期刊文献+
共找到305,305篇文章
< 1 2 250 >
每页显示 20 50 100
基于改进LSTM算法的无线网络DDoS攻击防御方法
1
作者 徐伟 冷静 《现代电子技术》 北大核心 2026年第8期61-64,70,共5页
为有效防御无线网络中的DDoS攻击,保证网络服务的连续性与稳定性及安全通信,提出一种基于改进LSTM算法的无线网络DDoS攻击防御方法。该方法分析无线网络中DDoS攻击的模式特点和影响,确定网络在攻击下的流量变化规律;在LSTM算法中添加门... 为有效防御无线网络中的DDoS攻击,保证网络服务的连续性与稳定性及安全通信,提出一种基于改进LSTM算法的无线网络DDoS攻击防御方法。该方法分析无线网络中DDoS攻击的模式特点和影响,确定网络在攻击下的流量变化规律;在LSTM算法中添加门控机制和存储单元,构建BiLSTM网络,以快速捕获DDoS攻击下无线网络中所有节点的流量数据集;依据检测结果,采用弹性一致性算法拦截异常流量,从而实现对无线网络DDoS的防御。实验结果表明,所提方法可以快速、准确地检测流量表中的无线网络DDoS攻击,实现有效防御,数据包转发成功率大于96%,对无线网络DDoS攻击具有很好的防御效果,可以保证网络服务的连续性。 展开更多
关键词 改进LSTM算法 无线网络 ddos攻击 攻击防御 弹性一致性 流量数据 攻击模式
在线阅读 下载PDF
SDN环境下双阶段DDoS攻击检测方法
2
作者 包晓安 范云龙 +3 位作者 涂小妹 胡天缤 张娜 吴彪 《电信科学》 北大核心 2026年第2期135-147,共13页
针对软件定义网络(software-defined network,SDN)中分布式拒绝服务(distributed denial of service,DDoS)攻击检测存在的特征丢失、模型计算复杂度高以及检测实时性不足等问题,提出了一种系统化的检测框架。首先,提出一种融合流级与包... 针对软件定义网络(software-defined network,SDN)中分布式拒绝服务(distributed denial of service,DDoS)攻击检测存在的特征丢失、模型计算复杂度高以及检测实时性不足等问题,提出了一种系统化的检测框架。首先,提出一种融合流级与包级双粒度信息的流量表征方法,以多尺度挖掘攻击行为的关键特征,提升流量表征信息的完整性。其次,构建基于Mamba架构的轻量级检测模型DDoSMamba。该模型首先利用状态空间建模与全局感受野机制,降低序列建模中的计算资源与内存消耗;然后引入双向信息交互机制,增强对序列前后文关系的建模能力;最后结合低秩近似分解与特征子空间划分策略,显著压缩参数规模与推理开销。最后,进一步设计双阶段DDoS攻击检测方法:第一阶段,利用Tsallis熵对粗粒度特征进行快速筛查,排除大量正常流量;第二阶段,基于细粒度特征进行高精度分类,实现快速响应与精准检测的平衡。在CIC-IDS2019数据集上的实验结果表明,本文所提方法在二分类与多分类任务中分别达到99.96%与99.93%的准确率,平均检测耗时仅为0.067 2 ms,参数量低至4.553 8 KB。 展开更多
关键词 软件定义网络 ddos攻击检测 流量表征 双阶段检测分类
在线阅读 下载PDF
基于Takens-Transformer与GCN的DDoS攻击检测
3
作者 邓钰洋 芦天亮 +2 位作者 李知皓 孟昊阳 李锦儒 《计算机应用研究》 北大核心 2026年第2期567-576,共10页
针对现有分布式拒绝服务(DDoS)攻击检测适应性弱、计算成本高的问题,提出基于时间延迟嵌入和图卷积网络的Transformer模型(TDE-TGCN)。该模型利用Takens定理将网络流量建模为动力学系统,通过时间延迟嵌入揭示DDoS攻击对流量非线性特征... 针对现有分布式拒绝服务(DDoS)攻击检测适应性弱、计算成本高的问题,提出基于时间延迟嵌入和图卷积网络的Transformer模型(TDE-TGCN)。该模型利用Takens定理将网络流量建模为动力学系统,通过时间延迟嵌入揭示DDoS攻击对流量非线性特征的影响;采用Transformer模型将流量序列映射至高维空间,通过多头注意力机制捕捉突发性和全局关联;结合图卷积网络挖掘拓扑信息及跨节点攻击模式。在CIC-IDS2017等数据集和特征变异模拟的未知攻击场景下,TDE-TGCN检测准确率达到98.7%,误报率降低至1.2%,计算效率提升35%;消融实验验证了各组件对模型性能的显著贡献。该研究从动力学系统角度重新审视网络流量特征,提出理论与实践相结合的检测框架,为复杂网络环境下的DDoS攻击检测提供了有效技术方案。 展开更多
关键词 网络流量 ddos攻击检测 Takens定理 图卷积网络 TRANSFORMER
在线阅读 下载PDF
面向SDN流表多模态感知与DRL协同防御DDoS方法
4
作者 徐泽鹏 舒兆港 +2 位作者 陈淑武 涂强 庄涛 《计算机应用研究》 北大核心 2026年第2期596-603,共8页
软件定义网络(SDN)的集中化控制架构在提升管理效率的同时,面临分布式拒绝服务(DDoS)攻击风险。针对传统检测方法难以应对大规模动态流量中的隐蔽攻击行为,且易误封短时高并发正常流量的问题,提出一种基于多模态深度强化学习的DDoS防御... 软件定义网络(SDN)的集中化控制架构在提升管理效率的同时,面临分布式拒绝服务(DDoS)攻击风险。针对传统检测方法难以应对大规模动态流量中的隐蔽攻击行为,且易误封短时高并发正常流量的问题,提出一种基于多模态深度强化学习的DDoS防御系统。该系统通过融合时空特征解耦与智能决策优化,实现检测精度与资源效率的动态平衡,在资源充足时最大程度规避对非攻击流量的拒绝服务。实验结果显示,其攻击检测准确率平均达99.61%,误封率最高不超过0.5%,在保证高准确率的前提下降低了合法流量误封,实现了防御过程对网络服务质量的保障。 展开更多
关键词 软件定义网络 分布式拒绝服务攻击 对抗深度强化学习网络 张量分解
在线阅读 下载PDF
FRF-BiLSTM:Recognising and Mitigating DDoS Attacks through a Secure Decentralized Feature Optimized Federated Learning Approach
5
作者 Sushruta Mishra Sunil Kumar Mohapatra +2 位作者 Kshira Sagar Sahoo Anand Nayyar Tae-Kyung Kim 《Computers, Materials & Continua》 2026年第3期1118-1138,共21页
With an increase in internet-connected devices and a dependency on online services,the threat of Distributed Denial of Service(DDoS)attacks has become a significant concern in cybersecurity.The proposed system follows... With an increase in internet-connected devices and a dependency on online services,the threat of Distributed Denial of Service(DDoS)attacks has become a significant concern in cybersecurity.The proposed system follows a multi-step process,beginning with the collection of datasets from different edge devices and network nodes.To verify its effectiveness,experiments were conducted using the CICDoS2017,NSL-KDD,and CICIDS benchmark datasets alongside other existing models.Recursive feature elimination(RFE)with random forest is used to select features from the CICDDoS2019 dataset,on which a BiLSTM model is trained on local nodes.Local models are trained until convergence or stability criteria are met while simultaneously sharing the updates globally for collaborative learning.A centralised server evaluates real-time traffic using the global BiLSTM model,which triggers alerts for potential DDoS attacks.Furthermore,blockchain technology is employed to secure model updates and to provide an immutable audit trail,thereby ensuring trust and accountability among network nodes.This research introduces a novel decentralized method called Federated Random Forest Bidirectional Long Short-Term Memory(FRF-BiLSTM)for detecting DDoS attacks,utilizing the advanced Bidirectional Long Short-Term Memory Networks(BiLSTMs)to analyze sequences in both forward and backward directions.The outcome shows the proposed model achieves a mean accuracy of 97.1%with an average training delay of 88.7 s and testing delay of 21.4 s.The model demonstrates scalability and the best detection performance in large-scale attack scenarios. 展开更多
