In contemporary medium-voltage distribution networks heavily penetrated by distributed energy resources(DERs),the harmonic components injected by power-electronic interfacing converters,together with the inherently in...In contemporary medium-voltage distribution networks heavily penetrated by distributed energy resources(DERs),the harmonic components injected by power-electronic interfacing converters,together with the inherently intermittent output of renewable generation,distort the zero-sequence current and continuously reshape its frequency spectrum.As a result,single-line-to-ground(SLG)faults exhibit a pronounced,strongly non-stationary behaviour that varies with operating point,load mix and DER dispatch.Under such circumstances the performance of traditional rule-based algorithms—or methods that rely solely on steady-state frequency-domain indicators—degrades sharply,and they no longer satisfy the accuracy and universality required by practical protection systems.To overcome these shortcomings,the present study develops an SLG-fault identification scheme that transforms the zero-sequence currentwaveforminto two-dimensional image representations and processes themwith a convolutional neural network(CNN).First,the causes of sample-distribution imbalance are analysed in detail by considering different neutralgrounding configurations,fault-inception mechanisms and the statistical probability of fault occurrence on each phase.Building on these insights,a discriminator network incorporating a Convolutional Block Attention Module(CBAM)is designed to autonomously extract multi-layer spatial-spectral features,while Gradient-weighted Class Activation Mapping(Grad-CAM)is employed to visualise the contribution of every salient image region,thereby enhancing interpretability.A comprehensive simulation platform is subsequently established for a DER-rich distribution system encompassing several representative topologies,feeder lengths and DER penetration levels.Large numbers of realistic SLG-fault scenarios are generated—including noise and measurement uncertainty—and are used to train,validate and test the proposed model.Extensive simulation campaigns,corroborated by field measurements from an actual utility network,demonstrate that the proposed approach attains an SLG-fault identification accuracy approaching 100 percent and maintains robust performance under severe noise conditions,confirming its suitability for real-world engineering applications.展开更多
The issue of privacy leakage in distributed consensus has garnered significant attention over the years,but existing studies often overlook the challenges posed by limited communication in algorithm design.This paper ...The issue of privacy leakage in distributed consensus has garnered significant attention over the years,but existing studies often overlook the challenges posed by limited communication in algorithm design.This paper addresses the issue of privacy preservation in distributed weighted average consensus under limited communication scenarios.Specifically targeting directed and unbalanced topologies,we propose a privacy-preserving implementation protocol that incorporates the Paillier homomorphic encryption scheme.The protocol encrypts only the 1-bit quantized messages exchanged between agents,thus ensuring both the correctness of the consensus result and the confidentiality of each agent's initial state.To demonstrate the practicality of the proposed method,we carry out numerical simulations that illustrate its ability to reach consensus effectively while ensuring the protection of private information.展开更多
Rational distribution network planning optimizes power flow distribution,reduces grid stress,enhances voltage quality,promotes renewable energy utilization,and reduces costs.This study establishes a distribution netwo...Rational distribution network planning optimizes power flow distribution,reduces grid stress,enhances voltage quality,promotes renewable energy utilization,and reduces costs.This study establishes a distribution network planning model incorporating distributed wind turbines(DWT),distributed photovoltaics(DPV),and energy storage systems(ESS).K-means++is employed to partition the distribution network based on electrical distance.Considering the spatiotemporal correlation of distributed generation(DG)outputs in the same region,a joint output model of DWT and DPV is developed using the Frank-Copula.Due to the model’s high dimensionality,multiple constraints,and mixed-integer characteristics,bilevel programming theory is utilized to structure the model.The model is solved using a mixed-integer particle swarmoptimization algorithm(MIPSO)to determine the optimal location and capacity of DG and ESS integrated into the distribution network to achieve the best economic benefits and operation quality.The proposed bilevel planning method for distribution networks is validated through simulations on the modified IEEE 33-bus system.The results demonstrate significant improvements,with the proposedmethod reducing the annual comprehensive cost by 41.65%and 13.98%,respectively,compared to scenarios without DG and ESS or with only DG integration.Furthermore,it reduces the daily average voltage deviation by 24.35%and 10.24%and daily network losses by 55.72%and 35.71%.展开更多
Dear Editor,This letter focuses on the distributed cooperative regulation problem for a class of networked re-entrant manufacturing systems(RMSs).The networked system is structured with a three-tier architecture:the p...Dear Editor,This letter focuses on the distributed cooperative regulation problem for a class of networked re-entrant manufacturing systems(RMSs).The networked system is structured with a three-tier architecture:the production line,the manufacturing layer and the workshop layer.The dynamics of re-entrant production lines are governed by hyperbolic partial differential equations(PDEs)based on the law of mass conservation.展开更多
