期刊文献+
共找到33,993篇文章
< 1 2 250 >
每页显示 20 50 100
A Comprehensive Evaluation of Distributed Learning Frameworks in AI-Driven Network Intrusion Detection
1
作者 Sooyong Jeong Cheolhee Park +1 位作者 Dowon Hong Changho Seo 《Computers, Materials & Continua》 2026年第4期310-332,共23页
With the growing complexity and decentralization of network systems,the attack surface has expanded,which has led to greater concerns over network threats.In this context,artificial intelligence(AI)-based network intr... With the growing complexity and decentralization of network systems,the attack surface has expanded,which has led to greater concerns over network threats.In this context,artificial intelligence(AI)-based network intrusion detection systems(NIDS)have been extensively studied,and recent efforts have shifted toward integrating distributed learning to enable intelligent and scalable detection mechanisms.However,most existing works focus on individual distributed learning frameworks,and there is a lack of systematic evaluations that compare different algorithms under consistent conditions.In this paper,we present a comprehensive evaluation of representative distributed learning frameworks—Federated Learning(FL),Split Learning(SL),hybrid collaborative learning(SFL),and fully distributed learning—in the context of AI-driven NIDS.Using recent benchmark intrusion detection datasets,a unified model backbone,and controlled distributed scenarios,we assess these frameworks across multiple criteria,including detection performance,communication cost,computational efficiency,and convergence behavior.Our findings highlight distinct trade-offs among the distributed learning frameworks,demonstrating that the optimal choice depends strongly on systemconstraints such as bandwidth availability,node resources,and data distribution.This work provides the first holistic analysis of distributed learning approaches for AI-driven NIDS and offers practical guidelines for designing secure and efficient intrusion detection systems in decentralized environments. 展开更多
关键词 network intrusion detection network security distributed learning
在线阅读 下载PDF
Single-Phase Grounding Fault Identification in Distribution Networks with Distributed Generation Considering Class Imbalance across Different Network Topologies
2
作者 Lei Han Wanyu Ye +4 位作者 Chunfang Liu Shihua Huang Chun Chen Luxin Zhan Siyuan Liang 《Energy Engineering》 2025年第12期4947-4969,共23页
In contemporary medium-voltage distribution networks heavily penetrated by distributed energy resources(DERs),the harmonic components injected by power-electronic interfacing converters,together with the inherently in... In contemporary medium-voltage distribution networks heavily penetrated by distributed energy resources(DERs),the harmonic components injected by power-electronic interfacing converters,together with the inherently intermittent output of renewable generation,distort the zero-sequence current and continuously reshape its frequency spectrum.As a result,single-line-to-ground(SLG)faults exhibit a pronounced,strongly non-stationary behaviour that varies with operating point,load mix and DER dispatch.Under such circumstances the performance of traditional rule-based algorithms—or methods that rely solely on steady-state frequency-domain indicators—degrades sharply,and they no longer satisfy the accuracy and universality required by practical protection systems.To overcome these shortcomings,the present study develops an SLG-fault identification scheme that transforms the zero-sequence currentwaveforminto two-dimensional image representations and processes themwith a convolutional neural network(CNN).First,the causes of sample-distribution imbalance are analysed in detail by considering different neutralgrounding configurations,fault-inception mechanisms and the statistical probability of fault occurrence on each phase.Building on these insights,a discriminator network incorporating a Convolutional Block Attention Module(CBAM)is designed to autonomously extract multi-layer spatial-spectral features,while Gradient-weighted Class Activation Mapping(Grad-CAM)is employed to visualise the contribution of every salient image region,thereby enhancing interpretability.A comprehensive simulation platform is subsequently established for a DER-rich distribution system encompassing several representative topologies,feeder lengths and DER penetration levels.Large numbers of realistic SLG-fault scenarios are generated—including noise and measurement uncertainty—and are used to train,validate and test the proposed model.Extensive simulation campaigns,corroborated by field measurements from an actual utility network,demonstrate that the proposed approach attains an SLG-fault identification accuracy approaching 100 percent and maintains robust performance under severe noise conditions,confirming its suitability for real-world engineering applications. 展开更多