关键词 Bi-directional long short-term memory network distributed denial of service(ddos) CYBERSECURITY federated learning random forest
在线阅读 下载PDF
Distributed Quasi-Newton Algorithm for Non-Randomly Stored Data
6
作者 LIU Xirui WU Mixia LIU Bangshu 《Journal of Systems Science & Complexity》 2026年第1期456-480,共25页
Distributed learning is a well-established method for estimation tasks over extensively distributed datasets.However,non-randomly stored data can introduce bias into local parameter estimates,leading to significant pe... Distributed learning is a well-established method for estimation tasks over extensively distributed datasets.However,non-randomly stored data can introduce bias into local parameter estimates,leading to significant performance degradation in classical distributed algorithms.In this paper,the authors propose a novel Distributed Quasi-Newton Pilot(DQNP)method for distributed learning with non-randomly distributed data.The proposed approach accommodates both randomly and non-randomly distributed data settings and imposes no constraints on the uniformity of local sample sizes.Additionally,it avoids the need to transfer the Hessian matrix or compute its inversion,thereby greatly reducing computational and communication complexity.The authors theoretically demonstrate that the resulting estimator achieves statistical efficiency under mild conditions.Extensive numerical experiments on synthetic and real-world data validate the theoretical findings and illustrate the effectiveness of the proposed method. 展开更多
关键词 Communication-efficient computation efficiency distributed inference non-randomly distributed data quasi-Newton algorithm
原文传递
Explainable Hybrid AI Model for DDoS Detection in SDN-Enabled Internet of Vehicle
7
作者 Oumaima Saidani Nazia Azim +5 位作者 Ateeq Ur Rehman Akbayan Bekarystankyzy Hala Abdel Hameed Mostafa Mohamed R.Abonazel Ehab Ebrahim Mohamed Ebrahim Sarah Abu Ghazalah 《Computers, Materials & Continua》 2026年第5期499-526,共28页
The convergence of Software Defined Networking(SDN)in Internet of Vehicles(IoV)enables a flexible,programmable,and globally visible network control architecture across Road Side Units(RSUs),cloud servers,and automobil... The convergence of Software Defined Networking(SDN)in Internet of Vehicles(IoV)enables a flexible,programmable,and globally visible network control architecture across Road Side Units(RSUs),cloud servers,and automobiles.While this integration enhances scalability and safety,it also raises sophisticated cyberthreats,particularly Distributed Denial of Service(DDoS)attacks.Traditional rule-based anomaly detection methods often struggle to detectmodern low-and-slowDDoS patterns,thereby leading to higher false positives.To this end,this study proposes an explainable hybrid framework to detect DDoS attacks in SDN-enabled IoV(SDN-IoV).The hybrid framework utilizes a Residual Network(ResNet)to capture spatial correlations and a Bi-Long Short-Term Memory(BiLSTM)to capture both forward and backward temporal dependencies in high-dimensional input patterns.To ensure transparency and trustworthiness,themodel integrates the Explainable AI(XAI)technique,i.e.,SHapley Additive exPlanations(SHAP).SHAP highlights the contribution of each feature during the decision-making process,facilitating security analysts to understand the rationale behind the attack classification decision.The SDN-IoV environment is created in Mininet-WiFi and SUMO,and the hybrid model is trained on the CICDDoS2019 security dataset.The simulation results reveal the efficacy of the proposed model in terms of standard performance metrics compared to similar baseline methods. 展开更多
关键词 Explainable AI software defined networking Internet of vehicles ddos attack ResNet BiLSTM
