期刊文献+
共找到559,579篇文章
< 1 2 250 >
每页显示 20 50 100
An Improved Dictionary Cracking Scheme Based on Multiple GPUs for Wi-Fi Network 被引量:1
1
作者 Majdi K.Qabalin Zaid A.Arida +4 位作者 Omar A.Saraereh Falin Wu Imran Khan Peerapong Uthansakul Moath Alsafasfeh 《Computers, Materials & Continua》 SCIE EI 2021年第3期2957-2972,共16页
The Internet has penetrated all aspects of human society and has promoted social progress.Cyber-crimes in many forms are commonplace and are dangerous to society and national security.Cybersecurity has become a major ... The Internet has penetrated all aspects of human society and has promoted social progress.Cyber-crimes in many forms are commonplace and are dangerous to society and national security.Cybersecurity has become a major concern for citizens and governments.The Internet functions and software applications play a vital role in cybersecurity research and practice.Most of the cyber-attacks are based on exploits in system or application software.It is of utmost urgency to investigate software security problems.The demand for Wi-Fi applications is proliferating but the security problem is growing,requiring an optimal solution from researchers.To overcome the shortcomings of the wired equivalent privacy(WEP)algorithm,the existing literature proposed security schemes forWi-Fi protected access(WPA)/WPA2.However,in practical applications,the WPA/WPA2 scheme still has some weaknesses that attackers exploit.To destroy a WPA/WPA2 security,it is necessary to get a PSK pre-shared key in pre-shared key mode,or an MSK master session key in the authentication mode.Brute-force cracking attacks can get a phase-shift keying(PSK)or a minimum shift keying(MSK).In real-world applications,many wireless local area networks(LANs)use the pre-shared key mode.Therefore,brute-force cracking of WPA/WPA2-PSK is important in that context.This article proposes a new mechanism to crack theWi-Fi password using a graphical processing unit(GPU)and enhances the efficiency through parallel computing of multiple GPU chips.Experimental results show that the proposed algorithm is effective and provides a procedure to enhance the security of Wi-Fi networks. 展开更多
关键词 networks PASSWORD CYBERSECURITY password cracking mechanism
在线阅读 下载PDF
Security Threat and Data Consumption as Mojor Nuisance of Social Media on Wi-Fi Network 被引量:1
2
作者 Fuseini Inusah Ibrahim Mohammed Gunu Gaddafi Abdul-Salaam 《International Journal of Communications, Network and System Sciences》 2021年第2期15-29,共15页
This research is about the nuisances of social media applications on a Wi-Fi network at a university campus in Ghana. The aim was to access the security risk on the network, the speed of the network, and the data cons... This research is about the nuisances of social media applications on a Wi-Fi network at a university campus in Ghana. The aim was to access the security risk on the network, the speed of the network, and the data consumption of those platforms on the network. Network Mapper (Nmap Zenmap) Graphical User Interface 7.80 application was used to scan the various social media platforms to identify the protocols, ports, services, etc. to enable in accessing the vulnerability of the network. Data consumption of users’ mobile devices was collected and analyzed. Device Accounting (DA) based on the various social media applications was used. The results of the analysis revealed that the network is prone to attacks due to the nature of the protocols, ports, and services on social media applications. The numerous users with average monthly data consumption per user of 4 gigabytes, 300 megabytes on social media alone are a clear indication of high traffic as well as the cost of maintaining the network. A URL filtering of the social media websites was proposed on Rockus Outdoor AP to help curb the nuisance. 展开更多
