Analyzing rock mass seepage using the discrete fracture network(DFN)flow model poses challenges when dealing with complex fracture networks.This paper presents a novel DFN flow model that incorporates the actual conne...Analyzing rock mass seepage using the discrete fracture network(DFN)flow model poses challenges when dealing with complex fracture networks.This paper presents a novel DFN flow model that incorporates the actual connections of large-scale fractures.Notably,this model efficiently manages over 20,000 fractures without necessitating adjustments to the DFN geometry.All geometric analyses,such as identifying connected fractures,dividing the two-dimensional domain into closed loops,triangulating arbitrary loops,and refining triangular elements,are fully automated.The analysis processes are comprehensively introduced,and core algorithms,along with their pseudo-codes,are outlined and explained to assist readers in their programming endeavors.The accuracy of geometric analyses is validated through topological graphs representing the connection relationships between fractures.In practical application,the proposed model is employed to assess the water-sealing effectiveness of an underground storage cavern project.The analysis results indicate that the existing design scheme can effectively prevent the stored oil from leaking in the presence of both dense and sparse fractures.Furthermore,following extensive modification and optimization,the scale and precision of model computation suggest that the proposed model and developed codes can meet the requirements of engineering applications.展开更多
VPNs are vital for safeguarding communication routes in the continually changing cybersecurity world.However,increasing network attack complexity and variety require increasingly advanced algorithms to recognize and c...VPNs are vital for safeguarding communication routes in the continually changing cybersecurity world.However,increasing network attack complexity and variety require increasingly advanced algorithms to recognize and categorizeVPNnetwork data.We present a novelVPNnetwork traffic flowclassificationmethod utilizing Artificial Neural Networks(ANN).This paper aims to provide a reliable system that can identify a virtual private network(VPN)traffic fromintrusion attempts,data exfiltration,and denial-of-service assaults.We compile a broad dataset of labeled VPN traffic flows from various apps and usage patterns.Next,we create an ANN architecture that can handle encrypted communication and distinguish benign from dangerous actions.To effectively process and categorize encrypted packets,the neural network model has input,hidden,and output layers.We use advanced feature extraction approaches to improve the ANN’s classification accuracy by leveraging network traffic’s statistical and behavioral properties.We also use cutting-edge optimizationmethods to optimize network characteristics and performance.The suggested ANN-based categorization method is extensively tested and analyzed.Results show the model effectively classifies VPN traffic types.We also show that our ANN-based technique outperforms other approaches in precision,recall,and F1-score with 98.79%accuracy.This study improves VPN security and protects against new cyberthreats.Classifying VPNtraffic flows effectively helps enterprises protect sensitive data,maintain network integrity,and respond quickly to security problems.This study advances network security and lays the groundwork for ANN-based cybersecurity solutions.展开更多
Purpose:This paper aims to address the limitations in existing research on the evolution of knowledge flow networks by proposing a meso-level institutional field knowledge flow network evolution model(IKM).The purpose...Purpose:This paper aims to address the limitations in existing research on the evolution of knowledge flow networks by proposing a meso-level institutional field knowledge flow network evolution model(IKM).The purpose is to simulate the construction process of a knowledge flow network using knowledge organizations as units and to investigate its effectiveness in replicating institutional field knowledge flow networks.Design/Methodology/Approach:The IKM model enhances the preferential attachment and growth observed in scale-free BA networks,while incorporating three adjustment parameters to simulate the selection of connection targets and the types of nodes involved in the network evolution process Using the PageRank algorithm to calculate the significance of nodes within the knowledge flow network.To compare its performance,the BA and DMS models are also employed for simulating the network.Pearson coefficient analysis is conducted on the simulated networks generated by the IKM,BA and DMS models,as well as on the actual network.Findings:The research findings demonstrate that the IKM model outperforms the BA and DMS models in replicating the institutional field knowledge flow network.It provides comprehensive insights into the evolution mechanism of knowledge flow networks in the scientific research realm.The model also exhibits potential applicability to other knowledge networks that involve knowledge organizations as node units.Research Limitations:This study has some limitations.Firstly,it primarily focuses on the evolution of knowledge flow networks within the field of physics,neglecting other fields.Additionally,the analysis is based on a specific set of data,which may limit the generalizability of the findings.Future research could address these limitations by exploring knowledge flow networks in diverse fields and utilizing broader datasets.Practical Implications:The proposed IKM model offers practical implications for the construction and analysis of knowledge flow networks within institutions.It provides a valuable tool for understanding and managing knowledge exchange between knowledge organizations.The model can aid in optimizing knowledge flow and enhancing collaboration within organizations.Originality/value:This research highlights the significance of meso-level studies in understanding knowledge organization and its impact on knowledge flow networks.The IKM model demonstrates its effectiveness in replicating institutional field knowledge flow networks and offers practical implications for knowledge management in institutions.Moreover,the model has the potential to be applied to other knowledge networks,which are formed by knowledge organizations as node units.展开更多
Recent advances in deep neural networks have shed new light on physics,engineering,and scientific computing.Reconciling the data-centered viewpoint with physical simulation is one of the research hotspots.The physicsi...Recent advances in deep neural networks have shed new light on physics,engineering,and scientific computing.Reconciling the data-centered viewpoint with physical simulation is one of the research hotspots.The physicsinformedneural network(PINN)is currently the most general framework,which is more popular due to theconvenience of constructing NNs and excellent generalization ability.The automatic differentiation(AD)-basedPINN model is suitable for the homogeneous scientific problem;however,it is unclear how AD can enforce fluxcontinuity across boundaries between cells of different properties where spatial heterogeneity is represented bygrid cells with different physical properties.In this work,we propose a criss-cross physics-informed convolutionalneural network(CC-PINN)learning architecture,aiming to learn the solution of parametric PDEs with spatialheterogeneity of physical properties.To achieve the seamless enforcement of flux continuity and integration ofphysicalmeaning into CNN,a predefined 2D convolutional layer is proposed to accurately express transmissibilitybetween adjacent cells.The efficacy of the proposedmethodwas evaluated through predictions of several petroleumreservoir problems with spatial heterogeneity and compared against state-of-the-art(PINN)through numericalanalysis as a benchmark,which demonstrated the superiority of the proposed method over the PINN.展开更多
