期刊文献+
共找到18,150篇文章
< 1 2 250 >
每页显示 20 50 100
CAW-YOLO:Cross-Layer Fusion and Weighted Receptive Field-Based YOLO for Small Object Detection in Remote Sensing
1
作者 Weiya Shi Shaowen Zhang Shiqiang Zhang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第6期3209-3231,共23页
In recent years,there has been extensive research on object detection methods applied to optical remote sensing images utilizing convolutional neural networks.Despite these efforts,the detection of small objects in re... In recent years,there has been extensive research on object detection methods applied to optical remote sensing images utilizing convolutional neural networks.Despite these efforts,the detection of small objects in remote sensing remains a formidable challenge.The deep network structure will bring about the loss of object features,resulting in the loss of object features and the near elimination of some subtle features associated with small objects in deep layers.Additionally,the features of small objects are susceptible to interference from background features contained within the image,leading to a decline in detection accuracy.Moreover,the sensitivity of small objects to the bounding box perturbation further increases the detection difficulty.In this paper,we introduce a novel approach,Cross-Layer Fusion and Weighted Receptive Field-based YOLO(CAW-YOLO),specifically designed for small object detection in remote sensing.To address feature loss in deep layers,we have devised a cross-layer attention fusion module.Background noise is effectively filtered through the incorporation of Bi-Level Routing Attention(BRA).To enhance the model’s capacity to perceive multi-scale objects,particularly small-scale objects,we introduce a weightedmulti-receptive field atrous spatial pyramid poolingmodule.Furthermore,wemitigate the sensitivity arising from bounding box perturbation by incorporating the joint Normalized Wasserstein Distance(NWD)and Efficient Intersection over Union(EIoU)losses.The efficacy of the proposedmodel in detecting small objects in remote sensing has been validated through experiments conducted on three publicly available datasets.The experimental results unequivocally demonstrate the model’s pronounced advantages in small object detection for remote sensing,surpassing the performance of current mainstream models. 展开更多
关键词 Small object detection attention mechanism cross-layer fusion discrete cosine transform
下载PDF
Enhancing Data Forwarding Efficiency in SIoT with Multidimensional Social Relations
2
作者 Fang Xu Songhao Jiang +3 位作者 Yi Ma Manzoor Ahmed Zenggang Xiong Yuanlin Lyu 《Computers, Materials & Continua》 SCIE EI 2024年第1期1095-1113,共19页
Effective data communication is a crucial aspect of the Social Internet of Things(SIoT)and continues to be a significant research focus.This paper proposes a data forwarding algorithm based on Multidimensional Social ... Effective data communication is a crucial aspect of the Social Internet of Things(SIoT)and continues to be a significant research focus.This paper proposes a data forwarding algorithm based on Multidimensional Social Relations(MSRR)in SIoT to solve this problem.The proposed algorithm separates message forwarding into intra-and cross-community forwarding by analyzing interest traits and social connections among nodes.Three new metrics are defined:the intensity of node social relationships,node activity,and community connectivity.Within the community,messages are sent by determining which node is most similar to the sender by weighing the strength of social connections and node activity.When a node performs cross-community forwarding,the message is forwarded to the most reasonable relay community by measuring the node activity and the connection between communities.The proposed algorithm was compared to three existing routing algorithms in simulation experiments.Results indicate that the proposed algorithmsubstantially improves message delivery efficiency while lessening network overhead and enhancing connectivity and coordination in the SIoT context. 展开更多
关键词 SIoT data forwarding social attributes social relations COMMUNITY
下载PDF
SEF:A Smart and Energy-Aware Forwarding Strategy for NDN-Based Internet of Healthcare
3
作者 Naeem Ali Askar Adib Habbal +2 位作者 Hassen Hamouda Abdullah Mohammad Alnajim Sheroz Khan 《Computers, Materials & Continua》 SCIE EI 2024年第12期4625-4658,共34页
