期刊文献+
共找到1,053篇文章
< 1 2 53 >
每页显示 20 50 100
Cross-Domain Time Synchronization in Software-Defined Time-Sensitive Networking 被引量:1
1
作者 Zhang Xiaodong Shou Guochu +2 位作者 Li Hongxing Liu Yaqiong Hu Yihong 《China Communications》 2025年第9期289-306,共18页
The rise of time-sensitive applications with broad geographical scope drives the development of time-sensitive networking(TSN)from intra-domain to inter-domain to ensure overall end-to-end connectivity requirements in... The rise of time-sensitive applications with broad geographical scope drives the development of time-sensitive networking(TSN)from intra-domain to inter-domain to ensure overall end-to-end connectivity requirements in heterogeneous deployments.When multiple TSN networks interconnect over non-TSN networks,all devices in the network need to be syn-chronized by sharing a uniform time reference.How-ever,most non-TSN networks are best-effort.Path delay asymmetry and random noise accumulation can introduce unpredictable time errors during end-to-end time synchronization.These factors can degrade syn-chronization performance.Therefore,cross-domain time synchronization becomes a challenging issue for multiple TSN networks interconnected by non-TSN networks.This paper presents a cross-domain time synchronization scheme that follows the software-defined TSN(SD-TSN)paradigm.It utilizes a com-bined control plane constructed by a coordinate con-troller and a domain controller for centralized control and management of cross-domain time synchroniza-tion.The general operation flow of the cross-domain time synchronization process is designed.The mecha-nism of cross-domain time synchronization is revealed by introducing a synchronization model and an error compensation method.A TSN cross-domain proto-type testbed is constructed for verification.Results show that the scheme can achieve end-to-end high-precision time synchronization with accuracy and sta-bility. 展开更多
关键词 cross-domain time synchronization de-terministic communications error compensation software-defined networking(SDN) time-sensitive networking(TSN)
在线阅读 下载PDF
Accurate and efficient elephant-flow classification based on co-trained models in evolved software-defined networks
2
作者 Ling Xia Liao Changqing Zhao +2 位作者 Jian Wang Roy Xiaorong Lai Steve Drew 《Digital Communications and Networks》 2025年第4期1090-1101,共12页
Accurate early classification of elephant flows(elephants)is important for network management and resource optimization.Elephant models,mainly based on the byte count of flows,can always achieve high accuracy,but not ... Accurate early classification of elephant flows(elephants)is important for network management and resource optimization.Elephant models,mainly based on the byte count of flows,can always achieve high accuracy,but not in a time-efficient manner.The time efficiency becomes even worse when the flows to be classified are sampled by flow entry timeout over Software-Defined Networks(SDNs)to achieve a better resource efficiency.This paper addresses this situation by combining co-training and Reinforcement Learning(RL)to enable a closed-loop classification approach that divides the entire classification process into episodes,each involving two elephant models.One predicts elephants and is retrained by a selection of flows automatically labeled online by the other.RL is used to formulate a reward function that estimates the values of the possible actions based on the current states of both models and further adjusts the ratio of flows to be labeled in each phase.Extensive evaluation based on real traffic traces shows that the proposed approach can stably predict elephants using the packets received in the first 10% of their lifetime with an accuracy of over 80%,and using only about 10% more control channel bandwidth than the baseline over the evolved SDNs. 展开更多
关键词 software-defined network Flow classification CO-TRAINING Reinforcement learning Flow entry timeout
在线阅读 下载PDF
DRL-AMIR: Intelligent Flow Scheduling for Software-Defined Zero Trust Networks
3
作者 Wenlong Ke Zilong Li +5 位作者 Peiyu Chen Benfeng Chen Jinglin Lv Qiang Wang Ziyi Jia Shigen Shen 《Computers, Materials & Continua》 2025年第8期3305-3319,共15页
