期刊文献+
共找到4,310篇文章
< 1 2 216 >
每页显示 20 50 100
Assessing the data quality and seismic monitoring capabilities of the Belt and Road GNSS network
1
作者 Yu Li Yinxing Shao +2 位作者 Tan Wang Yuebing Wang Hongbo Shi 《Earthquake Science》 2025年第1期56-66,共11页
The Belt and Road global navigation satellite system(B&R GNSS)network is the first large-scale deployment of Chinese GNSS equipment in a seismic system.Prior to this,there have been few systematic assessments of t... The Belt and Road global navigation satellite system(B&R GNSS)network is the first large-scale deployment of Chinese GNSS equipment in a seismic system.Prior to this,there have been few systematic assessments of the data quality of Chinese GNSS equipment.In this study,data from four representative GNSS sites in different regions of China were analyzed using the G-Nut/Anubis software package.Four main indicators(data integrity rate,data validity ratio,multi-path error,and cycle slip ratio)used to systematically analyze data quality,while evaluating the seismic monitoring capabilities of the network based on earthquake magnitudes estimated from high-frequency GNSS data are evaluated by estimating magnitude based on highfrequency GNSS data.The results indicate that the quality of the data produced by the three types of Chinese receivers used in the network meets the needs of earthquake monitoring and the new seismic industry standards,which provide a reference for the selection of equipment for future new projects.After the B&R GNSS network was established,the seismic monitoring capability for earthquakes with magnitudes greater than M_(W)6.5 in most parts of the Sichuan-Yunnan region improved by approximately 20%.In key areas such as the Sichuan-Yunnan Rhomboid Block,the monitoring capability increased by more than 25%,which has greatly improved the effectiveness of regional comprehensive earthquake management. 展开更多
关键词 Belt and Road multi-system GNSS data quality seismic monitoring capability
在线阅读 下载PDF
地震水文地质学:基于灾害视角的“水岩相互作用”
2
作者 史浙明 王广才 +1 位作者 晏锐 齐之钰 《地学前缘》 北大核心 2026年第1期80-94,共15页
地震水文地质学是研究地震与地下水相互作用的一门学科,与传统水文地质研究不同,其主要关注因地震等地壳运动产生的含水介质变形而导致的地下水文过程演化。本文从地壳变形与地下水动态、地震地下水前兆异常、地震引起的同震及震后响应... 地震水文地质学是研究地震与地下水相互作用的一门学科,与传统水文地质研究不同,其主要关注因地震等地壳运动产生的含水介质变形而导致的地下水文过程演化。本文从地壳变形与地下水动态、地震地下水前兆异常、地震引起的同震及震后响应以及地震导致的水文地质参数变化等方面进行综述,重点介绍了近二十年以来的进展。线孔弹性理论的发展为定量刻画地震等地壳运动与地下水动态的关系提供了理论基础。地下流体前兆异常在近年来的地震预测实践中起到了较好的参考作用,其中地下水地球化学指标监测及大规模地球化学观测网络的建设是一大亮点。与此同时,建立地下水物理与化学动态的前兆异常耦合机理模型以及发展机器学习等新兴的前兆信号提取方法是未来需要重点突破的方向。地震引起的含水层介质渗透性的改变及其导致的水量交换和水化学的动态变化是解释同震及震后地下水响应的主要机理,基于地下水对潮汐、气压等周期性信号响应的含水层参数识别为连续获取水文地质参数提供了新途径,然而现有潮汐和气压响应的解析模型在参数计算方面往往存在多解性问题,发展新的模型和方法以降低计算结果的不确定性是未来需要考虑的方向。为了更好地理解地震与地下水系统间的相互作用,在前期研究基础上建立涵盖温泉、地下水监测井的断裂带试验场,开展水位、水温、流量、化学组分、形变及地震波的综合观测,是深化地震水文地质学科理论发展的基础。 展开更多
关键词 地震 地下水 含水层参数 地球潮汐 气压 前兆异常
在线阅读 下载PDF
川滇地区人工智能地震预测模型应用
3
作者 孟令媛 胡峰 +7 位作者 臧阳 司旭 闫伟 田雷 赵小艳 张致伟 韩颜颜 王月 《地震研究》 北大核心 2026年第1期43-50,共8页
针对中国地震科学实验场的科学目标和主要科学问题,基于川滇地区地震目录和地球物理观测数据,在对川滇地区进行区域划分并建立图神经网络的基础上,构建了川滇地区地震预测模型。该模型综合考虑约3万条地震目录数据、基于地震目录的3种... 针对中国地震科学实验场的科学目标和主要科学问题,基于川滇地区地震目录和地球物理观测数据,在对川滇地区进行区域划分并建立图神经网络的基础上,构建了川滇地区地震预测模型。该模型综合考虑约3万条地震目录数据、基于地震目录的3种地震活动性参数,以及116台项地球物理观测数据,通过将传统经验预测指标方法与人工智能技术结合,给出了适用于川滇地区的多源异构数据图神经网络地震预测模型,实现了川滇地区不同数据源下短期与中期地震预测功能。模型应用结果显示,在CD2、CD8和CD10区域月尺度预测效果较好,年尺度无震预测有一定对应效果。 展开更多
关键词 中国地震科学实验场 多源异构数据 图神经网络 地震预测模型 川滇地区
在线阅读 下载PDF
Construction and development of China digital seismological observation network 被引量:88
4
作者 刘瑞丰 高景春 +4 位作者 陈运泰 吴忠良 黄志斌 徐志国 孙丽 《地震学报》 CSCD 北大核心 2008年第5期533-539,共7页
