In recent years,the research on superconductivity in one-dimensional(1D)materials has been attracting increasing attention due to its potential applications in low-dimensional nanodevices.However,the critical temperat...In recent years,the research on superconductivity in one-dimensional(1D)materials has been attracting increasing attention due to its potential applications in low-dimensional nanodevices.However,the critical temperature(T_(c))of 1D superconductors is low.In this work,we theoretically investigate the possible high T_(c) superconductivity of(5,5)carbon nanotube(CNT).The pristine(5,5)CNT is a Dirac semimetal and can be modulated into a semiconductor by full hydrogenation.Interestingly,by further hole doping,it can be regulated into a metallic state with the sp3-hybridized𝜎electrons metalized,and a giant Kohn anomaly appears in the optical phonons.The two factors together enhance the electron–phonon coupling,and lead to high-T_(c) superconductivity.When the hole doping concentration of hydrogenated-(5,5)CNT is 2.5 hole/cell,the calculated T_(c) is 82.3 K,exceeding the boiling point of liquid nitrogen.Therefore,the predicted hole-doped hydrogenated-(5,5)CNT provides a new platform for 1D high-T_(c) superconductivity and may have potential applications in 1D nanodevices.展开更多
Analyzed the main problems which were found in current conditions and prob- lems of informationization in coal enterprises.It clarified how to achieve informationization in coal mine and put forward a general configur...Analyzed the main problems which were found in current conditions and prob- lems of informationization in coal enterprises.It clarified how to achieve informationization in coal mine and put forward a general configuration of informationization construction in which informationization in coal enterprises was divided into two parts: informationization of safety production and informationization of management.Planned a platform of inte- grated management of informationization in coal enterprises.Ultimately,it has brought forward that an overall integrated digital mine is the way to achieve the goal of informa- tionization in coal enterprises,which can promote the application of automation,digitaliza- tion,networking,informaitionization to intellectualization.At the same time,the competi- tiveness of enterprises can be improved entirely,and new type of coal industry can be supported by information technology.展开更多
Attaining a highly efficient and inexpensive electrocatalyst is significant for the hydrogen evolution reaction(HER)but still challenging nowadays.The transition-metal phosphides(TMPs)catalysts with platinum-like elec...Attaining a highly efficient and inexpensive electrocatalyst is significant for the hydrogen evolution reaction(HER)but still challenging nowadays.The transition-metal phosphides(TMPs)catalysts with platinum-like electronic structures are a potential candidate for the HER,but those are prone to be strongly bound with hydrogen intermediates(H∗),resulting in sluggish HER kinetics.Herein we report a unique hybrid structure of CoP anchored on graphene nanoscrolls@carbon nano tubes(CNTs)scaffold(Ni M@C-CoP)encapsulating various Ni M(M=Zn,Mo,Ni,Co)bimetal nanoalloy via chemical vapor deposi-tion(CVD)growth of CNT on graphene nanoscrolls followed by the impregnation of cobalt precursors and phosphorization for efficiently electrocatalytic hydrogen evolution.CoP nanoparticles mainly scattered at the tip of CNT branches which exhibited the analogical“Three-layer core-shell”structures.Experiments and density functional theory(DFT)calculations consistently disclose that the encapsulated various NiMs can offer different numbers of electrons to weaken the interactions of outmost CoP with H∗and push the downshift of the d-band center to different degrees as well as stabilize the outmost CoP nanopar-ticles to gain catalytic stability via the electron traversing effect.The electrocatalytic HER activity can be maximumly enhanced with low overpotentials of 78 mV(alkaline)and 89 mV(acidic)at a current density of 10 mA/cm^(2) and sustained at least 24 h especially for NiZn@C-CoP catalyst.This novel system is distinct from conventional three-layer heterostructure,providing a specially thought of d-band center control engineering strategy for the design of heterogeneous catalysts and expanding to other electrocat-alysts,energy storage,sensing,and other applications.展开更多
In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utili...In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utilization.However,there exist enormous challenges for the open and random access environment of CRNs,where the unlicensed secondary users(SUs) can use the channels that are not currently used by the licensed primary users(PUs) via spectrum-sensing technology.Because of this access method,some malicious users may access the cognitive network arbitrarily and launch some special attacks,such as primary user emulation attack,falsifying data or denial of service attack,which will cause serious damage to the cognitive radio network.In addition to the specifi c security threats of cognitive network,CRNs also face up to the conventional security threats,such as eavesdropping,tampering,imitation,forgery,and noncooperation etc..Hence,Cognitive radio networks have much more risks than traditional wireless networks with its special network model.In this paper,we considered the security threats from passive and active attacks.Firstly,the PHY layer security is presented in the view of passive attacks,and it is a compelling idea of using the physical properties of the radio channel to help provide secure wireless communications.Moreover,malicious user detection is introduced in the view of active attacks by means of the signal detection techniques to decrease the interference and the probabilities of false alarm and missed detection.Finally,we discuss the general countermeasures of security threats in three phases.In particular,we discuss the far reaching effect of defensive strategy against attacks in CRNs.展开更多
Software defined networking( SDN) offers programmable interface to effectively control their networks by decoupling control and data plane. The network operators utilize a centralized controller to deploy advanced net...Software defined networking( SDN) offers programmable interface to effectively control their networks by decoupling control and data plane. The network operators utilize a centralized controller to deploy advanced network management strategies. An architecture for application-aware routing which can support dynamic quality of service( Qo S) in SDN networks is proposed. The applicationaware routing as a multi-constrained optimal path( MCOP) problem is proposed,where applications are treated as Qo S flow and best-effort flows. With the SDN controller applications,it is able to dynamically lead routing decisions based on application characteristics and requirements,leading to a better overall user experience and higher utilization of network resources. The simulation results show that the improvement of application-aware routing framework on discovering appropriate routes,which can provide Qo S guarantees for a specific application in SDN networks.展开更多
