期刊文献+
共找到551,465篇文章
< 1 2 250 >
每页显示 20 50 100
Cross-Domain Time Synchronization in Software-Defined Time-Sensitive Networking 被引量:1
1
作者 Zhang Xiaodong Shou Guochu +2 位作者 Li Hongxing Liu Yaqiong Hu Yihong 《China Communications》 2025年第9期289-306,共18页
The rise of time-sensitive applications with broad geographical scope drives the development of time-sensitive networking(TSN)from intra-domain to inter-domain to ensure overall end-to-end connectivity requirements in... The rise of time-sensitive applications with broad geographical scope drives the development of time-sensitive networking(TSN)from intra-domain to inter-domain to ensure overall end-to-end connectivity requirements in heterogeneous deployments.When multiple TSN networks interconnect over non-TSN networks,all devices in the network need to be syn-chronized by sharing a uniform time reference.How-ever,most non-TSN networks are best-effort.Path delay asymmetry and random noise accumulation can introduce unpredictable time errors during end-to-end time synchronization.These factors can degrade syn-chronization performance.Therefore,cross-domain time synchronization becomes a challenging issue for multiple TSN networks interconnected by non-TSN networks.This paper presents a cross-domain time synchronization scheme that follows the software-defined TSN(SD-TSN)paradigm.It utilizes a com-bined control plane constructed by a coordinate con-troller and a domain controller for centralized control and management of cross-domain time synchroniza-tion.The general operation flow of the cross-domain time synchronization process is designed.The mecha-nism of cross-domain time synchronization is revealed by introducing a synchronization model and an error compensation method.A TSN cross-domain proto-type testbed is constructed for verification.Results show that the scheme can achieve end-to-end high-precision time synchronization with accuracy and sta-bility. 展开更多
关键词 cross-domain time synchronization de-terministic communications error compensation software-defined networking(SDN) time-sensitive networking(TSN)
在线阅读 下载PDF
Curvularin derivatives from hydrothermal vent sediment fungus Penicillium sp.HL-50 guided by molecular networking and their antiinflammatory activity 被引量:2
2
作者 Chunxue Yu Zixuan Xia +6 位作者 Zhipeng Xu Xiyang Tang Wenjuan Ding Jihua Wei Danmei Tian Bin Wu Jinshan Tang 《Chinese Journal of Natural Medicines》 2025年第1期119-128,共10页
Guided by molecular networking,nine novel curvularin derivatives(1-9)and 16 known analogs(10-25)were isolated from the hydrothermal vent sediment fungus Penicillium sp.HL-50.Notably,compounds 5-7 represented a hybrid ... Guided by molecular networking,nine novel curvularin derivatives(1-9)and 16 known analogs(10-25)were isolated from the hydrothermal vent sediment fungus Penicillium sp.HL-50.Notably,compounds 5-7 represented a hybrid of curvularin and purine.The structures and absolute configurations of compounds 1-9 were elucidated via nuclear magnetic resonance(NMR)spectroscopy,X-ray diffraction,electronic circular dichroism(ECD)calculations,^(13)C NMR calculation,modified Mosher's method,and chemical derivatization.Investigation of anti-inflammatory activities revealed that compounds 7-9,11,12,14,15,and 18 exhibited significant suppressive effects against lipopolysaccharide(LPS)-induced nitric oxide(NO)production in murine macrophage RAW264.7 cells,with IC_(50)values ranging from 0.44 to 4.40μmol·L^(-1).Furthermore,these bioactive compounds were found to suppress the expression of inflammation-related proteins,including inducible NO synthase(i NOS),cyclooxygenase-2(COX-2),NLR family pyrin domain-containing protein 3(NLRP3),and nuclear factor kappa-B(NF-κB).Additional studies demonstrated that the novel compound 7 possessed potent antiinflammatory activity by inhibiting the transcription of inflammation-related genes,downregulating the expression of inflammation-related proteins,and inhibiting the release of inflammatory cytokines,indicating its potential application in the treatment of inflammatory diseases. 展开更多