关键词 Data Consumption Device Accounting Mobile Devices Social Media WiFi network Rockus Outdoor AP
在线阅读 下载PDF
WiMA:Towards a Multi-Criterion Association in Software Defined Wi-Fi Networks
3
作者 Sohaib Manzoor Hira Manzoor +5 位作者 Saddaf Rubab Muhammad Attique Khan Majed Alhaisoni Abdullah Alqahtani Ye Jin Kim Byoungchol Chang 《Computers, Materials & Continua》 SCIE EI 2023年第5期2347-2363,共17页
Despite the planned installation and operations of the traditional IEEE 802.11 networks,they still experience degraded performance due to the number of inefficiencies.One of the main reasons is the received signal str... Despite the planned installation and operations of the traditional IEEE 802.11 networks,they still experience degraded performance due to the number of inefficiencies.One of the main reasons is the received signal strength indicator(RSSI)association problem,in which the user remains connected to the access point(AP)unless the RSSI becomes too weak.In this paper,we propose a multi-criterion association(WiMA)scheme based on software defined networking(SDN)in Wi-Fi networks.An association solution based on multi-criterion such as AP load,RSSI,and channel occupancy is proposed to satisfy the quality of service(QoS).SDNhaving an overall view of the network takes the association and reassociation decisions making the handoffs smooth in throughput performance.To implementWiMA extensive simulations runs are carried out on Mininet-NS3-Wi-Fi network simulator.The performance evaluation shows that the WiMA significantly reduces the average number of retransmissions by 5%–30%and enhances the throughput by 20%–50%,hence maintaining user fairness and accommodating more wireless devices and traffic load in the network,when compared to traditional client-driven(CD)approach and state of the art Wi-Balance approach. 展开更多
关键词 ASSOCIATION multi-criterion SDN wi-fi
在线阅读 下载PDF
Beyond Wi-Fi 7:Enhanced Decentralized Wireless Local Area Networks with Federated Reinforcement Learning
4
作者 Rashid Ali Alaa Omran Almagrabi 《Computers, Materials & Continua》 2026年第3期391-409,共19页
Wi-Fi technology has evolved significantly since its introduction in 1997,advancing to Wi-Fi 6 as the latest standard,with Wi-Fi 7 currently under development.Despite these advancements,integrating machine learning in... Wi-Fi technology has evolved significantly since its introduction in 1997,advancing to Wi-Fi 6 as the latest standard,with Wi-Fi 7 currently under development.Despite these advancements,integrating machine learning into Wi-Fi networks remains challenging,especially in decentralized environments with multiple access points(mAPs).This paper is a short review that summarizes the potential applications of federated reinforcement learning(FRL)across eight key areas of Wi-Fi functionality,including channel access,link adaptation,beamforming,multi-user transmissions,channel bonding,multi-link operation,spatial reuse,and multi-basic servic set(multi-BSS)coordination.FRL is highlighted as a promising framework for enabling decentralized training and decision-making while preserving data privacy.To illustrate its role in practice,we present a case study on link activation in a multi-link operation(MLO)environment with multiple APs.Through theoretical discussion and simulation results,the study demonstrates how FRL can improve performance and reliability,paving the way for more adaptive and collaborative Wi-Fi networks in the era of Wi-Fi 7 and beyond. 展开更多