在线阅读 下载PDF
Distributed continuous-time aggregative optimization and its applications to power generation systems
8
作者 XIAN Chengxin ZHAO Yu LIU Yongfang 《Journal of Systems Engineering and Electronics》 2026年第1期1-8,共8页
This paper investigates the distributed continuoustime aggregative optimization problem for second-order multiagent systems,where the local cost function is not only related to its own decision variables,but also to t... This paper investigates the distributed continuoustime aggregative optimization problem for second-order multiagent systems,where the local cost function is not only related to its own decision variables,but also to the aggregation of the decision variables of all the agents.By using the gradient descent method,the distributed average tracking(DAT)technique and the time-base generator(TBG)technique,a distributed continuous-time aggregative optimization algorithm is proposed.Subsequently,the optimality of the system's equilibrium point is analyzed,and the convergence of the closed-loop system is proved using the Lyapunov stability theory.Finally,the effectiveness of the proposed algorithm is validated through case studies on multirobot systems and power generation systems. 展开更多
关键词 distributed continuous-time aggregative optimization distributed average tracking(DAT) time-base generator(TBG)
在线阅读 下载PDF
Deep Feature-Driven Hybrid Temporal Learning and Instance-Based Classification for DDoS Detection in Industrial Control Networks
9
作者 Haohui Su Xuan Zhang +2 位作者 Lvjun Zheng Xiaojie Shen Hua Liao 《Computers, Materials & Continua》 2026年第3期708-733,共26页
Distributed Denial-of-Service(DDoS)attacks pose severe threats to Industrial Control Networks(ICNs),where service disruption can cause significant economic losses and operational risks.Existing signature-based methods... Distributed Denial-of-Service(DDoS)attacks pose severe threats to Industrial Control Networks(ICNs),where service disruption can cause significant economic losses and operational risks.Existing signature-based methods are ineffective against novel attacks,and traditional machine learning models struggle to capture the complex temporal dependencies and dynamic traffic patterns inherent in ICN environments.To address these challenges,this study proposes a deep feature-driven hybrid framework that integrates Transformer,BiLSTM,and KNN to achieve accurate and robust DDoS detection.The Transformer component extracts global temporal dependencies from network traffic flows,while BiLSTM captures fine-grained sequential dynamics.The learned embeddings are then classified using an instance-based KNN layer,enhancing decision boundary precision.This cascaded architecture balances feature abstraction and locality preservation,improving both generalization and robustness.The proposed approach was evaluated on a newly collected real-time ICN traffic dataset and further validated using the public CIC-IDS2017 and Edge-IIoT datasets to demonstrate generalization.Comprehensive metrics including accuracy,precision,recall,F1-score,ROC-AUC,PR-AUC,false positive rate(FPR),and detection latency were employed.Results show that the hybrid framework achieves 98.42%accuracy with an ROC-AUC of 0.992 and FPR below 1%,outperforming baseline machine learning and deep learning models.Robustness experiments under Gaussian noise perturbations confirmed stable performance with less than 2%accuracy degradation.Moreover,detection latency remained below 2.1 ms per sample,indicating suitability for real-time ICS deployment.In summary,the proposed hybrid temporal learning and instance-based classification model offers a scalable and effective solution for DDoS detection in industrial control environments.By combining global contextual modeling,sequential learning,and instance-based refinement,the framework demonstrates strong adaptability across datasets and resilience against noise,providing practical utility for safeguarding critical infrastructure. 展开更多
关键词 ddos detection transformer BiLSTM K-Nearest Neighbor representation learning network security intrusion detection real-time classification
在线阅读 下载PDF
A Novel Distributed Controller Design for Robust Global Coordination of MASs With Heterogeneous Saturation
