期刊文献+
共找到12,714篇文章
< 1 2 250 >
每页显示 20 50 100
Orchestrating Network Functions in Software-Defined Networks 被引量:2
1
作者 Hongchao Hu Lin Pang +1 位作者 Zhenpeng Wang Guozhen Cheng 《China Communications》 SCIE CSCD 2017年第2期104-117,共14页
Software.defined networking(SDN) enables third.part companies to participate in the network function innovations. A number of instances for one network function will inevitably co.exist in the network. Although some o... Software.defined networking(SDN) enables third.part companies to participate in the network function innovations. A number of instances for one network function will inevitably co.exist in the network. Although some orchestration architecture has been proposed to chain network functions, rare works are focused on how to optimize this process. In this paper, we propose an optimized model for network function orchestration, function combination model(FCM). Our main contributions are as following. First, network functions are featured with a new abstraction, and are open to external providers. And FCM identifies network functions using unique type, and organizes their instances distributed over the network with the appropriate way. Second, with the specialized demands, we can combine function instances under the global network views, and formulate it into the problem of Boolean linear program(BLP). A simulated annealing algorithm is designed to approach optimal solution for this BLP. Finally, the numerical experiment demonstrates that our model can create outstanding composite schemas efficiently. 展开更多
关键词 software-defined network network function function orchestrating
下载PDF
Optimize the Deployment and Integration for Multicast-Oriented Virtual Network Function Tree
2
作者 Ying Chang Hongxue Yang Qinghua Zhu 《Journal of Beijing Institute of Technology》 EI CAS 2022年第5期513-523,共11页
Due to the development of network technology,the number of users is increasing rapidly,and the demand for emerging multicast services is becoming more and more abundant,traffic data is increasing day by day,network no... Due to the development of network technology,the number of users is increasing rapidly,and the demand for emerging multicast services is becoming more and more abundant,traffic data is increasing day by day,network nodes are becoming denser,network topology is becoming more complex,and operators’equipment operation and maintenance costs are increasing.Network functions virtualization multicast issues include building a traffic forwarding topology,deploying the required functions,and directing traffic.Combining the two is still a problem to be studied in depth at present,and this paper proposes a two-stage solution where the decisions of these two stages are interdependent.Specifically,this paper decouples multicast traffic forwarding and function delivery.The minimum spanning tree of traffic forwarding is constructed by Steiner tree,and the traffic forwarding is realized by Viterbi-algorithm.Use a general topology network to examine network cost and service performance.Simulation results show that this method can reduce overhead and delay and optimize user experience. 展开更多
关键词 MULTICAST service function chain(SFC) network functions virtualization(NFV) software defined network(SDN) Viterbi-algorithm
下载PDF
Network Function Virtualization Technology:Progress and Standardization
3
作者 Huiling Zhao Yunpeng Xie Fan Shi 《ZTE Communications》 2014年第2期3-7,共5页
Network innovation and business transformation are both necessary for telecom operators to adapt to new situations, but operators face challenges in terms of network bearer complexity, business centralization, and IT/... Network innovation and business transformation are both necessary for telecom operators to adapt to new situations, but operators face challenges in terms of network bearer complexity, business centralization, and IT/CT integration. Network function virtualization (NFV) may inspire new development ideas, but many doubts still exist within industry, especially about how to introduce NFV into an operator' s network. This article describes the latest progress in NFV standardization, NFV requirements and hot technology issues, and typical NFV applications in an operator networks. 展开更多
关键词 network functions virtualization (NFV) overlay network virtual extensible LAN (VXLAN) service chaining
下载PDF
Enhanced Reliability in Network Function Virtualization by Hybrid Hexagon-Cost Efficient Algorithm
4
作者 D.Jeyakumar C.Rajabhushanam 《Computer Systems Science & Engineering》 SCIE EI 2022年第12期1131-1144,共14页
