期刊文献+
共找到206篇文章
< 1 2 11 >
每页显示 20 50 100
Meteorological and traffic effects on air pollutants using Bayesian networks and deep learning
1
作者 Yuan-Chien Lin Yu-Ting Lin +1 位作者 Cai-Rou Chen Chun-Yeh Lai 《Journal of Environmental Sciences》 2025年第6期54-70,共17页
Traffic emissions have become the major air pollution source in urban areas.Therefore,understanding the highly non-stational and complex impact of traffic factors on air quality is very important for building air qual... Traffic emissions have become the major air pollution source in urban areas.Therefore,understanding the highly non-stational and complex impact of traffic factors on air quality is very important for building air quality prediction models.Using real-world air pollutant data from Taipei City,this study integrates diverse factors,including traffic flow,speed,rainfall patterns,andmeteorological factors.We constructed a Bayesian network probabilitymodel based on rainfall events as a big data analysis framework to investigate understand traffic factor causality relationships and condition probabilities for meteorological factors and air pollutant concentrations.Generalized Additive Model(GAM)verified non-linear relationships between traffic factors and air pollutants.Consequently,we propose a long short term memory(LSTM)model to predict airborne pollutant concentrations.This study propose a new approach of air pollutants and meteorological variable analysis procedure by considering both rainfall amount and patterns.Results indicate improved air quality when controlling vehicle speed above 40 km/h and maintaining an average vehicle flow<1200 vehicles per hour.This study also classified rainfall events into four types depending on its characteristic.Wet deposition from varied rainfall types significantly affects air quality,with TypeⅠrainfall events(long-duration heavy rain)having the most pronounced impact.An LSTM model incorporating GAM and Bayesian network outcomes yields excellent performance,achieving correlation R^(2)>0.9 and 0.8 for first and second order air pollutants,i.e.,CO,NO,NO_(2),and NO_(x);and O_(3),PM_(10),and PM_(2.5),respectively. 展开更多
关键词 Air quality Rainfall pattern traffic emissions Generalized additive model Bayesian networks LSTM model
原文传递
Semisupervised Encrypted Traffic Identification Based on Auxiliary Classification Generative Adversarial Network 被引量:2
2
作者 Jiaming Mao Mingming Zhang +5 位作者 Mu Chen Lu Chen Fei Xia Lei Fan ZiXuan Wang Wenbing Zhao 《Computer Systems Science & Engineering》 SCIE EI 2021年第12期373-390,共18页
The rapidly increasing popularity of mobile devices has changed the methods with which people access various network services and increased net-work traffic markedly.Over the past few decades,network traffic identific... The rapidly increasing popularity of mobile devices has changed the methods with which people access various network services and increased net-work traffic markedly.Over the past few decades,network traffic identification has been a research hotspot in the field of network management and security mon-itoring.However,as more network services use encryption technology,network traffic identification faces many challenges.Although classic machine learning methods can solve many problems that cannot be solved by port-and payload-based methods,manually extract features that are frequently updated is time-consuming and labor-intensive.Deep learning has good automatic feature learning capabilities