期刊文献+
共找到243篇文章
< 1 2 13 >
每页显示 20 50 100
CC-OLIA:A dynamic congestion control algorithm for multipath QUIC in mobile networks
1
作者 Haoyu Wang Yang Liu +5 位作者 Zijun Li Yu Zhang Wenjing Gong Tao Jiang Ting Bi Jiaxi Zhou 《Digital Communications and Networks》 2025年第4期1180-1190,共11页
High-quality services in today’s mobile networks require stable delivery of bandwidth-intensive network content.Multipath QUIC(MPQUIC),as a multipath protocol that extends QUIC,can utilize multiple paths to support s... High-quality services in today’s mobile networks require stable delivery of bandwidth-intensive network content.Multipath QUIC(MPQUIC),as a multipath protocol that extends QUIC,can utilize multiple paths to support stable and efficient transmission.The standard coupled congestion control algorithm in MPQUIC synchronizes these paths to manage congestion,meeting fairness requirements and improving transmission efficiency.However,current algorithms’Congestion Window(CWND)reduction approach significantly decreases CWND upon packet loss,which lowers effective throughput,regardless of the congestion origin.Furthermore,the uncoupled Slow-Start(SS)in MPQUIC leads to independent exponential CWND growth on each path,potentially causing buffer overflow.To address these issues,we propose the CC-OLIA,which incorporates Packet Loss Classifcation(PLC)and Coupled Slow-Start(CSS).The PLC distinguishes between congestion-induced and random packet losses,adjusting CWND reduction accordingly to maintain throughput.Concurrently,the CSS module coordinates CWND growth during the SS,preventing abrupt increases.Implementation on MININET shows that CC-OLIA not only maintains fair performance but also enhances transmission efficiency across diverse network conditions. 展开更多
关键词 MPQUIC Mobile network Congestion control Packet loss Slow start
在线阅读 下载PDF
Environment-aware streaming media transmission method in high-speed mobile networks
2
作者 Jia Guo Jinqi Zhu +3 位作者 Xiang Li Bowen Sun Qian Gao Weijia Feng 《Digital Communications and Networks》 2025年第4期991-1005,共15页
With technological advancements,high-speed rail has emerged as a prevalent mode of transportation.During travel,passengers exhibit a growing demand for streaming media services.However,the high-speed mobile networks e... With technological advancements,high-speed rail has emerged as a prevalent mode of transportation.During travel,passengers exhibit a growing demand for streaming media services.However,the high-speed mobile networks environment poses challenges,including frequent base station handoffs,which significantly degrade wireless network transmission performance.Improving transmission efficiency in high-speed mobile networks and optimizing spatiotemporal wireless resource allocation to enhance passengers’media experiences are key research priorities.To address these issues,we propose an Adaptive Cross-Layer Optimization Transmission Method with Environment Awareness(ACOTM-EA)tailored for high-speed rail streaming media.Within this framework,we develop a channel quality prediction model utilizing Kalman filtering and an algorithm to identify packet loss causes.Additionally,we introduce a proactive base station handoffstrategy to minimize handoffrelated disruptions and optimize resource distribution across adjacent base stations.Moreover,this study presents a wireless resource allocation approach based on an enhanced genetic algorithm,coupled with an adaptive bitrate selection mechanism,to maximize passenger Quality of Experience(QoE).To evaluate the proposed method,we designed a simulation experiment and compared ACOTM-EA with established algorithms.Results indicate that ACOTM-EA improves throughput by 11%and enhances passengers’media experience by 5%. 展开更多
关键词 High-speed mobile networks Streaming media Environment-aware Kalman filtering Resource allocation
在线阅读 下载PDF
Effects of sampling frequency on node mobility prediction in dynamic networks: A spectral view 被引量:1
3
作者 Peppino Fazio Miralem Mehic Miroslav Voznak 《Digital Communications and Networks》 SCIE CSCD 2023年第4期1009-1022,共14页
The field of mobility prediction has been widely investigated in the recent past,especially the reduction of the coverage radius of cellular networks,which led to an increase in hand-over events.Changing the cell cove... The field of mobility prediction has been widely investigated in the recent past,especially the reduction of the coverage radius of cellular networks,which led to an increase in hand-over events.Changing the cell coverage very frequently,for example,may lead to service disruptions if a predictive approach is not deployed in the system.Although several works examined mobility prediction in the new-generation mobile networks,all of these studies focused on studying the time features of mobility traces,and the spectral content of historical mobility patterns was not considered for prediction