关键词 Penicillium sp.HL-50 Curvularin derivatives Molecular networking Anti-inflammatory activity
原文传递
基于预测的V-NDN多决策兴趣包转发方法
3
作者 邢光林 朱远 《中南民族大学学报(自然科学版)》 2025年第3期365-372,共8页
车载命名数据网络(V-NDN)是基于车载自组织网络(VANET)建立通信的一种新型网络框架.洪泛转发策略在当前V-NDN中被广泛使用,造成大量的网络资源被浪费.针对上述问题,提出基于预测的多决策兴趣包转发方法(KMNDN),该方法实现了通过内容发... 车载命名数据网络(V-NDN)是基于车载自组织网络(VANET)建立通信的一种新型网络框架.洪泛转发策略在当前V-NDN中被广泛使用,造成大量的网络资源被浪费.针对上述问题,提出基于预测的多决策兴趣包转发方法(KMNDN),该方法实现了通过内容发现来定位内容节点,根据车辆运动状态构造转发路径,以减少网络中的无用流量.为保证链路稳定性,在链路构造过程中结合卡尔曼滤波预测、速度以及备选节点车流密度,再通过设定权重对待选车辆进行排序,从而选择出风险最小的节点作为下一跳.实验结果显示:所提方法在提高数据包交付率,以及降低网络时延方面具有一定优势. 展开更多
关键词 车辆命名数据网络 兴趣包转发 卡尔曼滤波 CRITIC权重法
在线阅读 下载PDF
Multi-Band Integrated Networking for Efficient Spectrum Utilization in 6G 被引量:1
4
作者 Wang Ailing Kong Lei +4 位作者 Liu Jianjun Xia Liang Wang Xiaoqian Wang Qixing Liu Guangyi 《China Communications》 2025年第4期42-54,共13页
The sixth-generation(6G)networks will consist of multiple bands such as low-frequency,midfrequency,millimeter wave,terahertz and other bands to meet various business requirements and networking scenarios.The dynamic c... The sixth-generation(6G)networks will consist of multiple bands such as low-frequency,midfrequency,millimeter wave,terahertz and other bands to meet various business requirements and networking scenarios.The dynamic complementarity of multiple bands are crucial for enhancing the spectrum efficiency,reducing network energy consumption,and ensuring a consistent user experience.This paper investigates the present researches and challenges associated with deployment of multi-band integrated networks in existing infrastructures.Then,an evolutionary path for integrated networking is proposed with the consideration of maturity of emerging technologies and practical network deployment.The proposed design principles for 6G multi-band integrated networking aim to achieve on-demand networking objectives,while the architecture supports full spectrum access and collaboration between high and low frequencies.In addition,the potential key air interface technologies and intelligent technologies for integrated networking are comprehensively discussed.It will be a crucial basis for the subsequent standards promotion of 6G multi-band integrated networking technology. 展开更多
关键词 full spectrum access high and low frequency collaboration multi-band integrated networking 6G spectrum efficiency
在线阅读 下载PDF
Call for Papers─Feature Topic Vol.23,No.1,2026 Space-Terrestrial Integrated 6G Network:Architecture,Networking,and Transmission Technologies
5
《China Communications》 2025年第6期F0003-F0003,共1页
With the large-scale deployment of satellite constellations such as Starlink and the rapid advancement of technologies including artificial intelligence (AI) and non-terrestrial networks (NTNs), the integration of hig... With the large-scale deployment of satellite constellations such as Starlink and the rapid advancement of technologies including artificial intelligence (AI) and non-terrestrial networks (NTNs), the integration of high, medium, and low Earth orbit satellite networks with terrestrial networks has become a critical direction for future communication technologies. The objective is to develop a space-terrestrial integrated 6G network that ensures ubiquitous connectivity and seamless services, facilitating intelligent interconnection and collaborative symbiosis among humans, machines, and objects. This integration has become a central focus of global technological innovation. 展开更多
