期刊文献+
共找到398篇文章
< 1 2 20 >
每页显示 20 50 100
Traffic jam in signalized road network 被引量:1
1
作者 祁宏生 王殿海 +1 位作者 陈鹏 别一鸣 《Journal of Central South University》 SCIE EI CAS 2014年第2期832-842,共11页
Traffic jam in large signalized road network presents a complex nature.In order to reveal the jam characteristics,two indexes,SVS(speed of virtual signal) and VOS(velocity of spillover),were proposed respectively.SVS ... Traffic jam in large signalized road network presents a complex nature.In order to reveal the jam characteristics,two indexes,SVS(speed of virtual signal) and VOS(velocity of spillover),were proposed respectively.SVS described the propagation of queue within a link while VOS reflected the spillover velocity of vehicle queue.Based on the two indexes,network jam simulation was carried out on a regular signalized road network.The simulation results show that:1) The propagation of traffic congestion on a signalized road network can be classified into two stages:virtual split driven stage and flow rate driven stage.The former stage is characterized by decreasing virtual split while the latter only depends on flow rate; 2) The jam propagation rate and direction are dependent on traffic demand distribution and other network parameters.The direction with higher demand gets more chance to be jammed.Our findings can serve as the basis of the prevention of the formation and propagation of network traffic jam. 展开更多
关键词 traffic engineering network traffic jam virtual signal traffic control
在线阅读 下载PDF
Cooperative Jamming for Physical Layer Security in Hybrid Satellite Terrestrial Relay Networks 被引量:9
2
作者 Su Yan Xinyi Wang +2 位作者 Zongling Li Bin Li Zesong Fei 《China Communications》 SCIE CSCD 2019年第12期154-164,共11页
To integrate the satellite communications with the LTE/5G services, the concept of Hybrid Satellite Terrestrial Relay Networks(HSTRNs) has been proposed. In this paper, we investigate the secure transmission in a HSTR... To integrate the satellite communications with the LTE/5G services, the concept of Hybrid Satellite Terrestrial Relay Networks(HSTRNs) has been proposed. In this paper, we investigate the secure transmission in a HSTRN where the eavesdropper can wiretap the transmitted messages from both the satellite and the intermediate relays. To effectively protect the message from wiretapping in these two phases, we consider cooperative jamming by the relays, where the jamming signals are optimized to maximize the secrecy rate under the total power constraint of relays. In the first phase, the Maximal Ratio Transmission(MRT) scheme is used to maximize the secrecy rate, while in the second phase, by interpolating between the sub-optimal MRT scheme and the null-space projection scheme, the optimal scheme can be obtained via an efficient one-dimensional searching method. Simulation results show that when the number of cooperative relays is small, the performance of the optimal scheme significantly outperforms that of MRT and null-space projection scheme. When the number of relays increases, the performance of the null-space projection approaches that of the optimal one. 展开更多
关键词 hybrid satellite terrestrial relay networks physical layer security cooperative jamming
在线阅读 下载PDF
Research on the self-defence electronic jamming decision-making based on the discrete dynamic Bayesian network 被引量:7
3
作者 Tang Zheng Gao Xiaoguang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第4期702-708,共7页