10
作者 Xiaoling Wang Shengnan Zhu 《IEEE/CAA Journal of Automatica Sinica》 2026年第1期230-232,共3页
Dear Editor,This letter addresses the challenge of achieving robust global coordination in multi-agent systems(MASs)subject to heterogeneous actuator saturation and additive input disturbances.We develop a novel distr... Dear Editor,This letter addresses the challenge of achieving robust global coordination in multi-agent systems(MASs)subject to heterogeneous actuator saturation and additive input disturbances.We develop a novel distributed control framework that strategically integrates a redesigned saturation function to handle the nonlinear actuator constraint and a high-gain feedback mechanism for effective disturbance rejection. 展开更多
关键词 robust global coordination disturbance rejection nonlinear actuator constraint distributed control multi agent systems actuator saturation distributed control framework heterogeneous actuator saturation
在线阅读 下载PDF
A Multi-Scale Graph Neural Networks Ensemble Approach for Enhanced DDoS Detection
11
作者 Noor Mueen Mohammed Ali Hayder Seyed Amin Hosseini Seno +2 位作者 Hamid Noori Davood Zabihzadeh Mehdi Ebady Manaa 《Computers, Materials & Continua》 2026年第4期1216-1242,共27页
Distributed Denial of Service(DDoS)attacks are one of the severe threats to network infrastructure,sometimes bypassing traditional diagnosis algorithms because of their evolving complexity.PresentMachine Learning(ML)t... Distributed Denial of Service(DDoS)attacks are one of the severe threats to network infrastructure,sometimes bypassing traditional diagnosis algorithms because of their evolving complexity.PresentMachine Learning(ML)techniques for DDoS attack diagnosis normally apply network traffic statistical features such as packet sizes and inter-arrival times.However,such techniques sometimes fail to capture complicated relations among various traffic flows.In this paper,we present a new multi-scale ensemble strategy given the Graph Neural Networks(GNNs)for improving DDoS detection.Our technique divides traffic into macro-and micro-level elements,letting various GNN models to get the two corase-scale anomalies and subtle,stealthy attack models.Through modeling network traffic as graph-structured data,GNNs efficiently learn intricate relations among network entities.The proposed ensemble learning algorithm combines the results of several GNNs to improve generalization,robustness,and scalability.Extensive experiments on three benchmark datasets—UNSW-NB15,CICIDS2017,and CICDDoS2019—show that our approach outperforms traditional machine learning and deep learning models in detecting both high-rate and low-rate(stealthy)DDoS attacks,with significant improvements in accuracy and recall.These findings demonstrate the suggested method’s applicability and robustness for real-world implementation in contexts where several DDoS patterns coexist. 展开更多
关键词 ddos detection graph neural networks multi-scale learning ensemble learning network security stealth attacks network graphs
在线阅读 下载PDF
Lagged effects of risk factors on the disability of older adults:A distributed lag non-linear model approach
12
作者 Yitong Mao Zhiting Guo +2 位作者 Wen Gao Yuping Zhang Jingfen Jin 《International Journal of Nursing Sciences》 2026年第1期53-60,I0004,I0005,共10页
Objectives This study aimed to explore the lagged and cumulative effects of risk factors on disability in older adults using distributed lag non-linear models(DLNMs).Methods We utilized data from the China Health and ... Objectives This study aimed to explore the lagged and cumulative effects of risk factors on disability in older adults using distributed lag non-linear models(DLNMs).Methods We utilized data from the China Health and Retirement Longitudinal Study(CHARLS).After feature selection via Elastic Net Regularization,we applied DLNMs to evaluate the lagged effects of risk factors.Disability was defined as the presence of any difficulties in basic activities of daily living(BADL).The cumulative relative risk(CRR)was calculated by summing the lag-specific risk estimates,representing the cumulative disability risk over the specified lag period.Effect modifications and sensitivity analyses were also