Traffic flow prediction plays a key role in the construction of intelligent transportation system.However,due to its complex spatio-temporal dependence and its uncertainty,the research becomes very challenging.Most of...Traffic flow prediction plays a key role in the construction of intelligent transportation system.However,due to its complex spatio-temporal dependence and its uncertainty,the research becomes very challenging.Most of the existing studies are based on graph neural networks that model traffic flow graphs and try to use fixed graph structure to deal with the relationship between nodes.However,due to the time-varying spatial correlation of the traffic network,there is no fixed node relationship,and these methods cannot effectively integrate the temporal and spatial features.This paper proposes a novel temporal-spatial dynamic graph convolutional network(TSADGCN).The dynamic time warping algorithm(DTW)is introduced to calculate the similarity of traffic flow sequence among network nodes in the time dimension,and the spatiotemporal graph of traffic flow is constructed to capture the spatiotemporal characteristics and dependencies of traffic flow.By combining graph attention network and time attention network,a spatiotemporal convolution block is constructed to capture spatiotemporal characteristics of traffic data.Experiments on open data sets PEMSD4 and PEMSD8 show that TSADGCN has higher prediction accuracy than well-known traffic flow prediction algorithms.展开更多
Due to the rapid evolution of Advanced Persistent Threats(APTs)attacks,the emergence of new and rare attack samples,and even those never seen before,make it challenging for traditional rule-based detection methods to ...Due to the rapid evolution of Advanced Persistent Threats(APTs)attacks,the emergence of new and rare attack samples,and even those never seen before,make it challenging for traditional rule-based detection methods to extract universal rules for effective detection.With the progress in techniques such as transfer learning and meta-learning,few-shot network attack detection has progressed.However,challenges in few-shot network attack detection arise from the inability of time sequence flow features to adapt to the fixed length input requirement of deep learning,difficulties in capturing rich information from original flow in the case of insufficient samples,and the challenge of high-level abstract representation.To address these challenges,a few-shot network attack detection based on NFHP(Network Flow Holographic Picture)-RN(ResNet)is proposed.Specifically,leveraging inherent properties of images such as translation invariance,rotation invariance,scale invariance,and illumination invariance,network attack traffic features and contextual relationships are intuitively represented in NFHP.In addition,an improved RN network model is employed for high-level abstract feature extraction,ensuring that the extracted high-level abstract features maintain the detailed characteristics of the original traffic behavior,regardless of changes in background traffic.Finally,a meta-learning model based on the self-attention mechanism is constructed,achieving the detection of novel APT few-shot network attacks through the empirical generalization of high-level abstract feature representations of known-class network attack behaviors.Experimental results demonstrate that the proposed method can learn high-level abstract features of network attacks across different traffic detail granularities.Comparedwith state-of-the-artmethods,it achieves favorable accuracy,precision,recall,and F1 scores for the identification of unknown-class network attacks through cross-validation onmultiple datasets.展开更多
Unsupervised methods based on density representation have shown their abilities in anomaly detection,but detection performance still needs to be improved.Specifically,approaches using normalizing flows can accurately ...Unsupervised methods based on density representation have shown their abilities in anomaly detection,but detection performance still needs to be improved.Specifically,approaches using normalizing flows can accurately evaluate sample distributions,mapping normal features to the normal distribution and anomalous features outside it.Consequently,this paper proposes a Normalizing Flow-based Bidirectional Mapping Residual Network(NF-BMR).It utilizes pre-trained Convolutional Neural Networks(CNN)and normalizing flows to construct discriminative source and target domain feature spaces.Additionally,to better learn feature information in both domain spaces,we propose the Bidirectional Mapping Residual Network(BMR),which maps sample features to these two spaces for anomaly detection.The two detection spaces effectively complement each other’s deficiencies and provide a comprehensive feature evaluation from two perspectives,which leads to the improvement of detection performance.Comparative experimental results on the MVTec AD and DAGM datasets against the Bidirectional Pre-trained Feature Mapping Network(B-PFM)and other state-of-the-art methods demonstrate that the proposed approach achieves superior performance.On the MVTec AD dataset,NF-BMR achieves an average AUROC of 98.7%for all 15 categories.Especially,it achieves 100%optimal detection performance in five categories.On the DAGM dataset,the average AUROC across ten categories is 98.7%,which is very close to supervised methods.展开更多
In the contemporary era,the global expansion of electrical grids is propelled by various renewable energy sources(RESs).Efficient integration of stochastic RESs and optimal power flow(OPF)management are critical for n...In the contemporary era,the global expansion of electrical grids is propelled by various renewable energy sources(RESs).Efficient integration of stochastic RESs and optimal power flow(OPF)management are critical for network optimization.This study introduces an innovative solution,the Gaussian Bare-Bones Levy Cheetah Optimizer(GBBLCO),addressing OPF challenges in power generation systems with stochastic RESs.The primary objective is to minimize the total operating costs of RESs,considering four functions:overall operating costs,voltage deviation management,emissions reduction,voltage stability index(VSI)and power loss mitigation.Additionally,a carbon tax is included in the objective function to reduce carbon emissions.Thorough scrutiny,using modified IEEE 30-bus and IEEE 118-bus systems,validates GBBLCO’s superior performance in achieving optimal solutions.Simulation results demonstrate GBBLCO’s efficacy in six optimization scenarios:total cost with valve point effects,total cost with emission and carbon tax,total cost with prohibited operating zones,active power loss optimization,voltage deviation optimization and enhancing voltage stability index(VSI).GBBLCO outperforms conventional techniques in each scenario,showcasing rapid convergence and superior solution quality.Notably,GBBLCO navigates complexities introduced by valve point effects,adapts to environmental constraints,optimizes costs while considering prohibited operating zones,minimizes active power losses,and optimizes voltage deviation by enhancing the voltage stability index(VSI)effectively.This research significantly contributes to advancing OPF,emphasizing GBBLCO’s improved global search capabilities and ability to address challenges related to local minima.GBBLCO emerges as a versatile and robust optimization tool for diverse challenges in power systems,offering a promising solution for the evolving needs of renewable energy-integrated power grids.展开更多