The seismological observation system in China has experienced rapid development over the Tenth Five-year Plan period. China Earthquake Administration (CEA) has completed the establishment of China digital seismologica... The seismological observation system in China has experienced rapid development over the Tenth Five-year Plan period. China Earthquake Administration (CEA) has completed the establishment of China digital seismological observation network. CEA has accomplished analog-to-digital conversion of the existing seismological observation systems and set up a number of new digital seismic stations. This indicates full digitization of seismological ob-servation in China. This paper presents an overview of the scale,layout principle and major functions of the up-dated national digital seismograph network,regional digital seismograph network,and digital seismograph net-work for volcano monitoring and mobile digital seismograph networks in China. 展开更多
关键词 地震台网 地震台阵 宽频带
在线阅读 下载PDF
基于秘密共享的高效纵向联邦逻辑回归
5
作者 毛正雄 李辉 +4 位作者 黄祖源 杨传旭 赵鹏 赵方圆 杨树森 《工程数学学报》 北大核心 2026年第1期128-142,共15页
逻辑回归是一种广泛应用于现实分类任务的机器学习模型。随着数据孤岛问题的涌现,如何针对多参与主体非贯通数据联合构建逻辑回归模型成为一个关键问题。纵向联邦学习可实现数据明文不暴露前提下多主体跨样本特征的联合机器学习模型训... 逻辑回归是一种广泛应用于现实分类任务的机器学习模型。随着数据孤岛问题的涌现,如何针对多参与主体非贯通数据联合构建逻辑回归模型成为一个关键问题。纵向联邦学习可实现数据明文不暴露前提下多主体跨样本特征的联合机器学习模型训练。然而,现有纵向联邦逻辑回归方法主要基于同态加密技术,具有计算和通信开销大的短板。针对逻辑回归模型,研究安全高效的纵向联邦学习算法,目标实现数据隐私保护和模型学习效率的较优权衡。具体地,基于秘密共享提出了一种面向逻辑回归模型的高效率纵向联邦学习算法(Vertical Federated Logistic Regression algorithm based on Secret Sharing, VFLR-SS),通过将跨域分析过程中的中间数据随机分解为多个秘密份额进行交互从而实现隐私保护,同时避免了同态加密引发的计算和通信开销。对VFLR-SS的安全性进行了分析,并基于真实数据对算法进行了验证。实验结果表明VFLR-SS可实现与集中式逻辑回归算法可比的效用和性能,大幅降低了传统同态加密方法中的计算及通信开销。 展开更多
关键词 隐私保护 联邦学习 逻辑回归 秘密共享 同态加密
在线阅读 下载PDF
确定性网络技术在农机工业AR远程协作的应用研究
6
作者 周月娥 李新昊 梅松 《中国农机化学报》 北大核心 2026年第1期62-66,共5页
现有AR远程协作系统采用传统网络承载,存在网络时延偏高、抖动偏大和丢包率偏高等问题,产生远程协同操作延迟、网络拥塞等现象,容易引起农机工业设备远程协同操作偏差和失误等。为此,将确定性网络技术应用于AR远程协作系统,可以有效解... 现有AR远程协作系统采用传统网络承载,存在网络时延偏高、抖动偏大和丢包率偏高等问题,产生远程协同操作延迟、网络拥塞等现象,容易引起农机工业设备远程协同操作偏差和失误等。为此,将确定性网络技术应用于AR远程协作系统,可以有效解决上述问题。首先分析现有AR远程协作系统存在的问题,提出确定性网络支撑需求;然后介绍AR远程协作系统确定性网络支撑方案,分别阐述时间敏感型网络TSN、灵活以太网FlexE等确定性网络技术应用于AR远程协作系统。基于确定性网络的AR远程协作系统已在某农机车辆厂应用,现场对采用的确定性网络相关参数进行实际测试对比。经验证,运用TSN和FlexE等技术提供高质量的确定性网络支撑,实现各生产车间节点之间网络时延低于5 ms、抖动低于1 ms、丢包率峰值低于0.05%,与现有AR远程协作系统方案相比,可以确保农机工业设备远程协同操作的实时性、准确性和安全可靠性。 展开更多
关键词 确定性网络 农机工业 时间敏感型网络技术 灵活以太网技术 智能远程协作
在线阅读 下载PDF
Modeling and Defending Passive Worms over Unstructured Peer-to-Peer Networks 被引量:8
7
作者 王方伟 张运凯 马建峰 《Transactions of Tianjin University》 EI CAS 2008年第1期66-72,共7页
Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly ... Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly analyzes and obtains the average delay for all peers in the whole transmitting process due to the limitation of network throughput, and then proposes a mathematical model for the propagation of passive worms over the unstructured P2P networks. The model mainly takes the effect of the network throughput into account, and applies a new healthy files dissemination-based defense strategy according to the file popularity which follows the Zipf distribution. The simulation results show that the propagation of passive worms is mainly governed by the number of hops, initially infected files and uninfected files. The larger the number of hops, the more rapidly the passive worms propagate. If the number of the initially infected files is increased by the attackers, the propagation speed of passive worms increases obviously. A larger size of the uninfected file results in a better attack performance. However, the number of files generated by passive worms is not an important factor governing the propagation of passive worms. The effectiveness of healthy files dissemination strategy is verified. This model can provide a guideline in the control of unstructured P2P networks as well as passive worm defense. 展开更多
关键词 network security unstructured peer-to-peer networks passive worms propagationmodel patch dissemination strategy
在线阅读 下载PDF
Introduction to a recently released dataset entitled CSNCD:A Comprehensive Dataset of Chinese Seismic Network 被引量:6
8
作者 Yanru An 《Earthquake Research Advances》 CSCD 2024年第1期1-3,共3页