Distributed denial of service(DDoS)attacks are common network attacks that primarily target Internet of Things(IoT)devices.They are critical for emerging wireless services,especially for applications with limited late...Distributed denial of service(DDoS)attacks are common network attacks that primarily target Internet of Things(IoT)devices.They are critical for emerging wireless services,especially for applications with limited latency.DDoS attacks pose significant risks to entrepreneurial businesses,preventing legitimate customers from accessing their websites.These attacks require intelligent analytics before processing service requests.Distributed denial of service(DDoS)attacks exploit vulnerabilities in IoT devices by launchingmulti-point distributed attacks.These attacks generate massive traffic that overwhelms the victim’s network,disrupting normal operations.The consequences of distributed denial of service(DDoS)attacks are typically more severe in software-defined networks(SDNs)than in traditional networks.The centralised architecture of these networks can exacerbate existing vulnerabilities,as these weaknesses may not be effectively addressed in this model.The preliminary objective for detecting and mitigating distributed denial of service(DDoS)attacks in software-defined networks(SDN)is to monitor traffic patterns and identify anomalies that indicate distributed denial of service(DDoS)attacks.It implements measures to counter the effects ofDDoS attacks,and ensure network reliability and availability by leveraging the flexibility and programmability of SDN to adaptively respond to threats.The authors present a mechanism that leverages the OpenFlow and sFlow protocols to counter the threats posed by DDoS attacks.The results indicate that the proposed model effectively mitigates the negative effects of DDoS attacks in an SDN environment.展开更多
Optical solitons,as self-sustaining waveforms in a nonlinear medium where dispersion and nonlinear effects are balanced,have key applications in ultrafast laser systems and optical communications.Physics-informed neur...Optical solitons,as self-sustaining waveforms in a nonlinear medium where dispersion and nonlinear effects are balanced,have key applications in ultrafast laser systems and optical communications.Physics-informed neural networks(PINN)provide a new way to solve the nonlinear Schrodinger equation describing the soliton evolution by fusing data-driven and physical constraints.However,the grid point sampling strategy of traditional PINN suffers from high computational complexity and unstable gradient flow,which makes it difficult to capture the physical details efficiently.In this paper,we propose a residual-based adaptive multi-distribution(RAMD)sampling method to optimize the PINN training process by dynamically constructing a multi-modal loss distribution.With a 50%reduction in the number of grid points,RAMD significantly reduces the relative error of PINN and,in particular,optimizes the solution error of the(2+1)Ginzburg–Landau equation from 4.55%to 1.98%.RAMD breaks through the lack of physical constraints in the purely data-driven model by the innovative combination of multi-modal distribution modeling and autonomous sampling control for the design of all-optical communication devices.RAMD provides a high-precision numerical simulation tool for the design of all-optical communication devices,optimization of nonlinear laser devices,and other studies.展开更多
Cloud computing technology provides flexible,on-demand,and completely controlled computing resources and services are highly desirable.Despite this,with its distributed and dynamic nature and shortcomings in virtualiz...Cloud computing technology provides flexible,on-demand,and completely controlled computing resources and services are highly desirable.Despite this,with its distributed and dynamic nature and shortcomings in virtualization deployment,the cloud environment is exposed to a wide variety of cyber-attacks and security difficulties.The Intrusion Detection System(IDS)is a specialized security tool that network professionals use for the safety and security of the networks against attacks launched from various sources.DDoS attacks are becoming more frequent and powerful,and their attack pathways are continually changing,which requiring the development of new detection methods.Here the purpose of the study is to improve detection accuracy.Feature Selection(FS)is critical.At the same time,the IDS’s computational problem is limited by focusing on the most relevant elements,and its performance and accuracy increase.In this research work,the suggested Adaptive butterfly optimization algorithm(ABOA)framework is used to assess the effectiveness of a reduced feature subset during the feature selection phase,that was motivated by this motive Candidates.Accurate classification is not compromised by using an ABOA technique.The design of Deep Neural Networks(DNN)has simplified the categorization of network traffic into normal and DDoS threat traffic.DNN’s parameters can be finetuned to detect DDoS attacks better using specially built algorithms.Reduced reconstruction error,no exploding or vanishing gradients,and reduced network are all benefits of the changes outlined in this paper.When it comes to performance criteria like accuracy,precision,recall,and F1-Score are the performance measures that show the suggested architecture outperforms the other existing approaches.Hence the proposed ABOA+DNN is an excellent method for obtaining accurate predictions,with an improved accuracy rate of 99.05%compared to other existing approaches.展开更多
The exponential stability of a class of neural networks with continuously distributed delays is investigated by employing a novel Lyapunov-Krasovskii functional. Through introducing some free-weighting matrices and th...The exponential stability of a class of neural networks with continuously distributed delays is investigated by employing a novel Lyapunov-Krasovskii functional. Through introducing some free-weighting matrices and the equivalent descriptor form, a delay-dependent stability criterion is established for the addressed systems. The condition is expressed in terms of a linear matrix inequality (LMI), and it can be checked by resorting to the LMI in the Matlab toolbox. In addition, the proposed stability criteria do not require the monotonicity of the activation functions and the derivative of a time-varying delay being less than 1, which generalize and improve earlier methods. Finally, numerical examples are given to show the effectiveness of the obtained methods.展开更多
The impedance characteristics of distributed amplifiers are analyzed based on T-type matching networks, and a distributed power amplifier consisting of three gain cells is proposed. Non-uniform T-type matching network...The impedance characteristics of distributed amplifiers are analyzed based on T-type matching networks, and a distributed power amplifier consisting of three gain cells is proposed. Non-uniform T-type matching networks are adopted to make the impedance of artificial transmission lines connected to the gate and drain change stage by stage gradually, which provides good impedance matching and improves the output power and efficiency. The measurement results show that the amplifier gives an average forward gain of 6 dB from 3 to 16. 5 GHz. In the desired band, the input return loss is typically less than - 9. 5 dB, and the output return loss is better than -8.5 dB. The output power at 1-dB gain compression point is from 3.6 to 10. 6 dBm in the band of 2 to 16 GHz while the power added efficiency (PAE) is from 2% to 12. 5% . The power consumption of the amplifier is 81 mW with a supply of 1.8 V, and the chip area is 0.91 mm × 0.45 mm.展开更多