performed.Results This study included a total of 2,318 participants.Early-phase lag factors,such as the difficulty in stooping(CRR=3.58;95%CI:2.31-5.55;P<0.001)and walking(CRR=2.77;95%CI:1.39-5.55;P<0.001),exerted the strongest effects immediately upon occurrence.Mid-phase lag factors,such as arthritis(CRR=1.51;95%CI:1.10-2.06;P=0.001),showed a resurgence in disability risk within 2-3 years.Late-phase lag factors,including depressive symptoms(CRR=2.38;95%CI:1.30-4.35;P<0.001)and elevated systolic blood pressure(CRR=1.64;95%CI:1.06-2.79;P=0.02),exhibited significant long-term cumulative risks.Conversely,grip strength(CRR=0.80;95%CI:0.54-0.95;P=0.02)and social participation(CRR=0.89;95%CI:0.73-0.99;P=0.04)were significant protective factors.Conclusions The findings underscore the importance of tailored interventions that account for various lag characteristics of different factors to effectively mitigate disability risk.Future studies should explore the underlying biological and sociological mechanisms of these lagged effects,identify intervention strategies that target risk factors with different lagged patterns,and evaluate their effectiveness. 展开更多
关键词 Ageing DISABILITY distributed lag non-linear models Nusing Risk factors
暂未订购
A Comprehensive Evaluation of Distributed Learning Frameworks in AI-Driven Network Intrusion Detection
13
作者 Sooyong Jeong Cheolhee Park +1 位作者 Dowon Hong Changho Seo 《Computers, Materials & Continua》 2026年第4期310-332,共23页
With the growing complexity and decentralization of network systems,the attack surface has expanded,which has led to greater concerns over network threats.In this context,artificial intelligence(AI)-based network intr... With the growing complexity and decentralization of network systems,the attack surface has expanded,which has led to greater concerns over network threats.In this context,artificial intelligence(AI)-based network intrusion detection systems(NIDS)have been extensively studied,and recent efforts have shifted toward integrating distributed learning to enable intelligent and scalable detection mechanisms.However,most existing works focus on individual distributed learning frameworks,and there is a lack of systematic evaluations that compare different algorithms under consistent conditions.In this paper,we present a comprehensive evaluation of representative distributed learning frameworks—Federated Learning(FL),Split Learning(SL),hybrid collaborative learning(SFL),and fully distributed learning—in the context of AI-driven NIDS.Using recent benchmark intrusion detection datasets,a unified model backbone,and controlled distributed scenarios,we assess these frameworks across multiple criteria,including detection performance,communication cost,computational efficiency,and convergence behavior.Our findings highlight distinct trade-offs among the distributed learning frameworks,demonstrating that the optimal choice depends strongly on systemconstraints such as bandwidth availability,node resources,and data distribution.This work provides the first holistic analysis of distributed learning approaches for AI-driven NIDS and offers practical guidelines for designing secure and efficient intrusion detection systems in decentralized environments. 展开更多
关键词 Network intrusion detection network security distributed learning
在线阅读 下载PDF
Optimal Distributed Model Averaging for Multivariate Additive Model
14
作者 SONG Minghui QU Tianyao +1 位作者 ZHAO Zhihao ZOU Guohua 《Journal of Systems Science & Complexity》 2026年第1期309-333,共25页
In the era of massive data,the study of distributed data is a significant topic.Model averaging can be effectively applied to distributed data by combining information from all machines.For linear models,the model ave... In the era of massive data,the study of distributed data is a significant topic.Model averaging can be effectively applied to distributed data by combining information from all machines.For linear models,the model averaging approach has been developed in the context of distributed data.However,further investigation is needed for more complex models.In this paper,the authors propose a distributed optimal model averaging approach based on multivariate additive models,which approximates