China and its adjacent regions are heavily affected by earthquake disasters,which has led to strong demand and vigorous development of the Chinese Seismic Network(CSN).Since 2004,China Earthquake Networks Center(CENC)... China and its adjacent regions are heavily affected by earthquake disasters,which has led to strong demand and vigorous development of the Chinese Seismic Network(CSN).Since 2004,China Earthquake Networks Center(CENC)has been authorized by China Earthquake Administration(CEA)to take charge of CSN management,mainly observing product output and quality control. 展开更多
关键词 SEISMIC EARTHQUAKE EARTHQUAKE
在线阅读 下载PDF
The Improvement of Earthquake Real-Time Monitoring System of Chinese National Digital Seismic Network 被引量:3
9
作者 GUO Tielong HUANG Zhibin ZHAO Bo 《Earthquake Research in China》 CSCD 2019年第4期596-604,共9页
The earthquake real-time monitoring system of the Chinese National Digital Seismic Network has been in operation since"the Ninth Five-year Plan"period,and the stability of the system has been well tested.In ... The earthquake real-time monitoring system of the Chinese National Digital Seismic Network has been in operation since"the Ninth Five-year Plan"period,and the stability of the system has been well tested.In recent years,with the continuous improvement of monitoring technology and increase of public demands,the original real-time monitoring system needs to be upgraded and improved in terms of timeliness,stability,accuracy and ease of operation.Therefore,by accessing a total of more than 1,000 seismic stations,reducing the seismic trigger threshold of the monitoring system,eliminating the false trigger stations and optimizing the seismic waveform display interface,the current earthquake monitoring demands can be satisfied on the basis of ensuring the stable operation of the system. 展开更多
关键词 Seismic monitoring Earthquake location Computer real-time processing
在线阅读 下载PDF
Network Security Situation Prediction Based on Improved Adaptive Grey Verhulst Model 被引量:4
10
作者 胡威 李建华 +1 位作者 陈秀真 蒋兴浩 《Journal of Shanghai Jiaotong university(Science)》 EI 2010年第4期408-413,共6页
Network security situation is a hot research topic in the field of network security. Whole situation awareness includes the current situation evaluation and the future situation prediction. However, the now-existing r... Network security situation is a hot research topic in the field of network security. Whole situation awareness includes the current situation evaluation and the future situation prediction. However, the now-existing research focuses on the current situation evaluation, and seldom discusses the future prediction. Based on the historical research, an improved grey Verhulst model is put forward to predict the future situation. Aiming at the shortages in the prediction based on traditional Verhulst model, the adaptive grey parameters and equal- dimensions grey filling methods are proposed to improve the precision. The simulation results prove that the scheme is efficient and applicable. 展开更多
关键词 network security situation situation prediction grey theory grey Verhulst model
原文传递
Motor Fault Diagnosis Based on Short-time Fourier Transform and Convolutional Neural Network 被引量:46
11
作者 Li-Hua Wang Xiao-Ping Zhao +2 位作者 Jia-Xin Wu Yang-Yang Xie Yong-Hong Zhang 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2017年第6期1357-1368,共12页