By combining the distributed Kalman filter (DKF) with the back propagation neural network (BPNN),a novel method is proposed to identify the bias of electrostatic suspended gyroscope (ESG). Firstly,the data sets ...By combining the distributed Kalman filter (DKF) with the back propagation neural network (BPNN),a novel method is proposed to identify the bias of electrostatic suspended gyroscope (ESG). Firstly,the data sets of multi-measurements of the same ESG in different noise environments are "mapped" into a sensor network,and DKF with embedded consensus filters is then used to preprocess the data sets. After transforming the preprocessed results into the trained input and the desired output of neural network,BPNN with the learning rate and the momentum term is further utilized to identify the ESG bias. As demonstrated in the experiment,the proposed approach is effective for the model identification of the ESG bias.展开更多
To meet the bandwidth requirement for the multicasting data flow in ad hoc networks, a distributed on- demand bandwidth-constrained multicast routing (BCMR) protocol for wireless ad hoc networks is proposed. With th...To meet the bandwidth requirement for the multicasting data flow in ad hoc networks, a distributed on- demand bandwidth-constrained multicast routing (BCMR) protocol for wireless ad hoc networks is proposed. With this protocol, the resource reservation table of each node will record the bandwidth requirements of data flows, which access itself, its neighbor nodes and hidden nodes, and every node calculates the remaining available bandwidth by deducting the bandwidth reserved in the resource reservation table from the total available bandwidth of the node. Moreover, the BCMR searches in a distributed manner for the paths with the shortest delay conditioned by the bandwidth constraint. Simulation results demonstrate the good performance of BCMR in terms of packet delivery reliability and the delay. BCMR can meet the requirements of real time communication and can be used in the multicast applications with low mobility in wireless ad hoc networks.展开更多
The characteristic impedances of L-type and T-type networks are first investigated for a distributed amplifier design.The analysis shows that the L-type network has better frequency characteristics than the T-type one...The characteristic impedances of L-type and T-type networks are first investigated for a distributed amplifier design.The analysis shows that the L-type network has better frequency characteristics than the T-type one.A distribution amplifier based on the L-type network is implemented with the 2-μm GaAs HBT(heterojunction-bipolar transistor) process of WIN semiconductors.The measurement result presents excellent bandwidth performance and gives a gain of 5.5 dB with a gain flatness of ±1dB over a frequency range from 3 to 18 GHz.The return losses S11 and S22 are below-10dB in the designed frequency range.The output 1-dB compression point at 5 GHz is 13.3 dBm.The chip area is 0.95 mm2 and the power dissipation is 95 mW under a 3.5 V supply.展开更多
SDN (Software Defined Network) has many security problems, and DDoS attack is undoubtedly the most serious harm to SDN architecture network. How to accurately and effectively detect DDoS attacks has always been a diff...SDN (Software Defined Network) has many security problems, and DDoS attack is undoubtedly the most serious harm to SDN architecture network. How to accurately and effectively detect DDoS attacks has always been a difficult point and focus of SDN security research. Based on the characteristics of SDN, a DDoS attack detection method combining generalized entropy and PSOBP neural network is proposed. The traffic is pre-detected by the generalized entropy method deployed on the switch, and the detection result is divided into normal and abnormal. Locate the switch that issued the abnormal alarm. The controller uses the PSO-BP neural network to detect whether a DDoS attack occurs by further extracting the flow features of the abnormal switch. Experiments show that compared with other methods, the detection accurate rate is guaranteed while the CPU load of the controller is reduced, and the detection capability is better.展开更多
Geographic location of nodes is very useful in a sensor network. Previous localization algorithms assume that there exist some anchor nodes in this kind of network, and then other nodes are estimated to create their c...Geographic location of nodes is very useful in a sensor network. Previous localization algorithms assume that there exist some anchor nodes in this kind of network, and then other nodes are estimated to create their coordinates. Once there are not anchors to be deployed, those localization algorithms will be invalidated. Many papers in this field focus on anchor-based solutions. The use of anchors introduces many limitations, since anchors require external equipments such as global position system, cause additional power consumption. A novel positioning algorithm is proposed to use a virtual coordinate system based on a new concept--virtual anchor. It is executed in a distributed fashion according to the connectivity of a node and the measured distances to its neighbors. Both the adjacent member information and the ranging distance result are combined to generate the estimated position of a network, one of which is independently adopted for localization previously. At the position refinement stage the intermediate estimation of a node begins to be evaluated on its reliability for position mutation; thus the positioning optimization process of the whole network is avoided falling into a local optimal solution. Simulation results prove that the algorithm can resolve the distributed localization problem for anchor-free sensor networks, and is superior to previous methods in terms of its positioning capability under a variety of circumstances.展开更多
Wireless quantum communication networks transfer quantum state by teleportation. Existing research focuses on maximal entangled pairs. In this paper, we analyse the distributed wireless quantum communication networks ...Wireless quantum communication networks transfer quantum state by teleportation. Existing research focuses on maximal entangled pairs. In this paper, we analyse the distributed wireless quantum communication networks with partially entangled pairs. A quantum routing scheme with multi-hop teleportation is proposed. With the proposed scheme, is not necessary for the quantum path to be consistent with the classical path. The quantum path and its associated classical path are established in a distributed way. Direct multi-hop teleportation is conducted on the selected path to transfer a quantum state from the source to the destination. Based on the feature of multi-hop teleportation using partially entangled pairs, if the node number of the quantum path is even, the destination node will add another teleportation at itself. We simulated the performance of distributed wireless quantum communication networks with a partially entangled state. The probability of transferring the quantum state successfully is statistically analyzed. Our work shows that multi-hop teleportation on distributed wireless quantum networks with partially entangled pairs is feasible.展开更多