The manner and conditions of running the decision-making system with self-defense electronic jamming are given. After proposing the scenario of applying discrete dynamic Bayesian network to the decision making with se... The manner and conditions of running the decision-making system with self-defense electronic jamming are given. After proposing the scenario of applying discrete dynamic Bayesian network to the decision making with self-defense electronic jamming, a decision-making model with self-defense electronic jamming based on the discrete dynamic Bayesian network is established. Then jamming decision inferences by the aid of the algorithm of discrete dynamic Bayesian network are carried on. The simulating result shows that this method is able to synthesize different targets which are not predominant. In this way, various features at the same time, as well as the same feature appearing at different time complement mutually; in addition, the accuracy and reliability of electronic jamming decision making are enhanced significantly. 展开更多
关键词 self-defense electronic jamming discrete dynamic Bayesian network decision-making model
在线阅读 下载PDF
Complex force network in marginally and deeply jammed solids
4
作者 胡茂彬 姜锐 吴清松 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第6期475-480,共6页
This paper studies the force network properties of marginally and deeply jammed packings of frictionless soft particlesfrom the perspective of complex network theory. We generate zero-temperature granular packings at ... This paper studies the force network properties of marginally and deeply jammed packings of frictionless soft particlesfrom the perspective of complex network theory. We generate zero-temperature granular packings at different pressures by minimizing the inter-particle potential energy. The force networks are constructed as nodes representing particles and links representing normal forces between the particles. Deeply jammed solids show remarkably different behavior from marginally jammed solids in their degree distribution, strength distribution, degree correlation, and clustering coefficient. Bimodal and multi-modal distributions emerge when the system enters the deep jamming region. The results also show that small and large particles can show different correlation behavior in this simple system. 展开更多
关键词 jamming complex networks amorphous solids
原文传递
A Coincered Node Based Localization of Jammers in Wireless Sensor Networks
5
作者 Balamurugan Perumal Sharmila Vadivel Mummoorthy Arulappan 《Circuits and Systems》 2016年第9期2613-2621,共9页
Jammers can awfully interfere with the wireless communications. The transmission and reception of wireless communication is blocked by the jammer. The intruder will place the jammer in a well topological network area ... Jammers can awfully interfere with the wireless communications. The transmission and reception of wireless communication is blocked by the jammer. The intruder will place the jammer in a well topological network area and they can easily track the information. It will help them to block the signal transmission and reception. Now, the intention is to track the position of the jammer where it is fixed. The existing methods rely on the indirect measurements and the boundary node to find the jammer’s position which degrades the accuracy of the localization. To improve