关键词 Distribution network single-phase grounding fault distribution generation class imbalance sample CNN
在线阅读 下载PDF
Privacy-preserving distributed consensus over directed networks with limited communication
3
作者 Yang Song Jian Guo Jimin Wang 《Journal of Automation and Intelligence》 2025年第4期291-298,共8页
The issue of privacy leakage in distributed consensus has garnered significant attention over the years,but existing studies often overlook the challenges posed by limited communication in algorithm design.This paper ... The issue of privacy leakage in distributed consensus has garnered significant attention over the years,but existing studies often overlook the challenges posed by limited communication in algorithm design.This paper addresses the issue of privacy preservation in distributed weighted average consensus under limited communication scenarios.Specifically targeting directed and unbalanced topologies,we propose a privacy-preserving implementation protocol that incorporates the Paillier homomorphic encryption scheme.The protocol encrypts only the 1-bit quantized messages exchanged between agents,thus ensuring both the correctness of the consensus result and the confidentiality of each agent's initial state.To demonstrate the practicality of the proposed method,we carry out numerical simulations that illustrate its ability to reach consensus effectively while ensuring the protection of private information. 展开更多
关键词 distributed consensus Privacy preservation QUANTIZATION Paillier cryptosystem Directed network
在线阅读 下载PDF
Bilevel Planning of Distribution Networks with Distributed Generation and Energy Storage: A Case Study on the Modified IEEE 33-Bus System
4
作者 Haoyuan Li Lingling Li 《Energy Engineering》 2025年第4期1337-1358,共22页
Rational distribution network planning optimizes power flow distribution,reduces grid stress,enhances voltage quality,promotes renewable energy utilization,and reduces costs.This study establishes a distribution netwo... Rational distribution network planning optimizes power flow distribution,reduces grid stress,enhances voltage quality,promotes renewable energy utilization,and reduces costs.This study establishes a distribution network planning model incorporating distributed wind turbines(DWT),distributed photovoltaics(DPV),and energy storage systems(ESS).K-means++is employed to partition the distribution network based on electrical distance.Considering the spatiotemporal correlation of distributed generation(DG)outputs in the same region,a joint output model of DWT and DPV is developed using the Frank-Copula.Due to the model’s high dimensionality,multiple constraints,and mixed-integer characteristics,bilevel programming theory is utilized to structure the model.The model is solved using a mixed-integer particle swarmoptimization algorithm(MIPSO)to determine the optimal location and capacity of DG and ESS integrated into the distribution network to achieve the best economic benefits and operation quality.The proposed bilevel planning method for distribution networks is validated through simulations on the modified IEEE 33-bus system.The results demonstrate significant improvements,with the proposedmethod reducing the annual comprehensive cost by 41.65%and 13.98%,respectively,compared to scenarios without DG and ESS or with only DG integration.Furthermore,it reduces the daily average voltage deviation by 24.35%and 10.24%and daily network losses by 55.72%and 35.71%. 展开更多
关键词 Distribution network planning frank-copula joint output model bilevel programming theory
在线阅读 下载PDF
Distributed Cooperative Regulation for Networked Re-Entrant Manufacturing Systems
5
作者 Chenguang Liu Qing Gao +1 位作者 Wei Wang Jinhu Lü 《IEEE/CAA Journal of Automatica Sinica》 2025年第3期636-638,共3页
Dear Editor,This letter focuses on the distributed cooperative regulation problem for a class of networked re-entrant manufacturing systems(RMSs).The networked system is structured with a three-tier architecture:the p... Dear Editor,This letter focuses on the distributed cooperative regulation problem for a class of networked re-entrant manufacturing systems(RMSs).The networked system is structured with a three-tier architecture:the production line,the manufacturing layer and the workshop layer.The dynamics of re-entrant production lines are governed by hyperbolic partial differential equations(PDEs)based on the law of mass conservation. 展开更多