关键词 communication technologiesthe space terrestrial integrated G network g network satellite constellations terrestrial networks artificial intelligence ai intelligent int satellite networks
在线阅读 下载PDF
基于离线-在线DRL的NDN缓存策略
6
作者 桂易琪 李鹏海 +2 位作者 王鹏程 杭志伟 张璐 《扬州大学学报(自然科学版)》 2025年第4期60-71,共12页
网络内容传递需求激增推动信息中心网络(information centric networking,ICN)成为研究热点。针对网络节点缓存容量有限所引发的数据访问效率低及网络拥塞问题,提出了一种结合离线训练与在线微调的深度强化学习(deep reinforcement lear... 网络内容传递需求激增推动信息中心网络(information centric networking,ICN)成为研究热点。针对网络节点缓存容量有限所引发的数据访问效率低及网络拥塞问题,提出了一种结合离线训练与在线微调的深度强化学习(deep reinforcement learning,DRL)缓存策略。基于隐式强化学习(implicit Ql-earn ing,IQL)模型,利用命名数据网络(named data networking,NDN)的缓存日志进行离线训练,学习最优缓存决策策略。该策略综合考虑了节点重要性、边缘度、闲置率和内容流行度等多维状态属性,以提升缓存决策的效率和效能。离线训练后,该策略被部署到实际NDN网络中进行在线微调,适应网络环境的动态变化。实验结果表明,与现有典型缓存策略相比,所提策略在缓存命中率、延迟和路径拉伸率等方面均有所提升。 展开更多
关键词 命名数据网络 缓存策略 深度强化学习 离线训练-在线微调
在线阅读 下载PDF
Non-Terrestrial Networking for 6G:Evolution,Opportunities,and Future Directions
7
作者 Feng Wang Shengyu Zhang +1 位作者 Huiting Yang Tony Q.S.Quek 《Engineering》 2025年第11期56-68,共13页
From fifth-generation(5G)communication technology onward,non-terrestrial networks(NTNs)have emerged as a key component of future network architectures.Especially through the rise of low-Earth-orbit satellite constella... From fifth-generation(5G)communication technology onward,non-terrestrial networks(NTNs)have emerged as a key component of future network architectures.Especially through the rise of low-Earth-orbit satellite constellations,NTNs enable a space Internet and present a paradigm shift in delivering reliable services to even the most remote regions on Earth.However,the extensive coverage and rapid movement of satellites pose unique challenges in user equipment access and inter-satellite transmission,impacting the quality of service and service continuity.This paper offers an in-depth review of NTN networking technologies in the context of six-generation(6G)mobile networks evolution,focusing on access management,satellite mobility,and hetero-network slicing.Building on this foundation and considering the latest trends in NTN development,we then present innovative perspectives on emerging challenges,including satellite beamforming,handover mechanisms,and service delivery.Lastly,we identify key open research areas and propose future directions to improve NTN performance and accelerate satellite Internet deployment. 展开更多
关键词 Non-terrestrial networks Six-generation mobile networks Satellite networking Access and mobility management Inter-satellite transmission
在线阅读 下载PDF
可解释的轻量化无人机网络入侵检测方法
8
作者 王鹏 郭相科 +1 位作者 宋亚飞 王晓丹 《空军工程大学学报》 北大核心 2026年第1期106-116,共11页
针对无人机算力有限、存储空间小和实时性高的特点,提出一种基于Kolmogorov-Arnold Networks(KAN)的可解释的无人机网络入侵检测方法KIDS。受Kolmogorov-Arnold表示定理的启发,KAN利用样条参数化的单变量函数取代了传统的线性权重,从而... 针对无人机算力有限、存储空间小和实时性高的特点,提出一种基于Kolmogorov-Arnold Networks(KAN)的可解释的无人机网络入侵检测方法KIDS。受Kolmogorov-Arnold表示定理的启发,KAN利用样条参数化的单变量函数取代了传统的线性权重,从而动态地学习激活模式,能够有效提取流量序列数据特征并以更轻量化的网络结构实现优异的无人机网络入侵性能。此外,可视化参数化的样条函数能够进一步探索和解释模型在流量特征提取阶段的决策过程,从而增强模型应用的可信度。最后,在真实无人机网络流量数据集UAV-IDS-2020进行广泛实验。结果表明,KIDS以更低的模型复杂度实现了优异的检测性能,且在跨机型入侵检测任务中表现出显著的泛化性能。 展开更多
关键词 无人机网络入侵检测 Kolmogorov-Arnold Networks 可解释性 网络安全
在线阅读 下载PDF
SMNDNet for Multiple Types of Deepfake Image Detection