In this,communication world, the Network Function Virtualization concept is utilized for many businesses, small services to virtualize the network nodefunction and to build a block that may connect the chain, communi... In this,communication world, the Network Function Virtualization concept is utilized for many businesses, small services to virtualize the network nodefunction and to build a block that may connect the chain, communication services.Mainly, Virtualized Network Function Forwarding Graph (VNF-FG) has beenused to define the connection between the VNF and to give the best end-to-endservices. In the existing method, VNF mapping and backup VNF were proposedbut there was no profit and reliability improvement of the backup and mapping ofthe primary VNF. As a consequence, this paper offers a Hybrid Hexagon-CostEfficient algorithm for determining the best VNF among multiple VNF and backing up the best VNF, lowering backup costs while increasing dependability. TheVNF is chosen based on the highest cost-aware important measure (CIM) rate,which is used to assess the relevance of the VNF forwarding graph.To achieveoptimal cost-efficiency, VNF with the maximum CIM is selected. After the selection process, updating is processed by three steps which include one backup VNFfrom one SFC, two backup VNF from one Service Function Chain (SFC),and twobackup VNF from different SFC. Finally, this proposed method is compared withCERA, MinCost, MaxRbyInr based on backup cost, number of used PN nodes,SFC request utility, and latency. The simulation result shows that the proposedmethod cuts down the backup cost and computation time by 57% and 45% compared with the CER scheme and improves the cost-efficiency. As a result, this proposed system achieves less backup cost, high reliability, and low timeconsumption which can improve the Virtualized Network Function operation. 展开更多
关键词 network function virtualized(NFV) hybrid hexagon-cost efficient algorithm(HH-CE) cost-aware important measure(CIM) RELIABILITY network services
下载PDF
An Approach for Network Function Combination Based on Least Busy Placement Algorithm 被引量:3
5
作者 XIE Lijun JIANG Yiming +2 位作者 WANG Binqiang XIONG Gang CHENG Guozhen 《China Communications》 SCIE CSCD 2016年第S1期167-176,共10页
Recently, integrating Softwaredefined networking(SDN) and network functions virtualization(NFV) are proposed to address the issue that difficulty and cost of hardwarebased and proprietary middleboxes management. Howev... Recently, integrating Softwaredefined networking(SDN) and network functions virtualization(NFV) are proposed to address the issue that difficulty and cost of hardwarebased and proprietary middleboxes management. However, it lacks of a framework that orchestrates network functions to service chain in the network cooperatively. In this paper, we propose a function combination framework that can dynamically adapt the network based on the integration NFV and SDN. There are two main contributions in this paper. First, the function combination framework based on the integration of SDN and NFV is proposed to address the function combination issue, including the architecture of Service Deliver Network, the port types representing traffic directions and the explanation of terms. Second, we formulate the issue of load balance of function combination as the model minimizing the standard deviations of all servers' loads and satisfying the demand of performance and limit of resource. The least busy placement algorithm is introduced to approach optimal solution of the problem. Finally, experimental results demonstrate that the proposed method can combine functions in an efficient and scalable way and ensure the load balance of the network. 展开更多
关键词 software-defined networkING network functions VIRTUALIZATION load BALANCE least BUSY PLACEMENT ALGORITHM contribution degree
下载PDF
Providing Customized Security Based on Network Function Composition and Reconfiguration 被引量:2
6
作者 HU Yuxiang LI Yufeng +1 位作者 XING Chiqiang LIAO Jianxin 《China Communications》 SCIE CSCD 2016年第S1期177-189,共13页