purposes as yet.In the present study,we propose a new approach to mobility prediction by analyzing the effects of a proper mobility sampling frequency.The proposed approach lies in the mobility analysis in the frequency domain,to extract hidden features of the mobility process.Thus,we proposed a new methodology to determine the spectral content of mobility traces(considered as signals)and,thus,the appropriate sampling frequency,which can provide numerous advantages.We considered several types of mobility models(e.g.pedestrian,urban,and vehicular),containing important details in the time and frequency domains.Several simulation campaigns were performed to observe and analyze the characteristics of mobility from real traces and to evaluate the effects of sampling frequency on the spectral content. 展开更多
关键词 Mobile networking Frequency domain mobility spectrum
在线阅读 下载PDF
Caching Strategies in NDN Based Wireless Ad Hoc Network:A Survey 被引量:1
4
作者 Ahmed Khalid Rana Asif Rehman Byung-Seo Kim 《Computers, Materials & Continua》 SCIE EI 2024年第7期61-103,共43页
Wireless Ad Hoc Networks consist of devices that are wirelessly connected.Mobile Ad Hoc Networks(MANETs),Internet of Things(IoT),and Vehicular Ad Hoc Networks(VANETs)are the main domains of wireless ad hoc network.Int... Wireless Ad Hoc Networks consist of devices that are wirelessly connected.Mobile Ad Hoc Networks(MANETs),Internet of Things(IoT),and Vehicular Ad Hoc Networks(VANETs)are the main domains of wireless ad hoc network.Internet is used in wireless ad hoc network.Internet is based on Transmission Control Protocol(TCP)/Internet Protocol(IP)network where clients and servers interact with each other with the help of IP in a pre-defined environment.Internet fetches data from a fixed location.Data redundancy,mobility,and location dependency are the main issues of the IP network paradigm.All these factors result in poor performance of wireless ad hoc networks.The main disadvantage of IP is that,it does not provide in-network caching.Therefore,there is a need to move towards a new network that overcomes these limitations.Named Data Network(NDN)is a network that overcomes these limitations.NDN is a project of Information-centric Network(ICN).NDN provides in-network caching which helps in fast response to user queries.Implementing NDN in wireless ad hoc network provides many benefits such as caching,mobility,scalability,security,and privacy.By considering the certainty,in this survey paper,we present a comprehensive survey on Caching Strategies in NDN-based Wireless AdHocNetwork.Various cachingmechanism-based results are also described.In the last,we also shed light on the challenges and future directions of this promising field to provide a clear understanding of what caching-related problems exist in NDN-based wireless ad hoc networks. 展开更多
关键词 Content centric network Internet of Things mobile ad hoc network named data network vehicular ad hoc network
在线阅读 下载PDF
Mechanism analysis of regulating Turing instability and Hopf bifurcation of malware propagation in mobile wireless sensor networks
5
作者 黄习习 肖敏 +3 位作者 Leszek Rutkowski 包海波 黄霞 曹进德 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第6期125-140,共16页
A dynamical model is constructed to depict the spatial-temporal evolution of malware in mobile wireless sensor networks(MWSNs). Based on such a model, we design a hybrid control scheme combining parameter perturbation... A dynamical model is constructed to depict the spatial-temporal evolution of malware in mobile wireless sensor networks(MWSNs). Based on such a model, we design a hybrid control scheme combining parameter perturbation and state feedback to effectively manipulate the spatiotemporal dynamics of malware propagation. The hybrid control can not only suppress the Turing instability caused by diffusion factor but can also adjust the occurrence of Hopf bifurcation induced by time delay. Numerical simulation results show that the hybrid control strategy can efficiently manipulate the transmission dynamics to achieve our expected desired properties, thus reducing the harm of malware propagation to MWSNs. 展开更多
关键词 mobile wireless sensor networks REACTION-DIFFUSION Hopf bifurcation hybrid control
原文传递
A Fault-Tolerant Mobility-Aware Caching Method in Edge Computing
6
作者 Yong Ma Han Zhao +5 位作者 Kunyin Guo Yunni Xia Xu Wang Xianhua Niu Dongge Zhu Yumin Dong 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期907-927,共21页
