期刊文献+
共找到754篇文章
< 1 2 38 >
每页显示 20 50 100
Service-aware 6G:An intelligent and open network based on the convergence of communication,computing and caching 被引量:89
1
作者 Yiqing Zhou Ling Liu +6 位作者 Lu Wang Ning Hui Xinyu Cui Jie Wu Yan Peng Yanli Qi Chengwen Xing 《Digital Communications and Networks》 SCIE 2020年第3期253-260,共8页
With the proliferation of the Internet of Things(IoT),various services are emerging with totally different features and requirements,which cannot be supported by the current fifth generation of mobile cellular network... With the proliferation of the Internet of Things(IoT),various services are emerging with totally different features and requirements,which cannot be supported by the current fifth generation of mobile cellular networks(5G).The future sixth generation of mobile cellular networks(6G)is expected to have the capability to support new and unknown services with changing requirements.Hence,in addition to enhancing its capability by 10–100 times compared with 5G,6G should also be intelligent and open to adapt to the ever-changing services in the IoT,which requires a convergence of Communication,Computing and Caching(3C).Based on the analysis of the requirements of new services for 6G,this paper identifies key enabling technologies for an intelligent and open 6G network,all featured with 3C convergence.These technologies cover fundamental and emerging topics,including 3C-based spectrum management,radio channel construction,delay-aware transmission,wireless distributed computing,and network self-evolution.From the detailed analysis of these 3C-based technologies presented in this paper,we can see that although they are promising to enable an intelligent and open 6G,more efforts are needed to realize the expected 6G network. 展开更多
关键词 6G Convergence of 3C INTELLIGENT OPEN IOT
在线阅读 下载PDF
Security Architecture of Trusted Virtual Machine Monitor for Trusted Computing 被引量:2
2
作者 HUANG Qiang SHEN Changxiang FANG Yanxiang 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期13-16,共4页
With analysis of limitations Trusted Computing Group (TCG) has encountered, we argued that virtual machine monitor (VMM) is the appropriate architecture for implementing TCG specification. Putting together the VMM... With analysis of limitations Trusted Computing Group (TCG) has encountered, we argued that virtual machine monitor (VMM) is the appropriate architecture for implementing TCG specification. Putting together the VMM architecture, TCG hardware and application-oriented "thin" virtual machine (VM), Trusted VMM-based security architecture is present in this paper with the character of reduced and distributed trusted computing base (TCB). It provides isolation and integrity guarantees based on which general security requirements can be satisfied. 展开更多
关键词 trusted computing virtual machine monitor(VMM) separation kernel trusted computing base (TCB)
在线阅读 下载PDF
Dominance-based rough set approach as a paradigm of knowledge discovery and granular computing
3
作者 Roman Slowinski 《重庆邮电大学学报(自然科学版)》 北大核心 2010年第6期708-719,共12页
Dominance-based rough set approach(DRSA) permits representation and analysis of all phenomena involving monotonicity relationship between some measures or perceptions.DRSA has also some merits within granular computin... Dominance-based rough set approach(DRSA) permits representation and analysis of all phenomena involving monotonicity relationship between some measures or perceptions.DRSA has also some merits within granular computing,as it extends the paradigm of granular computing to ordered data,specifies a syntax and modality of information granules which are appropriate for dealing with ordered data,and enables computing with words and reasoning about ordered data.Granular computing with ordered data is a very general paradigm,because other modalities of information constraints,such as veristic,possibilistic and probabilistic modalities,have also to deal with ordered value sets(with qualifiers relative to grades of truth,possibility and probability),which gives DRSA a large area of applications. 展开更多
关键词 rough sets dominance-based rough set approach(DRSA) ordinal classification variable-consistency DRSA monotonic decision rules granular computing
在线阅读 下载PDF
Quantum Circuit Implementation and Resource Evaluation of Ballet‑p/k Under Grover’s Attack
4
作者 HONG Rui-Peng ZHANG Lei +3 位作者 PANG Chen-Xu LI Guo-Yuan DING Ding WANG Jian-Xin 《密码学报(中英文)》 北大核心 2025年第5期1178-1194,共17页