Real-time multimedia sharing in Consumer-centric Multimedia Network(CMN) requires usability anywhere, anytime and from any device. However, CMNs are usually located or implemented on application layer, which makes CMN... Real-time multimedia sharing in Consumer-centric Multimedia Network(CMN) requires usability anywhere, anytime and from any device. However, CMNs are usually located or implemented on application layer, which makes CMNs subjected to their fixed substrate security framework. A fundamental diversifying attribute for the customized security experiences of CMNs is pressing. This paper proposes a programmable network structure which is named Service Processing Chain(SPC) based on network function combination. The SPC is established by the ordinal combination of network functions in substrate switches dynamically, and therefore constructs a special channel for each CMN with required security. The construction and reconfiguration algorithms of SPC are also discussed in this paper. Evaluations and implementation show that above approaches are effective in providing multilevel security with flexibility and expansibility. It is believed that the SPC could provide customized security service and drive participative real-time multimedia sharing for CMNs. 展开更多
关键词 consumer-centric MULTIMEDIA network customized SECURITY network function combination service processing CHAIN
下载PDF
Using the Cooperative Game for Service Placement of Virtual Network Functions 被引量:1
7
作者 XIONG Gang HU Yuxiang +1 位作者 WANG Weiming WANG Lingqiang 《China Communications》 SCIE CSCD 2016年第S1期146-157,共12页
To address the issues that middleboxes as a fundamental part of today's networks are facing, Network Function Virtualization(NFV)has been recently proposed, which in essence asserts to migrate hardware-based middl... To address the issues that middleboxes as a fundamental part of today's networks are facing, Network Function Virtualization(NFV)has been recently proposed, which in essence asserts to migrate hardware-based middleboxes into software-based virtualized function entities.Due to the demands of virtual services placement in NFV network environment, this paper models the service amount placement problem involving with the resources allocation as a cooperative game and proposes the placement policy by Nash Bargaining Solution(NBS). Specifically,we first introduce the system overview and apply the rigorous cooperative game-theoretic guide to build the mathematical model, which can give consideration to both the responding efficiency of service requirements and the allocation fairness.Then a distributed algorithm corresponding to NBS is designed to achieve predictable network performance for virtual instances placement.Finally, with simulations under various scenarios,the results show that our placement approach can achieve high utilization of network through the analysis of evaluation metrics namely the satisfaction degree and fairness index. With the suitable demand amount of services, the average values of two metrics can reach above 90%. And by tuning the base placement, our solution can enable operators to flexibly balance the tradeoff between satisfaction and fairness of resourcessharing in service platforms. 展开更多
关键词 Middlebox GAME theory network function VIRTUALIZATION SOFTWARE defined networkING
下载PDF
COATES GRAPH APPROACH FOR GENERATING SYMBOLIC NETWORK FUNCTION
8
作者 虞希清 陆生勋 《Journal of Electronics(China)》 1989年第4期378-385,共8页
In this paper, symbolic code matrix ,constant matrix and count matrix are defined .The first twomatrices are used to describe the elemental expression of augmented matrix and the nede admittance equa-tion is thus obta... In this paper, symbolic code matrix ,constant matrix and count matrix are defined .The first twomatrices are used to describe the elemental expression of augmented matrix and the nede admittance equa-tion is thus obtained. The third matrix is used to obtain the incoming degree matrix, and according to thematrix all the 1- factors of the Coates graph are given. By using the data code, the determinant is expandedand the same items in the expansion are merged. Thus the symbolic network function in which no term can-cellation occurs is generated. 展开更多
关键词 Linear network ANALYSIS SYMBOLIC network function TOPOLOGICAL network ANALYSIS
下载PDF
MODIFIED DOUBLE-GRAPH DECOMPOSITION ANALYSIS FOR FINDING SYMBOLIC NETWORK FUNCTIONS
9
作者 黄汝激 《Journal of Electronics(China)》 1994年第2期143-149,共7页
The concepts of complementary cofactor pairs, normal double-graphs and feasible torn vertex seta are introduced. By using them a decomposition theorem for first-order cofactor C(Y) is derived. Combining it with the mo... The concepts of complementary cofactor pairs, normal double-graphs and feasible torn vertex seta are introduced. By using them a decomposition theorem for first-order cofactor C(Y) is derived. Combining it with the modified double-graph method, a new decomposition analysis-modified double-graph decomposition analysis is presented for finding symbolic network functions. Its advantages are that the resultant symbolic expressions are compact and contain no cancellation terms, and its sign evaluation is very simple. 展开更多