Mobile Edge Computing(MEC)is a technology designed for the on-demand provisioning of computing and storage services,strategically positioned close to users.In the MEC environment,frequently accessed content can be dep... Mobile Edge Computing(MEC)is a technology designed for the on-demand provisioning of computing and storage services,strategically positioned close to users.In the MEC environment,frequently accessed content can be deployed and cached on edge servers to optimize the efficiency of content delivery,ultimately enhancing the quality of the user experience.However,due to the typical placement of edge devices and nodes at the network’s periphery,these components may face various potential fault tolerance challenges,including network instability,device failures,and resource constraints.Considering the dynamic nature ofMEC,making high-quality content caching decisions for real-time mobile applications,especially those sensitive to latency,by effectively utilizing mobility information,continues to be a significant challenge.In response to this challenge,this paper introduces FT-MAACC,a mobility-aware caching solution grounded in multi-agent deep reinforcement learning and equipped with fault tolerance mechanisms.This approach comprehensively integrates content adaptivity algorithms to evaluate the priority of highly user-adaptive cached content.Furthermore,it relies on collaborative caching strategies based onmulti-agent deep reinforcement learningmodels and establishes a fault-tolerancemodel to ensure the system’s reliability,availability,and persistence.Empirical results unequivocally demonstrate that FTMAACC outperforms its peer methods in cache hit rates and transmission latency. 展开更多
关键词 Mobile edge networks mobility fault tolerance cooperative caching multi-agent deep reinforcement learning content prediction
在线阅读 下载PDF
Trust-based co-operative routing for secure communication in mobile ad hoc networks
7
作者 Ankita A.Mahamune M.M.Chandane 《Digital Communications and Networks》 SCIE CSCD 2024年第4期1079-1087,共9页
The working of a Mobile Ad hoc NETwork(MANET)relies on the supportive cooperation among the network nodes.But due to its intrinsic features,a misbehaving node can easily lead to a routing disorder.This paper presents ... The working of a Mobile Ad hoc NETwork(MANET)relies on the supportive cooperation among the network nodes.But due to its intrinsic features,a misbehaving node can easily lead to a routing disorder.This paper presents two trust-based routing schemes,namely Trust-based Self-Detection Routing(TSDR)and Trust-based Cooperative Routing(TCOR)designed with an Ad hoc On-demand Distance Vector(AODV)protocol.The proposed work covers a wide range of security challenges,including malicious node identification and prevention,accurate trust quantification,secure trust data sharing,and trusted route maintenance.This brings a prominent solution for mitigating misbehaving nodes and establishing efficient communication in MANET.It is empirically validated based on a performance comparison with the current Evolutionary Self-Cooperative Trust(ESCT)scheme,Generalized Trust Model(GTM),and the conventional AODV protocol.The extensive simulations are conducted against three different varying network scenarios.The results affirm the improved values of eight popular performance metrics overcoming the existing routing schemes.Among the two proposed works,TCOR is more suitable for highly scalable networks;TSDR suits,however,the MANET application better with its small size.This work thus makes a significant contribution to the research community,in contrast to many previous works focusing solely on specific security aspects,and results in a trade-off in the expected values of evaluation parameters and asserts their efficiency. 展开更多
关键词 Mobile Ad hoc network Secure communication AODV Co-operative routing Trust metric
在线阅读 下载PDF
Design of an Interconnection Architecture and Sizing of Two (2) EPC Core Networks: The Case of Orange-Guinea
8
作者 Mamadou Sadigou Diallo Kadiatou Aissatou Barry +4 位作者 Amadou Lamarana Bah Mamadou Sanoussy Camara Janvier Fotsing Amadou Barry Amadou Oury Bah 《Journal of Energy and Power Engineering》 CAS 2024年第2期59-70,共12页
With the arrival of the 4G and 5G,the telecommunications networks have experienced a large expansion of these networks.That enabled the integration of many services and adequate flow,thus enabling the operators to res... With the arrival of the 4G and 5G,the telecommunications networks have experienced a large expansion of these networks.That enabled the integration of many services and adequate flow,thus enabling the operators to respond to the growing demand of users.This rapid evolution has given the operators to adapt,their methods to the new technologies that increase.This complexity becomes more important,when these networks include several technologies to access different from the heterogeneous network like in the 4G network.The dimensional new challenges tell the application and the considerable increase in demand for services and the compatibility with existing networks,the management of mobility intercellular of users and it offers a better quality of services.Thus,the proposed solution to meet these new requirements is the sizing of the EPC(Evolved Packet Core)core network to support the 5G access network.For the case of Orange Guinea,this involves setting up an architecture for interconnecting the core networks of Sonfonia and Camayenne.The objectives of our work are of two orders:(1)to propose these solutions and recommendations for the heart network EPC sizing and the deployment to be adopted;(2)supply and architectural interconnection in the heart network EPC and an existing heart network.In our work,the model of traffic in communication that we use to calculate the traffic generated with each technology has link in the network of the heart. 展开更多