and is an ideal method for network traffic identification,particularly encrypted traffic identification;Existing recognition methods based on deep learning primarily use supervised learning methods and rely on many labeled samples.However,in real scenarios,labeled samples are often difficult to obtain.This paper adjusts the structure of the auxiliary classification generation adversarial network(ACGAN)so that it can use unlabeled samples for training,and use the wasserstein distance instead of the original cross entropy as the loss function to achieve semisupervised learning.Experimental results show that the identification accuracy of ISCX and USTC data sets using the proposed method yields markedly better performance when the number of labeled samples is small compared to that of convolutional neural network(CNN)based classifier. 展开更多
关键词 Encrypted traffic recognition deep learning generative adversarial network traffic classification semisupervised learning
在线阅读 下载PDF
Network Traffic Based on GARCH-M Model and Extreme Value Theory 被引量:1
3
作者 沈菲 王洪礼 +1 位作者 史道济 李栋 《Transactions of Tianjin University》 EI CAS 2005年第5期386-390,共5页
GARCH-M ( generalized autoregressive conditional heteroskedasticity in the mean) model is used to analyse the volatility clustering phenomenon in mobile communication network traffic. Normal distribution, t distributi... GARCH-M ( generalized autoregressive conditional heteroskedasticity in the mean) model is used to analyse the volatility clustering phenomenon in mobile communication network traffic. Normal distribution, t distribution and generalized Pareto distribution assumptions are adopted re- spectively to simulate the random component in the model. The demonstration of the quantile of network traffic series indicates that common GARCH-M model can partially deal with the "fat tail" problem. However, the "fat tail" characteristic of the random component directly affects the accura- cy of the calculation. Even t distribution is based on the assumption for all the data. On the other hand, extreme value theory, which only concentrates on the tail distribution, can provide more ac- curate result for high quantiles. The best result is obtained based on the generalized Pareto distribu- tion assumption for the random component in the GARCH-M model. 展开更多
关键词 network traffic GARCH-M extreme value theory generalized Pareto distribution
在线阅读 下载PDF
Network Traffic Synthesis and Simulation Framework for Cybersecurity Exercise Systems
4
作者 Dong-Wook Kim Gun-Yoon Sin +3 位作者 Kwangsoo Kim Jaesik Kang Sun-Young Im Myung-Mook Han 《Computers, Materials & Continua》 SCIE EI 2024年第9期3637-3653,共17页
In the rapidly evolving field of cybersecurity,the challenge of providing realistic exercise scenarios that accurately mimic real-world threats has become increasingly critical.Traditional methods often fall short in ... In the rapidly evolving field of cybersecurity,the challenge of providing realistic exercise scenarios that accurately mimic real-world threats has become increasingly critical.Traditional methods often fall short in capturing the dynamic and complex nature of modern cyber threats.To address this gap,we propose a comprehensive framework designed to create authentic network environments tailored for cybersecurity exercise systems.Our framework leverages advanced simulation techniques to generate scenarios that mirror actual network conditions faced by professionals in the field.The