the efficiency, this paper proposed an efficient method namely Coincered Node Based Localization of jammers to find the position of the jammer with high level of accuracy. The proposed system uses the direct measurements, which is the jammer signal strength. The effectiveness can also be increased by using the coincered node that will stumble across the true position of the jammer. The proposed work is compared with existing methods. Then the proposed mechanism proves better to find the jammer location. The simulation results estimate that the accuracy of the localization achieves better performance than the existing schemes. 展开更多
关键词 Wireless Sensor network jamming jammer Localization jammer Signal Strength Coincered Node
在线阅读 下载PDF
Lightweight jammer localization algorithm in wireless sensor networks
6
作者 成天桢 栗苹 朱森存 《Journal of Beijing Institute of Technology》 EI CAS 2013年第2期143-148,共6页
In wireless sensor networks (WSNs), as the shared nature of the wireless medium, jam- ming attacks can be easily launched and result in a great damage to the network. How to deal with jamming attacks has become a gr... In wireless sensor networks (WSNs), as the shared nature of the wireless medium, jam- ming attacks can be easily launched and result in a great damage to the network. How to deal with jamming attacks has become a great concern recently. Finding the location of a jammer is important to take security actions against the jammer, and thus to restore the network communication. After a comprehensive study on the jammer localization problem, a lightweight easy-operated algorithm called triple circles localization (TCL) is proposed. The evaluation results have demonstrated that, compared with other approaches, TCL achieves the best jammer localization accuracy under variable conditions. 展开更多
关键词 jammer localization jamming attacks wireless sensor networks
在线阅读 下载PDF
无线传感器网络中基于几何覆盖的Jamming攻击定位算法 被引量:9
7
作者 孙言强 王晓东 周兴铭 《通信学报》 EI CSCD 北大核心 2010年第11期10-16,共7页
提出一种基于几何覆盖理论的Jamming攻击定位(GCL,geometry-covering based localization)算法。GCL算法利用计算几何中的凸壳理论,特别是最小包容圆方法,对Jamming攻击者进行定位。理论证明了该算法的正确性和较低的时间复杂度(O(nlogn... 提出一种基于几何覆盖理论的Jamming攻击定位(GCL,geometry-covering based localization)算法。GCL算法利用计算几何中的凸壳理论,特别是最小包容圆方法,对Jamming攻击者进行定位。理论证明了该算法的正确性和较低的时间复杂度(O(nlogn));模拟实验表明,该算法在攻击者攻击范围、网络节点密度以及攻击者位置等度量值变化的情况下,比已有算法具有更好的定位准确度。 展开更多
关键词 无线传感器网络 jamming攻击 定位 最小包容圆
在线阅读 下载PDF
干扰条件下基于MADRL的多无人机动态信道决策算法
8
作者 刘正龙 郭肃丽 《计算机测量与控制》 2026年第2期251-257,共7页
无人机以其高效和低成本的优势逐渐成为侦查打击、抗震救灾等任务的核心力量,然而在执行任务过程中,无人机网络面临着外部的干扰,其抗干扰能力的强弱直接关系到任务的成败;针对动态干扰环境下的无人机信道接入问题,将问题的求解与集中... 无人机以其高效和低成本的优势逐渐成为侦查打击、抗震救灾等任务的核心力量,然而在执行任务过程中,无人机网络面临着外部的干扰,其抗干扰能力的强弱直接关系到任务的成败;针对动态干扰环境下的无人机信道接入问题,将问题的求解与集中式训练分布式执行框架融合,提出了一种基于价值分解网络的多智能体无人机动态信道决策算法;将深度强化学习中的固定学习率改进为余弦退火学习率,从而获得更低的损失和更高的模型精度;仿真实验结果表明所提算法能使网络节点智能调整信道选择策略,最大化无线网络的吞吐量,余弦退火算法提升了强化学习的训练效果。 展开更多
关键词 无人机网络 干扰对抗 动态频谱接入 价值分解网络 余弦退火学习率
在线阅读 下载PDF
面向信息优势的低空无人机通信网络智能防御方法
9
作者 于振昆 李海涛 +4 位作者 陈瑾 王海超 王乐 李国鑫 焦雨涛 《移动通信》 2026年第1期103-112,共10页
低空无人机通信网络是低空经济和低空防护的共性需求,是低空经济和第六代移动通信的结合点。然而,低空无人机通信网络面临干扰、窃听、欺骗等安全问题。基于此,从信息优势的角度分析了低空无人机通信网络智能防御方法。首先,构建了干扰... 低空无人机通信网络是低空经济和低空防护的共性需求,是低空经济和第六代移动通信的结合点。然而,低空无人机通信网络面临干扰、窃听、欺骗等安全问题。基于此,从信息优势的角度分析了低空无人机通信网络智能防御方法。首先,构建了干扰威胁下的低空无人机通信网络模型;然后,在刻画通信效能和干扰效能的基础上,给出了信息优势的一般性表述方法;最后,将干扰方和通信方的策略决策问题建模为博弈优化问题,并从信息对称与信息不对称角度分析了通信方和干扰方的策略更新过程,提出了基于DDQN的低空无人机通信网络智能防御方法。仿真结果表明,信息不对称情况下通信方可以获得良好的防御效果,但是信息对称情况下,通信方和干扰方若都采取智能攻击与智能防御策略,则双方始终处于动态博弈过程中,难以形成明显的优势。 展开更多