With the rapid development of mechanical equipment, the mechanical health monitoring field has entered the era of big data. However, the method of manual feature extraction has the disadvantages of low efficiency and ... With the rapid development of mechanical equipment, the mechanical health monitoring field has entered the era of big data. However, the method of manual feature extraction has the disadvantages of low efficiency and poor accuracy, when handling big data. In this study, the research object was the asynchronous motor in the drivetrain diagnostics simulator system. The vibration signals of different fault motors were collected. The raw signal was pretreated using short time Fourier transform (STFT) to obtain the corresponding time-frequency map. Then, the feature of the time-frequency map was adap- tively extracted by using a convolutional neural network (CNN). The effects of the pretreatment method, and the hyper parameters of network diagnostic accuracy, were investigated experimentally. The experimental results showed that the influence of the preprocessing method is small, and that the batch-size is the main factor affecting accuracy and training efficiency. By investigating feature visualization, it was shown that, in the case of big data, the extracted CNN features can represent complex mapping relationships between signal and health status, and can also overcome the prior knowledge and engineering experience requirement for feature extraction, which is used by tra- ditional diagnosis methods. This paper proposes a new method, based on STFT and CNN, which can complete motor fault diagnosis tasks more intelligently and accurately. 展开更多
关键词 Big data Deep learning Short-time Fouriertransform Convolutional neural network MOTOR
在线阅读 下载PDF
Sniffing Threat and Practices in IPv6 Networks 被引量:1
12
作者 YI Xiushuang WEN Zhankao ZHANG Dengke 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1389-1393,共5页
The IPv4 protocol suite is vulnerable to a variety of attacks. IPv6 security is in many ways the same as IPv4 security, the basic mechanisms for transporting packets across the network stay mostly unchanged, and the u... The IPv4 protocol suite is vulnerable to a variety of attacks. IPv6 security is in many ways the same as IPv4 security, the basic mechanisms for transporting packets across the network stay mostly unchanged, and the upper-layer protocols that transport the actual application data are mostly unaffected. This paper illustrates sniffing threat against IPv4 and then compares how the threat might influence an IPv6 networks. This is prefaced by a brief overview of current practices around the design of an IPv4 Internet edge network and then followed by a review of how that IPv4 edge network needs to evolve in order to secure the addition of IPv6. As IPv6 security is a large and complex subject, and also, IPv6 network is still at the very beginning stage and has not been fully examined in fact, this paper focus on the security requirements of medium edge networks. 展开更多
关键词 sniffing threat PRACTICE IPv6 Network
在线阅读 下载PDF
Malicious Code Modeling and Analysis in Weighted Scale-Free Networks 被引量:2
13
作者 WANG Changguang WANG Fangwei +1 位作者 ZHANG Yangkai MA Jianfengi 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期51-54,共4页
We study the detailed malicious code propagating process in scale-free networks with link weights that denotes traffic between two nodes. It is found that the propagating velocity reaches a peak rapidly then decays in... We study the detailed malicious code propagating process in scale-free networks with link weights that denotes traffic between two nodes. It is found that the propagating velocity reaches a peak rapidly then decays in a power-law form, which is different from the well-known result in unweighted network case. Simulation results show that the nodes with larger strength are preferential to be infected, but the hierarchical dynamics are not clearly found. The simulation results also show that larger dispersion of weight of networks leads to slower propagating, which indicates that malicious code propagates more quickly in unweighted scale-free networks than in weighted scale-free networks under the same condition. These results show that not only the topology of networks but also the link weights affect the malicious propagating process. 展开更多