9
作者 Qin Wang Xiaofeng Wang +3 位作者 Jianghua Li Ruidong Han Zinian Liu Mingtao Guo 《Computers, Materials & Continua》 2025年第6期4607-4621,共15页
The majority of current deepfake detection methods are constrained to identifying one or two specific types of counterfeit images,which limits their ability to keep pace with the rapid advancements in deepfake technol... The majority of current deepfake detection methods are constrained to identifying one or two specific types of counterfeit images,which limits their ability to keep pace with the rapid advancements in deepfake technology.Therefore,in this study,we propose a novel algorithm,StereoMixture Density Network(SMNDNet),which can detect multiple types of deepfake face manipulations using a single network framework.SMNDNet is an end-to-end CNNbased network specially designed for detecting various manipulation types of deepfake face images.First,we design a Subtle Distinguishable Feature Enhancement Module to emphasize the differentiation between authentic and forged features.Second,we introduce aMulti-Scale Forged Region AdaptiveModule that dynamically adapts to extract forged features from images of varying synthesis scales.Third,we integrate a Nonlinear Expression Capability Enhancement Module to augment the model’s capacity for capturing intricate nonlinear patterns across various types of deepfakes.Collectively,these modules empower our model to efficiently extract forgery features fromdiverse manipulation types,ensuring a more satisfactory performance in multiple-types deepfake detection.Experiments show that the proposed method outperforms alternative approaches in detection accuracy and AUC across all four types of deepfake images.It also demonstrates strong generalization on cross-dataset and cross-type detection,along with robust performance against post-processing manipulations. 展开更多
关键词 Convolutional neural network deepfake detection generative adversarial network feature enhancement
在线阅读 下载PDF
Theory and Key Technologies in Space Internet Networking
10
作者 Jiangzhou Wang Jiandong Li Di Zhou 《Engineering》 2025年第11期1-2,共2页
The rapid evolution of satellite constellation projects(e.g.,SpaceX)and the standardization of 3rd Generation Partnership Project(3GPP)non-terrestrial networks(NTNs)have positioned satellite Internet networking(SIN)as... The rapid evolution of satellite constellation projects(e.g.,SpaceX)and the standardization of 3rd Generation Partnership Project(3GPP)non-terrestrial networks(NTNs)have positioned satellite Internet networking(SIN)as a cornerstone of future communication systems.The demand for ubiquitous connectivity,resilient infrastructures,and intelligent network services has never been greater,driven by applications ranging from global broadband access to emergency response and space-air-ground integration. 展开更多
关键词 emergency response rd generation partnership project gpp non terrestrial communication systemsthe global broadband access intelligent network services satellite internet networking sin satellite constellation projects egspacex space internet networking
在线阅读 下载PDF
A High Destruction-Resistant Resilient Networking Platform for Air-to-Ground Cooperative Communications
11
作者 Dong Ping Ren Jiaxin +3 位作者 Guo Jiannan Zhang Yuzhen Liu Qianwen Amr Tolba 《China Communications》 2025年第4期27-41,共15页