关键词 MODIFIED double-graph DECOMPOSITION ANALYSIS SYMBOLIC network function
下载PDF
Service Function Chain Migration in LEO Satellite Networks
10
作者 Geng Yuhui Wang Niwei +5 位作者 Chen Xi Xu Xiaofan Zhou Changsheng Yang Junyi Xiao Zhenyu Cao Xianbin 《China Communications》 SCIE CSCD 2024年第3期247-259,共13页
With the advancements of software defined network(SDN)and network function virtualization(NFV),service function chain(SFC)placement becomes a crucial enabler for flexible resource scheduling in low earth orbit(LEO)sat... With the advancements of software defined network(SDN)and network function virtualization(NFV),service function chain(SFC)placement becomes a crucial enabler for flexible resource scheduling in low earth orbit(LEO)satellite networks.While due to the scarcity of bandwidth resources and dynamic topology of LEO satellites,the static SFC placement schemes may cause performance degradation,resource waste and even service failure.In this paper,we consider migration and establish an online migration model,especially considering the dynamic topology.Given the scarcity of bandwidth resources,the model aims to maximize the total number of accepted SFCs while incurring as little bandwidth cost of SFC transmission and migration as possible.Due to its NP-hardness,we propose a heuristic minimized dynamic SFC migration(MDSM)algorithm that only triggers the migration procedure when new SFCs are rejected.Simulation results demonstrate that MDSM achieves a performance close to the upper bound with lower complexity. 展开更多
关键词 network function virtualization(NFV) resource allocation satellite networks service function chain(SFC) SFC migration SFC placement soft-ware defined network(SDN)
下载PDF
Assessing target optical camouflage effects using brain functional networks:A feasibility study
11
作者 Zhou Yu Li Xue +4 位作者 Weidong Xu Jun Liu Qi Jia Jianghua Hu Jidong Wu 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第4期69-77,共9页
Brain functional networks model the brain's ability to exchange information across different regions,aiding in the understanding of the cognitive process of human visual attention during target searching,thereby c... Brain functional networks model the brain's ability to exchange information across different regions,aiding in the understanding of the cognitive process of human visual attention during target searching,thereby contributing to the advancement of camouflage evaluation.In this study,images with various camouflage effects were presented to observers to generate electroencephalography(EEG)signals,which were then used to construct a brain functional network.The topological parameters of the network were subsequently extracted and input into a machine learning model for training.The results indicate that most of the classifiers achieved accuracy rates exceeding 70%.Specifically,the Logistic algorithm achieved an accuracy of 81.67%.Therefore,it is possible to predict target camouflage effectiveness with high accuracy without the need to calculate discovery probability.The proposed method fully considers the aspects of human visual and cognitive processes,overcomes the subjectivity of human interpretation,and achieves stable and reliable accuracy. 展开更多
关键词 Camouflage effect evaluation Electroencephalography(EEG) Brain functional networks Machine learning
下载PDF
Resting-state brain network remodeling after different nerve reconstruction surgeries:a functional magnetic resonance imaging study in brachial plexus injury rats
12
作者 Yunting Xiang Xiangxin Xing +6 位作者 Xuyun Hua Yuwen Zhang Xin Xue Jiajia Wu Mouxiong Zheng He Wang Jianguang Xu 《Neural Regeneration Research》 SCIE CAS 2025年第5期1495-1504,共10页
Distinct brain remodeling has been found after different nerve reconstruction strategies,including motor representation of the affected limb.However,differences among reconstruction strategies at the brain network lev... Distinct brain remodeling has been found after different nerve reconstruction strategies,including motor representation of the affected limb.However,differences among reconstruction strategies at the brain network level have not been elucidated.This study aimed to explore intranetwork changes related to altered peripheral neural pathways after different nerve reconstruction surgeries,including nerve repair,endto-end nerve transfer,and end-to-side nerve transfer.Sprague–Dawley rats underwent complete left