关键词 malicious code weighted scale-free networks propagation model
在线阅读 下载PDF
Topology-aware Overlay Multicast over IP Multicast Networks 被引量:1
14
作者 陈逍 邵华钢 汪为农 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第1期91-96,共6页
Most existing overlay multicast approaches refuse to consider any network layer support no matter whether it is available or not. This design principle greatly increases the complexity of the routing algorithms and ma... Most existing overlay multicast approaches refuse to consider any network layer support no matter whether it is available or not. This design principle greatly increases the complexity of the routing algorithms and makes the overlay topologies incompatible with the underlying network. To address these issues, topology-aware overlay multicast over IP multicast networks (TOMIMN) was proposed as a novel overlay multicast protocol, which exploits the cooperation between end-hosts and IP multicast routers to construct a topology-aware overlay tree. Through a little modification to protocol independent multicast sparse mode (PIM-SM), a multicast router is able to receive registration from nearby group members and redirect passing-by join requests to them. Due to the multicast router's support, TOMIMN organizes its group members into an overlay multicast tree efficiently, which matches the physical network topology well. 展开更多
关键词 overlay networking network architecture overlay multicast
在线阅读 下载PDF
Research on Scheduling Strategy of Flexible Interconnection Distribution Network Considering Distributed Photovoltaic and Hydrogen Energy Storage 被引量:1
15
作者 Yang Li Jianjun Zhao +2 位作者 Xiaolong Yang He Wang Yuyan Wang 《Energy Engineering》 EI 2024年第5期1263-1289,共27页
Distributed photovoltaic(PV)is one of the important power sources for building a new power system with new energy as the main body.The rapid development of distributed PV has brought new challenges to the operation of... Distributed photovoltaic(PV)is one of the important power sources for building a new power system with new energy as the main body.The rapid development of distributed PV has brought new challenges to the operation of distribution networks.In order to improve the absorption ability of large-scale distributed PV access to the distribution network,the AC/DC hybrid distribution network is constructed based on flexible interconnection technology,and a coordinated scheduling strategy model of hydrogen energy storage(HS)and distributed PV is established.Firstly,the mathematical model of distributed PV and HS system is established,and a comprehensive energy storage system combining seasonal hydrogen energy storage(SHS)and battery(BT)is proposed.Then,a flexible interconnected distribution network scheduling optimization model is established to minimize the total active power loss,voltage deviation and system operating cost.Finally,simulation analysis is carried out on the improved IEEE33 node,the NSGA-II algorithm is used to solve specific examples,and the optimal scheduling results of the comprehensive economy and power quality of the distribution network are obtained.Compared with the method that does not consider HS and flexible interconnection technology,the network loss and voltage deviation of this method are lower,and the total system cost can be reduced by 3.55%,which verifies the effectiveness of the proposed method. 展开更多
关键词 Seasonal hydrogen storage flexible interconnection AC/DC distribution network photovoltaic absorption scheduling strategy
在线阅读 下载PDF
A Study of Configuration Evolution of an Operational IP Backbone Network 被引量:1
16