The advent of Grover’s algorithm presents a significant threat to classical block cipher security,spurring research into post-quantum secure cipher design.This study engineers quantum circuit implementations for thre... The advent of Grover’s algorithm presents a significant threat to classical block cipher security,spurring research into post-quantum secure cipher design.This study engineers quantum circuit implementations for three versions of the Ballet family block ciphers.The Ballet‑p/k includes a modular-addition operation uncommon in lightweight block ciphers.Quantum ripple-carry adder is implemented for both“32+32”and“64+64”scale to support this operation.Subsequently,qubits,quantum gates count,and quantum circuit depth of three versions of Ballet algorithm are systematically evaluated under quantum computing model,and key recovery attack circuits are constructed based on Grover’s algorithm against each version.The comprehensive analysis shows:Ballet-128/128 fails to NIST Level 1 security,while when the resource accounting is restricted to the Clifford gates and T gates set for the Ballet-128/256 and Ballet-256/256 quantum circuits,the design attains Level 3. 展开更多
关键词 Grover’s algorithm quantum circuit Ballet family block ciphers quantum ripple-carry adder
在线阅读 下载PDF
Computing over Space:Status,Challenges,and Opportunities
5
作者 Yaoqi Liu Yinhe Han +3 位作者 Hongxin Li Shuhao Gu Jibing Qiu Ting Li 《Engineering》 2025年第11期20-25,共6页
1.Introduction The rapid expansion of satellite constellations in recent years has resulted in the generation of massive amounts of data.This surge in data,coupled with diverse application scenarios,underscores the es... 1.Introduction The rapid expansion of satellite constellations in recent years has resulted in the generation of massive amounts of data.This surge in data,coupled with diverse application scenarios,underscores the escalating demand for high-performance computing over space.Computing over space entails the deployment of computational resources on platforms such as satellites to process large-scale data under constraints such as high radiation exposure,restricted power consumption,and minimized weight. 展开更多
关键词 satellite constellations deployment computational resources data processing space computing radiation exposure SPACE high performance computing power consumption
在线阅读 下载PDF
Research on risk identification of railway subgrade deformation based on Bayesian and ICA theories
6
作者 Yi Liu Fengyan Yang +3 位作者 Hu Wang Xuanqi Wang Chengwen Wu Hongsheng Yu 《Railway Sciences》 2025年第6期711-728,共18页
Purpose–This paper conducts a joint analysis of monitoring data in the hidden danger areas of railway subgrade deformation using a data-driven method,thereby realizing the systematic risk identification of regional h... Purpose–This paper conducts a joint analysis of monitoring data in the hidden danger areas of railway subgrade deformation using a data-driven method,thereby realizing the systematic risk identification of regional hidden dangers.Design/methodology/approach–The paper proposes a regional systematic risk identification method based on Bayesian and independent component analysis(ICA)theories.Firstly,the Gray Wolf Optimization(GWO)algorithm is used to partition each group of monitoring data in the hidden danger area,so that the data distribution characteristics within each sub-block are similar.Then,a distributed ICA early warning model is constructed to obtain prior knowledge such as control limits and statistics of the area under normal conditions.For the online evaluation process,the input data is partitioned following the above-mentioned procedure and the ICA statistics of each sub-block are calculated.The Bayesian method is applied to fuse online parameters with offline parameters,yielding statistics under a specific confidence interval.These statistics are then compared with the control limits–specifically,checking whether they exceed the pre-set confidence parameters–thus realizing the systematic risk identification of the hidden danger area.Findings–Through simulation experiments,the proposed method can integrate prior knowledge such as control limits and statistics to effectively determine the overall stability status of the area,thereby realizing the systematic risk identification of the hidden danger area.Originality/value–The proposed method leverages Bayesian theory to fuse online process parameters with offline parameters and further compares them with confidence parameters,thereby effectively enhancing the utilization efficiency of monitoring data and the robustness of the analytical model. 展开更多
关键词 Bayesian theory Grey Wolf Algorithm Independent component analysis Railway subgrade Deformation analysis
在线阅读 下载PDF
Study on the optimal test parameters for vibration compaction based on the control of physical-mechanical indicators
7
作者 Zhongrui Chen Yanxi Xiong +3 位作者 Ronghui Yan Zhibo Cheng Taifeng Li Hongfu Tan 《Railway Sciences》 2025年第3期388-409,共22页