This paper is concerned with anti-disturbance Nash equilibrium seeking for games with partial information.First,reduced-order disturbance observer-based algorithms are proposed to achieve Nash equilibrium seeking for ...This paper is concerned with anti-disturbance Nash equilibrium seeking for games with partial information.First,reduced-order disturbance observer-based algorithms are proposed to achieve Nash equilibrium seeking for games with firstorder and second-order players,respectively.In the developed algorithms,the observed disturbance values are included in control signals to eliminate the influence of disturbances,based on which a gradient-like optimization method is implemented for each player.Second,a signum function based distributed algorithm is proposed to attenuate disturbances for games with secondorder integrator-type players.To be more specific,a signum function is involved in the proposed seeking strategy to dominate disturbances,based on which the feedback of the velocity-like states and the gradients of the functions associated with players achieves stabilization of system dynamics and optimization of players'objective functions.Through Lyapunov stability analysis,it is proven that the players'actions can approach a small region around the Nash equilibrium by utilizing disturbance observerbased strategies with appropriate control gains.Moreover,exponential(asymptotic)convergence can be achieved when the signum function based control strategy(with an adaptive control gain)is employed.The performance of the proposed algorithms is tested by utilizing an integrated simulation platform of virtual robot experimentation platform(V-REP)and MATLAB.展开更多
The distributed management has become an important tendency of development for the NMS (Network Management System) with the development of Internet. Based on the analysis of CORBA (Conmon Object Request Broker Archite...The distributed management has become an important tendency of development for the NMS (Network Management System) with the development of Internet. Based on the analysis of CORBA (Conmon Object Request Broker Architecture) technique, we mainly discuss about the applicability of the approach by which CORBA combined with Java has been applied to the system model and Web architecture: and address the applied frame and the interface definitions that are the, key technologies for implementing the Distributed Object Computing (DOC). In addition, we also conduct the research on its advantages and disadvantages and further expected improvements. Key words distributed Web network management - CORBA - Java CLC number TP 393.07 Foundation item: Supported by the QTNG (Integrated Network Management System) Project Foundation and QT-NMS (SDH NMS) Project Foundation of Wuhan Qingtian Information Industry Co., LTD of Hubei of China (SDH.001)Biography: WANG Feng (1979-), male Master candidate, research direction: administration of network and software engineering.展开更多
How to recognize targets with similar appearances from remote sensing images(RSIs) effectively and efficiently has become a big challenge. Recently, convolutional neural network(CNN) is preferred in the target classif...How to recognize targets with similar appearances from remote sensing images(RSIs) effectively and efficiently has become a big challenge. Recently, convolutional neural network(CNN) is preferred in the target classification due to the powerful feature representation ability and better performance. However,the training and testing of CNN mainly rely on single machine.Single machine has its natural limitation and bottleneck in processing RSIs due to limited hardware resources and huge time consuming. Besides, overfitting is a challenge for the CNN model due to the unbalance between RSIs data and the model structure.When a model is complex or the training data is relatively small,overfitting occurs and leads to a poor predictive performance. To address these problems, a distributed CNN architecture for RSIs target classification is proposed, which dramatically increases the training speed of CNN and system scalability. It improves the storage ability and processing efficiency of RSIs. Furthermore,Bayesian regularization approach is utilized in order to initialize the weights of the CNN extractor, which increases the robustness and flexibility of the CNN model. It helps prevent the overfitting and avoid the local optima caused by limited RSI training images or the inappropriate CNN structure. In addition, considering the efficiency of the Na¨?ve Bayes classifier, a distributed Na¨?ve Bayes classifier is designed to reduce the training cost. Compared with other algorithms, the proposed system and method perform the best and increase the recognition accuracy. The results show that the distributed system framework and the proposed algorithms are suitable for RSIs target classification tasks.展开更多
The distributed wireless quantum communication network (DWQCN) ha~ a distributed network topology and trans- mits information by quantum states. In this paper, we present the concept of the DWQCN and propose a syste...The distributed wireless quantum communication network (DWQCN) ha~ a distributed network topology and trans- mits information by quantum states. In this paper, we present the concept of the DWQCN and propose a system scheme to transfer quantum states in the DWQCN. The system scheme for transmitting information between any two nodes in the DWQCN includes a routing protocol and a scheme for transferring quantum states. The routing protocol is on-demand and the routing metric is selected based on the number of entangled particle pairs. After setting up a route, quantum tele- portation and entanglement swapping are used for transferring quantum states. Entanglement swapping is achieved along with the process of routing set up and the acknowledgment packet transmission. The measurement results of each entan- glement swapping are piggybacked with route reply packets or acknowledgment packets. After entanglement swapping, a direct quantum link between source and destination is set up and quantum states are transferred by quantum teleportation. Adopting this scheme, the measurement results of entanglement swapping do not need to be transmitted specially, which decreases the wireless transmission cost and transmission delay.展开更多
基金supported by the Science and Technology Program of China Southern Power Grid(031800KC23120003).