unknown functions using B-splines allowing each machine to have a different smoothing degree.To utilize the information from the covariance matrix of dependent errors in multivariate multiple regressions,the authors use the Mahalanobis distance to construct a Mallows-type weight choice criterion.The criterion can be computed by transmitting information between the local machines and the center machine in two steps.The authors demonstrate the asymptotic optimality of the proposed model averaging estimator when the covariates are subject to uncertainty,and obtain the convergence rate of the weight vector to the theoretically optimal weights.The results remain novel even for additive models with a single response variable.The numerical examples show that the proposed method yields good performance. 展开更多
关键词 Additive model asymptotic optimality CONSISTENCY distributed algorithm weight choice
原文传递
A Cloud-Based Distributed System for Story Visualization Using Stable Diffusion
15
作者 Chuang-Chieh Lin Yung-Shen Huang Shih-Yeh Chen 《Computers, Materials & Continua》 2026年第2期1751-1769,共19页
With the rapid development of generative artificial intelligence(GenAI),the task of story visualization,which transforms natural language narratives into coherent and consistent image sequences,has attracted growing r... With the rapid development of generative artificial intelligence(GenAI),the task of story visualization,which transforms natural language narratives into coherent and consistent image sequences,has attracted growing research attention.However,existing methods still face limitations in balancing multi-frame character consistency and generation efficiency,which restricts their feasibility for large-scale practical applications.To address this issue,this study proposes a modular cloud-based distributed system built on Stable Diffusion.By separating the character generation and story generation processes,and integratingmulti-feature control techniques,a cachingmechanism,and an asynchronous task queue architecture,the system enhances generation efficiency and scalability.The experimental design includes both automated and human evaluations of character consistency,performance testing,and multinode simulation.The results show that the proposed system outperforms the baseline model StoryGen in both CLIP-I and human evaluation metrics.In terms of performance,under the experimental environment of this study,dual-node deployment reduces average waiting time by approximately 19%,while the four-node simulation further reduces it by up to 65%.Overall,this study demonstrates the advantages of cloud-distributed GenAI in maintaining character consistency and reducing generation latency,highlighting its potential value inmulti-user collaborative story visualization applications. 展开更多
关键词 Stable diffusion story visualization generativeAI distributed computing cloud-based system character consistency
在线阅读 下载PDF
Event-triggered distributed average tracking in the presence of external disturbances
16
作者 Jianhong Zhuang Zhenbing Qiu +3 位作者 Xin Chen Chen Fei Lan Gao Peng Jiang 《Control Theory and Technology》 2026年第1期54-65,共12页
The focus of this paper is on distributed average tracking(DAT)in the context of external disturbances,utilizing an event-triggered control mechanism.First,an event-triggered anti-disturbance DAT(ETAD-DAT)algorithm is... The focus of this paper is on distributed average tracking(DAT)in the context of external disturbances,utilizing an event-triggered control mechanism.First,an event-triggered anti-disturbance DAT(ETAD-DAT)algorithm is proposed to reduce communication load in networked control systems by redesigning existing anti-disturbance DAT algorithms and disturbance observers.Furthermore,a fully distributed event-triggering condition is employed to schedule event times for each agent.Simulation results demonstrate that the proposed ETAD-DAT algorithm is able to achieve accurate average tracking of multiple time-varying reference signals despite the presence of external disturbances,while the communication efficiency can be improved obviously. 展开更多
关键词 distributed average tracking Event-triggered control Anti-disturbance control Multi-agent networks
原文传递