关键词 Artificial intelligence reinforcement learning channels selection wireless local area networks 802.11ax 802.11be wi-fi
在线阅读 下载PDF
基于视觉与Wi-Fi双层特征地图的智能手机室内定位方法
5
作者 胡钊政 柳雨婷 +2 位作者 周哲 黄戈 孙勋培 《哈尔滨工业大学学报》 北大核心 2026年第3期10-19,共10页
为解决室内环境中Wi-Fi定位精度低、视觉定位稳定性差等问题,提出了一种融合视觉与Wi-Fi的双层特征地图模型(vision-CSI map,V-CSI map),并提出基于隐马尔可夫模型(Hidden Markov model,HMM)的智能手机定位方法。V-CSI地图模型既包含基... 为解决室内环境中Wi-Fi定位精度低、视觉定位稳定性差等问题,提出了一种融合视觉与Wi-Fi的双层特征地图模型(vision-CSI map,V-CSI map),并提出基于隐马尔可夫模型(Hidden Markov model,HMM)的智能手机定位方法。V-CSI地图模型既包含基于栅格的信道状态信息(channel state information,CSI)指纹特征,同时也包含以稀疏安全出口为路标的视觉特征,并通过参考位置关联完成地图构建。本文将基于V-CSI特征地图的定位问题转化为HMM问题。首先完成安全出口标志检测与视觉特征匹配,实现视觉定位,将定位结果对HMM状态进行初始化;接着,利用CSI指纹匹配完成发射概率建模,通过高斯模型完成基于运动约束的状态转移概率建模;最后,通过前向算法求解HMM最优匹配状态,进而计算位置。在6000平方米办公楼和3600平方米地下停车场对本文算法与模型进行验证。实验结果表明,两种典型室内场景下,本文算法平均定位误差约为1.0 m,单次定位时间约170 ms;相比于单一CSI定位,平均定位误差减少56%以上,说明该算法能够有效提升室内定位的准确性与鲁棒性。 展开更多
关键词 室内定位 智能手机 双层特征地图 隐马尔可夫模型 wi-fi定位 视觉定位
在线阅读 下载PDF
基于Wi-Fi技术的智能温室大棚控制系统研究
6
作者 张庆松 《消费电子》 2026年第6期125-127,共3页
文章针对传统温室大棚控制系统硬件成本高、交互方式单一、数据传输安全性不足、场景适配性差等行业痛点,提出一种基于消费电子技术重构农业应用场景的智能控制方案。该系统以ESP32-WROOM-32消费级Wi-Fi模块为核心控制器,替代传统工业... 文章针对传统温室大棚控制系统硬件成本高、交互方式单一、数据传输安全性不足、场景适配性差等行业痛点,提出一种基于消费电子技术重构农业应用场景的智能控制方案。该系统以ESP32-WROOM-32消费级Wi-Fi模块为核心控制器,替代传统工业可编程逻辑控制器(Programmable Logic Controller,PLC)设备,集成DHT11、FC-28、BH1750等低成本消费级传感器,开发支持手势/语音双模态交互的手机APP,并融合WPA3-SAE加密协议与轻量化联盟链认证机制,构建双重安全防护体系。通过硬件选型优化、软件模块化开发和场景化适配设计,实现温室环境参数的实时监测、远程闭环控制和安全数据传输。该系统创新性地将农业场景转化为消费电子技术验证平台,突出成本优化、交互创新和场景适配核心优势,为智能终端在农业领域的规模化应用提供了兼具理论价值与实践意义的技术路径。 展开更多
关键词 wi-fi技术 智能温室 ESP32 手势交互 区块链安全 物联网
在线阅读 下载PDF
一款应用于Wi-Fi 6的宽带、高功率数字Doherty功率放大器
7
作者 赵康杰 刘灿 张润曦 《华东师范大学学报(自然科学版)》 北大核心 2026年第2期35-47,共13页
提出了一款面向第六代Wi-Fi(Wi-Fi 6)应用的宽带、高功率数字Doherty功率放大器,基于22 nm CMOS工艺实现了5.125~7.125 GHz频段覆盖.该功率放大器采用Polar架构,通过紧凑式全差分宽带正交输入网络,在2 GHz带宽内实现低于6°的相位误... 提出了一款面向第六代Wi-Fi(Wi-Fi 6)应用的宽带、高功率数字Doherty功率放大器,基于22 nm CMOS工艺实现了5.125~7.125 GHz频段覆盖.该功率放大器采用Polar架构,通过紧凑式全差分宽带正交输入网络,在2 GHz带宽内实现低于6°的相位误差,并结合8 bit相位调制模块,兼顾高阶调制性能与芯片集成度;输出端将四分之一波长传输线集成至变压器模型,构建低插损、小面积的Doherty功率合成网络,并结合8 bit幅度调制模块实现瓦特级输出.此外,功率放大器通过融合Doherty负载调制与ClassG技术,优化了6 dB和12 dB两个功率状态下的回退效率.后仿真结果表明:饱和输出功率为29 dBm,峰值效率为23%, 6 dB和12 dB的回退效率分别为22%和13%;在80 MHz带宽、256-QAM调制信号下,误差矢量幅度(EVM)为–30 dB时,平均输出功率达21 dBm,满足Wi-Fi 6系统对宽带、高效率及高线性度的综合需求. 展开更多
关键词 数字功率放大器 DOHERTY 功率合成网络 功率回退效率 第六代wi-fi
在线阅读 下载PDF
5G行业终端的Wi-Fi接入多用户管控方案设计与应用
8
作者 杜宝林 杜长坤 +1 位作者 李少晖 杨立伟 《邮电设计技术》 2026年第1期77-81,共5页
在电信运营商管控5G SIM卡的基础上,针对5G行业终端的Wi-Fi接入多用户实名管控需求,提出了对接入5G终端的多用户管控方案,验证了对5G CPE的Wi-Fi接入用户管控的可行性,能够满足5G终端的Wi-Fi接入用户管控需求。
关键词 5G终端CPE 用户管控 公用wi-fi
在线阅读 下载PDF
Wi-Fi 8—下一代无线局域网技术
9
作者 戴星亚 万国伟 康凯 《电信科学》 北大核心 2026年第1期65-85,共21页
为了进一步降低无线保真(wireless fidelity,Wi-Fi)系统时延、提高系统可靠性,新一代Wi-Fi技术——Wi-Fi 8(IEEE 802.11bn)的协议正在制定中,预计于2028年正式发布并商用。Wi-Fi 8提出了多项新技术来满足用户对高可靠、大容量、低时延... 为了进一步降低无线保真(wireless fidelity,Wi-Fi)系统时延、提高系统可靠性,新一代Wi-Fi技术——Wi-Fi 8(IEEE 802.11bn)的协议正在制定中,预计于2028年正式发布并商用。Wi-Fi 8提出了多项新技术来满足用户对高可靠、大容量、低时延、高速率的需求。从Wi-Fi 8的协议草案入手,深入介绍与分析了多接入点(access point,AP)协调技术、非主信道接入技术、动态子信道操作技术及降低传输时延等多项新技术,并对新技术的演进方向进行了初步的分析与评估。最后,对Wi-Fi 8的未来应用进行了展望。 展开更多
关键词 wi-fi 8 高可靠性 低时延 多接入点协调 非主信道接入 动态子信道操作
在线阅读 下载PDF
一款用于Wi-Fi无线通信的高能效和高线性SCPA数字发射机芯片
10
作者 刘灿 赵康杰 张润曦 《华东师范大学学报(自然科学版)》 北大核心 2026年第2期12-24,共13页