关键词 低空通信网络 通信抗干扰 深度强化学习 信息优势 博弈论
在线阅读 下载PDF
面向组网雷达的分布式多机航迹欺骗策略研究
10
作者 赵一泽 赵珊珊 刘子威 《无线电工程》 2026年第1期21-29,共9页
当突防的干扰机资源少于组网雷达中的雷达数量时,干扰机在与多个雷达的延长线上通过距离欺骗产生的假目标点迹难以对组网雷达产生有效的干扰。为实现“以少制多”的战略要求,在此基础上分时加入一定的角度欺骗,通过详定的参数设计及场... 当突防的干扰机资源少于组网雷达中的雷达数量时,干扰机在与多个雷达的延长线上通过距离欺骗产生的假目标点迹难以对组网雷达产生有效的干扰。为实现“以少制多”的战略要求,在此基础上分时加入一定的角度欺骗,通过详定的参数设计及场景规划,在组网雷达的主瓣波束内产生符合真实目标运动规律的假目标,使得雷达网真假难辨。通过仿真验证,提前预设出假目标的航迹信息,以运动学约束为限制条件,最大化欺骗距离为优化目标,设计多干扰机的运动轨迹。设计出的干扰机航迹能够通过组网雷达的“同源检测”,可以达到以假乱真的效果。 展开更多
关键词 组网雷达 欺骗式干扰 粒子群算法 航迹欺骗 数据融合
在线阅读 下载PDF
面向梯田遥感识别的JAM-R-CNN深度网络模型 被引量:1
11
作者 谢君洋 林安琪 +3 位作者 吴浩 吴紫薇 吴文斌 余强毅 《遥感学报》 CSCD 北大核心 2024年第12期3136-3146,共11页
快速准确地掌握梯田的空间分布,不仅为水土保持提供重要的数据支撑,也提高了山区农业的监管水平。利用深度学习方法进行梯田识别,对于形状狭长的梯田容易因卷积运算而造成漏提现象,并且在山区地物边界不清晰的复杂背景下,易产生大面积... 快速准确地掌握梯田的空间分布,不仅为水土保持提供重要的数据支撑,也提高了山区农业的监管水平。利用深度学习方法进行梯田识别,对于形状狭长的梯田容易因卷积运算而造成漏提现象,并且在山区地物边界不清晰的复杂背景下,易产生大面积粘连的识别结果,导致最终的梯田识别精度不高。为此,本研究提出了一种面向梯田遥感识别的JAM-R-CNN深度网络模型。该模型以Mask R-CNN为基础,融合跳跃网络来维持高分辨率遥感影像的高语义信息,引入卷积注意力机制模块来加强梯田的特征表达能力,修改模型的锚框大小以适应梯田狭长的特性。并以重庆市南川区的盐井梯田研究区域,基于国产高分二号(GF-2)卫星影像数据进行本研究模型验证实验。结果表明:JAM-R-CNN网络模型的梯田识别结果精确率为90.81%,召回率为84.28%,F1为88.98%,IoU为83.15%。相较于经典的Mask R-CNN模型,JAM-R-CNN网络模型的梯田识别精度较高,4个评价指标依次提升了1.96%、5.26%、3.29%和5.19%。此外,消融实验结果验证了模型改进的3个模块均对梯田识别有明显的促进作用。综上,本研究提出的JAM-R-CNN深度网络模型能够有效减少梯田识别结果的粘连现象,明显提高了狭长型梯田的提取率,实现了梯田遥感识别整体精度的显著提升,具有较好的应用价值。 展开更多
关键词 遥感 梯田识别 高分辨率遥感影像 深度学习 跳跃网络 jam-R-CNN
原文传递
Jamming of packings of frictionless particles with and without shear 被引量:1
12
作者 Wen Zheng Shiyun Zhang Ning Xu 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第6期315-319,共5页
By minimizing the enthalpy of packings of frictionless particles, we obtain jammed solids at desired pressures and hence investigate the jamming transition with and without shear. Typical scaling relations of the jamm... By minimizing the enthalpy of packings of frictionless particles, we obtain jammed solids at desired pressures and hence investigate the jamming transition with and without shear. Typical scaling relations of the jamming transition are recovered in both cases. In contrast to systems without shear, shear-driven jamming transition occurs at a higher packing fraction and the jammed solids are more rigid with an anisotropic force network. Furthermore, by introducing the macrofriction coefficient, we propose an explanation of the packing fraction gap between sheared and non-sheared systems at fixed pressure. 展开更多
关键词 jamming SHEAR macro-friction force network
原文传递
Pattern recognitionbased method for radar antideceptive jamming 被引量:2
13
作者 Ma Xiaoyan Qin Jiangmin Li Jianxun 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2005年第4期802-805,共4页
In order to make the effective ECCM to the deceptive jamming, especially the angle deceptive jamming, this paper establishes a signal-processing model for anti-deceptive jamming firstly, in which two feature-extractin... In order to make the effective ECCM to the deceptive jamming, especially the angle deceptive jamming, this paper establishes a signal-processing model for anti-deceptive jamming firstly, in which two feature-extracting algorithms, i.e. the statistical algorithm and the neural network (NN) algorithm are presented, then uses the RBF NN as the classitier in the processing model. Finally the two algorithms are validated and compared through some simulations. 展开更多
关键词 angle deceptive jamming ANTI-jamMING pattern recognition feature extraction neural network.