Purpose-The indoor vibration compaction test(IVCT)was a key step in controlling the compaction quality for high-speed railway graded aggregate(HRGA),which currently had a research gap on the assessment indicators and ... Purpose-The indoor vibration compaction test(IVCT)was a key step in controlling the compaction quality for high-speed railway graded aggregate(HRGA),which currently had a research gap on the assessment indicators and compaction parameters.Design/methodology/approach-To address these issues,a novel multi-indicator IVCT method was proposed,including physical indicator dry density(ρd)and mechanical indicators dynamic stiffness(Krb)and bearing capacity coefficient(K20).Then,a series of IVCTs on HRGA under different compaction parameters were conducted with an improved vibration compactor,which could monitor the physical-mechanical indicators in real-time.Finally,the optimal vibration compaction parameters,including the moisture content(ω),the diameter-to-maximum particle size ratio(Rd),the thickness-to-maximum particle size ratio(Rh),the vibration frequency(f),the vibration mass(Mc)and the eccentric distance(re),were determined based on the evolution characteristics for the physical-mechanical indicators during compaction.Findings-All results indicated that theρd gradually increased and then stabilized,and the Krb initially increased and then decreased.Moreover,the inflection time of the Krb was present as the optimal compaction time(Tlp)during compaction.Additionally,optimal compaction was achieved whenωwas the water-holding content after mud pumping,Rd was 3.4,Rh was 3.5,f was the resonance frequency,and the ratio between the excitation force and the Mc was 1.8.Originality/value-The findings of this paper were significant for the quality control of HRGA compaction. 展开更多
关键词 High-speed railway subgrade Graded aggregates Vibratory compaction test Optimal vibration compaction parameters Physical-mechanical indicator
在线阅读 下载PDF
Communication delay-aware cooperative adaptive cruise control with dynamic network topologies——A convergence of communication and control
8
作者 Jihong Liu Yiqing Zhou Ling Liu 《Digital Communications and Networks》 2025年第1期191-199,共9页
Wireless communication-enabled Cooperative Adaptive Cruise Control(CACC)is expected to improve the safety and traffic capacity of vehicle platoons.Existing CACC considers a conventional communication delay with fixed ... Wireless communication-enabled Cooperative Adaptive Cruise Control(CACC)is expected to improve the safety and traffic capacity of vehicle platoons.Existing CACC considers a conventional communication delay with fixed Vehicular Communication Network(VCN)topologies.However,when the network is under attack,the communication delay may be much higher,and the stability of the system may not be guaranteed.This paper proposes a novel communication Delay Aware CACC with Dynamic Network Topologies(DADNT).The main idea is that for various communication delays,in order to maximize the traffic capacity while guaranteeing stability and minimizing the following error,the CACC should dynamically adjust the VCN network topology to achieve the minimum inter-vehicle spacing.To this end,a multi-objective optimization problem is formulated,and a 3-step Divide-And-Conquer sub-optimal solution(3DAC)is proposed.Simulation results show that with 3DAC,the proposed DADNT with CACC can reduce the inter-vehicle spacing by 5%,10%,and 14%,respectively,compared with the traditional CACC with fixed one-vehicle,two-vehicle,and three-vehicle look-ahead network topologies,thereby improving the traffic efficiency. 展开更多
关键词 Communication delay Cooperative adaptive Cruise control Network topology String stability
在线阅读 下载PDF
Recent Implementations in Kylin 1.3:Improved Computational Efficiency of ab initio DMRG and a Spin-adapted Version of EC-MRCI
9
作者 Yinxuan Song Yingqi Tian +1 位作者 Yifan Cheng Haibo Ma 《Chinese Journal of Chemical Physics》 2025年第4期447-456,I0026,I0027,I0105,共13页
Accurate evaluation of elec-tron correlations is essential for the reliable quantitative de-scription of electronic struc-tures in strongly correlated sys-tems,including bond-dissociat-ing molecules,polyradicals,large... Accurate evaluation of elec-tron correlations is essential for the reliable quantitative de-scription of electronic struc-tures in strongly correlated sys-tems,including bond-dissociat-ing molecules,polyradicals,large conjugated molecules,and transition metal complex-es.To provide a user-friendly tool for studying such challeng-ing systems,our team developed Kylin 1.0[J.Comput.Chem.44,1316(2023)],an ab initio quantum chemistry program designed for efficient density matrix renormalization group(DMRG)and post-DMRG methods,enabling high-accuracy calculations with large active spaces.We have now further advanced the software with the release of Kylin 1.3,featuring optimized DMRG algorithms and an improved tensor contraction scheme in the diagonaliza-tion step.Benchmark calculations on the Mn_(4)CaO_(5)cluster demonstrate a remarkable speed-up of up to 16 fater than Kylin 1.0.Moreover,a more user-friendly and efficient algorithm[J.Chem.Theory Comput.17,3414(2021)]for sampling configurations from DMRG wavefunc-tion is implemented as well.Additionally,we have also implemented a spin-adapted version of the externally contracted multi-reference configuration interaction(EC-MRCI)method[J.Phys.Chem.A 128,958(2024)],further enhancing the program’s efficiency and accuracy for electron correlation calculations. 展开更多