本文设计了一款可应用于Wi-Fi通信的2.4 GHz硅基、高输出功率、高能效、高线性度开关电容功率放大器(SCPA)数字发射机芯片.该发射机由数字模块、射频模块两部分构成.在射频模块中, SCPA采用10 bit分辨率同相正交(I/Q)架构,利用时钟交互... 本文设计了一款可应用于Wi-Fi通信的2.4 GHz硅基、高输出功率、高能效、高线性度开关电容功率放大器(SCPA)数字发射机芯片.该发射机由数字模块、射频模块两部分构成.在射频模块中, SCPA采用10 bit分辨率同相正交(I/Q)架构,利用时钟交互技术规避I/Q两路正交信号合成时的交叠损失以提升功率,并采用交叉4路串联Doherty无源合成网络提升功率及回退效率.在数字模块中,通过数字预失真(DPD)处理实现了芯片整体输出线性度的优化.该芯片采用22 nm互补金属氧化物半导体(CMOS)工艺设计,后仿真结果表明:发射机在2.4 GHz处饱和输出功率为30.44 dBm,峰值系统效率为47.73%;在2.5、6、12 dB功率回退时,系统效率分别为34.73%、37.92%、17.94%.对于4096-QAM调制信号,能够实现最终误差矢量幅度(EVM)小于–38 dB. 展开更多
关键词 互补金属氧化物半导体 开关电容功率放大器 正交架构数字发射机 Doherty串联合成变压器 wi-fi通信
在线阅读 下载PDF
一种通用的基于Wi-Fi探针数据的人群密度估计方法
11
作者 黄中意 黄仟嬴 +1 位作者 房志明 石志钢 《计算机应用研究》 北大核心 2026年第3期892-897,共6页
随着对于大规模人群聚集活动的监控需求日益凸显,基于Wi-Fi的人群密度监测技术逐渐应用于公共安全管理,但其受限于RSSI(received signal strength indicator)的显著波动性与MAC地址匿名化造成的个体识别困难,特别在高密度场景下,其估计... 随着对于大规模人群聚集活动的监控需求日益凸显,基于Wi-Fi的人群密度监测技术逐渐应用于公共安全管理,但其受限于RSSI(received signal strength indicator)的显著波动性与MAC地址匿名化造成的个体识别困难,特别在高密度场景下,其估计精度与稳定性仍难以保障。对此,提出一种抗随机性的Wi-Fi探针数据人群密度估计方法,通过设计一种基于时间窗的累计RSSI计算策略,利用局部建模构建区域密度映射关系,捕捉区域人群的动态变化,实现了复杂环境下稳定人群密度估计。所提方法在米级精度上分别取得了0.9723的整体准确率和0.8974的高密度场景准确率,实验结果表明其性能良好,具备跨场景推广的理论潜力与良好的泛用性。 展开更多
关键词 人群密度估计 无源感知 wi-fi探针
在线阅读 下载PDF
Joint Optimization of Routing and Resource Allocation in Decentralized UAV Networks Based on DDQN and GNN
12
作者 Nawaf Q.H.Othman YANG Qinghai JIANG Xinpei 《电讯技术》 北大核心 2026年第1期1-10,共10页
Optimizing routing and resource allocation in decentralized unmanned aerial vehicle(UAV)networks remains challenging due to interference and rapidly changing topologies.The authors introduce a novel framework combinin... Optimizing routing and resource allocation in decentralized unmanned aerial vehicle(UAV)networks remains challenging due to interference and rapidly changing topologies.The authors introduce a novel framework combining double deep Q-networks(DDQNs)and graph neural networks(GNNs)for joint routing and resource allocation.The framework uses GNNs to model the network topology and DDQNs to adaptively control routing and resource allocation,addressing interference and improving network performance.Simulation results show that the proposed approach outperforms traditional methods such as Closest-to-Destination(c2Dst),Max-SINR(mSINR),and Multi-Layer Perceptron(MLP)-based models,achieving approximately 23.5% improvement in throughput,50% increase in connection probability,and 17.6% reduction in number of hops,demonstrating its effectiveness in dynamic UAV networks. 展开更多
关键词 decentralized UAV network resource allocation routing algorithm GNN DDQN DRL
在线阅读 下载PDF
Wi-Fi与机器学习结合的综合分析
13
作者 成刚 罗晔 《电子技术应用》 2026年第1期1-7,共7页
系统性地分析了当前AI/ML在Wi-Fi领域的技术研究和应用情况。首先对Wi-Fi技术特征以及发展趋势所带来的复杂度进行阐述。然后提出机器学习对优化Wi-Fi网络参数的必要性,以及综合介绍和分析AI/ML在提升Wi-Fi性能和用户体验的研究及可行性... 系统性地分析了当前AI/ML在Wi-Fi领域的技术研究和应用情况。首先对Wi-Fi技术特征以及发展趋势所带来的复杂度进行阐述。然后提出机器学习对优化Wi-Fi网络参数的必要性,以及综合介绍和分析AI/ML在提升Wi-Fi性能和用户体验的研究及可行性,并对IEEE 802.11 AI/ML兴趣组四个具体的AI/ML用例进行说明和评估。接着探讨和建议Wi-Fi与AI/ML相结合的系统设计框架,以及相应的基本用例分析。最后对Wi-Fi与AI/ML结合的技术挑战和行业发展做了归纳和总结。 展开更多
关键词 wi-fi 7 人工智能 机器学习 IEEE 802.11bn wi-fi 8
在线阅读 下载PDF
Exploring the material basis and mechanisms of the action of Hibiscus mutabilis L. for its anti-inflammatory effects based on network pharmacology and cell experiments
14
作者 Wenyuan Chen Xiaolan Chen +2 位作者 Jing Wan Qin Deng Yong Gao 《日用化学工业(中英文)》 北大核心 2026年第1期55-64,共10页