关键词 5G network 4G network(EPS(evolved packet system)) 3G network(UMTS:Universal Mobile Telecommunications System) EPC network of the heart architecture dimensional Orange Guinea technology service
在线阅读 下载PDF
Analysis of Mobile and Internet Network Coverage: Propagation of Electromagnetic Waves and Concept of Digital Divide in Burundi
9
作者 Apollinaire Bigirimana Jérémie Ndikumagenge +2 位作者 Sami Tabbane Romeo Nibitanga Hassan Kibeya 《Open Journal of Antennas and Propagation》 2024年第1期1-18,共18页
Mobile and Internet network coverage plays an important role in digital transformation and the exploitation of new services. The evolution of mobile networks from the first generation (1G) to the 5th generation is sti... Mobile and Internet network coverage plays an important role in digital transformation and the exploitation of new services. The evolution of mobile networks from the first generation (1G) to the 5th generation is still a long process. 2G networks have developed the messaging service, which complements the already operational voice service. 2G technology has rapidly progressed to the third generation (3G), incorporating multimedia data transmission techniques. It then progressed to fourth generation (4G) and LTE (Long Term Evolution), increasing the transmission speed to improve 3G. Currently, developed countries have already moved to 5G. In developing countries, including Burundi, a member of the East African Community (ECA) where more than 80% are connected to 2G technologies, 40% are connected to the 3G network and 25% to the 4G network and are not yet connected to the 5G network and then still a process. The objective of this article is to analyze the coverage of 2G, 3G and 4G networks in Burundi. This analysis will make it possible to identify possible deficits in order to reduce the digital divide between connected urban areas and remote rural areas. Furthermore, this analysis will draw the attention of decision-makers to the need to deploy networks and coverage to allow the population to access mobile and Internet services and thus enable the digitalization of the population. Finally, this article shows the level of coverage, the digital divide and an overview of the deployment of base stations (BTS) throughout the country to promote the transformation and digital inclusion of services. 展开更多
关键词 Coverage of Mobile networks and Internet Digital Divide Rural and Isolated Areas Antenna Connectivity and Digital Inclusion
在线阅读 下载PDF
A Minimum Cost Handover Algorithm for Mobile Satellite Networks 被引量:1
10
作者 张涛 张军 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2008年第3期269-274,共6页
For mobile satellite networks, an appropriate handover scheme should be devised to shorten handover delay with optimized application of network resources. By introducing the handover cost model of service, this articl... For mobile satellite networks, an appropriate handover scheme should be devised to shorten handover delay with optimized application of network resources. By introducing the handover cost model of service, this article proposes a rerouting triggering scheme for path optimization after handover and a new minimum cost handover algorithm for mobile satellite networks. This algorithm ensures the quality of service (QoS) parameters, such as delay, during the handover and minimizes the handover costs. Simulation indicates that this algorithm is superior to other current algorithms in guaranteeing the QoS and decreasing handover costs. 展开更多
关键词 mobile satellite networks satellite handover REROUTING QOS
在线阅读 下载PDF
Adaptive and distance-driven power control scheme in mobile ad hoc networks
11
作者 陶军 刘莹 +2 位作者 肖鹏 朱利旻 陈文强 《Journal of Southeast University(English Edition)》 EI CAS 2013年第3期252-258,共7页
In order to save the energy and reduce the latency of the end-to-end transmission in mobile ad hoc networks an adaptive and distance-driven power control ADPC scheme is proposed by means of distance research in random... In order to save the energy and reduce the latency of the end-to-end transmission in mobile ad hoc networks an adaptive and distance-driven power control ADPC scheme is proposed by means of distance research in random geometrics. Through mathematical proof the optimal number of relay nodes and the optimal location of each node for data transmission can be obtained when a distance is given.In the ADPC first the source node computes the optimal number and the sites of the relay nodes between the source and the destination nodes.Then it searches feasible relay nodes around the optimal virtual relay-sites and selects one link with the minimal total transmission energy consumption for data transmission.Simulation results show that the ADPC can reduce both the energy dissipation and the end-to-end latency of the transmission. 展开更多