Zero Trust Network(ZTN)enhances network security through strict authentication and access control.However,in the ZTN,optimizing flow control to improve the quality of service is still facing challenges.Software Define... Zero Trust Network(ZTN)enhances network security through strict authentication and access control.However,in the ZTN,optimizing flow control to improve the quality of service is still facing challenges.Software Defined Network(SDN)provides solutions through centralized control and dynamic resource allocation,but the existing scheduling methods based on Deep Reinforcement Learning(DRL)are insufficient in terms of convergence speed and dynamic optimization capability.To solve these problems,this paper proposes DRL-AMIR,which is an efficient flow scheduling method for software defined ZTN.This method constructs a flow scheduling optimization model that comprehensively considers service delay,bandwidth occupation,and path hops.Additionally,it balances the differentiated requirements of delay-critical K-flows,bandwidth-intensive D-flows,and background B-flows through adaptiveweighting.Theproposed framework employs a customized state space comprising node labels,link bandwidth,delaymetrics,and path length.It incorporates an action space derived fromnode weights and a hybrid reward function that integrates both single-step and multi-step excitation mechanisms.Based on these components,a hierarchical architecture is designed,effectively integrating the data plane,control plane,and knowledge plane.In particular,the adaptive expert mechanism is introduced,which triggers the shortest path algorithm in the training process to accelerate convergence,reduce trial and error costs,and maintain stability.Experiments across diverse real-world network topologies demonstrate that DRL-AMIR achieves a 15–20%reduction in K-flow transmission delays,a 10–15%improvement in link bandwidth utilization compared to SPR,QoSR,and DRSIR,and a 30%faster convergence speed via adaptive expert mechanisms. 展开更多
关键词 Zero trust network software-defined networking deep reinforcement learning flow scheduling
在线阅读 下载PDF
Detecting and Mitigating Distributed Denial of Service Attacks in Software-Defined Networking
4
作者 Abdullah M.Alnajim Faisal Mohammed Alotaibi Sheroz Khan 《Computers, Materials & Continua》 2025年第6期4515-4535,共21页
Distributed denial of service(DDoS)attacks are common network attacks that primarily target Internet of Things(IoT)devices.They are critical for emerging wireless services,especially for applications with limited late... Distributed denial of service(DDoS)attacks are common network attacks that primarily target Internet of Things(IoT)devices.They are critical for emerging wireless services,especially for applications with limited latency.DDoS attacks pose significant risks to entrepreneurial businesses,preventing legitimate customers from accessing their websites.These attacks require intelligent analytics before processing service requests.Distributed denial of service(DDoS)attacks exploit vulnerabilities in IoT devices by launchingmulti-point distributed attacks.These attacks generate massive traffic that overwhelms the victim’s network,disrupting normal operations.The consequences of distributed denial of service(DDoS)attacks are typically more severe in software-defined networks(SDNs)than in traditional networks.The centralised architecture of these networks can exacerbate existing vulnerabilities,as these weaknesses may not be effectively addressed in this model.The preliminary objective for detecting and mitigating distributed denial of service(DDoS)attacks in software-defined networks(SDN)is to monitor traffic patterns and identify anomalies that indicate distributed denial of service(DDoS)attacks.It implements measures to counter the effects ofDDoS attacks,and ensure network reliability and availability by leveraging the flexibility and programmability of SDN to adaptively respond to threats.The authors present a mechanism that leverages the OpenFlow and sFlow protocols to counter the threats posed by DDoS attacks.The results indicate that the proposed model effectively mitigates the negative effects of DDoS attacks in an SDN environment. 展开更多
关键词 software-defined networking(SDN) distributed denial of service(DDoS)attack sampling Flow(sFlow) OpenFlow OpenDaylight controller
在线阅读 下载PDF
OTP-Based Software-Defined Cloud Architecture for Secure Dynamic Routing
5
作者 Tae Woo Kim Yi Pan Jong Hyuk Park 《Computers, Materials & Continua》 SCIE EI 2022年第4期1035-1049,共15页