Named Data Networking(NDN)has emerged as a promising communication paradigm,emphasizing content-centric access rather than location-based access.This model offers several advantages for Internet of Healthcare Things(I... Named Data Networking(NDN)has emerged as a promising communication paradigm,emphasizing content-centric access rather than location-based access.This model offers several advantages for Internet of Healthcare Things(IoHT)environments,including efficient content distribution,built-in security,and natural support for mobility and scalability.However,existing NDN-based IoHT systems face inefficiencies in their forwarding strategy,where identical Interest packets are forwarded across multiple nodes,causing broadcast storms,increased collisions,higher energy consumption,and delays.These issues negatively impact healthcare system performance,particularly for individuals with disabilities and chronic diseases requiring continuous monitoring.To address these challenges,we propose a Smart and Energy-Aware Forwarding(SEF)strategy based on reinforcement learning for NDN-based IoHT.The SEF strategy leverages the geographical distance and energy levels of neighboring nodes,enabling devices to make more informed forwarding decisions and optimize next-hop selection.This approach reduces broadcast storms,optimizes overall energy consumption,and extends network lifetime.The system model,which targets smart hospitals and monitoring systems for individuals with disabilities,was examined in relation to the proposed strategy.The SEF strategy was then implemented in the NS-3 simulation environment to assess its performance in healthcare scenarios.Results demonstrated that SEF significantly enhanced NDN-based IoHT performance.Specifically,it reduced energy consumption by up to 27.11%,82.23%,and 84.44%,decreased retrieval time by 20.23%,48.12%,and 51.65%,and achieved satisfaction rates that were approximately 0.69 higher than those of other strategies,even in more densely populated areas.This forwarding strategy is anticipated to substantially improve the quality and efficiency of NDN-based IoHT systems. 展开更多
关键词 Energy efficient forwarding strategy health information system internet technologies IoHT people with disabilities reinforcement learning Q-LEARNING
下载PDF
AVO forwarding modeling in two-phase media: multiconstrained matrix mineral modulus inversion
4
作者 林凯 贺振华 +3 位作者 熊晓军 贺锡雷 曹俊兴 薛雅娟 《Applied Geophysics》 SCIE CSCD 2014年第4期395-404,509,共11页
AVO forward modeling is based on two-phase medium theory and is considered an effective method for describing reservoir rocks and fluids. However, the method depends on the input matrix mineral bulk modulus and the ra... AVO forward modeling is based on two-phase medium theory and is considered an effective method for describing reservoir rocks and fluids. However, the method depends on the input matrix mineral bulk modulus and the rationality of the two-phase medium model. We used the matrix mineral bulk modulus inversion method and multiple constraints to obtain a two-phase medium model with physical meaning. The proposed method guarantees the reliability of the obtained AVO characteristicsin two-phase media. By the comparative analysis of different lithology of the core sample, the advantages and accuracy of the inversion method can be illustrated. Also, the inversion method can be applied in LH area, and the AVO characteristics can be obtained when the porosity, fluid saturation, and other important lithology parameters are changed. In particular, the reflection coefficient amplitude difference between the fast P wave and S wave as a function of porosity at the same incidence angle, and the difference in the incidence angle threshold can be used to decipher porosity. 展开更多
关键词 Matrix mineral bulk modulus two-phase media AVO forward modeling
下载PDF
Forwarding控制方法的改进及其在惯性摆系统中的应用 被引量:1
5
作者 陈奕梅 寇春海 韩正之 《电机与控制学报》 EI CSCD 北大核心 2005年第3期218-221,共4页
针对常规积分Forwarding设计的局限性,提出了—种新的设计方案。该方案增加了积分运算的自由度,因而有效地拓展了Forwarding设计的使用范围。运用所提出的方法对惯性摆系统进行了控制器的设计。此外,设计过程中同时还构造出该系统的控制... 针对常规积分Forwarding设计的局限性,提出了—种新的设计方案。该方案增加了积分运算的自由度,因而有效地拓展了Forwarding设计的使用范围。运用所提出的方法对惯性摆系统进行了控制器的设计。此外,设计过程中同时还构造出该系统的控制Lyapunov函数。理论与实际表明了这种控制方案的有效性。 展开更多
关键词 系统 控制方法 控制LYAPUNOV函数 惯性 应用 设计方案 积分运算 设计过程 控制方案 局限性 自由度 控制器
下载PDF
基于行为模型的IP Forwarding异常检测方法 被引量:1
6
作者 郭琳 张大方 +1 位作者 黎文伟 谢鲲 《计算机应用》 CSCD 北大核心 2006年第3期564-566,共3页
通过研究网络流动态特征,基于路由变化、流变化和包延迟,以及IP报文头信息(例如TTL、源/目的地址、报文长度和路由器时间戳)建立网络行为模型,通过高性能测量和在线分析网络流和路由信息对初始网络异常产生实时报警,实现了IP forwardin... 通过研究网络流动态特征,基于路由变化、流变化和包延迟,以及IP报文头信息(例如TTL、源/目的地址、报文长度和路由器时间戳)建立网络行为模型,通过高性能测量和在线分析网络流和路由信息对初始网络异常产生实时报警,实现了IP forwarding网络异常的有效检测和识别。定义了网络行为模型的五种功能模块,通过关联空间和时间状态信息检测识别网络异常为大范围监测网络提供强大支持。 展开更多
关键词 行为模型 IP forwarding异常 生存时间(TTL) 路由 报文延迟
下载PDF
Cross-Layer Adaptive Resource Allocation Algorithm with Diverse QoS Requirements for Single-Cell OFDMA Systems 被引量:14
7
作者 Li Zeng Xi Li +1 位作者 Hong Ji Ke Wang 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2015年第1期15-22,共8页