cornerstone of our approach is the use of a conditional tabular generative adversarial network(CTGAN),a sophisticated tool that synthesizes realistic synthetic network traffic by learning fromreal data patterns.This technology allows us to handle technical components and sensitive information with high fidelity,ensuring that the synthetic data maintains statistical characteristics similar to those observed in real network environments.By meticulously analyzing the data collected from various network layers and translating these into structured tabular formats,our framework can generate network traffic that closely resembles that found in actual scenarios.An integral part of our process involves deploying this synthetic data within a simulated network environment,structured on software-defined networking(SDN)principles,to test and refine the traffic patterns.This simulation not only facilitates a direct comparison between the synthetic and real traffic but also enables us to identify discrepancies and refine the accuracy of our simulations.Our initial findings indicate an error rate of approximately 29.28%between the synthetic and real traffic data,highlighting areas for further improvement and adjustment.By providing a diverse array of network scenarios through our framework,we aim to enhance the exercise systems used by cybersecurity professionals.This not only improves their ability to respond to actual cyber threats but also ensures that the exercise is cost-effective and efficient. 展开更多
关键词 Cybersecurity exercise synthetic network traffic generative adversarial network traffic generation software-defined networking
在线阅读 下载PDF
Network Traffic Generation Based on Statistical Packet-Level Characteristics
5
作者 WANG Dongbin ZHUO Weihan +2 位作者 ZHANG Junhui WU Kexin OUYANG Wen 《China Communications》 SCIE CSCD 2015年第S2期144-148,共5页
Network traffic is very important for testing network equipment, network services, and security products. A new method of generating traffic based on statistical packet-level characteristics is proposed. In every time... Network traffic is very important for testing network equipment, network services, and security products. A new method of generating traffic based on statistical packet-level characteristics is proposed. In every time unit, the generator determines the sent packets number, the type and size of every sent packet according to the statistical characteristics of the original traffic. Then every packet, in which the protocol headers of transport layer, network layer and ethernet layer are encapsulated, is sent via the responding network interface card in the time unit. The results in the experiment show that the correlation coefficients between the bandwidth, the packet number, packet size distribution, the fragment number of the generated network traffic and those of the original traffic are all more than 0.96. The generated traffic and original traffic are very highly related and similar. 展开更多
关键词 network traffic GENERATION packet-level traffic CHARACTERISTICS
在线阅读 下载PDF
Wavelet Neural Network Based Traffic Prediction for Next Generation Network
6
作者 赵其刚 李群湛 何正友 《Journal of Southwest Jiaotong University(English Edition)》 2005年第2期113-118,共6页
