuracy and large model size of existing object detection algorithms applied to complex road scenes,an improved you only look once version 8(YOLOv8)object detection algorithm for infrared images,F-YOLOv8,is proposed.First,a spatial-to-depth network replaces the traditional backbone network's strided convolution or pooling layer.At the same time,it combines with the channel attention mechanism so that the neural network focuses on the channels with large weight values to better extract low-resolution image feature information;then an improved feature pyramid network of lightweight bidirectional feature pyramid network(L-BiFPN)is proposed,which can efficiently fuse features of different scales.In addition,a loss function of insertion of union based on the minimum point distance(MPDIoU)is introduced for bounding box regression,which obtains faster convergence speed and more accurate regression results.Experimental results on the FLIR dataset show that the improved algorithm can accurately detect infrared road targets in real time with 3%and 2.2%enhancement in mean average precision at 50%IoU(mAP50)and mean average precision at 50%—95%IoU(mAP50-95),respectively,and 38.1%,37.3%and 16.9%reduction in the number of model parameters,the model weight,and floating-point operations per second(FLOPs),respectively.To further demonstrate the detection capability of the improved algorithm,it is tested on the public dataset PASCAL VOC,and the results show that F-YOLO has excellent generalized detection performance.展开更多
1 Technical Features of ZTE’sDWDM SystemThe toll backbone wave division equipmentof ZXWM M900 backbone transmissionplatform is well designed forlarge-capacity optical transmission. It canfully satisfy the networking ...1 Technical Features of ZTE’sDWDM SystemThe toll backbone wave division equipmentof ZXWM M900 backbone transmissionplatform is well designed forlarge-capacity optical transmission. It canfully satisfy the networking and managementrequirements of diversified users and be fit forvarious toll backbone networks. The systemsupports up to 40 working wavelengths and up to400 Gb/s transmission capacity, and thewavelength selection and interval are in strictcompliance with ITU-T Recommendations. It展开更多
The Tianlian 1-03 satellite, the third geosynchronous data relay satellite of China, was successfully launched into space on a LM-3C launch vehicle from the Xichang Satellite Launch Center at 23:43 Beijing time on Jul...The Tianlian 1-03 satellite, the third geosynchronous data relay satellite of China, was successfully launched into space on a LM-3C launch vehicle from the Xichang Satellite Launch Center at 23:43 Beijing time on July 25. Twenty-six minutes after the liftoff, the satellite展开更多
In wireless artificial intelligent computing systems,the construction of backbone network,which determines the optimum network for a set of given terminal nodes like users,switches,and concentrators,can be naturally f...In wireless artificial intelligent computing systems,the construction of backbone network,which determines the optimum network for a set of given terminal nodes like users,switches,and concentrators,can be naturally formed as the Steiner tree problem.The Steiner tree problem asks for a minimum edge-weighted tree spanning a given set of terminal vertices from a given graph.As a well-known graph problem,many algorithms have been developed for solving this computationally challenging problem in the past decades.However,existing algorithms typically encounter difficulties for solving large instances,i.e.,graphs with a high number of vertices and terminals.In this paper,we present a novel partition-and-merge algorithm for effectively handle large-scale graphs.The algorithm breaks the input network into small subgraphs and then merges the subgraphs in a bottom-up manner.In the merging procedure,partial Steiner trees in the subgraphs are also created and optimized by an efficient local optimization.When the merging procedure ends,the algorithm terminates and reports the final solution for the input graph.We evaluated the algorithm on a wide range of benchmark instances,showing that the algorithm outperforms the best-known algorithms on large instances and competes favorably with them on small or middle-sized instances.展开更多
Optical transport networks are now the basic infrastructure of modern communications systems, including the SDH and WDM backbone network of local network operators, in the case of Cameroon. Given the colossal investme...Optical transport networks are now the basic infrastructure of modern communications systems, including the SDH and WDM backbone network of local network operators, in the case of Cameroon. Given the colossal investments required to deploy these networks, particularly related to the cost of equipment (optical fibers, transponders and multiplexers), the optimization of bandwidth and dynamic allocation of resources is essential to control operating costs and ensure continuity of service. Automatic switching technology for optical networks brings intelligence to the control plane to fully facilitate bandwidth utilization, traffic redirection, and automatic configuration of end-to-end services. This paper considers a local network operator’s WDM network without the implementation of the automatic switching technology, develops a network modeling software platform called Graphic Networks and using graph theory integrates a particularity of the automatic switching technology, which is the automatic rerouting of traffic in case of incident in the network. The incidents considered here are those links or route failures and node failures.展开更多