The orthogonal frequency division multiple access( OFDMA) based communication system has been considered as the main trend of next-Generation communication system. But the existing resource allocation algorithm design... The orthogonal frequency division multiple access( OFDMA) based communication system has been considered as the main trend of next-Generation communication system. But the existing resource allocation algorithm designed for such system is always with high complexity thus hard to be realized. To solve such problem with the constraints of spectrum efficiency and buffer state,a novel cross-layer resource allocation algorithm( RAA) is proposed in this paper. The goal of our RAA is to maximize the system throughput while satisfying several practical constraints,such as fairness among services,head of line( Ho L) delay and diverse quality of service( Qo S) requirements. Due to these constraints,finding the optimal solution becomes a NPhard problem. Therefore in this paper a novel method to solve such problem with acceptable complexity is proposed within following steps: firstly,based on the link state we formulate the ideal subchannel allocation strategy as a convex optimization problem,which can be efficiently solved by our proposed lagrange multiplier technique subchannel allocation( LMTSA) algorithm; secondly,according to the obtained channel allocation matrix,a power allocation algorithm based on the water-filling power allocation( WPA) idea is deployed to get the optimal power allocation matrix combining with adaptive modulation and coding( AMC); finally,through a greedy algorithm,the ultimate subchannel and power allocation matrix can be obtained based on iterative method. The simulation results illustrate that we can achieve the higher throughput and better Qo S performance than the widely-used maximum throughput( MT) algorithm and round robin( RR) algorithm. 展开更多
关键词 OFDMA system RESOURCE ALLOCATION cross-layer DIVER
下载PDF
International Freight Forwarding Services Network in the Yangtze River Delta, 2005–2015: Patterns and Mechanisms 被引量:4
8
作者 LIANG Shuangbo CAO Youhui +3 位作者 WU Wei GAO Jinlong LIU Weichen ZHANG Weiyang 《Chinese Geographical Science》 SCIE CSCD 2019年第1期112-126,共15页
This study examined the spatio-temporal trajectories of the international freight forwarding service(IFFS) in the Yangtze River Delta(YRD) and explored the driving mechanisms of the service. Based on a bipartite netwo... This study examined the spatio-temporal trajectories of the international freight forwarding service(IFFS) in the Yangtze River Delta(YRD) and explored the driving mechanisms of the service. Based on a bipartite network projection from an IFFS firm-city data source, we mapped three IFFS networks in the YRD in 2005, 2010, and 2015. A range of statistical indicators were used to explore changes in the spatial patterns of the three networks. The underlying influence of marketization, globalization, decentralization, and integration was then explored. It was found that the connections between Shanghai and other nodal cities formed the backbones of these networks. The effects of a city's administrative level and provincial administrative borders were generally obvious. We found several specific spatial patterns associated with IFFS. For example, the four non-administrative centers of Ningbo, Suzhou, Lianyungang, and Nantong were the most connected cities and played the role of gateway cities. Furthermore, remarkable regional equalities were found regarding a city's IFFS network provision, with notable examples in the weakly connected areas of northern Jiangsu and southwestern Zhejiang. Finally, an analysis of the driving mechanisms demonstrated that IFFS network changes were highly sensitive to the influences of marketization and globalization, while regional integration played a lesser role in driving changes in IFFS networks. 展开更多
关键词 international FREIGHT forwarding service NETWORK pattern mechanism headquarters-branch method YANGTZE River DELTA
下载PDF
SLCRM: Subjective Logic-Based Cross-Layer Reputation Mechanism for Wireless Mesh Networks 被引量:6
9
作者 Lin Hui Ma Jianfeng Hu Jia 《China Communications》 SCIE CSCD 2012年第10期40-48,共9页