In the current era,anyone can freely access the Internet thanks to the development of information and communication technology.The cloud is attracting attention due to its ability to meet continuous user demands for r... In the current era,anyone can freely access the Internet thanks to the development of information and communication technology.The cloud is attracting attention due to its ability to meet continuous user demands for resources.Additionally,Cloud is effective for systems with large data flow such as the Internet of Things(IoT)systems and Smart Cities.Nonetheless,the use of traditional networking technology in the cloud causes network traffic overload and network security problems.Therefore,the cloud requires efficient networking technology to solve the existing challenges.In this paper,we propose one-time password-based software-defined cloud architecture for secure dynamic routing to mitigating the above-mention issues.The proposed cloud architecture provides a secure data path through dynamic routing using One-Time Internet Protocol(OTIP)algorithm between each layer.On the network side,we use software-defined technology to provide efficient network management and data security.We introduce a software-defined cloud architecture that applies OTIP algorithms for secure dynamic routing.We conduct a comparative analysis between general IP communication and proposed OTIP communication architecture.It evaluates the performance of OTIP algorithms.Finally,we examine the proposed software-defined cloud architecture,including how to apply OTIP in secure dynamic routing according to the results of the comparative analysis. 展开更多
关键词 Secure routing dynamic routing one-time password softwaredefined network software-defined perimeter cloud computing
在线阅读 下载PDF
ON A PERIMETER-PRESERVING PLANE CURVE FLOW 被引量:6
6
作者 Pan ShengliangDept. of Math.,East China Normal Univ.,Shanghai 200062. 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2001年第4期409-417,共9页
The purpose of this paper is to investigate a new type of evolution problem for closed convex plane curves which will preserves the perimeter of the curve but expands the enclosed area and the final limiting curve is ... The purpose of this paper is to investigate a new type of evolution problem for closed convex plane curves which will preserves the perimeter of the curve but expands the enclosed area and the final limiting curve is a circle in the Hausdorff metric in the plane. 展开更多
关键词 Convex curve curve flow perimeter preserving.
在线阅读 下载PDF
On Reliability-optimized Controller Placement for Software-Defined Networks 被引量:26
7
作者 HU Yannan WANG Wendong GONG Xiangyang QUE Xirong CHENG Shiduan 《China Communications》 SCIE CSCD 2014年第2期38-54,共17页
By decoupling control plane and data plane,Software-Defined Networking(SDN) approach simplifies network management and speeds up network innovations.These benefits have led not only to prototypes,but also real SDN dep... By decoupling control plane and data plane,Software-Defined Networking(SDN) approach simplifies network management and speeds up network innovations.These benefits have led not only to prototypes,but also real SDN deployments.For wide-area SDN deployments,multiple controllers are often required,and the placement of these controllers becomes a particularly important task in the SDN context.This paper studies the problem of placing controllers in SDNs,so as to maximize the reliability of SDN control networks.We present a novel metric,called expected percentage of control path loss,to characterize the reliability of SDN control networks.We formulate the reliability-aware control placement problem,prove its NP-hardness,and examine several placement algorithms that can solve this problem.Through extensive simulations using real topologies,we show how the number of controllers and their placement influence the reliability of SDN control networks.Besides,we also found that,through strategic controller placement,the reliability of SDN control networks can be significantly improved without introducing unacceptable switch-to-controller latencies. 展开更多
关键词 software-defined Networking controller placement RELIABILITY networkoptimization
在线阅读 下载PDF
A Survey: Typical Security Issues of Software-Defined Networking 被引量:12
8
作者 Yifan Liu Bo Zhao +2 位作者 Pengyuan Zhao Peiru Fan Hui Liu 《China Communications》 SCIE CSCD 2019年第7期13-31,共19页