关键词 production line networked re entrant manufacturing systems three tier architecture production linethe distributed cooperative regulation hyperbolic partial differential equations pdes based distributed cooperative regulation problem manufacturing layer
在线阅读 下载PDF
A Recursive Method to Encryption-Decryption-Based Distributed Set-Membership Filtering for Time-Varying Saturated Systems Over Sensor Networks
6
作者 Jun Hu Jiaxing Li +2 位作者 Chaoqing Jia Xiaojian Yi Hongjian Liu 《IEEE/CAA Journal of Automatica Sinica》 2025年第5期1047-1049,共3页
Dear Editor,This letter deals with the distributed recursive set-membership filtering(DRSMF)issue for state-saturated systems under encryption-decryption mechanism.To guarantee the data security,the encryption-decrypt... Dear Editor,This letter deals with the distributed recursive set-membership filtering(DRSMF)issue for state-saturated systems under encryption-decryption mechanism.To guarantee the data security,the encryption-decryption mechanism is considered in the signal transmission process.Specifically,a novel DRSMF scheme is developed such that,for both state saturation and encryption-decryption mechanism,the filtering error(FE)is limited to the ellipsoid domain.Then,the filtering error constraint matrix(FECM)is computed and a desirable filter gain is derived by minimizing the FECM.Besides,the bound-edness evaluation of the FECM is provided. 展开更多
关键词 time varying saturated systems signal transmission processspecificallya encryption decryption mechanism sensor networks recursive method distributed set membership filtering
在线阅读 下载PDF
Detecting and Mitigating Distributed Denial of Service Attacks in Software-Defined Networking
7
作者 Abdullah M.Alnajim Faisal Mohammed Alotaibi Sheroz Khan 《Computers, Materials & Continua》 2025年第6期4515-4535,共21页
Distributed denial of service(DDoS)attacks are common network attacks that primarily target Internet of Things(IoT)devices.They are critical for emerging wireless services,especially for applications with limited late... Distributed denial of service(DDoS)attacks are common network attacks that primarily target Internet of Things(IoT)devices.They are critical for emerging wireless services,especially for applications with limited latency.DDoS attacks pose significant risks to entrepreneurial businesses,preventing legitimate customers from accessing their websites.These attacks require intelligent analytics before processing service requests.Distributed denial of service(DDoS)attacks exploit vulnerabilities in IoT devices by launchingmulti-point distributed attacks.These attacks generate massive traffic that overwhelms the victim’s network,disrupting normal operations.The consequences of distributed denial of service(DDoS)attacks are typically more severe in software-defined networks(SDNs)than in traditional networks.The centralised architecture of these networks can exacerbate existing vulnerabilities,as these weaknesses may not be effectively addressed in this model.The preliminary objective for detecting and mitigating distributed denial of service(DDoS)attacks in software-defined networks(SDN)is to monitor traffic patterns and identify anomalies that indicate distributed denial of service(DDoS)attacks.It implements measures to counter the effects ofDDoS attacks,and ensure network reliability and availability by leveraging the flexibility and programmability of SDN to adaptively respond to threats.The authors present a mechanism that leverages the OpenFlow and sFlow protocols to counter the threats posed by DDoS attacks.The results indicate that the proposed model effectively mitigates the negative effects of DDoS attacks in an SDN environment. 展开更多
关键词 Software-defined networking(Sdn) distributed denial of service(DDoS)attack sampling Flow(sFlow) OpenFlow OpenDaylight controller
在线阅读 下载PDF
Analysis of DC Aging Characteristics of Stable ZnO Varistors Based on Voronoi Network and Finite Element Simulation Model
8
作者 ZHANG Ping LU Mingtai +1 位作者 LU Tiantian YUE Yinghu 《材料导报》 北大核心 2026年第2期20-28,共9页