With the continuous advancement of communication and unmanned aerial vehicle(UAV)technologies,the collaborative operations of diverse platforms,including UAVs and ground vehicles,have been significantly promoted.Howev... With the continuous advancement of communication and unmanned aerial vehicle(UAV)technologies,the collaborative operations of diverse platforms,including UAVs and ground vehicles,have been significantly promoted.However,battlefield uncertainties,such as equipment failures and enemy attacks,can impact these collaborative operations'stability and communication efficiency.To this end,we design a highly destruction-resistant air-ground cooperative resilient networking platform that aims to enhance the robustness of network communications by integrating ground vehicle information for UAV network deployment.It then incorporates the concept of virtual guiding force,enabling the UAV swarm to adaptively configure its network layout based on ground vehicle information,thereby improving network destruction resistance.Simulation results demonstrate that the UAV swarm involved in the proposed platform exhibits balanced flight energy consumption and excellent performance in network destruction resistance. 展开更多
关键词 air-to-ground coordination network destruction resistance SpringBoot UAV
在线阅读 下载PDF
A Hierarchical-Based Sequential Caching Scheme in Named Data Networking
12
作者 Zhang Junmin Jin Jihuan +3 位作者 Hou Rui Dong Mianxiong Kaoru Ota Zeng Deze 《China Communications》 2025年第5期48-60,共13页
Named data networking(NDNs)is an idealized deployment of information-centric networking(ICN)that has attracted attention from scientists and scholars worldwide.A distributed in-network caching scheme can efficiently r... Named data networking(NDNs)is an idealized deployment of information-centric networking(ICN)that has attracted attention from scientists and scholars worldwide.A distributed in-network caching scheme can efficiently realize load balancing.However,such a ubiquitous caching approach may cause problems including duplicate caching and low data diversity,thus reducing the caching efficiency of NDN routers.To mitigate these caching problems and improve the NDN caching efficiency,in this paper,a hierarchical-based sequential caching(HSC)scheme is proposed.In this scheme,the NDN routers in the data transmission path are divided into various levels and data with different request frequencies are cached in distinct router levels.The aim is to cache data with high request frequencies in the router that is closest to the content requester to increase the response probability of the nearby data,improve the data caching efficiency of named data networks,shorten the response time,and reduce cache redundancy.Simulation results show that this scheme can effectively improve the cache hit rate(CHR)and reduce the average request delay(ARD)and average route hop(ARH). 展开更多
关键词 hierarchical router named data networking sequential caching
在线阅读 下载PDF
End-to-End Deterministic Transmission with Bounded Time Error in Time-Sensitive Networking
13
作者 Ma Hao Shou Guochu +3 位作者 Li Hongxing Liu Yaqiong Hu Yihong Chen Li 《China Communications》 2025年第12期30-46,共17页
Time synchronization is a prerequisite for ensuring determinism in time-sensitive networking(TSN).While time synchronization errors cannot be overlooked,pursuing minimal time errors may incur unnecessary costs.Using c... Time synchronization is a prerequisite for ensuring determinism in time-sensitive networking(TSN).While time synchronization errors cannot be overlooked,pursuing minimal time errors may incur unnecessary costs.Using complex network theory,this study proposes a hierarchy for TSN and introduces the concept of bounded time error.A coupling model between traffic scheduling and time synchronization