为更好调节皮革真空干燥机温度控制效果,提出一种基于改进Yolov5网络的经皮革真空干燥机干燥的皮革图像缺陷检测方法。其中,首先对Yolov5网络的主干网络和损失函数进行改进,然后采用改进的Yolov5网络对经皮革真空干燥机干燥的皮革图像...为更好调节皮革真空干燥机温度控制效果,提出一种基于改进Yolov5网络的经皮革真空干燥机干燥的皮革图像缺陷检测方法。其中,首先对Yolov5网络的主干网络和损失函数进行改进,然后采用改进的Yolov5网络对经皮革真空干燥机干燥的皮革图像进行缺陷检测;最后将该网络用于经皮革真空干燥机干燥的皮革裂缝图像等的缺陷检测中。结果表明,改进后的Yolov5网络的精确率、召回率和m A P分别取值为96.47%、95.19%和97.32%,相较于改进前,分别提升14.15%、28.02%和19.63%;对比于传统的卷积神经网络和改进双边滤波检测算法,本网络的精确率、召回率和m A P明显更高。综合分析可知,采用本网络可实现对皮革真空干燥机干燥后的皮革进行图像检测,从而为后续的干燥机温度控制提供参考。展开更多
文摘This paper presents a novel algorithm for the gateway placement problem in Backbone Wireless Mesh Networks (BWMNs). Different from existing algorithms, the new algorithm incrementally identifies gateways and assigns mesh routers to identified gateways. The new algorithm can guarantee to find a feasible gateway placement satisfying Quality-of-Service (QoS) constraints, including delay constraint, relay load constraint and gateway capacity constraint. Experimental results show that its performance is as good as that of the best of existing algorithms for the gateway placement problem. But, the new algorithm can be used for BWMNs that do not form one connected component, and it is easy to implement and use.
基金support from National Natural Science Foundation of China(Grant No.71971006)Humanities and Social Science Foundation of Ministry of Education of the People’s Republic of China(Grant No.19YJCGJW014).
文摘Purpose:With the availability and utilization of Inter-Country Input-Output(ICIO)tables,it is possible to construct quantitative indices to assess its impact on the Global Value Chain(GVC).For the sake of visualization,ICIO networks with tremendous low-weight edges are too dense to show the substantial structure.These redundant edges,inevitably make the network data full of noise and eventually exert negative effects on Social Network Analysis(SNA).In this case,we need a method to filter such edges and obtain a sparser network with only the meaningful connections.Design/methodology/approach:In this paper,we propose two parameterless pruning algorithms from the global and local perspectives respectively,then the performance of them is examined using the ICIO table from different databases.Findings:The Searching Paths(SP)method extracts the strongest association paths from the global perspective,while Filtering Edges(FE)method captures the key links according to the local weight ratio.The results show that the FE method can basically include the SP method and become the best solution for the ICIO networks.Research limitations:There are still two limitations in this research.One is that the computational complexity may increase rapidly while processing the large-scale networks,so the proposed method should be further improved.The other is that much more empirical networks should be introduced to testify the scientificity and practicability of our methodology.Practical implications:The network pruning methods we proposed will promote the analysis of the ICIO network,in terms of community detection,link prediction,and spatial econometrics,etc.Also,they can be applied to many other complex networks with similar characteristics.Originality/value:This paper improves the existing research from two aspects,namely,considering the heterogeneity of weights and avoiding the interference of parameters.Therefore,it provides a new idea for the research of network backbone extraction.
基金The National Natural Science Foundation ofChina(No.60272082)The Important Science and Technology Key Item of Shanghai(No.05dzl5004)
文摘The virtual backbone is an approach for solving routing problems in wireless ad hoc and sensor networks. A connected dominating set (CDS) was proposed as a virtual backbone to improve the performance of wireless networks. The quality of a virtual backbone is measured not only by approximation factor, which is the ratio of its size to that of minimum CDS, but also time complexity and message complexity. In this paper, a distributed algorithm is presented to construct a minimum CDS for ad hoc and sensor networks. By destroying triangular loops in the virtual backbone, the proposed algorithm can effectively construct a CDS with smaller size. Moreover, our algorithm, which is fully localized, has a constant approximation ratio, linear message and time complexity, and low implementation complexity. The simulation results and theoretical analysis show that our algorithm has better efficiency and performance than conventional approaches.