In modern ZnO varistors,traditional aging mechanisms based on increased power consumption are no longer relevant due to reduced power consumption during DC aging.Prolonged exposure to both AC and DC voltages results i... In modern ZnO varistors,traditional aging mechanisms based on increased power consumption are no longer relevant due to reduced power consumption during DC aging.Prolonged exposure to both AC and DC voltages results in increased leakage current,decreased breakdown voltage,and lower nonlinearity,ultimately compromising their protective performance.To investigate the evolution in electrical properties during DC aging,this work developed a finite element model based on Voronoi networks and conducted accelerated aging tests on commercial varistors.Throughout the aging process,current-voltage characteristics and Schottky barrier parameters were measured and analyzed.The results indicate that when subjected to constant voltage,current flows through regions with larger grain sizes,forming discharge channels.As aging progresses,the current focus increases on these channels,leading to a decline in the varistor’s overall performance.Furthermore,analysis of the Schottky barrier parameters shows that the changes in electrical performance during aging are non-monotonic.These findings offer theoretical support for understanding the aging mechanisms and condition assessment of modern stable ZnO varistors. 展开更多
关键词 ZnO varistors Voronoi network DC aging finite element method(FEM) current distribution double Schottky barrier theory
在线阅读 下载PDF
Multi-Distributed Sampling Method to Optimize Physical-Informed Neural Networks for Solving Optical Solitons
9
作者 Huasen Zhou Zhiyang Zhang +2 位作者 Muwei Liu Fenghua Qi Wenjun Liu 《Chinese Physics Letters》 2025年第7期1-9,共9页
Optical solitons,as self-sustaining waveforms in a nonlinear medium where dispersion and nonlinear effects are balanced,have key applications in ultrafast laser systems and optical communications.Physics-informed neur... Optical solitons,as self-sustaining waveforms in a nonlinear medium where dispersion and nonlinear effects are balanced,have key applications in ultrafast laser systems and optical communications.Physics-informed neural networks(PINN)provide a new way to solve the nonlinear Schrodinger equation describing the soliton evolution by fusing data-driven and physical constraints.However,the grid point sampling strategy of traditional PINN suffers from high computational complexity and unstable gradient flow,which makes it difficult to capture the physical details efficiently.In this paper,we propose a residual-based adaptive multi-distribution(RAMD)sampling method to optimize the PINN training process by dynamically constructing a multi-modal loss distribution.With a 50%reduction in the number of grid points,RAMD significantly reduces the relative error of PINN and,in particular,optimizes the solution error of the(2+1)Ginzburg–Landau equation from 4.55%to 1.98%.RAMD breaks through the lack of physical constraints in the purely data-driven model by the innovative combination of multi-modal distribution modeling and autonomous sampling control for the design of all-optical communication devices.RAMD provides a high-precision numerical simulation tool for the design of all-optical communication devices,optimization of nonlinear laser devices,and other studies. 展开更多
关键词 multi distributed sampling nonlinear schrodinger equation describing soliton evolution residual based adaptive grid point sampling strategy optical solitonsas optical communicationsphysics informed physical informed neural networks ultrafast laser systems
原文传递
Adaptive Butterfly Optimization Algorithm(ABOA)Based Feature Selection and Deep Neural Network(DNN)for Detection of Distributed Denial-of-Service(DDoS)Attacks in Cloud
10
作者 S.Sureshkumar G.K.D.Prasanna Venkatesan R.Santhosh 《Computer Systems Science & Engineering》 SCIE EI 2023年第10期1109-1123,共15页
Cloud computing technology provides flexible,on-demand,and completely controlled computing resources and services are highly desirable.Despite this,with its distributed and dynamic nature and shortcomings in virtualiz... Cloud computing technology provides flexible,on-demand,and completely controlled computing resources and services are highly desirable.Despite this,with its distributed and dynamic nature and shortcomings in virtualization deployment,the cloud environment is exposed to a wide variety of cyber-attacks and security difficulties.The Intrusion Detection System(IDS)is a specialized security tool that network professionals use for the safety and security of the networks against attacks launched from various sources.DDoS attacks are becoming more frequent and powerful,and their attack pathways are continually changing,which requiring the development of new detection methods.Here the purpose of the study is to improve detection accuracy.Feature Selection(FS)is critical.At the same time,the IDS’s computational problem is limited by focusing on the most relevant elements,and its performance and accuracy increase.In this research work,the suggested Adaptive butterfly optimization algorithm(ABOA)framework is used to assess the effectiveness of a reduced feature subset during the feature selection