Elevators are essential components of contemporary buildings, enabling efficient vertical mobility for occupants. However, the proliferation of tall buildings has exacerbated challenges such as traffic congestion with...Elevators are essential components of contemporary buildings, enabling efficient vertical mobility for occupants. However, the proliferation of tall buildings has exacerbated challenges such as traffic congestion within elevator systems. Many passengers experience dissatisfaction with prolonged wait times, leading to impatience and frustration among building occupants. The widespread adoption of neural networks and deep learning technologies across various fields and industries represents a significant paradigm shift, and unlocking new avenues for innovation and advancement. These cutting-edge technologies offer unprecedented opportunities to address complex challenges and optimize processes in diverse domains. In this study, LSTM (Long Short-Term Memory) network technology is leveraged to analyze elevator traffic flow within a typical office building. By harnessing the predictive capabilities of LSTM, the research aims to contribute to advancements in elevator group control design, ultimately enhancing the functionality and efficiency of vertical transportation systems in built environments. The findings of this research have the potential to reference the development of intelligent elevator management systems, capable of dynamically adapting to fluctuating passenger demand and optimizing elevator usage in real-time. By enhancing the efficiency and functionality of vertical transportation systems, the research contributes to creating more sustainable, accessible, and user-friendly living environments for individuals across diverse demographics.展开更多
Characteristics of the Internet traffic data flow are studied based on the chaos theory. A phase space that is isometric with the network dynamic system is reconstructed by using the single variable time series of a n...Characteristics of the Internet traffic data flow are studied based on the chaos theory. A phase space that is isometric with the network dynamic system is reconstructed by using the single variable time series of a network flow. Some parameters, such as the correlative dimension and the Lyapunov exponent are calculated, and the chaos characteristic is proved to exist in Internet traffic data flows. A neural network model is construct- ed based on radial basis function (RBF) to forecast actual Internet traffic data flow. Simulation results show that, compared with other forecasts of the forward-feedback neural network, the forecast of the RBF neural network based on the chaos theory has faster learning capacity and higher forecasting accuracy.展开更多
The explicit rate flow control mechanisms for ABR service are used to sharethe available bandwidth of a bottleneck link fairly and reasonably among many competitive users andto maintain the buffer queue length of a bo...The explicit rate flow control mechanisms for ABR service are used to sharethe available bandwidth of a bottleneck link fairly and reasonably among many competitive users andto maintain the buffer queue length of a bottleneck switch connected to the link at a desired levelin order to avoid and control congestion in ATM networks. However, designing effective flow controlmechanisms for the service is known to be difficult because of the variety of dynamic parametersinvolved such as available link bandwidth, burst of the traffic, the distances between ABR sourcesand switches. In this paper, we present a fuzzy explicit rate flow control mechanism for ABRservice. The mechanism has a simple structure and is robust in the sense that the mechanism'sstability is not sensitive to the change in the number of active virtual connections (VCs). Manysimulations show that this mechanism can not only effectively avoid network congestion, but alsoensure fair share of the bandwidth for all active VCs regardless of the number of hops theytraverse. Additionally, it has the advantages of fast convergence, low oscillation, and high linkbandwidth utilization.展开更多
Blockage is a kind of phenomenon frequently occurred in a transport network, in which the human beings are the moving subjects. The minimum flow of a network defined in this paper means the maximum flow quantity throu...Blockage is a kind of phenomenon frequently occurred in a transport network, in which the human beings are the moving subjects. The minimum flow of a network defined in this paper means the maximum flow quantity through the network in the seriously blocked situation. It is an important parameter in designing and operating a transport network, especially in an emergency evacuation network. A branch and bound method is presented to solve the minimum flow problem on the basis of the blocking flow theory and the algorithm and its application are illustrated by examples.展开更多
Blockage is a kind of phenomenon occurring frequently in modern transportation network. This paper deals with the research work on the blocking now in a network with the help of network flow theory. The blockage pheno...Blockage is a kind of phenomenon occurring frequently in modern transportation network. This paper deals with the research work on the blocking now in a network with the help of network flow theory. The blockage phenomena can be divided intO local blockage and network blockage. In this paper, which deals mainly with the latter, the fundamental concepts and definitions of network blocking flow, blocking outset are presented and the related theorems are proved. It is proved that the sufficient and necessary condition for the emergence of a blocking now in a network is the existence of the blocking outset. The necessary conditions for the existence of the blocking outset in a network are analysed and the characteristic cutset of blockage which reflects the all possible situation of blocking nows in the network is defined.In the last part of the paper the mathematical model of the minimum blocking now is developed and the solution to a small network is given.展开更多
Although the wireless network is widely used in many fields,its characteristics such as high bit error rate and broadcast links may block its development.Network coding is an artistic way to exploit its intrinsic char...Although the wireless network is widely used in many fields,its characteristics such as high bit error rate and broadcast links may block its development.Network coding is an artistic way to exploit its intrinsic characteristics to increase the network reliability.Some people research network coding schemes for inter-flow or intra-flow,each type with its own advantages and disadvantages.In this paper,we propose a new mechanism,called MM-NCOPE,which integrates the idea of inter-flow and intra-flow coding.On the one hand,MM-NCOPE utilizes random liner coding to encode the NCOPE packets while NCOPE is a sub-protocol for optimizing the COPE algorithm by iteration.In NCOPE,packets are automatically matched by size to be coded.As a result,it improves the coding gain in some level.On the other hand,we adopt the partial Acknowledgement retransmission scheme to achieve high compactness and robustness.ACK is an independent packet with the highest priority rather than a part of the data packets.Compared with existing works on opportunistic network coding,our approach ensures the reliability of wireless links and improves the coding gain.展开更多
In a large area of the east—central Asian continent there is a unified seismic network system composed of two families of large—seismic belts that intersect conjugately. Such a seismic network in the middle—upper c...In a large area of the east—central Asian continent there is a unified seismic network system composed of two families of large—seismic belts that intersect conjugately. Such a seismic network in the middle—upper crust is actually a response to the plastic flow network in the lower lithosphere including the lower crust and lithospheric mantle. The existence of the unified plastic flow system confirms that the driving force for intraplate tectonic deformation results mainly from the compression of the India plate, while the long-range transmission of the force is carried out chiefly by means of plastic flow. The plastic flow network has a control over the intraplate tectonic deformation.展开更多