By using netflow traffic collecting technology, some traffic data for analysis are collected from a next generation network (NGN) operator. To build a wavelet basis neural network (NN), the Sigmoid function is rep... By using netflow traffic collecting technology, some traffic data for analysis are collected from a next generation network (NGN) operator. To build a wavelet basis neural network (NN), the Sigmoid function is replaced with the wavelet in NN. Then the wavelet multiresolution analysis method is used to decompose the traffic signal, and the decomposed component sequences are employed to train the NN. By using the methods, an NGN traffic prediction model is built to predict one day's traffic. The experimental results show that the traffic prediction method of wavelet NN is more accurate than that without using wavelet in the NGN traffic forecasting. 展开更多
关键词 Wavelet neural network IP traffic prediction Next generation network WAVELET
在线阅读 下载PDF
Effect of Network Traffic on IPS Performance
7
作者 Shahriar Mohammadi Vahid Allahvakil Mojtaba Khaghani 《Journal of Information Security》 2012年第2期162-168,共7页
The importance of network security has grown tremendously and intrusion prevention/detection systems (IPS/IDS) have been widely developed to insure the security of network against suspicious threat. Computer network i... The importance of network security has grown tremendously and intrusion prevention/detection systems (IPS/IDS) have been widely developed to insure the security of network against suspicious threat. Computer network intrusion detection and prevention system consist of collecting traffic data, analyzing them based on detection rules and generate alerts or dropping them if necessary. However IPS has problems such as accuracy signature, the traffic volume, topology design, monitoring sensors. In this paper, we practically examine the traffic effect on performance of IPS. We first examine the detection of DOS attack on a web server by IPS and then we generate network traffic to see how the behavior of IPS has influenced on detection of DOS attack. 展开更多
关键词 network Security network INTRUSION Detection and Prevention System DOS ATTACK network traffic Generation
在线阅读 下载PDF
GraphCWGAN-GP:A Novel Data Augmenting Approach for Imbalanced Encrypted Traffic Classification 被引量:2
8
作者 Jiangtao Zhai Peng Lin +2 位作者 Yongfu Cui Lilong Xu Ming Liu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第8期2069-2092,共24页
Encrypted traffic classification has become a hot issue in network security research.The class imbalance problem of traffic samples often causes the deterioration of Machine Learning based classifier performance.Altho... Encrypted traffic classification has become a hot issue in network security research.The class imbalance problem of traffic samples often causes the deterioration of Machine Learning based classifier performance.Although the Generative Adversarial Network(GAN)method can generate new samples by learning the feature distribution of the original samples,it is confronted with the problems of unstable training andmode collapse.To this end,a novel data augmenting approach called Graph CWGAN-GP is proposed in this paper.The traffic data is first converted into grayscale images as the input for the proposed model.Then,the minority class data is augmented with our proposed model,which is built by introducing conditional constraints and a new distance metric in typical GAN.Finally,the classical deep learning model is adopted as a classifier to classify datasets augmented by the Condition GAN(CGAN),Wasserstein GAN-Gradient Penalty(WGAN-GP)and Graph CWGAN-GP,respectively.Compared with the state-of-the-art GAN methods,the Graph CWGAN-GP cannot only control the modes of the data to be generated,but also overcome the problem of unstable training and generate more realistic and diverse samples.The experimental results show that the classification precision,recall and F1-Score of theminority class in the balanced dataset augmented in this paper have improved by more than 2.37%,3.39% and 4.57%,respectively. 展开更多