is established,deriving functional relationships among end-to-end delay,delay jitter,gate window,and time error.These relationships illustrate that time errors can trigger jumps in delay and delay jitter.To evaluate different time errors impact on traffic scheduling performance,an end-to-end transmission experiment scheme is designed,along with the construction of a TSN test platform implementing two representative cases.Case A is a closed TSN domain scenario with pure TSN switches emulating closed factory floor network.Case B depicts remote factory interconnection where TSN domains link via non-TSN domains composed of OpenFlow switches.Results from Case A show that delay and delay jitter on a single node are most significantly affected by time errors,up to one gating cycle.End-to-end delay jitter tends to increase with the number of hops.When the ratio of time error bound to window exceeds 10%,the number of schedulable traffic flows decreases rapidly.Case B reveals that when time error is below 1μs,the number of schedulable traffic flows begins to increase significantly,approaching full schedulability at errors below 0.6μs. 展开更多
关键词 bounded time error deterministic communications time synchronization time-sensitive networking traffic scheduling
在线阅读 下载PDF
Deep Learning-Based Natural Language Processing Model and Optical Character Recognition for Detection of Online Grooming on Social Networking Services
14
作者 Sangmin Kim Byeongcheon Lee +2 位作者 Muazzam Maqsood Jihoon Moon Seungmin Rho 《Computer Modeling in Engineering & Sciences》 2025年第5期2079-2108,共30页
The increased accessibility of social networking services(SNSs)has facilitated communication and information sharing among users.However,it has also heightened concerns about digital safety,particularly for children a... The increased accessibility of social networking services(SNSs)has facilitated communication and information sharing among users.However,it has also heightened concerns about digital safety,particularly for children and adolescents who are increasingly exposed to online grooming crimes.Early and accurate identification of grooming conversations is crucial in preventing long-term harm to victims.However,research on grooming detection in South Korea remains limited,as existing models trained primarily on English text and fail to reflect the unique linguistic features of SNS conversations,leading to inaccurate classifications.To address these issues,this study proposes a novel framework that integrates optical character recognition(OCR)technology with KcELECTRA,a deep learning-based natural language processing(NLP)model that shows excellent performance in processing the colloquial Korean language.In the proposed framework,the KcELECTRA model is fine-tuned by an extensive dataset,including Korean social media conversations,Korean ethical verification data from AI-Hub,and Korean hate speech data from Hug-gingFace,to enable more accurate classification of text extracted from social media conversation images.Experimental results show that the proposed framework achieves an accuracy of 0.953,outperforming existing transformer-based models.Furthermore,OCR technology shows high accuracy in extracting text from images,demonstrating that the proposed framework is effective for online grooming detection.The proposed framework is expected to contribute to the more accurate detection of grooming text and the prevention of grooming-related crimes. 展开更多
关键词 Online grooming KcELECTRA natural language processing optical character recognition social networking service text classification