基金supported by the National Natural Science Foundation of China under Grant Nos.61602105 and 61572123China Postdoctoral Science Foundation under Grant Nos.2016M601323+1 种基金the Fundamental Research Funds for the Central Universities Project under Grant No.N150403007CERNET Innovation Project under Grant No.NGII20160126
文摘Configuration errors are proved to be the main reasons for network interruption and anomalies.Many researchers have paid their attention to configuration analysis and provisioning,but few works focus on understanding the configuration evolution.In this paper,we uncover the configuration evolution of an operational IP backbone based on the weekly reports gathered from January 2006 to January 2013.We find that rate limiting and launching routes for new customers are configured most frequently.In addition,we conduct an analysis of network failures and find that link failures are the main causes for network failures.We suggest that we should configure redundant links for the links which are easy to break down.At last,according to the analysis results,we illustrate how to provide semi-automated configuration for rate limiting and adding customers.
基金This work is supported by Fundamental Research Funds for the Central Universities of China(328201911)C.G.(Chao Guo),the Open Project Program of National Engineering Laboratory for Agri-product Quality Traceability,C.G.(Chao Guo)+2 种基金Beijing Technology and Business University(BTBU)No.AQT-2018Y-B4,C.G.(Chao Guo)Higher Education Department of the Ministry of Education Industry-university Cooperative Education Project,C.G.(Chao Guo)Education and Teaching Reform Project of Beijing Electronic and Technology Institute,C.G.(Chao Guo).
文摘Under the background of the rapid development of ground mobile communication,the advantages of high coverage,survivability,and flexibility of satellite communication provide air support to the construction of space information network.According to the requirements of the future space information communication,a software-defined Space-Air-Ground Integrated network architecture was proposed.It consisted of layered structure satellite backbone network,deep space communication network,the stratosphere communication network and the ground network.The Space-Air-Ground Integrated network was supported by the satellite backbone network.It provided data relay for the missions such as deep space exploration and controlled the deep-space spacecraft when needed.In addition,it safeguarded the anti-destructibility of stratospheric communication and assisted the stratosphere to supplement ground network communication.In this paper,algorithm requirements of the congestion control and routing of satellite backbone protocols for heterogeneous users’services were proposed.The algorithm requirements of distinguishing different service objects for the deep space communication and stratospheric communication network protocols were described.Considering the realistic demand for the dynamic coverage of the satellite backbone network and node cost,the multi-layer satellite backbone network architecture was constructed.On this basis,the proposed Software-defined Space-Air-Ground Integrated network architecture could be built as a large,scalable and efficient communication network that could be integrated into space,air,and ground.
基金the National Natural Science Foundation of Chi⁃na under Grant Nos.61671183 and 61771163.
文摘With the development of satellite communications,the number of satellite nodes is constantly increasing,which undoubtedly increases the difficulty of maintaining network security.Combining software defined network(SDN) with traditional space-based networks provides a new class of ideas for solving this problem.However,because of the highly centralized network management of the SDN controller,once the SDN controller is destroyed by network attacks,the network it manages will be paralyzed due to loss of control.One of the main security threats to SDN controllers is Distributed Denial of Service(DDoS) attacks,so how to detect DDoS attacks scientifically has become a hot topic among SDN security management.This paper proposes a DDoS attack detection method for space-based networks based on SDN architecture.This attack detection method combines the optimized Long Short-Term Memory(LSTM) deep learning model and Support Vector Machine(SVM),which can not only make classification judgments on the time series,but also achieve the purpose of detecting and judging through the flow characteristics of a period of time.In addition,it can reduce the detection time as well as the system burden.
文摘Aiming at the problem that the current traffic safety helmet detection model can't balance the accuracy of detection with the size of the model and the poor generalization of the model,a method based on improving you only look once version 5(YOLOv5) is proposed.By incorporating the lightweight Ghost Net module into the YOLOv5 backbone network,we effectively reduce the model size.The addition of the receptive fields block(RFB) module enhances feature extraction and improves the feature acquisition capability of the lightweight model.Subsequently,the high-performance lightweight convolution,GSConv,is integrated into the neck structure for further model size compression.Moreover,the baseline model's loss function is substituted with efficient insertion over union(EIoU),accelerating network convergence and enhancing detection precision.Experimental results corroborate the effectiveness of this improved algorithm in real-world traffic scenarios.