Software-Defined Networking (SDN) has been a hot topic for future network development, which implements the different layers of control plane and data plane respectively. Despite providing high openness and programmab... Software-Defined Networking (SDN) has been a hot topic for future network development, which implements the different layers of control plane and data plane respectively. Despite providing high openness and programmability, the “three-layer two-interface” architecture of SDN changes the traditional network and increases the network attack nodes, which results in new security issues. In this paper, we firstly introduced the background, architecture and working process of SDN. Secondly, we summarized and analyzed the typical security issues from north to south: application layer, northbound interface, control layer, southbound interface and data layer. Another contribution is to review and analyze the existing solutions and latest research progress of each layer, mainly including: authorized authentication module, application isolation, DoS/DDoS defense, multi-controller deployment and flow rule consistency detection. Finally, a conclusion about the future works of SDN security and an idealized global security architecture is proposed. 展开更多
关键词 software-defined NETWORKING network SECURITY global SECURITY SECURITY THREAT
在线阅读 下载PDF
Quality of Service Improvement with Optimal Software-Defined Networking Controller and Control Plane Clustering 被引量:12
9
作者 Jehad Ali Byeong-hee Roh 《Computers, Materials & Continua》 SCIE EI 2021年第4期849-875,共27页
The controller is indispensable in software-defined networking(SDN).With several features,controllers monitor the network and respond promptly to dynamic changes.Their performance affects the quality-of-service(QoS)in... The controller is indispensable in software-defined networking(SDN).With several features,controllers monitor the network and respond promptly to dynamic changes.Their performance affects the quality-of-service(QoS)in SDN.Every controller supports a set of features.However,the support of the features may be more prominent in one controller.Moreover,a single controller leads to performance,single-point-of-failure(SPOF),and scalability problems.To overcome this,a controller with an optimum feature set must be available for SDN.Furthermore,a cluster of optimum feature set controllers will overcome an SPOF and improve the QoS in SDN.Herein,leveraging an analytical network process(ANP),we rank SDN controllers regarding their supporting features and create a hierarchical control plane based cluster(HCPC)of the highly ranked controller computed using the ANP,evaluating their performance for the OS3E topology.The results demonstrated in Mininet reveal that a HCPC environment with an optimum controller achieves an improved QoS.Moreover,the experimental results validated in Mininet show that our proposed approach surpasses the existing distributed controller clustering(DCC)schemes in terms of several performance metrics i.e.,delay,jitter,throughput,load balancing,scalability and CPU(central processing unit)utilization. 展开更多
关键词 QUALITY-OF-SERVICE software-defined networking CONTROLLER hierarchical control plane clustering SCALABILITY
在线阅读 下载PDF
Estimating the minimum in-stream flow requirements via wetted perimeter method based on curvature and slope techniques 被引量:2
10
作者 LIU Suxia' MO Xingguo +4 位作者 XIA Jun LIU Changming LINZhonghui MEN Baohui JI Lina 《Journal of Geographical Sciences》 SCIE CSCD 2006年第2期242-250,共9页
Under the assumptions of triangular cross section channel and uniform stable flow, an analytical solution of the minimum ecological in-stream flow requirement (MEIFR) is deduced. Based on the analytical solution, th... Under the assumptions of triangular cross section channel and uniform stable flow, an analytical solution of the minimum ecological in-stream flow requirement (MEIFR) is deduced. Based on the analytical solution, the uncertainty of the wetted perimeter method is analyzed by comparing the two techniques for the determination of the critical point on the relationship curve between wetted perimeter, P and discharge, Q. It is clearly shown that the results of MEIFR based on curvature technique (corresponding to the maximum curvature) and slope technique (slope being 1) are significantly different. On the P-Q curve, the slope of the critical point with the maximum curvature is 0.39 and the MEIFR varied prominently with the change of the slope threshold. This indicates that if a certain value of the slope threshold is not available for slope technique, curvature technique may be a better choice. By applying the analytical solution of MEIFR in the losing rivers of the Western Route South-to-North Water Transfer Project in China, the MEIFR value via curvature technique is 2.5%-23.7% of the multi-year average annual discharge, while that for slope technique is 11%-105.7%. General conclusions would rely on the more detailed research for all kinds of cross-sections. 展开更多