In modern datacenters, the most common method to solve the network latency problem is to minimize flow completion time during the transmission process. Following the soft real-time nature, the optimization of transpor...In modern datacenters, the most common method to solve the network latency problem is to minimize flow completion time during the transmission process. Following the soft real-time nature, the optimization of transport latency is relaxed to meet a flow's deadline in deadline-sensitive services. However, none of existing deadline-sensitive protocols consider deadline as a constraint condition of transmission.They can only simplify the objective of meeting a flow's deadline as a deadline-aware mechanism by assigning a higher priority for tight-deadline constrained flows to finish the transmission as soon as possible, which results in an unsatisfactory effect in the condition of high fan-in degree. It drives us to take a step back and rethink whether minimizing flow completion time is the optimal way in meeting flow's deadline. In this paper, we focus on the design of a soft real-time transport protocol with deadline constraint in datacenters and present a flow-based deadline scheduling scheme for datacenter networks(FBDS).FBDS makes the unilateral deadline-aware flow transmission with priority transform into a compound centralized single-machine deadlinebased flow scheduling decision. In addition, FBDS blocks the flow sets and postpones some flows with extra time until their deadlines to make room for the new arriving flows in order to improve the deadline meeting rate. Our simulation resultson flow completion time and deadline meeting rate reveal the potential of FBDS in terms of a considerable deadline-sensitive transport protocol for deadline-sensitive interactive services.展开更多
Accurate short-term traffic flow prediction plays a crucial role in intelligent transportation system (ITS), because it can assist both traffic authorities and individual travelers make better decisions. Previous rese...Accurate short-term traffic flow prediction plays a crucial role in intelligent transportation system (ITS), because it can assist both traffic authorities and individual travelers make better decisions. Previous researches mostly focus on shallow traffic prediction models, which performances were unsatisfying since short-term traffic flow exhibits the characteristics of high nonlinearity, complexity and chaos. Taking the spatial and temporal correlations into consideration, a new traffic flow prediction method is proposed with the basis on the road network topology and gated recurrent unit (GRU). This method can help researchers without professional traffic knowledge extracting generic traffic flow features effectively and efficiently. Experiments are conducted by using real traffic flow data collected from the Caltrans Performance Measurement System (PEMS) database in San Diego and Oakland from June 15, 2017 to September 27, 2017. The results demonstrate that our method outperforms other traditional approaches in terms of mean absolute percentage error (MAPE), symmetric mean absolute percentage error (SMAPE) and root mean square error (RMSE).展开更多
Computer networks and power transmission networks are treated as capacitated flow networks.A capacitated flow network may partially fail due to maintenance.Therefore,the capacity of each edge should be optimally assig...Computer networks and power transmission networks are treated as capacitated flow networks.A capacitated flow network may partially fail due to maintenance.Therefore,the capacity of each edge should be optimally assigned to face critical situations-i.e.,to keep the network functioning normally in the case of failure at one or more edges.The robust design problem(RDP)in a capacitated flow network is to search for the minimum capacity assignment of each edge such that the network still survived even under the edge’s failure.The RDP is known as NP-hard.Thus,capacity assignment problem subject to system reliability and total capacity constraints is studied in this paper.The problem is formulated mathematically,and a genetic algorithm is proposed to determine the optimal solution.The optimal solution found by the proposed algorithm is characterized by maximum reliability and minimum total capacity.Some numerical examples are presented to illustrate the efficiency of the proposed approach.展开更多
Theoretic and practical significance has been highlighted in the research of the roles and functions of destinations,as destinations are restricted by the spatial structure based on tourist flow network from the persp...Theoretic and practical significance has been highlighted in the research of the roles and functions of destinations,as destinations are restricted by the spatial structure based on tourist flow network from the perspective of relationship.This article conducted an empirical analysis for Tourism Region of South Anhui(TRSA) and revealed the necessity and feasibility of studying the roles and functions of destinations from tourist flow network's perspective.The automorphic equivalence analysis and centrality analysis were used to classify 16 destinations in TRSA into six role types:tourist flow distribution center,hub of tourist flows,passageway destination,common touring destination,attached touring destination,and nearly isolated destination.Some suggestions were given on suitable infrastructure construction and destinations service designs according to their functions in network.This destination role positioning was based on tourist flow network structure in integral and macroscopic way.It provided an important reference for the balanced and harmonious development of all the destinations of TRSA.In addition,this article verified the applicability of social network analysis on tourist flow research in local scale,and expanded this method to destination role and function positioning.展开更多
This paper chooses passenger flow data of some stations in China from January 2015 to March 2016, and the time series prediction model of BP neural network for railway passenger flow is established. But because of its...This paper chooses passenger flow data of some stations in China from January 2015 to March 2016, and the time series prediction model of BP neural network for railway passenger flow is established. But because of its slow convergence speed and easily falling into local optimal solution of the problem, we propose to improve the time series model of BP neural network by genetic algorithm to predict railway passenger flow. Experimental results show that the improved method has higher prediction accuracy and better nonlinear fitting ability.展开更多
基金sponsored by the General Program of the National Natural Science Foundation of China(Grant Nos.52079129 and 52209148)the Hubei Provincial General Fund,China(Grant No.2023AFB567)。
文摘Analyzing rock mass seepage using the discrete fracture network(DFN)flow model poses challenges when dealing with complex fracture networks.This paper presents a novel DFN flow model that incorporates the actual connections of large-scale fractures.Notably,this model efficiently manages over 20,000 fractures without necessitating adjustments to the DFN geometry.All geometric analyses,such as identifying connected fractures,dividing the two-dimensional domain into closed loops,triangulating arbitrary loops,and refining triangular elements,are fully automated.The analysis processes are comprehensively introduced,and core algorithms,along with their pseudo-codes,are outlined and explained to assist readers in their programming endeavors.The accuracy of geometric analyses is validated through topological graphs representing the connection relationships between fractures.In practical application,the proposed model is employed to assess the water-sealing effectiveness of an underground storage cavern project.The analysis results indicate that the existing design scheme can effectively prevent the stored oil from leaking in the presence of both dense and sparse fractures.Furthermore,following extensive modification and optimization,the scale and precision of model computation suggest that the proposed model and developed codes can meet the requirements of engineering applications.