phase,that was motivated by this motive Candidates.Accurate classification is not compromised by using an ABOA technique.The design of Deep Neural Networks(DNN)has simplified the categorization of network traffic into normal and DDoS threat traffic.DNN’s parameters can be finetuned to detect DDoS attacks better using specially built algorithms.Reduced reconstruction error,no exploding or vanishing gradients,and reduced network are all benefits of the changes outlined in this paper.When it comes to performance criteria like accuracy,precision,recall,and F1-Score are the performance measures that show the suggested architecture outperforms the other existing approaches.Hence the proposed ABOA+DNN is an excellent method for obtaining accurate predictions,with an improved accuracy rate of 99.05%compared to other existing approaches. 展开更多
关键词 Cloud computing distributed denial of service intrusion detection system adaptive butterfly optimization algorithm deep neural network
在线阅读 下载PDF
Fully distributed edge-based adaptive Nash equilibrium seeking with input constraints
11
作者 Shengli DU Shuo LI +2 位作者 Tianli XU Honggui HAN Junfei QIAO 《Science China(Technological Sciences)》 2026年第3期214-224,共11页
The present study investigates the quest for a fully distributed Nash equilibrium(NE) in networked non-cooperative games, with particular emphasis on actuator limitations. Existing distributed NE seeking approaches of... The present study investigates the quest for a fully distributed Nash equilibrium(NE) in networked non-cooperative games, with particular emphasis on actuator limitations. Existing distributed NE seeking approaches often overlook practical input constraints or rely on centralized information. To address these issues, a novel edge-based double-layer adaptive control framework is proposed. Specifically, adaptive scaling parameters are embedded into the edge weights of the communication graph, enabling a fully distributed scheme that avoids dependence on centralized or global knowledge. Every participant modifies its strategy by exclusively utilizing local information and communicating with its neighbors to iteratively approach the NE. By incorporating damping terms into the design of the adaptive parameters, the proposed approach effectively suppresses unbounded parameter growth and consequently guarantees the boundedness of the adaptive gains. In addition, to account for actuator saturation, the proposed distributed NE seeking approach incorporates a saturation function, which ensures that control inputs do not exceed allowable ranges. A rigorous Lyapunov-based analysis guarantees the convergence and boundedness of all system variables. Finally, the presentation of simulation results aims to validate the efficacy and theoretical soundness of the proposed approach. 展开更多
关键词 distributed NE seeking networked games bounded control input double-layer adaptive law
原文传递
Dual Layer Source Grid Load Storage Collaborative Planning Model Based on Benders Decomposition: Distribution Network Optimization Considering Low-Carbon and Economy
12
作者 Jun Guo Maoyuan Chen +2 位作者 Yuyang Li Sibo Feng Guangyu Fu 《Energy Engineering》 2026年第2期104-133,共30页
Theauthor proposes a dual layer source grid load storage collaborative planning model based on Benders decomposition to optimize the low-carbon and economic performance of the distribution network.The model plans the ... Theauthor proposes a dual layer source grid load storage collaborative planning model based on Benders decomposition to optimize the low-carbon and economic performance of the distribution network.The model plans the configuration of photovoltaic(3.8 MW),wind power(2.5 MW),energy storage(2.2 MWh),and SVC(1.2 Mvar)through interaction between upper and lower layers,and modifies lines 2–3,8–9,etc.to improve transmission capacity and voltage stability.The author uses normal distribution and Monte Carlo method to model load uncertainty,and combines Weibull distribution to describe wind speed characteristics.Compared to the traditional three-layer model(TLM),Benders decomposition-based two-layer model(BLBD)has a 58.1%reduction in convergence time(5.36 vs.12.78 h),a 51.1%reduction in iteration times(23 vs.47 times),a 8.07%reduction in total cost(12.436 vs.13.528 million yuan),and a 9.62%reduction in carbon emissions(12,456 vs.13,782 t).After optimization,the peak valley difference decreased from4.1 to 2.9MW,the renewable energy consumption rate reached 93.4%,and the energy storage efficiency was 87.6%.Themodel has been validated in the IEEE 33 node system,demonstrating its superiority in terms of economy,low-carbon,and reliability. 展开更多
