网络逻辑拓扑的最优化是光网络的设计核心。针对分组业务的需要,要求光网络能够实时、动态调整网络的逻辑拓扑结构。对小规模的网络进行逻辑拓扑优化,可以用混合整数线性规划法(Mixed-Integer Linear Programming,MILP)解决。采用MILP...网络逻辑拓扑的最优化是光网络的设计核心。针对分组业务的需要,要求光网络能够实时、动态调整网络的逻辑拓扑结构。对小规模的网络进行逻辑拓扑优化,可以用混合整数线性规划法(Mixed-Integer Linear Programming,MILP)解决。采用MILP算法对4节点网络进行逻辑拓扑优化设计仿真,首先设定约束条件并建立模型,以拥塞率最小化为目标函数做仿真实验,并对实验结果进行分析。展开更多
Cloud computing involves remote server deployments with public net-work infrastructures that allow clients to access computational resources.Virtual Machines(VMs)are supplied on requests and launched without interacti...Cloud computing involves remote server deployments with public net-work infrastructures that allow clients to access computational resources.Virtual Machines(VMs)are supplied on requests and launched without interactions from service providers.Intruders can target these servers and establish malicious con-nections on VMs for carrying out attacks on other clustered VMs.The existing system has issues with execution time and false-positive rates.Hence,the overall system performance is degraded considerably.The proposed approach is designed to eliminate Cross-VM side attacks and VM escape and hide the server’s position so that the opponent cannot track the target server beyond a certain point.Every request is passed from source to destination via one broadcast domain to confuse the opponent and avoid them from tracking the server’s position.Allocation of SECURITY Resources accepts a safety game in a simple format as input andfinds the best coverage vector for the opponent using a Stackelberg Equilibrium(SSE)technique.A Mixed Integer Linear Programming(MILP)framework is used in the algorithm.The VM challenge is reduced by afirewall-based controlling mechanism combining behavior-based detection and signature-based virus detection.The pro-posed method is focused on detecting malware attacks effectively and providing better security for the VMs.Finally,the experimental results indicate that the pro-posed security method is efficient.It consumes minimum execution time,better false positive rate,accuracy,and memory usage than the conventional approach.展开更多
文摘为提升园区微电网运行经济性、保证电力供需平衡和新能源消纳能力,提出了保证园区微电网风光储协调经济运行的配置方案。首先,建立了以总供电成本最低为优化目标的配置模型;然后,针对未配置储能的园区使用线性规划(linear programming,LP)方法,提出配置储能的园区使用混合整数线性规划(mixed integer linear programming,MILP)方法;最后,以某园区微电网为例,制定了独立园区及联合园区微电网风光储协调配置方案,验证了所提园区微电网风光储配置方法在提升经济性方面的有效性。与独立园区相比,采用联合园区风光储协调配置经济性更优。
文摘网络逻辑拓扑的最优化是光网络的设计核心。针对分组业务的需要,要求光网络能够实时、动态调整网络的逻辑拓扑结构。对小规模的网络进行逻辑拓扑优化,可以用混合整数线性规划法(Mixed-Integer Linear Programming,MILP)解决。采用MILP算法对4节点网络进行逻辑拓扑优化设计仿真,首先设定约束条件并建立模型,以拥塞率最小化为目标函数做仿真实验,并对实验结果进行分析。
文摘Cloud computing involves remote server deployments with public net-work infrastructures that allow clients to access computational resources.Virtual Machines(VMs)are supplied on requests and launched without interactions from service providers.Intruders can target these servers and establish malicious con-nections on VMs for carrying out attacks on other clustered VMs.The existing system has issues with execution time and false-positive rates.Hence,the overall system performance is degraded considerably.The proposed approach is designed to eliminate Cross-VM side attacks and VM escape and hide the server’s position so that the opponent cannot track the target server beyond a certain point.Every request is passed from source to destination via one broadcast domain to confuse the opponent and avoid them from tracking the server’s position.Allocation of SECURITY Resources accepts a safety game in a simple format as input andfinds the best coverage vector for the opponent using a Stackelberg Equilibrium(SSE)technique.A Mixed Integer Linear Programming(MILP)framework is used in the algorithm.The VM challenge is reduced by afirewall-based controlling mechanism combining behavior-based detection and signature-based virus detection.The pro-posed method is focused on detecting malware attacks effectively and providing better security for the VMs.Finally,the experimental results indicate that the pro-posed security method is efficient.It consumes minimum execution time,better false positive rate,accuracy,and memory usage than the conventional approach.