This paper investigates the power control and routing problem in the communication process of an energy harvesting(EH)multi-hop cognitive radio network(CRN).The secondary user(SU)nodes(i.e.,source node and relay nodes...This paper investigates the power control and routing problem in the communication process of an energy harvesting(EH)multi-hop cognitive radio network(CRN).The secondary user(SU)nodes(i.e.,source node and relay nodes)harvest energy from the environment and use the energy exclusively for transmitting data.The SU nodes(i.e.,relay nodes)on the path,store and forward the received data to the destination node.We consider a real world scenario where the EH-SU node has only local causal knowledge,i.e.,at any time,each EH-SU node only has knowledge of its own EH process,channel state and currently received data.In order to study the power and routing issues,an optimization problem that maximizes path throughput considering quality of service(QoS)and available energy constraints is proposed.To solve this optimization problem,we propose a hybrid game theory routing and power control algorithm(HGRPC).The EH-SU nodes on the same path cooperate with each other,but EH-SU nodes on the different paths compete with each other.By selecting the best next hop node,we find the best strategy that can maximize throughput.In addition,we have established four steps to achieve routing,i.e.,route discovery,route selection,route reply,and route maintenance.Compared with the direct transmission,HGRPC has advantages in longer distances and higher hop counts.The algorithm generates more energy,reduces energy consumption and increases predictable residual energy.In particular,the time complexity of HGRPC is analyzed and its convergence is proved.In simulation experiments,the performance(i.e.,throughput and bit error rate(BER))of HGRPC is evaluated.Finally,experimental results show that HGRPC has higher throughput,longer network life,less latency,and lower energy consumption.展开更多
Based on the analysis of the security problems existing in the cloud platform of the data center, this paper proposes a set of cloud platform security protection scheme being with virtualization technology. This paper...Based on the analysis of the security problems existing in the cloud platform of the data center, this paper proposes a set of cloud platform security protection scheme being with virtualization technology. This paper focuses on the overall architecture of cloud platform as well as the design of virtualization security architecture. Meantime, it introduces the key technologies of VXLAN in detail. The scheme realizes flexible scheduling of security resources through virtual pooling of independent security gateway and virtual machine isolation through VXLAN technology. Moreover, it guides all horizontal traffic to independent security gateway for processing, unified management of security gateway through cloud platform by using Huawei NSH business chain technology. This scheme effectively solves the horizontal transmission of security threat among virtual machines, and realizes the fine security control and protection for the campus data center.展开更多
The industrial Internet realizes intelligent control and optimized operation of the industrial system through network interconnection.The industrial Internet identifier is the core element to accomplish this task.The ...The industrial Internet realizes intelligent control and optimized operation of the industrial system through network interconnection.The industrial Internet identifier is the core element to accomplish this task.The traditional industrial Internet identifier resolution technologies depend excessively on IP networks,and cannot meet the requirements of ubiquitous resource-restraint Internet of Things(IoT)devices.An industrial Internet identifier resolution management strategy based on multi-identifier network architecture is proposed in this paper,which supports content names,identities,locations,apart from the traditional IP address.The application of multiple types of identifiers not only solves the problem of IP addresses exhaustion,but also enhances the security,credibility,and availability of the industrial Internet identification resolution system.An inter-translation scheme between multiple identifiers is designed to support multiple identifiers and the standard ones.We present an addressing and routing algorithm for identifier resolution to make it convenient to put our strategy into practice.展开更多
There were two strategies for the data forwarding in the content-centric networking(CCN): forwarding strategy and routing strategy. Forwarding strategy only considered a separated node rather than the whole network pe...There were two strategies for the data forwarding in the content-centric networking(CCN): forwarding strategy and routing strategy. Forwarding strategy only considered a separated node rather than the whole network performance, and Interest flooding led to the network overhead and redundancy as well. As for routing strategy in CCN, each node was required to run the protocol. It was a waste of routing cost and unfit for large-scale deployment.This paper presents the super node routing strategy in CCN. Some super nodes selected from the peer nodes in CCN were used to receive the routing information from their slave nodes and compute the face-to-path to establish forwarding information base(FIB). Then FIB was sent to slave nodes to control and manage the slave nodes. The theoretical analysis showed that the super node routing strategy possessed robustness and scalability, achieved load balancing,reduced the redundancy and improved the network performance. In three topologies, three experiments were carried out to test the super node routing strategy. Network performance results showed that the proposed strategy had a shorter delay, lower CPU utilization and less redundancy compared with CCN.展开更多