关键词 Benders decomposition source grid load storage distribution network planning low-carbon economy optimization model
在线阅读 下载PDF
Optimal Dispatch of Urban Distribution Networks Considering Virtual Power Plant Coordination under Extreme Scenarios
13
作者 Yong Li Yuxuan Chen +4 位作者 Jiahui He Guowei He Chenxi Dai Jingjing Tong Wenting Lei 《Energy Engineering》 2026年第1期204-220,共17页
Ensuring reliable power supply in urban distribution networks is a complex and critical task.To address the increased demand during extreme scenarios,this paper proposes an optimal dispatch strategy that considers the... Ensuring reliable power supply in urban distribution networks is a complex and critical task.To address the increased demand during extreme scenarios,this paper proposes an optimal dispatch strategy that considers the coordination with virtual power plants(VPPs).The proposed strategy improves systemflexibility and responsiveness by optimizing the power adjustment of flexible resources.In the proposed strategy,theGaussian Process Regression(GPR)is firstly employed to determine the adjustable range of aggregated power within the VPP,facilitating an assessment of its potential contribution to power supply support.Then,an optimal dispatch model based on a leader-follower game is developed to maximize the benefits of the VPP and flexible resources while guaranteeing the power balance at the same time.To solve the proposed optimal dispatch model efficiently,the constraints of the problem are reformulated and resolved using the Karush-Kuhn-Tucker(KKT)optimality conditions and linear programming duality theorem.The effectiveness of the strategy is illustrated through a detailed case study. 展开更多
关键词 Urban distribution network virtual power plant power supply support leader-follower optimization game extreme weather scenarios
在线阅读 下载PDF
Exponential stability criteria on neural networks with continuously distributed delays 被引量:2
14
作者 李涛 费树岷 朱清 《Journal of Southeast University(English Edition)》 EI CAS 2007年第4期529-533,共5页
The exponential stability of a class of neural networks with continuously distributed delays is investigated by employing a novel Lyapunov-Krasovskii functional. Through introducing some free-weighting matrices and th... The exponential stability of a class of neural networks with continuously distributed delays is investigated by employing a novel Lyapunov-Krasovskii functional. Through introducing some free-weighting matrices and the equivalent descriptor form, a delay-dependent stability criterion is established for the addressed systems. The condition is expressed in terms of a linear matrix inequality (LMI), and it can be checked by resorting to the LMI in the Matlab toolbox. In addition, the proposed stability criteria do not require the monotonicity of the activation functions and the derivative of a time-varying delay being less than 1, which generalize and improve earlier methods. Finally, numerical examples are given to show the effectiveness of the obtained methods. 展开更多
关键词 exponential stability neural networks free-weighting matrix continuously distributed delay linear matrix inequality
在线阅读 下载PDF
Design of a distributed power amplifier based on T-type matching networks 被引量:1
15
作者 张瑛 马凯学 +1 位作者 周洪敏 郭宇锋 《Journal of Southeast University(English Edition)》 EI CAS 2016年第3期278-284,共7页
The impedance characteristics of distributed amplifiers are analyzed based on T-type matching networks, and a distributed power amplifier consisting of three gain cells is proposed. Non-uniform T-type matching network... The impedance characteristics of distributed amplifiers are analyzed based on T-type matching networks, and a distributed power amplifier consisting of three gain cells is proposed. Non-uniform T-type matching networks are adopted to make the impedance of artificial transmission lines connected to the gate and drain change stage by stage gradually, which provides good impedance matching and improves the output power and efficiency. The measurement results show that the amplifier gives an average forward gain of 6 dB from 3 to 16. 5 GHz. In the desired band, the input return loss is typically less than - 9. 5 dB, and the output return loss is better than -8.5 dB. The output power at 1-dB gain compression point is from 3.6 to 10. 6 dBm in the band of 2 to 16 GHz while the power added efficiency (PAE) is from 2% to 12. 5% . The power consumption of the amplifier is 81 mW with a supply of 1.8 V, and the chip area is 0.91 mm × 0.45 mm. 展开更多
关键词 distributed amplifier impedance matching poweradded efficiency T-type network
在线阅读 下载PDF
COMBINATION OF DISTRIBUTED KALMAN FILTER AND BP NEURAL NETWORK FOR ESG BIAS MODEL IDENTIFICATION 被引量:3