关键词 uncertainty wetted perimeter minimum in-stream flow requirements analytical solution Western Routhe South-to-North Water Transfer Project in China
在线阅读 下载PDF
Perimeter traffic control strategy based on macroscopic fundamental diagrams 被引量:5
11
作者 Xu Jianmin Yan Xiao wen +1 位作者 Ma Yingying Jing Binbin 《Journal of Southeast University(English Edition)》 EI CAS 2017年第4期502-510,共9页
A perimeter traffic signal control strategy is proposed based on the macroscopic fundamental diagram theory(MFD)to solve the signal control problem in oversaturated states.First,the MFD of a specific regional network ... A perimeter traffic signal control strategy is proposed based on the macroscopic fundamental diagram theory(MFD)to solve the signal control problem in oversaturated states.First,the MFD of a specific regional network can be derived using VSS IM simulation software.Secondly,the maximum number of cumulative vehicles that the network can accommodate is determined based on the MFD.Then,through monitoring the influx flow,the number of vehicles existing in and exiting from the network,a perimeter traffic control model is proposed to optimize the signal timing of the boundary intersections.Finally,a virtual network simulation model is established and three different kinds o f traffic demand are loaded into the network.Simulation results show that a fer the strategy implementation,the number o f vehicles accumulating in the network can be kept near the optimal value,while the number o f both entering and exiting vehicles increases significantly and the road network can be maintained at a large capacity.Simultaneously,the queue length at the approach of the border intersections is reasonably controlled and vehicles entering and exiting the network can maintain a more efficient and stable speed.The network performance indices such as the average traffic delay and average number of stops can be improved to a certain degree,thus verifying the effectiveness and feasibility of the perimeter control strategy. 展开更多
关键词 macroscopic fundamental diagram perimeter control green duration optimization microscopic simulation
在线阅读 下载PDF
On the use of the genetic programming for balanced load distribution in software-defined networks 被引量:4
12
作者 Shahram Jamali Amin Badirzadeh Mina Soltani Siapoush 《Digital Communications and Networks》 SCIE 2019年第4期288-296,共9页
As a new networking paradigm,Software-Defined Networking(SDN)enables us to cope with the limitations of traditional networks.SDN uses a controller that has a global view of the network and switch devices which act as ... As a new networking paradigm,Software-Defined Networking(SDN)enables us to cope with the limitations of traditional networks.SDN uses a controller that has a global view of the network and switch devices which act as packet forwarding hardware,known as“OpenFlow switches”.Since load balancing service is essential to distribute workload across servers in data centers,we propose an effective load balancing scheme in SDN,using a genetic programming approach,called Genetic Programming based Load Balancing(GPLB).We formulate the problem to find a path:1)with the best bottleneck switch which has the lowest capacity within bottleneck switches of each path,2)with the shortest path,and 3)requiring the less possible operations.For the purpose of choosing the real-time least loaded path,GPLB immediately calculates the integrated load of paths based on the information that receives from the SDN controller.Hence,in this design,the controller sends the load information of each path to the load balancing algorithm periodically and then the load balancing algorithm returns a least loaded path to the controller.In this paper,we use the Mininet emulator and the OpenDaylight controller to evaluate the effectiveness of the GPLB.The simulative study of the GPLB shows that there is a big improvement in performance metrics and the latency and the jitter are minimized.The GPLB also has the maximum throughput in comparison with related works and has performed better in the heavy traffic situation.The results show that our model stands smartly while not increasing further overhead. 展开更多
关键词 software-defined networking OpenFlow Mininet OpenDaylight Load balancing
在线阅读 下载PDF
Challenge-based collaborative intrusion detection in software-defined networking: An evaluation 被引量:4