Wireless sensor networks had become a hot research topic in Information science because of their ability to collect and process target information periodically in a harsh or remote environment. However, wireless senso...Wireless sensor networks had become a hot research topic in Information science because of their ability to collect and process target information periodically in a harsh or remote environment. However, wireless sensor networks were inherently limited in various software and hardware resources, especially the lack of energy resources, which is the biggest bottleneck restricting their further development. A large amount of research had been conducted to implement various optimization techniques for the problem of data transmission path selection in homogeneous wireless sensor networks. However, there is still great room for improvement in the optimization of data transmission path selection in heterogeneous wireless sensor networks (HWSNs). This paper proposes a data transmission path selection (HDQNs) protocol based on Deep reinforcement learning. In order to solve the energy consumption balance problem of heterogeneous nodes in the data transmission path selection process of HWSNs and shorten the communication distance from nodes to convergence, the protocol proposes a data collection algorithm based on Deep reinforcement learning DQN. The algorithm uses energy heterogeneous super nodes as AGent to take a series of actions against different states of HWSNs and obtain corresponding rewards to find the best data collection route. Simulation analysis shows that the HDQN protocol outperforms mainstream HWSN data transmission path selection protocols such as DEEC and SEP in key performance indicators such as overall energy efficiency, network lifetime, and system robustness.展开更多
Security issues are always difficult to deal with in mobile ad hoe networks. People seldom studied the costs of those security schemes respectively and for some security methods designed and adopted beforehand, their ...Security issues are always difficult to deal with in mobile ad hoe networks. People seldom studied the costs of those security schemes respectively and for some security methods designed and adopted beforehand, their effects are often investigated one by one. In fact, when facing certain attacks, different methods would respond individually and result in waste of resources. Making use of the cost management idea, we analyze the costs of security measures in mobile ad hoc networks and introduce a security framework based on security mechanisms cost management. Under the framework, the network system's own tasks can be finished in time and the whole network's security costs can be decreased. We discuss the process of security costs computation at each mobile node and in certain nodes groups. To show how to use the proposed security framework in certain applications, we give examples of DoS attacks and costs computation of defense methods. The results showed that more secure environment can be achieved based on the security framework in mobile ad hoc networks.展开更多
A main shortcoming of mobile Ad-hoc network's reactive routing protocols is the large volume of far-reaching control traffic required to support the route discovery (RD) and route repair (RR) mechanism. Using a ra...A main shortcoming of mobile Ad-hoc network's reactive routing protocols is the large volume of far-reaching control traffic required to support the route discovery (RD) and route repair (RR) mechanism. Using a random mobility model, this paper derives the probability equation of the relative distance (RDIS) between any two mobile hosts in an ad-hoc network. Consequently, combining with average equivalent hop distance (AEHD), a host can estimate the routing hops between itself and any destination host each time the RD/RR procedure is triggered, and reduce the flooding area of RD/RR messages. Simulation results show that this optimized route repair (ORR) algorithm can significantly decrease the communication overhead of RR process by about 35%.展开更多
As edge computing services soar,the problem of resource fragmentation situation is greatly worsened in elastic optical networks(EON).Aimed to solve this problem,this article proposes the fragmentation prediction model...As edge computing services soar,the problem of resource fragmentation situation is greatly worsened in elastic optical networks(EON).Aimed to solve this problem,this article proposes the fragmentation prediction model that makes full use of the gate recurrent unit(GRU)algorithm.Based on the fragmentation prediction model,one virtual optical network mapping scheme is presented for edge computing driven EON.With the minimum of fragmentation degree all over the whole EON,the virtual network mapping can be successively conducted.Test results show that the proposed approach can reduce blocking rate,and the supporting ability for virtual optical network services is greatly improved.展开更多
Research in Information Science and interdisciplinary areas suggested the formation of a growing network of international research collaboration.The massive transmission of COVID-19 worldwide especially after the iden...Research in Information Science and interdisciplinary areas suggested the formation of a growing network of international research collaboration.The massive transmission of COVID-19 worldwide especially after the identification of the Omicron variant could fundamentally alter the factors shaping the network's development.This study employs network analysis methods to analyze the structure of the COVID-19 research collaboration from 2020 to 2022,using two major academic publication databases and the VOSviewer software.A novel temporal view is added by examining the dynamic changes of the network,and a fractional counting method is adopted as methodological improvements to previous research.Analysis reveals that the COVID-19 research network structure has undergone substantial changes over time,as collaborating countries and regions form and re-form new clusters.Transformations in the network can be partly explained by key developments in the pandemic and other social-political events.China as one of the largest pivots in the network formed a relatively distinct cluster,with potential to develop a larger Asia-Pacific collaboration cluster based on its research impact.展开更多
With the development and popularization of network technology, such as attacks from the network is also facing serious challenges, showing a "one foot in mind that" the situation. How can detect possible security ri...With the development and popularization of network technology, such as attacks from the network is also facing serious challenges, showing a "one foot in mind that" the situation. How can detect possible security risks and the type of attack, and provide preventive strategy is to network managers have been pursuing the goal of network security situational awareness can speak a variety of services and associated data as a highly organic whole, summarized network security and dependency relationships come more comprehensive, complete, accurate decision-making for network security assessment and countermeasures.展开更多
