期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Application reliability for communication networks and its analysis method 被引量:6
1
作者 Ning Huang Yang Chen +2 位作者 Dong Hou Liudong Xing Rui Kang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2011年第6期1030-1036,共7页
The network reliability is difficult to be evaluated because of the complex relationship among the network components.It can be quite different for different users running different applications on the same network.Th... The network reliability is difficult to be evaluated because of the complex relationship among the network components.It can be quite different for different users running different applications on the same network.This paper proposes a new concept and a model of application reliability.Different from the existing models that ignores the effects of applications,the proposed application reliability model considers the effects of different applications on the network performance and different types of network faults and makes the analysis of network components relationship possible.This paper also provides a method to evaluate the application reliability when the data flow satisfies Markov properties.Finally,a case study is presented to illustrate the proposed network reliability model and the analysis method. 展开更多
关键词 application reliability performance reliability service reliability NETWORK Markov model.
在线阅读 下载PDF
SAE-TOPSIS algorithm for vertical handoff decision in heterogeneous wireless networks
2
作者 刘胜美 Pan Su Mi Zhengkun 《High Technology Letters》 EI CAS 2012年第4期382-386,共5页
An improved technique for order preference by similarity to ideal solution (TOPSIS) algorithm, SAE-TOPSIS, is proposed for the vertical handoff decision in heterogeneous wireless networks. The signal to interference... An improved technique for order preference by similarity to ideal solution (TOPSIS) algorithm, SAE-TOPSIS, is proposed for the vertical handoff decision in heterogeneous wireless networks. The signal to interference plus noise ratio (SINR) effects, analytic hierarchy process (AHP) and infor- mation entropy (SAE) weight method were introduced into the algorithm. Handoff decision meeting the multi-attribute quality of service (QoS) requirement is made according to an attribute matrix and weight vector using the TOPSIS algorithm. The simulation results have shown that the proposed algo- rithm can provide satisfactory performance fitted to the characteristics of the traffic. 展开更多
关键词 heterogeneous wireless networks vertical handoff technique for order preferenceby similarity to ideal solution (TOPSIS) analytic hierarchy process (AHP) ENTROPY signal to in-terference plus noise ratio (SINR)
在线阅读 下载PDF
Distributed algorithm for solving variational inequalities over time-varying unbalanced digraphs
3
作者 Yichen Zhang Yutao Tang +1 位作者 Zhipeng Tu Yiguang Hong 《Control Theory and Technology》 EI CSCD 2024年第3期431-441,共11页
In this paper,we study a distributed model to cooperatively compute variational inequalities over time-varying directed graphs.Here,each agent has access to a part of the full mapping and holds a local view of the glo... In this paper,we study a distributed model to cooperatively compute variational inequalities over time-varying directed graphs.Here,each agent has access to a part of the full mapping and holds a local view of the global set constraint.By virtue of an auxiliary vector to compensate the graph imbalance,we propose a consensus-based distributed projection algorithm relying on local computation and communication at each agent.We show the convergence of this algorithm over uniformly jointly strongly connected unbalanced digraphs with nonidentical local constraints.We also provide a numerical example to illustrate the effectiveness of our algorithm. 展开更多
关键词 Variational inequality Distributed computation Multi-agent system Weight-unbalanced graph
原文传递
Extended Overlapping Community Detection Algorithm by Label Propagation for Internet Application Identification 被引量:1
4
作者 Yu Ke Zhang Xinyu +2 位作者 Di Jiaxi Wu Xiaofei Su Sixi 《China Communications》 SCIE CSCD 2012年第12期22-35,共14页
The increased capacity and availability of the Intemet has led to a wide variety of applications. Intemet traffic characterization and application identification is important for network management. In this paper, bas... The increased capacity and availability of the Intemet has led to a wide variety of applications. Intemet traffic characterization and application identification is important for network management. In this paper, based on detailed flow data collected from the public networks of Intemet Service Providers, we construct a flow graph to model the interactions among users. Considering traffic from different applications, we analyze the community structure of the flow graph in terms of cormmunity size, degree distribution of the community, community overlap, and overlap modularity. The near linear time community detection algorithm in complex networks, the Label Propagation Algorithm (LPA), is extended to the flow graph for application identification. We propose a new initialization and label propagation and update scheme. Experimental results show that the proposed algorithm has high accuracy and efficiency. 展开更多
关键词 application identification communitydetection label propagation complex network Intemet traffic flow
在线阅读 下载PDF
Enhanced Intrusion Detection System for an EH IoT Architecture Using a Cooperative UAV Relay and Friendly UAV Jammer
5
作者 Van Nhan Vo Hung Tran Chakchai So-In 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第11期1786-1799,共14页
In this paper,the detection capabilities and system performance of an energy harvesting(EH)Internet of Things(Io T)architecture in the presence of an unmanned aerial vehicle(UAV)eavesdropper(UE)are investigated.The co... In this paper,the detection capabilities and system performance of an energy harvesting(EH)Internet of Things(Io T)architecture in the presence of an unmanned aerial vehicle(UAV)eavesdropper(UE)are investigated.The communication protocol is divided into two phases.In the first phase,a UAV relay(UR)cooperates with a friendly UAV jammer(UJ)to detect the UE,and the UR and UJ harvest energy from a power beacon(PB).In the second phase,a ground base station(GBS)sends a confidential signal to the UR using non-orthogonal multiple access(NOMA);the UR then uses its harvested energy to forward this confidential signal to IoT destinations(IDs)using the decode-and-forward(DF)technique.Simultaneously,the UJ uses its harvested energy to emit an artificial signal to combat the detected UE.A closed-form expression for the probability of detecting the UE(the detection probability,DP)is derived to analyze the detection performance.Furthermore,the intercept probability(IP)and throughput of the considered IoT architecture are determined.Accordingly,we identify the optimal altitudes for the UR and UJ to enhance the system and secrecy performance.Monte Carlo simulations are employed to verify our approach. 展开更多
关键词 Detection probability(DP) energy harvesting(EH) friendly UAV jammer Internet of Things(IoT) system performance UAV detection
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部