关键词 Generative Adversarial network imbalanced traffic data data augmenting encrypted traffic classification
在线阅读 下载PDF
Optimized Generative Adversarial Networks for Adversarial Sample Generation
9
作者 Daniyal M.Alghazzawi Syed Hamid Hasan Surbhi Bhatia 《Computers, Materials & Continua》 SCIE EI 2022年第8期3877-3897,共21页
Detecting the anomalous entity in real-time network traffic is a popular area of research in recent times.Very few researches have focused on creating malware that fools the intrusion detection system and this paper f... Detecting the anomalous entity in real-time network traffic is a popular area of research in recent times.Very few researches have focused on creating malware that fools the intrusion detection system and this paper focuses on this topic.We are using Deep Convolutional Generative Adversarial Networks(DCGAN)to trick the malware classifier to believe it is a normal entity.In this work,a new dataset is created to fool the Artificial Intelligence(AI)based malware detectors,and it consists of different types of attacks such as Denial of Service(DoS),scan 11,scan 44,botnet,spam,User Datagram Portal(UDP)scan,and ssh scan.The discriminator used in the DCGAN discriminates two different attack classes(anomaly and synthetic)and one normal class.The model collapse,instability,and vanishing gradient issues associated with the DCGAN are overcome using the proposed hybrid Aquila optimizer-based Mine blast harmony search algorithm(AO-MBHS).This algorithm helps the generator to create realistic malware samples to be undetected by the discriminator.The performance of the proposed methodology is evaluated using different performance metrics such as training time,detection rate,F-Score,loss function,Accuracy,False alarm rate,etc.The superiority of the hybrid AO-MBHS based DCGAN model is noticed when the detection rate is changed to 0 after the retraining method to make the defensive technique hard to be noticed by the malware detection system.The support vector machines(SVM)is used as the malicious traffic detection application and its True positive rate(TPR)goes from 80%to 0%after retraining the proposed model which shows the efficiency of the proposed model in hiding the samples. 展开更多
关键词 Aquila optimizer convolutional generative adversarial networks mine blast harmony search algorithm network traffic dataset adversarial artificial intelligence techniques
在线阅读 下载PDF
面向恶意流量识别的网络流量生成方法
10
作者 张灿 栗维勋 +5 位作者 汪明 詹雄 颉子光 韩东岐 王之梁 杨家海 《计算机科学》 北大核心 2026年第4期415-423,共9页
恶意流量识别是网络安全防护中的关键任务,训练数据的质量直接决定识别模型的准确性。然而,受隐私保护、标注成本和类别不均衡等因素限制,真实数据获取十分困难。为解决上述挑战,提出了一种基于预训练-微调模型的细粒度网络流量生成方... 恶意流量识别是网络安全防护中的关键任务,训练数据的质量直接决定识别模型的准确性。然而,受隐私保护、标注成本和类别不均衡等因素限制,真实数据获取十分困难。为解决上述挑战,提出了一种基于预训练-微调模型的细粒度网络流量生成方法。该方法首先设计了一种保留协议结构信息的静态分词方案,将原始流量转换为协议语义保持的可供自回归模型学习的序列表示。在此基础上,构建了预训练-微调的两阶段生成框架:先以大规模良性流量学习通用协议与时序模式,继而在标注的恶意流量上进行任务定向微调,生成具备明确攻击语义的高保真样本。为了验证流量生成方法的效果,设计了多个维度的实验评估,结果证明,所提方法在协议合规性(领域专家知识检查通过率高达99.95%)、分布相似性(生成/真实分布间推土机距离仅为0.0059)及生成多样性(真实邻域覆盖度超过50%)均优于主流基准模型;在使用生成流量训练的恶意流量识别任务中,相较于基准方法,所提方法唯一实现了多种分类器的检测效果提升。此外,设计了恶意功能验证实验,在两种攻击场景下验证了所提方法生成流量的攻击效果。实验结果表明,所提方法能够生成语法合规、统计相似且语义功能正确的细粒度恶意流量,为解决网络安全领域流量数据稀缺问题提供了有效的技术途径。 展开更多
