期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
Information theory based clustering of cellular network usage data for the identification of representative urban areas
1
作者 Mihaela I.Chidean Luis Ignacio Jiménez Gil +1 位作者 Javier Carmona-Murillo David Cortés-Polo 《Digital Communications and Networks》 CSCD 2024年第6期1677-1685,共9页
The exponential growth of the number of network devices in recent years not only entails the need for automation of management tasks,but also leads to the increase of available network data and metadata.5G and beyond ... The exponential growth of the number of network devices in recent years not only entails the need for automation of management tasks,but also leads to the increase of available network data and metadata.5G and beyond standards already cover those requirements and also include the need to define and use machine learning techniques to take advantage of the data acquired,especially using geolocated Call Detail Record(CDR)data sets.However,this scenario requires novel cellular network analysis methodologies to exploit all these available data,especially for the network usage pattern in order to ease the management tasks.In this work,a novel method based on information theory metrics like the Kullback-Leibler divergence and data classification algorithms is proposed to identify representative urban areas in terms of the network usage pattern.Methodology validation is performed via computer analysis using the Open Big Data CDR data set in the Milan area for different scenarios.Obtained results validate the proposed methodology and also reveal its adaptability in terms of specific scenario characteristics.Network usage patterns are calculated for each representative area,paving the path to several future research lines in network management,such as network usage prediction based on this methodology and using the comportment time series. 展开更多
关键词 CLUSTERING 5G Network analysis Multi-feature analysis Kullback-Leibler divergence Cellular networks
在线阅读 下载PDF
Flooding attack and defence in Ad hoc networks 被引量:5
2
作者 Yi Ping Hou Yafei +2 位作者 Zhong Yiping Zhang Shiyong Dai Zhoulin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第2期410-416,共7页
Mobile ad hoc networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. T... Mobile ad hoc networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. The new DOS attack, called AA hoc Flooding Attack(AHFA), is that intruder broadcasts mass Route Request packets to exhaust the communication bandwidth and node resource so that the valid communication can not be kept. After analyzed AM hoc Flooding Attack, we develop Flooding Attack Prevention (FAP), a genetic defense against the AM hoc Flooding Attack. When the intruder broadcasts exceeding packets of Route Request, the immediate neighbors of the intruder record the rate of Route Request. Once the threshold is exceeded, nodes deny any future request packets from the intruder. The results of our implementation show FAP can prevent the AM hoe Flooding attack efficiently. 展开更多
关键词 computer networks SECURITY mobile Ad hoe networks routing protocol denial of service Ad hoc flooding attack.
在线阅读 下载PDF
Performance study on Gossip-based group key distribution protocal
3
作者 Yao Yan Ma Jianqing Zhong Yiping Zhang Shiyong 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第3期699-704,F0003,共7页
Group key distribution is faced with two important problems, i.e. reliability and scalability, to support security multicast for large and dynamic groups. With group member increasing, traditional reliable multicast p... Group key distribution is faced with two important problems, i.e. reliability and scalability, to support security multicast for large and dynamic groups. With group member increasing, traditional reliable multicast protocol can not deal with them fully. Gossip-based group key distribution idea for wide-area dissemination was provided. It is based on an gossip-based loss recovery control mechanism. It can provide a probabilistic reliable guarantee for a information dissemination to reach every group member, which can achieve scalability and reliability. To achieve full reliability, three layers protocol model in group key distribution was provided. One is best effect layer, which provides unreliable dissemination. Other is gossip-based loss recovery layer, which provides probabilistic reliable guarantee. Last is vsync-based layer, which provide deterministic loss recovery. We integrate probabilistic loss recovery method with deterministic one. The model possess scalability that probabilistic method has and full reliability prosthesis by vsync-based. To evaluate the effectiveness of gossip technique in scalable and reliable multicast protocols. We have compared gossip protocol with other reliable multicast protocols. Experimental result shows that gossip protocol has better scalability than other. 展开更多
关键词 key management group key distribution gossip-based reliable multicast RELIABILITY scalability.
在线阅读 下载PDF
IMPROVEMENTS TO THE PASSIVE LOSSLESS SNUBBERS FOR POWER BRIDGE LEGS
4
作者 Barry W. Williams Stephen J. Finney 《Journal of Electronics(China)》 2001年第3期260-266,共7页
The paper considers three common snubber circuits used on gate turn-off thyristor and/or insulated gate bipolar transistor inverters. The three snubbers are passive lossless circuits for power bridge legs, and the imp... The paper considers three common snubber circuits used on gate turn-off thyristor and/or insulated gate bipolar transistor inverters. The three snubbers are passive lossless circuits for power bridge legs, and the improvements and modifications to these snubber circuits are presented. The comparative features and operation of the three improved energy recovery snubbers are discussed and supported by PSPICE simulations and experimental results. 展开更多
关键词 Snubber Inverter THYRISTOR TRANSISTOR
在线阅读 下载PDF
Efficient Dynamic Time Warping by Adaptively Controlling the Valid Warping Range
5
作者 Seok-Woo Jang Gye-Young Kim +1 位作者 Young-Jae Park Hyung-Il Choi 《Journal of Measurement Science and Instrumentation》 CAS 2010年第S1期168-172,共5页
Dynamic time warping(DTW)spends most of the time in generating the correlation table,and it establishes the global path constraints to reduce the time complexity.However,the global constraints restrain just in terms o... Dynamic time warping(DTW)spends most of the time in generating the correlation table,and it establishes the global path constraints to reduce the time complexity.However,the global constraints restrain just in terms of the time axis.In this paper,we therefore propose another version of DTW,to be called branch-and-bound DTW(BnB-DTW),which adaptively controb its global path constraints by reflecting the contents of input patterns. Experimental results show that the suggested BnB-DTW algorithm performs more efficiently than other conventional DTW approaches while not increasing the optimal warping cost. 展开更多
关键词 COMPONENT time series dynamic time warping valid range pruning
在线阅读 下载PDF
A COMPLETE COMPOSITE GTO MODEL FOR CIRCUIT SIMULATIONS
6
作者 Barry W. Williams 《Journal of Electronics(China)》 1998年第2期130-137,共8页
The paper presents a complete composite gate turn-off thyristor (GTO) model, which is based on the combination of the p-n-p and n-p-n transistor models. PSpice simulations and parametric sensitive analysis are perform... The paper presents a complete composite gate turn-off thyristor (GTO) model, which is based on the combination of the p-n-p and n-p-n transistor models. PSpice simulations and parametric sensitive analysis are performed with the complete composite model and calculated results are given, which show that it corresponds statically and dynamically with the practical device. In particular, the GTO gate dynamical characteristics in practical circuits are discussed and experimental results are included. 展开更多
关键词 GTO SIMULATION MODEL
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部