13
作者 Wenjuan Li Yu Wang +3 位作者 Zhiping Jin Keping Yu Jin Li Yang Xiang 《Digital Communications and Networks》 SCIE CSCD 2021年第2期257-263,共7页
Software-Defined Networking(SDN)is an emerging architecture that enables a computer network to be intelligently and centrally controlled via software applications.It can help manage the whole network environment in a ... Software-Defined Networking(SDN)is an emerging architecture that enables a computer network to be intelligently and centrally controlled via software applications.It can help manage the whole network environment in a consistent and holistic way,without the need of understanding the underlying network structure.At present,SDN may face many challenges like insider attacks,i.e.,the centralized control plane would be attacked by malicious underlying devices and switches.To protect the security of SDN,effective detection approaches are indispensable.In the literature,challenge-based collaborative intrusion detection networks(CIDNs)are an effective detection framework in identifying malicious nodes.It calculates the nodes'reputation and detects a malicious node by sending out a special message called a challenge.In this work,we devise a challenge-based CIDN in SDN and measure its performance against malicious internal nodes.Our results demonstrate that such a mechanism can be effective in SDN environments. 展开更多
关键词 software-defined networking Trust management Collaborative intrusion detection Insider attack Challenge mechanism
在线阅读 下载PDF
Orchestrating Network Functions in Software-Defined Networks 被引量:2
14
作者 Hongchao Hu Lin Pang +1 位作者 Zhenpeng Wang Guozhen Cheng 《China Communications》 SCIE CSCD 2017年第2期104-117,共14页
Software.defined networking(SDN) enables third.part companies to participate in the network function innovations. A number of instances for one network function will inevitably co.exist in the network. Although some o... Software.defined networking(SDN) enables third.part companies to participate in the network function innovations. A number of instances for one network function will inevitably co.exist in the network. Although some orchestration architecture has been proposed to chain network functions, rare works are focused on how to optimize this process. In this paper, we propose an optimized model for network function orchestration, function combination model(FCM). Our main contributions are as following. First, network functions are featured with a new abstraction, and are open to external providers. And FCM identifies network functions using unique type, and organizes their instances distributed over the network with the appropriate way. Second, with the specialized demands, we can combine function instances under the global network views, and formulate it into the problem of Boolean linear program(BLP). A simulated annealing algorithm is designed to approach optimal solution for this BLP. Finally, the numerical experiment demonstrates that our model can create outstanding composite schemas efficiently. 展开更多
关键词 software-defined network network function function orchestrating
在线阅读 下载PDF
EARS: Intelligence-Driven Experiential Network Architecture for Automatic Routing in Software-Defined Networking 被引量:8
15
作者 Yuxiang Hu Ziyong Li +2 位作者 Julong Lan Jiangxing Wu Lan Yao 《China Communications》 SCIE CSCD 2020年第2期149-162,共14页
Software-Defined Networking(SDN)adapts logically-centralized control by decoupling control plane from data plane and provides the efficient use of network resources.However,due to the limitation of traditional routing... Software-Defined Networking(SDN)adapts logically-centralized control by decoupling control plane from data plane and provides the efficient use of network resources.However,due to the limitation of traditional routing strategies relying on manual configuration,SDN may suffer from link congestion and inefficient bandwidth allocation among flows,which could degrade network performance significantly.In this paper,we propose EARS,an intelligence-driven experiential network architecture for automatic routing.EARS adapts deep reinforcement learning(DRL)to simulate the human methods of learning experiential knowledge,employs the closed-loop network control mechanism incorporating with network monitoring technologies to realize the interaction with network environment.The proposed EARS can learn to make better control decision from its own experience by interacting with network environment and optimize the network intelligently by adjusting services and resources offered based on network requirements and environmental conditions.Under the network architecture,we design the network utility function with throughput and delay awareness,differentiate flows based on their size characteristics,and design a DDPGbased automatic routing algorithm as DRL decision brain to find the near-optimal paths for mice and elephant flows.To validate the network architecture,we implement it on a real network environment.Extensive simulation results show that EARS significantly improve the network throughput and reduces the average packet delay in comparison with baseline schemes(e.g.OSPF,ECMP). 展开更多