在线阅读 下载PDF
Mechanical properties of jammed packings of frictionless spheres under an applied shear stress
14
作者 刘浩 童华 徐宁 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第11期57-63,共7页
By minimizing a thermodynamic-like potential, we unbiasedly sample the potential energy landscape of soft and frictionless spheres under a constant shear stress. We obtain zero-temperature jammed states under desired ... By minimizing a thermodynamic-like potential, we unbiasedly sample the potential energy landscape of soft and frictionless spheres under a constant shear stress. We obtain zero-temperature jammed states under desired shear stresses and investigate their mechanical properties as a function of the shear stress. As a comparison, we also obtain the jammed states from the quasistatic-shear sampling in which the shear stress is not well-controlled. Although the yield stresses determined by both samplings show the same power-law scaling with the compression from the jamming transition point J at zero temperature and shear stress, for finite size systems the quasistatic-shear sampling leads to a lower yield stress and a higher critical volume fraction at point J. The shear modulus of the jammed solids decreases with increasing shear stress. However, the shear modulus does not decay to zero at yielding. This discontinuous change of the shear modulus implies the discontinuous nature of the unjamming transition under nonzero shear stress, which is further verified by the observation of a discontinuous jump in the pressure from the jammed solids to the shear flows. The pressure jump decreases upon decompression and approaches zero at the critical-like point J, in analogy with the well-known phase transitions under an external field. The analysis of the force networks in the jammed solids reveals that the force distribution is more sensitive to the increase of the shear stress near point J. The force network anisotropy increases with increasing shear stress. The weak particle contacts near the average force and under large shear stresses it exhibit an asymmetric angle distribution. 展开更多
关键词 jamming SHEAR phase transition force network
原文传递
孪生网络辅助下多域特征融合的雷达有源干扰识别方法 被引量:1
15
作者 李宁 王赞 +2 位作者 舒高峰 张庭玮 郭拯危 《电子与信息学报》 北大核心 2025年第6期1837-1849,共13页
针对目前雷达有源干扰识别方法在低干噪比下识别精度低和训练样本难以高效获取的问题,该文提出一种孪生网络辅助下多域特征融合的雷达有源干扰识别方法。首先,为了实现低干噪比下干扰特征的有效提取,构建了一种多域特征融合子网络;具体... 针对目前雷达有源干扰识别方法在低干噪比下识别精度低和训练样本难以高效获取的问题,该文提出一种孪生网络辅助下多域特征融合的雷达有源干扰识别方法。首先,为了实现低干噪比下干扰特征的有效提取,构建了一种多域特征融合子网络;具体地,结合半软阈值函数和注意力机制,提出半软阈值收缩模块,以有效提取时域特征,避免手工提取阈值的不足,同时引入多尺度卷积模块和注意力模块,以增强时频域特征提取能力。然后,为了降低识别模型对样本的依赖,设计了一种权值共享的孪生网络,通过对比样本间相似度扩大训练次数,以解决样本不足问题。最后,联合改进的加权对比度损失函数、自适应交叉熵损失函数和3元组损失函数,实现干扰特征的类内聚集、类间分离。实验结果表明,在干噪比为–6 dB且每类干扰为20个训练样本时,对10种典型有源干扰的识别率达到96.88%。 展开更多