In this article, a routing protocol EARP (Energy Aware Routing Protocol) with the terminal node is proposed, to deal with the impact of the limited energy resources of Cognitive Radio Networks on the whole network rou...In this article, a routing protocol EARP (Energy Aware Routing Protocol) with the terminal node is proposed, to deal with the impact of the limited energy resources of Cognitive Radio Networks on the whole network routing. The protocol allows choosing the route from the neighbor nodes in different transmission paths, according to energy consumption of a single node and the full path. If the path breaks, the protocol will increase local routing maintenance strategy. It effectively reduces the retransmission caused by the situation, and improves the routing efficiency. It also can prevent the link transmission process selecting the fault route due to the energy depletion. Through simulation experiments compared with the LEACH (Low Energy Adaptive Clustering Hierarchy) routing protocol, the results showed that in the same experimental environment, the proposed EARP could obviously balance the load, protect low energy nodes, prolong the network survival time and reduce packet loss rate and packet delay of data delivery. So it can improve the energy consumption of sensing node and provide routing capabilities.展开更多
The recommendation system(RS)on the strength of Graph Neural Networks(GNN)perceives a user-item interaction graph after collecting all items the user has interacted with.Afterward the RS performs neighborhood aggregat...The recommendation system(RS)on the strength of Graph Neural Networks(GNN)perceives a user-item interaction graph after collecting all items the user has interacted with.Afterward the RS performs neighborhood aggregation on the graph to generate long-term preference representations for the user in quick succession.However,user preferences are dynamic.With the passage of time and some trend guidance,users may generate some short-term preferences,which are more likely to lead to user-item interactions.A GNN recommendation based on long-and short-term preference(LSGNN)is proposed to address the above problems.LSGNN consists of four modules,using a GNN combined with the attention mechanism to extract long-term preference features,using Bidirectional Encoder Representation from Transformers(BERT)and the attention mechanism combined with Bi-Directional Gated Recurrent Unit(Bi-GRU)to extract short-term preference features,using Convolutional Neural Network(CNN)combined with the attention mechanism to add title and description representations of items,finally inner-producing long-term and short-term preference features as well as features of items to achieve recommendations.In experiments conducted on five publicly available datasets from Amazon,LSGNN is superior to state-of-the-art personalized recommendation techniques.展开更多
Based on the retrospect and analysis of the main points of the development of computer management information system,on the basis of the study of relevant data such as enterprise units,mass media,personal information ...Based on the retrospect and analysis of the main points of the development of computer management information system,on the basis of the study of relevant data such as enterprise units,mass media,personal information and information security,and according to the actual situation of our country,this paper intentionally and systematically collects relevant research materials on the role of management information system in the survival and development of enterprises,and aims at one or more merits.To study its impact,this paper focuses on three aspects:application analysis,development direction and implementation strategy,which can provide strong reference and guidance for the application of enterprise computer management system.展开更多
Spectrum resources are the precious and limited natural resources.In order to improve the utilization of spectrum resources and maximize the network throughput,this paper studies the resource allocation of the downlin...Spectrum resources are the precious and limited natural resources.In order to improve the utilization of spectrum resources and maximize the network throughput,this paper studies the resource allocation of the downlink cognitive radio network with non-orthogonalmultiple access(CRN-NOMA).NOMA,as the key technology of the fifth-generation communication(5G),can effectively increase the capacity of 5G networks.The optimization problem proposed in this paper aims to maximize the number of secondary users(SUs)accessing the system and the total throughput in the CRN-NOMA.Under the constraints of total power,minimum rate,interference and SINR,CRN-NOMA throughput is maximized by allocating optimal transmission power.First,for the situation of multiple sub-users,an adaptive optimization method is proposed to reduce the complexity of the optimization solution.Secondly,for the optimization problem of nonlinear programming,a maximization throughput optimization algorithm based on Chebyshev and convex(MTCC)for CRN-NOMA is proposed,which converts multi-objective optimization problem into single-objective optimization problem to solve.At the same time,the convergence and time complexity of the algorithm are verified.Theoretical analysis and simulation results show that the algorithm can effectively improve the system throughput.In terms of interference and throughput,the performance of the sub-optimal solution is better than that of orthogonal-frequency-division-multiple-access(OFDMA).This paper provides important insights for the research and application of NOMA in future communications.展开更多
基金supported by the National Natural Science Foundation of China (Grant Nos.12074213 and 11574108)the Major Basic Program of Natural Science Foundation of Shandong Province (Grant No.ZR2021ZD01)the Natural Science Foundation of Shandong Province (Grant No.ZR2023MA082)。
文摘In recent years,the research on superconductivity in one-dimensional(1D)materials has been attracting increasing attention due to its potential applications in low-dimensional nanodevices.However,the critical temperature(T_(c))of 1D superconductors is low.In this work,we theoretically investigate the possible high T_(c) superconductivity of(5,5)carbon nanotube(CNT).The pristine(5,5)CNT is a Dirac semimetal and can be modulated into a semiconductor by full hydrogenation.Interestingly,by further hole doping,it can be regulated into a metallic state with the sp3-hybridized𝜎electrons metalized,and a giant Kohn anomaly appears in the optical phonons.The two factors together enhance the electron–phonon coupling,and lead to high-T_(c) superconductivity.When the hole doping concentration of hydrogenated-(5,5)CNT is 2.5 hole/cell,the calculated T_(c) is 82.3 K,exceeding the boiling point of liquid nitrogen.Therefore,the predicted hole-doped hydrogenated-(5,5)CNT provides a new platform for 1D high-T_(c) superconductivity and may have potential applications in 1D nanodevices.