文摘In contemporary medium-voltage distribution networks heavily penetrated by distributed energy resources(DERs),the harmonic components injected by power-electronic interfacing converters,together with the inherently intermittent output of renewable generation,distort the zero-sequence current and continuously reshape its frequency spectrum.As a result,single-line-to-ground(SLG)faults exhibit a pronounced,strongly non-stationary behaviour that varies with operating point,load mix and DER dispatch.Under such circumstances the performance of traditional rule-based algorithms—or methods that rely solely on steady-state frequency-domain indicators—degrades sharply,and they no longer satisfy the accuracy and universality required by practical protection systems.To overcome these shortcomings,the present study develops an SLG-fault identification scheme that transforms the zero-sequence currentwaveforminto two-dimensional image representations and processes themwith a convolutional neural network(CNN).First,the causes of sample-distribution imbalance are analysed in detail by considering different neutralgrounding configurations,fault-inception mechanisms and the statistical probability of fault occurrence on each phase.Building on these insights,a discriminator network incorporating a Convolutional Block Attention Module(CBAM)is designed to autonomously extract multi-layer spatial-spectral features,while Gradient-weighted Class Activation Mapping(Grad-CAM)is employed to visualise the contribution of every salient image region,thereby enhancing interpretability.A comprehensive simulation platform is subsequently established for a DER-rich distribution system encompassing several representative topologies,feeder lengths and DER penetration levels.Large numbers of realistic SLG-fault scenarios are generated—including noise and measurement uncertainty—and are used to train,validate and test the proposed model.Extensive simulation campaigns,corroborated by field measurements from an actual utility network,demonstrate that the proposed approach attains an SLG-fault identification accuracy approaching 100 percent and maintains robust performance under severe noise conditions,confirming its suitability for real-world engineering applications.
基金supported by National Natural Science Foundation of China under Grants 62203045,62433020 and T2293770。
文摘The issue of privacy leakage in distributed consensus has garnered significant attention over the years,but existing studies often overlook the challenges posed by limited communication in algorithm design.This paper addresses the issue of privacy preservation in distributed weighted average consensus under limited communication scenarios.Specifically targeting directed and unbalanced topologies,we propose a privacy-preserving implementation protocol that incorporates the Paillier homomorphic encryption scheme.The protocol encrypts only the 1-bit quantized messages exchanged between agents,thus ensuring both the correctness of the consensus result and the confidentiality of each agent's initial state.To demonstrate the practicality of the proposed method,we carry out numerical simulations that illustrate its ability to reach consensus effectively while ensuring the protection of private information.
基金This research was funded by“Chunhui Program”Collaborative Scientific Research Project of the Ministry of Education of the People’s Republic of China(Project No.HZKY20220242)the S&T Program of Hebei(Project No.225676163GH).
文摘Rational distribution network planning optimizes power flow distribution,reduces grid stress,enhances voltage quality,promotes renewable energy utilization,and reduces costs.This study establishes a distribution network planning model incorporating distributed wind turbines(DWT),distributed photovoltaics(DPV),and energy storage systems(ESS).K-means++is employed to partition the distribution network based on electrical distance.Considering the spatiotemporal correlation of distributed generation(DG)outputs in the same region,a joint output model of DWT and DPV is developed using the Frank-Copula.Due to the model’s high dimensionality,multiple constraints,and mixed-integer characteristics,bilevel programming theory is utilized to structure the model.The model is solved using a mixed-integer particle swarmoptimization algorithm(MIPSO)to determine the optimal location and capacity of DG and ESS integrated into the distribution network to achieve the best economic benefits and operation quality.The proposed bilevel planning method for distribution networks is validated through simulations on the modified IEEE 33-bus system.The results demonstrate significant improvements,with the proposedmethod reducing the annual comprehensive cost by 41.65%and 13.98%,respectively,compared to scenarios without DG and ESS or with only DG integration.Furthermore,it reduces the daily average voltage deviation by 24.35%and 10.24%and daily network losses by 55.72%and 35.71%.
文摘Dear Editor,This letter focuses on the distributed cooperative regulation problem for a class of networked re-entrant manufacturing systems(RMSs).The networked system is structured with a three-tier architecture:the production line,the manufacturing layer and the workshop layer.The dynamics of re-entrant production lines are governed by hyperbolic partial differential equations(PDEs)based on the law of mass conservation.
基金supported by the Deanship of Graduate Studies and Scientific Research at Qassim University for financial support(QU-APC-2025).