To explore the material basis and mechanisms of the anti-inflammatory effects of Hibiscus mutabilis L..The active ingredients and potential targets of Hibiscus mutabilis L.were obtained through the literature review a... To explore the material basis and mechanisms of the anti-inflammatory effects of Hibiscus mutabilis L..The active ingredients and potential targets of Hibiscus mutabilis L.were obtained through the literature review and SwissADME platform.Genes related to the inflammation were collected using Genecards and OMIM databases,and the intersection genes were submitted on STRING and DAVID websites.Then,the protein interaction network(PPI),gene ontology(GO)and pathway(KEGG)were analyzed.Cytoscape 3.7.2 software was used to construct the“Hibiscus mutabilis L.-active ingredient-target-inflammation”network diagram,and AutoDockTools-1.5.6 software was used for the molecular docking verification.The antiinflammatory effect of Hibiscus mutabilis L.active ingredient was verified by the RAW264.7 inflammatory cell model.The results showed that 11 active components and 94 potential targets,1029 inflammatory targets and 24 intersection targets were obtained from Hibiscus mutabilis L..The key anti-inflammatory active ingredients of Hibiscus mutabilis L.are quercetin,apigenin and luteolin.Its action pathway is mainly related to NF-κB,cancer pathway and TNF signaling pathway.Cell experiments showed that total flavonoids of Hibiscus mutabilis L.could effectively inhibit the expression of tumor necrosis factor(TNF-α),interleukin 8(IL-8)and epidermal growth factor receptor(EGFR)in LPS-induced RAW 264.7 inflammatory cells.It also downregulates the phosphorylation of human nuclear factor ĸB inhibitory protein α(IĸBα)and NF-κB p65 subunit protein(p65).Overall,the anti-inflammatory effect of Hibiscus mutabilis L.is related to many active components,many signal pathways and targets,which provides a theoretical basis for its further development and application. 展开更多
关键词 Hibiscus mutabilis L. INFLAMMATION network pharmacology molecular docking cell validation
在线阅读 下载PDF
Underwater Image Enhancement Based on Depthwise Separable Convolution-Based Generative Adversarial Network
15
作者 ZENG Jun-yang SI Zhan-jun 《印刷与数字媒体技术研究》 北大核心 2026年第1期60-66,共7页
The existence of absorption and reflection of light underwater leads to problems such as color distortion and blue-green bias in underwater images.In this study,a depthwise separable convolution-based generative adver... The existence of absorption and reflection of light underwater leads to problems such as color distortion and blue-green bias in underwater images.In this study,a depthwise separable convolution-based generative adversarial network(GAN)algorithm was proposed.Taking GAN as the basic framework,it combined a depthwise separable convolution module,attention mechanism,and reconstructed convolution module to realize the enhancement of underwater degraded images.Multi-scale features were captured by the depthwise separable convolution module,and the attention mechanism was utilized to enhance attention to important features.The reconstructed convolution module further extracts and fuses local and global features.Experimental results showed that the algorithm performs well in improving the color bias and blurring of underwater images,with PSNR reaching 27.835,SSIM reaching 0.883,UIQM reaching 3.205,and UCIQE reaching 0.713.The enhanced image outperforms the comparison algorithm in both subjective and objective metrics. 展开更多
关键词 Underwater image enhancement Generating adversarial network Depthwise separable convolution
在线阅读 下载PDF
A Multi-Scale Graph Neural Networks Ensemble Approach for Enhanced DDoS Detection
16
作者 Noor Mueen Mohammed Ali Hayder Seyed Amin Hosseini Seno +2 位作者 Hamid Noori Davood Zabihzadeh Mehdi Ebady Manaa 《Computers, Materials & Continua》 2026年第4期1216-1242,共27页