关键词 power control mobile ad hoc networks energyefficient route optimal virtual relay-site
在线阅读 下载PDF
Improved approach to enhanced Internet connectivity for mobile ad hoc networks
12
作者 沈斌 李波 石冰心 《Journal of Southeast University(English Edition)》 EI CAS 2007年第1期16-21,共6页
An improved internetworking approach is proposed to enhance the Internet connectivity which is deteriorated due to unidirectional links and blind rebroadcasting of gateway discovery packets for mobile ad hoc networks.... An improved internetworking approach is proposed to enhance the Internet connectivity which is deteriorated due to unidirectional links and blind rebroadcasting of gateway discovery packets for mobile ad hoc networks. The hybrid gateway discovery scheme that combined the advantages of a proactive and reactive gateway discovery approach is used to achieve high connectivity while keeping overhead costs low. By exchanging ad hoc on-demand distance vector (AODV) hello packet which includes additional fields named symmetric neighbor list and asymmetric neighbor list, unidirectional links are removed from route computation and broadcast storm can also be relieved simultaneously. Performance results using ns-2 simulations, under varying numbers of unidirectional links and node speeds, show that this improved Internet connectivity approach can provide better performance than others. 展开更多
关键词 mobile ad hoc networks Internet connectivity gateway discovery unidirectional link broadcast storm
在线阅读 下载PDF
Wireless ad hoc video transmission:a Bayesian network-based scheme
13
作者 蒋荣欣 田翔 +1 位作者 谢立 陈耀武 《Journal of Southeast University(English Edition)》 EI CAS 2008年第4期407-413,共7页
A novel bandwidth prediction and control scheme is proposed for video transmission over an ad boc network. The scheme is based on cross-layer, feedback, and Bayesian network techniques. The impacts of video quality ar... A novel bandwidth prediction and control scheme is proposed for video transmission over an ad boc network. The scheme is based on cross-layer, feedback, and Bayesian network techniques. The impacts of video quality are formulized and deduced. The relevant factors are obtained by a cross-layer mechanism or Feedback method. According to these relevant factors, the variable set and the Bayesian network topology are determined. Then a Bayesian network prediction model is constructed. The results of the prediction can be used as the bandwidth of the mobile ad hoc network (MANET). According to the bandwidth, the video encoder is controlled to dynamically adjust and encode the right bit rates of a real-time video stream. Integrated simulation of a video streaming communication system is implemented to validate the proposed solution. In contrast to the conventional transfer scheme, the results of the experiment indicate that the proposed scheme can make the best use of the network bandwidth; there are considerable improvements in the packet loss and the visual quality of real-time video.K 展开更多
关键词 mobile ad hoc network (MANET) Bayesian network CROSS-LAYER IEEE 802. 11 real-time video streaming
在线阅读 下载PDF
Research on YOLO algorithm for lightweight PCB defect detection based on MobileViT
14
作者 LIU Yuchen LIU Fuzheng JIANG Mingshun 《Optoelectronics Letters》 2025年第8期483-490,共8页
Current you only look once(YOLO)-based algorithm model is facing the challenge of overwhelming parameters and calculation complexity under the printed circuit board(PCB)defect detection application scenario.In order t... Current you only look once(YOLO)-based algorithm model is facing the challenge of overwhelming parameters and calculation complexity under the printed circuit board(PCB)defect detection application scenario.In order to solve this problem,we propose a new method,which combined the lightweight network mobile vision transformer(Mobile Vi T)with the convolutional block attention module(CBAM)mechanism and the new regression loss function.This method needed less computation resources,making it more suitable for embedded edge detection devices.Meanwhile,the new loss function improved the positioning accuracy of the bounding box and enhanced the robustness of the model.In addition,experiments on public datasets demonstrate that the improved model achieves an average accuracy of 87.9%across six typical defect detection tasks,while reducing computational costs by nearly 90%.It significantly reduces the model's computational requirements while maintaining accuracy,ensuring reliable performance for edge deployment. 展开更多