文摘Distributed denial of service(DDoS)attacks are common network attacks that primarily target Internet of Things(IoT)devices.They are critical for emerging wireless services,especially for applications with limited latency.DDoS attacks pose significant risks to entrepreneurial businesses,preventing legitimate customers from accessing their websites.These attacks require intelligent analytics before processing service requests.Distributed denial of service(DDoS)attacks exploit vulnerabilities in IoT devices by launchingmulti-point distributed attacks.These attacks generate massive traffic that overwhelms the victim’s network,disrupting normal operations.The consequences of distributed denial of service(DDoS)attacks are typically more severe in software-defined networks(SDNs)than in traditional networks.The centralised architecture of these networks can exacerbate existing vulnerabilities,as these weaknesses may not be effectively addressed in this model.The preliminary objective for detecting and mitigating distributed denial of service(DDoS)attacks in software-defined networks(SDN)is to monitor traffic patterns and identify anomalies that indicate distributed denial of service(DDoS)attacks.It implements measures to counter the effects ofDDoS attacks,and ensure network reliability and availability by leveraging the flexibility and programmability of SDN to adaptively respond to threats.The authors present a mechanism that leverages the OpenFlow and sFlow protocols to counter the threats posed by DDoS attacks.The results indicate that the proposed model effectively mitigates the negative effects of DDoS attacks in an SDN environment.
基金supported by the National Key R&D Program of China(Grant No.2022YFA1604200)National Natural Science Foundation of China(Grant No.12261131495)+1 种基金Beijing Municipal Science and Technology Commission,Adminitrative Commission of Zhongguancun Science Park(Grant No.Z231100006623006)Institute of Systems Science,Beijing Wuzi University(Grant No.BWUISS21)。
文摘Optical solitons,as self-sustaining waveforms in a nonlinear medium where dispersion and nonlinear effects are balanced,have key applications in ultrafast laser systems and optical communications.Physics-informed neural networks(PINN)provide a new way to solve the nonlinear Schrodinger equation describing the soliton evolution by fusing data-driven and physical constraints.However,the grid point sampling strategy of traditional PINN suffers from high computational complexity and unstable gradient flow,which makes it difficult to capture the physical details efficiently.In this paper,we propose a residual-based adaptive multi-distribution(RAMD)sampling method to optimize the PINN training process by dynamically constructing a multi-modal loss distribution.With a 50%reduction in the number of grid points,RAMD significantly reduces the relative error of PINN and,in particular,optimizes the solution error of the(2+1)Ginzburg–Landau equation from 4.55%to 1.98%.RAMD breaks through the lack of physical constraints in the purely data-driven model by the innovative combination of multi-modal distribution modeling and autonomous sampling control for the design of all-optical communication devices.RAMD provides a high-precision numerical simulation tool for the design of all-optical communication devices,optimization of nonlinear laser devices,and other studies.
文摘Cloud computing technology provides flexible,on-demand,and completely controlled computing resources and services are highly desirable.Despite this,with its distributed and dynamic nature and shortcomings in virtualization deployment,the cloud environment is exposed to a wide variety of cyber-attacks and security difficulties.The Intrusion Detection System(IDS)is a specialized security tool that network professionals use for the safety and security of the networks against attacks launched from various sources.DDoS attacks are becoming more frequent and powerful,and their attack pathways are continually changing,which requiring the development of new detection methods.Here the purpose of the study is to improve detection accuracy.Feature Selection(FS)is critical.At the same time,the IDS’s computational problem is limited by focusing on the most relevant elements,and its performance and accuracy increase.In this research work,the suggested Adaptive butterfly optimization algorithm(ABOA)framework is used to assess the effectiveness of a reduced feature subset during the feature selection phase,that was motivated by this motive Candidates.Accurate classification is not compromised by using an ABOA technique.The design of Deep Neural Networks(DNN)has simplified the categorization of network traffic into normal and DDoS threat traffic.DNN’s parameters can be finetuned to detect DDoS attacks better using specially built algorithms.Reduced reconstruction error,no exploding or vanishing gradients,and reduced network are all benefits of the changes outlined in this paper.When it comes to performance criteria like accuracy,precision,recall,and F1-Score are the performance measures that show the suggested architecture outperforms the other existing approaches.Hence the proposed ABOA+DNN is an excellent method for obtaining accurate predictions,with an improved accuracy rate of 99.05%compared to other existing approaches.
基金The National Natural Science Foundation of China (No60574006)
文摘The exponential stability of a class of neural networks with continuously distributed delays is investigated by employing a novel Lyapunov-Krasovskii functional. Through introducing some free-weighting matrices and the equivalent descriptor form, a delay-dependent stability criterion is established for the addressed systems. The condition is expressed in terms of a linear matrix inequality (LMI), and it can be checked by resorting to the LMI in the Matlab toolbox. In addition, the proposed stability criteria do not require the monotonicity of the activation functions and the derivative of a time-varying delay being less than 1, which generalize and improve earlier methods. Finally, numerical examples are given to show the effectiveness of the obtained methods.
基金The National Natural Science Foundation of China(No.61106021)the Postdoctoral Science Foundation of China(No.2015M582541)+1 种基金the Natural Science Foundation of Higher Education Institutions of Jiangsu Province(No.15KJB510020)the Research Fund of Nanjing University of Posts and Telecommunications(No.NY215140,No.NY215167)
文摘The impedance characteristics of distributed amplifiers are analyzed based on T-type matching networks, and a distributed power amplifier consisting of three gain cells is proposed. Non-uniform T-type matching networks are adopted to make the impedance of artificial transmission lines connected to the gate and drain change stage by stage gradually, which provides good impedance matching and improves the output power and efficiency. The measurement results show that the amplifier gives an average forward gain of 6 dB from 3 to 16. 5 GHz. In the desired band, the input return loss is typically less than - 9. 5 dB, and the output return loss is better than -8.5 dB. The output power at 1-dB gain compression point is from 3.6 to 10. 6 dBm in the band of 2 to 16 GHz while the power added efficiency (PAE) is from 2% to 12. 5% . The power consumption of the amplifier is 81 mW with a supply of 1.8 V, and the chip area is 0.91 mm × 0.45 mm.