brachial plexus transection and were divided into four equal groups of eight:no nerve repair,grafted nerve repair,phrenic nerve end-to-end transfer,and end-to-side transfer with a graft sutured to the anterior upper trunk.Resting-state brain functional magnetic resonance imaging was obtained 7 months after surgery.The independent component analysis algorithm was utilized to identify group-level network components of interest and extract resting-state functional connectivity values of each voxel within the component.Alterations in intra-network resting-state functional connectivity were compared among the groups.Target muscle reinnervation was assessed by behavioral observation(elbow flexion)and electromyography.The results showed that alterations in the sensorimotor and interoception networks were mostly related to changes in the peripheral neural pathway.Nerve repair was related to enhanced connectivity within the sensorimotor network,while end-to-side nerve transfer might be more beneficial for restoring control over the affected limb by the original motor representation.The thalamic-cortical pathway was enhanced within the interoception network after nerve repair and end-to-end nerve transfer.Brain areas related to cognition and emotion were enhanced after end-to-side nerve transfer.Our study revealed important brain networks related to different nerve reconstructions.These networks may be potential targets for enhancing motor recovery. 展开更多
关键词 brain functional networks end-to-end nerve transfer end-to-side nerve transfer independent component analysis nerve repair peripheral plexus injury resting-state functional connectivity
下载PDF
Brain Functional Network Changes in Patients with Poststroke Cognitive Impairment Following Acupuncture Therapy
13
作者 Ran Wang Nian Liu +4 位作者 Hao Xu Peng Zhang Xiaohua Huang Lin Yang Xiaoming Zhang 《Health》 2024年第9期856-871,共16页
Background: The mechanisms by which acupuncture affects poststroke cognitive impairment (PSCI) remain unclear. Objective: To investigate brain functional network (BFN) changes in patients with PSCI after acupuncture t... Background: The mechanisms by which acupuncture affects poststroke cognitive impairment (PSCI) remain unclear. Objective: To investigate brain functional network (BFN) changes in patients with PSCI after acupuncture therapy. Methods: Twenty-two PSCI patients who underwent acupuncture therapy in our hospital were enrolled as research subjects. Another 14 people matched for age, sex, and education level were included in the normal control (HC) group. All the subjects underwent resting-state functional magnetic resonance imaging (rs-fMRI) scans;the PSCI patients underwent one scan before acupuncture therapy and another after. The network metric difference between PSCI patients and HCs was analyzed via the independent-sample t test, whereas the paired-sample t test was employed to analyze the network metric changes in PSCI patients before vs. after treatment. Results: Small-world network attributes were observed in both groups for sparsities between 0.1 and 0.28. Compared with the HC group, the PSCI group presented significantly lower values for the global topological properties (γ, Cp, and Eloc) of the brain;significantly greater values for the nodal attributes of betweenness centrality in the CUN. L and the HES. R, degree centrality in the SFGdor. L, PCG. L, IPL. L, and HES. R, and nodal local efficiency in the ORBsup. R, ORBsupmed. R, DCG. L, SMG. R, and TPOsup. L;and decreased degree centrality in the MFG. R, IFGoperc. R, and SOG. R. After treatment, PSCI patients presented increased degree centrality in the LING.L, LING.R, and IOG. L and nodal local efficiency in PHG. L, IOG. R, FFG. L, and the HES. L, and decreased betweenness centrality in the PCG. L and CUN. L, degree centrality in the ORBsupmed. R, and nodal local efficiency in ANG. R. Conclusion: Cognitive decline in PSCI patients may be related to BFN disorders;acupuncture therapy may modulate the topological properties of the BFNs of PSCI patients. 展开更多
关键词 Cognitive Decline Poststroke Cognitive Impairment functional Magnetic Resonance Imaging Brain functional network Graph Theoretical Analysis
下载PDF
Security Monitoring and Management for the Network Services in the Orchestration of SDN-NFV Environment Using Machine Learning Techniques
14
作者 Nasser Alshammari Shumaila Shahzadi +7 位作者 Saad Awadh Alanazi Shahid Naseem Muhammad Anwar Madallah Alruwaili Muhammad Rizwan Abid Omar Alruwaili Ahmed Alsayat Fahad Ahmad 《Computer Systems Science & Engineering》 2024年第2期363-394,共32页
Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified ne... Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified network lifecycle,and policies management.Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration(NFV MANO),and malicious attacks in different scenarios disrupt the NFV Orchestrator(NFVO)and Virtualized Infrastructure Manager(VIM)lifecycle management related to network services or individual Virtualized Network Function(VNF).This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and handle security functions in order to enhance the quality of experience for end users.An anomaly detector investigates these identified risks and provides secure network services.It enables virtual network security functions and identifies anomalies in Kubernetes(a cloud-based platform).For training and testing purpose of the proposed approach,an intrusion-containing dataset is used that hold multiple malicious activities like a Smurf,Neptune,Teardrop,Pod,Land,IPsweep,etc.,categorized as Probing(Prob),Denial of Service(DoS),User to Root(U2R),and Remote to User(R2L)attacks.An anomaly detector is anticipated with the capabilities of a Machine Learning(ML)technique,making use of supervised learning techniques like Logistic Regression(LR),Support Vector Machine(SVM),Random Forest(RF),Naïve Bayes(NB),and Extreme Gradient Boosting(XGBoost).The proposed framework has been evaluated by deploying the identified ML algorithm on a Jupyter notebook in Kubeflow to simulate Kubernetes for validation purposes.RF classifier has shown better outcomes(99.90%accuracy)than other classifiers in detecting anomalies/intrusions in the containerized environment. 展开更多
关键词 Software defined network network function virtualization network function virtualization management and orchestration virtual infrastructure manager virtual network function Kubernetes Kubectl artificial intelligence machine learning
下载PDF
Fully Distributed Learning for Deep Random Vector Functional-Link Networks
15
作者 Huada Zhu Wu Ai 《Journal of Applied Mathematics and Physics》 2024年第4期1247-1262,共16页
In the contemporary era, the proliferation of information technology has led to an unprecedented surge in data generation, with this data being dispersed across a multitude of mobile devices. Facing these situations a... In the contemporary era, the proliferation of information technology has led to an unprecedented surge in data generation, with this data being dispersed across a multitude of mobile devices. Facing these situations and the training of deep learning model that needs great computing power support, the distributed algorithm that can carry out multi-party joint modeling has attracted everyone’s attention. The distributed training mode relieves the huge pressure of centralized model on computer computing power and communication. However, most distributed algorithms currently work in a master-slave mode, often including a central server for coordination, which to some extent will cause communication pressure, data leakage, privacy violations and other issues. To solve these problems, a decentralized fully distributed algorithm based on deep random weight neural network is proposed. The algorithm decomposes the original objective function into several sub-problems under consistency constraints, combines the decentralized average consensus (DAC) and alternating direction method of multipliers (ADMM), and achieves the goal of joint modeling and training through local calculation and communication of each node. Finally, we compare the proposed decentralized algorithm with several centralized deep neural networks with random weights, and experimental results demonstrate the effectiveness of the proposed algorithm. 展开更多
关键词 Distributed Optimization Deep Neural network Random Vector functional-Link (RVFL) network Alternating Direction Method of Multipliers (ADMM)
下载PDF
Advancing 5G Network Applications Lifecycle Security:An ML-Driven Approach
16
作者 Ana Hermosilla Jorge Gallego-Madrid +3 位作者 Pedro Martinez-Julia Jordi Ortiz Ved P.Kafle Antonio Skarmeta 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第11期1447-1471,共25页