文摘VPNs are vital for safeguarding communication routes in the continually changing cybersecurity world.However,increasing network attack complexity and variety require increasingly advanced algorithms to recognize and categorizeVPNnetwork data.We present a novelVPNnetwork traffic flowclassificationmethod utilizing Artificial Neural Networks(ANN).This paper aims to provide a reliable system that can identify a virtual private network(VPN)traffic fromintrusion attempts,data exfiltration,and denial-of-service assaults.We compile a broad dataset of labeled VPN traffic flows from various apps and usage patterns.Next,we create an ANN architecture that can handle encrypted communication and distinguish benign from dangerous actions.To effectively process and categorize encrypted packets,the neural network model has input,hidden,and output layers.We use advanced feature extraction approaches to improve the ANN’s classification accuracy by leveraging network traffic’s statistical and behavioral properties.We also use cutting-edge optimizationmethods to optimize network characteristics and performance.The suggested ANN-based categorization method is extensively tested and analyzed.Results show the model effectively classifies VPN traffic types.We also show that our ANN-based technique outperforms other approaches in precision,recall,and F1-score with 98.79%accuracy.This study improves VPN security and protects against new cyberthreats.Classifying VPNtraffic flows effectively helps enterprises protect sensitive data,maintain network integrity,and respond quickly to security problems.This study advances network security and lays the groundwork for ANN-based cybersecurity solutions.
基金supported in part by the National Natural Science Foundation of China under Grant 72264036in part by the West Light Foundation of The Chinese Academy of Sciences under Grant 2020-XBQNXZ-020+1 种基金Social Science Foundation of Xinjiang under Grant 2023BGL077the Research Program for High-level Talent Program of Xinjiang University of Finance and Economics 2022XGC041,2022XGC042.
文摘Purpose:This paper aims to address the limitations in existing research on the evolution of knowledge flow networks by proposing a meso-level institutional field knowledge flow network evolution model(IKM).The purpose is to simulate the construction process of a knowledge flow network using knowledge organizations as units and to investigate its effectiveness in replicating institutional field knowledge flow networks.Design/Methodology/Approach:The IKM model enhances the preferential attachment and growth observed in scale-free BA networks,while incorporating three adjustment parameters to simulate the selection of connection targets and the types of nodes involved in the network evolution process Using the PageRank algorithm to calculate the significance of nodes within the knowledge flow network.To compare its performance,the BA and DMS models are also employed for simulating the network.Pearson coefficient analysis is conducted on the simulated networks generated by the IKM,BA and DMS models,as well as on the actual network.Findings:The research findings demonstrate that the IKM model outperforms the BA and DMS models in replicating the institutional field knowledge flow network.It provides comprehensive insights into the evolution mechanism of knowledge flow networks in the scientific research realm.The model also exhibits potential applicability to other knowledge networks that involve knowledge organizations as node units.Research Limitations:This study has some limitations.Firstly,it primarily focuses on the evolution of knowledge flow networks within the field of physics,neglecting other fields.Additionally,the analysis is based on a specific set of data,which may limit the generalizability of the findings.Future research could address these limitations by exploring knowledge flow networks in diverse fields and utilizing broader datasets.Practical Implications:The proposed IKM model offers practical implications for the construction and analysis of knowledge flow networks within institutions.It provides a valuable tool for understanding and managing knowledge exchange between knowledge organizations.The model can aid in optimizing knowledge flow and enhancing collaboration within organizations.Originality/value:This research highlights the significance of meso-level studies in understanding knowledge organization and its impact on knowledge flow networks.The IKM model demonstrates its effectiveness in replicating institutional field knowledge flow networks and offers practical implications for knowledge management in institutions.Moreover,the model has the potential to be applied to other knowledge networks,which are formed by knowledge organizations as node units.
基金the National Natural Science Foundation of China(No.52274048)Beijing Natural Science Foundation(No.3222037)+1 种基金the CNPC 14th Five-Year Perspective Fundamental Research Project(No.2021DJ2104)the Science Foundation of China University of Petroleum,Beijing(No.2462021YXZZ010).