基金the Hi-Tech and Research Development Program of China(2005AA133070)the Electronics Information Industry Development Fund Tender Project(XDJ2-0514-27)
文摘Analyzed the main problems which were found in current conditions and prob- lems of informationization in coal enterprises.It clarified how to achieve informationization in coal mine and put forward a general configuration of informationization construction in which informationization in coal enterprises was divided into two parts: informationization of safety production and informationization of management.Planned a platform of inte- grated management of informationization in coal enterprises.Ultimately,it has brought forward that an overall integrated digital mine is the way to achieve the goal of informa- tionization in coal enterprises,which can promote the application of automation,digitaliza- tion,networking,informaitionization to intellectualization.At the same time,the competi- tiveness of enterprises can be improved entirely,and new type of coal industry can be supported by information technology.
基金This work was supported by the Science and Technology Pro-gram of Shaanxi Province(No.2019GY-200).Shengwu Guo and Wei Wang contributed to the material TEM and SEM characterizations in this work.
文摘Attaining a highly efficient and inexpensive electrocatalyst is significant for the hydrogen evolution reaction(HER)but still challenging nowadays.The transition-metal phosphides(TMPs)catalysts with platinum-like electronic structures are a potential candidate for the HER,but those are prone to be strongly bound with hydrogen intermediates(H∗),resulting in sluggish HER kinetics.Herein we report a unique hybrid structure of CoP anchored on graphene nanoscrolls@carbon nano tubes(CNTs)scaffold(Ni M@C-CoP)encapsulating various Ni M(M=Zn,Mo,Ni,Co)bimetal nanoalloy via chemical vapor deposi-tion(CVD)growth of CNT on graphene nanoscrolls followed by the impregnation of cobalt precursors and phosphorization for efficiently electrocatalytic hydrogen evolution.CoP nanoparticles mainly scattered at the tip of CNT branches which exhibited the analogical“Three-layer core-shell”structures.Experiments and density functional theory(DFT)calculations consistently disclose that the encapsulated various NiMs can offer different numbers of electrons to weaken the interactions of outmost CoP with H∗and push the downshift of the d-band center to different degrees as well as stabilize the outmost CoP nanopar-ticles to gain catalytic stability via the electron traversing effect.The electrocatalytic HER activity can be maximumly enhanced with low overpotentials of 78 mV(alkaline)and 89 mV(acidic)at a current density of 10 mA/cm^(2) and sustained at least 24 h especially for NiZn@C-CoP catalyst.This novel system is distinct from conventional three-layer heterostructure,providing a specially thought of d-band center control engineering strategy for the design of heterogeneous catalysts and expanding to other electrocat-alysts,energy storage,sensing,and other applications.
基金supported in part by the National Natural Science Foundation of China(61227801,61121001,61201152,and 61421061)the Program for New Century Excellent Talents in University(NCET-01-0259)the Fundamental Research Funds for the Central Universities(2013RC0106)
文摘In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utilization.However,there exist enormous challenges for the open and random access environment of CRNs,where the unlicensed secondary users(SUs) can use the channels that are not currently used by the licensed primary users(PUs) via spectrum-sensing technology.Because of this access method,some malicious users may access the cognitive network arbitrarily and launch some special attacks,such as primary user emulation attack,falsifying data or denial of service attack,which will cause serious damage to the cognitive radio network.In addition to the specifi c security threats of cognitive network,CRNs also face up to the conventional security threats,such as eavesdropping,tampering,imitation,forgery,and noncooperation etc..Hence,Cognitive radio networks have much more risks than traditional wireless networks with its special network model.In this paper,we considered the security threats from passive and active attacks.Firstly,the PHY layer security is presented in the view of passive attacks,and it is a compelling idea of using the physical properties of the radio channel to help provide secure wireless communications.Moreover,malicious user detection is introduced in the view of active attacks by means of the signal detection techniques to decrease the interference and the probabilities of false alarm and missed detection.Finally,we discuss the general countermeasures of security threats in three phases.In particular,we discuss the far reaching effect of defensive strategy against attacks in CRNs.