关键词 Quantum chemistry program Density matrix renormalization group Strong correlation MULTI-REFERENCE
在线阅读 下载PDF
Video-Based Detection of Epileptic Spasms in IESS:Modeling,Detection,and Evaluation
10
作者 DING Lihui FU Lijun +2 位作者 YANG Guang WAN Lin CHANG Zhijun 《Journal of Shanghai Jiaotong university(Science)》 2025年第1期1-9,共9页
Behavioral scoring based on clinical observations remains the gold standard for screening,diagnosing,and evaluating infantile epileptic spasm syndrome(IESS).The accurate identification of seizures is crucial for clini... Behavioral scoring based on clinical observations remains the gold standard for screening,diagnosing,and evaluating infantile epileptic spasm syndrome(IESS).The accurate identification of seizures is crucial for clinical diagnosis and assessment.In this study,we propose an innovative seizure detection method based on video feature recognition of patient spasms.To capture the temporal characteristics of the spasm behavior presented in the videos effectively,we incorporate asymmetric convolutions and convolution–batch normalization–ReLU(CBR)modules.Specifically within the 3D-ResNet residual blocks,we split the larger convolutional kernels into two asymmetric 3D convolutional kernels.These kernels are connected in series to enhance the ability of the convolutional layers to extract key local features,both horizontally and vertically.In addition,we introduce a 3D convolutional block attention module to enhance the spatial correlations between video frame channels efficiently.To improve the generalization ability,we design a composite loss function that combines cross-entropy loss with triplet loss to balance the classification and similarity requirements.We train and evaluate our method using the PLA IESS-VIDEO dataset,achieving an average seizure recognition accuracy of 90.59%,precision of 90.94%,and recall of 87.64%.To validate its generalization capability further,we conducted external validation using six different patient monitoring videos compared with assessments by six human experts from various medical centers.The final test results demonstrate that our method achieved a recall of 0.6476,surpassing the average level achieved by human experts(0.5595),while attaining a high F1-score of 0.7219.These findings have substantial significance for the long-term assessment of patients with IESS. 展开更多
关键词 infantile epileptic spasm syndrome video-based seizure analysis asymmetric convolution 3D-ResNet attention mechanism
原文传递
Design and implementation of five-axis transformation function in CNC system 被引量:6
11
作者 Wang Feng Lin Hu +3 位作者 Zheng Liaomo Yang Lei Feng Jinjin Zhang Han 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2014年第2期425-437,共13页
To implement five-axis functions in CNC system, based on domestic system Lan Tian series, an improved design method for the system software structure is proposed in this paper. The numerical control kernel of CNC syst... To implement five-axis functions in CNC system, based on domestic system Lan Tian series, an improved design method for the system software structure is proposed in this paper. The numerical control kernel of CNC system is divided into the task layer and the motion layer. A five-axis transformation unit is integrated into the motion layer. After classifying five-axis machines into different types and analyzing their geometry information, the five-axis kinematic library is designed according to the abstract factory pattern. Furthermore, by taking CA spindle- tilting machine as an example, the forward and the inverse kinematic transformations are deduced. Based on the new software architecture and the five-axis kinematic library, algorithms of RTCP (rotation tool center point control) and 3D radius compensation for end-milling are designed and realized. The milling results show that, with five-axis functions based on such software struc- ture, the instructions with respect to the cutter's position and orientation can be directly carried out in the CNC system. 展开更多
关键词 3D cutter radiuscompensation CNC software structure Five-axis transformationfunction Motion control Rotation tool center pointcontrol
原文传递
A fine-grained perspective on the robustness of global cargo ship transportation networks 被引量:13
12
作者 彭澎 程诗奋 +4 位作者 陈金海 廖梦迪 吴琳 刘希亮 陆锋 《Journal of Geographical Sciences》 SCIE CSCD 2018年第7期881-899,共19页