基金supported partially by the science and technology project of CQ CSTC(No.cstc2012jjA40037)
文摘In wireless sensor network,virtual backbone is a cost effective broadcasting method.Connected dominating set formation is proposed to construct a virtual backbone.However,it is NP-Hard to find a minimum connected dominating set in an arbitrary graph.In this paper,based on cross-entropy method,we present a novel backbone formulation algorithm(BFA-CE)in wireless sensor network.In BFA-CE,a maximal independent set is got at first and nodes in the independent set are required to get their action sets.Based on those action sets,a backbone is generated with the cross-entropy method.Simulation results show that our algorithm can effectively reduce the size of backbone network within a reasonable message overhead,and it has lower average node degree.This approach can be potentially used in designing efficient broadcasting strategy or working as a backup routing of wireless sensor network.
文摘The modern telecommunication system is characterized by the rapid improvement of information and communication technologies, such as the improvement in the data rate, power consumption and Quality of Service (QoS). Based on this development, the next generation network (NGN) is shaped. The NGN is represented by a packet transport network demarcated functions and services. To provide transport functions in NGN, using Multi-Protocol Label Switching (MPLS) technology, there are two main problems, which are multipath routing and traffic distribution, which are what this paper works with. Accordingly, this paper proposes a solution to these two problems using optimization procedures to find the shortest path Dijkstra and Bellman-Ford, which is characterized by a high-speed-oriented selection of a single shortest path between the source and the destination, based on several selected criteria related to the optimal use of the network resources. Solving the information flow distribution problems in large number of nodes network applying salesman procedure or having NP-completeness, causes significant time delay, which means that the proposed solution is not suitable for real time applications. Accordingly, for real time applications, there is a need to move to other methods based on the use of several independent shortest paths.
文摘Clustering or connected dominating set (CDS) both approaches can establish a virtual backbone (VB) in wireless sensor networks (WSNs) or wireless mesh networks (WMNs). Each cluster consisting of a cluster head (CH) and its neighboring nodes can form a dominating set. After some bridging nodes were selected, cluster heads (CHs) connected through these bridging nodes naturally formed a CDS. Although CDS provides obvious backbone architecture, however, the number of cluster heads and bridging nodes may be too large, this may cause the loss of advantages of virtual backbone. When we effectively reduce their numbers, more effectively WCDS (Weakly Connected Dominating Set) can be fining out. Some essential topics on constructing WCDS-based VB in WSN/WMN are discussed in this paper. From the point of view of three different protocol layers, including network (NWK) layer, MAC layer, and physical (PHY) layer, we explore their cross-layer research topics and design algorithms. For NWK layer, area-based WCDS algorithms and routing strategies including via VB and not via VB are discussed. For MAC layer, a WCDS-based energy-efficient MAC protocol is presented. For PHY layer, battery-aware alternative VB selections and sensor nodes with different transmission ranges are addressed.
基金Supported in part by Natural Science Fundation of Jiangsu Province (No.06KJA51001)
文摘Wireless Mesh Networks(WMNs) are envisioned to support the wired backbone with a wireless Backbone Networks(BNet) for providing internet connectivity to large-scale areas.With a wide range of internet-oriented applications with different Quality of Service(QoS) requirement, the large-scale WMNs should have good scalability and large bandwidth.In this paper, a Load Aware Adaptive Backbone Synthesis(LAABS) algorithm is proposed to automatically balance the traffic flow in the WMNs.The BNet will dynamically split into smaller size or merge into bigger one according to statistic load information of Backbone Nodes(BNs).Simulation results show LAABS generates moderate BNet size and converges quickly, thus providing scalable and stable BNet to facilitate traffic flow.
基金supported by the National Natural Science Foundation of China(No.62103298)。
文摘Aiming at the problems of low detection accuracy and large model size of existing object detection algorithms applied to complex road scenes,an improved you only look once version 8(YOLOv8)object detection algorithm for infrared images,F-YOLOv8,is proposed.First,a spatial-to-depth network replaces the traditional backbone network's strided convolution or pooling layer.At the same time,it combines with the channel attention mechanism so that the neural network focuses on the channels with large weight values to better extract low-resolution image feature information;then an improved feature pyramid network of lightweight bidirectional feature pyramid network(L-BiFPN)is proposed,which can efficiently fuse features of different scales.In addition,a loss function of insertion of union based on the minimum point distance(MPDIoU)is introduced for bounding box regression,which obtains faster convergence speed and more accurate regression results.Experimental results on the FLIR dataset show that the improved algorithm can accurately detect infrared road targets in real time with 3%and 2.2%enhancement in mean average precision at 50%IoU(mAP50)and mean average precision at 50%—95%IoU(mAP50-95),respectively,and 38.1%,37.3%and 16.9%reduction in the number of model parameters,the model weight,and floating-point operations per second(FLOPs),respectively.To further demonstrate the detection capability of the improved algorithm,it is tested on the public dataset PASCAL VOC,and the results show that F-YOLO has excellent generalized detection performance.