关键词 YOLO lightweight network mobile vision transformer mobile Lightweight network convolutional block attention module cbam mechanism MobileViT CBAM PCB Defect Detection Regression Loss Function
原文传递
Measuring IP Performance Metrics on Mobile Network with Heterogeneous Wireless Technologies
15
作者 Pyung-soo KIM Jeong-hun CHOI 《Journal of Measurement Science and Instrumentation》 CAS 2010年第3期289-292,共4页
The new measurement scheme of IP performance metrics is for the mobile network in heterogeneous wireless network environment. In the proposed scheme, when Mobile Nodes (MNs) inside the mobile network needs to under... The new measurement scheme of IP performance metrics is for the mobile network in heterogeneous wireless network environment. In the proposed scheme, when Mobile Nodes (MNs) inside the mobile network needs to understand the condition of multiple comrmunicatinn paths outside the mobile netwtrk, they can get IP performance metrics, such as delay, jitter, bandwidth, packet loss, etc., irrespective of the preserre or absence of measurement functionality. At the same time, the proposed scheme dees not require the MN to he involved in measuring IP performance metrice. The Multihomed Mobile Router (MMR) with heterogeneons wireless interfaces measures IP performance metrics on behalf of the MNs inside the mobile network. Then, MNs can get measured IP perfonmnce metries from the MMR using L3 messages. The proposed scheme can reduce burden and power consumption of MNs with limited resource and batty power since MNs don' t measure IP performance metrics directly. In addition, it can reduce considerably traffic overhead over wireless links on multiple measurement paths since signaling messages and injeeted testing traffic are reduced. 展开更多
关键词 performance metrics network mobility HETEROGENEOUS
在线阅读 下载PDF
A Novel Black-Winged Kite Algorithm with Deep Learning for Autism Detection of Privacy Preserved Data
16
作者 Kalyani Nagarajan Sasikumar Rajagopalan 《Journal of Bionic Engineering》 2025年第4期1985-2011,共27页
Autism Spectrum Disorder(ASD)is a complex neurodevelopmental condition that causes multiple challenges in behavioral and communication activities.In the medical field,the data related to ASD,the security measures are ... Autism Spectrum Disorder(ASD)is a complex neurodevelopmental condition that causes multiple challenges in behavioral and communication activities.In the medical field,the data related to ASD,the security measures are integrated in this research responsibly and effectively to develop the Mobile Neuron Attention Stage-by-Stage Network(MNASNet)model,which is the integration of both Mobile Network(MobileNet)and Neuron Attention Stage-by-Stage.The steps followed to detect ASD with privacy-preserved data are data normalization,data augmentation,and K-Anonymization.The clinical data of individuals are taken initially and preprocessed using the Z-score Normalization.Then,data augmentation is performed using the oversampling technique.Subsequently,K-Anonymization is effectuated by utilizing the Black-winged Kite Algorithm to ensure the privacy of medical data,where the best fitness solution is based on data utility and privacy.Finally,after improving the data privacy,the developed approach MNASNet is implemented for ASD detection,which achieves highly accurate results compared to traditional methods to detect autism behavior.Hence,the final results illustrate that the proposed MNASNet achieves an accuracy of 92.9%,TPR of 95.9%,and TNR of 90.9%at the k-samples of 8. 展开更多
关键词 Mobile network Neuron attention stage-by-stage Z-score normalization K-ANONYMIZATION Black-winged Kite Algorithm
在线阅读 下载PDF
Machine Learning-Based Hybrid SSO-MA with Optimized Secure Link State Routing Protocol in Manet
17
作者 Varsha Ashok Khandekar Praveen Gupta 《China Communications》 2025年第3期164-180,共17页
A decentralized network made up of mobile nodes is termed the Mobile Ad-hoc Network(MANET).Mobility and a finite battery lifespan are the two main problems with MANETs.Advanced methods are essential for enhancing MANE... A decentralized network made up of mobile nodes is termed the Mobile Ad-hoc Network(MANET).Mobility and a finite battery lifespan are the two main problems with MANETs.Advanced methods are essential for enhancing MANET security,network longevity,and energy efficiency.Hence,selecting an appropriate cluster.The cluster’s head further boosts the network’s energy effectiveness.As a result,a Hybrid Swallow Swarm Optimisation-Memetic Algorithm(SSO-MA)is suggested to develop the energy efficiency&of the MANET network.Then,to secure the network Abnormality Detection System(ADS)is proposed.The MATLAB-2021a platform is used to implement the suggested technique and conduct the analysis.In terms of network performance,the suggested model outperforms the current Genetic Algorithm,Optimised Link State Routing protocol,and Particle Swarm Optimisation techniques.The performance of the model has a minimum delay in the range of 0.82 seconds and a Packet Delivery Ratio(PDR)of 99.82%.Hence,the validation shows that the Hybrid SSO-MA strategy is superior to the other approaches in terms of efficiency. 展开更多