在线阅读 下载PDF
Key technologies for networking in satellite-terrestrial integrated network
15
作者 Haijun ZHANG Sichen LU Xiaoqi ZHANG 《Chinese Journal of Aeronautics》 2025年第9期267-270,共4页
1.Introduction As a key development of the next-generation spatial information infrastructure,1the Satellite-Terrestrial Integrated Network(STIN)has become a strategic priority actively pursued by major spacefaring na... 1.Introduction As a key development of the next-generation spatial information infrastructure,1the Satellite-Terrestrial Integrated Network(STIN)has become a strategic priority actively pursued by major spacefaring nations and regions,including the United States,Europe,China,and Russia.Specifically,Space X’s Starlink project has deployed over 6750 satellites,2while One Web has completed its initial phase of satellite constellation deployment with more than 600 satellites. 展开更多
关键词 satellite terrestrial integrated network satellite constellation starlink project next generation spatial information infrastructure Starlink OneWeb STIN
原文传递
Cytotoxic anthrone–cyclopentenone heterodimers from the fungus Penicillium sp.guided by molecular networking
16
作者 Ruiyun Huo Jiayu Dong +2 位作者 Gaoran Liu Ying Shi Ling Liu 《Chinese Journal of Natural Medicines》 2025年第10期1259-1267,共9页
(±)-Penicithrones A–D(1a/1b–4a/4b),four novel pairs of anthrone–cyclopentenone heterodimers characterized by a distinctive bridged 6/6/6−5 tetracyclic core skeleton,together with three previously identified co... (±)-Penicithrones A–D(1a/1b–4a/4b),four novel pairs of anthrone–cyclopentenone heterodimers characterized by a distinctive bridged 6/6/6−5 tetracyclic core skeleton,together with three previously identified compounds(5–7),were isolated from the crude extract of the mangrove-derived fungus Penicillium sp.,guided by heteronuclear single quantum correlation(HSQC)-based small molecule accurate recognition technology(SMART 2.0)and liquid chromatography-tandem mass spectrometry(LC-MS/MS)-based molecular networking.The structural elucidation of new compounds was accomplished through comprehensive spectroscopic analysis,and their absolute configurations were determined using DP4+^(13)C nuclear magnetic resonance(NMR)calculations and electronic circular dichroism(ECD)calculations.Compounds 1a/1b–4a/4b demonstrated moderate cytotoxicity against three human cancer cell lines HeLa,HCT116 and MCF-7 with half maximal inhibitory concentration(IC50)values ranging from 15.95±1.64 to 28.56±2.59μmol·L–1. 展开更多
关键词 Mangrove-derived fungi Molecular networking HSQC-based SMART Structure elucidation DP4+13C NMR calculation Cytotoxic activity
原文传递
Detecting and Mitigating Distributed Denial of Service Attacks in Software-Defined Networking
17
作者 Abdullah M.Alnajim Faisal Mohammed Alotaibi Sheroz Khan 《Computers, Materials & Continua》 2025年第6期4515-4535,共21页
Distributed denial of service(DDoS)attacks are common network attacks that primarily target Internet of Things(IoT)devices.They are critical for emerging wireless services,especially for applications with limited late... Distributed denial of service(DDoS)attacks are common network attacks that primarily target Internet of Things(IoT)devices.They are critical for emerging wireless services,especially for applications with limited latency.DDoS attacks pose significant risks to entrepreneurial businesses,preventing legitimate customers from accessing their websites.These attacks require intelligent analytics before processing service requests.Distributed denial of service(DDoS)attacks exploit vulnerabilities