作者 Fuliang Li Jiahai Yang +3 位作者 Huijing Zhang Xingwei Wang Suogang Li Jianping Wu 《China Communications》 SCIE CSCD 2017年第6期88-97,共10页
Configuration errors are proved to be the main reasons for network interruption and anomalies.Many researchers have paid their attention to configuration analysis and provisioning,but few works focus on understanding ... Configuration errors are proved to be the main reasons for network interruption and anomalies.Many researchers have paid their attention to configuration analysis and provisioning,but few works focus on understanding the configuration evolution.In this paper,we uncover the configuration evolution of an operational IP backbone based on the weekly reports gathered from January 2006 to January 2013.We find that rate limiting and launching routes for new customers are configured most frequently.In addition,we conduct an analysis of network failures and find that link failures are the main causes for network failures.We suggest that we should configure redundant links for the links which are easy to break down.At last,according to the analysis results,we illustrate how to provide semi-automated configuration for rate limiting and adding customers. 展开更多
关键词 network measurement configuration evolution backbone network semi-automated configuration
在线阅读 下载PDF
Graph Transformer for Communities Detection in Social Networks 被引量:2
17
作者 G.Naga Chandrika Khalid Alnowibet +3 位作者 K.Sandeep Kautish E.Sreenivasa Reddy Adel F.Alrasheedi Ali Wagdy Mohamed 《Computers, Materials & Continua》 SCIE EI 2022年第3期5707-5720,共14页
Graphs are used in various disciplines such as telecommunication,biological networks,as well as social networks.In large-scale networks,it is challenging to detect the communities by learning the distinct properties o... Graphs are used in various disciplines such as telecommunication,biological networks,as well as social networks.In large-scale networks,it is challenging to detect the communities by learning the distinct properties of the graph.As deep learning hasmade contributions in a variety of domains,we try to use deep learning techniques to mine the knowledge from large-scale graph networks.In this paper,we aim to provide a strategy for detecting communities using deep autoencoders and obtain generic neural attention to graphs.The advantages of neural attention are widely seen in the field of NLP and computer vision,which has low computational complexity for large-scale graphs.The contributions of the paper are summarized as follows.Firstly,a transformer is utilized to downsample the first-order proximities of the graph into a latent space,which can result in the structural properties and eventually assist in detecting the communities.Secondly,the fine-tuning task is conducted by tuning variant hyperparameters cautiously,which is applied to multiple social networks(Facebook and Twitch).Furthermore,the objective function(crossentropy)is tuned by L0 regularization.Lastly,the reconstructed model forms communities that present the relationship between the groups.The proposed robust model provides good generalization and is applicable to obtaining not only the community structures in social networks but also the node classification.The proposed graph-transformer shows advanced performance on the social networks with the average NMIs of 0.67±0.04,0.198±0.02,0.228±0.02,and 0.68±0.03 on Wikipedia crocodiles,Github Developers,Twitch England,and Facebook Page-Page networks,respectively. 展开更多
关键词 Social networks graph transformer community detection graph classification
在线阅读 下载PDF
Application-aware routing with QoS support in SDN networks 被引量:1
18
作者 张泽鑫 Li Jun Wu Haibo 《High Technology Letters》 EI CAS 2016年第4期404-411,共8页