The robustness of cargo ship transportation networks is essential to the stability of the world trade system. The current research mainly focuses on the coarse-grained, holistic cargo ship transportation network while... The robustness of cargo ship transportation networks is essential to the stability of the world trade system. The current research mainly focuses on the coarse-grained, holistic cargo ship transportation network while ignoring the structural diversity of different sub-networks. In this paper, we evaluate the robustness of the global cargo ship transportation network based on the most recent Automatic Identification System(AIS) data available. First, we subdivide three typical cargo ship transportation networks(i.e., oil tanker, container ship and bulk carrier) from the original cargo ship transportation network. Then, we design statistical indices based on complex network theory and employ four attack strategies, including random attack and three intentional attacks(i.e., degree-based attack, betweenness-based attack and flux-based attack) to evaluate the robustness of the three typical cargo ship transportation networks. Finally, we compare the integrity of the remaining ports of the network when a small proportion of ports lose their function. The results show that 1) compared with the holistic cargo ship transportation network, the fine-grain-based cargo ship transportation networks can fully reflect the pattern and process of global cargo transportation; 2) different cargo ship networks behave heterogeneously in terms of their robustness, with the container network being the weakest and the bulk carrier network being the strongest; and 3) small-scale intentional attacks may have significant influence on the integrity of the container network but a minor impact on the bulk carrier and oil tanker transportation networks. These conclusions can help improve the decision support capabilities in maritime transportation planning and emergency response and facilitate the establishment of a more reliable maritime transportation system.Abstract: The robustness of cargo ship transportation networks is essential to the stability of the world trade system. The current research mainly focuses on the coarse-grained, holistic cargo ship transportation network while ignoring the structural diversity of different sub-networks. In this paper, we evaluate the robustness of the global cargo ship transporta- tion network based on the most recent Automatic Identification System (AIS) data available. First, we subdivide three typical cargo ship transportation networks (i.e., oil tanker, container ship and bulk carrier) from the original cargo ship transportation network. Then, we design statistical indices based on complex network theory and employ four attack strategies, in- cluding random attack and three intentional attacks (i.e., degree-based attack, between- ness-based attack and flux-based attack) to evaluate the robustness of the three typical cargo ship transportation networks. Finally, we compare the integrity of the remaining ports of the network when a small proportion of ports lose their function. The results show that 1) com- pared with the holistic cargo ship transportation network, the fine-grain-based cargo ship transportation networks can fully reflect the pattern and process of global cargo transportation 2) different cargo ship networks behave heterogeneously in terms of their robustness, with the container network being the weakest and the bulk carrier network being the strongest; and 3) small-scale intentional attacks may have significant influence on the integrity of the con- tainer network but a minor impact on the bulk carrier and oil tanker transportation networks.These conclusions can help improve the decision support capabilities in maritime transportation planning and emergency response and facilitate the establishment of a more reliable maritime transportation system. 展开更多
关键词 complex network FINE-GRAINED cargo ship transportation network ROBUSTNESS automatic identification system
原文传递
Protecting Terminals by Security Domain Mechanism Based on Trusted Computing 被引量:5
13
作者 ZHOU Zheng ZHANG Jun +1 位作者 LI Jian LIU Yi 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1437-1440,共4页
Networks are composed with servers and rather larger amounts of terminals and most menace of attack and virus come from terminals. Eliminating malicious code and ac cess or breaking the conditions only under witch att... Networks are composed with servers and rather larger amounts of terminals and most menace of attack and virus come from terminals. Eliminating malicious code and ac cess or breaking the conditions only under witch attack or virus can be invoked in those terminals would be the most effec tive way to protect information systems. The concept of trusted computing was first introduced into terminal virus immunity. Then a model of security domain mechanism based on trusted computing to protect computers from proposed from abstracting the general information systems. The principle of attack resistant and venture limitation of the model was demonstrated by means of mathematical analysis, and the realization of the model was proposed. 展开更多
关键词 trusted computing security domain mechanism attack immunity venture limitation
在线阅读 下载PDF
Sampling Methods for Efficient Training of Graph Convolutional Networks:A Survey 被引量:5
14
作者 Xin Liu Mingyu Yan +3 位作者 Lei Deng Guoqi Li Xiaochun Ye Dongrui Fan 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2022年第2期205-234,共30页