An intra-string distributed and inter-string decentralized control method for hybrid series-parallel microgrids
17
作者 Xiaochao Hou Jiatong He +3 位作者 Changgeng Li Zexiong Wei Kai Sun Yunwei Li 《iEnergy》 2026年第1期30-42,共13页
The hybrid series-parallel microgrid attracts more attention by combining the advantages of both the series-stacked voltage and parallel-expanded capacity.Low-voltage distributed generations(DGs)are connected in serie... The hybrid series-parallel microgrid attracts more attention by combining the advantages of both the series-stacked voltage and parallel-expanded capacity.Low-voltage distributed generations(DGs)are connected in series to form the intra-string,and then multiple strings are interconnected in parallel.For the existing control strategies,both intra-string and inter-string depend on the centralized or distributed control with high communication reliance.It has limited scalability and redundancy under abnormal conditions.Alternatively,in this study,an intra-string distributed and inter-string decentralized control framework is proposed.Within the string,a few DGs close to the AC bus are the leaders to get the string power information and the rest DGs are the followers to acquire the synchronization information through the droop-based distributed consistency.Specifically,the output of the entire string has the active power−angular frequency(ω-P)droop characteristic,and the decentralized control among strings can be autonomously guaranteed.Moreover,the secondary control is designed to realize multi-mode objectives,including on/off-grid mode switching,grid-connected power interactive management,and off-grid voltage quality regulation.As a result,the proposed method has the ability of plug-and-play capabilities,single-point failure redundancy,and seamless mode-switching.Experimental results are provided to verify the effectiveness of the proposed practical solution. 展开更多
关键词 Hybrid series-parallel microgrid distributed control Decentralized control Power inverter
在线阅读 下载PDF
Variable Selection and Parameter Estimation in Distributed High-Dimensional Quantile Regression with Responses Missing at Random
18
作者 CHEN Dan CHEN Ruijing +1 位作者 TANG Jiarui LI Huimin 《Journal of Systems Science & Complexity》 2026年第1期385-409,共25页
Quantile regression(QR)has become an important tool to measure dependence of response variable's quantiles on a number of predictors for heterogeneous data,especially heavy-tailed data and outliers.However,it is q... Quantile regression(QR)has become an important tool to measure dependence of response variable's quantiles on a number of predictors for heterogeneous data,especially heavy-tailed data and outliers.However,it is quite challenging to make statistical inference on distributed high-dimensional QR with missing data due to the distributed nature,sparsity and missingness of data and nondifferentiable quantile loss function.To overcome the challenge,this paper develops a communicationefficient method to select variables and estimate parameters by utilizing a smooth function to approximate the non-differentiable quantile loss function and incorporating the idea of the inverse probability weighting and the penalty function.The proposed approach has three merits.First,it is both computationally and communicationally efficient because only the first-and second-order information of the approximate objective function are communicated at each iteration.Second,the proposed estimators possess the oracle property after a limited number of iterations without constraint on the number of machines.Third,the proposed method simultaneously selects variables and estimates parameters within a distributed framework,ensuring robustness to the specified response probability or propensity score function of the missing data mechanism.Simulation studies and a real example are used to illustrate the effectiveness of the proposed methodologies. 展开更多
关键词 distributed estimator high-dimensional model missing at random quantile regression variable selection
原文传递
Strain localization and time-dependent deformation in granodiorite characterized by distributed optical fiber sensing
19