关键词 software-defined networking(SDN) intelligence-driven experiential network deep reinforcement learning(DRL) automatic routing
在线阅读 下载PDF
Software-Defined Networking 被引量:2
16
作者 Zhili Sun Jiandong Li Kun Yang 《ZTE Communications》 2014年第2期1-2,共2页
Software- defined networking (SDN) is a promising technology for next-generation networking and has attracted much attention from academics, network equipment manufacturer, network operators, and service providers. ... Software- defined networking (SDN) is a promising technology for next-generation networking and has attracted much attention from academics, network equipment manufacturer, network operators, and service providers. It has found center, and enterprise networks. applications in mobile, data The SDN architecture has a centralized, programmable control plane that is separate from the data plane. SDN also provides the ability to control and manage virtualized resources and networks without requiring new hardware technologies. This is a major shift in networking technologies. 展开更多
关键词 OpenFlow WORK NET software-defined Networking NFV
在线阅读 下载PDF
A Game-Theoretic Approach to Elastic Control in Software-Defined Networking 被引量:7
17
作者 Hongchang Chen Guozhen Cheng Zhiming Wang 《China Communications》 SCIE CSCD 2016年第5期103-109,共7页
Elastic control could balance the distributed control plane in Software-Defined Networking(SDN). Dynamic switch migration has been proposed to achieve it. However, existing schemes mainly focus on how to execute migra... Elastic control could balance the distributed control plane in Software-Defined Networking(SDN). Dynamic switch migration has been proposed to achieve it. However, existing schemes mainly focus on how to execute migration operation, but not why. This paper designs a decision-making mechanism based on zero-sum game theory to reelect a new controller as the master for migrated switches. It first chooses a switch for migration in the heavy controller which invites its neighbors as the game players to compete for the master role of this switch in the game-playing field(GPF) which is an occasional and loose domain for game-playing. Second, based on the concept of GPF, we design a decentralized strategy to play the game and determine which player as the final master. We implement it by extending the Open Flow protocol. Finally, numerical results demonstrate that our distributed strategy can approach elastic control plane with better performance. 展开更多
关键词 software-defined networking master election game theory OpenFlow
在线阅读 下载PDF
A Multi-Agent Reinforcement Learning-Based Collaborative Jamming System: Algorithm Design and Software-Defined Radio Implementation 被引量:2
18
作者 Luguang Wang Fei Song +5 位作者 Gui Fang Zhibin Feng Wen Li Yifan Xu Chen Pan Xiaojing Chu 《China Communications》 SCIE CSCD 2022年第10期38-54,共17页
In multi-agent confrontation scenarios, a jammer is constrained by the single limited performance and inefficiency of practical application. To cope with these issues, this paper aims to investigate the multi-agent ja... In multi-agent confrontation scenarios, a jammer is constrained by the single limited performance and inefficiency of practical application. To cope with these issues, this paper aims to investigate the multi-agent jamming problem in a multi-user scenario, where the coordination between the jammers is considered. Firstly, a multi-agent Markov decision process (MDP) framework is used to model and analyze the multi-agent jamming problem. Secondly, a collaborative multi-agent jamming algorithm (CMJA) based on reinforcement learning is proposed. Finally, an actual intelligent jamming system is designed and built based on software-defined radio (SDR) platform for simulation and platform verification. The simulation and platform verification results show that the proposed CMJA algorithm outperforms the independent Q-learning method and provides a better jamming effect. 展开更多