Wireless Mesh Networks (WMNs) are vulnerable to various security threats because of their special infrastructure and communication mode, wherein insider attacks are the most challenging issue. To address this proble... Wireless Mesh Networks (WMNs) are vulnerable to various security threats because of their special infrastructure and communication mode, wherein insider attacks are the most challenging issue. To address this problem and protect innocent users from malicious attacks, it is important to encourage cooperation and deter malicious behaviors. Reputation systems constitute a major category of techniques used for managing trust in distributed networks, and they are effective in characterizing and quantifying a node's behavior for WMNs. However, conventional layered reputation mechanisms ignore several key factors of reputation in other layers; therefore, they cannot provide optimal performance and accurate malicious node identification and isolation for WMNs. In this paper, we propose a novel dynamic reputation mechanism, SLCRM, which couples reputation systems with a cross-layer design and node-security-rating classification techniques to dynamically detect and restrict insider attacks. Simulation results show that in terms of network throughput, packet delivery ratio, malicious nodes' identification, and success rates, SI_CRM imple- ments security protection against insider attacks in a more dynamic, effective, and efficient manner than the subjective logic and uncertainty-based reputation model and the familiarity-based reputation model. 展开更多
关键词 wireless mesh networks reputation mechanism cross-layer design network security
下载PDF
Cross-Layer Design and Ant-Colony Optimization Based Routing Algorithm for Low Earth Orbit Satellite Networks 被引量:5
10
作者 王厚天 张琦 +2 位作者 忻向军 陶滢 刘乃金 《China Communications》 SCIE CSCD 2013年第10期37-46,共10页
To improve the robustness of the Low Earth Orbit(LEO) satellites networks and realise load balancing, a Cross-layer design and Ant-colony optimization based Load-balancing routing algorithm for LEO Satellite Networks(... To improve the robustness of the Low Earth Orbit(LEO) satellites networks and realise load balancing, a Cross-layer design and Ant-colony optimization based Load-balancing routing algorithm for LEO Satellite Networks(CAL-LSN) is proposed in this paper. In CALLSN, mobile agents are used to gather routing information actively. CAL-LSN can utilise the information of the physical layer to make routing decision during the route construction phase. In order to achieve load balancing, CALLSN makes use of a multi-objective optimization model. Meanwhile, how to take the value of some key parameters is discussed while designing the algorithm so as to improve the reliability. The performance is measured by the packet delivery rate, the end-to-end delay, the link utilization and delay jitter. Simulation results show that CAL-LSN performs well in balancing traffic load and increasing the packet delivery rate. Meanwhile, the end-to-end delay and delay jitter performance can meet the requirement of video transmission. 展开更多
关键词 ant-colony algorithm cross-layer design LEO satellite networks load balancing Quality of Service
下载PDF
Cross-Layer Design of Energy-Saving AODV Routing Protocol 被引量:3
11
作者 李冰 金志刚 舒炎泰 《Transactions of Tianjin University》 EI CAS 2009年第5期343-349,共7页
Since most ad hoc mobile devices today operate on batteries,the power consumption becomes an important issue.This paper proposes a cross-layer design of energy-aware ad hoc on-demand distance vector(CEAODV) routing pr... Since most ad hoc mobile devices today operate on batteries,the power consumption becomes an important issue.This paper proposes a cross-layer design of energy-aware ad hoc on-demand distance vector(CEAODV) routing protocol which adopts cross-layer mechanism and energy-aware metric to improve AODV routing protocol to reduce the energy consumption and then prolong the life of the whole network.In CEAODV,the link layer and the routing layer work together to choose the optimized transmission power for nodes and the route for packets.The link layer provides the energy consumption information for the routing layer and the routing layer chooses route accordingly and conversely controls the link layer to adjust the transmission power.The simulation result shows that CEAODV can outperform AODV to save more energy.It can reduce the consumed energy by about 8%over traditional energy-aware algorithm.And the performance is better when the traffic load is higher in the network. 展开更多
关键词 ad hoc network energy conservation cross-layer ROUTING
下载PDF
Enhancing Interest Forwarding for Fast Recovery from Unanticipated Data Access Failure in NDN 被引量:1
12
作者 Xiaoyan Hu Xuhui Liu +2 位作者 Lixia Zhao Jian Gong Guang Cheng 《China Communications》 SCIE CSCD 2019年第7期120-130,共11页