作者 Shuting Miao Arno Zang +3 位作者 Guido Blöcher Yinlin Ji Hannes Hofmann Pengzhi Pan 《Journal of Rock Mechanics and Geotechnical Engineering》 2026年第1期166-178,共13页
A multi-stage stress relaxation test was performed on a granodiorite sample to understand the deformation process prior to the macroscopic failure of brittle rocks,as well as the transient response during stress relax... A multi-stage stress relaxation test was performed on a granodiorite sample to understand the deformation process prior to the macroscopic failure of brittle rocks,as well as the transient response during stress relaxation.Distributed optical fiber sensing was used to measure strains across the sample surface by helically wrapping the single-mode fiber around the cylindrical sample.Close agreement was observed between the circumferential strains obtained from the optical fibers and the extensometer.The reconstructed full-field strain contours show strain heterogeneity from the crack closure phase,and the strains in the later deformation phase are dominantly localized within the former high-strain zone.The Gini coefficient was used to quantify the degree of strain localization and shows an initial increase during the crack closure phase,a decrease during the linear elastic phase,and a subsequent increase during the post-yielding phase.This behavior corresponds to a process of initial localization from an imperfect boundary condition,homogenization,and eventual relocalization prior to the macroscopic failure of the sample.The transient strain rate decay during the stress relaxation phase was quantified using the p-value in the“Omori-like"power law function.A higher initial stress at the onset of relaxation results in a lower p-value,indicating a slower strain rate decay.As the sample approaches macroscopic failure,the lowest p-value shifts from the most damaged zone to adjacent areas,suggesting stress redistribution or crack propagation in deformed crystalline rocks under stress relaxation conditions. 展开更多
关键词 distributed optical fiber sensing Stress relaxation Strain localization Time-dependent deformation
在线阅读 下载PDF
Revisiting Nonlinear Modelling Approaches for Existing RC Structures:Lumped vs.Distributed Plasticity
20
作者 Hüseyin Bilgin Bredli Plaku 《Structural Durability & Health Monitoring》 2026年第1期70-85,共16页
Nonlinear static procedures are widely adopted in structural engineering practice for seismic performance assessment due to their simplicity and computational efficiency.However,their reliability depends heavily on ho... Nonlinear static procedures are widely adopted in structural engineering practice for seismic performance assessment due to their simplicity and computational efficiency.However,their reliability depends heavily on how the nonlinear behaviour of structural components is represented.The recent earthquakes in Albania(2019)and Türkiye(2023)have underscored the need for accurate assessment techniques,particularly for older reinforced concrete buildings with poor detailing.This study quantifies the discrepancies between default and user-defined component modelling in pushover analysis of pre-modern reinforced concrete structures,analysing two representative low-and mid-rise reinforced concrete frame buildings.The lumped plasticity approach incorporates moment-rotation relationships derived from actual member properties and reinforcement configurations,while the distributed plasticity approach uses software-generated default properties based on modern codes.Results show that the distributed plasticity models systematically overestimate both the strength and the deformation capacity by up to 35%compared to lumped plasticity models,especially in buildings with poor detailing and low concrete strength.These findings demonstrate that default software procedures,widely used in practice but not validated for pre-modern structures,produce dangerously unconservative seismic performance estimates.The study provides quantitative evidence of the critical need for tailored modelling strategies that reflect the actual conditions of the existing building stock. 展开更多
关键词 Reinforced concrete frames seismic assessment pushover analysis lumped plasticity distributed plasticity
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部