Graph convolutional networks(GCNs)have received significant attention from various research fields due to the excellent performance in learning graph representations.Although GCN performs well compared with other meth... Graph convolutional networks(GCNs)have received significant attention from various research fields due to the excellent performance in learning graph representations.Although GCN performs well compared with other methods,it still faces challenges.Training a GCN model for large-scale graphs in a conventional way requires high computation and storage costs.Therefore,motivated by an urgent need in terms of efficiency and scalability in training GCN,sampling methods have been proposed and achieved a significant effect.In this paper,we categorize sampling methods based on the sampling mechanisms and provide a comprehensive survey of sampling methods for efficient training of GCN.To highlight the characteristics and differences of sampling methods,we present a detailed comparison within each category and further give an overall comparative analysis for the sampling methods in all categories.Finally,we discuss some challenges and future research directions of the sampling methods. 展开更多
关键词 Efficient training graph convolutional networks(GCNs) graph neural networks(GNNs) sampling method
在线阅读 下载PDF
Layers of interstitial fluid flow along a“slit-shaped”vascular adventitia 被引量:6
15
作者 Hongyi LI You LYU +5 位作者 Xiaoliang CHEN Bei LI Qi HUA Fusui JI Yajun YIN Hua LI 《Journal of Zhejiang University-Science B(Biomedicine & Biotechnology)》 SCIE CAS CSCD 2021年第8期647-663,共17页
Interstitial fluid(ISF)flow through vascular adventitia has been discovered recently.However,its kinetic pattern was unclear.We used histological and topographical identification to observe ISF flow along venous vesse... Interstitial fluid(ISF)flow through vascular adventitia has been discovered recently.However,its kinetic pattern was unclear.We used histological and topographical identification to observe ISF flow along venous vessels in rabbits.By magnetic resonance imaging(MRI)in live subjects,the inherent pathways of ISF flow from the ankle dermis through the legs,abdomen,and thorax were enhanced by paramagnetic contrast.By fluorescence stereomicroscopy and layer-by-layer dissection after the rabbits were sacrificed,the perivascular and adventitial connective tissues(PACTs)along the saphenous veins and inferior vena cava were found to be stained by sodium fluorescein from the ankle dermis,which coincided with the findings by MRI.The direction of ISF transport in a venous PACT pathway was the same as that of venous blood flow.By confocal microscopy and histological analysis,the stained PACT pathways were verified to be the fibrous connective tissues,consisting of longitudinally assembled fibers.Real-time observations by fluorescence stereomicroscopy revealed at least two types of spaces for ISF flow:one along adventitial fibers and another one between the vascular adventitia and its covering fascia.Using nanoparticles and surfactants,a PACT pathway was found to be accessible by a nanoparticle of<100 nm and contained two parts:a transport channel and an absorptive part.The calculated velocity of continuous ISF flow along fibers of the PACT pathway was 3.6-15.6 mm/s.These data revealed that a PACT pathway was a"slit-shaped"porous biomaterial,comprising a longitudinal transport channel and an absorptive part for imbibition.The use of surfactants suggested that interfacial tension might play an essential role in layers of continuous ISF flow along vascular vessels.A hypothetical"gel pump"is proposed based on interfacial tension and interactions to regulate ISF flow.These experimental findings may inspire future studies to explore the physiological and pathophysiological functions of vascular ISF or interfacial fluid flow among interstitial connective tissues throughout the body. 展开更多
关键词 Vascular adventitia Interstitial fluid Connective tissue Interfacial zone
原文传递
A formal study of feature selection in text categorization 被引量:15
16
作者 XU Yan 《通讯和计算机(中英文版)》 2009年第4期32-41,共10页
关键词 特征分类 约束 文本分类 信息
在线阅读 下载PDF
A Computing Resource Adjustment Mechanism for Communication Protocol Processing in Centralized Radio Access Networks 被引量:3
17
作者 Guowei Zhai Lin Tian +2 位作者 Yiqing Zhou Qian Sun Jinglin Shi 《China Communications》 SCIE CSCD 2016年第12期79-89,共11页