Software defined networking( SDN) offers programmable interface to effectively control their networks by decoupling control and data plane. The network operators utilize a centralized controller to deploy advanced net... Software defined networking( SDN) offers programmable interface to effectively control their networks by decoupling control and data plane. The network operators utilize a centralized controller to deploy advanced network management strategies. An architecture for application-aware routing which can support dynamic quality of service( Qo S) in SDN networks is proposed. The applicationaware routing as a multi-constrained optimal path( MCOP) problem is proposed,where applications are treated as Qo S flow and best-effort flows. With the SDN controller applications,it is able to dynamically lead routing decisions based on application characteristics and requirements,leading to a better overall user experience and higher utilization of network resources. The simulation results show that the improvement of application-aware routing framework on discovering appropriate routes,which can provide Qo S guarantees for a specific application in SDN networks. 展开更多
关键词 application aware software defined networking(SDN) networks quality of service(Qo S) multiple constraints path selection
在线阅读 下载PDF
A Multiobjective Optimization Algorithm for QoS-Aware Path Selection in DiffServ and MPLS Networks
19
作者 邵华钢 陈逍 汪为农 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第4期472-477,共6页
A multiobjective quality of service (QoS) routing algorithm was proposed and used as the QoS-aware path selection approach in differentiated services and multi-protocol label switching (DiffServ-MPLS) networks. It sim... A multiobjective quality of service (QoS) routing algorithm was proposed and used as the QoS-aware path selection approach in differentiated services and multi-protocol label switching (DiffServ-MPLS) networks. It simultaneously optimizes multiple QoS objectives by a genetic algorithm in conjunction with concept of Pareto dominance. The simulation demonstrates that the proposed algorithm is capable of discovering a set of QoS-based near optimal paths within in a few iterations. In addition, the simulation results also show the scalability of the algorithm with increasing number of network nodes. 展开更多
关键词 quality of service(QoS)-aware path selection MULTIOBJECTIVE optimization MULTI-PROTOCOL label switching(MPLS) DIFFERENTIATED services(DiffServ)
在线阅读 下载PDF
A Distributed and Adaptive Framework for Provisioning QoS in IPv6 Networks
20
作者 邵华钢 陈逍 汪为农 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第1期97-101,共5页
A distributed and adaptive framework (DAF) was proposed for provisioning quality of service (QoS) in IPv6 network. In DAF, per-flow admission control and resource reservation, in conjunction with a new IPv6 flow label... A distributed and adaptive framework (DAF) was proposed for provisioning quality of service (QoS) in IPv6 network. In DAF, per-flow admission control and resource reservation, in conjunction with a new IPv6 flow label mechanism, can be performed instantaneously in a fully distributed and independent fashion at the edge of network without hop-by-hop signaling. The flow label helps in resource reservation and packets forwarding for aggregated traffic on an edge-to-edge path basis. In addition, a bounded directional probing technique for DAF was designed to reconfigure resource reservation adaptively between every pair of edge router for aggregated traffic according to the fluctuation of its traffic load. The simulation results show that DAF provides QoS guarantees to individual flows with minimal overhead, as well as keeping the scalability characteristic like DiffServ. 展开更多
关键词 quality of service IPV6 integrated services (IntServ) differentiated services (DiffServ) admission control resource reservation
在线阅读 下载PDF
上一页 1 2 216 下一页 到第
使用帮助 返回顶部