We show that an aggregated Interest in Named Data Networking (NDN) may fail to retrieve desired data since the Interest previously sent upstream for the same content is judged as a duplicate one and then dropped by an... We show that an aggregated Interest in Named Data Networking (NDN) may fail to retrieve desired data since the Interest previously sent upstream for the same content is judged as a duplicate one and then dropped by an upstream node due to its multipath forwarding. Furthermore, we propose NDRUDAF, a NACK based mechanism that enhances the Interest forwarding and enables Detection and fast Recovery from such Unanticipated Data Access Failure. In the NDN enhanced with NDRUDAF, the router that aggregates the Interest detects such unanticipated data access failure based on a negative acknowledgement from the upstream node that judges the Interest as a duplicate one. Then the router retransmits the Interest as soon as possible on behalf of the requester whose Interest is aggregated to fast recover from the data access failure. We qualitatively and quantitatively analyze the performance of the NDN enhanced with our proposed NDRUDAF and compare it with that of the present NDN. Our experimental results validate that NDRUDAF improves the system performance in case of such unanticipated data access failure in terms of data access delay and network resource utilization efficiency at routers. 展开更多
关键词 named DATA networking INTEREST aggregation multipath forwarding DATA access FAILURE negative ACKNOWLEDGEMENT
下载PDF
REDUCING BURST PACKET LOSS THROUGH ROUTE-FREE FORWARDING 被引量:1
13
作者 Ma Hailong Guo Yunfei +1 位作者 Cheng Dongnian Zhang Jianwei 《Journal of Electronics(China)》 2010年第3期363-370,共8页
It is well known that today's inter-domain routing protocol, Border Gateway Protocol (BGP), converges slowly during network failures. Due to the distribution nature of Internet routing decisions and the rate-limit... It is well known that today's inter-domain routing protocol, Border Gateway Protocol (BGP), converges slowly during network failures. Due to the distribution nature of Internet routing decisions and the rate-limiting timer Minimum Route Advertisement Interval (MRAI) of BGP, unavoidable convergence latency is introduced in reaction to network changes. During the period of convergence temporarily routing table inconsistencies cause short-term routing blackholes and loops which result in widespread temporary burst packet loss. In this paper, we present ROute-Free Forwarding (ROFF) - a novel technique for packet delivering continuously during periods of convergence. With slightly modifications on IP packet header and BGP, route loops and blackholes can be avoided. Our preliminary evaluation demonstrates that ROFF succeeds in reducing the number of Autonomous Systems (ASes) which experience burst packet loss and the duration of packet loss. 展开更多
关键词 Border Gateway Protocol (BGP) Loop-free Blackhole forwarding
下载PDF
Detection of Insider Selective Forwarding Attack Based on Monitor Node and Trust Mechanism in WSN 被引量:3
14
作者 Yu Hu Yuanming Wu Hongshuai Wang 《Wireless Sensor Network》 2014年第11期237-248,共12页
The security problems of wireless sensor networks (WSN) have attracted people’s wide attention. In this paper, after we have summarized the existing security problems and solutions in WSN, we find that the insider at... The security problems of wireless sensor networks (WSN) have attracted people’s wide attention. In this paper, after we have summarized the existing security problems and solutions in WSN, we find that the insider attack to WSN is hard to solve. Insider attack is different from outsider attack, because it can’t be solved by the traditional encryption and message authentication. Therefore, a reliable secure routing protocol should be proposed in order to defense the insider attack. In this paper, we focus on insider selective forwarding attack. The existing detection mechanisms, such as watchdog, multipath retreat, neighbor-based monitoring and so on, have both advantages and disadvantages. According to their characteristics, we proposed a secure routing protocol based on monitor node and trust mechanism. The reputation value is made up with packet forwarding rate and node’s residual energy. So this detection and routing mechanism is universal because it can take account of both the safety and lifetime of network. Finally, we use OPNET simulation to verify the performance of our algorithm. 展开更多
关键词 INSIDER ATTACK Selective forwarding TRUST Mechanism MONITOR NODE Secure Routing Protocol
下载PDF
Features of fracture height propagation in cross-layer fracturing of shale oil reservoirs 被引量:2
15
作者 WANG Yizhao HOU Bing +1 位作者 WANG Dong JIA Zhenhua 《Petroleum Exploration and Development》 CSCD 2021年第2期469-479,共11页