关键词 网络流量生成 恶意流量识别 生成式人工智能 自回归模型 预训练-微调
在线阅读 下载PDF
基于双向时序窗口Transformer的网络入侵检测方法
11
作者 王长浩 王明阳 +1 位作者 丁磊 刘凯 《计算机应用研究》 北大核心 2026年第1期271-279,共9页
近年来,网络攻击的高度动态化、隐蔽化给互联网的安全和稳定带来了极大的威胁。针对现有网络入侵检测方法在局部时序建模精度不足及多分类下少数类识别能力不佳等问题,提出了一种基于双向时间滑动窗口Transformer的网络异常流量检测方... 近年来,网络攻击的高度动态化、隐蔽化给互联网的安全和稳定带来了极大的威胁。针对现有网络入侵检测方法在局部时序建模精度不足及多分类下少数类识别能力不佳等问题,提出了一种基于双向时间滑动窗口Transformer的网络异常流量检测方法。该方法将网络流量数据转换为突出时序关系的三维序列数据,引入可学习的嵌入编码及上下文位置编码,以增强序列特征的表现能力,提升了异常流量检测的准确率和稳定性,并在UNSW-NB15、CIC-IDS-2017公开数据集上进行了验证。实验结果表明,所提方法均表现出较好的性能优势,在二分类任务中检测准确率分别为99.79%、99.77%;在多分类任务中,准确率分别达到98.48%、99.76%,性能均显著高于其他先进深度学习模型。综上,该方法有效提升了网络异常流量检测的准确性和对少数类攻击的识别能力,为网络安全防护提供了新的技术手段。 展开更多
关键词 入侵检测 网络流量 双向时间窗口 上下文位置编码
在线阅读 下载PDF
基于生成对抗网络的激光通信网络流量未知异常检测方法
12
作者 赵轩 屈立成 +1 位作者 闻丽芬 赵明旭 《激光杂志》 北大核心 2026年第2期142-147,共6页
为了提高流量未知异常的检测效果,提出基于生成对抗网络的激光通信网络流量未知异常检测方法。选取主成分分析算法对高维流量数据展开降维处理,构建双向生成对抗网络(EB-GAN)的检测模型,并将降维得到的正常流量作为生成器训练基础,通过... 为了提高流量未知异常的检测效果,提出基于生成对抗网络的激光通信网络流量未知异常检测方法。选取主成分分析算法对高维流量数据展开降维处理,构建双向生成对抗网络(EB-GAN)的检测模型,并将降维得到的正常流量作为生成器训练基础,通过模型训练学习到更丰富的流量特征模式,评估误差指标、定义异常度量函数计算不同时间段内流量特征的变化情况,衡量流量样本的异常程度,通过阈值判断流量是否异常。同时引入最小Wasserstein距离与梯度惩罚机制优化模型,减少对正常时序变化的误判,精准检测流量未知异常。实验结果表明,所提方法的F1分值始终接近于1,在未知异常检测中实现了零误检与零漏检;MSE值稳定在0.1左右,精准检测出激光通信网络流量中的未知异常。 展开更多
关键词 生成对抗网络 激光通信网络流量 主成分分析 Wasserstein距离 梯度惩罚机制
原文传递
基于Socket流量产生器的研究与实现 被引量:1
13
作者 潘艳辉 王韬 胡聪丛 《科学技术与工程》 2007年第17期4519-4521,共3页
在Visual Studio C++6.0环境下,通过Window Sockets编程,运用多线程技术,基于网络协议构造各种发包器。通过调用这些发包器向实验网络环境中发出数据包,从而在实验网络环境中产生真实的网络流量;并可根据用户的要求配置相应的背景流量... 在Visual Studio C++6.0环境下,通过Window Sockets编程,运用多线程技术,基于网络协议构造各种发包器。通过调用这些发包器向实验网络环境中发出数据包,从而在实验网络环境中产生真实的网络流量;并可根据用户的要求配置相应的背景流量模拟要求,实现对背景流量的模拟;用户可以根据需要通过设置数据包发送速率和持续时间来调整网络流量。 展开更多
关键词 windows socketS 网络流量 网络流量产生器
在线阅读 下载PDF
时间敏感列车通信网络:架构设计与性能评估
14
作者 李洪星 姚辰龙 +3 位作者 赵晓宇 赵东 陈立 寿国础 《电信科学》 北大核心 2026年第3期33-43,共11页
为满足列车实时数据协议(train real-time data protocol,TRDP)承载的时间关键型业务对通信确定性的严苛要求,提出一种时间敏感网络(time-sensitive networking,TSN)与TRDP融合的时间敏感列车通信网络方案。该方案通过构建分层的时间敏... 为满足列车实时数据协议(train real-time data protocol,TRDP)承载的时间关键型业务对通信确定性的严苛要求,提出一种时间敏感网络(time-sensitive networking,TSN)与TRDP融合的时间敏感列车通信网络方案。该方案通过构建分层的时间敏感列车通信网络架构,将多样化列车车载应用系统服务需求经过TRDP映射到TSN,并利用TSN的时间同步和流量调度能力保障时间敏感列车业务流量的端到端确定性。基于此架构,设计了基于最早截止时间优先策略的门控列表生成算法,以保障关键流量的可调度性。仿真实验结果表明,该方案显著提升了TRDP周期性数据的发送时间准确性与周期稳定性,并在混合背景流量下大幅降低了端到端时延抖动,为构建下一代高可靠、高效率的列车通信网络提供了理论支撑。 展开更多
关键词 时间敏感网络 列车实时数据协议 流量调度 下一代列车通信网络
在线阅读 下载PDF
基于GAN和元学习的伪装流量生成模型
15
作者 邹元怀 张淑芬 +2 位作者 张祖篡 高瑞 马将 《郑州大学学报(理学版)》 北大核心 2026年第1期35-42,共8页
基于深度学习的恶意流量检测模型容易受到对抗攻击的影响,为了发掘此类模型的安全漏洞并找到提高其鲁棒性的方法,提出一种对抗样本生成模型ReN-GAN。该模型基于生成对抗网络原理,能够根据流量特征自动生成相应伪装流量并利用对抗样本可... 基于深度学习的恶意流量检测模型容易受到对抗攻击的影响,为了发掘此类模型的安全漏洞并找到提高其鲁棒性的方法,提出一种对抗样本生成模型ReN-GAN。该模型基于生成对抗网络原理,能够根据流量特征自动生成相应伪装流量并利用对抗样本可迁移性实现黑盒攻击。通过引入动量迭代方法和添加扰动的约束机制,在保证原始流量功能性的同时提高了伪装流量对抗样本的泛化能力。在训练过程中结合元学习理论进行优化,使得目标集成模型能够更有效地捕捉各模型的共同决策边界,提高了生成对抗样本的可迁移性。实验结果表明,ReN-GAN模型在保持原始流量特性的前提下,生成的对抗样本在黑盒检测模型上的平均逃逸率达到了54.1%,且比其他方法显著缩短了生成时间。此外,在以基于DNN的分类器为攻击目标进行训练时,ReN-GAN模型仅需5次迭代即可生成逃逸率为62%的伪装流量,大幅减少了交互次数。 展开更多
关键词 生成对抗网络 恶意流量 对抗样本 元学习 黑盒攻击
在线阅读 下载PDF
融合生成对抗网络与决策树的信号相位方案智能推荐方法
16
作者 陈纲梅 周勇 +2 位作者 祝佳祥 魏鸿坤 林涛 《城市交通》 2026年第2期48-58,共11页
针对中国城市交叉口信号相位设计普遍依赖常规固定相位与基于专家经验的配置的局限性,突破传统单一算法的局限,提出一种融合生成对抗网络(Generative Adversarial Networks,GAN)与可解释决策树的智能相位优化方法,并构建了“数据扩增—... 针对中国城市交叉口信号相位设计普遍依赖常规固定相位与基于专家经验的配置的局限性,突破传统单一算法的局限,提出一种融合生成对抗网络(Generative Adversarial Networks,GAN)与可解释决策树的智能相位优化方法,并构建了“数据扩增—特征映射—方案推荐”的全流程智能化框架。该方法创新性地将交叉口静态设施条件(车道渠化、几何布局等)与动态流量特征(转向比例、流量波动等)深度耦合,采用基于Gumbel-Softmax改进技术的GAN模型解决交通样本稀缺问题,将实际采集的159组交叉口样本高效扩增至15104组有效训练数据;进而基于分类与回归树模型算法构建承担“特征-相位”映射功能的决策树模型,通过信息增益优化节点分裂策略,实现多维度交通特征与相位方案的精准匹配。在北京市和桐乡市的6个不同类型交叉口的实证应用表明:本算法使优化后交叉口的平均排队长度缩短12.3%,平均停车次数减少11.5%。研究成果为城市道路交叉口动态信号相位优化提供了一种可工程化实践的解决方案。 展开更多