The centralized radio access cellular network infrastructure based on centralized Super Base Station(CSBS) is a promising solution to reduce the high construction cost and energy consumption of conventional cellular n... The centralized radio access cellular network infrastructure based on centralized Super Base Station(CSBS) is a promising solution to reduce the high construction cost and energy consumption of conventional cellular networks. With CSBS, the computing resource for communication protocol processing could be managed flexibly according the protocol load to improve the resource efficiency. Since the protocol load changes frequently and may exceed the capacity of processors, load balancing is needed. However, existing load balancing mechanisms used in data centers cannot satisfy the real-time requirement of the communication protocol processing. Therefore, a new computing resource adjustment scheme is proposed for communication protocol processing in the CSBS architecture. First of all, the main principles of protocol processing resource adjustment is concluded, followed by the analysis on the processing resource outage probability that the computing resource becomes inadequate for protocol processing as load changes. Following the adjustment principles, the proposed scheme is designed to reduce the processing resource outage probability based onthe optimized connected graph which is constructed by the approximate Kruskal algorithm. Simulation re-sults show that compared with the conventional load balancing mechanisms, the proposed scheme can reduce the occurrence number of inadequate processing resource and the additional resource consumption of adjustment greatly. 展开更多
关键词 computing resource adjustment communication protocol processing cloud RAN super BS processing resource outage probability optimized connected graph
在线阅读 下载PDF
Machining Deformation Prediction of Thin-Walled Part Based on Finite Element Analysis 被引量:3
18
作者 Hongxiang Wang Yabin Tang +1 位作者 Zhanshan Liu Shi Gao 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2015年第4期47-54,共8页
For the problems of machining distortion and the low accepted product during milling process of aluminum alloy thin-walled part,this paper starts from the analysis of initial stress state in material preparation proce... For the problems of machining distortion and the low accepted product during milling process of aluminum alloy thin-walled part,this paper starts from the analysis of initial stress state in material preparation process,the change process of residual stress within aluminum alloy pre-stretching plate is researched,and the distribution law of residual stress is indirectly obtained by delamination measurement methods,so the effect of internal residual stress on machining distortion is considered before finite element simulation. Considering the coupling effects of residual stress,dynamic milling force and clamping force on machining distortion,a threedimensional dynamic finite element simulation model is established,and the whole cutting process is simulated from the blank material to finished product,a novel prediction method is proposed,which can availably predict the machining distortion accurately. The machining distortion state of the thin-walled part is achieved at different processing steps,the machining distortion of the thin-walled part is detected with three coordinate measuring machine tools,show that the simulation results are in good agreement with experimental data. 展开更多
关键词 thin-walled part machining deformation residual stress aluminum alloy finite element simulation
在线阅读 下载PDF
Overview of the Second Generation AVS Video Coding Standard(AVS2) 被引量:6
19
作者 Shanshe Wang Falei Luo Siwei Ma 《ZTE Communications》 2016年第1期3-11,共9页
AVS2 is a new generation video coding standard developed by the AVS working group. Compared with the first generation AVS video coding standard, known as AVS1, AVS2 significantly improves coding performance by using m... AVS2 is a new generation video coding standard developed by the AVS working group. Compared with the first generation AVS video coding standard, known as AVS1, AVS2 significantly improves coding performance by using many new coding technologies, e.g., adaptive block partition and two level transform coding. Moreover, for scene video, e.g. surveillance video and conference vid?eo, AVS2 provided a background picture modeling scheme to achieve more accurate prediction, which can also make object detec?tion and tracking in surveillance video coding more flexible. Experimental results show that AVS2 is competitive with High Effi?ciency Video Coding (HEVC) in terms of performance. Especially for scene video, AVS2 can achieve 39% bit rate saving over HEVC. 展开更多
关键词 Video Coding AVS2 AVS1
在线阅读 下载PDF
Principles and Defense Strategies of DNS Cache Poisoning 被引量:3
20
作者 Jin Chong Hao Zhiyu Wu Zhigang 《China Communications》 SCIE CSCD 2009年第4期75-81,共7页
DNS is one of the most important basic infrastructures of the Internet,attacks on which will prevent the Internet from working properly.Therefore,its security is receiving great concern.This paper analyzes the princip... DNS is one of the most important basic infrastructures of the Internet,attacks on which will prevent the Internet from working properly.Therefore,its security is receiving great concern.This paper analyzes the principles of both traditional and novel(Kaminsky)DNS cache poisoning,presents attack samples and describes the whole attack process in detail.After verifying the potential harm of DNS cache poisoning,the paper gives out several defense strategies. 展开更多
关键词 DNS cache poisoning Kaminsky attack
在线阅读 下载PDF
上一页 1 2 38 下一页 到第
使用帮助 返回顶部