文摘By combining the distributed Kalman filter (DKF) with the back propagation neural network (BPNN),a novel method is proposed to identify the bias of electrostatic suspended gyroscope (ESG). Firstly,the data sets of multi-measurements of the same ESG in different noise environments are "mapped" into a sensor network,and DKF with embedded consensus filters is then used to preprocess the data sets. After transforming the preprocessed results into the trained input and the desired output of neural network,BPNN with the learning rate and the momentum term is further utilized to identify the ESG bias. As demonstrated in the experiment,the proposed approach is effective for the model identification of the ESG bias.
基金The Natural Science Foundation of Zhejiang Province(No.Y1090232)
文摘To meet the bandwidth requirement for the multicasting data flow in ad hoc networks, a distributed on- demand bandwidth-constrained multicast routing (BCMR) protocol for wireless ad hoc networks is proposed. With this protocol, the resource reservation table of each node will record the bandwidth requirements of data flows, which access itself, its neighbor nodes and hidden nodes, and every node calculates the remaining available bandwidth by deducting the bandwidth reserved in the resource reservation table from the total available bandwidth of the node. Moreover, the BCMR searches in a distributed manner for the paths with the shortest delay conditioned by the bandwidth constraint. Simulation results demonstrate the good performance of BCMR in terms of packet delivery reliability and the delay. BCMR can meet the requirements of real time communication and can be used in the multicast applications with low mobility in wireless ad hoc networks.
基金China Postdoctoral Science Foundation (No.20090461048)Postdoctoral Science Foundation of Jiangsu Province (No.0901022C)Postdoctoral Science Foundation of Southeast University
文摘The characteristic impedances of L-type and T-type networks are first investigated for a distributed amplifier design.The analysis shows that the L-type network has better frequency characteristics than the T-type one.A distribution amplifier based on the L-type network is implemented with the 2-μm GaAs HBT(heterojunction-bipolar transistor) process of WIN semiconductors.The measurement result presents excellent bandwidth performance and gives a gain of 5.5 dB with a gain flatness of ±1dB over a frequency range from 3 to 18 GHz.The return losses S11 and S22 are below-10dB in the designed frequency range.The output 1-dB compression point at 5 GHz is 13.3 dBm.The chip area is 0.95 mm2 and the power dissipation is 95 mW under a 3.5 V supply.
基金supported by the Hebei Province Innovation Capacity Improvement Program of China under Grant No.179676278Dthe Ministry of Education Fund Project of China under Grant No.2017A20004
文摘SDN (Software Defined Network) has many security problems, and DDoS attack is undoubtedly the most serious harm to SDN architecture network. How to accurately and effectively detect DDoS attacks has always been a difficult point and focus of SDN security research. Based on the characteristics of SDN, a DDoS attack detection method combining generalized entropy and PSOBP neural network is proposed. The traffic is pre-detected by the generalized entropy method deployed on the switch, and the detection result is divided into normal and abnormal. Locate the switch that issued the abnormal alarm. The controller uses the PSO-BP neural network to detect whether a DDoS attack occurs by further extracting the flow features of the abnormal switch. Experiments show that compared with other methods, the detection accurate rate is guaranteed while the CPU load of the controller is reduced, and the detection capability is better.
基金the National Natural Science Foundation of China (60673054, 60773129)theExcellent Youth Science and Technology Foundation of Anhui Province of China.
文摘Geographic location of nodes is very useful in a sensor network. Previous localization algorithms assume that there exist some anchor nodes in this kind of network, and then other nodes are estimated to create their coordinates. Once there are not anchors to be deployed, those localization algorithms will be invalidated. Many papers in this field focus on anchor-based solutions. The use of anchors introduces many limitations, since anchors require external equipments such as global position system, cause additional power consumption. A novel positioning algorithm is proposed to use a virtual coordinate system based on a new concept--virtual anchor. It is executed in a distributed fashion according to the connectivity of a node and the measured distances to its neighbors. Both the adjacent member information and the ranging distance result are combined to generate the estimated position of a network, one of which is independently adopted for localization previously. At the position refinement stage the intermediate estimation of a node begins to be evaluated on its reliability for position mutation; thus the positioning optimization process of the whole network is avoided falling into a local optimal solution. Simulation results prove that the algorithm can resolve the distributed localization problem for anchor-free sensor networks, and is superior to previous methods in terms of its positioning capability under a variety of circumstances.
基金Project supported by the Science Fund for Creative Research Groups of the National Natural Science Foundation of China (Grant No. 60921063) and the National High Technology Research and Development Program of China (Grant No. 2013AA013601).
文摘Wireless quantum communication networks transfer quantum state by teleportation. Existing research focuses on maximal entangled pairs. In this paper, we analyse the distributed wireless quantum communication networks with partially entangled pairs. A quantum routing scheme with multi-hop teleportation is proposed. With the proposed scheme, is not necessary for the quantum path to be consistent with the classical path. The quantum path and its associated classical path are established in a distributed way. Direct multi-hop teleportation is conducted on the selected path to transfer a quantum state from the source to the destination. Based on the feature of multi-hop teleportation using partially entangled pairs, if the node number of the quantum path is even, the destination node will add another teleportation at itself. We simulated the performance of distributed wireless quantum communication networks with a partially entangled state. The probability of transferring the quantum state successfully is statistically analyzed. Our work shows that multi-hop teleportation on distributed wireless quantum networks with partially entangled pairs is feasible.