关键词 交通控制 信号相位方案 生成对抗网络(GAN) 决策树 AI与交通协同
在线阅读 下载PDF
Short-term traffic forecasting based on principal component analysis and a generalized regression neural network for satellite networks 被引量:2
17
作者 Liu Ziluan Li Xin 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2018年第1期15-28,36,共15页
With the rapid growth of satellite traffic, the ability to forecast traffic loads becomes vital for improving data transmission efficiency and resource management in satellite networks. To precisely forecast the short... With the rapid growth of satellite traffic, the ability to forecast traffic loads becomes vital for improving data transmission efficiency and resource management in satellite networks. To precisely forecast the short-term traffic loads in satellite networks, a forecasting algorithm based on principal component analysis and a generalized regression neural network (PCA-GRNN) is proposed. The PCA-GRNN algorithm exploits the hidden regularity of satellite networks and fully considers both the temporal and spatial correlations of satellite traffic. Specifically, it selects optimal time series of spatio-temporally correlated historical traffic from satellites as forecasting inputs and applies principal component analysis to reduce the input dimensions while preserving the main features of the data. Then, a generalized regression neural network is utilized to perform the final short-term load forecasting based on the obtained principal components. The PCA-GRNN algorithm is evaluated based on real-world traffic traces, and the results show that the PCA-GRNN method achieves a higher forecasting accuracy, has a shorter training time and is more robust than other state-of-the-art algorithms, even for incomplete traffic datasets. Therefore, the PCA- GRNN algorithm can be regarded as a preferred solution for use in real-time traffic forecasting for realistic satellite networks. 展开更多
关键词 satellite networks traffic load forecasting principal component analysis generalized regression neural network
原文传递
POISSON TRAFFIC PROCESSES IN PURE JUMP MARKOV PROCESSES AND GENERALIZED NETWORKS
18
作者 CAO Chengxuan (School of Management, University of Science and Technology Beijing, Beijing 100083, China) XU Guanghui (Institute of Applied Mathematics, Chinese Academy of Sciences, Beijing 100080, China) 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2001年第4期438-446,共9页
In this paper, we present the conditions under which the traffic processes in a pure jump Markov process with a general state space are Poisson processes, and give a simple proof of PASTA type theorem in Melamed (1982... In this paper, we present the conditions under which the traffic processes in a pure jump Markov process with a general state space are Poisson processes, and give a simple proof of PASTA type theorem in Melamed (1982) and Walrand (1988). Furthermore, we consider a generalized network with phase type negative arrivals and show that the network has a product-form invariant distribution and its traffic processes which represent the customers exiting from the network are Poisson processes. 展开更多
关键词 Dual predictable PROJECTION NEGATIVE ARRIVAL ph-distribution GENERALIZED network traffic process.