文摘1 Technical Features of ZTE’sDWDM SystemThe toll backbone wave division equipmentof ZXWM M900 backbone transmissionplatform is well designed forlarge-capacity optical transmission. It canfully satisfy the networking and managementrequirements of diversified users and be fit forvarious toll backbone networks. The systemsupports up to 40 working wavelengths and up to400 Gb/s transmission capacity, and thewavelength selection and interval are in strictcompliance with ITU-T Recommendations. It
文摘The Tianlian 1-03 satellite, the third geosynchronous data relay satellite of China, was successfully launched into space on a LM-3C launch vehicle from the Xichang Satellite Launch Center at 23:43 Beijing time on July 25. Twenty-six minutes after the liftoff, the satellite
基金funded by the Sichuan Province Science and Technology Program(No.2024NSFTD0033)the National Natural Science Foundation of China(Nos.62372093 and 62376055)+1 种基金the Natural Science Foundation of Sichuan Province of China(No.2023NSFSC1415)the Shenzhen Agency of Innovation(No.KJZD20240903095712016).
文摘In wireless artificial intelligent computing systems,the construction of backbone network,which determines the optimum network for a set of given terminal nodes like users,switches,and concentrators,can be naturally formed as the Steiner tree problem.The Steiner tree problem asks for a minimum edge-weighted tree spanning a given set of terminal vertices from a given graph.As a well-known graph problem,many algorithms have been developed for solving this computationally challenging problem in the past decades.However,existing algorithms typically encounter difficulties for solving large instances,i.e.,graphs with a high number of vertices and terminals.In this paper,we present a novel partition-and-merge algorithm for effectively handle large-scale graphs.The algorithm breaks the input network into small subgraphs and then merges the subgraphs in a bottom-up manner.In the merging procedure,partial Steiner trees in the subgraphs are also created and optimized by an efficient local optimization.When the merging procedure ends,the algorithm terminates and reports the final solution for the input graph.We evaluated the algorithm on a wide range of benchmark instances,showing that the algorithm outperforms the best-known algorithms on large instances and competes favorably with them on small or middle-sized instances.
文摘Optical transport networks are now the basic infrastructure of modern communications systems, including the SDH and WDM backbone network of local network operators, in the case of Cameroon. Given the colossal investments required to deploy these networks, particularly related to the cost of equipment (optical fibers, transponders and multiplexers), the optimization of bandwidth and dynamic allocation of resources is essential to control operating costs and ensure continuity of service. Automatic switching technology for optical networks brings intelligence to the control plane to fully facilitate bandwidth utilization, traffic redirection, and automatic configuration of end-to-end services. This paper considers a local network operator’s WDM network without the implementation of the automatic switching technology, develops a network modeling software platform called Graphic Networks and using graph theory integrates a particularity of the automatic switching technology, which is the automatic rerouting of traffic in case of incident in the network. The incidents considered here are those links or route failures and node failures.
文摘为更好调节皮革真空干燥机温度控制效果,提出一种基于改进Yolov5网络的经皮革真空干燥机干燥的皮革图像缺陷检测方法。其中,首先对Yolov5网络的主干网络和损失函数进行改进,然后采用改进的Yolov5网络对经皮革真空干燥机干燥的皮革图像进行缺陷检测;最后将该网络用于经皮革真空干燥机干燥的皮革裂缝图像等的缺陷检测中。结果表明,改进后的Yolov5网络的精确率、召回率和m A P分别取值为96.47%、95.19%和97.32%,相较于改进前,分别提升14.15%、28.02%和19.63%;对比于传统的卷积神经网络和改进双边滤波检测算法,本网络的精确率、召回率和m A P明显更高。综合分析可知,采用本网络可实现对皮革真空干燥机干燥后的皮革进行图像检测,从而为后续的干燥机温度控制提供参考。