Distributed Denial of Service(DDoS)attacks are one of the severe threats to network infrastructure,sometimes bypassing traditional diagnosis algorithms because of their evolving complexity.PresentMachine Learning(ML)t... Distributed Denial of Service(DDoS)attacks are one of the severe threats to network infrastructure,sometimes bypassing traditional diagnosis algorithms because of their evolving complexity.PresentMachine Learning(ML)techniques for DDoS attack diagnosis normally apply network traffic statistical features such as packet sizes and inter-arrival times.However,such techniques sometimes fail to capture complicated relations among various traffic flows.In this paper,we present a new multi-scale ensemble strategy given the Graph Neural Networks(GNNs)for improving DDoS detection.Our technique divides traffic into macro-and micro-level elements,letting various GNN models to get the two corase-scale anomalies and subtle,stealthy attack models.Through modeling network traffic as graph-structured data,GNNs efficiently learn intricate relations among network entities.The proposed ensemble learning algorithm combines the results of several GNNs to improve generalization,robustness,and scalability.Extensive experiments on three benchmark datasets—UNSW-NB15,CICIDS2017,and CICDDoS2019—show that our approach outperforms traditional machine learning and deep learning models in detecting both high-rate and low-rate(stealthy)DDoS attacks,with significant improvements in accuracy and recall.These findings demonstrate the suggested method’s applicability and robustness for real-world implementation in contexts where several DDoS patterns coexist. 展开更多
关键词 DDoS detection graph neural networks multi-scale learning ensemble learning network security stealth attacks network graphs
在线阅读 下载PDF
Networked Predictive Control:A Survey
17
作者 Zhong-Hua Pang Tong Mu +3 位作者 Yi Yu Haibin Guo Guo-Ping Liu Qing-Long Han 《IEEE/CAA Journal of Automatica Sinica》 2026年第1期3-20,共18页
Networked predictive control(NPC) has gained significant attention in recent years for its ability to effectively and actively address communication constraints in networked control systems(NCSs),such as network-induc... Networked predictive control(NPC) has gained significant attention in recent years for its ability to effectively and actively address communication constraints in networked control systems(NCSs),such as network-induced delays,packet dropouts,and packet disorders.Despite significant advancements,the increasing complexity and dynamism of network environments,along with the growing complexity of systems,pose new challenges for NPC.These challenges include difficulties in system modeling,cyber attacks,component faults,limited network bandwidth,and the necessity for distributed collaboration.This survey aims to provide a comprehensive review of NPC strategies.It begins with a summary of the primary challenges faced by NCSs,followed by an introduction to the control structure and core concepts of NPC.The survey then discusses several typical NPC schemes and examines their extensions in the areas of secure control,fault-tolerant control,distributed coordinated control,and event-triggered control.Moreover,it reviews notable works that have implemented these schemes.Finally,the survey concludes by exploring typical applications of NPC schemes and highlighting several challenging issues that could guide future research efforts. 展开更多
关键词 Communication constraints cyber attacks networked control systems networked multi-agent systems networked predictive control