文摘Recent advances in deep neural networks have shed new light on physics,engineering,and scientific computing.Reconciling the data-centered viewpoint with physical simulation is one of the research hotspots.The physicsinformedneural network(PINN)is currently the most general framework,which is more popular due to theconvenience of constructing NNs and excellent generalization ability.The automatic differentiation(AD)-basedPINN model is suitable for the homogeneous scientific problem;however,it is unclear how AD can enforce fluxcontinuity across boundaries between cells of different properties where spatial heterogeneity is represented bygrid cells with different physical properties.In this work,we propose a criss-cross physics-informed convolutionalneural network(CC-PINN)learning architecture,aiming to learn the solution of parametric PDEs with spatialheterogeneity of physical properties.To achieve the seamless enforcement of flux continuity and integration ofphysicalmeaning into CNN,a predefined 2D convolutional layer is proposed to accurately express transmissibilitybetween adjacent cells.The efficacy of the proposedmethodwas evaluated through predictions of several petroleumreservoir problems with spatial heterogeneity and compared against state-of-the-art(PINN)through numericalanalysis as a benchmark,which demonstrated the superiority of the proposed method over the PINN.
基金supported by the National Natural Science Foundation of China(Grant:62176086).
文摘Traffic flow prediction plays a key role in the construction of intelligent transportation system.However,due to its complex spatio-temporal dependence and its uncertainty,the research becomes very challenging.Most of the existing studies are based on graph neural networks that model traffic flow graphs and try to use fixed graph structure to deal with the relationship between nodes.However,due to the time-varying spatial correlation of the traffic network,there is no fixed node relationship,and these methods cannot effectively integrate the temporal and spatial features.This paper proposes a novel temporal-spatial dynamic graph convolutional network(TSADGCN).The dynamic time warping algorithm(DTW)is introduced to calculate the similarity of traffic flow sequence among network nodes in the time dimension,and the spatiotemporal graph of traffic flow is constructed to capture the spatiotemporal characteristics and dependencies of traffic flow.By combining graph attention network and time attention network,a spatiotemporal convolution block is constructed to capture spatiotemporal characteristics of traffic data.Experiments on open data sets PEMSD4 and PEMSD8 show that TSADGCN has higher prediction accuracy than well-known traffic flow prediction algorithms.
基金supported by the National Natural Science Foundation of China(Nos.U19A208162202320)+2 种基金the Fundamental Research Funds for the Central Universities(No.SCU2023D008)the Science and Engineering Connotation Development Project of Sichuan University(No.2020SCUNG129)the Key Laboratory of Data Protection and Intelligent Management(Sichuan University),Ministry of Education.
文摘Due to the rapid evolution of Advanced Persistent Threats(APTs)attacks,the emergence of new and rare attack samples,and even those never seen before,make it challenging for traditional rule-based detection methods to extract universal rules for effective detection.With the progress in techniques such as transfer learning and meta-learning,few-shot network attack detection has progressed.However,challenges in few-shot network attack detection arise from the inability of time sequence flow features to adapt to the fixed length input requirement of deep learning,difficulties in capturing rich information from original flow in the case of insufficient samples,and the challenge of high-level abstract representation.To address these challenges,a few-shot network attack detection based on NFHP(Network Flow Holographic Picture)-RN(ResNet)is proposed.Specifically,leveraging inherent properties of images such as translation invariance,rotation invariance,scale invariance,and illumination invariance,network attack traffic features and contextual relationships are intuitively represented in NFHP.In addition,an improved RN network model is employed for high-level abstract feature extraction,ensuring that the extracted high-level abstract features maintain the detailed characteristics of the original traffic behavior,regardless of changes in background traffic.Finally,a meta-learning model based on the self-attention mechanism is constructed,achieving the detection of novel APT few-shot network attacks through the empirical generalization of high-level abstract feature representations of known-class network attack behaviors.Experimental results demonstrate that the proposed method can learn high-level abstract features of network attacks across different traffic detail granularities.Comparedwith state-of-the-artmethods,it achieves favorable accuracy,precision,recall,and F1 scores for the identification of unknown-class network attacks through cross-validation onmultiple datasets.
基金This work was supported in part by the National Key R&D Program of China 2021YFE0110500in part by the National Natural Science Foundation of China under Grant 62062021in part by the Guiyang Scientific Plan Project[2023]48-11.
文摘Unsupervised methods based on density representation have shown their abilities in anomaly detection,but detection performance still needs to be improved.Specifically,approaches using normalizing flows can accurately evaluate sample distributions,mapping normal features to the normal distribution and anomalous features outside it.Consequently,this paper proposes a Normalizing Flow-based Bidirectional Mapping Residual Network(NF-BMR).It utilizes pre-trained Convolutional Neural Networks(CNN)and normalizing flows to construct discriminative source and target domain feature spaces.Additionally,to better learn feature information in both domain spaces,we propose the Bidirectional Mapping Residual Network(BMR),which maps sample features to these two spaces for anomaly detection.The two detection spaces effectively complement each other’s deficiencies and provide a comprehensive feature evaluation from two perspectives,which leads to the improvement of detection performance.Comparative experimental results on the MVTec AD and DAGM datasets against the Bidirectional Pre-trained Feature Mapping Network(B-PFM)and other state-of-the-art methods demonstrate that the proposed approach achieves superior performance.On the MVTec AD dataset,NF-BMR achieves an average AUROC of 98.7%for all 15 categories.Especially,it achieves 100%optimal detection performance in five categories.On the DAGM dataset,the average AUROC across ten categories is 98.7%,which is very close to supervised methods.
基金supported by the Deanship of Postgraduate Studies and Scientific Research at Majmaah University in Saudi Arabia under Project Number(ICR-2024-1002).