As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof pa... As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof paramount importance.This paper introduces a novel integrated model architecture,combining a networkapplication validation framework with an AI-driven reactive system to enhance security in real-time.The proposedmodel leverages machine learning(ML)and artificial intelligence(AI)to dynamically monitor and respond tosecurity threats,effectively mitigating potential risks before they impact the network infrastructure.This dualapproach not only validates the functionality and performance of network applications before their real deploymentbut also enhances the network’s ability to adapt and respond to threats as they arise.The implementation ofthis model,in the shape of an architecture deployed in two distinct sites,demonstrates its practical viability andeffectiveness.Integrating application validation with proactive threat detection and response,the proposed modeladdresses critical security challenges unique to 5G infrastructures.This paper details the model,architecture’sdesign,implementation,and evaluation of this solution,illustrating its potential to improve network securitymanagement in 5G environments significantly.Our findings highlight the architecture’s capability to ensure boththe operational integrity of network applications and the security of the underlying infrastructure,presenting asignificant advancement in network security. 展开更多
关键词 network application network function virtualization machine learning SECURITY 5G
下载PDF
Service Function Chain Deployment Algorithm Based on Multi-Agent Deep Reinforcement Learning
17
作者 Wanwei Huang Qiancheng Zhang +2 位作者 Tao Liu YaoliXu Dalei Zhang 《Computers, Materials & Continua》 SCIE EI 2024年第9期4875-4893,共19页
Aiming at the rapid growth of network services,which leads to the problems of long service request processing time and high deployment cost in the deployment of network function virtualization service function chain(S... Aiming at the rapid growth of network services,which leads to the problems of long service request processing time and high deployment cost in the deployment of network function virtualization service function chain(SFC)under 5G networks,this paper proposes a multi-agent deep deterministic policy gradient optimization algorithm for SFC deployment(MADDPG-SD).Initially,an optimization model is devised to enhance the request acceptance rate,minimizing the latency and deploying the cost SFC is constructed for the network resource-constrained case.Subsequently,we model the dynamic problem as a Markov decision process(MDP),facilitating adaptation to the evolving states of network resources.Finally,by allocating SFCs to different agents and adopting a collaborative deployment strategy,each agent aims to maximize the request acceptance rate or minimize latency and costs.These agents learn strategies from historical data of virtual network functions in SFCs to guide server node selection,and achieve approximately optimal SFC deployment strategies through a cooperative framework of centralized training and distributed execution.Experimental simulation results indicate that the proposed method,while simultaneously meeting performance requirements and resource capacity constraints,has effectively increased the acceptance rate of requests compared to the comparative algorithms,reducing the end-to-end latency by 4.942%and the deployment cost by 8.045%. 展开更多
关键词 network function virtualization service function chain Markov decision process multi-agent reinforcement learning
下载PDF
SFC placement and dynamic resource allocation based on VNF performance-resource function and service requirement in cloud-edge environment
18
作者 HAN Yingchao MENG Weixiao FAN Wentao 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第4期906-921,共16页
With the continuous development of network func-tions virtualization(NFV)and software-defined networking(SDN)technologies and the explosive growth of network traffic,the requirement for computing resources in the netw... With the continuous development of network func-tions virtualization(NFV)and software-defined networking(SDN)technologies and the explosive growth of network traffic,the requirement for computing resources in the network has risen sharply.Due to the high cost of edge computing resources,coordinating the cloud and edge computing resources to improve the utilization efficiency of edge computing resources is still a considerable challenge.In this paper,we focus on optimiz-ing the placement of network services in cloud-edge environ-ments to maximize the efficiency.It is first proved that,in cloud-edge environments,placing one service function chain(SFC)integrally in the cloud or at the edge can improve the utilization efficiency of edge resources.Then a virtual network function(VNF)performance-resource(P-R)function is proposed to repre-sent the relationship between the VNF instance computing per-formance and the allocated computing resource.To select the SFCs that are most suitable to deploy at the edge,a VNF place-ment and resource allocation model is built to configure each VNF with its particular P-R function.Moreover,a heuristic recur-sive algorithm is designed called the recursive algorithm for max edge throughput(RMET)to solve the model.Through simula-tions on two scenarios,it is verified that RMET can improve the utilization efficiency of edge computing resources. 展开更多