基金Supported by the National Basic Research Program of China(No.2012CB315803)the Around Five Top Priorities of One-Three-Five Strategic Planning,CNIC(No.CNIC PY 1401)Chinese Academy of Sciences,and the Knowledge Innovation Program of the Chinese Academy of Sciences(No.CNIC_QN_1508)
文摘Software defined networking( SDN) offers programmable interface to effectively control their networks by decoupling control and data plane. The network operators utilize a centralized controller to deploy advanced network management strategies. An architecture for application-aware routing which can support dynamic quality of service( Qo S) in SDN networks is proposed. The applicationaware routing as a multi-constrained optimal path( MCOP) problem is proposed,where applications are treated as Qo S flow and best-effort flows. With the SDN controller applications,it is able to dynamically lead routing decisions based on application characteristics and requirements,leading to a better overall user experience and higher utilization of network resources. The simulation results show that the improvement of application-aware routing framework on discovering appropriate routes,which can provide Qo S guarantees for a specific application in SDN networks.
基金This work was partially supported by the National Natural Science Foundation of China(No.61771410,No.61876089)by the Postgraduate Innovation Fund Project by Southwest University of Science and Technology(No.19ycx0106)+2 种基金by the Artificial Intelligence Key Laboratory of Sichuan Province(No.2017RYY05,No.2018RYJ03)by the Zigong City Key Science and Technology Plan Project(2019YYJC16)by and by the Horizontal Project(No.HX2017134,No.HX2018264,Nos.E10203788,HX2019250).
文摘This paper investigates the power control and routing problem in the communication process of an energy harvesting(EH)multi-hop cognitive radio network(CRN).The secondary user(SU)nodes(i.e.,source node and relay nodes)harvest energy from the environment and use the energy exclusively for transmitting data.The SU nodes(i.e.,relay nodes)on the path,store and forward the received data to the destination node.We consider a real world scenario where the EH-SU node has only local causal knowledge,i.e.,at any time,each EH-SU node only has knowledge of its own EH process,channel state and currently received data.In order to study the power and routing issues,an optimization problem that maximizes path throughput considering quality of service(QoS)and available energy constraints is proposed.To solve this optimization problem,we propose a hybrid game theory routing and power control algorithm(HGRPC).The EH-SU nodes on the same path cooperate with each other,but EH-SU nodes on the different paths compete with each other.By selecting the best next hop node,we find the best strategy that can maximize throughput.In addition,we have established four steps to achieve routing,i.e.,route discovery,route selection,route reply,and route maintenance.Compared with the direct transmission,HGRPC has advantages in longer distances and higher hop counts.The algorithm generates more energy,reduces energy consumption and increases predictable residual energy.In particular,the time complexity of HGRPC is analyzed and its convergence is proved.In simulation experiments,the performance(i.e.,throughput and bit error rate(BER))of HGRPC is evaluated.Finally,experimental results show that HGRPC has higher throughput,longer network life,less latency,and lower energy consumption.
文摘Based on the analysis of the security problems existing in the cloud platform of the data center, this paper proposes a set of cloud platform security protection scheme being with virtualization technology. This paper focuses on the overall architecture of cloud platform as well as the design of virtualization security architecture. Meantime, it introduces the key technologies of VXLAN in detail. The scheme realizes flexible scheduling of security resources through virtual pooling of independent security gateway and virtual machine isolation through VXLAN technology. Moreover, it guides all horizontal traffic to independent security gateway for processing, unified management of security gateway through cloud platform by using Huawei NSH business chain technology. This scheme effectively solves the horizontal transmission of security threat among virtual machines, and realizes the fine security control and protection for the campus data center.
基金supported in part by PCL Future Regional Network Facilities for Large-scale Experiments and Applications under Grant NO.PCL2018KP001by Guangdong R&D Key Program under Grant No.GD2016B030305005+3 种基金by National Natural Science Foundation of China(NSFC)under Grant No.61671001by National Key R&D Program of China under Grant No.2017YFB0803204by Shenzhen Research Programs under Grant Nos.JSGG20170824095858416,JCYJ20190808155607340,and JCYJ20170306092030521This work is also supported by the Shenzhen Municipal Development and Reform Commission(Disciplinary Development Program for Data Sci⁃ence and Intelligent Computing).
文摘The industrial Internet realizes intelligent control and optimized operation of the industrial system through network interconnection.The industrial Internet identifier is the core element to accomplish this task.The traditional industrial Internet identifier resolution technologies depend excessively on IP networks,and cannot meet the requirements of ubiquitous resource-restraint Internet of Things(IoT)devices.An industrial Internet identifier resolution management strategy based on multi-identifier network architecture is proposed in this paper,which supports content names,identities,locations,apart from the traditional IP address.The application of multiple types of identifiers not only solves the problem of IP addresses exhaustion,but also enhances the security,credibility,and availability of the industrial Internet identification resolution system.An inter-translation scheme between multiple identifiers is designed to support multiple identifiers and the standard ones.We present an addressing and routing algorithm for identifier resolution to make it convenient to put our strategy into practice.