基金supported by the National Natural Science Foundation of China(NSFC)(62222308,62173181,62073171,62221004)the Natural Science Foundation of Jiangsu Province(BK20200744,BK20220139)+3 种基金Jiangsu Specially-Appointed Professor(RK043STP19001)1311 Talent Plan of Nanjing University of Posts and Telecommunicationsthe Young Elite Scientists SponsorshipProgram by CAST(2021QNRC001)the Fundamental Research Funds for the Central Universities(30920032203)。
文摘This paper is concerned with anti-disturbance Nash equilibrium seeking for games with partial information.First,reduced-order disturbance observer-based algorithms are proposed to achieve Nash equilibrium seeking for games with firstorder and second-order players,respectively.In the developed algorithms,the observed disturbance values are included in control signals to eliminate the influence of disturbances,based on which a gradient-like optimization method is implemented for each player.Second,a signum function based distributed algorithm is proposed to attenuate disturbances for games with secondorder integrator-type players.To be more specific,a signum function is involved in the proposed seeking strategy to dominate disturbances,based on which the feedback of the velocity-like states and the gradients of the functions associated with players achieves stabilization of system dynamics and optimization of players'objective functions.Through Lyapunov stability analysis,it is proven that the players'actions can approach a small region around the Nash equilibrium by utilizing disturbance observerbased strategies with appropriate control gains.Moreover,exponential(asymptotic)convergence can be achieved when the signum function based control strategy(with an adaptive control gain)is employed.The performance of the proposed algorithms is tested by utilizing an integrated simulation platform of virtual robot experimentation platform(V-REP)and MATLAB.
文摘The distributed management has become an important tendency of development for the NMS (Network Management System) with the development of Internet. Based on the analysis of CORBA (Conmon Object Request Broker Architecture) technique, we mainly discuss about the applicability of the approach by which CORBA combined with Java has been applied to the system model and Web architecture: and address the applied frame and the interface definitions that are the, key technologies for implementing the Distributed Object Computing (DOC). In addition, we also conduct the research on its advantages and disadvantages and further expected improvements. Key words distributed Web network management - CORBA - Java CLC number TP 393.07 Foundation item: Supported by the QTNG (Integrated Network Management System) Project Foundation and QT-NMS (SDH NMS) Project Foundation of Wuhan Qingtian Information Industry Co., LTD of Hubei of China (SDH.001)Biography: WANG Feng (1979-), male Master candidate, research direction: administration of network and software engineering.
基金supported by the National Natural Science Foundation of China(U1435220)
文摘How to recognize targets with similar appearances from remote sensing images(RSIs) effectively and efficiently has become a big challenge. Recently, convolutional neural network(CNN) is preferred in the target classification due to the powerful feature representation ability and better performance. However,the training and testing of CNN mainly rely on single machine.Single machine has its natural limitation and bottleneck in processing RSIs due to limited hardware resources and huge time consuming. Besides, overfitting is a challenge for the CNN model due to the unbalance between RSIs data and the model structure.When a model is complex or the training data is relatively small,overfitting occurs and leads to a poor predictive performance. To address these problems, a distributed CNN architecture for RSIs target classification is proposed, which dramatically increases the training speed of CNN and system scalability. It improves the storage ability and processing efficiency of RSIs. Furthermore,Bayesian regularization approach is utilized in order to initialize the weights of the CNN extractor, which increases the robustness and flexibility of the CNN model. It helps prevent the overfitting and avoid the local optima caused by limited RSI training images or the inappropriate CNN structure. In addition, considering the efficiency of the Na¨?ve Bayes classifier, a distributed Na¨?ve Bayes classifier is designed to reduce the training cost. Compared with other algorithms, the proposed system and method perform the best and increase the recognition accuracy. The results show that the distributed system framework and the proposed algorithms are suitable for RSIs target classification tasks.
基金supported by the Science Fund for Creative Research Groups of the National Natural Science Foundation of China (Grant No. 60921063)the Young Scientists Fund of the National Natural Science Foundation of China (Grant No. 60902010)
文摘The distributed wireless quantum communication network (DWQCN) ha~ a distributed network topology and trans- mits information by quantum states. In this paper, we present the concept of the DWQCN and propose a system scheme to transfer quantum states in the DWQCN. The system scheme for transmitting information between any two nodes in the DWQCN includes a routing protocol and a scheme for transferring quantum states. The routing protocol is on-demand and the routing metric is selected based on the number of entangled particle pairs. After setting up a route, quantum tele- portation and entanglement swapping are used for transferring quantum states. Entanglement swapping is achieved along with the process of routing set up and the acknowledgment packet transmission. The measurement results of each entan- glement swapping are piggybacked with route reply packets or acknowledgment packets. After entanglement swapping, a direct quantum link between source and destination is set up and quantum states are transferred by quantum teleportation. Adopting this scheme, the measurement results of entanglement swapping do not need to be transmitted specially, which decreases the wireless transmission cost and transmission delay.