文摘In the contemporary era,the global expansion of electrical grids is propelled by various renewable energy sources(RESs).Efficient integration of stochastic RESs and optimal power flow(OPF)management are critical for network optimization.This study introduces an innovative solution,the Gaussian Bare-Bones Levy Cheetah Optimizer(GBBLCO),addressing OPF challenges in power generation systems with stochastic RESs.The primary objective is to minimize the total operating costs of RESs,considering four functions:overall operating costs,voltage deviation management,emissions reduction,voltage stability index(VSI)and power loss mitigation.Additionally,a carbon tax is included in the objective function to reduce carbon emissions.Thorough scrutiny,using modified IEEE 30-bus and IEEE 118-bus systems,validates GBBLCO’s superior performance in achieving optimal solutions.Simulation results demonstrate GBBLCO’s efficacy in six optimization scenarios:total cost with valve point effects,total cost with emission and carbon tax,total cost with prohibited operating zones,active power loss optimization,voltage deviation optimization and enhancing voltage stability index(VSI).GBBLCO outperforms conventional techniques in each scenario,showcasing rapid convergence and superior solution quality.Notably,GBBLCO navigates complexities introduced by valve point effects,adapts to environmental constraints,optimizes costs while considering prohibited operating zones,minimizes active power losses,and optimizes voltage deviation by enhancing the voltage stability index(VSI)effectively.This research significantly contributes to advancing OPF,emphasizing GBBLCO’s improved global search capabilities and ability to address challenges related to local minima.GBBLCO emerges as a versatile and robust optimization tool for diverse challenges in power systems,offering a promising solution for the evolving needs of renewable energy-integrated power grids.
文摘Elevators are essential components of contemporary buildings, enabling efficient vertical mobility for occupants. However, the proliferation of tall buildings has exacerbated challenges such as traffic congestion within elevator systems. Many passengers experience dissatisfaction with prolonged wait times, leading to impatience and frustration among building occupants. The widespread adoption of neural networks and deep learning technologies across various fields and industries represents a significant paradigm shift, and unlocking new avenues for innovation and advancement. These cutting-edge technologies offer unprecedented opportunities to address complex challenges and optimize processes in diverse domains. In this study, LSTM (Long Short-Term Memory) network technology is leveraged to analyze elevator traffic flow within a typical office building. By harnessing the predictive capabilities of LSTM, the research aims to contribute to advancements in elevator group control design, ultimately enhancing the functionality and efficiency of vertical transportation systems in built environments. The findings of this research have the potential to reference the development of intelligent elevator management systems, capable of dynamically adapting to fluctuating passenger demand and optimizing elevator usage in real-time. By enhancing the efficiency and functionality of vertical transportation systems, the research contributes to creating more sustainable, accessible, and user-friendly living environments for individuals across diverse demographics.
文摘Characteristics of the Internet traffic data flow are studied based on the chaos theory. A phase space that is isometric with the network dynamic system is reconstructed by using the single variable time series of a network flow. Some parameters, such as the correlative dimension and the Lyapunov exponent are calculated, and the chaos characteristic is proved to exist in Internet traffic data flows. A neural network model is construct- ed based on radial basis function (RBF) to forecast actual Internet traffic data flow. Simulation results show that, compared with other forecasts of the forward-feedback neural network, the forecast of the RBF neural network based on the chaos theory has faster learning capacity and higher forecasting accuracy.
文摘The explicit rate flow control mechanisms for ABR service are used to sharethe available bandwidth of a bottleneck link fairly and reasonably among many competitive users andto maintain the buffer queue length of a bottleneck switch connected to the link at a desired levelin order to avoid and control congestion in ATM networks. However, designing effective flow controlmechanisms for the service is known to be difficult because of the variety of dynamic parametersinvolved such as available link bandwidth, burst of the traffic, the distances between ABR sourcesand switches. In this paper, we present a fuzzy explicit rate flow control mechanism for ABRservice. The mechanism has a simple structure and is robust in the sense that the mechanism'sstability is not sensitive to the change in the number of active virtual connections (VCs). Manysimulations show that this mechanism can not only effectively avoid network congestion, but alsoensure fair share of the bandwidth for all active VCs regardless of the number of hops theytraverse. Additionally, it has the advantages of fast convergence, low oscillation, and high linkbandwidth utilization.
文摘Blockage is a kind of phenomenon frequently occurred in a transport network, in which the human beings are the moving subjects. The minimum flow of a network defined in this paper means the maximum flow quantity through the network in the seriously blocked situation. It is an important parameter in designing and operating a transport network, especially in an emergency evacuation network. A branch and bound method is presented to solve the minimum flow problem on the basis of the blocking flow theory and the algorithm and its application are illustrated by examples.
文摘Blockage is a kind of phenomenon occurring frequently in modern transportation network. This paper deals with the research work on the blocking now in a network with the help of network flow theory. The blockage phenomena can be divided intO local blockage and network blockage. In this paper, which deals mainly with the latter, the fundamental concepts and definitions of network blocking flow, blocking outset are presented and the related theorems are proved. It is proved that the sufficient and necessary condition for the emergence of a blocking now in a network is the existence of the blocking outset. The necessary conditions for the existence of the blocking outset in a network are analysed and the characteristic cutset of blockage which reflects the all possible situation of blocking nows in the network is defined.In the last part of the paper the mathematical model of the minimum blocking now is developed and the solution to a small network is given.
基金National Natural Science Foundation of China under Grant No. 60903196,60903175National Critical Patented Projects in the Next Generation Broadband Wireless Mobile Communication Network under Grant No. 2010ZX03006-001-01+1 种基金National High Technical Research and Development Program of China under Grant No. 2009AA01Z418Educational Commission of Hubei Province of China under Grant No. D20114401
文摘Although the wireless network is widely used in many fields,its characteristics such as high bit error rate and broadcast links may block its development.Network coding is an artistic way to exploit its intrinsic characteristics to increase the network reliability.Some people research network coding schemes for inter-flow or intra-flow,each type with its own advantages and disadvantages.In this paper,we propose a new mechanism,called MM-NCOPE,which integrates the idea of inter-flow and intra-flow coding.On the one hand,MM-NCOPE utilizes random liner coding to encode the NCOPE packets while NCOPE is a sub-protocol for optimizing the COPE algorithm by iteration.In NCOPE,packets are automatically matched by size to be coded.As a result,it improves the coding gain in some level.On the other hand,we adopt the partial Acknowledgement retransmission scheme to achieve high compactness and robustness.ACK is an independent packet with the highest priority rather than a part of the data packets.Compared with existing works on opportunistic network coding,our approach ensures the reliability of wireless links and improves the coding gain.