在线阅读 下载PDF
Multi-responsive Hydrogel Featuring Synergistic Regulation of AIE and Mechanical Behaviors via Dynamic Hydrogen Bonding Network
18
作者 ZHANG Yangdaiyi SHAO Yan JIANG Shimei 《高等学校化学学报》 北大核心 2026年第4期141-152,共12页
A multi-stimuli-responsive hydrogel,P(VI-co-MAAC-NE),was successfully constructed by covalently integrating the aggregation-induced emission(AIE)moiety(Z)-N-(4-(1-cyano-2-(4-(diethylamino)phenyl)vinyl)-phenyl)methacry... A multi-stimuli-responsive hydrogel,P(VI-co-MAAC-NE),was successfully constructed by covalently integrating the aggregation-induced emission(AIE)moiety(Z)-N-(4-(1-cyano-2-(4-(diethylamino)phenyl)vinyl)-phenyl)methacrylamide(NE)into a dynamic hydrogen-bonding network composed of 1-vinylimidazole(VI)and methacrylic acid(MAAC)groups.The dense hydrogen-bonding network not only provides enhanced mechanical robustness,but also significantly enhances the AIE effect of NE by restricting its molecular motion.Under various external stimuli,the hydrogen bonds within the hydrogel network undergo reversible dissociation and reformation,thus enabling synergistic modulation of the hydrogel’s mechanical properties and luminescence behavior.Specifically,organic solvents disrupt the hydrogen-bonding network and the aggregation of the AIE moiety NE,resulting in macroscopic swelling and fluorescence quenching of the hydrogel.In strongly acidic conditions,protonation of NE molecules suppresses the intramolecular charge transfer(ICT)process,yielding a blue-shifted emission band accompanied by intense blue fluorescence;in highly alkaline environments,deprotonation of carboxyl groups induces hydrogel swelling and disperses NE aggregates,leading to pronounced fluorescence quenching.Moreover,the system exhibits thermally activated shape-memory behavior:heating above the glass transition temperature(T_(g):ca.62℃)softens the hydrogel to allow programmable reshaping,and subsequent hydrogen bond reformation at ambient conditions locks in the resultant geometries without sacrificing the hydrogel’s fluorescence performance.By capitalizing on these multi-stimuli-responsive characteristics and shape-memory behavior,the potential of hydrogel P(VI-co-MAAC-NE)for advanced information encryption and anti-counterfeiting applications is demonstrated.This work not only provides a versatile material platform for sensing and information storage,but also offers new insights into the design of intelligent soft materials integrating AIE features with dynamically regulated supramolecular network structures. 展开更多
关键词 Aggregation-induced emission(AIE) Multi-responsive hydrogel Mechanical properties Hydrogen bonds network
在线阅读 下载PDF
Effects of Urbanization on Amphibian Predation Networks in Kunming
19
作者 Qisheng LI Pili WU +3 位作者 Yingzhi YAN Zhongping XIONG Yunfei MA Jielong ZHOU 《Asian Herpetological Research》 2026年第1期53-61,共9页
Urbanization is a significant driver of the loss of biodiversity and the disruption of ecosystems.Amphibians are especially vulnerable to the negative impact of urbanization as their life cycles and habitat requiremen... Urbanization is a significant driver of the loss of biodiversity and the disruption of ecosystems.Amphibians are especially vulnerable to the negative impact of urbanization as their life cycles and habitat requirements are complex.The present study investigated the effects of urbanization on amphibian predation networks in suburban Kunming in Yunnan,China and aimed to understand how predation network structure and stability vary with