关键词 雷达有源干扰识别 孪生网络 多域特征 注意力机制
在线阅读 下载PDF
复杂电磁环境下的调制识别网络 被引量:1
16
作者 周金 李玉芝 +3 位作者 张徐 高硕 张立 盛家川 《计算机应用》 北大核心 2025年第8期2672-2682,共11页
自动调制识别(AMR)是无线通信系统的关键技术。针对AMR网络在复杂电磁环境下迁移能力较差以及对噪声和调制信号的特征区分能力不足的问题,提出去噪及双模态注意力Transformer及卷积融合网络(Denoising & Dual-modal Attention CNN-T... 自动调制识别(AMR)是无线通信系统的关键技术。针对AMR网络在复杂电磁环境下迁移能力较差以及对噪声和调制信号的特征区分能力不足的问题,提出去噪及双模态注意力Transformer及卷积融合网络(Denoising & Dual-modal Attention CNN-Transformer, D-DmACT)。首先,设计一种迭代生成复杂干扰的生成器和对抗干扰的判别器,增强模型在遭遇复杂电磁环境时的泛化能力;其次,设计基于复数注意力的Transformer模块,以捕获同相正交(IQ)信号的时域特征,并设计基于时频位置信息的坐标注意力模块,以获取时频图像的特征,并对两种特征进行交叉融合;再次,将判别器输出的时序复序列和时频图像送至双模态注意力融合模型;最后,实现轻量化的分类识别。在数据集RadioML2016.10a和RadioML2018.01a上分别开展的高斯白噪声以及复杂电磁环境下的识别实验的结果表明:在脉冲噪声的作用下,相较于CLDNN(Convolutional Long short-term Deep Neural Network)、残差网络(ResNet)和长短期记忆(LSTM)网络,所提网络的平均识别准确率分别提高了53.98%、28.82%和24.64%,而相较于多模态自动调制分类网络(MM-Net)、阈值自编码去噪卷积神经网络(TADCNN)和生成式对抗网络联合多模态注意力机制卷积长短期记忆网络(GAN-MnACL),所提网络的平均识别准确率分别提高了19.74%、13.55%和11.17%。在计算复杂度方面,通过参数量和浮点运算数(FLOPs)等指标验证了所提网络在终端的可部署性。 展开更多
关键词 自动调制识别 生成对抗网络 坐标注意力机制 TRANSFORMER 复杂干扰
在线阅读 下载PDF
基于多代理深度强化学习的战术无线网络安全路由算法研究
17
作者 谢英辉 刘亮 《传感技术学报》 北大核心 2025年第8期1482-1490,共9页
由于应用场景的特殊性,战术无线网络更易遭受干扰攻击,这破坏了数据通信,阻碍了数据包的传输。为此,提出基于多代理深度强化学习的安全路由(Multi-agent Deep Reinforcement Learning-based Secure Routing,MRSR)。MRSR路由将节点作为代... 由于应用场景的特殊性,战术无线网络更易遭受干扰攻击,这破坏了数据通信,阻碍了数据包的传输。为此,提出基于多代理深度强化学习的安全路由(Multi-agent Deep Reinforcement Learning-based Secure Routing,MRSR)。MRSR路由将节点作为代理,它们通过深度神经网络学习决策路由。将跳数、一跳时延、数据包丢失率和能量消耗信息关联到奖励函数,使得代理能够选择时延低、可靠性高的转发节点,进而克服干扰攻击。仿真结果表明,提出的MRSR路由提高了数据包传递率和能量效率。 展开更多
关键词 战术无线网络 安全路由 干扰攻击 多代理深度强化学习 奖励函数
在线阅读 下载PDF
Characterizing Peak-Time Traffic Jam Incidents in Kampala Using Exploratory Data Analysis
18
作者 Sekalema Hamza Umar Yahya +3 位作者 Abdal Kasule Kasagga Usama Pembe Fahad Kamoga Ibrahim 《Journal of Transportation Technologies》 2023年第1期61-86,共26页
Traffic congestion is associated with increased environmental pollutions, as well as reduced socio-economic productivity due to significant delays in travel times. The consequences are worse in least developed countri... Traffic congestion is associated with increased environmental pollutions, as well as reduced socio-economic productivity due to significant delays in travel times. The consequences are worse in least developed countries where motorized road transport networks are often inefficiently managed in addition to being largely underdeveloped. Recent research on traffic congestion has mostly focused on infrastructural aspects of road networks, with little or no emphasis at all on motorists’ on-the-road behavior (MB). The current study thus aimed to bridge this knowledge gap by characterizing traffic jam