基金Supported by the National Basic Research Program of China("973"Program,No.2013CB329100)Beijing Higher Education Young Elite Teacher Project(No.YETP0534)
文摘There were two strategies for the data forwarding in the content-centric networking(CCN): forwarding strategy and routing strategy. Forwarding strategy only considered a separated node rather than the whole network performance, and Interest flooding led to the network overhead and redundancy as well. As for routing strategy in CCN, each node was required to run the protocol. It was a waste of routing cost and unfit for large-scale deployment.This paper presents the super node routing strategy in CCN. Some super nodes selected from the peer nodes in CCN were used to receive the routing information from their slave nodes and compute the face-to-path to establish forwarding information base(FIB). Then FIB was sent to slave nodes to control and manage the slave nodes. The theoretical analysis showed that the super node routing strategy possessed robustness and scalability, achieved load balancing,reduced the redundancy and improved the network performance. In three topologies, three experiments were carried out to test the super node routing strategy. Network performance results showed that the proposed strategy had a shorter delay, lower CPU utilization and less redundancy compared with CCN.
文摘Wireless sensor networks had become a hot research topic in Information science because of their ability to collect and process target information periodically in a harsh or remote environment. However, wireless sensor networks were inherently limited in various software and hardware resources, especially the lack of energy resources, which is the biggest bottleneck restricting their further development. A large amount of research had been conducted to implement various optimization techniques for the problem of data transmission path selection in homogeneous wireless sensor networks. However, there is still great room for improvement in the optimization of data transmission path selection in heterogeneous wireless sensor networks (HWSNs). This paper proposes a data transmission path selection (HDQNs) protocol based on Deep reinforcement learning. In order to solve the energy consumption balance problem of heterogeneous nodes in the data transmission path selection process of HWSNs and shorten the communication distance from nodes to convergence, the protocol proposes a data collection algorithm based on Deep reinforcement learning DQN. The algorithm uses energy heterogeneous super nodes as AGent to take a series of actions against different states of HWSNs and obtain corresponding rewards to find the best data collection route. Simulation analysis shows that the HDQN protocol outperforms mainstream HWSN data transmission path selection protocols such as DEEC and SEP in key performance indicators such as overall energy efficiency, network lifetime, and system robustness.
文摘Security issues are always difficult to deal with in mobile ad hoe networks. People seldom studied the costs of those security schemes respectively and for some security methods designed and adopted beforehand, their effects are often investigated one by one. In fact, when facing certain attacks, different methods would respond individually and result in waste of resources. Making use of the cost management idea, we analyze the costs of security measures in mobile ad hoc networks and introduce a security framework based on security mechanisms cost management. Under the framework, the network system's own tasks can be finished in time and the whole network's security costs can be decreased. We discuss the process of security costs computation at each mobile node and in certain nodes groups. To show how to use the proposed security framework in certain applications, we give examples of DoS attacks and costs computation of defense methods. The results showed that more secure environment can be achieved based on the security framework in mobile ad hoc networks.
文摘A main shortcoming of mobile Ad-hoc network's reactive routing protocols is the large volume of far-reaching control traffic required to support the route discovery (RD) and route repair (RR) mechanism. Using a random mobility model, this paper derives the probability equation of the relative distance (RDIS) between any two mobile hosts in an ad-hoc network. Consequently, combining with average equivalent hop distance (AEHD), a host can estimate the routing hops between itself and any destination host each time the RD/RR procedure is triggered, and reduce the flooding area of RD/RR messages. Simulation results show that this optimized route repair (ORR) algorithm can significantly decrease the communication overhead of RR process by about 35%.
基金Supported by the National Key Research and Development Program of China(No.2021YFB2401204)。
文摘As edge computing services soar,the problem of resource fragmentation situation is greatly worsened in elastic optical networks(EON).Aimed to solve this problem,this article proposes the fragmentation prediction model that makes full use of the gate recurrent unit(GRU)algorithm.Based on the fragmentation prediction model,one virtual optical network mapping scheme is presented for edge computing driven EON.With the minimum of fragmentation degree all over the whole EON,the virtual network mapping can be successively conducted.Test results show that the proposed approach can reduce blocking rate,and the supporting ability for virtual optical network services is greatly improved.
基金the Decision and Consultancy Research of Shanghai Jiao Tong University(No.JCZXZGB-01)。
文摘Research in Information Science and interdisciplinary areas suggested the formation of a growing network of international research collaboration.The massive transmission of COVID-19 worldwide especially after the identification of the Omicron variant could fundamentally alter the factors shaping the network's development.This study employs network analysis methods to analyze the structure of the COVID-19 research collaboration from 2020 to 2022,using two major academic publication databases and the VOSviewer software.A novel temporal view is added by examining the dynamic changes of the network,and a fractional counting method is adopted as methodological improvements to previous research.Analysis reveals that the COVID-19 research network structure has undergone substantial changes over time,as collaborating countries and regions form and re-form new clusters.Transformations in the network can be partly explained by key developments in the pandemic and other social-political events.China as one of the largest pivots in the network formed a relatively distinct cluster,with potential to develop a larger Asia-Pacific collaboration cluster based on its research impact.