Triaxial fracturing modeling experiments were carried out on whole diameter shale cores from different layers of Shahejie Formation in the Dongpu sag,Bohai Bay Basin to find out the vertical propagation shapes of hydr... Triaxial fracturing modeling experiments were carried out on whole diameter shale cores from different layers of Shahejie Formation in the Dongpu sag,Bohai Bay Basin to find out the vertical propagation shapes of hydraulic fractures in different reservoirs.A numerical simulation method of inserting global cohesive elements was adopted to build a pseudo-three-dimension fracture propagation model for multiple shale oil reservoirs considering interface strength,perforation location,and pump rate to research the features of hydraulic fracture(HF)penetrating through layers.The hydraulic fracture propagates in a cross pattern in tight sandstone layers,in a straight line in sandstone layers with natural fractures,forms ladder fracture in shale layers with beddings.The hydraulic fracture propagates in a stripe shape vertically in both sandstone and shale layers,but it spreads in the plane in shale layers after connecting beddings.Restricted by beddings,the hydraulic fractures in shale layers are smaller in height than those in sandstone layers.When a sandstone layer and a shale layer are fractured at the same time,the fracture extends the most in height after the two layers are connected.Perforating at positions where the sandstone-shale interface is higher in strength and increasing the pumping rate can enhance the fracture height,thus achieving the goal of increasing the production by cross-layer fracturing in multiple shale oil layers. 展开更多
关键词 shale oil multiple reservoirs cross-layer fracturing fracture propagation cohesive elements
下载PDF
An Ant Colony Algorithm Based on Cross-Layer Design for Routing and Wavelength Assignment in Optical Satellite Networks 被引量:17
16
作者 Guoli Wen Qi Zhang +2 位作者 Houtian Wang Qinghua Tian Ying Tao 《China Communications》 SCIE CSCD 2017年第8期63-75,共13页
This paper introduces an ant colony routing and wavelength assignment algorithm based on cross-layer design(CL-ACRWA),which can overcome the adverse effects of Doppler wavelength shift on data transmission in optical ... This paper introduces an ant colony routing and wavelength assignment algorithm based on cross-layer design(CL-ACRWA),which can overcome the adverse effects of Doppler wavelength shift on data transmission in optical satellite networks. Firstly, a cross-layer optimization model is built, which considers the Doppler wavelength shift, the transmission delay as well as wavelength-continuity constraint. Then an ant colony algorithm is utilized to solve the cross-layer optimization model, resulting in finding an optimal light path satisfying the above constraints for every connection request. The performance of CL-ACRWA is measured by the communication success probability, the convergence property and the transmission delay. Simulation results show that CL-ACRWA performs well in communication success probability and has good global search ability as well as fast convergence speed. Meanwhile, the transmission delay can meet the basic requirement of real-time transmission of business. 展开更多
关键词 optical satellite network routing and wavelength assignment ant colony optimization cross-layer design Doppler wavelength shift
下载PDF
ESMD-Flow: An Intelligent Flow Forwarding Scheme with Endogenous Security Based on Mimic Defense in Space-Air-Ground Integrated Network 被引量:3
17
作者 Ziyong Li Yuxiang Hu +2 位作者 Di Zhu JiangxingWu Yunjie Gu 《China Communications》 SCIE CSCD 2022年第1期40-51,共12页
The Space-Air-Ground Integrated Network(SAGIN) realizes the integration of space, air,and ground networks, obtaining the global communication coverage.Software-Defined Networking(SDN) architecture in SAGIN has become ... The Space-Air-Ground Integrated Network(SAGIN) realizes the integration of space, air,and ground networks, obtaining the global communication coverage.Software-Defined Networking(SDN) architecture in SAGIN has become a promising solution to guarantee the Quality of Service(QoS).However, the current routing algorithms mainly focus on the QoS of the service, rarely considering the security requirement of flow. To realize the secure transmission of flows in SAGIN, we propose an intelligent flow forwarding scheme with endogenous security based on Mimic Defense(ESMD-Flow). In this scheme, SDN controller will evaluate the reliability of nodes and links, isolate malicious nodes based on the reliability evaluation value, and adapt multipath routing strategy to ensure that flows are always forwarded along the most reliable multiple paths. In addition, in order to meet the security requirement of flows, we introduce the programming data plane to design a multiprotocol forwarding strategy for realizing the multiprotocol dynamic forwarding of flows. ESMD-Flow can reduce the network attack surface and improve the secure transmission capability of flows by implementing multipath routing and multi-protocol hybrid forwarding mechanism. The extensive simulations demonstrate that ESMD-Flow can significantly improve the average path reliability for routing and increase the difficulty of network eavesdropping while improving the network throughput and reducing the average packet delay. 展开更多