关键词 cloud-edge environment virtual network function(VNF)performance-resource(P-R)function edge resource allo-cation
下载PDF
Crack Fault Diagnosis and Location Method for a Dual-Disk Hollow Shaft Rotor System Based on the Radial Basis Function Network and Pattern Recognition Neural Network 被引量:2
19
作者 Yuhong Jin Lei Hou +1 位作者 Zhenyong Lu Yushu Chen 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2023年第2期180-197,共18页
The crack fault is one of the most common faults in the rotor system,and researchers have paid close attention to its fault diagnosis.However,most studies focus on discussing the dynamic response characteristics cause... The crack fault is one of the most common faults in the rotor system,and researchers have paid close attention to its fault diagnosis.However,most studies focus on discussing the dynamic response characteristics caused by the crack rather than estimating the crack depth and position based on the obtained vibration signals.In this paper,a novel crack fault diagnosis and location method for a dual-disk hollow shaft rotor system based on the Radial basis function(RBF)network and Pattern recognition neural network(PRNN)is presented.Firstly,a rotor system model with a breathing crack suitable for a short-thick hollow shaft rotor is established based on the finite element method,where the crack's periodic opening and closing pattern and different degrees of crack depth are considered.Then,the dynamic response is obtained by the harmonic balance method.By adjusting the crack parameters,the dynamic characteristics related to the crack depth and position are analyzed through the amplitude-frequency responses and waterfall plots.The analysis results show that the first critical speed,first subcritical speed,first critical speed amplitude,and super-harmonic resonance peak at the first subcritical speed can be utilized for the crack fault diagnosis.Based on this,the RBF network and PRNN are adopted to determine the depth and approximate location of the crack respectively by taking the above dynamic characteristics as input.Test results show that the proposed method has high fault diagnosis accuracy.This research proposes a crack detection method adequate for the hollow shaft rotor system,where the crack depth and position are both unknown. 展开更多
关键词 Hollow shaft rotor Breathing crack Radial basis function network Pattern recognition neural network Machine learning
下载PDF
Brain Functional Network Based on Small-Worldness and Minimum Spanning Tree for Depression Analysis 被引量:1
20
作者 Bingtao Zhang Dan Wei +1 位作者 Yun Su Zhonglin Zhang 《Journal of Beijing Institute of Technology》 EI CAS 2023年第2期198-208,共11页
Since the outbreak and spread of corona virus disease 2019(COVID-19),the prevalence of mental disorders,such as depression,has continued to increase.To explore the abnormal changes of brain functional connections in p... Since the outbreak and spread of corona virus disease 2019(COVID-19),the prevalence of mental disorders,such as depression,has continued to increase.To explore the abnormal changes of brain functional connections in patients with depression,this paper proposes a depression analysis method based on brain function network(BFN).To avoid the volume conductor effect,BFN was constructed based on phase lag index(PLI).Then the indicators closely related to depression were selected from weighted BFN based on small-worldness(SW)characteristics and binarization BFN based on the minimum spanning tree(MST).Differences analysis between groups and correlation analysis between these indicators and diagnostic indicators were performed in turn.The resting state electroencephalogram(EEG)data of 24 patients with depression and 29 healthy controls(HC)was used to verify our proposed method.The results showed that compared with HC,the information processing of BFN in patients with depression decreased,and BFN showed a trend of randomization. 展开更多
关键词 DEPRESSION brain function network(BFN) small-worldness(SW) minimum spanning tree(MST)
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部