文摘With the development and popularization of network technology, such as attacks from the network is also facing serious challenges, showing a "one foot in mind that" the situation. How can detect possible security risks and the type of attack, and provide preventive strategy is to network managers have been pursuing the goal of network security situational awareness can speak a variety of services and associated data as a highly organic whole, summarized network security and dependency relationships come more comprehensive, complete, accurate decision-making for network security assessment and countermeasures.
文摘In this article, a routing protocol EARP (Energy Aware Routing Protocol) with the terminal node is proposed, to deal with the impact of the limited energy resources of Cognitive Radio Networks on the whole network routing. The protocol allows choosing the route from the neighbor nodes in different transmission paths, according to energy consumption of a single node and the full path. If the path breaks, the protocol will increase local routing maintenance strategy. It effectively reduces the retransmission caused by the situation, and improves the routing efficiency. It also can prevent the link transmission process selecting the fault route due to the energy depletion. Through simulation experiments compared with the LEACH (Low Energy Adaptive Clustering Hierarchy) routing protocol, the results showed that in the same experimental environment, the proposed EARP could obviously balance the load, protect low energy nodes, prolong the network survival time and reduce packet loss rate and packet delay of data delivery. So it can improve the energy consumption of sensing node and provide routing capabilities.
基金supported by the National Natural Science Foundation of China under Grant 61762031the Science and Technology Major Project of Guangxi Province under Grant AA19046004+2 种基金the Natural Science Foundation of Guangxi under Grant 2021JJA170130the Innovation Project of Guangxi Graduate Education under Grant YCSW2022326the Research Project of Guangxi Philosophy and Social Science Planning under Grant 21FGL040。
文摘The recommendation system(RS)on the strength of Graph Neural Networks(GNN)perceives a user-item interaction graph after collecting all items the user has interacted with.Afterward the RS performs neighborhood aggregation on the graph to generate long-term preference representations for the user in quick succession.However,user preferences are dynamic.With the passage of time and some trend guidance,users may generate some short-term preferences,which are more likely to lead to user-item interactions.A GNN recommendation based on long-and short-term preference(LSGNN)is proposed to address the above problems.LSGNN consists of four modules,using a GNN combined with the attention mechanism to extract long-term preference features,using Bidirectional Encoder Representation from Transformers(BERT)and the attention mechanism combined with Bi-Directional Gated Recurrent Unit(Bi-GRU)to extract short-term preference features,using Convolutional Neural Network(CNN)combined with the attention mechanism to add title and description representations of items,finally inner-producing long-term and short-term preference features as well as features of items to achieve recommendations.In experiments conducted on five publicly available datasets from Amazon,LSGNN is superior to state-of-the-art personalized recommendation techniques.
基金(1)Project Name:Research on Key Technologies of safe campus construction based on multi-sensor big data fusion(Project number:20190303096sf)(2)Project Name:Research on Key Technologies of smart campus management platform based on big data(Project No.:18dy026)(3)Research on the application of BIM based high-rise building fire rescue and big data escape planning system(Project No.:2020c019-7)。
文摘Based on the retrospect and analysis of the main points of the development of computer management information system,on the basis of the study of relevant data such as enterprise units,mass media,personal information and information security,and according to the actual situation of our country,this paper intentionally and systematically collects relevant research materials on the role of management information system in the survival and development of enterprises,and aims at one or more merits.To study its impact,this paper focuses on three aspects:application analysis,development direction and implementation strategy,which can provide strong reference and guidance for the application of enterprise computer management system.
基金This work was partially supported by the National Natural Science Foundation of China(Nos.61876089,61771410)by the Talent Introduction Project of Sichuan University of Science&Engineering(No.2020RC22)+2 种基金by the Zigong City Key Science and Technology Program(No.2019YYJC16)by the Enterprise Informatization and Internet of Things Measurement and Control Technology Sichuan Provincial Key Laboratory of universities(Nos.2020WZJ02,2014WYJ08)by Artificial Intelligence Key Laboratory of Sichuan Province(No.2015RYJ04).
文摘Spectrum resources are the precious and limited natural resources.In order to improve the utilization of spectrum resources and maximize the network throughput,this paper studies the resource allocation of the downlink cognitive radio network with non-orthogonalmultiple access(CRN-NOMA).NOMA,as the key technology of the fifth-generation communication(5G),can effectively increase the capacity of 5G networks.The optimization problem proposed in this paper aims to maximize the number of secondary users(SUs)accessing the system and the total throughput in the CRN-NOMA.Under the constraints of total power,minimum rate,interference and SINR,CRN-NOMA throughput is maximized by allocating optimal transmission power.First,for the situation of multiple sub-users,an adaptive optimization method is proposed to reduce the complexity of the optimization solution.Secondly,for the optimization problem of nonlinear programming,a maximization throughput optimization algorithm based on Chebyshev and convex(MTCC)for CRN-NOMA is proposed,which converts multi-objective optimization problem into single-objective optimization problem to solve.At the same time,the convergence and time complexity of the algorithm are verified.Theoretical analysis and simulation results show that the algorithm can effectively improve the system throughput.In terms of interference and throughput,the performance of the sub-optimal solution is better than that of orthogonal-frequency-division-multiple-access(OFDMA).This paper provides important insights for the research and application of NOMA in future communications.