原文传递
Deep convolutional generative adversarial networks for traffic data imputation encoding time series as images 被引量:1
19
作者 Tongge Huang Pranamesh Chakraborty Anuj Sharma 《International Journal of Transportation Science and Technology》 2023年第1期1-18,共18页
Sufficient high-quality traffic data are a crucial component of various Intelligent Transportation System (ITS) applications and research related to congestion prediction, speed prediction, incident detection, and oth... Sufficient high-quality traffic data are a crucial component of various Intelligent Transportation System (ITS) applications and research related to congestion prediction, speed prediction, incident detection, and other traffic operation tasks. Nonetheless, missing traffic data are a common issue in sensor data which is inevitable due to several reasons, such as malfunctioning, poor maintenance or calibration, and intermittent communications. Such missing data issues often make data analysis and decision-making complicated and challenging. In this study, we have developed a generative adversarial network (GAN) based traffic sensor data imputation framework (TSDIGAN) to efficiently reconstruct the missing data by generating realistic synthetic data. In recent years, GANs have shown impressive success in image data generation. However, generating traffic data by taking advantage of GAN based modeling is a challenging task, since traffic data have strong time dependency. To address this problem, we propose a novel time-dependent encoding method called the Gramian Angular Summation Field (GASF) that converts the problem of traffic time-series data generation into that of image generation. We have evaluated and tested our proposed model using the benchmark dataset provided by Caltrans Performance Management Systems (PeMS). This study shows that the proposed model can significantly improve the traffic data imputation accuracy in terms of Mean Absolute Error (MAE) and Root Mean Squared Error (RMSE) compared to state-of-the-art models on the benchmark dataset. Further, the model achieves reasonably high accuracy in imputation tasks even under a very high missing data rate (>50%), which shows the robustness and efficiency of the proposed model. 展开更多
关键词 traffic data imputation Generative adversarial networks Realistic data generation Time-dependent encoding Deep convolutional neural networks
在线阅读 下载PDF
基于时间窗口的时间敏感网络流量调度方法 被引量:2
20
作者 李超 李红硕 +2 位作者 董哲 史运涛 李文昊 《电光与控制》 北大核心 2025年第4期77-81,共5页
时间敏感网络是一种新型确定性网络,流量调度作为其核心机制,主要通过门控列表保证时间触发流传输的服务质量。然而,以帧为对象进行门控调度设计时,需要计算每一帧的具体时隙分配,存在计算复杂度过高的问题。为此,针对时隙配置求解复杂... 时间敏感网络是一种新型确定性网络,流量调度作为其核心机制,主要通过门控列表保证时间触发流传输的服务质量。然而,以帧为对象进行门控调度设计时,需要计算每一帧的具体时隙分配,存在计算复杂度过高的问题。为此,针对时隙配置求解复杂的问题,将以帧为调度对象改进为以时间窗口为调度对象,基于时间窗口设计了整数线性规划调度方法,并使用Gurobi优化器得出结果。仿真实验表明:提出的调度方法在保证时间触发流的流量特性基础上有效降低了计算复杂度,与以帧为对象的调度方法相比,端到端总时延降低了约6%,求解时间减少了约41%。 展开更多
关键词 时间敏感网络 流量调度 门控列表 时间窗口 整数线性规划
在线阅读 下载PDF
上一页 1 2 11 下一页 到第
使用帮助 返回顶部