基金This project (No. 49070196) is funded by the National Science Foundation of China.
文摘In a large area of the east—central Asian continent there is a unified seismic network system composed of two families of large—seismic belts that intersect conjugately. Such a seismic network in the middle—upper crust is actually a response to the plastic flow network in the lower lithosphere including the lower crust and lithospheric mantle. The existence of the unified plastic flow system confirms that the driving force for intraplate tectonic deformation results mainly from the compression of the India plate, while the long-range transmission of the force is carried out chiefly by means of plastic flow. The plastic flow network has a control over the intraplate tectonic deformation.
基金supported in part by the Fundamental Research Funds for the Central Universities under Grant No.2014JBM011 and No.2014YJS021in part by NSFC under Grant No.62171200,61422101,and 62132017+2 种基金in part by the Ph.D.Programs Foundation of MOE of China under Grant No.20130009110014in part by "NCET" under Grant No.NCET-12-0767in part by China Postdoctoral Science Foundation under Grant No.2015M570028,2015M580970
文摘In modern datacenters, the most common method to solve the network latency problem is to minimize flow completion time during the transmission process. Following the soft real-time nature, the optimization of transport latency is relaxed to meet a flow's deadline in deadline-sensitive services. However, none of existing deadline-sensitive protocols consider deadline as a constraint condition of transmission.They can only simplify the objective of meeting a flow's deadline as a deadline-aware mechanism by assigning a higher priority for tight-deadline constrained flows to finish the transmission as soon as possible, which results in an unsatisfactory effect in the condition of high fan-in degree. It drives us to take a step back and rethink whether minimizing flow completion time is the optimal way in meeting flow's deadline. In this paper, we focus on the design of a soft real-time transport protocol with deadline constraint in datacenters and present a flow-based deadline scheduling scheme for datacenter networks(FBDS).FBDS makes the unilateral deadline-aware flow transmission with priority transform into a compound centralized single-machine deadlinebased flow scheduling decision. In addition, FBDS blocks the flow sets and postpones some flows with extra time until their deadlines to make room for the new arriving flows in order to improve the deadline meeting rate. Our simulation resultson flow completion time and deadline meeting rate reveal the potential of FBDS in terms of a considerable deadline-sensitive transport protocol for deadline-sensitive interactive services.
基金Supported by the Support Program of the National 12th Five Year-Plan of China(2015BAK25B03)
文摘Accurate short-term traffic flow prediction plays a crucial role in intelligent transportation system (ITS), because it can assist both traffic authorities and individual travelers make better decisions. Previous researches mostly focus on shallow traffic prediction models, which performances were unsatisfying since short-term traffic flow exhibits the characteristics of high nonlinearity, complexity and chaos. Taking the spatial and temporal correlations into consideration, a new traffic flow prediction method is proposed with the basis on the road network topology and gated recurrent unit (GRU). This method can help researchers without professional traffic knowledge extracting generic traffic flow features effectively and efficiently. Experiments are conducted by using real traffic flow data collected from the Caltrans Performance Measurement System (PEMS) database in San Diego and Oakland from June 15, 2017 to September 27, 2017. The results demonstrate that our method outperforms other traditional approaches in terms of mean absolute percentage error (MAPE), symmetric mean absolute percentage error (SMAPE) and root mean square error (RMSE).
文摘Computer networks and power transmission networks are treated as capacitated flow networks.A capacitated flow network may partially fail due to maintenance.Therefore,the capacity of each edge should be optimally assigned to face critical situations-i.e.,to keep the network functioning normally in the case of failure at one or more edges.The robust design problem(RDP)in a capacitated flow network is to search for the minimum capacity assignment of each edge such that the network still survived even under the edge’s failure.The RDP is known as NP-hard.Thus,capacity assignment problem subject to system reliability and total capacity constraints is studied in this paper.The problem is formulated mathematically,and a genetic algorithm is proposed to determine the optimal solution.The optimal solution found by the proposed algorithm is characterized by maximum reliability and minimum total capacity.Some numerical examples are presented to illustrate the efficiency of the proposed approach.
基金Under the auspices of National Natural Science Foundation of China(No.41001070,40801054,40371030)
文摘Theoretic and practical significance has been highlighted in the research of the roles and functions of destinations,as destinations are restricted by the spatial structure based on tourist flow network from the perspective of relationship.This article conducted an empirical analysis for Tourism Region of South Anhui(TRSA) and revealed the necessity and feasibility of studying the roles and functions of destinations from tourist flow network's perspective.The automorphic equivalence analysis and centrality analysis were used to classify 16 destinations in TRSA into six role types:tourist flow distribution center,hub of tourist flows,passageway destination,common touring destination,attached touring destination,and nearly isolated destination.Some suggestions were given on suitable infrastructure construction and destinations service designs according to their functions in network.This destination role positioning was based on tourist flow network structure in integral and macroscopic way.It provided an important reference for the balanced and harmonious development of all the destinations of TRSA.In addition,this article verified the applicability of social network analysis on tourist flow research in local scale,and expanded this method to destination role and function positioning.
文摘This paper chooses passenger flow data of some stations in China from January 2015 to March 2016, and the time series prediction model of BP neural network for railway passenger flow is established. But because of its slow convergence speed and easily falling into local optimal solution of the problem, we propose to improve the time series model of BP neural network by genetic algorithm to predict railway passenger flow. Experimental results show that the improved method has higher prediction accuracy and better nonlinear fitting ability.