关键词 attack detection system cluster head selection clustering mobile Ad-hoc network soft k-Means SSO-MA optimization algorithm
在线阅读 下载PDF
Multi-agent cooperative intrusion response in mobile adhoc networks 被引量:6
18
作者 Yi Ping Zou Futai +1 位作者 Jiang Xinghao Li Jianhua 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第4期785-794,共10页
The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermea- s... The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermea- sures are only to protect the networks, and there is no automated network-wide counteraction against detected intrusions, the architecture of cooperation intrusion response based multi-agent is propose. The architecture is composed of mobile agents. Monitor agent resides on every node and monitors its neighbor nodes. Decision agent collects information from monitor nodes and detects an intrusion by security policies. When an intruder is found in the architecture, the block agents will get to the neighbor nodes of the intruder and form the mobile firewall to isolate the intruder. In the end, we evaluate it by simulation. 展开更多
关键词 computer networks SECURITY mobile agent mobile adhoc networks intrusion detection intrusion response
在线阅读 下载PDF
Trust-Based Context-Aware Mobile Social Network Service Recommendation 被引量:4
19
作者 XU Jun ZHONG Yuansheng +1 位作者 ZHU Wenqiang SUN Feifei 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2017年第2期149-156,共8页
The service recommendation mechanism as a key enabling technology that provides users with more proactive and personalized service is one of the important research topics in mobile social network (MSN). Meanwhile, M... The service recommendation mechanism as a key enabling technology that provides users with more proactive and personalized service is one of the important research topics in mobile social network (MSN). Meanwhile, MSN is susceptible to various types of anonymous information or hacker actions. Trust can reduce the risk of interaction with unknown entities and prevent malicious attacks. In our paper, we present a trust-based service recommendation algorithm in MSN that considers users' similarity and friends' familiarity when computing trustworthy neighbors of target users. Firstly, we use the context information and the number of co-rated items to define users' similarity. Then, motivated by the theory of six degrees of space, the friend familiarity is derived by graph-based method. Thus the proposed methods are further enhanced by considering users' context in the recommendation phase. Finally, a set of simulations are conducted to evaluate the accuracy of the algorithm. The results show that the friend familiarity and user similarity can effectively improve the recommendation performance, and the friend familiarity contributes more than the user similarity. 展开更多
关键词 TRUST CONTEXT-AWARE mobile social network RECOMMENDATION
原文传递
Network-Aided Intelligent Traffic Steering in 5G Mobile Networks 被引量:4
20
作者 Dae-Young Kim Seokhoon Kim 《Computers, Materials & Continua》 SCIE EI 2020年第10期243-261,共19页
Recently,the fifth generation(5G)of mobile networks has been deployed and various ranges of mobile services have been provided.The 5G mobile network supports improved mobile broadband,ultra-low latency and densely dep... Recently,the fifth generation(5G)of mobile networks has been deployed and various ranges of mobile services have been provided.The 5G mobile network supports improved mobile broadband,ultra-low latency and densely deployed massive devices.It allows multiple radio access technologies and interworks them for services.5G mobile systems employ traffic steering techniques to efficiently use multiple radio access technologies.However,conventional traffic steering techniques do not consider dynamic network conditions efficiently.In this paper,we propose a network aided traffic steering technique in 5G mobile network architecture.5G mobile systems monitor network conditions and learn with network data.Through a machine learning algorithm such as a feed-forward neural network,it recognizes dynamic network conditions and then performs traffic steering.The proposed scheme controls traffic for multiple radio access according to the ratio of measured throughput.Thus,it can be expected to improve traffic steering efficiency.The performance of the proposed traffic steering scheme is evaluated using extensive computer simulations. 展开更多
关键词 Mobile network 5G traffic steering machine learning MEC
在线阅读 下载PDF
上一页 1 2 13 下一页 到第
使用帮助 返回顶部