urbanization level.We constructed predation networks by analyzing the stomach contents of amphibians from 12d istinct urbanization gradients.We used the bipartite package in R to evaluate network robustness metrics such as modularity,nestedness,connectivity,and average shortest path length(ASPL).We found that urbanization level is negatively correlated with predation network connectivity(R=−0.67,Ρ=0.02),but there were no significant correlations between urbanization level and nestedness,modularity,or ASPL.Removal of the keystone species destabilized the predation networks at certain locations.The present work highlighted that maintaining prey quantity and diversity preserves predation network connectivity and stabilizes the overall network in urbanizing landscapes.It also underscored the critical role that keystone species play in sustaining network robustness.The results of this research provided insights into the ecological consequences of urbanization.They also suggested that conservation measures should protect the key species and habitats of amphibian predation networks and mitigate the negative impact of urban development on them. 展开更多
关键词 AMPHIBIAN network robustness predation network URBANIZATION
原文传递
NetVerifier:Scalable Verification for Programmable Networks
20
作者 Ying Yao Le Tian +1 位作者 Yuxiang Hu Pengshuai Cui 《Computers, Materials & Continua》 2026年第5期1830-1848,共19页
In the process of programmable networks simplifying network management and increasing network flexibility through custom packet behavior,security incidents caused by human logic errors are seriously threatening their ... In the process of programmable networks simplifying network management and increasing network flexibility through custom packet behavior,security incidents caused by human logic errors are seriously threatening their safe operation,robust verificationmethods are required to ensure their correctness.As one of the formalmethods,symbolic execution offers a viable approach for verifying programmable networks by systematically exploring all possible paths within a program.However,its application in this field encounters scalability issues due to path explosion and complex constraint-solving.Therefore,in this paper,we propose NetVerifier,a scalable verification system for programmable networks.Tomitigate the path explosion issue,we developmultiple pruning strategies that strategically eliminate irrelevant execution paths while preserving verification integrity by precisely identifying the execution paths related to the verification purpose.To address the complex constraint-solving problem,we introduce an execution results reuse solution to avoid redundant computation of the same constraints.To apply these solutions intelligently,a matching algorithm is implemented to automatically select appropriate solutions based on the characteristics of the verification requirement.Moreover,Language Aided Verification(LAV),an assertion language,is designed to express verification intentions in a concise form.Experimental results on diverse open-source programs of varying scales demonstrate NetVerifier’s improvement in scalability and effectiveness in identifying potential network errors.In the best scenario,compared with ASSERT-P4,NetVerifier reduced the execution path,verification time,and memory occupation of the verification process by 99.92%,94.76%,and 65.19%,respectively. 展开更多
关键词 Programmable network network verification symbolic execution SCALABILITY
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部