关键词 multi-agent reinforcement learning intelligent jamming collaborative jamming software-defined radio platform
在线阅读 下载PDF
Contribution of Geomatics to the Delimitation of Protection Perimeters: Case of Agbo River in Agboville (South-East of Côte d’Ivoire) 被引量:1
19
作者 Gabriel Etienne Ake Anowa Evrade Larissa Eba +4 位作者 Louan Odile Ble Aïchatou Adebayo Jean Jaurès Assi Mahaman Bachir Saley Jean Biemi 《Journal of Environmental Protection》 2020年第6期470-490,共21页
The present study aims to delimit protection perimeters around the “Agbo” river in Agboville in order to reduce the risks of pollution of this water resource. The methodological approach consisted first all in asses... The present study aims to delimit protection perimeters around the “Agbo” river in Agboville in order to reduce the risks of pollution of this water resource. The methodological approach consisted first all in assessing the vulnerability of the resource and then in determining the protection perimeters based on the vulnerability map and previous studies. Five parameters (slope, land use, soil type, annual runoff and drainage density) were used. These parameters were then weighted using the Saaty multicriteria analysis method. The vulnerability map reveals four classes (very low, low, medium and high) with a dominance of the low class (41.35% of the area). Three protection perimeters were delineated (immediate, close and remote). The immediate protection perimeter is delimited at a distance of 200 m around the SODECI water intake on the “Agbo” river and covers the areas with a strong influence on the vulnerability to pollution of the river. The closer protection perimeter at a distance of 1000 m, is represented by the zones with strong influence on the vulnerability of the resource and the direction of water flow in the watershed. Finally, the remote protection perimeter covers a large part of the catchment area with a surface area of 510.36 km2 and takes into account the zones that have an influence on the vulnerability to pollution of the resource. These delimited protection perimeters can serve as a guide for the management and protection of the water intake in Agboville as well as for land use planning in this area. 展开更多
关键词 VULNERABILITY Protection of perimeters Multicriteria Analysis Agboville Côte d’Ivoire
在线阅读 下载PDF
Human intrusion detection for high-speed railway perimeter under all-weather condition 被引量:2
20
作者 Pengyue Guo Tianyun Shi +1 位作者 Zhen Ma Jing Wang 《Railway Sciences》 2024年第1期97-110,共14页
Purpose – The paper aims to solve the problem of personnel intrusion identification within the limits of highspeed railways. It adopts the fusion method of millimeter wave radar and camera to improve the accuracy ofo... Purpose – The paper aims to solve the problem of personnel intrusion identification within the limits of highspeed railways. It adopts the fusion method of millimeter wave radar and camera to improve the accuracy ofobject recognition in dark and harsh weather conditions.Design/methodology/approach – This paper adopts the fusion strategy of radar and camera linkage toachieve focus amplification of long-distance targets and solves the problem of low illumination by laser lightfilling of the focus point. In order to improve the recognition effect, this paper adopts the YOLOv8 algorithm formulti-scale target recognition. In addition, for the image distortion caused by bad weather, this paper proposesa linkage and tracking fusion strategy to output the correct alarm results.Findings – Simulated intrusion tests show that the proposed method can effectively detect human intrusionwithin 0–200 m during the day and night in sunny weather and can achieve more than 80% recognitionaccuracy for extreme severe weather conditions.Originality/value – (1) The authors propose a personnel intrusion monitoring scheme based on the fusion ofmillimeter wave radar and camera, achieving all-weather intrusion monitoring;(2) The authors propose a newmulti-level fusion algorithm based on linkage and tracking to achieve intrusion target monitoring underadverse weather conditions;(3) The authors have conducted a large number of innovative simulationexperiments to verify the effectiveness of the method proposed in this article. 展开更多
关键词 High-speed rail perimeter Personnel invasion Object detection ALL-WEATHER Radar-camera fusion
在线阅读 下载PDF
上一页 1 2 53 下一页 到第
使用帮助 返回顶部