in IoT devices by launchingmulti-point distributed attacks.These attacks generate massive traffic that overwhelms the victim’s network,disrupting normal operations.The consequences of distributed denial of service(DDoS)attacks are typically more severe in software-defined networks(SDNs)than in traditional networks.The centralised architecture of these networks can exacerbate existing vulnerabilities,as these weaknesses may not be effectively addressed in this model.The preliminary objective for detecting and mitigating distributed denial of service(DDoS)attacks in software-defined networks(SDN)is to monitor traffic patterns and identify anomalies that indicate distributed denial of service(DDoS)attacks.It implements measures to counter the effects ofDDoS attacks,and ensure network reliability and availability by leveraging the flexibility and programmability of SDN to adaptively respond to threats.The authors present a mechanism that leverages the OpenFlow and sFlow protocols to counter the threats posed by DDoS attacks.The results indicate that the proposed model effectively mitigates the negative effects of DDoS attacks in an SDN environment. 展开更多
关键词 Software-defined networking(SDN) distributed denial of service(DDoS)attack sampling Flow(sFlow) OpenFlow OpenDaylight controller
在线阅读 下载PDF
基于树形决策卷积神经网络的滚动轴承故障分层诊断
18
作者 杨旭 吴程飞 +1 位作者 黄健 赵鹰昊 《北京工业大学学报》 北大核心 2026年第1期64-74,共11页
针对传统滚动轴承故障诊断中故障层次信息利用不充分、诊断精度不足的问题,提出一种带有树形决策层的卷积神经网络(convolutional neural network,CNN)方法以实现故障位置与严重程度的逐层诊断。该模型同时具备CNN的特征提取能力和决策... 针对传统滚动轴承故障诊断中故障层次信息利用不充分、诊断精度不足的问题,提出一种带有树形决策层的卷积神经网络(convolutional neural network,CNN)方法以实现故障位置与严重程度的逐层诊断。该模型同时具备CNN的特征提取能力和决策树的层次结构及分层决策特性。首先,采用共享网络层和2个任务特定的分支全连接层分别提取与故障位置和故障严重程度有关的特征;然后,将2个全连接层的分类结果输入到树形决策层,并使用加权层次分类损失调整模型权重参数,从而实现模型对故障层次信息的自学习;最后,应用帕德博恩大学轴承数据集进行算法性能测试。实验结果表明,该模型的平均分类准确率可达99.15%,与领域内其他的诊断模型相比,实现了更准确的故障位置和严重性的分类。 展开更多
关键词 故障诊断 分层诊断 滚动轴承 卷积神经网络(convolutional neural network CNN) 决策树 集成模型
在线阅读 下载PDF
基于空洞因果卷积的学生成绩预测及分析方法
19
作者 赖英旭 张亚薇 +1 位作者 庄俊玺 刘静 《北京工业大学学报》 北大核心 2026年第3期252-267,共16页
针对使用循环神经网络对学生长序列行为数据进行特征提取存在梯度消失或爆炸、长期依赖关系提取能力不足、深度学习模型缺乏可解释性等问题,提出一种面向长序列数据的空洞因果卷积(dilated causal convolution,DCC)成绩预测及分析方法... 针对使用循环神经网络对学生长序列行为数据进行特征提取存在梯度消失或爆炸、长期依赖关系提取能力不足、深度学习模型缺乏可解释性等问题,提出一种面向长序列数据的空洞因果卷积(dilated causal convolution,DCC)成绩预测及分析方法。首先,采用生成对抗网络(generative adversarial network,GAN)生成符合少数类学生原始行为数据分布规律的新样本,并将新样本加入学生数据集中以达到均衡数据集的目的;然后,提出一种基于DCC的成绩预测模型,DCC和门控循环单元(gated recurrent unit,GRU)相结合的结构提高了模型对长序列数据依赖关系的提取能力;最后,使用沙普利加性解释(Shapley additive explanations,SHAP)方法并结合三因素理论对影响学生成绩的因素进行重要性分析和解释。在公开数据集上的实验结果表明,在成绩预测任务中提出的方法与基线方法相比,加权F1分数提高了约6个百分点,并进一步验证了所提方法中关键模块的有效性和模型的泛化能力。此外,通过对比优秀学生和风险学生的学习特点发现,良好的学习习惯、课堂学习的主动性以及不同行为环境等因素会对学生成绩产生重要影响。 展开更多
关键词 学生成绩预测 空洞因果卷积(dilated causal convolution DCC) 不均衡数据 生成对抗网络(generative adversarial network GAN) 沙普利加性解释(Shapley additive explanations SHAP)方法 成绩影响因素分析
在线阅读 下载PDF
一种基于P4的多模态网络控制与安全检测方案
20
作者 李冬 高源 +2 位作者 于俊清 曾木虹 陈俊鑫 《信息网络安全》 北大核心 2026年第1期115-124,共10页
可编程网络技术通过软件定义和编程技术控制网络设备与数据报文,提升网络灵活性、可扩展性和自动化能力,为多模态网络发展奠定基础。文章基于可编程架构设计了身份、内容、地理位置、弹性地址空间、IPv4、IPv6等6种模态的数据报文路由... 可编程网络技术通过软件定义和编程技术控制网络设备与数据报文,提升网络灵活性、可扩展性和自动化能力,为多模态网络发展奠定基础。文章基于可编程架构设计了身份、内容、地理位置、弹性地址空间、IPv4、IPv6等6种模态的数据报文路由转发机制,并在数据平面实现报文解析、路由寻址与转发。同时,构建多模态网络控制系统,支持报文解析、拓扑管理、流表生成与下发、网络测量等功能,并集成资源协调与调度算法,可实时分析网络状态、计算路由规则并下发流表。文章通过流量特征提取实现安全检测,并基于深度学习构建多模态流量时序模型,实现异常检测与识别,引入内生安全特性,保障系统可用性和可靠性。实验结果表明,文章方案可实现多模态网络统一通信与控制,支持多种模态;控制系统功能完善且性能稳定,拓扑规模超过2000节点,平均端到端时延小于100 ms;安全检测功能可实时识别异常流量与网络模态,其中,异常流量检测准确率达到96.49%,模态识别准确率达到99.72%。 展开更多
关键词 多模态网络 软件定义网络 网络测量 异常检测
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部