关键词 space-air-ground integrated network(SAGIN) endogenous security multipath routing multi-protocol forwarding
下载PDF
Delay-Based Cross-Layer QoS Scheme for Video Streaming in Wireless Ad Hoc Networks 被引量:2
18
作者 Shu Fan Honglin Zhao 《China Communications》 SCIE CSCD 2018年第9期215-234,共20页
With correlating with human perception, quality of experience(Qo E) is also an important measurement in evaluation of video quality in addition to quality of service(Qo S). A cross-layer scheme based on Lyapunov optim... With correlating with human perception, quality of experience(Qo E) is also an important measurement in evaluation of video quality in addition to quality of service(Qo S). A cross-layer scheme based on Lyapunov optimization framework for H.264/AVC video streaming over wireless Ad hoc networks is proposed, with increasing both Qo E and Qo S performances. Different from existing works, this scheme routes and schedules video packets according to the statuses of the frame buffers at the destination nodes to reduce buffer underflows and to increase video playout continuity. The waiting time of head-ofline packets of data queues are considered in routing and scheduling to reduce the average end-to-end delay of video sessions. Different types of packets are allocated with different priorities according to their generated rates under H.264/AVC. To reduce the computational complexity, a distributed media access control policy and a power control algorithm cooperating with the media access policy are proposed. Simulation results show that, compared with existing schemes, this scheme can improve both the Qo S and Qo E performances. The average peak signal-to-noise ratio(PSNR) of the received video streams is also increased. 展开更多
关键词 cross-layer control Lyapunov optimization wireless ad hoc networks video streaming
下载PDF
Performance Analysis of Uplink Distributed Massive MIMO System with Cross-Layer Design over Rayleigh Fading Channel 被引量:3
19
作者 WANG Hui YU Xiangbin +2 位作者 LIU Fuyuan LIU Tao BAI Jiawei 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI CSCD 2021年第6期1028-1036,共9页
The performance of uplink distributed massive multiple-input multiple-output(MIMO)systems with crosslayer design(CLD) is investigated over Rayleigh fading channel, which combines the discrete rate adaptive modulation ... The performance of uplink distributed massive multiple-input multiple-output(MIMO)systems with crosslayer design(CLD) is investigated over Rayleigh fading channel, which combines the discrete rate adaptive modulation with truncated automatic repeat request. By means of the performance analysis, the closed-form expressions of average packet error rate(APER)and overall average spectral efficiency(ASE)of distributed massive MIMO systems with CLD are derived based on the conditional probability density function of each user’s approximate effective signal-to-noise ratio(SNR)and the switching thresholds under the target packet loss rate(PLR)constraint.With these results,using the approximation of complementary error functions,the approximate APER and overall ASE are also deduced. Simulation results illustrate that the obtained theoretical ASE and APER can match the corresponding simulations well. Besides,the target PLR requirement is satisfied,and the distributed massive MIMO systems offer an obvious performance gain over the co-located massive MIMO systems. 展开更多
关键词 distributed massive multiple-input multiple-output(MIMO)system zero-forcing detection cross-layer design spectral efficiency quality of service packet error rate
下载PDF
DESIGN AND EVALUATION OF A PIPELINED FORWARDING ENGINE 被引量:1
20
作者 Li Yufeng Chen Yue Lan Julong 《Journal of Electronics(China)》 2007年第2期157-162,共6页
Recent advances in broadband technology have caused forwarding engines to handle pack- ets with over 10 gigabit per second. In this paper, we present a high-speed forwarding pipeline which can finish all of the routin... Recent advances in broadband technology have caused forwarding engines to handle pack- ets with over 10 gigabit per second. In this paper, we present a high-speed forwarding pipeline which can finish all of the routing and forwarding tasks in the way of pipelining. We also establish the analysis model of the pipeline with which one can evaluate some key performance parameters of the forwarding engine such as forwarding rate and forwarding delay. We find that the pipeline is of good scalability and can forward unicast packets up to the speed of 40Gbit/s. 展开更多
关键词 DESIGN forwarding engine PIPELINE Evaluate
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部