16
作者 张克志 田蔚风 钱峰 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2010年第3期226-231,共6页
By combining the distributed Kalman filter (DKF) with the back propagation neural network (BPNN),a novel method is proposed to identify the bias of electrostatic suspended gyroscope (ESG). Firstly,the data sets ... By combining the distributed Kalman filter (DKF) with the back propagation neural network (BPNN),a novel method is proposed to identify the bias of electrostatic suspended gyroscope (ESG). Firstly,the data sets of multi-measurements of the same ESG in different noise environments are "mapped" into a sensor network,and DKF with embedded consensus filters is then used to preprocess the data sets. After transforming the preprocessed results into the trained input and the desired output of neural network,BPNN with the learning rate and the momentum term is further utilized to identify the ESG bias. As demonstrated in the experiment,the proposed approach is effective for the model identification of the ESG bias. 展开更多
关键词 model identification distributed Kalman filter(DKF) back propagation neural network(BPNN) electrostatic suspended gyroscope(ESG)
在线阅读 下载PDF
A distributed on-demand bandwidth-constrained multicast routing protocol for wireless ad hoc networks 被引量:1
17
作者 余燕平 倪玲玲 郑元琰 《Journal of Southeast University(English Edition)》 EI CAS 2015年第1期5-11,共7页
To meet the bandwidth requirement for the multicasting data flow in ad hoc networks, a distributed on- demand bandwidth-constrained multicast routing (BCMR) protocol for wireless ad hoc networks is proposed. With th... To meet the bandwidth requirement for the multicasting data flow in ad hoc networks, a distributed on- demand bandwidth-constrained multicast routing (BCMR) protocol for wireless ad hoc networks is proposed. With this protocol, the resource reservation table of each node will record the bandwidth requirements of data flows, which access itself, its neighbor nodes and hidden nodes, and every node calculates the remaining available bandwidth by deducting the bandwidth reserved in the resource reservation table from the total available bandwidth of the node. Moreover, the BCMR searches in a distributed manner for the paths with the shortest delay conditioned by the bandwidth constraint. Simulation results demonstrate the good performance of BCMR in terms of packet delivery reliability and the delay. BCMR can meet the requirements of real time communication and can be used in the multicast applications with low mobility in wireless ad hoc networks. 展开更多
关键词 wireless ad hoc networks multicast routing bandwidth satisfaction on-demand multicast routing distributed multicast routing QoS multicast routing
在线阅读 下载PDF
Distributed amplifier of L-type network with 2-μm GaAs HBT process
18
作者 徐建 王志功 +1 位作者 张瑛 田密 《Journal of Southeast University(English Edition)》 EI CAS 2011年第1期13-16,共4页
The characteristic impedances of L-type and T-type networks are first investigated for a distributed amplifier design.The analysis shows that the L-type network has better frequency characteristics than the T-type one... The characteristic impedances of L-type and T-type networks are first investigated for a distributed amplifier design.The analysis shows that the L-type network has better frequency characteristics than the T-type one.A distribution amplifier based on the L-type network is implemented with the 2-μm GaAs HBT(heterojunction-bipolar transistor) process of WIN semiconductors.The measurement result presents excellent bandwidth performance and gives a gain of 5.5 dB with a gain flatness of ±1dB over a frequency range from 3 to 18 GHz.The return losses S11 and S22 are below-10dB in the designed frequency range.The output 1-dB compression point at 5 GHz is 13.3 dBm.The chip area is 0.95 mm2 and the power dissipation is 95 mW under a 3.5 V supply. 展开更多
关键词 distribution amplifier L-type network GaAs HBT process ultra-high broadband
在线阅读 下载PDF
SDN数据平面的无监督FC-BiGAN攻击检测方法 被引量:1
19
作者 尹震宇 杜江林 +2 位作者 张飞青 徐光远 张文波 《小型微型计算机系统》 北大核心 2025年第12期3016-3026,共11页
网络安全对钢铁制造车间安全高效生产至关重要,然而在钢铁制造车间的软件定义网络架构中,控制器易遭受分布式拒绝服务攻击,对生产安全构成重大威胁.针对此挑战,本文提出一种全连接双向生成对抗网络模型和基于FPGA的控制器节点优化策略.... 网络安全对钢铁制造车间安全高效生产至关重要,然而在钢铁制造车间的软件定义网络架构中,控制器易遭受分布式拒绝服务攻击,对生产安全构成重大威胁.针对此挑战,本文提出一种全连接双向生成对抗网络模型和基于FPGA的控制器节点优化策略.本文首先设计了RYU控制器和改进FPGA交换机,并提出一种自定义数据集,解决了现有数据集无法反映车间软件定义网络架构应用场景的问题.随后,本文利用提出的方法,有效解决了数据集不平衡时模型训练问题以及模型在FPGA中部署难的挑战.结果表明,该方法在CIC-DDoS2019和自定义数据集上准确率分别为99.81%和99.36%,均优于现有无监督方法.此外,模型迁移到FPGA后准确率可达99.02%,实现了数据平面的高效攻击检测,显著缓解控制器性能瓶颈. 展开更多
关键词 软件定义网络 RYU控制器 分布式拒绝服务攻击 双向生成对抗网络 可编程逻辑门阵列
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部