incidents (TJI) observed over a period of 80 days in Uganda’s Capital City, Kampala. MB as well as road network infrastructural factors such as road blockage (RB), were captured for each of the observed TJI. A total of 483 peak-time TJI were recorded, and exploratory data analysis (EDA) subsequently performed on the TJI dataset. EDA involved Hierarchical clustering analysis (HCA) and K-means clustering of the TJI dataset, as well as a detailed descriptive statistical analysis of both the entire dataset and the emerging TJI clusters. A highlight finding of this study is that 48.2% of the observed TJIs were as a result of on-the-road motorist behavior. Furthermore, the intervention of traffic police officers in a bid to regulate traffic flow was equally responsible for 25.9% of the TJIs observed in this study. Overall, these results indicate that whereas road infrastructural improvement is warranted in order to improve traffic flow, introducing interventions to address inappropriate on-the-road motorists’ behavior could alone improve traffic flow in Kampala, by over 48%. Additionally, in-order to effectively regulate traffic flow in Kampala and other least developed cities with similar traffic congestion management practices, motorists’ on-the-road behavior ought to be factored into any data-driven mechanisms deployed to regulate traffic flow and thus potentially significantly curbing traffic congestion. 展开更多
关键词 Motorist Behavior Traffic jam Traffic Congestion Urban Road-networks Motorized Transport Traffic Clusters
在线阅读 下载PDF
工业无线传感器网络防移动干扰攻击节点的Stackelberg博弈
19
作者 孙子文 翟润华 杨晨曦 《传感技术学报》 北大核心 2025年第6期1081-1088,共8页
针对工业无线传感器网络k节点抗干扰攻击问题,研究一种抵御移动攻击节点的Stackelberg博弈模型。在攻击节点效用函数中加入以能量消耗函数、信道损耗函数和奖励收益函数为成本的代价函数,以约束节点的攻击效率。将移动Sink节点与移动攻... 针对工业无线传感器网络k节点抗干扰攻击问题,研究一种抵御移动攻击节点的Stackelberg博弈模型。在攻击节点效用函数中加入以能量消耗函数、信道损耗函数和奖励收益函数为成本的代价函数,以约束节点的攻击效率。将移动Sink节点与移动攻击节点之间的对抗交互行为建模为功率控制Stackelberg模型,通过求解博弈均衡解,给出节点移动位置下的最佳功率。MATLAB仿真结果表明,相比未引入成本代价函数的其他博弈功率控制方案,该方案能更有效地抑制移动攻击节点的干扰能力,同时提高移动k节点抵御干扰攻击的性能。 展开更多
关键词 工业无线传感器网络 STACKELBERG博弈 成本代价函数 干扰攻击 移动攻击节点
在线阅读 下载PDF
“卡脖子”关键核心技术三阶段识别模型构建及应用研究
20
作者 魏巍 徐江龙 +1 位作者 李贵龙 黄晓林 《情报探索》 2025年第9期68-75,共8页
[目的/意义]基于专利数据客观地识别凝练“卡脖子”关键核心技术,为开展技术攻关布局提供方向。[方法/过程]从关键技术、核心技术、“卡脖子”关键核心技术的内涵辨析入手,构建“卡脖子”关键核心技术三阶段识别模型。首先,从“战略性... [目的/意义]基于专利数据客观地识别凝练“卡脖子”关键核心技术,为开展技术攻关布局提供方向。[方法/过程]从关键技术、核心技术、“卡脖子”关键核心技术的内涵辨析入手,构建“卡脖子”关键核心技术三阶段识别模型。首先,从“战略性、垄断性和创新性”三个维度识别关键技术;其次,基于社会网络分析方法的“K-核”分析,筛选核心技术;最后,结合区位熵概念,构建包含技术数量差距、技术质量差距、技术新颖性的“卡脖子”指数,识别“卡脖子”关键核心技术。[结果/结论]以全球人工智能产业2000—2022年专利数据为样本,最终识别出人工智能关键核心技术领域10个、我国严重性“卡脖子”关键核心技术领域1个、一般性“卡脖子”技术领域3个,以期为政府部门及企业等科技创新主体提供关键核心技术布局方向借鉴和参考。 展开更多
关键词 关键核心技术 “卡脖子”技术 社会网络分析 指标体系 人工智能
在线阅读 下载PDF
上一页 1 2 20 下一页 到第
使用帮助 返回顶部